text
stringlengths 229
520k
|
---|
NFL Players With Sleep Apnea Lose More Than Sleep
Over the past decade, there’s been a significant rise in awareness about obstructive sleep apnea (OSA) and the health risks associated with this disorder that’s characterized by repeated disruptions in breathing during sleep. Nevertheless, the majority of individuals living with this condition – more than 18 million Americans according to the American Academy of Dental Sleep Medicine – remain undiagnosed and untreated.
If the sheer number of individuals impacted by this condition isn’t startling enough, it may come as a shock that even some of the top professional athletes in the nation whose fitness and strength is flaunted on TV and admired on magazine covers, suffer from sleep apnea. In particular, NFL athletes are especially hard hit by this condition. A 2009 Mayo Clinic study of 167 former NFL players revealed that nearly 46% were suffering from sleep apnea and this statistic was even higher among those who were former linemen.
What’s perhaps most surprising of all is that there are plenty of current and former NFL players who don’t know that they are living with this serious disorder. Or, in other cases, players may have been diagnosed, but aren’t actively undergoing treatment, meaning that they are still exposed to all the serious health risks associated with sleep apnea. One reason for this is that many aren’t aware of the treatment options available to them other than the CPAP mask, a device that may be hard to tolerate and use on a nightly basis.
Why are so many cases of sleep apnea not diagnosed?
Despite the increasing awareness about sleep apnea in recent years, confusion still abounds. Specifically, there’s a lack of understanding about what symptoms are red flags of the disorder rather than occasionally unpleasant annoyances. Snoring, morning headaches and daytime drowsiness are all examples of sleep apnea symptoms that may seem harmless in isolation, but, in reality, can be warning signs that airflow is being obstructed during your sleep. Often times, this is the case with individuals who live alone, as snoring or repeated pauses in breathing may go undetected.
Why is sleep apnea prevalent among NFL players?
Sleep apnea is not new to the professional athlete community and many well-known celebrities including NBA star Shaquille O’Neal have gone public about their diagnosis to raise awareness. But while it is not a condition isolated to the NFL, NFL players are especially at risk for the disorder given the average body size of players, as weight and neck circumference are two factors that can increase the likelihood of developing OSA. Average body size has been trending upwards in the NFL over the past several decades too. In fact, the number of NFL athletes weighing more than 300 pounds has exponentially increased from just a handful of players in the 1970s to more than 500 players today. Considering these factors, it seems to add up that a 2003 article published by The New England Journal of Medicine reported that the risk for sleep apnea among NFL players was 4 to 5 times higher than the average population.
Sleep apnea is particularly common among linemen in the NFL, who tend to be heavier. The Mayo Clinic’s 2009 study of retired NFL players reported that of the former linemen in the group, 60% of them had sleep apnea, as compared to the 45% rate among the entire study group. The study also found that more linemen than non-linemen had high blood pressure, which may have been related to the prevalence of sleep apnea as well.
What effects can sleep apnea have?
Unfortunately for NFL players with sleep apnea, the condition causes them to lose much more than sleep. Inadequate rest and airway obstruction at night can spawn a multitude of other symptoms and problems that affect both quality of life and on-field performance.
Symptoms and related problems caused by sleep apnea include:
- Excessive daytime sleepiness
- Mood swings
- Hormonal issues
- Relationship strain
- Drowsy driving
For NFL players with sleep apnea, these effects can have serious consequences on the field too, such as:
- Delayed reaction times
- Lack of energy
- Trouble concentrating
- Impaired memory
Beyond the immediate consequences, there’s also a host of long-term health risks that go along with sleep apnea if it is not properly treated. Some examples include irregular heartbeat, high blood pressure, an increased risk for dementia, heart attack, stroke and more. Not to mention, sleep apnea can even contribute to early death.
Who are some NFL players with sleep apnea?
Former NFL players Aaron Taylor and Rolf Benirshcke of the San Diego Chargers both have sleep apnea and have publicly come out to educate other NFL players about the problem. Percy Harvin, wide receiver for the Buffalo Bills, found out that his chronic migraines were due to having sleep apnea.
Perhaps the most well known case is NFL Hall of Famer and former Philadelphia Eagles defensive end, Reggie White, who died in 2004 of a fatal cardiac arrhythmia, which was attributed to sarcoidosis (a tissue inflammation disorder) and sleep apnea. At the time of his death, White’s CPAP device was sitting on his bedside table unused.
Despite the effectiveness of the CPAP mask at managing symptoms of sleep apnea by opening up the airway with a steady stream of pressurized air during sleep, compliance rates with the device are low – about half of CPAP users are non-compliant. Common grievances about CPAP include the loud nature of the machine, the uncomfortable and constricting feeling of wearing the mask and the side effects such as dry mouth, skin irritation and a runny nose.
Better Sleep With a Winning Alternative
While untreated sleep apnea can have grave consequences for NFL players both on and off the field, fortunately there are a number of treatment options to effectively manage the condition, if not eliminate symptoms entirely. Pro athletes with sleep apnea don’t have to settle for an uncomfortable CPAP mask or automatically resort to surgical treatments.
Oral appliance therapy is a CPAP alternative that is also a non-invasive sleep apnea treatment, yet it has much higher compliance rates than the CPAP mask. Oral appliances work by keeping the airway open during sleep through repositioning the tongue and/or jaw. They’re small, custom-made devices that can make a big difference and they’re worn just like a protective mouth guard on the football field – no mask, no noise and no clunky equipment. There are a few styles of devices available and the proper type will be selected based on the specific needs of each individual patient.
Sound like a winning alternative for better sleep? Schedule a consultation with a sleep specialist at eos dental sleep for sleep apnea treatment in Philadelphia and learn more about oral appliance therapy. In addition to offering oral appliance treatment, our practice also provides convenient at-home sleep testing to diagnose sleep apnea.
Remember: sleep apnea will continue to be a problem that affects a large group of NFL athletes. Better sleep and better performance begins with proper diagnosis and treatment.
Still not sure whether chronic snoring is a harmless habit or something more? Take our snore quiz to find out your level of risk for sleep apnea.
|
NARRATOR:Listen to part of a lecture in a biology class.
FEMALE PROFESSOR:Now usually when we talk about birds flying long distances, we're discussing seasonal migration.But there's some species that fly long distances not as part of a migration but as part of their regular foraging for food.A great example is the albatross.
Albatross are seabirds that nest on islands, and forage for food out in the open sea.And you have one species that forages an average of a thousand miles from its nest.And I read in another study where one albatross left a chick in its nest and went out in search of food, and by the time it got back to the nest, it had flown nine thousand miles. [sees hand raised] Yes, Bob?
MALE STUDENT:But why don't they just build their nest closer to their food supply?I mean, for one thing, they must burn up a lot of energy flying back and forth, and also, if the parents’re gonna have to be away from the nest that much, aren’t the chicks going to be pretty hungry most of the time?
FEMALE PROFESSOR:Ok, good question.The chicks are capable of going for long periods of time without food, which works out nicely since, as you point out, they may not get to eat that often.
As far as the parents go, well, first, they typically can't get enough food in a single location.So they have to visit several places on the same foraging trip, and the locations of good foraging grounds tend to be very far apart.
Uh second, they can't always nest on an island that's closest to the best feeding ground because some of those islands have too many predators on them—predators that would just love some little chicks to snack on.So I don't think they have much choice.
But it still works out, because albatross fly using a technique called dynamic soaring, which enables them to cover very long distances while expending very little energy.If it weren't for that, you'd be right—they would probably burn up all their energy just flying back and forth.
Another factor is, albatross lay only one egg at a time, so when the parent returns with the food, that one chick doesn’t have to share it with a lot of other chicks.[seeing hand raised]Yes, Nancy.
FEMALE STUDENT:So you're saying that they might easily fly a thousand miles over the open ocean when they're looking for food?
FEMALE PROFESSOR:That's right.
FEMALE STUDENT:Then how do they know how to get to the food—I mean, which direction to take to get to the food—and how do they find their way back home?
FEMALE PROFESSOR:Good point. And the truth is, we are not sure.It's very difficult to keep seabirds in captivity, where you can study them, and it’s very difficult to study them in the wild, you know.
But we think that a lot of what we've learnt about songbirds probably applies to seabirds as well.So we're thinking that albatross could make use of two different kinds of “compasses,” if you will: a magnetic compass and a celestial compass.
The magnetic compass somehow makes use of Earth's magnetic field, much the way a standard compass does.But to prove this, we would have to find some kind of magnetic sensory organ in birds. And we are not sure that we have.We have found in birds a mineral called magnetite, which we think might be somehow related to this, because magnetite is a natural magnet.But the problem is that we've also found magnetite in non-migratory birds, which suggests that it may in fact serve a completely different function, not related to navigation at all.
Um, and the other “compass,” the celestial compass, makes use of the stars, more or less the same way humans have historically used the stars to navigate in the open sea.So that's the way we think albatross navigate.
So anyway, you know, think about it, how about if you had to go a thousand miles every time you wanted to get a bite to eat?
FEMALE STUDENT:Yeah, and we complain about having to walk all the way across campus to get to the cafeteria.
教授首先介绍albatross是一种每天要飞行很远去觅食的鸟,然后介绍它们为何飞行那么远的原因,最后探讨它确定方向位置的可能机制,对应选项C:A seabird that flies far in search of food。
|
|THE DOCTOR ALT 8
Joined: 01 Aug 2004
Location: The Tardis, somewhere in the space/time continum
|Posted: Sun Jun 09, 2013 1:43 pm Post subject: Solving a 3.5 Billion-Year-Old Mystery
by Vickie Chachere for USF News
Tampa FL (SPX) Jun 07, 2013
This artist's conception shows a young, hypothetical planet around a cool star. A soupy mix of potentially life-forming chemicals can be seen pooling around the base of the jagged rocks. Photo illustration by NASA.
Scientists may not know for certain whether life exists in outer space, but new research from a team of scientists led by a University of South Florida astrobiologist now shows that one key element that produced life on Earth was carried here on meteorites.
In an article published in the new edition of the Proceedings of the National Academies of Sciences, USF Assistant Professor of Geology Matthew Pasek and researchers from the University of Washington and the Edinburg Centre for Carbon Innovation, revealed new findings that explain how the reactive phosphorus that was an essential component for creating the earliest life forms came to Earth.
The scientists found that during the Hadean and Archean eons - the first of the four principal eons of the Earth's earliest history - the heavy bombardment of meteorites provided reactive phosphorus that when released in water could be incorporated into prebiotic molecules. The scientists documented the phosphorus in early Archean limestone, showing it was abundant some 3.5 billion years ago.
The scientists concluded that the meteorites delivered phosphorus in minerals that are not seen on the surface of the Earth, and these minerals corroded in water to release phosphorus in a form seen only on the early Earth.
The discovery answers one of the key questions for scientist trying to unlock the processes that gave rise to early life forms: Why don't we see new life forms today?
"Meteorite phosphorus may have been a fuel that provided the energy and phosphorus necessary for the onset of life," said Pasek, who studies the chemical composition of space and how it might have contributed to the origins of life. "If this meteoritic phosphorus is added to simple organic compounds, it can generate phosphorus biomolecules identical to those seen in life today."
Pasek said the research provides a plausible answer: The conditions under which life arose on the Earth billions of years ago are no longer present today.
"The present research shows that this is indeed the case: Phosphorus chemistry on the early Earth was substantially different billions of years ago than it is today," he added.
The research team reached their conclusion after examining Earth core samples from Australia, Zimbabwe, West Virginia, Wyoming and in Avon Park, Florida
Previous research had showed that before the emergence of modern DNA-RNA-protein life that is known today, the earliest biological forms evolved from RNA alone. What has stumped scientists, however, was understanding how those early RNA-based life forms synthesized environmental phosphorus, which in its current form is relatively insoluble and unreactive.
Meteorites would have provided reactive phosphorus in the form of the iron-nickel phosphide mineral schreibersite, which in water released soluble and reactive phosphite. Phosphite is the salt scientists believe could have been incorporated into prebiotic molecules.
Of all of the samples analyzed, only the oldest, the Coonterunah carbonate samples from the early Archean of Australia, showed the presence of phosphite. Other natural sources of phosphite include lightning strikes, geothermal fluids and possibly microbial activity under extremely anaerobic condition, but no other terrestrial sources of phosphite have been identified and none could have produced the quantities of phosphite needed to be dissolved in early Earth oceans that gave rise to life, the researchers concluded.
The scientists said meteorite phosphite would have been abundant enough to adjust the chemistry of the oceans, with its chemical signature later becoming trapped in marine carbonate where it was preserved.
It is still possible, the researchers noted, that other natural sources of phosphite could be identified, such as in hydrothermal systems. While that might lead to reducing the total meteoric mass necessary to provide enough phosphite, the researchers said more work would need to be done to determine the exact contribution of separate sources to what they are certain was an essential ingredient to early life.
Evidence for reactive reduced phosphorus species in the early Archean ocean - Proceedings of the National Academies of Sciences; Matthew A. Paseka,1, Jelte P. Harnmeijerb,c, Roger Buickb, Maheen Gulla, and Zachary Atlasa.
|
There is a close proximity in time of the life of St. Patrick and the fall of the western Roman Empire. Also St. Augustine of Hippo was an important contemporary. Let us set the events of the two saints and the continent in a table to see how they fit together.
I have called this page “406-407 Rhine Freezes–St. Patrick Sneezes” to put the two events in a relationship to be easily remembered.
Patrick was born in about A.D. 385. He was kidnapped and made a shepherd in Ireland until he escaped in A.D. 407. That was the winter that the Rhine had frozen over and the hungry Germanic hordes had crossed the river and consumed the food of the land right up to Rome. When the ship that carried Patrick away from Ireland landed on the mainland, the crew nearly starved to death. Europe had become a wasteland.
In due time Patrick returned to his home, prepared for the ministry, was ordained and returned to Ireland as a missionary. Not since Paul the Apostle had the world seen a missionary. And, like Paul the Apostle, Patrick’s mission was wildly successful.
In Patrick’s time Ireland had no cities. Monks would go out and find a green space under a tree to study. Soon others joined them and the place became a monastery. Then began the copying of books and building of libraries. The Irish collected any book they could find. The monasteries became the centers of population and in time became universities. The Irish university is the model for a classical education. This model was taken back to Europe by Irish missionaries until once again Europe was repopulated and re-civilized. We call it the Renaissance.
The Irish monks copied and collected all the Latin and Greek texts they could acquire. We must thank the Irish that these texts are preserved unto us. Still many ancient texts were lost and only remain as partial references in newer books.
Not only did the Irish copy the teachings of the classical languages, they also cataloged the Ogham alphabets of their own language. It was this catalog of the Ogham scripts that allowed scholars in the twentieth century to interpret records inscribed on stones some great length of time before. Some of the Ogham on American stones was inscribed as early as 1700 B.C. To the Irish we owe the ability to read it.
Barry Fell, in America B.C., devotes an entire chapter to how Irish ogam was finally deciphered. In New England in 1680, a Puritan minster named John Danforth discovered some strange writing on a rock in Dighton, Massachuesetts. With fellow minister Cotton Mather, he reported the finding to the Royal Society, and the matter was recorded in the Philosophical Transactions for 1712. The Revolutionary War would delay interpretation of these writings for two hundred years.
Thirty years before Patrick was taken in chains to Ireland, a Romanized African teenager was brought to Carthage, the capital of Roman Africa. In 401 A.D., the year of Patrick’s captivity, Augustine published his Confessions. We will take another look at the Confessions under the Literature section.
As the Irish were prolific in copying and preserving texts, Augustine was prolific in writing. His City of God divides human reality into two realms: Bablylon, the City of Man, and the New Jerusalem, the City of God. This was written to contradict Roman pagans who blamed Christian converts for the barbarian assaults upon Rome, perhaps the earliest attempt to explain the rise and fall of the Roman Empire.
|b. 385 A.D.||b. 354 A.D.|
|Runs away 407||Rhine freezes 406||Publishes Confessions 401|
|d. 461 A.D.||d. 430 A.D.|
Patrick made a confession of his sin to a close friend in preparation for being ordained a deacon. This confession later came back to haunt him. Co-incidentally, the story of his life is called Confession.
St. Augustine’s Confessions is a milestone in literature. It is the first book written entirely in the first person. It is the foundation for biographic literature. Also, it is the foundation of all the psychological sciences.
Cahill, Thomas, How the Irish Saved Civilization, New York: Random House, 1995.
|
The radiator fan has an important job in the engine compartment. It can push air through the radiator core or pull it through. It must cool the antifreeze that circulates through the block and head passages and reduces the engine temperature. Fan designs have specific purposes for different sized vehicles and profiles. They all have the same basic function, which amounts to drawing in extra air, but especially at low rpm conditions and times when the vehicle sits at an idle.
Manual Fixed Fan
The manual fixed fan is the oldest auto-fan design and comes with a four-blade pattern. The fan get its driving power directly off a pulley, powered by a belt from the crankshaft. It spins constantly, never stopping. Therefore, it draws air, pulling it through the radiator from the outside, during slow and fast speeds. It has no clutch to disengage it, nor does it have a variable pitch feature on its blades.
The Thermal Sensing Clutch Fan
The clutch fan is comprised of a disk-like housing that forms the hub of the fan, and sits in front of the water pump. Driven by a pulley (like the manual fan), the insides of the clutch has fluid that produces internal friction that couples with a bi-metallic sensor similar to a thermostat. When the engine rpm has lowered enough, the sensor picks up the signal and engages the clutch, which locks with the fan. The fan will activate much more so at idling and lower speeds. When the car has approached higher speeds where the air has a "ramming" effect on the radiator, the fan shuts off because it does not have to be used. The fan clutch system saves horsepower from the engine by taking away unneeded drag.
Electric fans have their advantages when it comes to small import and compact cars, where size is the main consideration. Small and powerful, multiple electric fans can be mounted either in front of the grill to push air or behind the radiator to pull in air. They can be mounted at off-angles in the engine compartment, so long as they assist in cooling the radiator. Most electric fans come equipped with thermal-sensors that activate the fan when it reaches a hot temperature. They sometimes run after the engine has been shut off to bring the temperature back to normal specifications. Some of the better electric fans can push over 3,000 cubic feet of air per minute and have ten blades.
Flex fans have a light weight construction with a steel hub that supports riveted aluminum alloy blades. The blades have a radical pitch to them, and as the rpm increases the blades begin to flatten out, taking up less air drag and pull on the fan motor. They operate smoother with less noise and vibration than typical blades. The flex fan has gained popularity in the high-performance car and racing circuit.
Centrifugal Clutch Fan
The centrifugal clutch has to depend upon the speed of the engine to engage or disengage it. As the engine speeds up, the clutch allows the fan to partially slip, giving back that engine the power it would have used if permanently attached. When the speed reduces, the clutch locks into position, which engages the fan. One of the problems here might be with a vehicle stuck in the mud with a high-revving engine, which would trigger a no-fan condition, thus over-heating the engine since the vehicle cannot move through the airstream.
- fan image by Antons Matvejevs from Fotolia.com
|
To this date, only one person is thought to have been cured of HIV — the "Berlin patient" Timothy Ray Brown. But no one is exactly sure which aspect of Brown's treatment may have cured him.
Now a new experiment on monkeys provides more evidence that a rare genetic mutation in the person who donated bone marrow to Brown may have had a central role in his cure.
Brown's HIV was eradicated in 2007 after he underwent a treatment in Germany for his leukemia, a cancer of the white blood cells. In the leukemia treatment, Brown first underwent radiation to kill the cancer cells and stem cells in his bone marrow that were creating them, and then received a bone-marrow transplant from a healthy donor to generate new blood cells.
After the treatment, not only was Brown's leukemia in remission, his HIV levels also plummeted to undetectable levels, and they have remained so ever since, even though he has not been taking the antiretroviral (ART) drugs typically used to keep HIV levels low in patients. [7 Devastating Infectious Diseases]
The reason the virus remains undetectable in Brown could be that the bone-marrow transplant was from a donor who had a rare genetic mutation that renders a person's CD4-T cells — the immune cells that are the main target of HIV infection — resistant to the virus.
Having this mutation, known as delta 32, results in having immune cells that have an altered form of a certain receptor called CCR5, which prevents the virus from entering the cells.
But it is also possible that radiation killed very nearly all of Brown's cells that contained HIV at the outset of his treatment (and hence, the donor's genetic mutation mattered very little).
Still another possibility is that the new immune cells (that were produced by transplanted bone-marrow cells) attacked Brown's original cells, in what is called "graft-versus-host disease". This could have killed any HIV reservoirs within Brown that had survived his radiation treatment.
So which is it?
Now in a small study, Dr. Guido Silvestri, a pathologist at Emory University in Atlanta, and colleaguesgave the same treatment that Brown was given to three monkeys, to find out which step in the cancer treatment might have been responsible for the eradication of the HIV.
The monkeys in the study were infected with Simian-Human Immunodeficiency Virus, or SHIV, which is a virus related to HIV that causes a disease similar to AIDS in animals. The monkeys received antiretroviral drugs for some time, to mimic the situation of HIV patients. Then, the animals underwent radiation and received a transplant of their own bone-marrow cells, which were harvested before they were infected with SHIV. [10 Deadly Diseases That Hopped Across Species]
The researchers found that radiation killed most of the animals' blood and immune cells, including up to 99 percent of their CD4-T cells. This finding left open the possibility, at this point in the experiments, that radiation could have been a key step in curing Brown by killing almost all HIV reservoirs.
The scientists also found that the transplant resulted in the generation of HIV-free blood and immune cells within a few weeks, showing that the bone-marrow transplant experiment in monkeys was successful. If the monkeys were to be found cured of HIV, the researchers would be able to rule out graft-versus-host disease, because each monkey received its own cells in the transplant.
But after the treatment, once the researchers stopped giving the monkeys antiretroviral medications, the levels of the virus rapidly rebounded in two of the three animals.
The third monkey, who had to be euthanized after developing kidney failure, had some level of HIV in a number of tissues when it died, suggesting that none of the three monkeys had been "cured" by the treatment, according to the study published today (Sept. 25) in the journal PLOS Pathogens.
The findings support the idea that although radiation can reduce HIV levels, it's not enough to eliminate all reservoirs of the virus, the researchers said. The results suggest that in the case of the Berlin patient, either the genetic mutation of the bone-marrow donor or the graft-versus-host disease "played a significant role," the researchers said.
The Berlin patient's treatment has been tried in at least two other HIV patients who also had lymphoma — cancer of the lymph nodes. However, the bone-marrow donors in those cases did not have the rare mutation in the CCR5 gene. The patients initially appeared to be free of HIV, but the virus returned after a couple of months and the patients had to start antiretroviral medication again.
|
Mirror Box is a name of a popular game in the Iranian National Amusement Park (INAP). There is a wooden box, 105 cm long and 100 cm high in this game. Some parts of the box's ceiling and floor are covered by mirrors. There are two negligibly small holes in the opposite sides of the box at heights hl and hr centimeters above the floor. The picture below shows what the box looks like.
In the game, you will be given a laser gun to shoot once. The laser beam must enter from one hole and exit from the other one. Each mirror has a preset number vi, which shows the number of points players gain if their laser beam hits that mirror. Also — to make things even funnier — the beam must not hit any mirror more than once.
Given the information about the box, your task is to find the maximum score a player may gain. Please note that the reflection obeys the law "the angle of incidence equals the angle of reflection".
The first line of the input contains three space-separated integers hl, hr, n (0 < hl, hr < 100, 0 ≤ n ≤ 100) — the heights of the holes and the number of the mirrors.
Next n lines contain the descriptions of the mirrors. The i-th line contains space-separated vi, ci, ai, bi; the integer vi (1 ≤ vi ≤ 1000) is the score for the i-th mirror; the character ci denotes i-th mirror's position — the mirror is on the ceiling if ci equals "T" and on the floor if ci equals "F"; integers ai and bi (0 ≤ ai < bi ≤ 105) represent the x-coordinates of the beginning and the end of the mirror.
No two mirrors will share a common point. Consider that the x coordinate increases in the direction from left to right, so the border with the hole at height hl has the x coordinate equal to 0 and the border with the hole at height hr has the x coordinate equal to 105.
The only line of output should contain a single integer — the maximum possible score a player could gain.
50 50 7
10 F 1 80000
20 T 1 80000
30 T 81000 82000
40 T 83000 84000
50 T 85000 86000
60 T 87000 88000
70 F 81000 89000
80 72 9
15 T 8210 15679
10 F 11940 22399
50 T 30600 44789
50 F 32090 36579
5 F 45520 48519
120 F 49250 55229
8 F 59700 80609
35 T 61940 64939
2 T 92540 97769
The second sample is depicted above. The red beam gets 10 + 50 + 5 + 35 + 8 + 2 = 110 points and the blue one gets 120.
The red beam on the picture given in the statement shows how the laser beam can go approximately, this is just illustration how the laser beam can gain score. So for the second sample there is no such beam that gain score 110.
|
Some companies in California have English language-only rules in place. The Equal Employment Opportunity Commission, or EEOC, disfavors such rules because an individual's language is a distinctive characteristic of his or her nationality.
English-only rules have been found to be permissible if they are used only at certain times and if they are in place as a business necessity. An example might be a requirement that a television announcer speaks in English when he or she is on the air. Before a company can initiate an English-only rule out of necessity, the business must first notify its employees. If the business doesn't notify its employees and then fires one of them for speaking in a language other than English, the action may constitute discrimination toward the employee for his or her national origin.
Language-exclusive rules that are in place for all of the time at a workplace are presumed to be discriminatory in nature. The EEOC approved codification corresponding to the Civil Rights Act of 1964 concerning English-only regulations. Workplace rules that forbid ever communicating in another language in the workplace can isolate workers and are presumed to be invalid.
Workers who believe that their employee rights were violated by their employers may want to consult with an employment law attorney. A lawyer may review the facts of what happened and then advise the person about whether or not it appears that they have a valid claim. If the employer appears to have engaged in prohibited discrimination against the worker based on his or her national origin, the attorney may help his or her client file a complaint with the EEOC. Lawyers may help gather evidence to support the claim of discrimination to make it more likely to be successful in a lawsuit.
|
Medieval knights of St. John (Hospitallers), riding on a bay horses
The basic right of a person to dispose of his or her possessions at death (testamentary transfer) originated in ancient times. The ability for the deceased to then protect the transfer of those possessions against claims by the State or government, or against other creditors, also originated in legal traditions which began hundreds, or thousands, of years ago. North Carolinians benefit from both legal traditions. Our ability to direct our assets and cherished possessions that we collected while on earth to those we wish, may represent our last basic freedom exercised when we leave this world.
The ancient Greek biographer and essayist Plutarch (born approximately 46 AD), attributed the legal reform allowing a person to freely transfer his belongings at death to whomever he pleased, to the Athenian legalist Salon, born about 630 BC.[i] The ancient Romans later developed “fidei commissum” (meaning to commit something to one’s trust), a sophisticated system developed to leave property to one’s heirs after death (testamentary trusts.)[ii]
The English legal scholar William Blackstone explains that the law that developed in many societies gives a real property owner, who occupies a property, the right to peaceably transfer that real property at death, according to his wishes, to another chosen owner and occupier. Blackstone notes that this ordered transition of real property from one owner and occupier to another was necessary “for the peace of society,”[iii] and prevents “an infinite variety of strife and confusion.”[iv]
ORIGINS OF NORTH CAROLINA REAL PROPERTY ASSET PROTECTION LAW
The real property laws transferred to, and now used in North Carolina, were most recently developed several hundred years ago from the English feudal system. At that time, the king was the only absolute owner of land, with his lords subsequently holding land from the king. The practice of “wardship” provided that a lord would provide land to a male tenant (where the tenant could grow crops and raise livestock, marry, and raise a family.) In exchange, the tenant provided services such as military service, or “knight service”, to protect the lord and king.[v]
Originally, at the ward’s death, all land reverted to the lord, and the widowed wife and children could then become impoverished. The lords, and kings, eventually learned though that the wards would fight harder for them if the wards and their families were better treated, and thus began to allow the wards to keep the land within their families.[vi] Extended families or clans now developed on inherited lands, that would fight hard for the lord and king.
Because families could now keep their livestock and crops on land that they had a continued right to occupy, widows and children no longer became so impoverished upon the father’s death. More prosperous families meant that the lords and kings now had access to more wealth within their kingdoms which they could tax, in order to fund their extended wars and military campaigns.
Two types of concurrent real property possession developed in feudal England 600 years ago that provided additional financial protection to families. Both joint tenancy (land held by more than one person) and tenancy by the entirety (land held as one unit by husband and wife) landholders enjoyed the right of survivorship (the decedent’s land was automatically passed to survivors), and freedom from the estate creditors of the decedent.[vii]
Joint tenancy, and tenancy by the entirety real property ownership remains alive and well in modern North Carolina. North Carolina law adopts the English common law definitions of both joint tenancy and tenancy by the entirety real property ownership. Here, surviving joint landowners automatically inherit the real property ownership interest of a deceased joint landowner by operation of law, with the surviving joint landowners not legally responsible for any individual estate debts of the deceased joint landowner.
The 1960 North Carolina legal case Wilson County v. Wooten[viii], which held that the welfare departments of Durham and Wilson counties could not attach bank account assets transferred to a beneficiary via right of survivorship, likely protects all right of survivorship transfers (including joint with right of survivorship, or JTWROS, real estate transfers) not otherwise specifically available to estate creditors under NC statutes, from the decedent’s estate creditors.
Wilson County v. Wooten implies that the Executor or Personal Representative of the decedent’s estate (and the creditors of that estate) would have no claim to such transferred JTWROS real property. A more recent 1994 legal case, Miller v. Miller[ix], reconfirms that in North Carolina, JTWROS property is not part of a decedent property owner’s estate, and that the surviving JTWROS property owners take the entire property, free and clear of the claims of heirs or creditors of the deceased JTWROS property owner.
ORIGINS OF NORTH CAROLINA ASSET PROTECTION TRUST LAW
In medieval England, creditor protection additionally became available during the evolution of English trust law. English legal scholars borrowed from the much older Roman fidei commissum trust law, and developed ways to leave property in trust to heirs free from creditors.[x] That refined English trust law, brought to the United States’s original 13 colonies (including North Carolina) from England, was used by founding father Thomas Jefferson to establish an asset-protected testamentary trust for his daughter Martha Randolph. With this trust, Thomas Jefferson left assets to daughter Martha protected from the creditors of Thomas Jefferson’s indebted son-in-law Thomas M. Randolph.[xi]
All 50 states, including North Carolina, have now adopted and enforce English trust law providing various types of asset protection trusts which convey creditor protection to beneficiaries.
ORIGINS OF NORTH CAROLINA CORPORATE LAW PROVIDING ASSET PROTECTION TO BUSINESS INVESTORS
The idea of a “corporation” also developed in medieval Europe. The word “corporation” originates from the Latin corpus, which refers to a group or body of people. The original idea of a corporation, which evolved in medieval European business entities, provided that the corporation would allow a body of people to survive “in perpetuity,” and not be limited by the lives of any single stockholder.[xii]
The Catholic Church was one of the first European organizations that took advantage of a “perpetual existence.” As corporate law later developed in England, the concept of personal asset protection for investors, or stockholders, in risky businesses was first used in the 1600s by the Dutch East India Company. The Dutch East India Company, which issued what were likely the first stock certificates, played a major role in the Western exploration of the entire world.[xiii]
The ability of investors to invest in bold new corporate enterprises while keeping their personal assets safe, which spread from England, through Europe, to the United States (and North Carolina), was significantly responsible for the entire industrial revolution, and for much of the wealth and prosperity that many North Carolinians still enjoy today.
EXPANDED ASSET PROTECTION IN NORTH CAROLINA: BANKRUPTCY LAW, PROTECTED RETIREMENT ACCOUNTS, AND PROTECTED LIFE INSURANCE TRANSFERS
Asset protection ideas originating long ago have spread to other later creditor protection constructs protected by federal and/or North Carolina law. Our current President of the United States has personally benefitted from federal business bankruptcy laws (also available to North Carolina residents) many times, which provided his businesses with a fresh start. Federal ERISA law provides asset protection to funds held within North Carolina residents’ qualified retirement plans, such as IRA and 401K plans.[xiv]
The cash value of life insurance policies which name the insured person’s spouse or children as beneficiaries has long been protected against creditors in North Carolina, with this protection enshrined within the North Carolina Constitution. Life insurance payouts to these beneficiaries, following the insured person’s death, are protected against the insured person’s estate creditors also.[xv]
Most asset protection techniques now available to North Carolina citizens, and protected under federal and state law, have been many, many years in the making. By allowing more families to keep more of their assets, our economy continues to provide jobs and income, our people enjoy a healthier and more successful existence, and our government earns more tax dollars from its more prosperous citizenry, which it can better distribute to our less fortunate.
[i] Plutarch, Plutarchs Lives: Translated from the Original Greek, with Notes, Critical and Historical, and a life of Plutarach. New York: Derby & Jackson, 1859.
[ii] George Long, Fidei Commissum: A Dictionary of Greek and Roman Antiquities. John Murray, London, 1875.
[iii] William Blackstone, Commentaries on the Laws of England, Book 2, Chapter 2. Boston: Beacon Press, 1962.
[v] Peter M. Carrozzo, Tenancies in Antiquity: A Transformation of Concurrent Ownership for Modern Relationships, Marquette Law Review 85, Issue 2, Winter 2001.
[viii] Wilson County v. Wooten 251 N.C. 667, 111 S.E.2d 875 (1960).
[ix] Miller v. Miller 117 N.C. App. 71 (N.C. St. App. 1994).
[x] Jay Adkisson, A Short History of Asset Protection Trust Law, Forbes, January 26, 2015.
[xii] Wayne Patton, Very Old (And Good) Legal Tools, May 4, 2013, https://mwpatton.com/asset-protection-articles/very-old-asset-protection-mechanisms/.
[xiv] 29 U.S.C. § 18.
[xv] N.C. Gen. Stat. § 1C-1601(6); N.C. Const. art. X, § 5.
From my earliest memory, my family lived near the water, and as a young boy, I wanted to be just like my dad. How wise he was—how could he know so many things? We always had a small powerboat, and, from the time I was little, my dad was always teaching me how to use it. The ways of the sea, so to speak.
Ropes and knots are a fundamental part of boating lore and safety. The variety of knots that mariners learned time and again from their own dads vary in form and purpose, and are elegantly spare in design. My father taught me to tie knots from the time I can remember being old enough to hold a fishing pole.
In a way, becoming a man used to be a lot simpler. The father spent time with his child, dispensing wisdom slowly, one nugget as a time. The child, a boy in my case, wanted to learn everything.
How do you tie an anchor line? I remember my dad telling me, “that knot can’t slip, son!” He showed me the knot to use to hold the anchor firm. “If the knot slips out, son, the anchor might be lost, and the boat set adrift. The boat could drift into rocks, and crash against them. While the boat is at anchor during the night, if the anchor knot slips, the whole boat can drift away, never to be found again.”
When mooring a boat to a dock, I learned the hard way that if you tie the wrong knot (particularly if the water is rough and the boat is heaving up and down), the heavy boat will repetitively jerk the knot so tight that you could never untie it. Instead, you had to cut the whole rope in two.
“Son, here is how you tie a mooring line to a dock post. If you just wrap the rope around the post several times first, the friction between the rope and the post will hold the boat firm when the swells load up the post. A very loose simple half hitch, easy to untie, is all that is then required to hold the whole assembly together.”
“Here is how you tie the mooring line to the cleat, son. Just a couple of loops around and back this way will do it, then run the last loop under the previous loop and loop it back over the cleat again, so the tension from the boat pulling against the post will hold the rope firm to the cleat, but the line will still be easy to remove when we are ready to go back out fishing…”
“Son, this is how you tie a blood knot to add a swivel when using slick monofilament line. You wrap a lot of loops around the long shaft of the main line, then thread the end back through the hole right above the top of the swivel eye… then tighten up the loops like this… Do you see how this looks like a hangman’s noose? Watch what happens when I wrap the line a few times around my finger, then hold the swivel like this [between my right thumb and index finger], and pull down hard. Do you see how the cinch loops only tighten, and the knot never gets looser? If you tie your blood knot like this, you are not going to lose your fish, no matter how hard he pulls!”
My dad, still young in his 20s back then, was an able teacher, but I didn’t fully understand how wise he was until I was much older. I learned later that at the time that my dad was first teaching me knots, he was driving his little, tan VW Beetle from our West Palm Beach, Florida home far into the Everglades. Deep in the swamp, he was testing powerful prototype SR-71 Blackbird spy plane engines as a mechanical engineer for Pratt & Whitney Aircraft, at its top secret test facility. “We tested those engines outside on test stands” my dad later told me, “where only the alligators and 5 inch wide rattlesnakes could hear. The shock waves were so powerful, they felt like a man beating you in the chest.”
I think all of those engineers and scientists in the SR-71 spy plane program back then intuitively appreciated knots that would hold fast, and would not slip under load, because they were trying to hold fast an entire airframe as it was pushed to speeds never attempted before.
It was the middle of the Cold War, and Francis Gary Powers had been shot down over Russia in our country’s much slower U-2 spy plane. The engineers and scientists designing the SR-71 engine at Pratt & Whitney in Florida, together with those working on the fuselage in Lockheed Martin’s Skunk Works in Burbank, California, knew that they must now launch our flyboys high and fast, hold fast their ship through tremendous heat and pressure, then bring our boys home safely again.
And fly fast those boys did, at over three times the speed of sound, faster than a 30-06 rifle bullet. No SR-71 mission pilot was ever lost or shot down during this plane’s entire operating life.
As I grew older, those strong, steadfast knots I learned to tie early from my father became metaphors for the interwoven life lessons he later taught us by word and example: perseverance through stress… always protect those you love … practice makes perfect…
Fifty years after my dad taught me to tie those first knots, I found myself standing in Stokes County’s Dan River, rescue rope in hand. I had spent years whitewater kayaking with boaters in and around North Carolina, and had been invited to accompany some Sierra Club friends on their annual novice kayak trip down the Dan near Hanging Rock State Park.
One of the trip participants was having a very hard time that day, could barely walk with a hurt knee, and was very cold after successive spills into the river. I did not think that she could swim, at least I had not seen her attempt a stroke. She was sitting down shivering on a rock bar out in the river. A fast current cut off her route to shore, which was washing straight under a downed log, a mortal hazard that whitewater boaters call a “strainer.”
I readied myself to tie a “bowline” knot into my rescue rope, an open rescue loop which the rescue victim needed to put over her torso and under her arms, so we could pull her to safety. The bowline knot had to hold fast under load, and could not slip, because if it did so it could cinch down tight on the victim’s torso or neck, and asphyxiate her.
Although my father had not taught me how to tie the bowline, he had taught me the old way of ropes and knots, and I had everything I needed from him to be successful that day. I silently recited the “Rabbit Story” tool I used to remember how to tie the bowline: “construct the rabbit hole” … “the rabbit hops out of his hole” … “the rabbit hops around the tree” … “the rabbit hops back down his hole” … “the rabbit stops to watch the tree grow”…
The knot did hold fast that day under load, and did not slip. The old mariners’ wisdom had been passed on again, in a way as old as fathers and sons.
WTOB FM/AM Radio in Winston-Salem, NC interviews elder, special needs, and estate planning attorney Vance Parker as he explains how the new North Carolina Uniform Power of Attorney Act (enacted December 2018) may have made your existing financial power of attorney document deficient (or obsolete) for many later elder law, Medicaid planning, or asset protection needs.
Now-deficient powers of attorney, such as the once popular North Carolina Statutory Short Form Power of Attorney that many people still use today, can cause great problems when a person is later diagnosed with a dementia or becomes mentally impaired so that use of the financial power of attorney is needed to make critical financial, legal, Medicaid planning, or asset protection decisions. Such decisions may later be required in order to protect the senior’s home and other assets from Medicaid estate recovery, or from medical creditors. When the senior or disabled person’s financial power of attorney is deficient, key decisions that the agent must make to financially or legally protect the senior may now need to be first approved by the county Clerk of Superior Court, which can be an expensive, time consuming, and unpredictable process.
Adding an inexpensive financial power of attorney document containing detailed elder law powers (an Elder Law Power of Attorney) to one’s estate documents in the first place, while a person is still healthy to sign such documents, can prevent all of the problems caused by the new NC Power of Attorney Act. With an Elder Law Power of Attorney, the senior or disabled person’s agent will have all of the tools (if needed later) to legally protect the senior’s assets, so that critical Medicaid planning or asset protection decisions can be made quickly to save the senior’s home and assets for the senior, spouse, and family, without having to go to the county Clerk of Superior Court for permission first.
Vance talks with WTOB Radio every Tuesday at 4:38 pm, educating the public about elder and special needs law, and estate planning topics.
Whenever I draft wills for a young couple expecting their first baby, or for a couple who already have at least one child, I always set up a children’s asset protection trust for them within the will documents. In case the parents pass away before their children have finished their education, or in case the parents become incapacitated so that they can no longer financially care for their kids, the parents always want to plan for a responsible adult family member or friend to manage their children’s assets for them as trustee of the children’s asset protection trust, in a way where the assets of the children’s trust will be protected against any possible future liability, creditor, or financial problems encountered by one of their children.
All of my client parents agree that such asset protection for their kids is a good thing! But while parents definitely want asset protection for their children, my younger client parents frequently are a lot more cavalier (“it won’t happen to me”) about asset protection for themselves.
Many of my client parents initially ask me for the following will planning:
- Sweetheart Will. If either one of the parents pass away leaving a surviving parent, all of the deceased parent’s assets benefit the surviving parent. The surviving parent can then use this money to take care of the children.
- Surviving Parent Wants Benefits in Cash. Except for the deceased parent’s share of the home, his or her personal property, or retirement account proceeds, the surviving parent receives the deceased parent’s assets “outright,” or in cash. Any life insurance (important in financially protecting young families) owned by the deceased parent benefits the surviving parent directly, in cash.
- The Parent’s Assets, Retirement Accounts, and Life Insurance Proceeds Flow Directly Into the Children’s Asset Protection Trust When Both Parents Pass Away. When both parents pass away, all of their assets, and any life insurance (and any retirement account proceeds in inherited retirement accounts) flow into the children’s trust, where a trusted adult family member can manage trust assets for the children as they grow and complete their educations. Once assets are held within the family trust, if one of the 17 year old children later has a car accident creating financial liability, all of the children’s family trust assets within the family trust are protected from the liability claims brought by an opposing attorney.
This is a pretty good strategy, but it can be greatly improved! The parents’ desire to receive their deceased spouse’s assets unhindered in cash (in Step 2 above), and life insurance benefits unhindered in cash, may leave the liability window open! This open liability window could seriously chill the financial outlook of both the surviving parent, and the surviving children.
DON’T LEAVE THE LIABILITY WINDOW OPEN!
Most parents would want to guard against the following tragic scenario: The dad is works late one night, falls asleep at the wheel driving home, and has a car accident killing both himself and the driver of the other car.
As is typical, both the mom and the dad are the co-owners of the car that dad was driving. The opposing plaintiff’s attorney receives a large financial judgement for the family of the other deceased accident victim, greatly in excess of mom and dad’s automobile liability policy limits.
If the unlucky mom and dad had set up a sweetheart will, where many of the deceased dad’s assets flowed directly to the mom in cash, and the dad’s $500,000 life insurance policy benefitted mom directly, both mom and the surviving children may be in trouble! The dad’s individual assets may have to pay vehicle liability claims in probate, where valid creditor claims have to be paid before the deceased person’s assets can flow through the will to beneficiaries. Thus there may be none of dad’s own assets left for mom, and the kids, to live on!
What about the $500,000 life insurance policy? Well, since mom was a co-owner of the car, the opposing plaintiff’s attorney could sue her individually, even though she was not even in the car with her husband during the accident. Since mom receives the $500,000 from the life insurance policy directly, and in cash, all of the $500,000 insurance proceeds may now be available to the opposing plaintiff’s attorney. And if mom never gets the $500,000, the children will now never get it either, because the liability window was left wide open!
THE SURVIVING PARENT’S ASSET PROTECTION TRUST
North Carolina law would have allowed, however, the dad to have set up a testamentary asset protection trust (testamentary irrevocable 3rd party trust) in his will benefitting mom, which is a type of “vault” which could have protected assets that dad left for mom from any of mom’s future creditors. Even though North Carolina probate rules would not have protected dad’s individual assets from his own probate creditors (for example the auto accident claim holders), dad could have set up his $500,000 life insurance policy where mom’s testamentary asset protection trust was the direct beneficiary of dad’s life insurance benefits, not mom individually. Planning this way, where dad’s $500,000 life insurance benefits would flow directly into mom’s asset protection trust, could have saved the $500,000 life insurance proceeds for both mom, and the children.
Some younger parents worry that leaving assets from a deceased spouse in trust for them may be too restrictive. But in North Carolina, the surviving parent can be the full manager, or “trustee” of his or own asset protection trust, writing checks to himself or herself as needed for his or her health, education, maintenance, or support, or for his or her children’s same needs. A “right of withdrawal” may also be written into the surviving parent’s asset protection trust, where, as beneficiary of the trust, the surviving parent can decide to withdraw any portion, or all, of the trust funds out the trust at any time, for any purpose.
A lawsuit called a will or trust “contest” occurs where a disinherited heir tries to get assets which were not willed to him or her, or not distributed to him or her through a trust by the deceased asset owner. Frequently, the deceased person had a very good reason for not leaving assets to an heir who had not treated the deceased person well during life.
Because a will becomes a public document once its author passes away and probate begins, anyone can view the probate file and see what assets were left to whom. A disgruntled or disinherited will heir can use the long, open probate process to his or her advantage, using a court process to tie up estate assets so that probate cannot effectively proceed. Thus, the will challenger can potentially hold the executor and listed will beneficiaries “hostage” by blocking distribution of their inherited assets, which can give the challenger a lot of power to force a settlement with the will executor (and beneficiaries.)
Several features may make a trust harder to challenge in North Carolina. Assets held in valid trust do not go through the probate process. In addition, North Carolina law protects trust privacy. Only trustees or beneficiaries actually named in the trust are legally entitled to receive a copy of a trust, or an accounting from the trust, without a judge’s order. So, a challenger disinherited from the trust (and his attorney) may not be easily able to get a copy of the trust from the trustee–it may thus be much harder to challenge distribution of the assets with no road map to follow. And, unlike the probate of a will, the trustee is not legally required to give notice to all of the heirs of the deceased trust grantor.
A will challenger can challenge will beneficiaries more efficiently, as a group, by hijacking public probate proceedings. When challenging a trust, however, a challenger may be forced to file a lawsuit against each beneficiary individually, making the challenger’s job much more difficult, and increasing the challenger’s legal costs.
The following two methods are commonly used by attorneys to challenge wills:
capacity challenge–the challenger tries to prove that the testator (will author) was mentally incompetent when the testator signed the will, thus the testator did not know what he was doing when he left the challenger out, and the entire will is invalid. The challenger may try to prove that the testator did not intend to sign a will at all, and that some other heir made the will instead of the testator.
duress or undue influence challenge–the challenger attempts to prove that the testator was pressured by someone else (such as another heir) to leave the challenger out of the will.
Capacity, duress, or undue influence may also be argued in a revocable trust contest case, but these arguments can be harder to win. The following example demonstrates why.
EXAMPLE: When widowed Dad turns 70, he has a lawyer draft a revocable trust for him, where he leaves all of his assets at his death to Good Son, who has good manners, is always around, and always helps out. Dad disinherits Bad Son in that document, who joined a motorcycle gang 25 years before, rode out to Las Vegas, and never looked back.
The revocable trust that Dad signed at age 70 is a “living” trust, meaning that dad “funds” the trust with all of his assets right away, and in this case manages these assets himself as trustee of his own trust for 15 years, until Dad turns 85. A dementia diagnosis at age 85 causes Dad to resign as trustee, and turn over the management of his trust assets to his successor trustee Good Son.
When Bad Son learns in Las Vegas that Dad has passed away at age 87, Bad Son hops on his Harley, and rides back to North Carolina to find an attorney to help him get Dad’s assets (Bad Son assumes that Dad would not knowingly leave Bad Son any assets.) Good Son confirms (as trustee of Dad’s trust) that Dad did not leave Bad Son anything.
Bad Son finds a North Carolina lawyer to consult. The lawyer Bad Son visits has some bad news, and recommends against attempting a lawsuit. Because Dad set up the revocable living trust at age 70, and picked Good Son as the sole beneficiary at that time, Dad has a 15 year history of successfully managing Dad’s own assets after selecting Good Son as sole beneficiary. With Dad’s successful 15 year history of competently managing his own assets, it would be extremely hard to prove that Dad was not previously competent to set up the trust at age 70 (when he left Bad Son out.)
Plus, because Dad could have chosen to add Bad Son as a beneficiary during the 15 year period when Dad was managing his own trust assets, but continued to leave Bad Son out, it would be very hard to prove that Good Son continually unduly influenced Dad to leave Bad Son out during Dad’s entire 15 year period of successful trust management.
The extra difficulty in challenging Dad’s revocable living trust could cause Bad Son to ride back to Vegas, and look for some other trouble to get into.
Elder and special needs, and estate planning attorney Vance Parker discusses why good elder caregiving begins in childhood, in his new opinion essay “Who Will Help Me to Age in Place,” published on March 5, 2019 in the Winston-Salem Journal.
To read Vance’s essay in the Journal, please click the following link:
WTOB FM/AM Radio in Winston-Salem, NC interviews elder, special needs, and estate planning attorney Vance Parker about how telephone scammers can hit anyone, even a retired FBI and CIA director and his wife. Vance concludes with basic tips for senior telephone and internet safety.
Vance talks with WTOB Radio every Tuesday at 4:38 pm, educating the public about elder and special needs law, and estate planning topics.
In the Jan 24, 2019 article “Scamming Grandma: Financial Abuse of Seniors Hits Record,” the Wall Street Journal states that U.S. banks reported a record 24,454 suspected cases of elder financial abuse to the Treasury Department last year, more than double the amount five years earlier. Although it is hard to obtain an exact figure because so much elder financial abuse goes unreported, the AARP frames elder financial abuse as a $40 billion to $50 billion problem within the U.S. Trusts can help.
The United States reports higher rates of elder financial abuse than other industrialized nations. In Europe, seniors’ retirement funds are mostly doled out to them gradually, in monthly payments from government or other pension funds, where they are used to pay monthly expenses. In the United States, because of insufficient monthly Social Security and pension payments, workers are encouraged to save a great deal of their retirement funds themselves, held in potentially large IRAs or other accounts which they control. In fact, according to the Wall Street Journal article and the American Bankers Association, people over 50 represent only one third of the population, but account for 61% of bank accounts, and 70% of bank deposits.
In the U.S., these large pots of money in the hands of seniors (who also exhibit higher rates of illness and cognitive decline) are irresistible to thieves–who can be local door to door scammers, local or long distance romance scam artists, household workers or care providers, nefarious family members, or international financial scam and con artists who reach seniors through telephones, computers, and cell phones. Recent scientific studies reported by the National Institutes of Health tell us that as brains age, they undergo physiological changes that diminish older people’s ability to identify threats and assess the trustworthiness of potential predators. Thieves, of course, discovered these weaknesses long ago.
An elder law or estate planning attorney can create a trust for a senior who is still competent, which figuratively creates a “vault” holding the seniors’ assets, and gives the vault key to a responsible family member or institution. Only this “trustee” can make financial transactions on the senior’s behalf. When predators, such as telephone scam artists, figure out that the senior does not have the key to the vault holding his or her assets, they often quickly lose interest in continuing the scam.
Trusts may also be set up much earlier in life, so that as long as the owner of the assets is mentally competent and not susceptible to predators, the asset owner can act as his or her own trustee and account manager. As the asset owner ages, a co-trustee may be added to help watch the accounts and help the account owner when needed. If the asset owner later becomes susceptible to financial abusers or is no longer mentally competent to manage assets, another responsible family member or an institutional corporate trustee may become sole trustee and manager of the senior’s accounts.
Because trusts may contain detailed, legally enforceable instructions for how a senior’s money is to be used, but financial or durable power of attorney documents typically do not, a trust may be a safer vehicle for managing a senior’s money than a power of attorney. In addition, trusts are more complex, and frequently put together in a lawyer’s office where the trustee can potentially be screened by the drafting attorney. A power of attorney document is often easily downloaded from the Internet, and used by a thief or dishonest family member very quickly, without an attorney’s involvement, to scam a senior.
As banks and financial institutions see higher rates of fraud with powers of attorney, and because trusts are often associated with more affluent clientele, a trustee managing a senior’s assets may be treated with more deference by financial institutions, and experience fewer hassles, than an agent on a power of attorney document.
An elder law or estate planning attorney can help a family determine if a trust is right for their needs.
You love your pet as a member of your family, but what might happen to your dog or cat if you couldn’t be there for him or her? Unfortunately, many pets from senior owners end up at North Carolina animal shelters, after their owners either become ill or pass away.
Many of these pets tend to be older than average, so animal shelters have a hard time finding another loving home for them. Potential adoptive parents frequently don’t pick them because they are afraid that these pets will pass away too soon, or that the older pets’ vet bills will be too high. Thus many seniors’ pets must be euthanized, which is the last thing their loving senior parents would have wanted.
Under North Carolina law, you can’t just gift your pet money, or simply leave money for your pet in your will, like you can do for a human loved one. That’s because our legal system treats a pet as a person’s personal property, not as an individual with legal rights. Fortunately, North Carolina law does provide you with a valuable alternative: the pet trust.
Animal care trusts (pet trusts) have their own separate section in the North Carolina Trust Code (the statutes which describe how trusts must be formed and administered in North Carolina.) The North Carolina pet trust is a legally enforceable document which allows any person to leave money or other assets for one or more named pets that are alive at the time the trust was created. Trusts or wills containing testamentary pet trust language may later be amended if needed (with a trust amendment or codicil), to account for pets that have left or have been added to the owner’s household.
Under the pet trust statute, the grantor (the person who sets up the trust) chooses a trusted caretaker for the pet (trustee). The trustee uses the funds the grantor left for the pet to take care of the pet, and to pay such expenses as food and housing costs, and vet bills. The instructions for the pet’s care that the grantor writes into the trust are legally enforceable, and it is illegal for the trustee or anyone else to use any of the money left for the pet for anything other than the pet’s care.
The North Carolina pet trust may be set up affordably, and may be added to a will, added to an existing trust (such as a revocable trust), or set up as a freestanding document. Because a will document is normally only used after a person passes away, it may be better to set up a pet trust within a living revocable trust, or as a freestanding trust. This is the best way to make sure that your pet will be provided for if you become ill and can no longer take care of your pet, or after you pass away.
N.C. Gen. Stat. § 36C-4-408
CATEGORIES: Elder Law, Medicaid Planning, Estate Planning, Creditor Protection, Asset Protection Trust, Irrevocable Trust, Trusts, Advance Planning, Winston Salem, North Carolina, NC.
An irrevocable Asset Protection Trust (APT) may be used as part of an advance asset protection planning strategy, to help a client create a “nest egg” of assets to be passed to his loved ones free from the claims of unforeseen future creditors. Such trusts can help protect estates against large future medical care bills, such as bills from Medicaid Estate Recovery, hospital, or nursing home bills, or other unforeseen future liabilities such as legal liabilities, auto accidents, financial liabilities, bankruptcy, or can provide financial protection from nefarious family members.
In order to create an APT free from unknown future creditors in North Carolina, the trust must be designed so that the trust grantor, who sets up the trust, does not benefit directly from the trust assets. The trust beneficiaries, however, may benefit from APT assets during the grantor’s lifetime—in fact the APT may be set up to start benefitting a spouse (see item 4 below), children, or other beneficiaries immediately.
When the client’s estate is large enough to make a gifting strategy useful, it may make more sense to set up an APT instead. The StepAPT™ asset protection trust is designed to protect close family members, and provides these benefits:
- The StepAPT™ Can Provide Creditor Protection to The Grantor. Making a proper transfer into the StepAPT™ is legally very similar to making a gift to a family member. Once the grantor properly transfers assets into the StepAPT™, North Carolina and federal law considers this a transfer out of the grantor’s estate for creditor purposes, and future creditors such as Medicaid or hospitals cannot legally reach the assets in the APT.
- The StepAPT™ Can Provide Creditor Protection to Trust Beneficiaries. The StepAPT™ may be set up to provide creditor protection to trust beneficiaries both during the grantor’s life, and after the grantor’s death.
- A Beneficiary May Serve as His or Her Own Trustee. If appropriate, a non-grantor beneficiary can be set up as Trustee, so that he or can distribute assets to himself or herself according to the terms of the trust, while still retaining valuable creditor protection.
- The StepAPT™ May Be Set Up to Protect Spouses. If the Grantor has enough assets so that the need to use Medicaid to pay for long term care is not likely, the StepAPT™ may be set up to benefit and protect a grantor’s spouse. Spouses can decide to set up asset protection trusts for each other.
- The StepAPT™ Provides a Step Up in Tax Basis Which Can Greatly Reduce Taxes on Appreciated Assets. Transferring appreciated assets by gift, like a house, family farm, or stocks that have appreciated, can cause the gift recipient to pay capital gains taxes on all of the increase in value during the giver’s lifetime, which can total thousands of dollars, or more. Putting assets in a StepAPT™ asset protection trust, however, provides a step up in basis to the beneficiary, so that all of the capital gains accumulated during the grantor’s lifetime are erased. The beneficiary then only owes capital gains taxes for asset appreciation between the time that the grantor dies, and the time that the beneficiary sells the asset.Here is an example of how important getting a step up in basis can be: Suppose Dad bought a family farm in 1945 for $50,000. That farm then increases in value so that it is worth $500,000 in 2017. Then Dad gifts the farm away to son Bob in 2017, and Dad dies on January 1, 2018. If son Bob then sells the farm, at a 15% federal capital gains tax rate Bob would have to pay the IRS $67,500 in capital gains taxes for the farm’s appreciation during Dad’s life.If Dad would have benefitted Bob by placing the family farm in the StepAPT™ instead of making the gift to Bob, Bob would have received the step up in basis, the $67,500 would be erased, and the family would have saved $67,500 in income taxes.
- Not a Medicaid Asset. Any assets placed into the StepAPT™ are not countable as Medicaid assets, thus are protected from Medicaid. But because the StepAPT™ is an advance planning tool, and Medicaid considers transfers into an irrevocable trust as gift transfers, assets must be transferred into the StepAPT™ more than 5 years before the grantor uses Medicaid, to avoid penalties. The StepAPT™ should not be set up to benefit spouses when Medicaid may later be needed.
- The StepAPT™ Avoids Probate. Assets placed in the StepAPT™ do not pass through probate following the grantor’s death, making the surviving family’s job easier.
- The StepAPT™ May Reduce Income Taxes. The StepAPT™ is designed as a grantor trust, which means that income taxes paid by the trust are taxed at the grantor’s individual tax rate during the grantor’s lifetime, which is normally lower than a trust tax rate.
When using an APT, such as the StepAPT,™ it is important to plan early. An APT may not protect against any creditor already known prior to moving assets into an APT. Planning early helps assure that assets placed in an APT will be protected against any unknown future creditors, both under North Carolina and federal law.
USING A StepAPT™ WITH A REVOCABLE TRUST
The different, popular Revocable Living Trust (RLT) does not protect trust assets from the grantor’s creditors during the grantor’s life, or from estate creditors immediately following his death. But a revocable trust does allow the grantor to easily pull assets out of the trust at any time to benefit him during his life. An irrevocable StepAPT,™ cannot benefit the grantor during life, but it can protect against creditors both during life and following death.
A flexible estate planning strategy may include forming both a revocable living trust and a StepAPT™ for the client, allowing the client to utilize the best features of each type of trust. If a client has a downturn in health, or for any other reason, the revocable trust trustee may flexibly protect any amount of assets at any time by moving them from the revocable trust to the StepAPT™.
Categories: Estate planning, elder law, probate, trusts, Winston Salem, North Carolina, NC.
The old saying “An ounce of prevention is worth a pound of cure” certainly holds true in estate planning. Planning well can make certain that your estate wishes will be reliably carried out after you pass away, and can save your family the time, expense, and exasperation of having to pass your estate through the probate process in order to settle it, at a time when they are already in mourning following the loss of a loved one.
Probate is the public process where the state inventories the assets of a deceased person at the county courthouse, assesses fees on those assets, and makes sure that state law is followed by the executor or personal representative as he closes the estate. The process is rule-bound and bureaucratic, and the courthouse workers may be very controlling in protecting their domain.
Probate may take a year or more, and my clients who must go through probate frequently become frustrated and infuriated by the process. Frequently, clients must hire an attorney to help them through probate.
Avoiding Probate—A Trust is a Lot Like McDonalds
I tell my clients that the easiest way to keep your assets out of probate is to place them in a trust, with the revocable trust (which can be “revoked” or dissolved by the grantor at any time) being the most frequent type of trust that I recommend.
So, exactly how does a revocable trust keep assets out of probate?
Well, a trust is a lot like McDonalds.
McDonalds is organized as a corporation, which is not a person, but an “entity,” with its own separate lifetime.
Imagine that the President and CEO of McDonalds passes away one evening. Even though the President and CEO has died, McDonalds will still be serving Happy Meals to kids around the world the very next day.
Similar to McDonalds, a trust is its own separate entity, with its own independent lifetime. When the person who sets up a trust, called a “grantor,” dies, the trust does not die, but keeps right on living. Thus, any assets that the grantor has placed into his trust stay out of probate, because no trust death has occurred, and the trust continues to live.
If a person with a simple will only owns real property (land and buildings located on the land) out-of-state, a separate probate process called “ancillary probate,” or “ancillary administration” may have to occur in each separate state where the real property is located, following that person’s death. A separate out-of-state attorney may have to be hired to assist with ancillary probate in each state where real property is held. This process can be costly, burdensome, and time consuming.
I tell my clients owning real property located in other states that they can avoid ancillary probate in those states following their deaths by having their revocable trust hold their out-of-state real property. Distribution of their out-of-state real property can then be managed by their trustee(s) following their death, saving time, hassle, and legal fees.
Trust Assets Remain Private
Probate remains a public process—so that after someone dies, anyone can see what his will says, and anyone can review his inventory of assets required by the probate process. In contrast, by law the trust document can remain private—following a death, only the trustee and the beneficiaries of the trust document have the right to see the trust document, not the government or public.
A revocable trust works best for people who hold valuables such as jewelry, art, coin collections, stamp collections, or firearms, because a trust keeps all of those valuables secret, and the valuables do not have to be inventoried by the government following death.
Following death, a revocable trust may be set up so that it becomes an irrevocable marital trust, first benefiting the grantor’s spouse, then benefitting the grantor’s children following the spouse’s death.
The trust principal may then be protected against any creditors of the surviving spouse, and if the spouse enters a new marriage with an inappropriate partner, the new husband or wife will have no legal right to the trust principal, so that any remaining assets may flow to the grantor’s children following the spouse’s death.
The revocable trust may be an excellent tool for managing the assets of an aging client. A grantor who is managing his own assets may add a spouse or younger child as co-trustees. If the grantor then becomes ill and needs help managing his assets, a co-trustee can step in right away, at any time, and manage all of the grantor’s assets when needed.
If my clients hold $300,000 to $500,000 in assets or more, I talk with them about a revocable trust as a cost-saving option. I can set up an estate package with a revocable trust for only a few hundred dollars more than a standard will package. The revocable trust can provide benefits in both dollars saved and probate frustration avoided for loved ones left behind.
Categories: Probate, asset protection, Winston Salem, North Carolina, NC.
In North Carolina, it’s best to keep car ownership in one name only for liability reasons. Although it may seem natural for couples to own a car jointly, if that vehicle is involved in an accident, the injured person’s attorney can sue both an at-fault driver and all owners of the car. When a couple instead owns their vehicles only in their own names, an at-fault driver does not imperil his spouse’s separate assets. Thus couples who own their cars separately can decrease their liability risk by up to 50% or more, depending on how financial assets are distributed between the couple.
Regarding probate, there are two main ways of keeping a car transfer out of probate court following a death, which in some cases can tie up or prevent use of the car for some time following the individual owner’s (or first-to-die of a joint owner’s) death:
- Revocable trust. Placing a car in a trust owner’s single revocable trust can keep it out of probate, because a revocable trust has its own lifetime which transcends the car owner’s death. I do not recommend placing a car into a couple’s joint revocable trust, however, because this unnecessarily expands the liability of an individual car driver so that it imperils the joint financial assets of both members of the couple.
- JTWROS. Not everyone chooses trusts as part of their estate planning. For couples or others who prefer to own their car jointly, they can own their car jointly in North Carolina with a right of survivorship (JTWROS, or JWROS), so that it will pass directly from one to the other party outside of probate at the first death.
Why is the JTWROS designation important for jointly-owned vehicles in North Carolina?
Even given the increased liability risk, some people prefer to own their car jointly. Normally in North Carolina, when a couple of any kind jointly purchases a car at a dealer and does not give the dealer specific instructions about how they want the car owned, the dealer will fill out the paperwork in a way that translates into tenancy-in-common ownership on the car title. This means that each member of the couple will own a 50% undivided interest in the car (which is, unlike land, and undividable asset) with no survivorship rights. This can produce undesirable results.
The JTWROS Title
In order for the survivor of any couple, including a married couple, to inherit a jointly owned car in North Carolina (not held in a trust) outside of probate, the joint owners must explicitly tell the dealer that they want the car owned as joint with right of survivorship, or JTWROS. They also must insure that the letters “JTWROS” or “JWROS” appear on the car title itself. Without JTWROS on the car title, there is no right of survivorship held by the surviving owner.
It is important to specifically check the car title for the JTWROS designation, because many DMV workers do not understand the JTWROS designation, or do not know that JTWROS ownership of vehicles is permitted in North Carolina.
The JTWROS designation on the car title will insure that if one of the joint car owners dies, the remaining living owner will then receive full ownership of the car (except for any portion owned by the lender) in an automatic out-of-probate transfer.
Categories: Estate planning, elder law, asset protection, creditor protection, business formation, trust, trusts, probate.
The LLC has become one of the most popular legal structures for shielding an owner’s personal assets from business liability risks. An LLC owned by a single person, or “member”, is considered a desirable “disregarded entity” by the IRS, which allows the LLC owner to skip filing a partnership return and instead report his LLC income directly on his personal income tax return.
In North Carolina, the personal ownership interest in an LLC, or membership, is classified as an item of personal property. Unfortunately, that classification leads to this not-commonly-known fact: when the individual owner of a single-member LLC dies, the LLC’s necessary ownership transfer to the decedent’s heirs must pass through probate.
While the LLC is passing through probate, its revenue stream flows to the decedent’s estate, not to the heirs. The LLC membership may thus be tied up in probate for months, or even a year or more. This can interrupt a family’s finances. For example, if a retired husband and wife were living on the monthly income from 10 rental properties held in the husband’s single-member LLC, the wife’s access to cash flow from the LLC may be disrupted if the husband dies and his LLC membership passes into probate.
In North Carolina, the best way to keep a single-member LLC’s ownership interest out of probate is to employ a trust. The popular revocable living trust keeps assets held by the trust out of probate because the trust is a separate entity which transcends the trust grantor’s death.
When a grantor’s revocable trust becomes owner of the grantor’s single-member LLC, the LLC Articles of Organization and Operating Agreement are set up so that the trust owns the single membership in the LLC. Because the IRS considers a revocable trust a grantor trust, income from the single-member LLC owned by a grantor’s revocable trust is still reported on the grantor’s individual tax return, maintaining desirable pass-through taxation.
Distribution terms added to the grantor’s revocable trust direct how ownership of the LLC will be transferred to the grantor’s beneficiaries following the grantor’s death. Because trust distribution following the grantor’s death takes place privately outside of probate, the ownership transfer from the grantor’s trust to the beneficiary(ies) can take place almost immediately, keeping the LLC’s cash flow intact and uninterrupted to a needy beneficiary(ies).
When you choose beneficiaries for your IRA account, you insure out-of-probate transfers to those beneficiaries when you die.
But picking proper beneficiaries can be tricky. Here’s a list of the best and worst IRA beneficiary choices:
BEST IRA BENEFICIARIES
- Your Spouse
If you are married, it’s likely that the first person you want to benefit is your spouse. Your spouse is the only person that the Internal Revenue Service allows to “rollover” the IRA participant’s IRA to their own IRA account. The rollover will allow your spouse to then control your IRA assets, and to invest them as he or she likes.
If your spouse does not need the IRA funds immediately, he or she can keep them growing tax-deferred until April 1 following the year he or she reaches age 70 1/2. At that time, annual taxable Required Minimum Distributions (RMD) will begin. The remainder of the account not required to be distributed can continue tax-deferred growth.
- Your Children, Grandchildren, or Younger Individuals
With the exception of your spouse, choosing an individual (or individuals) as your IRA beneficiary allows that beneficiary (following your death) to receive the money as an inherited IRA.
With the inherited IRA, Required Minimum Distributions (RMDs) will begin in the year following the original account owner’s death. These RMDs are calculated based on the beneficiary’s age-based actuarial life expectancy. The IRS provides a worksheet for calculating RMDs at https://www.irs.gov/publications/p590b/index.html
The younger beneficiary can pull out more funds than the annual RMD requires if needed, but the additional withdrawals will also be taxed.
If the younger beneficiary can afford to let the IRA principal continue to grow tax-deferred, the younger beneficiary’s longer life expectancy can lower the annual RMD, and stretch the IRA’s tax-deferred growth over a longer lifetime. Intentionally using this strategy to grow the IRA’s tax-deferred principal from one generation to the next is called the “stretch IRA” concept.
When used properly, growing your IRA by leaving it to a younger individual(s) who can afford to stretch out the inherited IRA’s tax-deferred growth can provide significant returns to the beneficiary. Assuming a 7% return with only the annual RMD withdrawn, a $100,000 IRA left to a 20 year old child or grandchild can provide $1,765,731 in income over that child’s expected 63 year lifetime. Please see the chart below:
|TOTAL INCOME FROM IRA OVER BENEFICIARY’S LIFETIME
||Value of IRA When Inherited by Beneficiary
- A See-Through Trust
A trust which qualifies as a “see-through” trust under IRS regulations can be an appropriate beneficiary for your IRA. There may be many practical reasons to employ a trust instead of giving IRA assets directly to a beneficiary. For example, a father wanting to leave a $250,000 IRA account to his 14 and 16 year old children would be wise to protect the proceeds with a trust instead of directing the funds to his children directly.
In general, leaving an IRA to a non-human entity like an estate or a trust ruins “stretch IRA” optimization, because such beneficiaries must withdraw all funds within five years (instead of 63 years for a 20 year-old individual, for example.)
But under IRS regulations, the “see-through” trust is able to “see through” the trust entity to the individual life expectancy of the oldest beneficiary of the trust.
To qualify as a see-through trust, the trust must meet the following IRS rules:
- The trust must be valid under state law;
- The trust must be irrevocable following the IRA participant’s death;
- Trust beneficiaries must be identifiable;
- The IRA plan administrator must be provided with proper documentation regarding the trust beneficiaries and/or the trust by October 31 of the year following the participant’s death;
- All trust beneficiaries must be individuals.
Typical testamentary trusts (found in wills) or revocable living trusts become irrevocable after the death of the will testator or trust grantor. If properly drafted, and with proper beneficiaries, such trusts may qualify as see-through trusts under the above IRS rules.
- A Charity
A tax-deferred account may be appropriate to give to a charity, if none of your human beneficiaries need the funds. You can transfer the full tax-deferred IRA value to the charity because the charity will pay no income taxes when it receives the money, and the account will not be included in your taxable estate when you die (reducing the amount that your family will have to pay in estate taxes, if applicable.)
WORST IRA BENEFICIARIES
- Your Estate
Naming your estate as your IRA beneficiary is a bad idea. This insures that the IRA funds must now go through probate, increasing the time, complexity, and expense of your probate estate. The IRA’s creditor protection will be lost, making your IRA funds newly eligible to pay estate debts. Your intended beneficiaries will no longer be able to stretch out their Required Minimum Distributions over their lifetimes (and save tax dollars) because the IRA funds will now be required to be fully withdrawn (and taxes paid on the withdrawals) within five years.
- An Individual and an Entity
In order for tax-saving stretch IRA provisions to be available to your human beneficiaries, all of your IRA assets must go to human beneficiaries following your death.
For example, you may intend for your two children to be able to stretch out their Required Minimum Distributions over their lifetimes, leaving 95% of your IRA to them and 5% of your IRA to your church. But even this small bequest of your IRA funds to your church will trigger the five-year IRA distribution rule for your children. Having to fully distribute all of your IRA proceeds (and pay the associated taxes) over a short five-year period can greatly reduce the stretch IRA tax savings available to your children.
- A Person who has Problems Managing Money or who is in Debt
A person who cannot manage money would withdraw the inherited IRA funds very rapidly, with income tax having to be paid on every withdrawal, negating the potential stretch IRA tax savings of an inherited IRA.
In addition, unlike with a traditional IRA, a 2014 U.S. Supreme Court decision held that the proceeds from an inherited IRA are fully available to creditors. Thus if you leave your IRA outright to someone in debt, they may lose all of that money to creditors in a short amount of time.
To protect your IRA assets directed to a beneficiary with money management problems, or with creditor or debt problems, consider setting up a see-through discretionary trust for the beneficiary. You could then choose another responsible family member to serve as trustee to manage the IRA funds, and to make the spending decisions on behalf of the encumbered beneficiary.
- An Older Individual
Leaving an IRA to an older person frequently insures that the Required Minimum Distributions will be accelerated, leading to increased taxes. If the beneficiary really needs the funds, however, and there are no alternative assets to transfer, the increased taxation rate may be less important than taking care of the beneficiary.
Daniel A. Timins, Who Should You (Not) Leave Your IRA To, Kiplinger (August 2016), http://www.nasdaq.com/article/who-should-you-not-leave-your-ira-to-cm660234
Understanding the Stretch IRA Strategy: Preserving Assets for Your Heirs, T Rowe Price Investor (March 2011), https://individual.troweprice.com/staticFiles/Retail/Shared/PDFs/StretchIRA.pdf
Natalie B. Choate, Life and Death Planning for Retirement Benefits, (7th ed. 2011).
Understanding Who Should Be Beneficiary of Your IRA, Estate Planning.com, https://www.estateplanning.com/Beneficiary-of-Your-IRA/
Click here to download a PDF of this article.
Categories: Estate planning, asset protection, trusts, Winston Salem, North Carolina, NC.
Modern marriage can be a minefield for both estate planners and their clients. In 2016, a majority of marriages end in divorce, second, third, or fourth marriages are common, and blended families represent the norm. Frequently, the estate planner advises families where the husband brings in children from a prior marriage, the wife brings in kids from a prior marriage, and (if industrious enough) the new couple adds new kids of their own to the mix. And, unfortunately, divorce lawyers are more litigious and aggressive than ever.
Growing up in South Texas, I learned a saying about the rugged Texas landscape which sticks in my mind: “Everything in Texas either bites, stings, sticks, or breaks your heart.” Although funny at first, that statement conveys honesty. Despite their best intentions, I know that many of my clients approaching marriage will have their hearts broken by their partner one day.
Thus, here is my financial advice to star-crossed lovers contemplating marriage in 2016: A) It is both highly ethical and appropriate to protect your separate assets against an unanticipated divorce when entering a new marriage; B) It is conversely both ethical and appropriate to take care of your spouse, provide him or her with a home, and reward the spouse who stuck with you, with part or all of your assets, when you die.
Here are 10 ways to financially and legally prepare for a new marriage:
- Keep your individual assets separate. If you want to preserve assets which you bring to a marriage, keep those assets separate. If you commingle your separate funds with funds that come from your spouse, or with your and your spouse’s joint funds, it’s easy for an opposing attorney to argue later that the whole pot has now become divisible marital funds because of the commingling.
- Keep gifts separate. If you receive financial gifts from your family or anyone else during your marriage, that property will be considered separate property unless those assets are commingled with your spouse’s funds or marital funds. You should keep such gifts in a separate account, or if you have an individual revocable living trust, have such gifts made directly to your revocable trust.
- Keep inheritance separate. If you receive financial assets from an inheritance, these assets are normally considered separate property within a marriage, unless these assets are commingled with marital property, or with your spouse’s separate funds. So keep such inheritance assets in a separate account, and keep separate financial records for your inheritance assets. If you have an individual revocable living trust, it makes sense to have inheritance bequests made directly to your individual trust.
- Keep your real estate separate. If you bring separate real estate into a marriage, keep that real estate separate, and do not add your spouse’s name to the deed. No matter what the purpose, if you add your spouse’s name to the deed, an opposing divorce lawyer can later successfully argue that by adding your spouse to the deed, you intended him or her to own up to 50% of your real property.
If you want your spouse to later have your home or other separate real property when you die, it is best to will it to her in your will, or distribute it to her from your trust document after your death.
- Get your business valued shortly before marriage. If you bring a business into the marriage, and if your spouse later divorces you, a court may later award your spouse up to 50% of the value that your non-marital business appreciated during your marriage.
Thus you should have your business professionally valued shortly before marriage. That way, you may be able to subtract the value of your business that you brought into the marriage from any portion that a court divides with your divorcing spouse.
A proper premarital agreement (see below) may help to keep such business assets separate.
- Maintain separate property with non-marital funds. When maintaining a home or other separate property brought into the marriage, maintain the property only with your separate funds. If you use your spouse’s or your marital property to maintain your separate property, you will be commingling these assets so that your spouse’s attorney may be able to get a portion of them upon divorce.
- Keep retirement account records as of the date of your marriage. Upon divorce, individual retirement accounts such as 401Ks, IRAs, and pension accounts may be considered marital property subject to division. If you keep the statements close to your marriage date for these retirement accounts that you bring into the marriage, a court may later let you subtract those amounts from the marital retirement assets that are divided.
- Place your assets into a revocable living trust before marriage. An individual revocable living trust may provide valuable prenuptial protection for separate property added to that trust before marriage. Because a trust is an individual stand-alone legal entity (like a corporation), individual property becomes trust property when properly added to the trust. It is then much harder for an opposing lawyer to later successfully argue that such trust property should be divided with the opposing spouse.
- Use separate revocable living trusts (RLTs) during marriage, not a joint trust. Most estate planning attorneys now utilize separate revocable living trusts (one for the husband and one for the wife) for estate planning, because they provide better protection against spousal creditor or spousal liability events, and more easily allow spouses from blended families to pass down their assets differently. Such separate revocable living trusts are also much better at not commingling marital or spousal assets.
Couples (and their estate planning attorneys) may, however, choose to use a joint RLT to hold a couple’s assets for estate planning purposes. Even though some joint RLTs purport to separately identify individual assets within the joint trust and keep them separate, in reality an opposing divorce attorney can later argue that any property placed into a joint trust was intended to become joint property.
- Use a prenuptial agreement. A prenuptial agreement may provide an important tool for defining and protecting separate property during the marriage, and in providing for how property will be divided in case of divorce. Even though couples may consider a prenup highly unromantic, later divorce is completely unromantic. The couple may prevent later agony by defining their rights in advance.
North Carolina case law provides that a prenuptial agreement may be more enforceable if: A) both parties disclose their premarital assets to each other in writing; B) each party is advised by their own attorney; C) there is no pressure or coercion used on either party before signing the agreement.
Rebecca Zung, 5 Ways to Protect Your Money Without a Prenup (May 10, 2015) Credit.com/ABC News, http://abcnews.go.com/Business/ways-protect-money-prenup/story?id=30908390 .
Even though Prince, the master showman and electric guitar virtuoso, appreciated the big stage, he probably would not have liked the drama following his death becoming a stadium spectacle. Following his tragic death, hundreds of claimants, including his own half-siblings, their smiling lawyers, lovers that no one ever knew about, and love children of lovers that no one ever knew about, have come forth, seeking a part of Prince’s potential $500 million estate. The claims have gotten so out-of-hand in Minnesota that a judge has ordered Prince’s blood to be genetically sequenced, in order for the courts to start eliminating some of the false heirs.
A half-billion dollar payoff will bring out a lot of lottery contestants. So why did Prince, who was very comfortable using lawyers to protect his recording assets and his professional image, neglect to complete his estate planning? The answer may be pretty mundane. One of Prince’s lawyers, who had worked with him for many years, remarked: “I really don’t think that Prince thought that he was going to die just yet.”
Like many of us, it seems that Prince may have simply looked away from something fundamental to his life here on Earth: even The Artist (Formerly Known as Prince) would pass.
Prince remains in good company, however: many wealthy celebrities have been caught short, dying without wills.
Pioneering African-American professional quarterback Steve McNair, of the Tennessee Titans, was unexpectedly murdered in his Nashville hotel room at age 36, leaving a $90M estate and no will. When Sonny Bono died without a will after hitting a tree while snow skiing, a man claiming to be his illegitimate son later showed up, making a claim on his estate. Rock guitarist Jimi Hendrix died without a will, leaving an estate battle that burned on for over 30 years. The legendary reggae singer Bob Marley died in 1981 with a $30M estate and no will, with dozens of claimants arguing for possession. And artist Pablo Picasso died without a will in 1973, leaving 45,000 works of art, and an estate now several billion dollars in size, but not completely settled.
Prince was known to be both philanthropic and generous. But he may lose over half of his estate to government estate taxes. Assuming a $500M estate (which music intellectual property experts have estimated), the 2016 federal estate tax individual exemption amount at $5.43M, and the 2016 federal estate tax rate at 40%, Prince may lose approximately $198M to the federal government. And with Minnesota’s estate tax exemption amount at $1.6M, and with its upper estate tax rate at 16%, Prince’s estate may lose an additional $80M to Minnesota estate taxes, for a total $278M in funds lost to the government.
For a lesson in estate planning, it’s too bad that Prince did not model another celebrity, Hillary Clinton. Clinton, a lawyer by training, and her husband Bill, have shielded millions of dollars of personal assets within the Clinton Foundation, in a way that has magnified their influence and shielded these funds from estate taxes.
If Prince had established his own large charitable foundation, that organization could have additionally benefitted the people in his home state of Minnesota so greatly that they surely would have added the color purple to their state flag.
Those with smaller estates can learn from the Prince case, because without a will, the same behavior may repeat on a smaller scale. In 2015, I was attending a family business event, when a father I met there told me a story about how important a will could have been to his family. The father told me that his oldest son did very well in school, and eventually came to work in Washington, DC. While in DC, his son was successful enough to purchase a home in the prestigious Georgetown area. But his son then died young, without a will.
After that, unwelcome family members emerged from three different states, trying to get a piece of the son’s Georgetown real estate. The matter had to be litigated over a several year period, at a great cost, and causing significant stress to the son’s close family.
Planning ahead by enacting proper estate documents remains the best way to prevent such family disasters.
CATEGORIES: Elder Law, Elder Care Attorney, Estate Planning, Winston Salem, North Carolina, NC.
It’s common for aging parents to need some help with their business and legal affairs. Adult children frequently reach this conclusion at the beginning of a new year, after they have spent time with their parents over the holidays.
PROBLEMS WITH JOINT BANK ACCOUNTS
Many adult children choose to assist their parents by opening joint bank accounts with them. However, this is not the best option, because it can result in unwanted legal problems that can later become intractable. Joint accounts are normally set up with “survivorship” rights, so that if the parent dies, the remaining child on the account is legally entitled to the remaining assets. If that child has siblings, this child’s inheritance of the account assets outside the will may be in direct conflict with how the parent’s inheritance is divided in the parent’s will document.
Even if the parent does not have a will, N.C. laws of intestate succession, which govern inheritance for people without a will, may directly conflict with the adult child’s receipt of the remaining joint account proceeds following the parent’s death. Either problem may be difficult to fix, and can create unpleasant disagreements that lead formerly congenial family members to litigate against each other.
THE DURABLE POWER OF ATTORNEY
The best solution is to use a durable power of attorney (also called a financial power of attorney or a general power of attorney; durable POA in short) which offers the most economical and legally straightforward method to assist aging parents with their business and legal affairs.
HOW IT WORKS
The person who signs the durable POA document, called the principal, grants significant powers to an agent or agents, allowing them to manage the principal’s business and legal affairs. In order for this document to be legally valid, the principal must be mentally competent, or have “capacity” (the mental ability to comprehend both the nature and consequences of one’s acts) when he or she signs the document. Before the document may be used by the selected agent(s), it must be properly recorded in the appropriate county Register of Deeds office.
LIVE AT EXECUTION
It is a frequent misconception that durable POA documents are designed only to allow the agent to assist an aging parent following his or her incapacity (mental incompetence.) Most become “live” when the principal signs and executes the document. Thus, these documents allow the agent(s) to start helping the principal right away, without waiting for the principal’s incapacity. If used correctly, this type of durable POA provides the most flexibility to both parent and child.
BE CAREFUL IF YOU DO IT YOURSELF
Banks and other financial institutions are very familiar with durable POA documents and accept those that are properly and professionally prepared.
Beware of versions of durable POA documents available on the Internet. Legal fees to an estate planning attorney or elder law attorney for properly prepared, executed, and filed durable POA documents are normally very modest. Unless you are a legal professional, you can’t judge the quality of a form that you download from the Internet.
When a bank receives a POA document, it is carefully reviewed by the bank’s legal professionals, who will only accept a document that is proper in every way. If the bank rejects your Internet durable POA when your family needs it, and your parent is no longer competent, the family may then be forced to resort to a much more expensive and complicated guardianship proceeding before a family member is able to legally take care of the impaired parent’s business and legal affairs.
Estate planning attorneys and elder law attorneys normally try to screen out improper family members from serving as agents or “fiduciaries” on behalf of their clients. (For example, I have had to remove a family member addicted to hard street drugs from serving as a fiduciary for a client.) A durable POA becomes highly dangerous in the wrong hands–it can give away the principal’s keys to his entire financial portfolio. It is essential to keep the durable POA in the hands of only honest and proper agents.
AN ADDITIONAL ALTERNATIVE
Another alternative is to create revocable living trusts, with children serving as co-trustees with the parents. This type of estate planning is more expensive and complicated and should only be conducted with the assistance of an experienced estate planning or elder law attorney.
Categories: Estate planning, revocable trust, trusts, marital trust, elder law, Winston Salem, North Carolina, NC.
Married couples in North Carolina contemplating adding a living trust to their estate plan may have a choice: one joint trust or two separate trusts? In most cases, I recommend a separate trust for each spouse, for the following 6 reasons:
- NORTH CAROLINA IS A COMMON LAW PROPERTY STATE. North Carolina is a “common law, ” or “separate property” state. In general, separate trusts are preferred by planners and attorneys in common law property states like North Carolina, and joint trusts are used more frequently in community property states like California.
- SEPARATE PROPERTY STAYS SEPARATE. Many married clients enter into the estate planning process owning a significant amount of separate property. They may own assets that they acquired before the marriage, they may have inherited family farmland, and they may expect to inherit assets or receive gifts from their parents or grandparents in the future. Using a separate trust for each spouse more cleanly keeps their separate assets separate, so that they will be more easily characterized as separate at death or in case of divorce.
- JOINT TRUSTS MAY COMMINGLE SEPARATE PROPERTY. Where separate property (which has not been properly identified and tracked as separate property) is combined by both spouses in a joint trust, it may become “commingled.” Where such property has been commingled, or has become jointly titled in a joint trust, it may be considered by our court system as having been converted from the contributing spouse’s “separate property” to “marital property.” The spouse who contributed the separate property to the joint trust may lose the ability to control it as separate property in case of divorce, or the spouse’s fiduciaries or beneficiaries may lose access to that property following the spouse’s death.
- SEPARATE TRUSTS WORK BEST WITH BLENDED FAMILIES OR WHERE SPOUSES HAVE DIFFERENT TRUST BENEFICIARIES. It is common for spouses to have separate sets of children from prior marriages. Separate trusts allow couples with blended families to each select different primary or secondary trust beneficiaries.
- CONSUMER DEBT PROTECTION. With a joint trust, all of the assets of both spouses may be endangered by the debts of just one spouse. But if separate trusts are used, the separate assets of the uninvolved spouse may be protected from the creditors of the indebted spouse. This protection may be limited in certain cases however– if the debt involves certain “necessities” such as food or medical care, the North Carolina “necessities doctrine” provides that both spouses may be responsible for the debt.
- LIABILITY PROTECTION. Where separate trusts are used, if one member of a couple is involved in a car wreck which creates liability, the uninvolved separate assets of the other spouse within the other spouse’s separate trust may be protected against that liability.
Joint trusts may still be appropriate for married couples in some cases, but for the above 6 reasons, separate trusts are the most flexible choice for married couples in North Carolina, and allow each spouse to have better control over their separate assets.
Categories: Estate planning, revocable trust, trusts, living trust, elder law, Winston Salem, North Carolina, NC.
Probate, the court-associated process where your estate debts are paid, your estate is settled, and your assets are distributed to your heirs or beneficiaries, can be costly and lengthy. In addition, probate is a public process where you estate assets may be viewed by anyone.
It’s a good idea to keep as many assets out of probate as possible. Here are 5 ways to accomplish this:
1 – Set Up Your Financial Accounts to Transfer to Your Beneficiaries at Your Death.
Your bank, brokerage, retirement, and life insurance accounts can normally be set up to either “pay” or “transfer” to your selected beneficiaries on death. Assets which are transferred this way avoid the probate process completely.
2 – Establish Joint Real Property Ownership With Right of Survivorship Where It Makes Sense.
It often makes sense for married spouses to own real property jointly. Where the property will pass to the other spouse when a spouse dies, that “right of survivorship” will keep the transfer out of probate court. In North Carolina, both ownership as” joint tenancy with the right of survivorship” and “tenancy by the entirety” provide real property survivorship rights to married couples.
3 – Donate or Gift Away Property
Property that you gift away before your death does not go through probate court. In some circumstances, it may make sense to give away some assets to charity, or to selected beneficiaries, to get these funds out of your estate before you die. But if your estate is large enough, you should consult an attorney about the potential tax consequences of such gifts.
4 – Utilize the Small Estates Laws
If the size of a deceased person’s estate is small enough, North Carolina provides expedited procedures for settling the estate, greatly shortening and simplifying the probate process.
5 – Create a Revocable Living Trust, Where Appropriate
If your estate size is large enough, or for other reasons, it may make sense to establish a revocable living trust. Assets which are properly added to a trust normally escape the probate process after the death of the grantor. In addition, assets placed in trust typically stay private, away from the public eye.
James Salter, 5 Smart Estate-Planning Steps to Avoid Probate, Nerdwallet (Feb.10, 2016), https://www.nerdwallet.com/blog/finance/5-smart-estate-planning-steps-to-avoid-probate/.
Singles must plan carefully for retirement, because they do not typically have another income-earner in the family who can help out.
Here Are 5 Retirement Savings Tips For Singles
- Complete Your Estate Plan. Even if you do not have a family to inherit your assets, completing your estate plan is critically important. Your estate plan includes advance directive documents where you set up agents to make your medical decisions, take care of your finances, and take care of your legal affairs should illness render you unable to help yourself.
- Set Up An Emergency Reserve Fund. Married families typically include an additional breadwinner to fall back on financially in case of emergencies, but a single adult typically does not have such a backup. You should keep at least 6 months normal household expenses reserved in a liquid savings account. You can start with 1 month’s reserve savings at first, then build up to six months as your savings habits improve.
- Build Up Your Credit Score. A single adult typically faces more difficulty purchasing large-ticket items like a home or a car on credit than a married person who may have more income streams to rely on. So it is important to build up your credit score.Credit rating agencies like Equifax typically sell FICO (Fair Issac Corporation) and other monitoring products which can help you learn to improve your credit scores. To improve your score, reduce your credit card accounts to no more than 5, keep your credit card balances as low as possible, pay your bills on time, and try to keep your overall debt as low as possible.
- Purchase Disability Insurance. If you are single, particularly if you have no children or do not plan to have children, becoming disabled or acquiring serious long term health problems in your later years can decimate you financially. You need to make up for your lack of a family safety net should you become seriously ill.It is easier to acquire essential disability insurance or long-term care insurance while you are young and healthy. Talk to a trusted insurance provider about finding a disability insurance policy to meet your needs.
- Continually Save For Retirement. Particularly because as a single you have no other financial backup, start early and give as much as you can afford every paycheck to your 401(k), IRA, or other retirement savings account.
SOURCE: Grant Webster, Saving for Retirement Tips for Singles, USA Today (December 26, 2015), http://www.usatoday.com/story/money/personalfinance/2015/12/26/adviceiq-retirement-tips/77853804/
As Amazon.com gains market share each holiday season, we keep observing the Internet offering faster, better, and cheaper solutions for the goods and services that we purchase.
But some Internet purchases remain unwise. Consumers who purchase wills, trusts, and other estate documents online in an attempt to save money frequently risk their life savings to inferior products.
Why are online estate document services inferior? See the following three reasons below:
Legal Advice is Prohibited
. Because there is no state licensed attorney involved, Internet legal sites are prohibited from providing legal advice. When you are trying to protect your life savings with a will or trust, the first thing required is legal advice tailored to your particular needs and circumstances. But by law, the Internet legal sites are prohibited from giving you the personal legal advice that you need.
- Only Form Documents are Provided. The Internet legal services are known merely as “document assistants,” which primarily only let the customer fill out generic form documents. Such forms are frequently not tailored to the customer’s individual needs or circumstances.
- Your Internet Forms May Not Work. Consumers seeking a will and or trust need documents that will properly distribute a lifetime of savings to chosen beneficiaries. Unfortunately, most consumers only get one chance to get their will right.
Internet forms do not even promise to work when needed. They may not be in compliance with state law, and they may include significant mistakes or oversights. Because no legal advice is given, the Internet legal companies cannot promise a particular legal result, or even that your documents will work.
If wills, trusts, or other estate documents are not drafted properly, lawyers will need to be hired later to clean up the mess, at great expense to your estate and your family. In addition, improperly drafted estate documents may lead to family arguments, which in turn may lead to expensive litigation. It is almost always more cost effective to use a licensed attorney to draft estate documents properly in the beginning, than to clean up a mess later resulting from improper Internet form estate documents.
If you have a toothache, you will probably turn to your dentist, and not the Internet for dental work, right? It makes just as much sense to use a licensed estate planning attorney to develop your critical estate documents, instead of placing your trust in generic form documents from the Internet that might not work when needed.
Source: David Hiersekorn, Can You Trust Your Trust? Why an Online Will or Trust Could Be the Dumbest Mistake You Ever Make, EstatePlanning.com (May 15, 2012), https://www.estateplanning.com/Should-You-Trust-Online-Legal-Document-Services/.
A new online calculator developed by the federal Consumer Financial Protection Bureau helps consumers determine the best time to start receiving retirement benefits, and what those benefits will be.
To use the calculator, a consumer merely types in his or her birthday, and maximum yearly salary received during his or her work career, and the calculator does the rest.
Categories: Estate planning, trusts, elder law, Winston Salem, North Carolina, NC.
The basis in your home is its value for tax purposes. It can be increased by changes such as home improvements.
When your home is sold, the capital gain on the sale is calculated as the difference between the sale price and the home’s basis. If you have been in the home for many years and the home has appreciated, the capital gain could be large, and subject to a large capital gains tax.
Fortunately, where the primary residence is sold and it was the principal residence for two of the last five years before the sale, individuals may typically exempt up to $250,000 in federal capital gains taxes. Couples may typically exempt up to $500,000 in capital gains taxes under these conditions.
If you want to give your home to another, it is typically much better to leave the home to an heir in a will bequest than to gift the home to the recipient during life.
When your home is passed down to a beneficiary in a will, the beneficiary frequently benefits from a “step up in basis,” where your basis in the asset is updated to the current market value of the home. If the home has appreciated since its original purchase, this “step up in basis” may save the beneficiary thousands of dollars in capital gains taxes.
This rule may be more complicated in cases where the bequest is made to a spouse, and where the home is held jointly with right of survivorship.
Avoid Taxes on Your Home Sale Legally, THE HUFFINGTON POST (October 20, 2015), http://www.huffingtonpost.com/moneytips/avoid-taxes-on-your-home-_b_8307234.html.
Categories: Estate planning, asset protection, estate tax, gift tax, elder law, Winston Salem, North Carolina, NC.
Higher net worth individuals and families are increasingly looking to family private foundations to both advance their charitable goals, and to avoid estate taxes.
A private foundation is a freestanding legal entity which can be 100% controlled by the donor. The donor, and anyone he chooses to advise him, fully decide how the money is invested.
Private foundations may own almost any type of asset, including real estate, jewelry, closely held stock, stock options, art, insurance policies, and other variables. Founders can donate highly appreciated stock to the foundation to avoid capital gains taxes so that the full market value of the stock grows tax free, ultimately benefitting the charities to be funded by the foundation.
A private foundation may be established quickly, with an investment of $250,000.00 or less. In fact, 67% of all private foundations have less than $1 million in assets. Establishing the private foundation may take as little as three days, with set up cost being often very affordable.
The following types of charitable gifts are available to private foundations:
- Funding 501(c)(3) public charities
- Funding tax-exempt organizations that are not 501(c)(3) entities
- Making grants directly to individuals and families facing hardship, emergencies, or medical distress
- Supporting charitable organizations based outside of the U.S.
- Making loans, loan guarantees, and equity investments
- Providing funding to for-profit businesses that support the foundation’s charitable mission
- Setting up and running Scholarship and award programs
- Running their own charitable programs.
Robert Chartener, Financial Planning, http://www.financial-planning.com/blogs/wealth-ideas/this-may-be-the-best-bet-for-charity-minded-clients-2694760-1.html?utm_medium=email&ET=financialplanning:e5499154:4512791a:&utm_source=newsletter&utm_campaign=Nov%209%202015-am_retirement_scan&st=email , November 9, 2015.
Download the PDF of this Article
Categories: Estate planning: Elder law, Winston Salem, North Carolina, NC.
The legal landscape for LGBT civil rights is changing, but the LGBT community still needs careful and timely estate planning to ensure protection for the ones they love.
Married LGBT Couples
As North Carolina LGBT adults are aware, on October 10, 2014, the United States District Court for the Western District of North Carolina issued an order that struck down the ban on same sex marriage in North Carolina. The ruling allows LGBT couples to seek the rights and privileges of marriage in North Carolina. Legal LGBT marriage has improved estate rights in two areas.
Legal LGBT Marriage — Two Estate Rights Improvements
Second Parent Adoptions – Although North Carolina adoption law is still evolving, both spouses in a LGBT marriage should now be able to legally adopt the same child. Legal “second parent” adoption for married LGBT couples will solidify the rights of both LGBT spouses to care for and raise the children should something happen to one spouse. Because legal LGBT marriage is still so new in NC, adoption laws remain tricky and untested. When adopting in NC, it is important for the married LGBT couple to consult with an North Carolina family lawyer familiar with LGBT family issues.
Intestate Succession – Better Protection for Surviving Married LGBT Spouses When There is No Will
When an adult in North Carolina dies without a will (called dying intestate), the probate court will look to a complex set of North Carolina laws called the NC intestate succession statutes. Generally, only spouses, legally adopted children and genetic or “blood” relatives inherit under these statutes when there is no will. Unmarried partners, friends, and charities get nothing.
Because LGBT marriage is now legal in NC, if one spouse dies without a will, the surviving spouse should inherit as allowed by the NC intestate succession statutes.
Despite the above two improved estate law protections, married LGBT spouses should still create valid wills in order to pass down their property according to their wishes after death. A proper will also allows a married LGBT couple to name their choice of guardians for their children, which is normally upheld by the courts.
Unmarried LGBT Domestic Partners
North Carolina law provides no statewide protections for domestic relationships related to sexual orientation, gender identity, or gender expression that are not within marriage. Proper estate planning is absolutely critical for unmarried LGBT domestic partners.
As discussed above, if an unmarried LGBT domestic partner in NC dies without a will, a court will look to the NC intestate succession statutes to determine who will receive inheritance. NC’s intestate succession statutes provide the strongest inheritance rights to married spouses, genetic or legally adopted children, and close “blood” or genetic relatives. Without a valid will, an unmarried LGBT domestic partner will likely inherit nothing from the deceased partner.
North Carolina law does, however, allow people to select whomever they wish as “beneficiaries” and “fiduciaries” in their estate documents. Through a proper will, an LGBT partner can “will” or “bequeath” property to the other domestic partner.
LGBT domestic partners who do not plan properly may not be able to care for each other should one partner become seriously ill. If an LGBT domestic partner becomes mentally incapacitated, hospitals or courts may look first to blood relatives to make health care decisions for the incapacitated partner, instead of to the other domestic partner.
To ensure that they will be making each other’s health care decisions in cases of serious illness, LGBT domestic partners must execute proper Health Care Power of Attorney documents listing each other as the highest priority agents for making each other’s health care decisions in case of incapacity.
In response to the great need for partner security in North Carolina, we have prepared the following advice for the North Carolina LGBT community
- Do not let the courts make your critical estate planning decisions for you after you are gone. Obtain a valid will so that YOU decide:
- who is considered part of your family;
- the guardian for your children;
- the terms of a family trust to provide for your family;
- what happens to your pets; and
- what happens to your property.
- Help keep the peace even after you pass. Obtain a well-drafted will so that your friends and family are certain of your wishes and no one fights or litigates over differing interpretations of your intentions.
- Complete a valid will as soon as possible. If your family or your wishes change, you can update your will.
- Complete both your Health Care Power of Attorney and your Living Will documents so that the partner you trust will be able to maintain control of your healthcare if you become medically incapacitated.
- Obtain a Durable Power of Attorney document to select an agent to take care of your business and legal affairs when you are unable to care for those yourself. Make sure a licensed attorney prepares this document; otherwise, banks and other institutions may refuse to recognize the document when it is needed.
Download the PDF of this Article
Categories: Estate planning, elder law, trusts, probate, Winston Salem, North Carolina, NC.
Estate planning documents are designed to protect clients’ wishes both during life and after death. In a durable power of attorney document, a client may pick an agent to help him manage his finances and legal affairs should he become mentally incapacitated during life. And in both will and trust documents, the client may determine how he wants his assets used or distributed after death.
But in the Internet age, it can be difficult to separate certain assets such as financial accounts from the computers, websites, and software used to operate, manage, manipulate, and convey information about those accounts. Thus without proper estate planning incorporating the client’s digital assets, it is a mistake to assume that client fiduciaries such as agents, guardians, executors, and trustees will have the tools they need to perform their obligations.
Existing Laws Do Not Provide Automatic Fiduciary Access To Digital Accounts And Digital Information
In North Carolina, statutory law does not support automatic fiduciary access to digital accounts and digital assets. An NC proposal addressing estate planning and digital accounts was removed from the statute S.L. 2013-91 (N.C. Gen. Stat. 30-3.1) before the Governor signed on March 12, 2013. A few other states have passed digital assets legislation.
Without clear direction from NC state law, controlling law is still mostly dictated by two 1986 Federal statutes which predate the commercial Internet. Although these Federal statutes are outdated, they still guide court decisions.
The overriding purpose of both the 1986 Stored Communications Act (SCA) and the Computer Fraud and Abuse Act (CFAA) is to protect the computer user’s privacy and to prevent unauthorized access to the user’s digital assets. As a result, the computer service providers subject to the SCA and CFAA maintain service agreements that include only one user, and strictly prohibit “unauthorized access.” Some service agreements also state that the individual user’s rights are “nontransferable.” Thus, when a user becomes mentally incompetent or dies, fiduciaries may have difficulty getting access to his online accounts.
In addition, many online services will refuse to release the password information from a deceased user, even in the face of a judicial order or civil lawsuit.
Best Practices Require Both Authorization And Transfer Of Log-on Data Including Passwords
In the absence of a modern statute controlling fiduciary access to digital assets, best estate planning practices require both 1) clear authorization from the principal, grantor, or testator in the estate documents authorizing the fiduciary to access the digital accounts; 2) the actual transfer of account information including log-on information and passwords.
Although these preparations may not work forever and may not work with every digital account, these steps may be the best that NC estate planners can do until controlling laws are modernized. Some digital providers have revised their rules to permit fiduciaries to access online accounts when the proper authorization is included in the primary user’s estate planning documents.
Authorization Language and Definition
Estate planner Jean Gordon Carter and colleagues provide sample authorization language, which may be included in a will:
“Digital Assets. My executor shall have the power to access, handle, distribute and dispose of my digital assets.”
They also advocate including a broad definition of “Digital Assets” in the will.
Proper authorization to use digital assets language should additionally be included in the durable power of attorney document, in order for the agent to be fully able to conduct an incapacitated grantor’s business and legal affairs.
Transfer of Account Administrative Information
In addition to the digital assets authorization language needed in the estate documents, the grantor must also physically transfer to the proper fiduciaries the administrative information required for using the digital assets. This includes account information, log-on information, and passwords.
Randy Siller, a registered representative of Lincoln Financial Advisors Corporation, shares the following seven best practices for clients transferring digital access information to fiduciaries as part of an estate plan:
- Digital Hardware. List all digital hardware, including desktops, laptops, smartphones, iPads, USB flash drives, and external hard drives.
- Financial Software. List all financial-related software programs used, such as Quicken, QuickBooks, and Turbo Tax, which may include important tax and business information, as well as passwords.
- File Organization/Passwords. Provide an outline of the file organization on digital devices so fiduciaries will know where to find important files, as well as any passwords they may need to gain file access.
- Social Media. List all social media accounts, such as Facebook, LinkedIn, Twitter, and Cloud websites, as well as the information needed to access each one.
- Online Accounts. Prepare a list of all online accounts including bank accounts, investment accounts, retirement accounts, e-commerce accounts (Amazon, PayPal), credit card accounts, and insurance accounts. It is critical for fiduciaries to have access to these providers.
- Subscriptions. Ensure that a list of online subscriptions such as Netflix, Norton Anti-Virus, credit reporting/protection subscriptions, and streaming music subscription services are documented so fiduciaries can access or cancel those services.
- Email. List all personal and business-related email accounts, and how to access them.
It is easy for estate planners to focus on protecting monetary assets. But the control of a client’s “digital legacy” on social media may also be important.
Geoffrey Fowler, writing for the Wall Street Journal, has noted: “The digital era adds a new complexity to the human test of dealing with death. Loved ones once may have memorialized the departed with private rituals and a notice in the newspaper. Today, as family and friends gather publicly to write and share photos online, the obituary may never be complete.”
To deal with the desire for users to allow their loved ones to memorialize them through their Facebook accounts at death, Facebook recently decided to allow members to designate a “legacy contact” to manage parts of their accounts posthumously. Members may now also choose to have their presence deleted entirely at death.
On The Horizon
Likely the most complete proposal addressing the need of clients to effectively give fiduciaries access to their digital estate has been written under the auspices of the Uniform Law Commission. The Uniform Law Commission approved the recent Uniform Fiduciary Access to Digital Assets Act (UFADAA) on July 16, 2014 in Seattle, WA.
The Commission states:
The UFADAA gives people the power to plan for the management and disposition of their digital assets in the same way they can make plans for their tangible property: by providing instructions in a will, trust, or power of attorney. If a person fails to plan, the same court-appointed fiduciary that manages the person’s tangible assets can manage the person’s digital assets, distributing those assets to heirs or disposing of them as appropriate.
Until such reforms become law, the best strategy for passing down digital assets to fiduciaries requires both including proper fiduciary authorization language in the estate documents, and the physical transfer of digital asset user information to fiduciaries.
Computer Fraud and Abuse Act 18 U.S.C. § 1030 (1986).
Geoffrey Fowler, Facebook Heir? Time to Choose Who Manages Your Account When You Die, The Wall Street Journal, Feb. 12, 2015.
Geoffrey Fowler, Life and Death Online: Who Controls a Digital Legacy?,
The Wall Street Journal, Jan. 5, 2013.
Jean Carter, Sample Will and Power of Attorney Language for Digital Assets, The Digital Beyond, http://www.thedigitalbeyond.com/sample-language/
N.C. Gen. Stat. 30-3.1.
Randy Siller, Seven Tips for Managing Your Digital Estate, WealthManagement.com, (Nov. 25, 2014), http://wealthmanagement.com/estate-planning/seven-tips-managing-your-digital-estate#slide-0-field_images-715801
Stored Communications Act 18 U.S.C. Chapter 121 (1986).
Uniform Law Commission, Uniform Fiduciary Access to Digital Assets Act Approved (July 16, 2014), http://www.uniformlaws.org/NewsDetail.aspx?title=Uniform+Fiduciary+Access+to+Digital+Assets+Act+Approved
Uniform Law Commission, The Uniform Fiduciary Access to Digital Access Act–A Summary, http://www.uniformlaws.org/shared/docs/Fiduciary%20Access%20to%20Digital%20Assets/UFADAA%20-%20Summary%20-%20August%202014.pdf
William Bisset & David Kauffman, Understanding Proposed Legislation for Digital Assets, Journal of Financial Planning, http://www.onefpa.org/journal/Pages/APR14-Understanding-Proposed-Legislation-for-Digital-Assets.aspx
Download the PDF of this Article
Categories: Estate planning, elder law, wills, Winston Salem, North Carolina, NC.
NFL Tennessee Titans quarterback Steve McNair, age 36, was unexpectedly found murdered in a Nashville, TN hotel room on July 4, 2009. McNair had earned about $90 million during his NFL career, yet he died without a will, or intestate. Because he had done no estate planning, his family lost millions of dollars to taxes and legal fees.
Estate planners strongly recommend that every adult who owns property or who has minor children should maintain valid estate planning documents, including a will. Yet every year thousands of North Carolina adults die intestate.
In certain groups, the numbers of adults without a will are remarkably high. 68% of African-American adults and 74 percent of Hispanic adults do not have one. And strikingly, 92% of adults under the age of 35 (prime parenting age) do not have a will.
NC Intestate Succession Laws
In North Carolina, when the probate court addresses an estate where the property owner died intestate, the court looks to the North Carolina intestate succession laws to help the court divide up the deceased person’s property. Unfortunately, the probate court often will make different decisions than the deceased would have made had he or she made a will while living.
Under North Carolina intestate succession law, typically only spouses and genetic relatives inherit. Unmarried partners, friends, and charities get nothing.
Dying without a will may create many problems not addressed by the probate court applying NC’s intestate succession statutes.
Fighting and Expensive Lawsuits
If the deceased person’s (decedent’s) intent was never expressed in a will, potential heirs and others seeking part of the estate often argue about what the deceased really intended. Those disputes may lead to expensive litigation.
Because the intestate succession statutes deal mainly in percentages and do not address individual items of personal property, family members may fight over who gets certain family heirlooms or individual items of value.
Where infighting leads to litigation, the potential heirs may spend many times more in legal fees than what a proper will (which could have prevented the arguments) would have cost the decedent.
A Court Decides Who Gets The Children
Parents who plan use a will to name their choices of guardians for their children. Courts normally uphold the parents’ choices for their children’s guardians in a will. But where there is no will and both parents die intestate, guardians will be appointed for the children by a court. This is a result that no parent intended.
Higher Fees, Taxes and Legal Costs
Proper estate planning helps minimize probate fees, taxes, and legal costs. The goal of all legal planning should be to prevent problems. Preventing problems is always less expensive than paying to clean up a mess later, and is more predictable and less harrowing for the family.
Please contact us with any questions and to learn how we can help with your estate planning in North Carolina.
A.L. Kennedy, Statistics on Last Wills & Testaments, Demand Media
A Look at Last Wills & Testaments, The Virtual Attorney
Clark Wilson LLP, 10 Problems with Dying Intestate
Legal Consequences of Dying Without a Will, Lawyers.com
Mary Randolph, J.D., How an Estate is Settled if There’s No Will: Intestate Succession, Nolo
Download the PDF of this Article
Categories: Estate planning, trusts, elder law, Winston Salem, North Carolina, NC.
The differences between federal gift taxes and federal estate taxes confuse many. Taking a step-by-step approach helps to clarify these concepts.
Types of Gifts
U.S. tax laws recognize two principal categories of gifts. A gift made during one’s lifetime is called an inter vivos gift. A gift made after death (normally through a will or some other instrument like a trust) is called a testamentary gift.
Gift taxes are normally concerned with gifts made during life, or inter vivos gifts. Estate taxes are normally concerned with gifts made after death, or testamentary gifts.
The gift tax and estate tax are the only “wealth taxes” prescribed by the federal government.
States may levy another “wealth tax” called an inheritance tax in addition to, or in substitution for, a state estate tax. The federal government does not levy inheritance taxes. Most states, including North Carolina, have repealed their inheritance and estate taxes. And very few states still levy a gift tax.
History And Purpose
The first U.S. federal estate tax was enacted in 1916 in order to gain revenue from wealthy individuals at death in addition to their income taxes collected during life.
The gift tax was first enacted in 1924, so that the government could reduce the avoidance of estate taxes through giving inter vivos gifts.
Without the gift tax, a wealthy citizen could reduce his or her family’s estate tax burden at death by making gifts to others while alive, which would reduce the size of his or her taxable estate at death. The gift tax serves as a “backstop” to the estate tax by also taxing the gifts made during life, making it more difficult for a wealthy citizen to escape federal wealth taxes.
Unification, The Lifetime Gift Tax Exclusion, The Annual Gift Tax Exclusion, And The Estate Tax Exemption
There are several similarities between the federal gift tax and the federal estate tax which invite confusion. In 1976, the federal gift tax was “unified” with the federal estate tax, which created a common tax rate schedule for both types of taxes.
Recent updates have equalized the lifetime gift tax exclusion and the estate tax exemption, so that they are now the same number. For example, in 2014, no gift tax is owed to the IRS until the giver exceeds the 2014 lifetime gift tax exclusion of $5.34 million for all gifts made during the giver’s lifetime in excess of the annual gift tax exclusion amount (discussed below). And the 2014 federal estate tax exemption allows the individual “testator,” or giver, in a will to leave his heirs up to $5.34 million free of estate tax. The $5.34 million gift tax exclusion and estate tax exemption are indexed annually for inflation. In 2015, both the federal individual gift tax exclusion and estate tax exemption will rise to $5.43 million.
Unification dictates that if some of an individual’s 2014 $5.34 million lifetime gift tax exclusion is used up by making a taxable gift during life, the estate tax exemption used to shield testamentary bequests (transfers of property by will or trusts at death) will be reduced accordingly.
In addition to the lifetime gift tax exclusion, it is important to understand its annual counterpart, the annual gift tax exclusion. In 2014, the annual gift tax exclusion allows a taxpayer to give away up to $14,000 each to as many individuals as he wishes without those gifts counting against his or her 2014 $5.34 million lifetime gift tax exclusion.
Married spouses, acting in concert, could give $28,000 in 2014 to each of an unlimited number of recipients without gift tax consequences.
Suppose Laura, who is single, makes a $1 million gift to her nephew Ken in 2011, then dies in 2014. How much federal estate tax exemption would be available to her estate at death?
First, we must determine how much the lifetime gift tax exclusion has been reduced by Laura’s 2011 gift. To calculate this, we subtract the 2011 annual gift tax exclusion amount, which was $13,000 in 2011, from the amount of the gift, as follows: $1,000,000 – $ 13,000 = $987,000.
Because of unification, the amount of the total $5.34 million federal estate tax exemption available to Laura’s estate at her death in 2014 would be reduced by the countable portion of her gifts during life, or $5,340,000 – $987,000 = $ 4,353,000 estate tax exemption available to Laura’s estate at death to shield her assets from estate taxes.
Even though Laura would not have had to pay gift taxes in 2011 on the amount of her gift, $987,000, in excess of the $13,000 2011 annual gift tax exclusion amount, she does have to report any gifts in excess of the annual gift tax exclusion amount to the IRS so the IRS can keep track of the lifetime total.
Note that Ken, the 2011 recipient of the $1 million gift, does not have to pay any tax on the gift, because gifts are not included as taxable income to the recipient.
The Unlimited Marital Deduction And Portability
The federal unlimited marital deduction provides that an individual may transfer an unlimited amount of assets to his or her spouse at any time, in life or at death, free from any tax (including gift and estate tax).
The concept of estate tax exemption portability allows a surviving spouse to use a deceased spouse’s unused estate tax exemption (up to $5.34 million in 2014).
In marriages, the unlimited marital deduction and estate tax exemption portability may be used in tandem to protect marital assets from estate taxes.
For example, suppose Henry and Anne are married. Henry dies in 2013 (when the estate tax exemption was $5.25 million), leaving all of his assets to Anne. Because of the unlimited marital deduction, Henry’s 2013 testamentary bequest to Anne is tax-free for both parties; neither Henry’s estate nor Anne are taxed on this bequest at all in 2013.
If Anne then dies in 2014, federal estate tax portability rules provide that both spouses’ combined estate tax exemptions may be used, so that $5.25 million (2013 federal estate tax exemption amount for Henry) + 5.34 million (2014 federal estate tax exemption amount for Anne) = $10.59 million total combined estate tax exemption could be utilized by the couple’s estate, which would shield $10.59 million of Anne’s bequest to her heirs from estate taxes at Anne’s death.
In order to take advantage of portability, a federal estate tax return must be filed at the first spouse’s death, even if not otherwise required.
Estate planning for large estates typically takes full advantage of both spouses’ estate tax exemptions. In addition to portability, this could also be done, for example, by funding a Family Trust at the first death using the estate tax exemption amount of the first-to-die spouse, then utilizing the unlimited marital deduction to protect the transfer of the remaining assets to the surviving spouse. The Family Trust, which may benefit the surviving spouse, can pass to the heirs without tax at the death of the surviving spouse.
In addition to the annual gift tax exclusion, the following types of gifts are tax-exempt. The taxpayer may make unlimited gifts of any amount to these categories without any gift tax or estate tax consequences, and without having to file gift tax returns:
- Gifts to IRS-approved charities
- Gifts to a spouse (if the spouse is a U.S. citizen)
- Gifts made to cover another person’s medical expenses (must be made directly to the medical service providers)
- Gifts covering another person’s tuition expenses (must be made directly to the educational institution).
Understanding how the federal government treats gift and estate taxes should allow the taxpayer to make better gift planning and estate planning choices.
Please contact us with any questions and to learn how we can help with your estate planning in Winston-Salem, North Carolina.
Estes and Estes, Estate and Gift Taxation, http://www.estesandestes.com/Estate_and_Gift_ Taxation.html
Internal Revenue Service, Gift Tax, http://www.irs.gov/Businesses/Small-Businesses-&-Self-Employed/Gift-Tax
Investopedia, Unlimited Marital Deduction, http://www.investopedia.com/terms/u/unlimited-marital-deduction.asp
David Joulfaian, U.S. Department of the Treasury, Tax Topics: Federal Estate and Gift Tax, Urban Institute and Brookings Institution Tax Policy Center, http://www.taxpolicycenter.org/publications/url.cfm?ID=1000526
Arleen Richards, The Difference Between Estate Taxes and Gift Taxes, The Epoch Times (Jan. 29, 2013), http://www.theepochtimes.com/n2/life/the-difference-between-estate-taxes-and-gift-taxes-334217.html
U.S. Trust, Portability of a Deceased Spouse’s Unused Exclusion Amount, http://www.ustrust.com/Publish/Content/application/pdf/GWMOL/UST-WSR-Portability-of-estate-tax-exemption.pdf
Download the PDF of this Article
Categories: Estate planning, elder law, Winston Salem, North Carolina, NC.
Estate Planning is not just for wealthy people with lots of assets. Individualized, professional estate planning may provide the following 10 benefits to anyone:
- Assures that your hard-won savings and assets will be passed down correctly to the loved ones that you designate, while shielding as many assets as possible from taxes, court costs, and unnecessary legal fees (Will, Trust, Living Trust)
- Provides for the care and well being of any loved ones left behind (Will, Trust)
- Allows you to choose a guardian to care for your children in your absence, and to choose a responsible adult to take care of their legal and business affairs (Will, Trust)
- Provides for family members with special needs without disrupting their government benefits (Will, Trust, Special Needs Trust)
- Provides for the transfer of your business at your retirement, disability, or death (Will, Trust, Business Succession Plan)
- Allows you to choose a trusted adult to make your medical decisions for you in case you become seriously ill (Durable Power of Attorney for Healthcare)
- Allows you to choose a trusted adult to take care of your legal and business affairs in case you become seriously ill (Durable Power of Attorney)
- Provides that physicians will share important information about your medical conditions with the individuals whom you have selected to make your health care, business, and legal decisions for you (HIPAA Document)
- Allows you to choose how you will be treated by healthcare facilities at the end of life, and what actions may or may not be taken to extend your life (Living Will)
- Allows you to designate how you want your body to be treated after you are gone, and what funeral or memorial arrangements you may or may not want (Will, Letter of Personal Instruction)
No adult should leave these essential rights and benefits to chance. Life is uncertain — the best time for estate planning is now.
Please contact us with any questions and to learn how we can help with your estate planning in Winston-Salem, North Carolina.
Download the PDF of this Article
Why every adult needs a living will and a health care power of attorney
Terri Schiavo collapsed in her St. Petersburg, Florida home after a massive heart attack on February 25, 1990. Because of a lack of oxygen, she suffered extensive brain damage and after two and one half months in a coma physicians ruled that she was nonresponsive and in a vegetative state.
Unfortunately, Ms. Schiavo had not previously conducted any formal estate planning and had neither a Health Care Power of Attorney nor a Living Will. Because her actual wishes were unclear, Ms. Schiavo was kept alive in a persistent vegetative state (PVS), while never improving, for 15 additional years despite formidable legal attempts by her husband to allow her to die a natural death.
Nightmare Government Involvement
For any citizen who cringes at the thought of government intervention into private life, this case remains an absolute nightmare. The courts eventually involved included all levels of the Florida courts up to the Florida Supreme Court and the Federal Appeals Courts, and they entertained challenges from a host of entities claiming to represent Terri’s interests, including the Florida legislature, Florida Governor Jeb Bush, various disability rights groups, the U.S. Congress, and President George Bush.
What exactly went wrong here?
Terri’s Husband, Michael Schiavo, who claimed that he knew that Terri would not want to live for an extended period in a persistent vegetative state, tried to serve as Terri’s sole legal representative determining Terri’s wishes. But because Terri had not executed a Health Care Power of Attorney formally giving Michael sole authority to make Terri’s health care decisions if she became incompetent, the courts ruled at various times that other parties, including Terri’s parents, could also represent Terri’s wishes. Indeed Terri’s parents maintained that their Catholic Church beliefs were also Terri’s beliefs, and that Terri would not want to violate the Church’s teachings against euthanasia (intentionally ending a life in order to relieve pain and suffering.)
Terri Schiavo still could have made her own wishes formally known in a way protected by the Florida courts if she would have executed a proper Living Will. Indeed, in 1990, the Florida Supreme Court had ruled in Guardianship of Estelle Browning that because elderly Estelle Browning had expressed in a Living Will her wish not to be kept alive by artificial means including a feeding tube, that Browning had “the constitutional right to choose or refuse medical treatment, and that right extends to all relevant decisions concerning one’s health.”
Good Lawyering Cannot Undo Bad Planning
Michael Schiavo hired the same noted Florida attorney who had argued the 1990 Guardianship of Estelle Browning case before the Florida Supreme Court, George Felos. Felos argued to a January, 2000 Pinellas (Florida) County Court that Terri Schiavo would not want to be kept alive artificially when her chance of recovery was miniscule. Felos won the initial case, but, even with the prior Browning decision, because Terri Schiavo had not executed a formal Living Will document expressing her actual wishes, Michael Schiavo’s attorneys could not successfully stave off the multitude of court challenges seeking to keep Terri Schiavo on life support for almost five more years.
The goal of all legal planning should be to prevent problems. Preventing problems is always less expensive than fighting a battle in court, and is much more predictable and much less harrowing for the client.
If, because of poor legal planning, one of the parents in a family is kept alive beyond her actual wishes, what would the cost of the additional medical expenses and additional legal bills do to a typical family? These costs could be devastating, and could quickly wipe out an estate as well as wipe out the plans that the parent intended.
North Carolina Recognizes the Living Will and the Health Care Power of Attorney
North Carolina law provides two methods for an adult to make his or her health care wishes known in advance–the Living Will and the Health Care Power of Attorney.
An adult may use a Living Will to communicate to her doctors that she does not want to be kept alive by extraordinary medical treatment or by artificial nutrition or hydration if she is terminally ill or in a persistent vegetative state. An adult may use a Health Care Power of Attorney to appoint someone to make his medical decisions if he is unable to make them himself. Because each of these documents has a different purpose, the best estate planning practices include both the Living Will and the Health Care Power of Attorney to be used in tandem. All North Carolina adults should utilize the Living Will and the Health Care Power of Attorney as part of a comprehensive estate planning process.
Please contact us with any questions and to learn how we can help with your estate planning in Winston-Salem, North Carolina.
|
Specific gravity is the standard scale for what a hydrometer measures, choose either a plain form hydrometer or a combined form hydrometer. Plain form hydrometers do not have a built-in thermometer, use a separate thermometer to measure the temperature. Combined form hydrometers have a thermometer built into the body or stem to measure the temperature of the sample. API scale hydrometers are selected by the American Petroleum Institute (API), the United States Bureau of Mines, and the National Institute of Standards and Technology (NIST) as the standard scale for petroleum products. Baumé hydrometers are used for liquids heavier than water, such as syrups. Brix Scale hydrometers are used by the sugar industry. Salt hydrometers are graduated in % saturation or % by weight of salt in solution. Alcohol (Tralle and Proof Scales) hydrometers measure directly in percentage ethyl alcohol by weight in water from 0 to 100%. The Proof scale indicates the proof of alcohol from 0 to 200 proof. Proof is twice the percentage of alcohol by volume in solution. Soil hydrometers determine the specific gravity of a suspension, enabling the percentage of particles of a certain equivalent particle diameter to be calculated.
|
The Spanish civil war of 1936-1939 was a siren song for young Socialists all over Europe, an opportunity to fight Fascism (and Franco) in a major European country after the recent disasters in Italy (Mussolini) and Germany (Hitler and the Nazis). Communism, if not totally ascendent, had yet to be fully tarnished by the eventual global realization of how Stalin was starving and imprisoning his people, nor just how Communism-in-practice actually worked in the USSR. The ideals of socialism were very much intact, and in many ways remain intact to this day, although distinct lines were then being carefully drawn between the democratic socialists, the more hardened theoretical socialists, soft Communists, and Stalinists. The 1930s were a hothouse environment for ideology, and you couldn't have picked a better spot to watch competing versions of the truth play out than in late 1930s Spain.
Englishman George Orwell did just that, enlisting on the government's side to try and keep the fascists from taking over the country, which, we now know, was a futile effort. Orwell did not know that, even upon completion of this book – in fact, "HOMAGE TO CATALONIA" ends with Orwell musing about likely outcomes, not one of which seriously entertains Generalissimo Francisco Franco being the strong-arm boss of Spain for the next forty years. Orwell kept a journal of his adventures, which are musings of a young man trying to come to grips not on what he's fighting, but what he's fighting for, and with whom. The book is by turns humorous, tragic and a work of deep political science. Orwell's socialism is the purest of socialisms, one that believes in blowing up distinctions between the classes and ending both the aristocracy and the dominance of organized religion. His enlisting in the POUM, a "Trotskyist" Communist group, is more or less enabled by complete accident. He simply wants to defeat fascism, but his POUM membership helps to give him a ringside seat for a confusing jumble of political allegiances, angers and, later, murders – all from and on the Left. The Right, the fascists, are only the object of mockery and pity in this book.
"HOMAGE TO CATALONIA" uses alternating chapters to tell, first, Orwell's story, and second, the story of the politics behind this war and the wars-within-the-war. Orwell's story is pretty funny and self-deprecating. He says early on that he barely shot a gun or killed anyone, but we later learn that he not only shot, he both likely killed other humans and was severely injured by a bullet in the throat himself, guaranteeing him exit from the war (which he's fairly relieved of, after many months at the front). He spends much of the book contrasting his lofty ideals with the grim realities on the ground, and how men, both smart and pigheadedly stupid, are herded into fighting units and then given the barest of munitions to help them achieve their aims. Like many books on war, the emphasis is on the boredom and excruciating tedium of it all, punctuated by very rare "action". This action was often absurdly pointless unto itself, and throughout the book you watch a budding realization about the nature of conflict dawn on a young man's conscience.
Orwell took great pains to describe the nature of the battle between the two main Communist groups, the POUM and the Stalinist PSUC, as well as the other internecine battles with anarchists, trade unions controlled by anarchists, and other sects. This all culminates in a Barcelona battle that he both witnessed and participated in, and it's as gripping and politically "interesting" as anything in the book. The effect I got was the one described in my first paragraph – the sense that ideology was as fervent, florid, fractured and unpredictable as it had been in any time the previous 200 years.
These years immediately preceding World War II were terrifying and defining times for the horrors that were to follow, and the book feels, with the benefit of hindsight, like a passion play and warning for the larger, more global battle to come. Orwell's genius is in both transmitting this sense of foreboding while also writing a "light" sort of diary of his and his comrades' bumbling misadventures. It's a terrific addition to the high school Orwell canon of "1984" and "Animal Farm", if a bit too dense and historical for modern students of our profoundly illiterate age.
|
Brazil is the largest exporter of soybeans, chicken and beef in the world. It is also a major producer of pork and corn.
The Reuters news agency says Brazil’s success is partly a result of low prices for farm land and permissive land-use policies.
Some farmers are leaving the Amazon, partly because of international concerns about the rainforest. Many are moving to an area in the center of the country, known as the Cerrado.
The Cerrado is about the same size as Mexico. It stretches from Brazil’s western border with Paraguay up to the northeast and the Atlantic Ocean. It is the largest flat, wooded grasslands in South America. The area is also home to five percent of living species on Earth.
Over the past 10 years, Brazilian farmers have been developing large parts of the Cerrado. The government says the area has lost more than 105,000 square kilometers of its native plant cover since 2008. That number represents 50 percent more land than the deforestation seen during the same period in the Amazon. Based on relative size, the Cerrado is disappearing nearly four times faster than the rainforest.
The Cerrado is also rich in carbon dioxide gas. Studies have linked rising levels of carbon dioxide to rising temperatures in Earth’s atmosphere. Many scientists blame the increase on deforestation and use of coal, oil and other fossil fuels.
Brazilian officials say protection of native plant life is important to meeting the country’s goals under the 2016 Paris Agreement on climate change. But scientists say industrial farming in the Carredo could hold back Brazil's efforts and worsen global warming.
Liliana Pena Naval is an environmental engineering professor at the Federal University of Tocantins. She told the Associated Press that the removal of plants can cause bodies of water to disappear.
Thousands of plants, fish, insects and animals are also affected. Many of these species are only beginning to be studied.
Farmers see the development of the Cerrado as necessary for Brazil’s food security and economic success. The agriculture industry grew 13 percent in 2017. The ability to keep producing new farmland at low costs has given Brazil better chances for success than other countries.
Increased trade with China
Deforestation in the Cerrado has slowed from the early 2000s. But farmers continue to develop large parts of the area. Much of the growth is fueled by Chinese demand for Brazilian meat and grain. China is Brazil's top buyer of soybeans. China is also a major purchaser of Brazilian pork, beef and chicken.
Rising trade tensions between China and the United States have only made the connection stronger. Brazil's soybean exports to China are up 18 percent through the first seven months of 2018. The increase comes as Chinese buyers have canceled tens of millions of dollars' worth of business deals with U.S. suppliers.
Environmental protections remain strong in Brazil. Rainforest farmers are required by law to protect 80 percent of native plants on their land. As part of its promise under the Paris Agreement, the government agreed to end illegal Amazon deforestation by 2030.
But Brazil has made no similar effort to protect the Cerrado. Environmentalists say the area’s wooded grasslands have failed to capture the public's attention the way the Amazon has.
Last year, some environmental protection groups began calling for large international businesses to protect the Cerrado. Among those groups were Greenpeace, the World Wildlife Foundation and the Brazilian research group IPAM. They called for immediate action to end the deforestation in a document known as the Cerrado Manifesto.
More than 60 companies, including McDonalds, Unilever and Walmart, offered to follow the manifesto. They have agreed to support measures that would end native vegetation loss in the Cerrado from their production processes.
Farmer Julimar Pansera purchased land in the Cerrado seven years ago. Today, he oversees nearly 49 square kilometers of soy fields and has about 20 full-time employees. He said there is no future without growth.
"There is still a large area to be opened," he said. "It will be one of the great centers of Brazilian agriculture."
I’m Jonathan Evans.
Jake Spring reported this story for the Reuters news agency. Jonathan Evans adapted his report for VOA Learning English. George Grow was the editor.
Words in This Story
deforestation – n. the act or result of cutting down or burning all the trees in an area
global warming – n. the recent increase in the world's temperature that is believed to be caused by the increase of certain gases such as carbon dioxide in the atmosphere
species – n. a group of animals or plants that are similar and can produce young animals or plants
vegetation – n. plants in general; plants that cover a particular area
|
Department of Psychology Learning Outcomes
Knowledge Base of Psychology
Students will demonstrate familiarity with the major concepts, theoretical perspectives, empirical findings, and historical trends in psychology.
- Characterize the nature of psychology as a scientific discipline.
- Demonstrate knowledge and understanding representing appropriate breadth and depth in selected content areas of psychology.
- Explain major perspectives of psychology (e.g. behavioral, biological, cognitive, evolutionary, humanistic, psychodynamic, and sociocultural).
Research Methods in Psychology
Students will understand and apply basic research methods in psychology, including research design, data analysis, and interpretation.
- Explain different research methods and statistical analyses used by psychologists.
- Design and conduct basic studies to address psychological questions using appropriate research methods and statistical analyses.
- Follow the APA Code of Ethics in the treatment of human and nonhuman participants in the design, data collection, interpretation, and reporting of psychological research.
Critical Thinking and Communication Skills in Psychology
- Use critical thinking effectively.
- Demonstrate effective writing skills and oral communication skills in various formats and for various purposes.
Department of Theological Studies Learning Outcomes
Graduates of the Theological Studies program exhibit proficiency in their approach to and interpretation of the Scriptures including the ability to relate the Bible to contemporary experience.
– Apply historical-critical approaches to interpretation of biblical texts;
– Demonstrate knowledge of the biblical narratives and themes as well as the way that they speak today.
- Historical Theology
Graduates of the Theological Studies program exhibit an understanding of the development of the Christian thought and its interaction with human history and culture.
– Apply a historical-critical approach to interpretation of primary and secondary sources;
– Understand the history and development of Christian thought and the role Scripture and Tradition play in
the evolution of Christian belief and practice.
- Doctrinal Theology
Graduates of the Theological Studies program demonstrate an understanding of and appreciation for the major doctrines and themes of the Christian tradition.
– Engage in theological analysis of fundamental Christian doctrines through the application of scriptural and
– Demonstrate an understanding of the major Christian doctrines and their coherence as a system of
thought and belief.
Graduates of the Theological Studies program think critically about issues, events, and institutions and evaluate them in light of the Christian tradition.
– Understand the way Christian beliefs ground the moral life;
– Draw upon the Christian tradition and employ critical thinking in evaluating ethical problems and presenting solutions systematically.
- World Religions
Graduates of the Theological Studies program demonstrate an understanding of and appreciation for at least two major world religions.
– Demonstrate an empathetic understanding of the history, beliefs, ethics, and religious practices of two major world religions.
|
27 Mar Acidic Soot Residue Causes Metal To Pit & Corrode
Fire or smoke damage to property, regardless of the “size” of the fire, also requires an immediate response. Soot residue is highly acidic and can cause irreversible property damage if it is not treated as an emergency. Soot residue can cause the metal in doorknobs, plumbing fixtures, light fixtures, etc., to pit or corrode. Glass in windows, mirrors, and cabinets can be etched by soot residue, causing them to look cloudy and soiled. Plastics, appliances, vinyl windows and fabrics can be discolored by soot residue.
Circulation during a fire is one of the most interesting aspects. “Heat” moves toward “cold.” As areas begin to increase in temperature, they seek out cooler rooms and spaces. Heat is moving toward lower temperatures and seeking atmospheric equilibrium. Even if the heating and air conditioning system is not operating, the smoke/soot will still travel through-out the structure. High vapor pressure will “force” the residues into areas often viewed as begin “sealed.” It has even been found on items inside of a freezer. As air circulates it carries PICs and odor-charged molecules. This accounts for the need to clean and deodorize areas that are some distance from the source of the fire. As particles combust they become charged. In areas of low circulation they can form what is called “soot tags.” Customers are under the impression that the smoke attached itself to spider webs they had prior to the fire. Quite the contrary—soot tags are new, unique chains of soot that gather in areas of low concentration.
Odors from a fire also vary. When products in a fire burn, the odors join the oxygen molecule in the air we breathe. Undoubtedly, PICs create odor, but in some in-stances, the odor is quite strong even when the PICs are hard to find. Consider for instance, the common “I left a turkey in the oven and went to the store” fire. When the occupants returned, the odor of the burnt turkey is everywhere but there is very little soot. Here is the problem: the 20 pound bird is now 3 pounds of ash! Even the clothes in the back closets contain odors indicating that protein fires are one of the most difficult to mitigate because of the pervasiveness of the odor. All odors have a source. The mitigation company must be persistent in seeking out all nooks and crannies to make sure that all smoke is removed and all surfaces deodorized.
Here at EMERG+NC Property Rescuers, we have extensive experience in this area and can inspect for these problems. We also have the training, experience, and equipment to perform the necessary actions to prevent additional damage from occurring.
|
by Will Davis
Yesterday, the Nuclear Regulatory Commission announced that its commissioners had approved the award of a Construction and Operating License (COL) for DTE Energy’s prospective Fermi Unit 3, to be built on the site of the existing Fermi-2 near Detroit, Mich. The COL will also notably be the first for the GE Hitachi ESBWR, or “Economic Simplified Boiling Water Reactor,” a Gen-III+ nuclear plant with passive safety.
GE’s ESBWR received its Design Certification from the NRC late last year, and joined the Westinghouse AP1000 as the second Gen-III+ design approved in the United States. While both have passive safety features, the differences in the nuclear plants is remarkable.
The ESBWR is an advanced design both of the reactor specifically and the nuclear plant overall that GE Hitachi describes as being not only inherently safer than previous plants due to the inclusion of passive safety systems, but also less expensive and complex to construct than other plants; the design uses natural circulation through the core instead of motor driven pumps, and the plant design eliminates 11 whole systems and 25 percent of the pumps, valves and motors used in the previous boiling water reactor series design. Passive safety systems give the ESBWR a calculated core damage frequency of 1.7 x 10-8/year, which GE Hitachi claims to be the lowest of any available plant in its class. It should be noted that this plant, if built, would become the most powerful single unit in the United States, with an electrical rating of 1600 MWe gross.
Natural circulation is not new to BWRs—in fact, the very earliest range of BWRs was dominated by designs that used no pumps to force water through the core, but rather the natural tendency of hotter water to rise and colder, denser water to fall. The pioneering and famous Argonne National Laboratory’s EBWR plant (whose construction was started in 1954, and which entered operation in late 1956) as well as General Electric’s also–pioneering Vallecitos BWR (whose construction began in June 1956 and which began putting 5000 KWe of power onto the PG&E grid on October 24, 1957—an astonishingly short period) were natural circulation units that proved, quite early, the viability of that concept in a world that had not yet wholly embraced it.
GE Hitachi Nuclear Energy also claims that the ESBWR will benefit from modularized construction in order to shorten the construction time, and points up decades of experience between itself and partner Hitachi-GE. It should be noted that two units of the ABWR design that precedes the ESBWR were built (that is, from concrete pour to fuel load) in 36.5 months and 38.5 months in Japan (these are Kashiwazaki-Kariwa-6 and -7, respectively)—an amazingly short time for nuclear plants in the Gigawatt class.
Even with the advances and modifications in design that make the ESBWR new, there is a great amount of carryover from earlier proven designs in the plant—everywhere from the fuel design, to the design and operation of isolation condensers for shutdown cooling.
The prospective owner—Maybe, maybe not…but maybe
DTE Energy almost immediately made a press release stating that it had indeed received approval for issuance of the COL (which is yet to come—what has happened is the vote, not the actual issuance) for Fermi-3, but hastened to add that it presently has no plans for the construction of the plant. What this means is that DTE is keeping this option open among many other options, which is probably a very good thing taking into account the rapidly changing energy landscape in the United States—changing as regards fuels, and as regards emissions.
DTE operates one nuclear plant at the site—Fermi-2, a GE BWR whose construction was slowed and then practically stopped in the middle 1970s when lower-than-predicted energy demand coupled with a financial crisis at then-owner Detroit Edison led to a wholesale stoppage of the construction of all of its power plants, both coal and nuclear. However, conditions had begun marginally to improve when the brutal winter of 1976–1977 awoke Detroit Edison to a disturbing reality—that it could not always count on coal to arrive. Even though the company owned its own trains, these trains operated over the rails of private railroads that were both bottlenecked due to the weather and in large part bankrupt (Penn Central). This winter crisis and shortage of fuel led Detroit Edison to ask for a reduction in usage from its customers, which it had never done before, and also led to a system-wide five percent voltage reduction. Immediately, the company resumed work on a number of idled projects and nuclear energy was placed at the forefront as its fuel cycle was long enough to be undisturbed by such external forces. Whether or not any institutional memory of this crisis lingers at today’s DTE Energy is unknown but the wide knowledge of the benefits of a diverse fuel mix are clear, and as DTE’s press release shows, are clear to DTE itself. Further, while today’s railroads are not bankrupt, they are gridlocked, and weather-related problems are not going away.
There may be some other incentives for DTE Energy to (eventually) construct and operate a new nuclear unit on its system. DTE Energy, upon announcing the application back in 2008, noted that ordering at that date locked in eligibility for a portion of $6 billion in tax credits should the plant ever be built. Also, studies at that time showed that a new nuclear unit would still be the least expensive baseload plant for the company—but DTE stated that “changes in the regulatory structure” of Michigan would be needed to “provide the certainty needed for the investment” to build such a large and expensive plant. As we’re now well aware, the Environmental Protection Agency’s Clean Power Rule, if properly fixed and then properly implemented by Michigan, could well provide that change in regulatory structure.
Only one other COL application that specifies an ESBWR is presently active at the NRC. This is Dominion’s application for North Anna-3, which is not expected to be complete until next year.What next?
At present, judging by the guarded tone of DTE’s press release, we probably can expect an avalanche of silence. As with everywhere in the United States, the final effect of the EPA Clean Power Rule has yet to be made apparent—and this will have a major effect of DTE Energy’s choices of generating sources when finally it comes into effect in Michigan. For now, DTE is marking time—it has made its application on time to lock in tax credits that it could pass on to its customers; it awaits regulatory alteration that would protect a large capital investment; and it looks toward a time when it may have to take coal off the table. The future for this plant may appear bleak, in point of fact, but there surely is at least a glimmer of hope that it will get eventually be built.
For More Information:
GE Hitachi Nuclear Energy (website)
“Boiling Water Reactors.” Andrew W. Kramer. Addison-Wesley Publishing under contract to US Atomic Energy Commission, 1958.
“A History of Enrico Fermi Atomic Power Plant Unit 2.” The Detroit Edison Company, August 1983.
Will Davis is Communications Director, historian, newsletter editor and board member for the N/S Savannah Association, Inc. He is a consultant to the Global America Business Institute, a contributing author for Fuel Cycle Week, and writes his own popular blog Atomic Power Review. Davis is also a consultant and writer for the American Nuclear Society, and serves on the ANS Communications Committee. He is a former US Navy reactor operator, qualified on S8G and S5W plants
- 000000, 0.000000 ↩
|
Bronchiolitis is a common lung infection in young individuals. The viral infection involves the lower respiratory tract and can present with signs of mild to moderate respiratory distress. The most common cause is respiratory syncytial virus (RSV). Bronchiolitis is a mild, self-limited infection in the majority of children but may sometimes progress to respiratory failure in infants. Bronchiolitis is managed supportively with hydration and oxygen. No specific medications treat the infection.
It is important to know that respiratory syncytial virus is just one cause of bronchiolitis. The infection can occur in individuals of any age, but overall, the most severe symptoms tend to be common in infants.
The most common virus associated with bronchiolitis is the respiratory syncytial virus. However, over the years, many other viruses have been found to cause the same infection, and they include the following:
RSV accounts for the majority of cases, although in about 30% of infants, there may be 2 viruses present at the same time.
Risk factors include:
Bronchiolitis is most common in children less than 2 years of age. During the first year of life, the incidence has been reported to be about 11% to 15%. Depending on the severity of the infection, there are at least 5 hospitalizations for every 1000 children younger than 2 years of age. Bronchiolitis is classically a seasonal disorder that is most common during autumn and winter, but sporadic cases may occur throughout the year. Some of the risk factors that have been identified for severe infections include the following:
The clinical features of bronchiolitis are primarily due to airway obstruction and diminished lung compliance. The virus infects the epithelial cells in the airways and induces an inflammatory reaction that leads to ciliary dysfunction and cell death. The accumulated debris, edema of the airways, and narrowing of the airways due to the release of cytokines eventually lead to symptoms and lowered lung compliance. The patient then tries to overcome the decreased compliance by breathing harder. Typical features include:
Once RSV is acquired, the symptoms of an upper respiratory tract infection appear and include a cough, fever, and rhinorrhea. Within 48 to 72 hours, the acute infection involving the lower airways will become evident. During the acute stage, the infant may develop small airway obstruction that leads to symptoms of respiratory distress. The physical exam will reveal crackles, wheezing, and rhonchi. The severity of respiratory distress may vary from infant to infant. Some infants may have mild disease with only tachypnea, but others may show severe retractions, grunting, and cyanosis. The course of the illness may last 7 to 10 days, and the infant may become irritable and not feed. However, most infants improve within 14 to 21 days, as long as they are well hydrated.
The diagnosis of bronchiolitis is made clinically. Blood work and imaging studies are only needed to rule out other causes. Ordering serology and other laboratory tests to identify the virus is only of academic purpose. The presence of the virus in the blood does not correlate with symptoms or the course of the disease. Laboratory assays in bronchiolitis are useful for epidemiological studies and have little practical application.
A chest x-ray should only be ordered if there is clinical suspicion of a complication such as pneumothorax or bacterial pneumonia. Urine cultures may be obtained in children who have no other source of infection and continue to spike temperatures. Concomitant urinary tract infections are known to occur in about 5% to 10% of cases.
The hallmark of management for children with bronchiolitis is symptomatic care. All infants and children who are diagnosed with bronchiolitis should be carefully assessed for adequacy of hydration, respiratory distress, and presence of hypoxia.
Children who present with mild to moderate symptoms can be treated with interventions like nasal saline, antipyretics, and a cool-mist humidifier. Those children with severe symptoms of acute respiratory distress, signs of hypoxia, and/or dehydration should be admitted and monitored. These children need aggressive hydration. The use of beta-adrenergic agonists like epinephrine or albuterol, or even steroids, has not been shown to be effective in children with bronchiolitis. Instead, these children should be provided with humidified oxygen and nebulized hypertonic saline. Ensuring that the infant is well hydrated is key, especially for those who cannot eat. Oxygen therapy to maintain saturations just above 90% is adequate.
Children who develop signs of severe respiratory distress may progress to respiratory failure. These children may require intensive care for mechanical ventilation or non-invasive support. A high-flow nasal cannula is an emerging modality of non-invasive support for children with bronchiolitis. Clinical trials are in progress.
Passive immunization against RSV is available with palivizumab for those who are at the greatest risk for severe illness. During the RSV season, this requires monthly injections of the drug, but this may not only be expensive but not also not practical for most infants.
Current recommendations by the American Academy of Pediatrics support the use of palivizumab during the first year of life for children with a gestational age less than 29 weeks, symptomatic congenital heart disease, chronic lung disease of prematurity, neuromuscular disorders that make it difficult to clear the airways, airway abnormalities, and immunodeficiency. Prophylaxis may be continued in the second year of life for children who require continued interventions for chronic lung disease of prematurity or those who remain immunosuppressed.
Bronchiolitis is a self-limited infectious process. It is commonly managed with supportive care, hydration, fever control, and oxygenation. When the disorder is recognized and treated, the prognosis is excellent. The majority of children recover without any adverse effects. Past studies suggest that infants with severe bronchiolitis will develop wheezing in the future, but this has not been borne out by longitudinal studies.
About 3% of infants will require admission to the hospital, and the mortality rates vary from 0.5% to 7%. The large variation in mortality is because of different risk factors and lack of availability of intensive care units in certain countries.
If an infant has been diagnosed with severe bronchiolitis, then a pediatrician and in infectious disease expert should be consulted regarding their management.
Bronchiolitis is a common presentation to clinicians and adds significantly to the cost of healthcare. To lower morbidity, the diagnosis and management of bronchiolitis are best done with an interprofessional team that includes the emergency department physician, nurse practitioner, pediatrician, primary caregiver, and infectious disease consultant. The diagnosis is clinical, and in most cases, the treatment is supportive.
While most children benefit from hydration, some may require antipyretics and a cool-mist humidifier. About 1% to 3% of children with bronchiolitis may require admission for more aggressive respiratory support.
The key is the education of the caregiver. Clinicians, including the pharmacist and nurse practitioner, should educate the caregiver with regards to:
When the infant is ill, the caregiver should be educated about when to bring him or her to the hospital/clinician and not seek alternative care remedies. Follow up of the infant is necessary to ensure that improvement is taking place. Only through open communication with the interprofessional team can the outcomes be improved and complications reduced.
When the disorder is recognized and treated, the prognosis is excellent. The majority of children recover without any adverse effects. Past studies suggest that infants with severe bronchiolitis will develop wheezing in the future, but this has not been borne out by longitudinal studies.
|||Polack FP,Stein RT,Custovic A, The syndrome we agreed to call bronchiolitis. The Journal of infectious diseases. 2019 Feb 19; [PubMed PMID: 30783666]|
|||Jo YM,Kim J,Chang J, Vaccine containing G protein fragment and recombinant baculovirus expressing M2 protein induces protective immunity to respiratory syncytial virus. Clinical and experimental vaccine research. 2019 Jan; [PubMed PMID: 30775350]|
|||Oz-Alcalay L,Ashkenazi S,Glatman-Freedman A,Weisman-Demri S,Lowenthal A,Livni G, Hospitalization for Respiratory Syncytial Virus Bronchiolitis in the Palivizumab Prophylaxis Era: Need for Reconsideration of Preventive Timing and Eligibility. The Israel Medical Association journal : IMAJ. 2019 Feb; [PubMed PMID: 30772962]|
|||Soudani N,Caniza MA,Assaf-Casals A,Shaker R,Lteif M,Su Y,Tang L,Akel I,Muwakkit S,Chmaisse A,Homsi M,Dbaibo G,Zaraket H, Prevalence and characteristics of acute respiratory virus infections in pediatric cancer patients. Journal of medical virology. 2019 Feb 14; [PubMed PMID: 30763464]|
|||Supino MC,Buonsenso D,Scateni S,Scialanga B,Mesturino MA,Bock C,Chiaretti A,Giglioni E,Reale A,Musolino AM, Point-of-care lung ultrasound in infants with bronchiolitis in the pediatric emergency department: a prospective study. European journal of pediatrics. 2019 Feb 12; [PubMed PMID: 30747262]|
|||Lodeserto FJ,Lettich TM,Rezaie SR, High-flow Nasal Cannula: Mechanisms of Action and Adult and Pediatric Indications. Cureus. 2018 Nov 26; [PubMed PMID: 30740281]|
|||Stobbelaar K,Kool M,de Kruijf D,Van Hoorenbeeck K,Jorens P,De Dooy J,Verhulst S, Nebulised hypertonic saline in children with bronchiolitis admitted to the paediatric intensive care unit: A retrospective study. Journal of paediatrics and child health. 2019 Jan 6; [PubMed PMID: 30645038]|
|||Kusak B,Grzesik E,Konarska-Gabryś K,Pacek Z,Piwowarczyk B,Lis G, Bronchiolitis in children - do we choose wisely? Developmental period medicine. 2018; [PubMed PMID: 30636229]|
|||Gold J,Hametz P,Sen AI,Maykowski P,Leone N,Lee DS,Gagliardo C,Hymes S,Biller R,Saiman L, Provider Knowledge, Attitudes, and Practices Regarding Bronchiolitis and Pneumonia Guidelines. Hospital pediatrics. 2019 Feb; [PubMed PMID: 30610012]|
|||Picone S,Fabiano A,Roma D,Di Palma F,Paolillo P, Re-comparing of three different epidemic seasons of bronchiolitis: different prophylaxis approaches. Italian journal of pediatrics. 2018 Dec 12; [PubMed PMID: 30541607]|
|||Clayton JA,McKee B,Slain KN,Rotta AT,Shein SL, Outcomes of Children With Bronchiolitis Treated With High-Flow Nasal Cannula or Noninvasive Positive Pressure Ventilation. Pediatric critical care medicine : a journal of the Society of Critical Care Medicine and the World Federation of Pediatric Intensive and Critical Care Societies. 2019 Feb; [PubMed PMID: 30720646]|
|||Luo G,Stone BL,Nkoy FL,He S,Johnson MD, Predicting Appropriate Hospital Admission of Emergency Department Patients with Bronchiolitis: Secondary Analysis. JMIR medical informatics. 2019 Jan 22; [PubMed PMID: 30668518]|
|
An evaluation of a computer programme to aid users in determining investors’ Value at Risk of their portfolios.
Value at Risk (VaR) is the worst possible loss in an investment in a reasonable bound. VaR is widely used for educational purposes and mostly for industrial purposes. Almost every investor is concerned about the question of what is the maximum that can be lost in an investment. VaR tries to give an answer within certain boundaries and so it is very useful and the application of VaR is increasing significantly. It can be implemented in various ways. Special software is needed to compare and contrast the methods of the implementation of VaR. For financial market players who are interested in option strategies like straddles, strips, straps, and strangles, there is no straight forward software application to give the forecasted profit/loss data in the chosen strategies. People have had to calculate the strategies and respective profit or loss charts with pen and paper. Software is necessary to produce the best possible strategy; an excellent graph and profit/loss data can be obtained by a few mouse clicks.
There are quite few ways to implement VaR, such as historical simulation, the variance-covariance method, Monte Carlo simulation and the statistical method. This program produces the correct answers to each method mentioned here in a user-friendly way. The programme considers the derivative market as well and calculates VaR in forward contracts. It uses the latest Equity Option data from the web and calculates profit and loss diagrams, so that the user gets the most updated profit/loss graph. The users, especially the investors and option market players, will find it very easy, friendly and helpful to work with.
The program is built to compute VaR for various methods and to produce a very handy tool for the option traders. It is based on some literature on VaR for different methods, MS Excel and the lecture notes of Derivatives taken during our Spring Semester. It uses the up-to-date data to produce results and graphs. It is able to compute VaR for both small and big investors’ portfolios. It is easy to use and user-friendly.
2.1. Background and Context
Value at Risk is used world-wide in almost all commercial and investment banks, but the questions that come to mind are what is Value at Risk and why is it important?
2.1.1. What is Value at Risk (VaR)?
Value at Risk is the worst possible loss in an investment in a reasonable bound. It measures the potential loss in value of a risky asset or portfolio for a certain time and given confidence interval. So, if the VaR on an asset is £100 million at a 95% confidence interval in one week there is only a 5% chance that the value of that asset will drop more than £100 million in one week. In a nutshell, the Value at Risk can be described as follows –
- VaR estimates the probability of the loss, with a confidence interval and time frame.
- VaR can differ through different probability functions like normal Distribution and log-normal distribution.
- The focus in VaR is clearly on downside risk and potential losses.
- The VaR has three key elements – a specified level of loss in value, a fixed time period and a confidence interval.
VaR has been effectively used since the mid–1990s. ‘The concept and use of Value at Risk is recent. Value at Risk was first used by major financial firms in the late 1980s to measure the risks in their trading portfolios ’. The idea of using VaR as a software application has quite recently been developed by RiskWave. ‘The impetus for the use of VaR measures, though, came from the crises that beset financial service firms over time and the regulatory responses to these crises ’. But the mathematical insinuations behind VaR were largely developed by Harry Markowitz and others years ago. Their efforts were geared towards measuring the market risk and devising optimal portfolios for equity investors. In particular, their work led to the idea of how VaR could be computed. Now today, there is software which calculates VaR, mostly on the basis of MS Excel.
2.2. Scope and Objectives
The aim of this software is to produce a complete tool for people in financial markets to develop their portfolios. Investors should compute the VaR in normal distribution, log-normal distribution, historical simulation, Monte Carlo simulation and variance-covariance method. The software should be able to compute VaR for multiple assets and foreign market forward contracts as well. The answers should be correct and match any reliable program like MS Excel. The software should be chosen rather than MS Excel for its user-friendly properties and good graphics. The most user-friendly way to accept the data is the by means of a table, so the Java software should use the JTable in a very sophisticated way. The programme should count the data in both a self-generated and user-friendly way, but it should do it in very polite manner, so that the user can accept and understand it. In the case of the foreign market, the labels should be updated by selecting the appropriate currency; the user should understand how the currency works and should be able to change the currency list. For multiple assets, the user should be able to give the number of assets he has and the software should produce the correct size and length of table for a variance-covariance matrix. The tables should appear in correct sequence and order. The software is built for many kinds of investors, so the input data range may need to be very big; up to millions. The programme should be very sophisticated in order to deal with this factor and the answers produced by it should be acceptable to the user. For example, with its memory power, a computer can compute correct results up to 10 decimal places or even more. But for the user, a correct answer up to three or four decimal places is perfectly adequate, so the software should approximate the data when necessary. The graphs, which should be drawn for normal and log-normal distribution, should be well labelled, so that the user can easily understand their portfolio value and associated probability from the diagram. A table should be there to support the graph and labels statistically.
My software is very useful for both investors and option traders. It is a good tool for helping those involved in finance to compute their risk, and profit and loss over both their portfolios and stock. The software can compute VaR for the data given by the user; it is also able to handle every kind of incorrect input given by the user, can identify faults and give advice as what should be done next. It also helps the user to select the correct option in choosing a particular option strategy. It draws the graph on a high-definition drawing panel and calculates a table to show each profit/loss data for each and every movement in the stock price.
The software is able to produce the correct answer in both normal and log-normal distribution. It draws graphs and tables with both labels and probability. The programme is also able to measure the data and produce it in a sophisticated way, like in millions or not. There are extra buttons and labels, which makes the software more user-friendly and the text fields and labels are updated automatically when the user presses the right button. The colours of the input, output and drawing panels are acceptable to the users. There are more facilities such as changing the currency for the input and output panel and the conversion rate can be changed if the user so wishes. The panels can be either visible or invisible and in the correct order, so that the user is not bothered with unwanted information. For example, the tables are drawn when the ‘produce table’ button is clicked and the answer is shown when the ‘produce answer’ button is clicked. For multiple assets, the programme takes the data and draws the table in correct rows and columns. For example, if the user has only three assets, the table will have 3×3 rows and columns, but if there are nine assets, the table will have 9×9 rows and columns. These all are done by removing the first table and adding the second table on the same panel, so it looks cool. The labels are updated immediately the input and output currency are changed. All the answers in all methods support the results in the literature and MS Excel. The data shown in the answer panel are rounded off to up to four decimal places.
3. Computation of Value at Risk (VaR)
The computation of VaR has been done using various methods. It has three main parts as discussed above. The following figure provides more information about the overall structure of the VaR problem. The investment of a single asset is all that has only been considered in this part of assignment.
3.1. Statistical Methods To Compute VaR For A Single Asset
The most frequently used statistical method to compute VaR in Excel is normal distribution, but, other methods are available, like log-normal distribution. Both methods mentioned here have been implemented in the software in a very sophisticated way.
3.1.1. Normal Distribution
Normal distribution is a well known statistical method used to measure populations. It is used widely used in critical calculation. In this software, only symmetric normal distribution is used. .Working Schemes: To produce VaR in normal distribution mode, the user needs to input the correct value in the right area. The user must submit the initial portfolio value, mean, standard deviation and expected minimum value of the portfolio correctly. Then the user needs to click the button to compute VaR in normal distribution and the Java software calculates the VaR in the output panel. Here, the default percentage to compute VaR is 1%,but, the user is able to get the VaR in ant percentage by editing the text field in the output panel and clicking the ‘is’ button next to it, after the VaR is computed once. The software also gives the probability of the end-of-year portfolio, when it is less than the minimum expected value (cut-off). The user can also edit the cut-off value in the output panel and the answer is computed when the second ‘is’ button in that panel is clicked. It updates the new value in the input panel.
Most significantly, the software draws a normal distribution curve on the basis of the inputted value. The portfolio value is shown in the x-axis and the probability of each of the values is shown in the y-axis of the curve. At the bottom of the curve, there is a table to show some hand-picked data in symmetric intervals and their probability. (Here, the data is referred to for the range of the end-of-year portfolio value. The curve and the table show that portfolio value and their probability.) This gives the opportunity for the user to see his portfolio value with the probability and some measurement of the portfolio risk as well.
Again, the software is able to handle big data. There is a facility for the user to choose the ‘in millions’ option to tell the software that the input data is in millions. The software can handle these cases perfectly. It reads the output data, determines whether it is in millions or not and produces the output.
Methodology: In the output panel, there are three main outputs: the VaR, the probability of the end-of year portfolio value less than your minimum expected value, and the probability density curve. These three results are computed by three different methodologies using a normal distribution curve. The VaR is computed by the inverse cumulative normal distribution function and the probability of the minimum expected value has been obtained by using the cumulative normal distribution function . The density curve is drawn using the probability density function. Whenever the user clicks a button, the input data is handled by the software and the correct method is called for with the right button. The graphics related to the panels start being updated as soon as the commands for the method are given.
Assumptions: To implement normal distribution with all types, some assumptions are made in the software. The answers match perfectly with Excel, but in the case of drawing a curve and updating the table, an approximation has been done. There is a separate class in the software package, where the computation of inverse cumulative distribution has been done quite tactically. There are two ways to calculate the results. One is invented by me and the second one is borrowed from the ‘Java API 6’ . For big data, the software uses my method and for small data (Ex.-not in millions), the ‘Normal Distribution Interface’ is being used. The method invented by me is able to handle big data, but the answer is correct up to a certain number of decimal places. The software counts 10 intervals, keeping the mean value of the portfolio in the middle and the graph is drawn only in that range. The number is rounded off when the data is small. If the data is inputted as being in the millions, the rounding off method does not work. The portfolio values shown in the table do not reflect currency changes and the table informs this fact.
The software works well for computing Value at Risk. The user can register with the system successfully and is able to use the software embedded in the webpage. Only registered users can log on to use it. The software works well, with all its facilities in the webpage.
All the methods to compute VaR have been successfully implemented. The distributions are working properly in the program and their answers are correct in all cases. The software has a very user-friendly interface and it can check all kinds of wrong data inputted by the users. It is also able to show the message which has the error and how to correct it. It uses Java dialogue boxes, panels and many other Java swing components which make it more sophisticated from the user’s point of view. The panels and labels can be updated with the different choices of the user’s strategies. There are tables which take into account the inputted data and also produce results through updating the answer panels. The conversion rates in the software can be inputted and edited
The software meets the objective set in section 2.2, ‘to produce a complete tool for people in financial markets to develop their portfolios’. This refers to people who are investors in the domestic and foreign markets and who are interested in knowing about the VaR in their portfolios. It also refers to option traders and the people who want to make profits through various option strategies. The webpage structure and software package are both working properly.
The distribution curves drawn to compute VaR are not 100% perfect. It is fine for normal distribution, but big data is not handled well by the log-normal distribution. It was not possible to draw the labels beside the graph due to the behaviour of the log-normal density curve at this stage of the software. However, it is possible to count the biggest value and rearrange the whole draw panel to fit the density curve properly. The answers are always rounded off in the answer panels but for the big data (ex. – if the amount of money is in millions), this facility does not work. This is because the Java class inside the programme body is not able to handle big data. There are some assumptions in implementing the Monte Carlo simulations. This is because the procedure discussed in the RiskWave , is not very clear. Historical simulations are working well and are user-friendly. For investors who have multiple assets, the software produces exactly the same result as with MS Excel. Investors in the foreign market will find this software is very good for considering all the data in their portfolios and computing Value at Risk. However, this has been built on the basis of only one reference to the literature: pp 32-33 of .
4.3. Future Work
This program is just the beginning of new, essential software packages for the financial markets. This program was initially built up on the basis of a few literature reviews and some examples of problems solved in these sources. In future, further practical problems can be reviewed and included in this software. The use of different methodologies like the Monte Carlo simulation can be extended further. High definition graphic panels can be used for showing the normal and log-normal distribution curves. The computing and rounding off methodologies can be improved for big data. The graphic structure of tables and labels can be improved by the sophisticated use of Java Graphics.
This application can be extended to a mobile application. The user only needs a web-enabled mobile phone to use this excellent software package. But as the display panels are too big at this stage, they should be resized and more be sophisticated from a mobile user’s point of view. Instant messaging could be used to alert the users of the unexpected rise or fall of the user’s chosen stock options. The software should be available in both PC and Mobile version.
VALUE AT RISK (VAR). [Online] http://pages.stern.nyu.edu/~adamodar/pdfiles/papers/VAR.pdf
Risk Measurement: An Introduction to Value at Risk. [Online] http://www.exinfm.com/training/pdfiles/valueatrisk.pdf
The Early History of Option. [Online] http://www.sfu.ca/~poitras/heinz_$$.pdf
Hoadley Trading & Investment Tools. [Online] http://www.hoadley.net/options/develtoolsvar.htm.
@Risk. [Online] http://www.palisade.com/risk/?gclid=CNesw5uWiaICFR2Y2AodmGuTUQ
@Risk (Monte Carlo Simulation). [Online] http://www.palisade.com/risk/monte_carlo_simulation.asp.
Option-Aid [Online] http://www.mindxpansion.com/options/index.php
Visual Options Analyzer [Online] http://www.voptions.com/index.htm
TD Ameritrade. [Online] http://www.tdameritrade.com/welcome1.html
Java. [Online] http://www.java.com/en/
Java™ Platform, Standard Edition 6 API Specification [Online] http://download-llnw.oracle.com/javase/6/docs/api/
Eclipse [Online] http://www.eclipse.org/
Apache Commons (Normal Distribution Interface) [Online] http://commons.apache.org/math/
The Java™ Tutorial [Online] http://download.oracle.com/javase/tutorial/index.html
JFreeChart [Online] http://www.java2s.com/Code/Java/Chart/JFreeChartXYSeriesDemo.htm
Web Server [Online] http://shark.cs.stir.ac.uk/
HTML [Online] http://www.w3schools.com/html/
PHP [Online] http://www.php.net/
Dreamweaver [Online] http://www.adobe.com/products/dreamweaver/
Normal Distribution [Online] http://en.wikipedia.org/wiki/Normal_distribution
Normal Distribution [Online] http://mathworld.wolfram.com/NormalDistribution.html
Log-Normal Distribution [Online] http://en.wikipedia.org/wiki/Log-normal_distribution
Inverse Log-Normal Distribution “Microsoft Excel Help Section”
Error Function [Online] http://en.wikipedia.org/wiki/Error_function
Error Function [Online] http://mathworld.wolfram.com/Erf.html
RiskWave (MIZUHO) [Online]
Object to Double [Online] http://www.roseindia.net/java/java-conversion/ObjectToDouble.shtml
Sorting Array [Online] http://mathbits.com/mathbits/compsci/arrays/Exchange.htm
Financial Modeling, Simon Benninga, (third edition), chapter 15, Value at Risk
Bull Spreads [online] http://en.wikipedia.org/wiki/Bull_spread
Bear Spreads [online] http://en.wikipedia.org/wiki/Bear_spread
Butterfly Spreads [Online] http://en.wikipedia.org/wiki/Butterfly_%28options%29
Covered Call [Online] http://en.wikipedia.org/wiki/Covered_call
Protective Put [Online] http://www.optionseducation.org/strategy/protective_put.jsp
Collar [Online] http://en.wikipedia.org/wiki/Collar_%28finance%29
Straddles [Online] http://en.wikipedia.org/wiki/Straddle
Strips and Straps[Online] http://www.finance-lib.com/financial-term-strip-strap.html
Strangles [Online] http://en.wikipedia.org/wiki/Strangle_%28options%29
Intrinsic Value [Online] http://en.wikipedia.org/wiki/Intrinsic_value_%28finance%29
Time Value [Online] http://en.wikipedia.org/wiki/Option_time_value
Financial Time Market Data for UK Equity Option by Stock [Online]
Rounding off numbers [Online] http://www.roseindia.net/java/beginners/RoundTwoDecimalPlaces.shtml
Draw Image [Online] http://www.cs.stir.ac.uk/~sbj/examples/Java-examples-advanced/DrawImage/
PHP File Writing [Online] http://www.tizag.com/phpT/filewrite.php
DB pear [Online] http://pear.php.net/package/DB/redirected
|
A cobot (from collaborative robot) is a robot intended to physically interact with humans in a shared workspace. Thanks to sensors, collaborative robots (cobots) are able to interact directly and safely with humans. This is in contrast with other robots, designed to operate autonomously in a workspace with limited guidance.
Examples of cobots
Today, cobots are produced by almost all major traditional robot manufacturers. Since about 2016 they realize that they will play an indispensable role next to the well-known factory robots because of their flexibility, lower purchase price and safety. Cobots were invented by Rethink robots from the United States. This company has gone bankrupt, but will go down in history.
Applications of cobots
Because of their versatility and flexibility, cobots are suitable for many different applications. In the metal industry they can do CNC loading, bending, deburring, polishing and welding. In a laboratory they test and perform analyses that are repetitive and require precision and consistency. Especially when projects are time sensitive, the cobot is a godsend. It works all day and all night if it is programmed in this way. And programming is simple: the intuitive software makes it easy to program the cobot yourself, without having to write a line of code. Because the tasks of the cobot are stored in software, you can also change tasks quickly.
|
|This picture of the descent stage ladder and footpad comes from the 16mm "DAC" film taken on May 22, 1969, during the dramatic moments when the stage was jettisoned.|
Snoopy's tail was jettisoned into lunar orbit on May 22, 1969, during a daring mission that paved the way for the first moon landing less than two months later. Apollo 10 was the first mission to take a Lunar Module to the moon; the first test of all the hardware and procedures. All except landing. It was the first demonstration of Lunar Orbit Rendezvous, the risky, radical, "sine qua non" of Apollo.
The stage orbit was unusual, in terms of Apollo orbits. In order to demonstrate undocking, firing the LM descent engine to approach the moon, and then firing the ascent engine for the rendezvous, NASA had a problem. Without any landing, they needed a way to arrange for the right timing of the maneuvers. The descent would put the LM in a lower orbit, moving it ahead of the Command Service Module. (The "CSM".) Demonstrating the ascent and rendezvous required that the CSM be leading the LM. The solution was the "Phasing" maneuver. This special burn, never performed by any other Apollo mission, would raise the high side of the LM orbit to 190 nautical miles above the far side of the moon, slowing down the LM's orbital period enough to allow the CSM to overtake it.
|This plot of the LM position relative to the Command Module, from mission planning documents, shows how the "Phasing" burn pushed the LM into a higher orbit, so that it would drop behind the CM, giving the right alignment for rendezvous.|
While the LM was in the Phasing orbit, 12 n.m. at its low point, and 190 at the high point, the descent stage was jettisoned, with an initial velocity relative to the ascent stage of around 2 feet per second. (Both parts were zipping along at a mile a second at this point.) The goal was to kick the stage forward, but unexpected problems with the attitude controls during staging altered this, and the stage was pushed "upward" relative to the local horizontal at the time of staging. (Notice that the moon is "upside down" in the picture above taken during staging...it wasn't supposed to be this way.) Regardless of the extra drama, ten minutes later, the stage was at a safe distance, and the crew fired the ascent engine, slowing their velocity and lowering the high side of their orbit, putting them on track for a successful rendezvous and docking. The stage was left behind in the phasing orbit. It was assumed that this orbit would quickly decay, impacting the moon within days or weeks.
As I starting running simulations of the stage orbit, the hope for a quick demise did not pan out. I ran the simulations out longer and longer, out 10 years, and still the stage kept going. Finally I decided to run the simulation out to the present. This took about 40 hours on my laptop. At the end, the stage remained in orbit all the way to the present, with no sign of decay or orbital instability. As I build out this blog I will share more details, and show you how to try it to see for yourself.
Post a Comment
All comments are moderated. Please keep it respectful, non-commercial, and relevant to the topic of the blog. Thanks! Roger.
|
Distortion and overdrive are the characteristic tones of electric guitars. A staple of many genres where electric guitars are used, the gritty or growling tone, which is what most people describe this tone as was initially achieved when amps were pushed to their limits and started clipping the signal.
Then manufacturers started making amps with Gain control to achieve this while still keeping the volume at reasonable levels. Then come a variety of effect pedals, but still, amps of today can produce a decent overdriven sound on their own without the need for a pedal.
Distortion, while used interchangeably with the term “overdrive,” is actually a more extreme form of overdrive.
In this article, we’ll learn:
- how to add distortion effect to electric guitars using just the amp
- distortion settings for tube amps
- distortion settings for standard (solid-state) amps
- settings for the guitar knobs and pickup selector for an optimal distorted sound
- some tips for distorted guitar playing so that the tone doesn’t get muddy and lost
How to Add Distortion to Electric Guitars using Amp Settings
Some decades back, guitarists figured out that if they pushed the volume past the amp’s limits, they could create a distorted sound. This became very common in the blues and rock genre, and manufacturers then started adding another control knob to do this while still having control over the volume.
Now, many amps have a Clean and an Overdrive channel and a switch to change between the two. The Overdrive channel, as the name suggests, offers the ability to overdrive or distort the sound of your guitar. Typically, each channel will have a Volume control (knob), and the other knobs, such as bass, treble, mid, etc., will be shared between the two channels. The Distortion channel will usually have a Gain knob, which we will be used to overdrive the signal.
Steps to add distortion using the Overdrive channel
- Turn the Volume and Gain knob all the way down on the Overdrive channel and press the Overdrive channel switch to activate it.
- Now turn the Volume to around a 9 o’clock position and set the Gain high to something like a 3 o’clock position.
- If you have separate EQ knobs, set the Bass at 12 o’clock, Mids at 9 o’clock position, and Treble at 3 o’clock. Or if your amp has a Tone knob instead, set it to a 3 o’clock position.
- Strum a note and see how it sounds; adjust the Gain and Volume according to your preference. You’ll see that you don’t necessarily have to set the volume high, as the Gain adds volume to the output.
The terms used for different controls on your amp may vary depending on the amp model and manufacturer.
- The Overdrive channel may be called the Distortion channel or OD channel.
- Gain control may be named Drive, Distortion or Overdrive
Steps to add distortion with Master Volume and Volume
In case your amp has a Master Volume and Volume control design, mostly found in tube amps. You’ll have to treat the Volume knob as the Gain and the Master Volume as the Volume. The Volume control internally controls the preamp volume, while the Master Volume controls the power amp volume.
By doing this, the signal can be distorted by overdriving the preamp while keeping the power amp volume safe for both the amp and our ears.
To add distortion using such amps, do the following:
- Start with setting the Bass knob at 12 o’clock, Mid at 9 o’clock, and Treble at 3 o’clock position. For amps with a Tone knob, set it to a 3 o’clock position.
- Set the Master Volume (or MV or Master) pretty low, around a 9 o’clock position.
- Set the Volume knob high, like you would the Gain knob, to something between 12 o’clock and 3 o’clock position.
- Strum a note and make Volume adjustments to how much distortion you want.
- Set the Master Volume to how loud you want the sound to be.
The settings for other controls depend mostly on your taste, music style, and genre. Most amps either have a Tone knob that sets the EQ or separate knobs for Bass, Mids, and Treble.
You can set these knobs according to your style of music, but as a general guideline, you would want the Bass to be quite high and the Treble even higher. This ensures that the distorted tone sounds and feels great without getting muddy or flat. But remember to play around with these settings until you get the best sound you like.
Many amps also have other effect controls like Chorus, Delay, and Reverb. You can also play around with these, but remember that too many effects generally don’t play well with distorted sounds. You can add a bit of chorus and some reverb, but too much might muddy up the tone.
As a general rule for a distorted sound, you can set the guitar’s Volume and Tone knobs at maximum. Again, you’re free to play around with the Tone knob. I would, however, recommend doing it only when you have already got a decent distorted sound from just the amp settings.
You can try the bridge pickup for an aggressive tone if your guitar has multiple pickups and a selector switch. This would be suitable for guitar solos. For rhythm guitars, you can try the neck pickup.
Guitar Techniques / Tips for a Better Distorted Sound
Many people think rock and metal music performers use extreme gain settings to achieve the distortion and fuzz, which isn’t exactly true. Live performers often favor distortion by increasing the volume to the extremes to create a more natural effect while keeping the gain fairly low. While for recorded music, the artists often have multiple distorted tracks at lower gain to beef up the final sound.
These techniques result in a cleaner distorted sound with little or no muddiness. Also, a lot depends on the guitarist and their playing style and techniques. You’ll have to employ certain specific techniques to get the best sound. The guitarist’s techniques are often underplayed by many who think that a high-end amp and gears are all it takes.
While high-end gear would certainly improve the sound output, it can’t compensate for the guitarist’s lack of techniques.
The following are some tips and techniques to practice for distorted guitar playing:
- Generally, use less distortion than you think you need.
- Practice muting. It works very well with distorted sounds.
- Keep unintentional/unwanted hits to the strings to a minimum.
- Use power chords instead of regular chords, especially for rhythm guitars. You play power chords by fretting only the root and fifth notes. The third note is what generally muddies the tone.
- Practice your timings and be aware of how many strings you’re playing at a time. Too many strings at once would usually muddy up the tone.
- A good quality but less-powered amp with extreme volumes will generally work better. The lesser power output would mean you are still at reasonable levels while cranking up full or near-full volumes.
Apart from these, a decent quality amp would certainly make a difference as they are more capable of maintaining clarity under heavy volume and gain. An overdrive/distortion pedal on a clean channel is also a great option once you have mastered the basics.
Electric Guitar Distortion – Related Questions
Do All Electric Guitars Have Distortion?
Distortion is not a characteristic or feature of a guitar. It is an effect that is achieved by shaping the tone or signal of the guitar by either the amp itself, an effect pedal, or both.
Distortion is the gritty, growling tone typical of many music styles, such as blues, rock, and metal.
Can You Add Distortion to an Acoustic Guitar?
Yes, if it is an acoustic-electric fitted with a microphone or magnetic pickup.
Acoustic (acoustic-electric) guitars use different pickups and different amps than electric guitars. The characteristic of this setup is that the final sound output remains as close as possible to the original, that is, the "acoustic" sound. On the other hand, electric guitars are meant for tone shaping/coloring; hence, the amp is essentially an extension of the guitar itself insomuch as the tone is concerned.
This is to say: an acoustic guitar hooked to an electric guitar amp would sound bad, which is because tone coloring is an inherent part of electric guitar amps. It doesn't play well to varying degrees with an acoustic guitar. On the other hand, an electric guitar would sound very thin and almost tinny with acoustic amps because they are meant to amplify the original signal without altering it much.
With that out of the way and to answer the question, it is possible to use distortion on an acoustic guitar by using an effect pedal and an acoustic guitar amp. The amp itself wouldn't be able to add distortion on its own, though. The result would vary greatly depending on the pedal, the guitar, the pickup, and the amp. And you would probably need some trial and error to get a good distorted sound out of it.
Adding distortion to an electric guitar with just the amp settings is not only possible, but it sounds excellent with a decent amp and good techniques. Remember to keep the Gain low and practice your techniques for a better sound. Remember, your attack or how you hit the strings while strumming and the force can affect how the tone sounds.
After learning the basics and being comfortable playing distorted sounds, you can go for the many distortion/overdrive pedals to get an even better sound with much more control over the different settings that make up an excellent distorted sound.
|
The East German flag was the official national flag of the German Democratic Republic (East Germany) during its existence from 1949 to 1990. The design and symbol of the flag are from the flag of the Weimar Republic and communist symbolism.
The flag was considered illegal in West Germany and West Berlin as an unconstitutional and criminal symbol, where it was referred to as the Spalterflagge until the late 1960s.
On the 100th anniversary of the March Days in Berlin in March 1948, the Second People’s Congress was convened in Berlin.
In addition to drafting a national flag for the state of the German Democratic Republic, it should be seen as the German People’s Council for the reorganization of the entire state.
There was a choice between three flags, one red, the other black-white-red, and the last option black-red-gold.
The offer to introduce the red flag was quickly rejected. This flag was rejected by the bourgeoisie as a sign of the communist and international workers’ movement even during the November Revolution of 1918 (and beyond).
Like Germany, this decision must be in favor of the black, red and gold flag of the Weimar Republic. The Soviet Union was initially opposed to the flag.
As a symbol of the Weimar Republic, they recall a time of weakness, crisis and unemployment.
Thus, the black-and-red flag remained. This goes back to the Free German National Committee. The committee established the old Reich flag on June 12 and 13, 1943, under the leadership of the Soviet Union.
This flag should be considered as a sign of the struggle against the Nazi fascist regime under Adolf Hitler and the Swastika flag.
The Third People’s Congress of 1949, established by the Soviet occupation in 1948, re-introduced East Berlin Mayor Friedrich Ebert and proposed a black-and-red gold flag. His request was approved on May 30, 1949, and on September 7, 1949, the Government Logo and Flag Act were implemented on October 7, 1949.
Thus, the West (FRG) and East Germany (GDR) had the same national flag. East, but only in the first ten years of its existence. During this time, the FRG competed with the same GDR design in terms of color.
On October 1, 1959, the GDR added its national emblem, “a hammer and compass surrounded by a circular ring of flowers,” to distinguish it from the Federal Republic flag. The logo was a symbol of unity between workers, farmers, and intellectuals.
Publicly presenting this as the “Soviet flag” designated by the FRG flag, however, was seen in the late 1960s as a violation of the constitution and a disturbance of public order in the FRG and West Berlin, essentially by police action. .
Even when the GDR flag was raised abroad, the West German protests were stereotypical. It was not until July 22, 1969, that the Federal Government (Grand Coalition) was instructed that the police should take further action everywhere against the use of the flags and emblems of the Eastern Democratic Republic.
Since the GDR was not yet recognized under international law, in 1968 teams with athletes from both parts of Germany began competing in sports such as the Olympics.
The GDR Olympic Committee refused to compete with the Federal Republic flag and the German Olympic Committee continued until the last moment and there was no change in the black and red gold flag. In the end, he still managed to reach an agreement.
They were sitting on the red ribbons of the black, red, and gold flags of the Olympic rings in white. As part of the international recognition of GDR by the United Nations and the recognition of GDR sovereignty by the FRG, since the 1972 Winter Olympics, two separate teams have competed with two separate flags.
With the introduction of the new national flag in 1959, a new trade flag was introduced. Before GDR led the unmarked black-red gold flag as the flag of the merchant.
The new merchant flag has a smaller badge in the upper corner. 1973 This flag of the merchant was abolished again and replaced by the national flag, which was the order of the national and merchant flag.
After the political turning point in 1989 in the GDR, the working group formed the “new GDR constitution”, proposing a new constitution and a new national flag.
They should be black-red-gold stripes, but instead of a government emblem, they should show the slogan of the sword to the plow. Other political events with the end of the reunification and the formation of the German People’s Republic did not allow the constitution and therefore the new flag to be implemented.
Meaning and colors
During the preparation of the new constitution for West Germany, the discussion of its national symbols took place in August 1948 during a meeting in Hernheimse.
Although there was opposition to the creation of a national flag before joining the East, it was decided to continue.
The reason for this decision was basically the constitution proposed by the Eastern SED in November 1946. Where black-red-gold was proposed as the colors of the future German Republic.
While there were other proposals for a new flag for West Germany, the final choice was between two designs, both using black and red gold.
The Social Democrats proposed re-introducing the old Weimar flag, while conservative parties such as the CDU / CSU and the German Party put forward a proposal by Ernst Wermer, a Member of Parliament for the Rat (Parliamentary Council) and the Chancellor’s future adviser.
Weimer proposed an example of the 1944 “Resistance” flag (using the black-and-red gold design in the Nordic cross pattern) designed by his brother and his accomplice, Joseph, on July 20.
Eventually, three colors were chosen, largely to show the continuity between the Weimar Republic and this new German state. With the adoption of the German (West) Constitution on May 23, 1949, the three colors of black and red gold were adopted as the flag of the Federal Republic of Germany.
In 1955, residents of the French-administered Saarland region voted to join West Germany.
Since its founding as a separate French protectorate in 1947, the star has had a white Nordic cross on a blue and red background as a flag.
To demonstrate Sar’s commitment as part of West Germany, a new flag was chosen on July 9, 1956: the three colors of black-red-gold were adorned with the new emblem, which was also proposed on this day.
The flag was flown on January 1, 1957, with the establishment of Saarland as a state of West Germany.
While the use of black and red gold in the Soviet Union was proposed in 1946, the Second People’s Congress in 1948 decided to adopt the three old red-black colors as a national flag for East Germany.
The choice was based on the use of these colors by the National Committee of Free Germany.
In 1949 the three colors red-red gold were instead chosen as the flag of the German Democratic Republic.
From 1949 to 1959, the flags of West and East Germany were the same. On October 1, 1959, the East German government changed its flag by adding a badge.
In West Germany, these changes were seen as a deliberate attempt to divide the two Germanys.
The display of this flag in West Germany and West Berlin was considered a violation of the Constitution. Also, it was subsequently banned until the late 1960s.
East German Flag Color Codes
RGB: (0, 0, 0)
CMYK: NAN, NAN, NAN, 1
|Name: Tangerine Yellow|
RGB: (255, 206, 0)
CMYK: 0, 0.192, 1, 0
|Name: Electric Red|
RGB: (221, 0, 0)
CMYK: 0, 1, 1, 0.133
Pictures of East German flag
Download images of East German Flag
Download free images of East German flag in three formats (PNG, JPG, and Icon)
The German Democratic Republic
East Germany, officially known as the German Democratic Republic was a communist state in the Eastern Bloc during the Cold War.
That ruled from 1949 to 1990 in the German-occupied territories of the Soviet Union.
In 1990, the Federal Republic of Germany (German: Bundesrepublik Deutschland) was formed by joining West Germany.
The German Democratic Republic was established on October 7, 1949 in East Berlin. This happened five weeks after the announcement of the existence of the Federal Republic of Germany in West Germany.
The country declared full independence in 1954 but was still stationed by the four world powers at a post-Soviet summit.
This was due in large part to the large US military presence in West Germany and the Cold War. East Germany was a member of the Warsaw Pact.
On March 18, 1990, free elections were held for the first time in the country. As a result, the ruling Socialist Union Party lost its majority in Volkswagen (East German parliament). (Previously, the party’s majority was guaranteed in the elections).
On August 23, Volkswagen Kamer voted for East Germany to join the Federal Republic of Germany. As a result of the reunification of the two Germanys, the German Democratic Republic was abolished.
The East German economy began to weaken due to the devastation caused by World War II.
The loss of many young soldiers, the disruption of trade and transportation, the Allied bombing activities. It destroyed cities, and the reparations owed to the USSR.
The Red Army dismantled the infrastructure and industrial plants of the Soviet-occupied region and transferred them to Russia. In the early 1950s, compensation was paid for agricultural and industrial products.
The government used money and prices as a political tool. Also, they provide very subsidized prices for a wide range of basic goods and services.
At the production level, artificial prices created a system of half-trading and resource hoarding. For the consumer, it led to the replacement of GDR money with time, exchange, and hard currencies.
The socialist economy became increasingly dependent on the financial injection of foreign currency loans from West Germany. Meanwhile, East Germans devalued their soft currency against the Deutsche Mark (DM).
Economic problems will also continue after the reunification of West and East in East Germany.
According to the Federal Office for Political Education (June 23, 2009) “In 1991 alone, 153 billion Deutschmarks were transferred to East Germany for revenue, job support and infrastructure improvement, bringing the total to 1.634 trillion marks. It was so high that public debt in Germany more than doubled.
One thought on “Flag of the German Democratic Republic”
|
Learn how to classify spiders
Learning stageEarly Stage 1, Stage 1, Stage 2, Stage 3
On this page...
Spiders live on every continent of the world, except Antarctica. They can be placed into three groups – burrowers, hunters and weavers – based on their physical features and the way they catch their prey.
- Spiders can make up to seven different types of silk.
- Some burrowers place silk ‘trip lines’ near their burrow entrances to detect prey.
- Australian water spiders can stay underwater for about one hour!
- If you were a hunting spider, what would help you to catch your prey?
- How would you catch your prey if you lived underground like a burrowing spider?
- How would you catch flying insects if you were a spider?
- Can you think of an example of a burrower, hunter and weaver that you have seen?
You can identify a spider as a burrower, hunter or weaver by looking at its external features, by thinking about where it lives and how it catches its prey.
In this downloadable worksheet, students can sort pictures of Australian spiders with the help of some facts about each group.
|
What is the difference between waiting out a student’s misbehavior versus getting into a power struggle?
The mindset of a power struggle is, “I have to control the child to make them behave.” This mindset can result in the following behavior on the part of the adult:
- Use of anger to evoke shame to change the student’s behavior,
- Use of lectures and threats, and/or
- Adding on punitive consequences.
Many students know how to wait out the adults versus the other way around with the adult waiting out the student. The child knows that if they throw a temper tantrum and refuse long enough, the adult may eventually give in. For this reason, many children have been trained to extend their temper tantrums until they get what they want while not being compliant with the adult’s direction.
Why is this harmful to the child? The temper tantrum stops and the child gets what they want, so what’s the big deal? When the adult gives in to the temper tantrum or allows a child to refuse to follow a direction, it is damaging the relationship in several ways. It sends the implicit message to the child that they are weak and unable to manage their behavior. The child then loses faith in themselves and respect for the adult in charge. Without this mutual respect, the child loses out on a healing connection with the adult. Adults are responsible for creating a safe, consistent, and secure environment that is conducive to a healing relationship between adult and child that allows the child to mature. A mature child thinks and cares not only for themselves but for others.
Without this follow through, children may get stuck in an earlier developmental stage and remain immature. Children who always get what they want can develop personalities that are selfish and egocentric. Children do not learn to manage their frustration, accept limitations, and develop healthy coping skills when adults give in to their misbehavior. When children have poor coping skills, it limits their ability to access the world around them. Inappropriate behavior interferes with the ability to take care of basic needs like shopping for oneself, getting a job, keeping a job, building and maintaining friendships, and having a social life. Lacking the ability to care for oneself or long-term friendships can leave the child unhappy and lonely.
Waiting it Out
As adults, we want to learn how to wait out a child’s tantrum in a way that helps them learn how to behave and follow adult rules, while also maintaining the relationship between the adult and child. Waiting it Out requires a mindset of: “I have faith that the child can figure this out!” When we have this mindset and are working with children, it is more likely to result in the adult:
- Calmly waiting for the child to follow the expectations,
- Having a calm body and mind (no anger, lecture, or threats), and
- Using “tea talk” as appropriate (as covered in the book) or remaining silent.
This technique requires a strong teaching team and having a behavior plan in place. Teams also understand that temper tantrums and refusal are part of learning and growth and not something to appease. Waiting it out does not mean the student gets to do whatever they want. Rather it means you remove the audience, and allow the child to be angry, bored, or emotional until they are ready to follow adult directions. Waiting it out is often done away from the classroom (in an office, safe room, designated time out area, etc.) so the teacher can continue teaching. The adult should not give emotional energy to the child, so no talking to the child, don’t look directly at them, etc. The adult supervises, and as much as possible, works on other things (paperwork, emails, etc.) until the child follows directions. The child does not move on with their day until they have followed the original expectation.
Many of the children we work with are stuck at a lower stage in their conscience development, so they need adults who are willing to wait them out until they comply. The child will become more mature as they follow the adult’s expectations.
When children learn to follow healthy adult directions (as reviewed in the compliance section of our book), the child understands their place in the world. They are more likely to feel that their world is safe and orderly, and they can trust adults. An orderly world helps a child feel secure and free to explore within the appropriate limits and boundaries of their maturity. Also, with consistent responses and follow through by an adult, the child learns cause-and-effect thinking, which helps with future decision making. When a child can handle limits and boundaries by an adult, they can generalize this to relationships with their peers. They are then more likely to be successful in peer relationships. In the long run, children are happier and more successful when adults wait their tantrums out.
To learn more come to one of our classes or take an online training.
- Website: www.healingchildrenllc.com;
- Phone: 1-888-311-1883;
- Email email@example.com
|
Table of contents:
Video: 10 Foods High In Cholesterol
10 foods high in cholesterol
What is the rate of cholesterol in the blood of men and women, what types of cholesterol is, what is the rate of its amount in the blood, what is cholesterol in general, what is it like, why did nature come up with it, etc.? We have already written about this earlier.
Today we will consider selectively a few foods containing high cholesterol.
TOP 10 foods high in cholesterol
1. Brains. Brains belong to category 1 by-products. As a rule, offal contains 20-80% water, 12-20% protein and up to 12% fat. For example, beef brains have a high protein content of 11.7 grams and a low fat content of 8.6 grams per 100 grams. Brains contain vitamins PP, B1, B2, E, as well as calcium, magnesium, sodium, potassium, phosphorus, iron and iodine.
Brains are valuable for their high phosphorus content. In addition to the above, they also contain lecithin necessary for proper metabolism in the human body. However, in addition to lecithin, this product contains 2000 mg of cholesterol per 100 grams. Probably, it's not for nothing that people use brains very rarely (calorizer), if not to say more - they don't eat them at all. However, in restaurants such a dish is served and gourmets value veal and beef brains higher, since they are larger and more tender.
Brains are consumed fried.
2. Kidneys. They, like brains, belong to category 1 offal. Kidneys have a specific taste and smell, however, if cooked properly, they can be removed. To do this, they are soaked or blanched.
For a healthy person, properly cooked beef kidneys will be an extremely healthy product. The main harm lies in the cholesterol content. They contain about 1126 mg of cholesterol per 100 grams.
If you have chronic diseases, you should not use the kidneys or only after consulting your doctor. I am glad that culinary dishes with kidneys, even if they are very tasty, are not particularly popular with consumers.
However, in many restaurants, kidneys are used for making saltwort, pickles, and second courses.
3. Shrimp. All shellfish (shrimps, crayfish, lobsters, crabs, lobsters) contain a large amount of cholesterol, which can enter fat into the cell, and maybe remove it. Shrimp cholesterol introduces fat into the cell. Therefore, of all seafood, shrimp is the most dangerous product in terms of high cholesterol levels. Shrimp do contain a lot of cholesterol compared to other seafood.
With just 130 grams of this popular seafood, we get our daily dose of cholesterol. 100 grams of shrimp contains 150 mg of cholesterol. It is a pity that we can eat such a useful product in such a small quantity (calorizator). After all, shrimp are rich in protein, contain iodine, all fat-soluble vitamins - A, K, E and D, trace elements, in particular, potassium, magnesium, zinc.
If your cholesterol level is normal, then you can eat a small portion of shrimp 2 times a week, but if you have high cholesterol, then shrimp are forbidden to you, or are allowed in very small quantities.
4. Fish roe. An interesting fact is that the cholesterol content is the same in red caviar, black caviar, and capelin caviar. 100 grams of fish roe contains approximately 100 mg of cholesterol.
But the good news is the high content of Omega-3, Omega-6, and lecithin, which neutralizes the fatty alcohol found in the eggs themselves. Caviar contains a rich set of vitamins and minerals, which makes it a healthy dish.
However, it is worth remembering about the content of cholesterol in caviar, and about the presence of salt, vegetable oil and other preservatives during salting (glycerin, sorbic acid, sodium benzoate, preservatives). This means that a person should not eat more than three tablespoons of caviar per day.
5. Pork. Pork meat is the most demanded type of meat consumed all over the world, with the exception of some countries. Contains a lot of proteins and fats, and, accordingly, cholesterol. Eating one pork chop - a standard 200 grams, we get 200 mg of cholesterol, i.e. 100 grams of pork (medium fat) contains 100 mg of cholesterol, lean meat - 88 mg.
When choosing pork, try to give preference to leaner pieces, trying to cook it without frying. The best way to cook pork is in the oven in foil or in a slow cooker. You can boil it, but in this case, the meat will give some of the nutrients to the broth.
Only animal products are rich in cholesterol. But do not give up completely from animal products, they contain many useful and necessary vitamins and minerals for the body. You just need to limit their consumption.
6. Fish carp. It is considered an oily fish that raises cholesterol. However, carp also contains fish oil, which is beneficial to the body. In addition, carp is rich in vitamins and minerals, which makes it even healthier. The phosphoric acid contained in carp is involved in the construction of numerous enzymes (phosphatases) - the main engines of chemical reactions in cells. The tissue of our skeleton consists of phosphate salts.
Lovers of this fish will surely be upset to learn that they are not advised to eat more than 100 grams of carp per day, because if they eat only 100 of this fish, they will receive as much as 250 mg of cholesterol. By the way, from stellate sturgeon and horse mackerel we also get a lot of cholesterol (see the table below). But this amount will be quite enough for the body to obtain useful substances.
7. Cheese. It is made from milk and lactic acid bacteria. Cheeses are high in protein, milk fat and minerals. Cheeses are rich in vitamins A, D, E, B1, B2, B12, PP, C, pantothenic acid and others. The dithyrambs are singing about the benefits of cheese.
This is so, but if you look at the cholesterol content in 100 grams of hard cheese, then there is already 120 mg of it, in soft and salty cheeses - about 70 mg. The high cholesterol content is due to the fact that any cheese is made from milk that contains milk fat. It is estimated that a kilogram of cheese contains more of it than a kilogram of meat.
Therefore, you cannot eat more than 160 grams per day of this wonderful product. But even this amount is able to endow the body with all the necessary beneficial vitamins and minerals.
8. Egg yolk. Chicken, duck and goose eggs are most often eaten. But turkey, quail, ostrich eggs and eggs of other birds are also eaten.
In a chicken egg, the yolk contains neutral fat - 23%, protein - 16%, phospholipids - 11%, cholesterol - 1.5% and minerals - 3%. At the same time, 100 grams of egg yolk "give" us about 1200 mg of cholesterol. Of course, this is a lot, but the weight of a chicken yolk is only about 16-18 grams, respectively, 1 yolk contains about 200 mg of cholesterol, so you can use the yolks in moderation.
To reduce the level of cholesterol consumed with eggs, it is worth using 1 yolk from 2-3 eggs, from the rest, take only protein. The appearance and taste of such a dish will not change much, but the benefits will be higher.
And remember, don't just eat raw eggs, always cook them.
9. Cream with 20% fat. In its composition, 20% cream (medium fat) contains several groups of vitamins: A, PP, A (RE), beta-carotene, B1, B5, B2, B6, B12, B9, E (TE), C, H, D, choline and chemical elements represented by calcium, sodium, magnesium, potassium, chlorine, phosphorus, zinc, iron, iodine, selenium, copper, fluorine, manganese, molybdenum and cobalt.
However, 70 mg of cholesterol is contained in 100 grams of 20% cream. This means that it is strongly discouraged to consume more than 1.5 cups of cream a day due to its high fat content, especially if there are problems with blood vessels and heart.
Cream is good to add to tea and coffee or to prepare a variety of sauces from them.
10. Butter. The food is high in fat and calories, which leads to an increase in cholesterol levels. Butter contains 185 mg of cholesterol in 100 grams. A person needs to eat one large buttercream brownie to get their daily cholesterol intake.
However, along with the harmful properties, butter is beneficial for the body, it is rich in fat-soluble vitamins such as vitamins A, E, K, D, as well as vitamins C and B. Butter has a beneficial effect on the condition of the skin, nails and hair.
Therefore, moderate consumption of butter will not harm your health. You can eat 10-20 grams of oil daily, either as a separate meal or as part of meals.
We looked at 10 foods with the highest cholesterol content - these are kind of "champions". But how much cholesterol is contained in other foods we eat every day or occasionally, only on holidays? Let's start with the “worst” ones.
Cholesterol content in staple foods
Drawing a conclusion from the information read, we can say the following: the most dangerous for a person are not those foods in which cholesterol "rolls over", but those that we use most often, believing that they only bring benefits, without taking into account such an indicator, as the amount of cholesterol in this product. You need to learn to eat right yourself and teach your children to choose more “correct” and wholesome foods, to know when to stop in foods rich in cholesterol.
When we sit down to have lunch or just have a snack, we never think about the cholesterol in our dishes. Eating as much cake as you like, or drinking, for example, a couple of glasses of heavy cream, does not seem dangerous for us. In the meantime, it is the acquired cholesterol that becomes the culprit for the development of many terrible diseases. We hope that this article will help you build your diet more correctly and always be healthy!
Author: Anna K. (specially for Calorizator.ru)
Copying of this article in whole or in part is prohibited.
|
You probably already know that vaping among youth has been deemed an epidemic by the U.S. Surgeon General. The numbers don't lie: almost 1 in 4 eleventh graders in Iowa have vaped in the last 30 days...
HOW WE CAN HELP Get the truth about vaping, smoking and other tobacco products so you're not left in the dark when it comes to your future. If you decide you want to quit, we give you the tools you...
Tobacco comes in many forms and None of them are safe. Any amount of tobacco use can cause addiction and be harmful to your health. Understand the consequences of vaping and tobacco use, and nicotine...
Iowa Students for Tobacco Education and Prevention
(ISTEP) is Iowa's youth-led tobacco prevention
LEARN MORE GET INVOLVED
Find A Chapter In Your Area
How To Start A Chapter
Register A Chapter
Iowa Department of Public Health
Iowa Department of Public HealthDivision of Tobacco Use Prevention and Control321 E. 12th StreetDes Moines, Iowa 50319Phone: 515-281-6225
If you have any questions or comments, we'd love to hear from you. Send us a message.
© Copyright 2023 -- Iowa Department of Public Health
|
How Does Extreme Weather Impact My Solar Panels?
Solar panels continue to grow in popularity among homeowners. At one time, fossil fuel energy sources were the only option available for powering homes. Now, solar power offers an alternative, cheaper means of energy. Homeowners may still have concerns about investing in solar panels and wonder how extreme weather could impact the panels on their roofs. Here are some answers to those concerns. Cloudy Weather and Energy Production When sunlight hits the solar panels, conversion to energy takes place. Electricity also ends up stored in batteries for later use. When the skies are cloudy, sunlight becomes limited. An effect on energy production is possible, but the solar panel manufacturers considered this. The panels should continue to reliably produce electricity even during cloudy weather. Surviving Brutal Winds During fierce storms, winds can pick up tremendous speed and do a lot of damage to roofs and structures. Are solar panels safe? Most high-quality solar panels can withstand wind speeds of well over 100 mph. At , we work with clients to deliver the best available panels for their homes. Dealing With Debris At times, wind can lead to damage even if it isn’t reaching high speeds. Things like leaves, twigs, and other...View Article Continue Reading
|
Conférence IPM : Vendredi 17 janvier 2020 à 10h00 – Salle de conférence
Zoonotic Viruses in Cambodia: a Focus on Avian Influenza and Rabies – Philippe Dussart, Virology Unit, Institut Pasteur du Cambodge
Cambodia is a hotspot for endemic and emerging infectious diseases, many of which are zoonotic in origin. One such disease, avian influenza virus, specifically highly pathogenic subtype A/H5, has been endemic in Cambodia since 2004. As the Cambodian National Influenza Centre and WHO H5 Reference Laboratory, the Virology Unit at Institut Pasteur du Cambodge (IPC) supports the Cambodian Ministry of Health and Ministry of Agriculture, Forestry and Fisheries in the confirmation of influenza infections in humans and animals. IPC has maintained longitudinal surveillance at key live bird markets (LBMs), poultry storage points, and slaughterhouses in the heavily populated south-east of the country. Vigilant surveillance has revealed that Cambodian LBMs have high levels of avian influenza virus (AIV) circulation, with approximately 30-50% of ducks and 20-40% of chickens testing positive between 2013 and 2019. Moreover, a multitude of low pathogenic avian influenza (LPAI) viruses are concurrently circulating: A/H7 LPAI viruses, were detected in 2015, 2017 and 2018. In 2019, for the first time, subtype A/H5N6 clade 126.96.36.199 viruses were detected in poultry. Phylogenetic and molecular risk assessment is ongoing to determine the risk of these novel strains.
Another virus for zoonotic risk in Cambodia is rabies. A virus of global public health concern, most rabies cases are caused by dog bites, and deaths most commonly occur among the poorest or most remote populations, unable to receive post-exposure prophylaxis (PEP). In Cambodia, there are around 600,000 dog bites per year for 16 million inhabitants, leading to an estimated 800 patients dying of rabies yearly. The Rabies Prevention Center was established at IPC in 1995 and, in 2018 alone, this center provided rabies PEP to ~23,000 persons. Between 2002 to 2018, the Virology Unit at IPC has confirmed rabies infection in post-mortem brain tissue of 51.6% of biting dogs (n=1,928). In parallel to efforts of rabies prophylaxis in humans, IPC participates in a regional, One Health network bringing together stakeholders and researchers from Lao PDR, Cambodia and Vietnam aiming to reduce rabies risk by improving diagnostic capacities, providing basic knowledge on dog population dynamics which is vital for efficient vaccination strategies, and establishing a strong, inter-sectoral network for rabies control in this region.
|
Getting proper ZZZs at night should not include actually hearing those Zs.
If you or a loved one is hearing snoring, that’s a problem – and not just because it can disrupt sleep. Snoring is a sign that your breathing is partially blocked when you’re sleeping.
The sound you hear occurs when the tissue at the top of your throat vibrates as air squeezes past it as you breathe. The greater the airway obstruction, the louder your snoring. That’s because air has to flow more forcefully to get through, increasing tissue vibration and the resulting snore.
Snoring that happens occasionally is usually nothing to worry about. However, if your snoring has become chronic, it may indicate a serious health condition requiring treatment such as obstructive sleep apnea. Chronic snoring may even thicken the carotid arteries and increase your risk of stroke.
At the Sleep Center at Georgetown ENT, we specialize in the treatment of sleep disorders, including snoring. Dr. Scott W. Franklin is board certified in both sleep medicine and ear, nose, and throat surgery – the best of both worlds when it comes to diagnosing and treating the cause of your snoring.
What Causes Snoring?
There are so many things that can cause snoring, ranging from simple and benign like your sleep position to complex and dangerous like sleep apnea. Common causes of snoring include:
- Alcohol or medications that relax your muscles
- Cold, flu
- Deviated septum
- Enlarged adenoids
- Excess tissue near throat opening
- Large tongue
- Misaligned jaw
- Nasal congestion
- Nasal polyps
- Respiratory infection
- Sinus infection
- Sleep apnea
- Sleep deprivation
- Sleeping on your back
- Small jaw and/or narrow airway
- Swollen tonsils
- Swollen uvula
After a thorough evaluation, Dr. Franklin may recommend additional imaging tests or a sleep test to identify the extent of the problem.
Treatment will depend on the cause of your snoring. For example, treating nasal congestion or sinus infections can effectively resolve your snoring. In many cases, lifestyle changes are recommended to help reduce snoring. This includes losing weight if overweight and avoiding alcohol, especially before bedtime.
Other snoring treatments include:
- Oral appliances advance your jaw to create more space at the back of the throat and help keep your airway clear.
- Nasal strips can help increase the size of your nasal passages while sleeping.
- Continuous positive airway pressure (CPAP) involves wearing a pressurized mask over the nose, which forces air through your airway. This may treat both snoring and obstructive sleep apnea.
- Radiofrequency ablation of the tongue and tissue at the back of the throat (uvula) is an in-office procedure that helps prevent the tongue from falling back and blocking the airway during sleep.
- Outpatient surgery, depending on the cause of snoring, may help. This may include a tonsillectomy, adenoidectomy, uvulopalatopharyngoplasty (to remove the uvula, which hangs down at the back of the throat), or nasal surgeries to correct a deviated septum or remove nasal polyps.
Snoring Treatment in Georgetown, TX
Chronic snoring is no joke. Make sure you’re properly evaluated by a sleep medicine specialist who is also an ear, nose, and throat (ENT) surgeon like Dr. Scott W. Franklin at the Sleep Center at Georgetown ENT in Texas. Call (512) 869-0604 or request a consultation now.
|
Define Capital Account
Capital can be stronger than cash because you can use it to produce something and generate revenue and income (e.g., investments). But because you can use capital to make money, it is considered an asset in your books (i.e., something that adds value to your business). Capital is anything that increases your ability to generate value.
A capital account is an account that depicts transactions such as imports, exports, investments, loans and other economic transactions that flow in and out of a country. It is the second half of balance of payments, a current account being the other half. In accounting, a capital account is also called shareholders equity, it is the account that reflects the net worth or net change in the ownership of a company. In macroeconomics and international finance, the capital account, also known as the capital and financial account records the net flow of investment transaction into an economy. It is one of the two primary components of the balance of payments, the other being the current account. Whereas the current account reflects a nation’s net income, the capital account reflects net change in ownership of national assets.
Earth system justice needed to identify and live within Earth system … – Nature.com
Earth system justice needed to identify and live within Earth system ….
Posted: Thu, 02 Mar 2023 16:04:14 GMT [source]
But both businesses and their potential investors need to keep an eye on the debt to capital ratio to avoid getting in too deep. At the national and global levels, financial capital is analyzed by economists to understand how it is influencing economic growth. Economists watch several metrics of capital including personal income and personal consumption from the Commerce Department’s Personal Income and Outlays reports. Capital investment also can be found in the quarterly Gross Domestic Product report. The capital of a business is the money it has available to pay for its day-to-day operations and to fund its future growth.
Revenue expenditures do not depreciate with time as they are charged at one go. Expenditures made for the routine operation of an organization/government’s activities are known as revenue expenses. While the concepts of capital expense and revenue expense may seem similar at first glance, there is a significant difference between the two. It refers to the combination of competition and cooperation between companies. It refers to the way in which the firm’s assets are actually financed.
Any time the LLC gives cash to any of its members, the amount given in cash must be subtracted from the capital account balance. Also, if any members contribute more money to the LLC after becoming owners, this should be reflected in the account. Basically, the capital account balances for members should always match their total contributions to the company, minus any amounts the company has contributed to them. The easiest way for a business to stay organized is to maintain capital accounts for individual members. Sometimes, you can renegotiate the operating agreement terms to make changes to how much ownership a member has in the LLC as well as the amount of allocations that members are due. A partnership capital account is an account in which all the transactions between the partners and the firm are to be recorded.
Capital Accounts Explained: How It Works and Why It’s Important
In such a scenario, all of these people are investing in the business using their own capital. How the retained earnings will be divided is discussed in advance and often depends on the capital invested by each individual. Harry has invested more capital and so he will own 2/3rd of the business. Hence, you and Lauren will receive 1/6th of the earnings each and Harry will receive 2/3rd of the earnings. In a partnership situation, a separate capital account is maintained for each of the partners. We can use this amount to identify how much assets have been financed with capital, i.e., owners and how much portion is debt-financed.
VIZIO HOLDING CORP. Management’s Discussion and Analysis of Financial Condition and Results of Operations (form 10-K) – Marketscreener.com
VIZIO HOLDING CORP. Management’s Discussion and Analysis of Financial Condition and Results of Operations (form 10-K).
Posted: Wed, 01 Mar 2023 21:48:10 GMT [source]
A capital account is beneficial when it comes to starting a partnership whereby there is more than one owner of your business. But when you have a capital account from the beginning, you are able to keep track of which owner invested how much. This enables you to always know how much stake each partner holds in the company and makes it easier for the long-term of your business as well.
Types of Capital Expenditures
Most of the financial capital analysis for businesses is done by closely analyzing the balance sheet. Businessmen need to invest money in their respective businesses to get them up and running. Capital contributions can be in the form of money or property to a company by the owner, partner, or shareholder.
The https://forexarena.net/ account measures the international trade of goods and services plus net income and transfer payments. The current and capital accounts represent two halves of a nation’s balance of payments. Thecurrent accountrepresents a country’s net income over a period of time, while the capital account records the net change of assets and liabilities during a particular year. An example of a capital account will be retained earnings in the case of a corporation.
Balance of Payments
Big changes in the capital account can indicate how attractive a country is to foreign investors and can have a substantial impact on exchange rates. The capital account shows credit and debit entries for nonproduced nonfinancial assets and capital transfers between residents and nonresidents. Capital expenditures refer to funds that are used by a company for the purchase, improvement, or maintenance of long-term assets to improve the efficiency or capacity of the company.
An https://forexaggregator.com/‘s stock of foreign assets versus foreign liabilities is referred to as its net international investment position, or simply net foreign assets, which measures a country’s net claims on the rest of the world. If a country’s claims on the rest of the world exceed their claims on it, then it has positive net foreign assets and is said to be a net creditor. The position changes over time as indicated by the capital and financial account. This means more capital is flowing into the country than going out, caused by an increase in foreign ownership of domestic assets. A country with a large trade surplus is exporting capital and running a capital account deficit, which means money is flowing out of the country in exchange for increased ownership in foreign assets. The financial accounts measure the change in international ownership of assets.
Stay up to date on the latest accounting tips and training
Retained earnings is the cumulative earnings of the company overtime, minus dividends paid out to shareholders, that have been reinvested in the company’s ongoing business operations. The treasury stock account is a contra equity account that records a company’s share buybacks. There are limits on how much you can withdraw from your capital account and when you can withdraw it, based on your company’s documentation. These documents may include partnership agreements, LLC operating agreements, or the Articles of Incorporation of S Corporation. On the other hand, in the case of corporate shareholders, the number of issued shares will not increase due to the investment, but the shareholder base will increase. However, if the business is a sole proprietor, there is no governance document.
- In a sole proprietorship, this section would be referred to as owner’s equity and in a corporation, shareholder’s equity.
- This will enable you to ensure the correct retained earnings are being allocated according to the capital that each owner invested.
- David has helped thousands of clients improve their accounting and financial systems, create budgets, and minimize their taxes.
- This is debt capital, and it can be obtained through private or government sources.
This simple calculation should give you an idea of how capital accounts work and look. You purchase the machine for $1,500, but you spend $600 on new parts to fix the machine before you sell it for $2,000. Between the cost of the machine and its new parts, you spend $2,100. This is considered a capital loss of $100 because you spent more money on the total investment ($2,100) than you received for the sale ($2,000). The accountant or bookkeeper of a company creates a capital account and keeps a log of the financial activities of every member.
Capital controls are measures imposed by a state’s government aimed at managing capital account transactions. Countries without capital controls that limit the buying and selling of their currency at market rates are said to have full capital account convertibility. A capital account is used by sole proprietorships and partnerships to track the net investment balance of their owner from the perspective of the business. The balance in a capital account is usually a credit balance, though the amount of losses and draws can sometimes shift the balance into debit territory. It is usually only possible for the account to have a debit balance if an entity has received debt funding to offset the loss of capital.
Most other advanced and emerging economies followed, chiefly in the 1980s and early 1990s. If a country has a current account deficit then, assuming exchange rates are floating, it will have an equivalent capital account surplus. LLCs, partnerships, and sole proprietorships do not pay business taxes, as their taxes are passed through to the owners who are supposed to pay tax on the profits of the business that are distributed to them. Its reporting is done at the bottom of the balance sheet of the company in the Equity section. While using in a sole proprietorship scenario, you may find this section as owner’s equity and in a corporation scenario, it will be shareholder’s equity.
Partner share of gains and losses is calculated on the basis of their capital share in the partnership agreement or LLP operating agreement. If you are a private business then you will need to pay taxes on the profits you earn from selling goods and services. When it comes to filing for your tax return, you will do so on the profits that you earned.
It makes it much easier when you have a https://trading-market.org/ solution like TallyPrime. Acquisitions of non-produced, non-financial assets create a deficit in the capital account. When a country’s residents, businesses, or government forgive a debt, their action also adds to the deficit. It measures financial transactions that affect a country’s future income, production, or savings. An example is a foreigner’s purchase of a U.S. copyright to a song, book, or film. The Federal Reserve calls these transactions non-produced, nonfinancial assets.
The firm’s goal is to simplify the law and provide clients with the confidence and information necessary to make their decisions. The firm also provides project-based legal services to other attorneys and law firms, along with assisting as personal counsel and local counsel on legal matters. Therefore, Owner A’s capital account is $ 35,000 and Owner B’s capital account is $ 37,000. With a capital loss, your investment is worth less than its initial purchase price.
The partnership creates a schedule K1 as part of Form 1065, and S Corp creates a schedule K1 as part of Form the 1120S. Tax authorities need to do this correctly, using the information in Appendix K1 to ensure that the account changes are consistent with the income and balance sheet reports. The reserve account is operated by a nation’s central bank to buy and sell foreign currencies; it can be a source of large capital flows to counteract those originating from the market.
If a government does not consider the market-driven change to its currency value to be in the nation’s best interests, it can intervene. Some of the ways for increasing capital account balances are an initial investment, additional contributions, and the share of profits. In addition, some of the ways of decreasing the capital account balance are share of losses by members, and withdrawals for personal use. A capital account is used for addressing the balance of payments for a country on a national level. In bookkeeping and accounting, it is understood as a general ledger account that is an integral part of the balance sheet classification named as Owner’s equity and Stockholders’ equity .
|
This beautiful, peaceful large sunken garden in the heart of Dublin city was designed by Dáithí Hanly and dedicated to the memory of all who gave their lives in the cause of Irish Freedom. It features a pool in the shape of a non-denominational cross designed to be inclusive of all religions, creeds or colours.
The large sculpture by Oisín Kelly is based on the theme of the ‘Children of Lir’, symbolising rebirth and resurrection, added in 1971. The garden is intended as a place of quiet remembrance and reflection. Oisín Kelly also designed the statue of James Larkin on O’Connell Street.
The Garden commemorates freedom fighters from various uprisings, including:
- The 1798 Rebellion of the Society of United Irishmen
- The 1803 Rebellion of Robert Emmet
- The 1848 Rebellion of Young Ireland
- The 1867 Rising of the Fenian Brotherhood
- The 1916 Easter Rising of the Irish Volunteers and the Irish Citizen Army
- The 1919-21 Irish War of Independence of the IRA.
The site of the Garden is where several leaders of the 1916 Rising were held overnight before being taken to Kilmainham Gaol. The Garden was opened in 1966 by President Éamon de Valera on the fiftieth anniversary of the 1916 Easter Rising, in which he had been a commander.
In 1976, a contest was held to find a poem which could express the appreciation and inspiration of this struggle for freedom. The winner was Dublin born author Liam Mac Uistín, whose poem “We Saw a Vision”, an aisling style poem, is written in Irish, French, and English on the stone wall of the monument. The aisling form was used in eighteenth-century poems longing for an end to Ireland’s miserable condition.
“We Saw A Vision”
In the darkness of despair we saw a vision,
We lit the light of hope and it was not extinguished.
In the desert of discouragement we saw a vision.
We planted the tree of valour and it blossomed.
In the winter of bondage we saw a vision.
We melted the snow of lethargy and the river of resurrection flowed from it.
We sent our vision aswim like a swan on the river. The vision became a reality.
Winter became summer. Bondage became freedom and this we left to you as your inheritance.
O generations of freedom remember us, the generations of the vision.
In Irish the poem reads:
I ndorchacht an éadóchais rinneadh aisling dúinn.
Lasamar solas an dóchais agus níor múchadh é.
I bhfásach an lagmhisnigh rinneadh aisling dúinn.
Chuireamar crann na crógachta agus tháinig bláth air.
I ngeimhreadh na daoirse rinneadh aisling dúinn.
Mheileamar sneachta na táimhe agus rith abhainn na hathbheochana as.
Chuireamar ár n-aisling ag snámh mar eala ar an abhainn. Rinneadh fírinne den aisling.
Rinneadh samhradh den gheimhreadh. Rinneadh saoirse den daoirse agus d’fhágamar agaibhse mar oidhreacht í. A ghlúnta na saoirse cuimhnígí orainne, glúnta na haislinge.
The weekend of the 1916 centenary began with a dignified event in the Garden of Remembrance which sought to honour those who fought and died in the Rising while remembering all who lost their lives during Easter week, with a combination of military ceremonial, traditional music, silent reflection and the laying of a wreath by President Michael D. Higgins.
You must be logged in to post a comment.
|
National Look Alike Day on April 20 honors those who have a striking resemblance to another person. There is someone — or maybe two — out there who looks just like you. Give them the same haircut, and they might take your place at the dinner table without raising any alarm. Your doppelganger might not be famous, but sharing similar features with someone is still worth celebrating. National Look Alike Day is an opportunity to learn what other people who look like you are doing with their lives. Connect with them and scare your family and friends with the revelation.
History of Look Alike Day
In the 1980s, feature television reporter Jack Etzel established National Look Alike Day. Etzel contacted the Chase Calendar of Events team and declared the day. The idea was to celebrate the coincidence of someone sharing an uncanny resemblance with somebody else. It’s one thing to look like your father, mother, or another relative, but a resemblance shared with a total stranger is an entirely different ball game. Several conspiracy theories stem from the subject of look-alikes. Some believe doppelgangers are reincarnations and share mysterious spiritual connections.No matter what you believe, look-alikes are still amazing. Meeting yours emphasizes the truth behind how small our world is. It’s also great knowing you’re not in this alone — out there is someone who looks just like you and is probably dealing with the same issues as you.
It is usually rare to find two random people that are spitting images of one another. Although, it has been known to happen. Meeting a doppelganger was once considered bad luck in Germany, but the meaning has evolved. People now respond more positively to the idea of meeting a stranger with similar features. By all means, get your hopes up — this might be the day the stars align and connect you with your clone. Imagine the havoc you could wreak. The list of pranks you could pull off with your clone are endless. You also get to make new friends and share your background and experiences and see if they’ve had a better go at life while using your face.
Look Alike Day timeline
The first recorded use of a doppelganger is recorded in author Jean Paul’s “Siebenkäs as Doppeltgänger.”
Jack Etzel creates National Look Alike Day.
Catherine Crowe's book “The Night Side of Nature” popularizes the German word.
Fyodor Dostoyevsky's 1846 novel “The Double” portrays the doppelganger as a split personality who tries to take over the life of the protagonist.
Look Alike Day FAQs
How can I find my doppelganger?
You can use Google Lens or other reverse image search engines to perform reverse image searches.
Why is it satisfying to find a look-alike?
Homophily refers to the tendency for humans to associate with people who have similar backgrounds and perspectives on life. This could be due to a sense of comfort that is felt when seeing someone with similar characteristics.
Do siblings share the same D.N.A.?
Because of recombination, siblings only share about half of their D.N.A.
Look Alike Day Activities
Meet your celebrity twin
Visit some look-alike websites, upload a photo of yourself, and live vicariously through your much more famous double. Use the fun filters on Instagram to see who else is using your face.
Dress up and have fun
It's fun to play dress-up now and then, so put on your best celebrity impersonation and dress like your celebrity look-alike. Not all of us get doppelgangers, sometimes you have to make one.
Wear matching outfits
When it comes to the best things in life, pairs always have the upper hand. Plan a fun, matching outfit with a friend to make people look twice.
5 Fun Facts About Look-Alikes
There are at least seven people in the world who look exactly like you?
For his I'm Not a Look-Alike initiative, Francois Brunelle has taken photographs of over 200 doppelganger pairs.
According to folklore, doppelgangers do not cast shadows or reflections in water or mirrors.
The German term ‘doppelgänger’ translates to ‘double goer’ or ‘double walker.’
The number of genetic variables makes it impossible to determine your odds of meeting a look-alike.
Why We Love Look Alike Day
We all subscribe to some form of vanity. National Look Alike Day is an opportunity to appreciate your beauty and stroke your self-worth.
Finding your people
Life has its ups and downs. Knowing there’s someone out there who shares a special resemblance to you can be a very comforting feeling.
Who doesn’t like a good scare now and again? Nothing beats turning up to the house with a doppelganger in tow; give your dad's pacemaker something to worry about.
Look Alike Day dates
|
4 Ways to Teach Your Teen Responsibility
When I was a teen, summer meant one thing: work. And lots of it. I had 2-3 jobs lined up before school was out each summer. That’s because my goal was to make as much money as possible. Part of my motivation was to put gas in my car, pay for any eating out, and try to save for college expenses. The other motivation was that my parents believed working would help me learn to be more responsible. They also thought it would give me other necessary skills for a successful life.
With COVID-19 essentially slamming the door on the majority of summer jobs for teens, we face some challenges. The escape out of the isolation that many teens hoped for, the earning potential, and the learning opportunities that parents know come from working have been swiped right out of their hands.
In fact, according to a Pew Research Center survey, young people ages 16-24 are more likely to face layoffs due to Coronavirus. Why? Because they make up 24% of employment in the restaurant, retail, and transportation industries. The lack of work leaves behind the opportunity to learn about working with others, being responsible, and accountable to someone other than parents. It may keep them from experiencing a sense of accomplishment from a hard day’s work.
Now what? With Plan A out the window, this is a great opportunity to help your teen put Plan B into motion. In spite of all that COVID-19 has taken from us, there are still plenty of things teens can do this summer. These things can make the time go by faster, but also help them continue to learn the skills they need to master before heading out on their own.
Here are four ways you can help teach your teen responsibility this summer in spite of COVID-19:
1. Set clear expectations for the summer.
Even though many options have been taken off the table, ask your teen to come up with a plan for their summer. The structure still matters and makes a huge difference in a teen’s mindset and motivation. Here are some important parts they may want to include in their plan:
- Some type of work
- Help with household chores
- Time with friends in a socially distant way
- Things they need to learn to do for themselves (laundry, cooking, managing money, maintaining a vehicle, etc.
- Family time.
2. Help them think through opportunities that do exist.
Think yard work, shopping for those who cannot get out, being a nanny or manny for parents who have lost childcare and summer camp opportunities, odd jobs, or construction. Don’t forget about those special projects you or others have been putting off or need help doing. Part of the goal here is to help them think outside the box about what’s possible during a difficult time.
3. Encourage them to look at their strengths and identify what they are passionate about.
Are there online experiences they could take advantage of to further enhance their skill set and make them more marketable in the future? Can they take a distance-learning course to help them finish school faster or lessen their class load down the road?
4. Ask them to take on more household responsibilities to give you some relief while providing practical experience.
It may feel like more of a headache in the beginning, but these are all things they need to be able to do once they are out on their own. Grocery shopping, meal planning, cooking and/or house cleaning or making household repairs could be ways they can step up and assist in a big way if they aren’t already. As a bonus, additional teen responsibilities at home is a helpful reminder that in times of crisis, everybody has something valuable to contribute to the good of the family unit.
Obviously, we are all dealing with the unknown here and looking for ways to navigate the constantly changing landscape. Undoubtedly, there is a tremendous financial and emotional strain on teens and adults because of the limitations we’re dealing with and certainly, we need to be sensitive to this. Even in the midst of chaos, circumstances often present themselves that turn out to be positive in the end. I’m hopeful that these tips can help you prepare your teen to handle any situation that comes their way and to help them learn responsibility even in the midst of a pandemic.
Thoughts? Leave a Comment
|
Promotion of businesses and products using digital media - websites, social media, mobile phones - is called digital marketing. TV and radio, billboards, and transit signage are different. Media delivered electronically via the internet is digital media - video media, for instance. The internet is the common denominator.
Educational institutions also use digital marketing on a large scale similar to retail and manufacturing sector companies. Digital marketing of the education business is constantly growing. Internet and digital media channels have transformed education - the way it is imparted and sold.
Youth everywhere are internet-savvy. They use the internet and mobile smartphones to connect with each other - and with teachers and educational institutes.
Online courses have revolutionized education.Covid-19 changed the way education is given - a study from home ran parallel with work from home. Colleges and schools made the most out of digital marketing to reach potential students before and during the pandemic.
That being said, several reasons supported the digital marketing of education. One, students were already online and looking for colleges and training institutes. Two, they were more on the internet than into, say, watching TV. Also, online ads were killing offline ads. And display ads beat traditional ads hands down. Besides, parents rated educational bodies based on their online presence. Ditto the students themselves. Admissions were being done digitally. Expatriates and outstation students relied solely on the internet for college admissions.
So, how does digital marketing of education aid schools and colleges? And why is digital marketing helpful for education at all? Again, there are several reasons.
One, educational institutions have been using online presence and visibility to increase brand awareness and reach the largest number of targeted audiences. This created leads and a hike in the conversion rate. Social media platforms did not yeomen service towards this effort. Educational entities took to social media to boost brand awareness and lure followers to the fold, creating leads in the process. Two, the virtual response on social media is almost always instantaneous. Besides being one of the best communication mediums, of course. Being online allows interaction. The queries are visible and there is a ready avenue to reply/answer.
Three, digital media is efficient as well as relatively cost-effective. Digital marketing using email and social media does not require big execution investments. They are well within the budgets of educational institutions. Educational businesses are able to focus on a larger group of people. The cost is less and the advantages are plenty.
At the end of the day, conversion is what matters. And digital media coupled with digital marketing lead to a high conversion rate. Educational institutes are using email and SMS to great effect. Schools and colleges -educational institutions of all genres -are the target.
There are tracking tools to keep abreast of digital marketing campaigns as to whether a particular campaign is delivering the expected response or not if a school or college was benefiting from a digital marketing campaign.
Digital marketing in education has been a success story. Educational institutions through their online presence and digital communication channels have been successfully executing digital marketing campaigns to build brand awareness and gain acceptance with students and guardians. Student admissions have almost 100% become online.
So, here’s a summary of digital marketing trends in education. There is a paradigm shift in the education sector due to digital marketing. From admissions to learning, everything related to education is online. Colleges are shortlisted and chosen using online resources. Applications are submitted online, which means educational institutions cannot lag behind in online presence and digital marketing. It is a two-way street. Colleges and schools have been forced to adopt and adapt to this transformation.
Using digital marketing to influence qualified students and get them to secure admissions is the name of the game. But digital marketing is a continuous effort. The educational entity should be visible online to potential students throughout. This means digital marketing companies cannot take a break and educational institutions have to be on the ball 24/7, they should track the trends in digital marketing to keep the competition perpetually at bay.
One of the most recognizable trends is that websites serve the digital marketing of education. They are the contact points. They should be well designed - the first impression is the best impression! Students should be able to learn everything about a college/school by going through the website pages of the educational institution. "Educate & inform" should be the website’s motto. From contact point to completion of the admission process should be the website’s purpose.
After website, social media -the young are tech-savvy and social media-friendly. They virtually live on the internet. They are hyperactive on social media. Educational institutions would do well to leverage social media to their advantage - provide prospective students, Gen Z, what they were seeking on social media.
That is one side of the coin. The flip side involves the educational institutions - the schools and the colleges, which, if they want to survive and thrive, shouldn’t stop campaigns and promotions via their own social media handles, posts on college/school activities, updates on changes in curriculum, cultural activities et al. Students should not feel crunched or constrained for college/school-related information.
Curiosity got the cat but never the student, who is always craving for more and new data and info. They are always striving to widen their horizons and are eager for information. And related to digital marketing are webinars. Students can be drawn to colleges and schools by webinars. It is both an education platform as well as an advertisement tool - a two-in-one, so to speak, for educational institutions. Webinars are a zero-cost means to drive admissions.
Next, we have standalone educational websites, which are not hosted by schools or colleges but are a holistic website on education in general including basic, generic information on the various courses and degrees and diplomas on offer in the education sector - reviews on educational institutes and what they offer. Such websites witness considerable traffic. Again, they are ideal sites for digital marketing.
Search engine optimization (SEO) cannot be left out. Google search is the first thing students and teachers and administrators do when looking for information related to education - schools and colleges. SEO helps educational institutions rank on the top of the page in the search results. Admissions are thereby secured.
Other digital marketing tools used prolifically by educational institutions include email marketing and public relations. Digital marketing tools that help drive potential students to college/school websites include blogs and live-streaming videos posted on social media platforms. Ultimately, at the end of the day, digital marketing via digital communication tools is to show colleges and schools high on SERP and thereby drive prospective students to their websites.
Digital Piloto, November 29, 2021
Think more traffic and leads. Think about us.
We love spreading knowledge of what digital marketing is all about. We answer hundreds of questions that our bona fide customers come up with every day!
Join our team of experts if you have the urge to show up your potential! We appreciate a proactive measure to make us trust your skills!
Reach us Online or Schedule An Appointment To A Live Call!
|
Imported fire ants pose a threat to people, plants, animals and equipment. On the property, they can short-circuit electrical equipment and damage machinery with large mounds. When it comes to commercial nurseries, fire ants are a particular threat to young plants. They get into the plants and impede growth. They also migrate easily, spreading via the transport of infested goods such as pots, soil and sod.
To hinder the spread of fire ants, the USDA Animal and Plant Health Inspection Service (APHIS) enacted a quarantine over areas with large populations of fire ants. Regulated items cannot be moved from quarantined areas to non-quarantined areas unless traveling with inspections or certifications that confirm they are free of fire ants. Items can be treated for fire ants with USDA/APHIS approved fire ant control products, such as Extinguish® Plus from Central Life Sciences.
Nurseries dealing with regulated materials may be affected by the cost of shipping or receiving infested plant-materials or soil. Restricting the spread of these harmful pests to uninfested areas is critical to stopping the growth of their populations, and using an effective, USDA-approved control solution is half the battle.
Treating for fire ants is far and away the best option for commercial nurseries to curb infestations. Central Life Sciences has a solution to help protect nurseries from fire ants, delivering an effective and economical solution to the problems fire ants pose:
Extinguish Plus can be used as a broadcast application or used to treat individual mounds.
With the help of this product, you can protect your nursery and stop fire ants in their tracks. To learn more, visit the Extinguish® Plus Product Page at centralantcontrol.com.
|
Adding Fractions With Unlike Denominators Activity. Award winning educational materials designed to help kids succeed. Web adding fractions with unlike denominators basic adding fractions activity.
Web this 5th grade math fraction activity provides step by step practice on adding and subtracting fractions with different denominators. Web before you begin to teach adding and subtracting fractions with unlike denominators, your students need to understand how to form equivalent fractions. Adding fractions unlike denominators scavenger.
|
Why Astronauts Use Space Pens Instead of Pencils
There is a belief that America spent millions of dollars developing a pen that could be used in space, while the Russians simply used pencils. It was a gripe aimed at American excess versus Russian sensibility.
It’s also not true.
The first space pen was invented and funded entirely by a private company called Fisher. They began selling these pens in 1965.
It should be noted, there are other ink-based tools that work in zero gravity. Felt tip pens, for example, work great without gravity. However, felt tips rely on a consistent ink viscosity, which will change in a pressurised capsule, making them a little unreliable. In a worse case scenario–depressurisation–the ink could be forced out of the pen and start floating around the capsule. Not exactly the sort of thing you want to return to after a long spacewalk.
So, what about pencils?
NASA did indeed use pencils right up until the Apollo program. It was at this time they switched to space pens.
When Fisher contacted NASA to try out their pens, they were so impressed that they bought enough of them in bulk to be used on all future space missions. Russia would soon follow suit. By 1969, both America and Russia were using these pens in space.
Pencils have a habit of breaking, shattering, or leaving graphite dust. Don’t forget that pencils are made of wood which may have been treated, and is itself flammable. This would prove to be a serious fire risk in the pressurised, oxygen rich capsule.
For a while, mechanical pencils were favored by NASA; however, these too are dangerous. Stray graphite dust is impossible to gather, highly flammable and conductive–just about the worst thing possible to be floating around in a spacecraft with sensitive electronics that are keeping people alive.
Another issue is that pencils simply aren’t that effective in space. Without gravity to allow the graphite to settle, pencil etchings were prone to severe smearing, making them fairly worthless for permanent documentation. The Russians did use pencils for a brief time, which did not pose the risk to electronics but still suffered from all the other problems, and the paper shrouds used created a lot of flammable waste.
So, the short reason is that astronauts only used pencils when they were waiting for something suitable to be invented. As soon as it was, they switched and never looked back. Even the Russians thought it was a good idea.
Another cool thing about the space pen is that it is quoted as being able to write for exactly 30.7 million miles. Plenty enough for a trip to the moon and back.
|
When representing the people of the Chittagong Hill Tracts (CHT) region, both Western and Bengali people have consistently stressed the connotations of primitiveness and the language is perceived to be evidence of that primitivity.
Some indigenous people themselves started to believe these dominant discourses and they do not recognize the need for language preservation.
I am discussing here the language attrition of my native Chakma language. Even though the language is still spoken, it may become threatened because it is not taught in schools and it is undergoing tremendous transformation.
Language shift to the dominant language is occurring since many of the original Chakma words are being replaced by Bengali words.
Speaking the Chakma language enables a ‘search for a collective’ identity and gives a sense of belonging among our people.
This language enables us to give names to relations among kin, to roles and responsibilities among family members, and to ties with the broader clan group.
There are no English or Bengali words for these specific relationships because social and family life is different.
If the language is destroyed, there will be a breakdown of these relationships, culture, and the indigenous way of life.
Keeping the language alive is a matter of survival because language embodies our worldviews and how we define ourselves.
There is a sense of urgency on my part to hold on to my indigenous language because of my own struggles to maintain the language.
I have observed that many indigenous families, in Canada and Bangladesh, abandon their traditional way of life in order to integrate in the larger society by moving to urban areas and becoming heavily influenced by Bengali language and culture.
The middle class, conscious of social status, speaks Bengali and disassociates themselves from their indigenous roots.
Children are also discouraged to speak their language in order to pursue higher education.
Some of the changes in the languages have come about both due to changes in occupational patterns, social interaction with non-indigenous people and the influences of the national and international, media.
The skills required for reading and writing have practically disappeared since few people know how to use the ancient scripts and there is no support from the government for indigenous people to initiate their own educational system.
Another problem is the curriculum of the government schools, where the medium of instruction is Bengali exclusively in registered and most non-registered schools.
There are two alternatives for the indigenous students: to assimilate themselves to the Bengali mainstream or feel alienated by it.
This alienation from Bengali society is not a good option for their survival since it will not improve their social status or education level.
The feeling of being excluded from the mainstream society is inevitable because indigenous people are a small minority who are often discriminated in schools.
The indigenous minority speakers often accept the subjugation of the majority, and language shifts often occur under these stressful socio-economic circumstances, where there is no realistic option but to give in.
There needs to be a self-conscious effort toward reconstruction of indigenous identity by mobilizing socially, culturally, economically, and politically to overcome their exclusion and marginalization (Hall, Stuart. “Old and New Identities, Old and New Ethnicities”, 1997).
Alternative education programs based on indigenous content may provide an opportunity to review existing traditional knowledge and pass it on to others in contemporary context.
Therefore, the notions of ‘emergent cultures’ allows for the possibility that individuals and groups make strategic choices within cultures and about culture (Clifford James, Indigenous Articulation, 2001).
The people of the Chittagong Hill Tracts will need to generate and articulate their own ideas as to what kind of development they want.
The most integral part of indigenous traditions, societal practices, and customs are the various indigenous languages and knowledge that contain those traditions and customs.
Threats to culture are also threats to unique perspectives on life and loss of knowledge. The rapid disappearance of remote cultures is part of a larger global trend since human societies have always interacted and changed.
The case of the Chakma language is similar to the other indigenous groups around the world who are facing problems of exclusion and linguistic colonization.
Governments try to eradicate these languages since retaining native languages can foster resistance to state authority.
Learning a mother language first does not hinder school performance, rather it enhances it (Romaine, 2000), but some parents still believe that they must abandon their traditional language in order to make their children successful.
My research shows that indigenous language deterioration is happening more rapidly to those who are scattered in big cities away from their communities where there are a greater number of native speakers.
Ultimately, the preservation of a language has as much to do with the number of people who can still speak it, and the resources available, as it does with the determination to promote it.
In the efforts of ‘reversing language shift’, language and identity socialization of children must take place in home and community.
Elders need to interact with younger groups (Fishman, Joshua A. Can Threatened Languages Be Saved? Reversing Language Shift, Revisited, 2001) and actively promote native language teaching by assisting the development of language nests and organize community-focused meetings or seminars about language revitalization issues.
Aggressive promotion of language, sometimes coupled with political activism, can ensure the survival of some native languages.
The indigenous people themselves must actively promote the language at home, in their communities and schools.
For an indigenous person in Canada, trying to reconnect with my roots, speaking my own Chakma language reinforces who I am, where I come from and enables me to connect with the people in my homeland.
Abbreviated from original essay. 172 Between
Writer : Arshi Dewan Roy
To read more about Indigenous Language Click Here
|
Let us try to raise the sense to realize the importance of children education.
Children are the next builders of a nation, and only educated children have the ability to take their nation to be considered a noble, strong and developed nation in our world. Unfortunately many countries of our world do not or unable to educate their children. There are many reasons behind it :
- The parents do not have enough sources to send their children to school. In some countries children play here and there instead of going to school, or they are compelled to work to earn some money. Their wages are usually very low.
- In some areas schools are located at a far places and children can not go there without any conveyance , and poor parents have not enough sources of income. They prefer let their child / children work some where even at very low wages. (Usually such services are temporary).
- It is commonly known that poor parents have many children (Some time 5 to 7, and it is difficult for them to send all children to school).
- Now a days education is very expensive and poor families can not bear the expenses.
- Some times, behavior of parents is so cruel with children (especially when the relation is of step father/mother) and the children feel unsafe and feel a stranger in the family. Such children usually run away from home. They remain illiterate and in most cases , they become a part of bad society, and grow up as thief, robber and become drug addictive. This is a real dark side of our society.
It is not enough to describe such situation in political gathering only , or mentioning every where to solve this problem. It is needed to raise the sense to realize the importance of children education and take necessary action. Only public can not achieve this goal alone. Government has a basic role in this mater, as the government has the resources to do it. Some steps can be taken in this field :
- A plan should be made to motivate the parents to send their children to school. A comprehensive path to achieve this goal is a must. It should include :1. A wide range of publicity to appeal parents. 2. There should be at least 1/2 hour program on every T.V. channel on this subject.
3. A Mohallah committee can arrange and maintain a survey showing which family’s children are not going to school. Committee can approach such families and convince them about the importance of children education. Committee can send their recommendations to proper authority for action. 4. There are many families in areas who are willing to help to deserved people. They can contribute affordable amount and deposit with Mohallah committee, and committee will provide money to poor families with the condition that this amount will be spent for their children education. Going on the safe side, children school fee, uniforms, books, notebooks, bags etc can be purchased by the committee and given to the students. School fees can be deposited directly to the schools. A closed watch is needed to function this procedure successfully .
- Free education is the main responsibility of any government. If any government wants a responsible leadership in future, every child of the nation should be educated. Government can reduce its cabinet ( ministers and advisers) and the saved money ( Minister/Advisers salaries, allowances, cars, office and other facilities, amounting to billions Rupees) can spend on education.
- Some families children work some where instead of going to school. Such families should be contacted to pay them a fixed amount every month with the condition that the amount will be spent on children education. A closed watch is a must and if found the grant is spent on other expenses instead of children schooling, the grant should be suspended. A comprehensive survey to find out such families can be conducted.
- Poor families usually have many children and can not bear their school expenses. A family planing movement should be launched effectively. The family planing workers must approach such families regularly and try to convince them to have 2 or 3 children. Newly married couples must be on top of this goal. A secret check on family planing workers should carried out to make the movement successful. The present Family Planning Department seems not to be successful. Advertising in newspapers and on every T.V. channel can bring near to success.
- A second marriage is usually not a common practice in our country. Exceptions are there. A man marry second wife for some reasons :
1. His first wife died leaving him alone. No child. This can be considered genuine.
2. The wife is medically proven unfit to give a child. Every man wants to continue his race and for that purpose he can marry a second wife.
3. Some times a couple has only daughters, and they want a boy or boys to continue their pedigree. In such cases our Family Laws bind the husband to have permission from his first wife to marry second wife. This practice or thinking is baseless. Do the husband has a guarantee that he will have a boy child from his second wife ? We believe Almighty Allah is the only one who bless boy or daughter.
4. Some men marry a second wife in spite of having children, both boys and daughters, for some reasons. Usually it happens in lords families who can afford to keep both families. It is seen that conflict arises between first and second wife’s children. Lord families can control such conflicts, problem arises in poor or middle class families, resulting any child leaves the parents home and become a cursed one for family.
What to do ?
- It is seen that Government governed schools are not enough for the children of a certain area. If we want an educated nation, government must establish a chain of schools. Education must be free. Government is spending many unnecessary expenses which can be stopped and that money can be utilized to open and manage new schools.
- The present Family Planning Department have not achieved its goals. The Department just advertise some posts in newspapers and some on T.V. channels. This is not enough. China has a very large population. China government passed a law that a newly married couple can have only one child. The law was enforced strictly and now they have controlled the growth of population. Cant we pass such law in our country?. It is not necessary to limit any couple to have only one child. We can decide how many child a newly married couple can have. The enforcement of law must be very strictly. If any family breaks the law, the family must be punished.
- Syllabus of primary classes needs to be revised. Basic knowledge of civilized society should be included in the syllabus. There should be a few selected books and note books for primary classes. Present trend to make children school bags so heavy with books and note books, difficult to carry for a child.
- Private schools charge a heavy amount under different heads like Admission fee, Tuition fee, Security charges, miscellaneous charges and middle class families can not afford it. Such charges must be reasonable.
- Private schools compel the student to buy book and note books from the school. A normal size note book cost Rs.20/- to Rs.30/- in book shops, and school sell it for Rs.40/- to Rs.50/- with a school name and logo printed on note book. This practice must be stopped. If all above expenses are reduced, it is hoped more children will like to enroll in schools.Last Words
Our children are the next leaders of our country. Educated people will make the nation and country a respectable, powerful and developed nation and country in the world. Fulfill your duty and send your children to school.
|
What are logistics?
Logistics are the processes needed to get your goods or services from their origin to their destination. Logistics goes beyond the mode of transportation. It also includes the legal arrangements, insurance, border requirements, and delivery.
What are the main steps and considerations for goods logistics?
- Arrange the sale: The first step for international trade is to arrange the sale. Contracts need to be drawn up (See Incoterms), finance needs to be arranged (See Trade Finance), and shipping needs to be considered (See Transportation and Shipping).
- Prepare for export: After a sale is agreed and the terms arranged, the shipment needs to be packed, labelled, and documented appropriately (See Bills of Lading, Rules of Origin, How to read HS Codes, Tariff measures, Non-Tariff measures, Sanitary and Phytosanitary Measures, Technical Barriers to Trade, and Rules of Origin). Warehousing costs at the port before and after shipping, container types, and potential restrictions for the shipment should be considered.
- Prepare for import: Once a shipment has reached its destination, it will need to clear customs before it can be released either to the recipient or for further transportation (See Customs and Border Procedures). Customs clearance can depend significantly on where the goods are being shipped and the type of transportation chosen.
- Deliver to buyer: Finally, once the item has cleared customs and been released from storage, the final step requires delivery to the buyer.
What are freight forwarders and other intermediaries and how can they help my business?
Freight forwarders and other intermediaries can significantly reduce the required work for an international transaction. Types of intermediaries include:
- Customs brokers and clearing agents: These are specialists on customs rules and procedures. They can help ensure import documents are correct and may assist with forwarding arrangements. To find a licensed customs broker, a first step is to search the national customs agency where the import will take place, as they frequently list registered brokers that can be contacted.
- Freight brokers: They match shipments with land transportation, helping you find a way to get a delivery to its destination on schedule, usually by truck or rail.
- Ship brokers: They match ship owners with importers or exporters that want to charter a vessel to transport their product.
- Freight forwarders: They help with all of the above, assuming the entire logistical, legal, and financial responsibility of a shipment. Freight forwarders generally arrange everything from transportation and shipment consolidation to tracking or monitoring and delivery to the final destination. The International Air Transport Association’s (IATA) recent database of validated aviation capability and infrastructure information, OneSource, can be a useful resource for finding freight forwarders.
Where can I learn more?
The International Trade Centre’s (ITC) SME Academy offers an online course entitled Introduction to International Transport and Logistics.
|
Read on to find out more about how funding works for the provisions set out in an EHC Plan. For help with other financial matters such as benefits, please follow the links to other organisations who can help.
Personal Budgets and Direct Payments
Once a child or young person has an EHC plan, the local authority (“LA”) must ensure the support set out in the plan is made for the child or young person.
Normally, the LA will do this by providing the necessary funding to the school or college attended by the child or young person, in order for them to deliver the educational support needed. However, it is also possible for the LA to consider making a payment to the parent, the young person or another nominated person, so that they can organise the provision themselves. This is called a direct payment.
In order for the parent or young person to request a direct payment, the LA must first identify a personal budget.
What is a personal budget?
The personal budget is the notional amount of money that would be needed to cover the cost of making the special educational provision specified in the EHC plan. You cannot have a personal budget unless you have an EHC plan. Information about the availability of personal budgets must be contained in the LA’s local offer.
Your LA is obliged to consider identifying a personal budget for educational provision only if you request it when they issue a draft EHC plan following an EHC needs assessment or when they are reviewing an EHC plan.
In certain circumstances, the LA can refuse to identify a personal budget. They may do so when the special educational provision is being provided as part of a larger budget (for example, a contract with the NHS to provide all speech and language therapy or occupational therapy) and the LA can’t separate out or ‘disaggregate’ the personal budget from that overall larger budget.
How can I get a direct payment?
If you do request a personal budget from the LA, you can at the same time ask the LA to identify which elements of the personal budget which you could then receive as a direct payment. This is an actual amount of money that you would receive so that you could commission the provision in the EHC plan yourself.
The LA can refuse to make a direct payment if they don’t believe the person receiving the payments would be capable of managing the money, or if they do not believe it would be used in an appropriate way. They can also refuse where it would negatively impact other services provided by the LA, or if it would not be an efficient use of resources.
Where the provision proposed to be replaced by a direct payment takes place in a school or college setting, the consent of the head teacher or principal of the named school or other institution is required. If they do not consent then the LA will be unable to make a direct payment.
If the LA refuse to identify a personal budget or make a direct payment, you cannot appeal against that decision but you can ask them to review it.
Find out more about financial matters
Contact provide support for families with disabled children. Here is their page on Benefits & Money, where you can find out whether your family is eligible for financial support
Citizens Advice can also support you with particular financial matters. Here is their main website, where you can search the different categories they support with, such as for disabled people and carers
Legal aid can help meet the costs of legal advice, family mediation and representation in a court or tribunal. This can be useful for EHCP appeals etc. Check whether you might be eligible here
Find out more about EHCPs
Content of an EHC Plan
Find out everything about what an EHC Plan looks like and what must be included
|
– An Architecture Exhibition
by Dorte Mandrup
March 22 – May 26 2019
In Spring 2019, we open the doors to one of the greatest Danish architects of our time: Dorte Mandrup.
In a tactile and seductive universe, you’ll be introduced to Dorte Mandrup’s amazing architecture by the Wadden Sea in Denmark and the Ilulissat Icefjord in Greenland – both featured on the prestigious list of UNESCO World Heritage sites. Experience how architecture is shaped by unique natural landscapes.
Wadden Sea Centre, Ribe, Denmark
Thatching strikes back! The Wadden Sea Centre is a celebration of traditional craftsmanship and a new cultural icon on the Danish west coast.
Photos: Adam Mørk
The Icefjord Centre in Ilulissat, Greenland, showcases climate change
Even though last summer was alarmingly warm by Danish standards, climate change seems big and abstract. But in Ilulissat it is very concrete. Here you can clearly see the ice melting.
At Wilhelmshaven, four floors of elegant glass float atop a robust WW2 bunker. A practical and aesthetic application giving way for the bunker to act as the foundation for what at night becomes a shimmering and open lighthouse for the area.
|
With the arrival of warmer weather in southern Minnesota also comes a strange and fascinating species of fungus to the Cowling Arboretum. This is the Cedar Apple Rust, a fungus from the family Pucciniaceae, most of which require two host species to survive. This fungus undergoes many life cycles, and switches between two hosts at different times of the year. As the name suggests, this fungus can be found living on trees from the juniper family (usually the red cedar) and on apple or crabapple trees; spores from this fungus will migrate between these two different host species.
The form present in the Arb now can be found on cedar trees. The growths are about the size of a dollar coin in width, and are a brown and rusty-orange color. These growths form from one type of spore called a teliospore. After warm spring showers in April or May, they produce gelatinous horn-like structures (see photo). These horns will dry up and germinate, producing basidiospores. These spores will float in the air from the cedar to a nearby apple or crabapple tree. Here they will form small yellow or orange spots and create spermatia, the third type of spore. These are contained in a sticky goo that insects carry to another fertilization spot. These spores grow on the underside of a leaf, and produce aeciospores, the fourth and final spore type. These spores will float in the air to another cedar tree, and eventually grow the gelatinous horns again, starting its life cycle over again. This entire life cycle takes years to complete!
This fungus infects the hosts, however usually does not cause significant damage. On juniper trees the growths will dry out and can stay on the tree for many years, and usually the twigs on which it grows dies. On apple or crab-apple trees the leaves, fruit and twigs can be infected, and can cause death of all three in more serious cases. This fungus does not usually cause an entire host to die.
This fungus is a magnificent, and perhaps a frightening, example of the complexity of organisms within our own ecosystem. Many growths of this fungus can be found easily in the eastern end of the upper arboretum on the middle loop trail. Go check them out!
Be First to Comment
|
Factcheck: Do windfarms cause blackouts?
As the winter is winding down, attacks on wind energy are ramping up.
In a recent editorial based on a pretty sketchy study on the UK’s energy supply, The Sun newspaper claimed that wind power’s inherent intermittency could lead to countrywide blackouts.
It observed that one day this month the country’s fleet of windfarms failed to generate even a percentage point of total power demand.
But it turns out that day – January 19th – is the exception, not the rule.
A new Unearthed analysis of UK power supply at time of peak demand shows however little the wind blows (and it hasn’t blown much this month) wind turbines almost always produce power.
The data, compiled by think-tank Sandbag using the Gridwatch website, reveals that only on two out of the 118 days leading up to January 26th did the UK’s wind turbines provide negligible power at the hour of peak demand (5pm)
These stats show 98% of the time wind represented at least 1% of the UK’s generation mix and more than 70% of the time they produced at least 5%.
In absolute terms the UK’s wind turbines produced at least 1GW of power more than 90% of the time — that’s about the same as one of our nuclear plants.
Just to reiterate, this is only at periods of peak demand (the only time that really matters), it doesn’t include smaller farms connected to regional networks (aka ’embedded wind’).
We all know the wind doesn’t always blow, but does that mean the lights will go out when it drops?
You might think so. Fortunately our energy infrastructure is more complex than The Sun gives it credit for.
There are, for instance, mechanisms like the SBR and Capacity Market designed to keep power plants on standby for when the wind doesn’t blow.
And, despite what The Sun tells you, importing energy from Europe via interconnectors is actually affordable.
It turns out that the bigger your market for power, the more power stations you can draw on, the lower the price you have to pay and the less you’ll have to worry about not having enough.
Here are three reasons why variable generation is not causing blackouts:
1. There aren’t any blackouts: As a report from the Energy and Climate Intelligence Unit (ECIU) explains, there has been only one power outage in the past decade attributed to generation issues, when two power stations simultaneously lost power.
The Grid has proven adept at keeping the lights on even in times of crisis, such as the fire at Didcot B in 2014.
Most of the power shortages you’ve experiences are probably down to local distribution issues.
2. Germany and Denmark have greater grid security: These European countries have far higher renewables penetration than the UK but far fewer blackouts as well.
That’s because they have adopted a system-oriented approach, with integrated use of stuff like storage, demand response, interconnection and robust transmission and distribution.
3. Power plants were uneconomical before Ed Miliband: Sure policies like the carbon floor price have hurt the economics of new gas power plants and fewer power plants means less power, but a cost analysis shows that the numbers were pretty sketchy far before that.
These days gas plants need subsidising same as other types of energy.
And finally, let’s bust this myth once and for all: the UK’s coal plants are not closing to meet the country’s climate targets, they are closing mostly because they are old and can’t meet modern pollution standards.
Energy is complex
I was going to take this opportunity to debunk the thinking behind the Institution of Mechanical Engineers study that formed the basis of The Sun’s editorial, but the Carbon Brief beat me to it (and did a very good job).
The paper, which says the UK faces an unfathomable 55% electricity gap by 2025 because of the coal phaseout, relies on data from only one day (seemingly chosen at random) and makes a series of wrong-headed assumptions.
It writes off, for instance, the 13% power provided by wind turbines on that day ‘cannot be guaranteed’.
Sure, reports like this serve a purpose (in this case highlighting the challenges inherent in closing large power plants), but the line that the UK has to build 30 new gas plants in 10 years to bridge the gap just doesn’t make sense.
Nobody is denying that we need more – from new gas and heat plants to tidal power – but that approach fails to consider declining demand or increasing efficiency, demand side management or back-up power plants.
Plus interconnection is a better deal than you’d think.
All in all, it’s not an especially reliable report.
|
Question: Discuss the father-son relationship in Seize the Day. Father-Son Relationship in Seize the Day
Saul Bellow (1915 – 2005), the winner of the 1976 Nobel Prize for Literature, is one of the most prominent post-war novelists who successfully wrote his masterpiece, ‘Seize the Day’, published in 1958, as a materialistic relation to modern European countries and American society in the context of father and son. It is the story of Tommy Wilhelm, the protagonist of the novel, whose life is shattered by the need for the love of a father named Dr. Adler, who is unable to give his son love.
Absence of passion
The novel ‘Seize the Day’ focuses on Tommy Wilhelm, an incompetent and conventional middle-aged man, a complete failure, and a desperate man. He is lonely, depressed, not only from society but also from friends and his wife. In his relationship with his father, Tommy is metaphorically an orphan. In his case, his father is an elderly, wealthy, successful Dr. Adler – physically present but mentally far away. Dr. Adler refuses to engage in her son’s desperate loneliness.
Family is the central theme of Tommy’s life. However, it is here that he has experienced a taste of isolation from everyone around him except his mother. In fact, the father-son relationship becomes extremely complicated in the Tommy-Dr. Adler relationship. Tommy seems to oppose his father in almost every measure. To Dr. Adler, love is of little importance; What counts is a success, financial success. Tommy does not receive the love and emotional support; he expects from his father, as well as financial support.
Persuasion and rejection
Tommy’s relationship with his father is not a source of comfort but a source of pain. Tommy’s whole life is a series of failures. He has certainly made mistakes that his father can never stop forgetting. Dr. Adler, from whom Tommy hops for financial help or at least some sign of sympathy, but receives nothing but selfish advice; ‘Carry nobody on your back.’ He pleads with his father for love but Dr. Adler sprawls himself and rejects his son.
Ostentatious passionate relationship
Mentally and financially weak, Tommy grabs Dr. Tamkin like a sinking lifeboat. Tommy doesn’t seem to find sensitivity and insight in his father which he finds in Tamkin. However, here Tommy also faces a big blow from his ideal godfather, Tamkin, because of his indifference to Tamkin’s faults.
In conclusion, there is no denying the fact that “Seize the Day” is a modern psychological study of the fragile bonds of twentieth-century family life where the father-son relationship is clearly presented. However, the story does not end in pieces but with a view of the oneness of all towards the perfection of one’s union with God, a personality that is traditionally regarded as the father of mankind.
|
By the end of this week, all NISD Prekindergarten students will have access to a new classroom library of books.
That’s 122 classrooms in 71 elementary schools across the District. Each “library” set contains 28 books that are aligned with the new PreK curriculum. There are also printed labels inside each book with ideas for teachers on how to incorporate the books into lessons.
The initiative was funded by a grant from the Frances R. Dewing Foundation which supports early childhood initiatives.
Developing literacy skills is a critical component of the Northside PreK program. The grant provides all of the District’s youngest students with access to a wide variety of reading materials in their classrooms.
“Literacy is key to success in other core academic areas and life in general,” said Patricia Sanchez, Assistant Superintendent of Elementary Instruction. “Reading is an important early childhood learning experience that enriches language and vocabulary development.”
Back in the spring, the District launched a campaign to encourage elementary students to read for 21 minutes every day in 2021.
Pictured are students from Brittany Knight’s class at Carson ES reading their new books.
|
DARPA's 'Biometrics-At-A-Distance' Knows You By Heart
Biometrics-at-a-distance is DARPA's way of picking you out in a crowd - you know, just in case they needed to - from a distance, without your knowledge. The idea is to use sensors to collect biometric identification systems like your identifiable heart beat from further way than is typical in your doctor's office.
OBJECTIVE: Demonstrate the ability to collect, localize, and evaluate physiological signals (e.g., heart rate) at distances greater than 10 meters, non-line-of-sight, and through solid objects (walls, rock, concrete, etc.).
DESCRIPTION: There is a need to remotely detect, collect, and evaluate physiological signals of interest. Applications and concepts-of-operations (CONOPs) that would benefit from this capability include, but are not limited to: building-clearing, warfighter health monitoring or battle damage assessment and triage, situational awareness and assessment. Existing micro-impulse radar (MIR) and ultra-wideband (UWB) technologies have the capability of detecting heartbeat and respiration at distances up to 8 meters (1) but are limited in at greater distances and in challenging environments, such as penetration through thick or multiple walls, concrete, and RF-noisy environments. For example, in a building that has experienced a catastrophic event (fire, earthquake, etc.), the detection of survivors and assessment of their medical condition, in addition to their location to within 1 meter accuracy, would improve the likelihood of recovery of personnel and their survivability. Additionally in a crowded environment it is highly challenging to uniquely identify persons based on collection of physiological signatures, such as electrocardiograms (ECGs). It is possible that high-frequency ECGs or other signals could improve the confidence level in unique identification. Approaches using “on body” sensors that transmit signals to remote locations will NOT be considered.
PHASE I: Demonstrate through simulation and basic proof-of-concept experiment the feasibility of a technology that can record human vital signs at distances greater than 10 meters, using non-line-of-sight and non-invasive or non-contact methods. Should be able to uniquely identify 10 subjects with >95% confidence inside a building or similar structure. Deliverable will be a paper study with detailed physics and link margin analysis, and if possible a proof-of-concept experiment. The Technology Readiness Level (TRL) at the end of Phase1 should strive to be 2-3.
PHASE II: Using surrogate signals, demonstrate the capability to detect, localize, and discriminate ten sources of surrogate physiological signals. Assess the limits of the capabilities using physics-based modeling and proof-of-concept experiments to prove your predictions. Compare the captured signal quality to the quality of signals acquired by contact methods. The Technology Readiness Level (TRL) at the end of Phase2 should strive to be 4-5.
PHASE III: Commercial applications for this technology include use by disaster response search and rescue teams, fire and rescue, police and hostage rescue. Military applications include: building-clearing, warfighter health monitoring or battle damage assessment and triage, situational awareness and assessment.
Science fiction fans have been ready for this development for several generations. In his Hugo award-winning 1967 novel Lord of Light, Roger Zelazny describes a robotic snake that can pick up EEG readings from up to a mile away:
...he's dreamed up some other little jewels, too, to serve the will of the gods ... like a mechanical cobra capable of registering encephalogram readings from a mile away, when it rears and spreads its fan. It can pick one man out of a crowd, regardless of the body he wears.
(Read more about Zelazny's mechanical cobra)
A few years earlier, Philip K. Dick described a cephalotropic dart in his 1964 novel Lies, Inc.:
...a more complex analytical device showed the cigarillo to be a homeostatic cephalotropic dart.
"Whose Alpha-wave pattern?" Theodoric Ferry asked Dosker.
"Yours," Dosker said tonelessly.
(Read more about PKD's cephalotropic dart)
From DARPA via Wired.
Scroll down for more stories in the same category. (Story submitted 11/22/2011)
Follow this kind of news @Technovelgy.
| Email | RSS | Blog It | Stumble | del.icio.us | Digg | Reddit |
you like to contribute a story tip?
Get the URL of the story, and the related sf author, and add
Comment/Join discussion (Back On) ( 0 )
of related articles:
Automated Biometric Identification System (ABIS)
Automated Fingerprint Identification System (AFIS)
Behavioral Biometric Characteristic
Biological Biometric Characteristic
Biometric Match Threshold
Common Biometric Exchange File Format (CBEFF)
Live Biometric Capture
True Accept Rate
True Reject Rate
Related News Stories -
Smartphone Sensor System Tracks Gunfire
'Sound trackers on the roof could zero in on weapons action...'-Greg Bear, 2007.
SHEPHERD-MIL, A Birdlike Soaring UAV
'When he had first built them, they had been crude indeed, flying mechanisms with little more than a reflex-response unit.'- Philip E. High, 1968.
AXON Flex And Stross' Cop Specs
'Arriving on SOC... Start evidence log." [E]verything you see on duty goes into the black box.'- Charles Stross, 2007.
India Opts For Nationwide Iris Scanning
'The road you're on, John Anderton, is the one less traveled...'- Steven Spielberg, 2002.
Technovelgy (that's tech-novel-gee!)
is devoted to the creative science inventions and ideas of sf authors. Look for
the Invention Category that interests
you, the Glossary, the Invention
Timeline, or see what's New.
MIT Robot Cheetah Video Shows Gait Transition
'The legs are long, curled way up to deliver power, like a cheetah's.'
TrackingPoint Smart Rifle
Not your typical 'smart bullet' approach.
'Hello, Computer!' Google Now Highlighted at IO13
Sky City's 220 Stories Are Go
'It rested among green parklands and... stood in total isolation, a glittering block of whites and flashing windows dotted with colors.'
CARMAT Bioprosthetic Total Human Heart Replacement
'George Walt's corporate existence proved the workability of wholly mechanical organs...'
Personal Sniffer Robots
'...The ticking combinations of the olfactory system of the hound.'
Physical Exam? We've Got Apps
See the future of handheld, personal medical devices.
The Interplanetary Internet, Vint Cerf Speaking
'This was the center of Interplanetary Communications.'
Drosophila Robotica, The Mechanical Fly
'... the Scarab [flying robot] buzzed into the great workroom as any intruding insect might...'
Robo-Raven Flapping Wing Robot Bird
'When he had first built them, they had been crude indeed, flying mechanisms with little more than a reflex-response unit.'
Japan's Nursing Home Robot Plan
Let's make the Roujin Z-0001 Robotic Bed!
Samsung Smart TVs With Gesture Control
'He waved his hand and the circuit switched abruptly.'
Swiss HCPVT Giant Photovoltaic 'Flower'
'...leaning against one of the slender stalks of a sunshade-photocell collector.'
Mini-Livers Made By 3D Printer
Organleggers may experience an employment downturn.
Smartphone Sensor System Tracks Gunfire
'Sound trackers on the roof could zero in on weapons action...'
Bacteria Now Make Biofuel Like Oil
'They have ... germs that eat pretty near anything, and produce oil as a waste product.'
More SF in the News Stories
More Beyond Technovelgy science news stories
|
University of Virginia history professor Gary Gallagher talks about the Seven Days’ Battles, a series of conflicts fought during the last week of June 1862. In those battles, Confederate forces under Robert E. Lee thwarted George B. McClellan’s Army of the Potomac in the Union attempt to take the Confederate capital of Richmond. Professor Gallagher argues that, in many ways, the Seven Days’ Battles were more of a turning point in the Civil War than was the Battle of Gettysburg a year later. The Virginia Historical Society hosted this event.
More Info »
|
"It is only with the heart that one can see rightly; what is essential is invisible to the eye. -Antoine De Saint-Exupery
How to take the quiz:
After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text or an approximation of it somewhere in the definition.
After reading the question, write down the letter of your answer choice on scrap paper. Check your answers by using the answer key at the end of the quiz.
1. This is a mobile positioning technique used by emergency services
to find a caller's location.
b. Cell of Origin
c. location-based services
d. automatic vehicle locator
e. Interactive Voice Response
2. This takes the entire allocated frequency range for a given service and multiplexes information for all users across the spectrum range at the same time in order to optimize bandwidth.
a. dynamic multi-pathing
b. time division multiple access
c. single mode fiber
d. code-division multiple access
e. channel extender
3. If a transmission is good, this is what happens when a mobile or
portable cellular subscriber passes from one cell into another and the
network has to switch coverage responsibility from one base station to
b. seamless interface
c. cross-bar switch
d. analog-to-digital conversion
4. This technology allows programmers to use Java programming
language and related tools to develop programs for mobile wireless information
devices such as cellular phones and personal digital assistants (PDAs).
a. Enterprise Java Beans
b. Java 2 Platform, Micro Edition
d. Specialized Mobile Radio
e. Windows CE
5. This is a computing and telecommunications industry specification
that describes how mobile phones, computers, and personal digital assistants
can connect with phones and computers by using a short-range wireless connection.
6. This term was invented by networking expert John Sidgmore to describe
the tiny portable electronic devices that experts predict will become wildly
popular with young people and put new demands on network bandwidth capacity.
a. script kiddy
b. eye candy
c. silicon cockroach
d. pulsing zombie
e. honey pot
7. This third-generation, broadband, packet-based transmission of text,
digitized voice, and video offers a consistent set of services to mobile
computer and phone users no matter where they are located in the world.
a. Universal Mobile Telecommunications System
b. Global Positioning System
d. Synchronized Multimedia Integration Language
e. Broadband Integrated Services Digital Network
8. This family of "smart" microprocessors from Transmeta is expected
to introduce a new era of low-powered mobile devices that can run all day
without requiring a battery recharge.
10. This wireless transmission refers to energy whose wavelengths are
longer than those of visible light, but shorter than those of radio waves.
a. infrared transmission
c. wavelength-division multiplexing
d. Terrestrial Trunked Radio
SCROLL DOWN FOR ANSWER KEY
To learn more, we recommend you visit our Mobile and Wireless Middleware section on searchMiddleware.
To learn more, we recommend you visit our XML and WAP/Wireless section on searchMiddleware.
To learn more about wireless networking, we recommend you visit our sister site searchNetworking.com.
Be sure to try these other quizzes:
Quiz #1: Help Desk Basics
Quiz #2: Security Basics
Quiz #3: Data Storage
Quiz #4: Networking Hardware
Quiz #5: Getting Your Message Across the Network
Quiz #6: Servers
Quiz #7: Protocols
Quiz #8: Database Basics
Quiz #9: Wireless (you're on this quiz now)
Quiz #10: TCP/IP
Quiz #11: Ego-Booster
Quiz #12: Database II
Quiz #13: AS/400
ANSWER KEY: 1b - 2d - 3e - 4b - 5a - 6c - 7a - 8b - 9e - 10a
Let us know how you did and suggest a topic for a future quiz! firstname.lastname@example.org
|
Written by Michelle Kretzer
in Flushing might be blushing today. Public School (P.S.) 244 in that Queens
neighborhood in New York did something royally kind to animals by becoming the country's first all-vegetarian traditional
public school, so PETA's humane-education
division, TeachKind, is giving the school its Compassionate School
P.S. 244, going vegetarian
was an easy decision
because the school has incorporated healthy eating and living habits into its curricula for
years. Other schools in the district are considering adopting meat-free menus,
too, depending on the success of P.S. 244's program. And if the students' and
parents' reactions are any indication, cruelty-free meals are a hit. As one
9-year-old charmingly put it, "It's much more healthier. It helps to make
our bodies stronger."
P.S. 244 has inspired you to make a school in your area kinder, check out TeachKind's plethora of free
lesson plans and materials.
Written by PETA
An elementary school in Denver, Colorado, is giving its students food for thought. To promote healthy eating habits among its students, SOAR has become Colorado's first vegetarian school and earned itself a Compassionate School Award from PETA, for saving the lives of countless animals.
"There is tons of research about plant-based foods preventing disease," said SOAR's head of school, Gianna Cassetta. "[W]e're making a difference in the way people think about food. Hopefully by the time our kids are in fifth grade, they'll be very conscious about what they eat."
And it's working. SOAR lunches are loaded with fruits and vegetables, and even the food students bring from home must adhere to SOAR's guidelines. Parents report that when they are grocery shopping, if something isn't healthy enough to go school, it goes back on the shelf. SOAR is continuing its quest for a new generation of healthy kids with the opening of a second school next year.
To help the kids in your life make the switch to a healthy vegan diet that will help prevent heart disease, diabetes, obesity, and other diseases, visit PETAKids.com/Vegetarian.
Written by Michelle Sherrow
you have a general question for PETA and would like a response, please e-mail Info@peta.org. If you need to report cruelty to
an animal, please click
here. If you are reporting an animal in imminent danger and know where to find the
animal and if the abuse is taking place right now, please call your local
police department. If the police are unresponsive, please call PETA
immediately at 757-622-7382 and press 2.
Follow PETA on Twitter!
Almost all of us grew up eating meat, wearing leather, and going to circuses and zoos. We never considered the impact of these actions on the animals involved. For whatever reason, you are now asking the question: Why should animals have rights? Read more.
|
The different varieties of the species
Theobroma cacao L.
There are about 20 known varieties of the Cacao plant, but only three are
commonly used in making Chocolate.
There seems to be evidence that these are really categories containing a
number of different sub-varieties but perhaps the sub varieties are just
('foreign' in Spanish because it is the African cultivar) is most common --
80% to 90% of all commercial Cacao comes from this plant. It has a high yield
and is very resistant to disease. Not classified as "Fine Grade", this Cacao
is used as a base to be blended with superior types of Cacao. Perfumed aroma
with a fruity and bitter taste. The Amelonado form of Forastero is most often used. It is rather mild and in
some cases can be unpleasant.
- Crillo ('native' in Spanish,
because it is the Venezuelan variety) is cultivated in small quantities in the
original Cacao areas, especially in Venezuela. Traditionally the most rare
and sought after of all the Cacao varieties, it produces "very fine" grade
Chocolate sought after by some of the very high end Chocolatiers. Yields are
low and the tree is fragile. Only 5% to 10% of the world's production is
Crillo. It has more Theobromide than any other
variety and therefore this is the variety that is sometimes suggested to
contain caffeine. A small bit of it is sometimes mixed in to a large batch of
the Forastero. The famous Ecuadoran Nacional
is a form of Crillo. It is creamy and strong.
Easily detectable sweet aroma, almost no bitterness, delicate taste.
- Trinitero, which is grown almost
exclusively in the Antilles, is a hybrid of the two other varieties and
combines the best aspects of both. It accounts for 10% to 15% of world
production. It has greater resistance to disease and damage than Crillo and many plantations that specialize in fine grade
Cacao have been switching from Crillo to Trinitero. It produces generally excellent Cacao, being
used more often in "very fine" grade Chocolate. Fruity aroma and slightly
acid. It is spicy and sharp.
Legend says that in the
late 17th century a Spanish plantation of Crillo on
the island of Trinidad, was destroyed by a hurricane. Assuming all the trees
to be dead, it was replanted with Forastero; but
spontaneous hybrids appeared, creating fortune out of the disaster.
If you taste the three varieties side by side, you will discover very distinct
differences! I strongly prefer the Trinitero and am
not very fond of the Crillo at all.
[top of the Varieties page],
Return to Selection Bar.
|
SunniteArticle Free Pass
Sunnite, Arabic Sunnī, member of one of the two major branches of Islam, the branch that consists of the majority of that religion’s adherents. Sunni Muslims regard their sect as the mainstream and traditionalist branch of Islam, as distinguished from the minority sect, the Shīʿites.
The Sunnis recognize the first four caliphs as the Prophet Muhammad’s rightful successors, whereas the Shīʿites believe that Muslim leadership belonged to Muhammad’s son-in-law, ʿAlī, and his descendants alone. In contrast to the Shīʿites, the Sunnis have long conceived of the theocratic state built by Muhammad as an earthly, temporal dominion and have thus regarded the leadership of Islam as being determined not by divine order or inspiration but by the prevailing political realities of the Muslim world. This led historically to Sunni acceptance of the leadership of the foremost families of Mecca and to the acceptance of unexceptional and even foreign caliphs, so long as their rule afforded the proper exercise of religion and the maintenance of order. The Sunnis accordingly held that the caliph must be a member of Muhammad’s tribe, the Quraysh, but devised a theory of election that was flexible enough to permit that allegiance be given to the de facto caliph, whatever his origins. The distinctions between the Sunnis and other sects regarding the holding of spiritual and political authority remained firm even after the end of the Caliphate itself in the 13th century.
Sunni orthodoxy is marked by an emphasis on the views and customs of the majority of the community, as distinguished from the views of peripheral groups. The institution of consensus evolved by the Sunnis allowed them to incorporate various customs and usages that arose through ordinary historical development but that nevertheless had no roots in the Qurʾān.
The Sunnis recognize the six “authentic” books of the Hadith, which contain the spoken tradition attributed to Muhammad. The Sunnis also accept as orthodox one of the four schools of Shari’ah (Islamic law). In the 20th century the Sunnis constituted the majority of Muslims in all nations except Iran, Iraq, and perhaps Yemen. They numbered about 900 million in the early 21st century and constituted a majority of all the adherents of Islam.
What made you want to look up "Sunnite"? Please share what surprised you most...
|
Some strains now produce poisonous hydrogen sulfide (H2S) gas
Common Plant Vector Injects Genes into Human Cells
The genetic engineering community has assumed that Agrobacterium, a commonly used gene
transfer vector for plants, does not infect animal cells, and certainly would not transfer genes into
them. But this has been proved wrong. Prof. Joe Cummins warns of hazards to laboratory and
Agrobacterium tumefaciens is a bacterium that causes tumours to appear on the stems of
infected plants. The bacterium causes the tumours by transferring genes to the cells of the
infected plant cells from a tumour inducing plasmid (Ti). The Ti plasmid has virulence genes that
determine attachment to cells and transfer of a segment of the plasmid, T-DNA, to the plant cell.
The transferred DNA is integrated essentially randomly (no apparent sequence bias at the site of
insertion) into the plant chromosomes and normally add bacterial genes that stimulate plant
tumour cell growth.
In crop genetic manipulation (GM), the growth-stimulating genes that give rise to tumours are
replaced by GM constructs which include genes for antibiotic resistance, plant viral promoters
and genes for desired crop traits such as herbicide tolerance.
Until quite recently, the genetic engineering community has assumed that
Agrobacterium does not infect animal cells, and certainly would not transfer genes into
them. But this has been proved wrong.
A paper published earlier this year reports that T-DNA can be transferred to the chromosomes of
human cancer cells . In fact, Agrobacterium attaches to and genetically transforms several
types of human cells. The researchers found that in stably transformed HeLa cells, the
integration event occurred at the right border of the Ti plasmid's T-DNA, exactly as would happen
when it is being transferred into a plant cell genome. This suggests that Agrobacterium
transforms human cells by a mechanism similar to that which it uses for transformation of plants
The paper shows that human cancer cells along with neuron and kidney cells were transformed
with the Agrobacterium T-DNA. Such observations should raise alarm for those who use
Agrobacterium in the laboratory.
The integrated T-DNA will almost certainly act as a mutagen as it integrates into human
chromosomes. Cancer can be triggered by activation of oncogenes (ie, cancer genes) or
inactivation of cancer suppressing genes. Furthermore, the sequences carried within the T-DNA
in the transforming bacterium can be expressed in the transformed cells (the viral promoter CaMV
has been found to be active in HeLa cells ) and constructions currently being tested include
pharmaceutically active human genes such as the interleukins .
It is clear that little has been done to prevent environmental escape of the transforming bacteria
or to quantify such releases. In conclusion, a study of cancer incidence among those exposed to
Agrobacterium tumefaciens in the laboratory and
in the field is needed. It would be worthwhile to screen workers for T-DNA sequences.
Kunik T, Tzfira T, Kapulnik Y, Gafni Y, Dingwall C, and Citovsky V. Genetic transformation of
HeLa cells by Agrobacterium. PNAS USA, 2001, 98, 1871-87.
Ho MW, Ryan A and Cummins J. CaMV 35S promoter fragmentation hotspot confirmed and it is
active in animals. Microbial Ecology in Health and Disease, 2000, 12, 189.
See "GM AIDS virus more deadly" by Joe Cummins & Mae-Wan Ho ISIS Report, July 19, 2001
For more details contact firstname.lastname@example.org
J Clin Microbiol. 1993 September; 31(9): 2541–2543.
Recovery of a strain of Agrobacterium radiobacter with a mucoid phenotype from an
immunocompromised child with bacteremia.
W M Dunne, Jr, J Tillman, and J C Murray
Department of Pathology, Texas Children's Hospital, Houston 77030.
Agrobacteria are associated more commonly with plant than with human disease. The isolation of
Agrobacterium radiobacter from blood cultures of an immunocompromised child with a
transcutaneous catheter prompted a review of human infections caused by Agrobacterium
species. Only 12 reports describing 19 cases of Agrobacterium infections in humans have
appeared in the literature. Sixteen of the patients (84%) were equipped with implantable or
transcutaneous medical devices at the time of infection, and 14 of the 19 (80%) patients could be
considered immunocompromised because of underlying disease processes. Unlike those in
previous reports, however, this patient was infected with a novel mucoid phenotype of A.
radiobacter. Because of the significant relationship between infection and biomedical implants, we
evaluated the adhesion of this mucoid strain and a nonmucoid strain of A. radiobacter to plastic
by using two in vitro assays. No adhesion or biofilm formation was detected for either strain, but
nonetheless it is clear from this review that the isolation of Agrobacterium spp. from patients with
indwelling medical appliances should not be dismissed as an environmental contaminant.
Agrobacterium in humans
Although generally seen as an infection in plants, Agrobacterium can be responsible for
opportunistic infections in humans with weakened immune systems, but has not been shown
to be a primary pathogen in otherwise healthy individuals. A 2000 study published by the National
Academy of Sciences suggested that Agrobacterium attaches to and genetically transforms
several types of human cells by integrating its T-DNA into the human cell genome. The study was
conducted under laboratory conditions and states that it does not draw any conclusions
regarding related biological activity in nature.
There is a conjectured connection with Morgellons syndrome. Dr. Stricker, along with Dr.
Citovsky, MRF board member from the State University of New York at Stony Brook and an expert
on plant pathogens, reported in January, 2007, that Morgellons skin fibers appear to contain
cellulose. Five skin samples of Morgellons patients contained evidence of DNA from
Agrobacterium yellow group: bacteremia and possible septic arthritis following
peripheral blood stem cell transplantation
A 47-year-old male patient developed sepsis and monoarticular arthritis following
autologous stem cell transplantation for recurrent Hodgkin's disease. Blood cultures
were positive for Agrobacterium yellow group. The knee pain and swelling responded
promptly to the institution of empirical broad-spectrum antibiotics. Recurrent
bacteremia developed necessitating Hickman line removal for eventual resolution of
the infection. Transplant physicians should be aware of this unusual pathogen and the
potential for both persistent line-related sepsis and possible septic arthritis.
Bone Marrow Transplantation (2000) 26, 101-104.
|
“Simply put, PTSD is a state in which you can’t stop remembering a traumatic event or experience.”
Post Traumatic Stress is a normal reaction to an abnormal situation or terrifying experience – your being is shocked to the core. The events that trigger PTSD range from car accidents, sexual assault, natural disasters (hurricane, tornado, flood), to military service.
Post traumatic stress disorder interferes with your normal day-to-day life because of heightened anxiety levels.
- Your anxiety levels may have remained on high alert from the date of the incident.
- You may relive the event in your dreams every night.
- It may be many months after the ordeal when you feel like your life is just getting back to normal when a heavy rain (after surviving a hurricane), hearing a car door (after leaving an abusive spouse), or even the telephone ringing (after a family tragedy) triggers you and your heart races, your body starts shaking and you are literally terrified, all over again.
Post traumatic stress makes you feel like a scared rabbit. It is a very uncomfortable condition to live with.
|
Naming the flowers
- A History of the Hebrew Language by Angel Sáenz-Badillos, translated by John Elwolde
Cambridge, 371 pp, £24.95, December 1993, ISBN 0 521 43157 3
- Language in Time of Revolution by Benjamin Harshav
California, 234 pp, £19.95, September 1993, ISBN 0 520 07958 2
One of the most intriguing and in some ways bewildering aspects of the Hebrew language is that it has managed to stay in continuous literary use for over three thousand years; roughly the same length of time as Chinese and Sanskrit, the two other major ancient literary languages that are still in written use. The most dramatic changes that have occurred over the centuries have been the emergence of rabbinic Hebrew from Biblical Hebrew towards the end of the pre-Christian era; the complex encounter of Hebrew with Arabic poetry and philosophy beginning in the tenth century; and the early 20th-century revival of Hebrew as a vernacular in the new Zionist settlements, itself preceded – and made possible – by the revival in Enlightenment Europe of Hebrew as a secular literary language. In each of these historical transitions, the language went through significant changes in vocabulary, grammar, syntax, verb-tenses and patterns of idiom. Because of the authority of the Bible, however, orthography and morphology, as well as much essential vocabulary, remained relatively constant. And because Jewish culture as a whole clung so tenaciously to its ‘sources’ (as they are habitually called in Israeli Hebrew), the earlier strata of the language may have become in some ways antiquated but were never made obsolete. A literate speaker of modern Hebrew is probably no farther removed from the language of the Bible than a speaker of modern English is from the language of Shakespeare: the basic vocabulary is perfectly accessible, though a modern reader is likely to construe some terms anachronistically and puzzle a bit over the tenses (which may in fact be aspects – designating completed and uncompleted action – rather than tenses in the modern Western sense).
|
Long ago someone shared with me a simple, but powerful concept: the "power of one." It refers to the belief that, regardless of how daunting or hopeless a situation may seem, each one of us has the power to do something that can make a difference.
Recently, I had the good fortune to be schooled in the "power of one" in regard to sustainable design. Architects and interior designers, we like to say, know something about everything when it comes to the built environment. I have to confess that when it comes to sustainable design, I know a little about many things. So it was both a lesson and a treat when I had the opportunity to hear Ray Anderson of Interface talk about practices designers can employ to better support sustainability.
The problems sustainability advocates seek to address and overcome seem insurmountable. The population projections alone are staggering. It took the human species about three million years to reach a world population of 1.6 billion in 1900. At the end of the 20th century that figure had increased to 6.1 billion. In the next 50 years, the population is expected to increase another 50 percent to about nine billion. Such rapid growth places great strains on food, water and energy supplies, as well as contributing to greatly increased pollution, waste and the depletion of natural resources. In the face of global challenges like these, what can our profession, let alone a single individual, do to help?
Anderson had an empowering answer to that question. Because of the many ways that designers and architects are connected to various resources and communities, a single practitioner applying sustainable principles to specification and business practices can have a tremendous impact on controlling growth and protecting the environment. Now picture that "power of one" multiplied by thousands. The impact would be tremendous.
Anderson shared a list of things businesses can do to practice and promote sustainability. To preserve precious resources, we can eliminate waste, de-toxify emissions, reduce the use of non-renewable energy sources, redesign products to use less material and energy, and develop technologies to increase the use of recycled and repurposed materials. As part of our business practices, we can use more efficient cars and trucks, and plan trips and meetings to minimize travel. Anderson pointed out that every day we can make choices that influence others' behavior. We have relationships with suppliers, customers, employees and others through which we can engage and encourage them to be drivers of sustainability. We can insist that all suppliers throughout the supply chain adopt sustainable practices. We can help to create new business practices that are based in service rather than commerce. We can act to promote corporate accountability and tax laws that favor sustainability instead of subsidizing exploitation and waste.
Not everyone may be ready to take up the flag for sustainability, but each of us can begin now to reduce waste and energy use and to preserve resources. Conservation alone, though, is not enough. To ensure that future generations have the resources they need, we have to do more than slow down the rate at which we are destroying the environment and threatening our survival. The goal, said Anderson, is to adopt "restorative" practices that help to replenish resources and create new sources of materials and energy. Working toward this goal is our responsibility and will serve as our legacy to future generations.
I would like to submit a corollary to the "power of one:" Every individual has the ability to learn and to apply that knowledge to better the situation. This, too, is a simple, but powerful and responsible—and rewarding—concept. I for one am ready to exercise a little "power" to ensure a fit world and a healthy environment for all those who come after us. I hope you are, too.
ASID National President H. Don Bowden is founder of his own firm, H. Don Bowden-Architect, in Mobile, AL. ASID can be reached at (202) 546-3580; fax (202) 546-3240; www.asid.org.
|
August 16, 2010 |
MANGALORE: There are no surprises here. The fitness level among urban children is less than their counterparts in the rural set up. A pilot study done by the department of physiotherapy, Fr Muller Medical College , among 680 children has revealed that urban children spend more time in sedentary activities like watching television and playing video games than rural children, which has resulted in many ailments, chiefly obesity....
April 5, 2002 |
new delhi: with sedentary lifestyle figuring as one of the ten leading causes of death and disability in the world, who officials and experts from india on friday called the governments to focus on perpetuating healthy life styles. "every year globally about two million deaths can be attributed to physical inactivity and according to a who study, sedentary lifestyle increases mortality and doubles the risk of cardiovascular diseases, type 2 diabetes, and obesity," dr uton muchtar rafei, who regional director for south-east asia region, told reporters here ahead of the world health day, coming sunday.
October 11, 2010 |
CHANDIGARH: There are times when it is difficult to tuck in one's t-shirt as the bulging abdominal belly cannot allow it room for the same. It might not cause alarm at first, but it could go on to become a cause for concern. And the concern grows all the more when the waist to hip ratio exceeds 0.95 in case of men and 0.8 in women's case. Intake of fatty food, lots of cholesterol and lack of vitamins and minerals are the dietary factors that could cause the problem. A sedentary lifestyle could aggravate it. According to World Health Organization (WHO)
October 20, 2012 |
PUNE: More number of women suffer from osteoporosis than men. But considering it solely as a 'woman's disease' would not be wise, as it can be a significant threat to men's mobility and independence as well. Doctors say osteoporosis progresses silently without symptoms until a fracture occurs. Hence the causes, such as smoking and alcohol consumption, in men should not be ignored for a longer period. "Osteoporosis develops less often in men than in women because men have larger skeletons.
May 18, 2002 |
DHANBAD: For the first time in India, a doctor of Jharkhand has put the extensive resource material on diabetes prevention and cure in Hindi on the Mahaportal of Indian languages, run by Reliance group's website. Log on to www.netjaal.com and enter the homepage of Mahaportal of Indian languages. Then log on to www.hindi.netjaal/health/diabetes and know all about diabetes--its history, prevention and cure. "The need for first Hindi website on diabetes was long felt, particularly in our country, in view of the disease assuming epidemic proportions," pointed out Dr N K Singh, senior divisional medical officer, Eastern Railway, Dhanbad divison, who belongs to Jharkhand.
March 28, 2013 |
Impotence is emerging as a major cause of divorce in India, says a recent study, adding that around 20-30 per cent marriages in India are breaking up for want of satisfaction in sexual life. The study, conducted by Alpha One Andrology Group, an association of doctors dealing in sex-related problems in men, took into account nearly 2,500 Indian men suffering from erectile dysfunction or impotence. The study found that erectile dysfunction affects 50 percent of men over the age of 40 and 10 percent of men below 40. "The analysis revealed that of the 2,500 men suffering from erectile dysfunction, one in five were divorced while the marriages of one in 10 were on the verge of breaking over their physical health," Anup Dhir, a reconstruction surgeon and andrologist, said.
June 14, 2010 |
PUNE: Twenty-five-year-old Siddharth suffered from frequent diarrhoea that led to weight loss. His doctor found that he was gluten sensitive and advised him to shun wheat-related products and switch to jowar and bajra-based food. Gluten is a special protein found in wheat, rye and barley. A gluten sensitive person who may lose out on the goodness of wheat can get the benefits from brown rice, rice bran and millets like jowar and bajra, buckwheat and breads made from these products.
November 6, 2012 |
BANGALORE: If you love junk food, junk it. It's one of the primary reasons why heart diseases are striking the young. Thirty is the new 40, where cardiac ailments are concerned, according to a recent study by a team of Cardiological Society of India (CSI). The age of getting heart attacks has fallen from 40 to 30 in the last decade, revealed the study, 'Breaking the unbreakable plateau' . Apart from poor eating habits, a sedentary lifestyle and lack of exercise are the triggers for heart diseases . "Not only college students, even working professionals have adopted the ways of the modern lifestyle, and this has proved to be the instigator of heart diseases.
May 17, 2013 |
Health authorities from across the globe suggest that walking 10,000 steps a day helps keep the body & mind fit without the need for additional exercise. Walking is the best and most inexpensive form of exercise. It can help you lose weight, improve your blood circulation, uplift your mood and help you to sleep better. So ideally, between the first steps to the bathroom in the morning, to the last as we hit the sack at night, we should walk at least 10,000 steps which converts to approximately 8 kilometers.
January 30, 2009 |
Waking up feeling as exhausted as the night before? Slept eight hours, and still feeling tired? It may be because you're not getting enough "good sleep". Sleep is the body's recovery mechanism against daily wear and tear. The importance of getting sound and restful sleep can't be emphasized enough. Tossing, turning and waking up more than once during the night are signals that your body is not getting the kind of sleep it needs. To wake up feeling refreshed and calm each morning, try these easy tips to get out of the disturbed sleep rut. Bed basics : Opt for a comfortable bed. Dr Jayashree Rana, general physician, recommends, "Your bed should be firm, yet soft.
|
Learn About The Underground Railroad At The Palm Harbor Library
PALM HARBOR - Join local author, adventurer, teacher, and explorer Rick Rhodes on Friday, February 12, at 2:00 p.m. as he walks you through the history of the Underground Railroad, in honor of Black History Month. He has researched the journey of African Americans from the shackles and chains of slavery in the old south to a new land of freedom and eventual liberation. Admission is free, and both kids and adults are welcome!
Captain Rhodes has more than just a few stories to tell, and his passion to share American History with audiences is infectious! His programs focus on some of the lesser-known historical facts and are enhanced by a multi-media slide show. Rhodes, whom some people call a "History Detective", has researched and written eight guidebooks. Wherever he's been, he has engrossed himself in local history, and he has a passion to share this with readers. The library is located at 2330 Nebraska Avenue. For further information, call (727) 784-3332, Ext. 3006.
Return to Current Edition
|
Recreation Center Children Explore Japan
On Wednesday April 28, the children at Sorrentino Recreation Center Afterschool Program (sponsored by Derek Jeter’s Turn 2 Foundation) were fortunate enough to begin their Japanese Explorer Program where the children learned many things about the Japanese culture. Many of us may look at Asian people and think that they all are the same culture and they all speak and write the same language. Well, the children have learned that that isn’t the case at all. Japanese people have a totally different language and culture. The children were able to see the difference between the languages when they were learning how to write in Japanese.
For the past two sessions the children have even learned how to greet each other in Japanese by saying “Konnichiwa.” They were also able to see the similarities between Japanese people and Americans by playing a hand game called Jan-Ken-Pon which is the equivalent to our game Rock Paper Scissors. They also created a spinning top made out of origami paper and a tooth pick. In this game, you are supposed to see who makes a top that can spin the longest. Each child was also able to write out a business card in Japanese and put down what he or she wants to be in the future. The program also teaches what things are made in Japan, what cartoons are from Japan, how children in Japan live and the different foods they eat and much more. It is the hope of the Sorrentino Afterschool staff that the children not only get a fun and recreational experience but that they are cultured and through this and other programs offered by The City of New York Parks and Recreation, they will continue to do just that.
|
It's never been clearer that American farmers are truly blessed to work the land. Halfway across the globe, farmers in war-torn Iraq have faced economic hardships and violence—all while trying to rebuild their agricultural industry, says Rear Admiral Gregory Smith, Chief, Public Affairs, Communication Division, Strategic Effects, Multinational Force–Iraq.
The country's agricultural production stems from Taji, the area of rich land north of Baghdad, between the Tigris and Euphrates rivers. To the west is barren desert and to the north are dense mountain ranges. For those reasons, Smith says, "Iraq relies on the center of the country to support the agriculture base.
"About 30 million acres, representing 27% of all Iraq's land mass, can be cultivated,” Smith explains. "That land, though, as you fly over it today, is not what it had once been. There was certainly lots of activity in the past. But unfortunately, the lack of investment from the Saddam era in the 15 years since the last Gulf War, and of course the past five years, has really crippled the agriculture industry.”
Iraqi farmers are still in a transition from a state government that provided all of their resources to building a market-based economy. Wheat, rice and corn are the predominant crops in Iraq. Other crops include barley, sunflowers, vegetables and date palms. The livestock industry centers on sheep and cattle production.
Back to basics.
The No. 1 issue in Iraq's agricultural system is the water supply. "You can't drill for water here—you can drill for oil, but not water. All of the water in the country, including irrigation for crops, must be fed through man-made canals and pumps. You can't depend on rainfall to provide water for crops to grow, as there is so little of that,” Smith says.
The man-made canals come right up to the farmer's land. The farmer then pumps the water into irrigation canals for his crops. This practice relies on electricity, also an economic hardship for farmers.
"Farmers are hurting at the most basic level. As the water gets fed down these canals, it is often stolen by illegal tapping of the canals, as well as the conditions of the canals themselves,” Smith explains.
Keeping the canals clean and weed-free is also vital to supplying southern areas with water. "It isn't something that can be done by hand,” Smith says. "It's a very mechanically labor- intensive process to clean out these canals.”
Farmers are also responsible for moving water back off of their farmland. The water cannot set in the canals because the salinity of the water will destroy the soil. Underground silt pipes bleed the water off and drain back out to the canal, much like tile systems in the U.S.
"Every few years, those tile systems clog up and the pipes have to be cleaned out,” Smith says. "In the past few years, there hasn't been an economy to do that. The Iraqi people will have to make some real investment in the irrigation distribution system just to get the water moving.”
When Smith toured farms in Taji, he visited a sheik who is a multigenerational farmer. In his family, the sheik is the only male figure left, as his two brothers died fighting in a war. The sheik showed Smith his wheat field, which consists of a couple dozen acres. He owns one tractor that no longer works, so he has to rent equipment, which is costly.
A major factor for livestock producers is the lack of feed mills. There is no feed mill to grind feed for sheep or cattle—producers must rely on imported feed. "That increases the cost of raising sheep or cattle tremendously,” Smith explains. "One of the first things they are trying to do here is build local feed mills, so as grain farmers harvest their crops they can take it to these processing facilities.”
Even if Iraqi farmers did have easy access to livestock feed, they would have few places to take animals for slaughter. There are no stockyards in Iraq, and the economy is not equipped to sell on a price-per-pound basis.
A large part of agriculture in Iraq is vegetable production. Smith says the problem isn't so much getting products to market as it is the packaging and processing facilities are unable to turn raw produce into food products that the Iraqi population can use in a timely fashion. Currently, most fresh produce is imported into the country because local produce often spoils before customers are able to consume it.
Fight to farm.
The country's areas of violence are in the same geographic area as agriculture. "Iraq is still very much entrenched in a war here,” Smith says. "There is significant risk of violence in moving products along the road. We're a long way from an Iraqi farmer being able to load up a truck with his harvest and drive to town to deliver to a market without considerable risk.”
The sheik Smith visited on his tour of Taji farms is forced to organize security volunteers to protect his village, fields included. The day Smith was there, the sheik's son was taking a nap. When Smith asked why, the sheik replied that his son had spent all night standing guard in front of their house.
"It's hard to think of sending your son to the end of your road and having him sit there with a rifle all night guarding against someone coming onto your property intent on doing harm,” Smith says.
Freedom to live.
The heart and soul of an Iraqi farmer is very familiar, Smith says. "They are hardworking people, family oriented, goal-oriented and independent. Much like our American farmers always have been.”
Smith remembers the sheik that he visited. "He is a very proud man, and a very influential man in the area where he lives, Taji.” Yet, as powerful as he is, he doesn't own any equipment because Iraq doesn't manufacture machinery. It all has to be imported, which is expensive. Until farmers in Iraq begin to make money, it will be difficult to buy the equipment they need.
"You can see the challenges here.” Smith says. "But I did not feel they were looking to get out of this business. They weren't looking for anything except a bright way forward.”
|Bring in the Iron
|Without machinery, Iraqi farmers are merely spinning their wheels. Earlier this year, the U.S. Department of Defense's Task Force to Improve Business and Stability Operations in Iraq purchased 200 New Holland tractor kits from CNH International. The purchase also included training for workers at a tractor assembly facility in Iraq. In addition to numerous contracts with the U.S. Military, CNH has had the opportunity to fulfill multiple contracts to benefit Iraqi farmers. In 2006, CNH, along with the U.S. Agency for International Development (USAID), refurbished 2,772 tractors for Iraqi farmers. Also in 2006, CNH and USAID developed a training program to improve and update the skills of Iraqi personnel involved in the agricultural equipment sector. In 2005, CNH shipped 60 New Holland combines and 180 tractors to the Iraqi Ministry of Agriculture and Ministry of Municipalities.
Iraq's gross domestic product (GDP) is largely fed from the oil industry. The agricultural industry accounts for only 6% to 7% of the GDP, but it is the second largest contributor. While it represents only a small portion of the GDP, the agricultural sector employs approximately 25% of the Iraqi population. Oil, though not as labor-intensive, still produces the majority of Iraq's wealth.
To help encourage growth in the agricultural sector, Iraqi government officials have teamed with civilian organizations and companies, universities and Extension agencies to bring new opportunities and increased educational resources to Iraqi farmers.
"There is a minister of agriculture in Iraq and a small network of Extension-type programs to support farmers,” Smith says. "There are a lot of grant programs that the minister of agriculture provides. There also are assistance-in-kind programs for seed and fertilizer.
"There have been many other investments made by other partners, the U.S. being one of those. Hundreds of thousands of dollars have been invested in the agriculture industry, a big part of that in the area of irrigation.”
The focal point for reconstruction is provided by provincial reconstruction teams (PRTs). These groups are made up of about 30 people, both military and civilians from different parts of the U.S. government, most often agriculture and transportation. Stateside, Lt. Col. Harvey Fitzgerald teaches agriculture at South Dakota State University. In Iraq, he leads one of 28 PRTs. Smith says that in many cases, PRTs try to use local Iraqis to help solve their own country's problems.
"In the end, it's going to be Iraqis solving Iraqi problems, not some army colonel,” Smith says.
"Looking back to the 40s and 50s, American agriculture was much the same way—not a lot of heavy equipment, it was basic simple farming. That's where these people are at. We are talking about a very simplistic agricultural society that relied on labor, hard work and water that was fed to them through canal systems. Access that water was given to them, also during the Saddam era, seed was given to them, supplies were given to them. All of those systems that were given to them are gone now. They are starting an economy-based agriculture system from the ground up. They are getting a lot of help from U.S. agriculture personnel, as well as non-government agriculture organizations, Extension and ag universities, to help them begin laying a ground work for the agricultural society.”
You can e-mail Sara Brown at firstname.lastname@example.org
- December 2008
|
You use Firefox for Web browsing. You know it's a free Web browser that's safe, quick, and has all kinds of add-on modules (there are thousands of these — for chatting, bookmark management, social networking, image-processing, and even federal court-file browsing — at addons.mozilla.org). It has frequent updates to fix bugs, and every new version seems to find a new cool way to make the Web easier.
Thank Richard Stallman and the GNU project for all of those things. Apart from their programming skills, the genius of all their work is really the GNU General Public License (GPL), the legalese rubber where the free-software movement hits the intellectual-property-law road.
The GPL is one of several "copyleft" efforts, in which creators assert their copyright to something, but only for the purpose of ensuring that it — and any future works based on it — can always be distributed for free. (People can, and do occasionally, charge for their adaptations, but there's a disincentive: anyone who pays for it can, under the license, turn around and give it away for free themselves.)
It is legally different from placing a work in the "public domain," from which any person can take, repackage, and sell freely (that's how book publishers can reprint Shakespeare's plays, for example, and charge for copies). The GPL is a license to a user from a copyright holder, granting permission to use the material, but only under certain conditions (namely, free distribution of anything made with the material).
For example, while Firefox development is not coordinated by the GNU group, it uses some basic code that was first created by them. Programmers don't often want to bother creating the nuts and bolts — they want to make the machine. So they reach for the nuts and bolts, locate GNU-created free code, and find themselves in GPL-land, where all code is free, but all modification or adaptation of that code is also free. They are effectively enlisted in the free-software movement, even if their users don't know it.
Not all programmers want to start with GNU-created code (or something built on its foundations). Some actually do start from scratch and write all their own stuff. But the GPL is available to them, too — they just have to declare that.
It is the GPL that allows all of this — it is the key to the success, expansion, and future growth of the free-software movement. Courts in the US, Germany, and France have upheld the license's terms, requiring people who were charging for the software to stop doing so, and enabling out-of-court negotiations with companies that have also succeeded in affirming the GPL.
Many programs — even those on Windows or Mac platforms (against which Stallman rails) — are GPL-covered. The GPL is not only more widespread than GNU/Linux machines, but has the power to invade and co-opt those private platforms, making them more open over time, and showing developers and users alike the possibilities of open and free software.
Go to gnu.org/licenses/gpl.html for more information.
|
Kansas congressional districts are based on the enumeration of the state’s population as reported in the most recent decennial federal census.
The Kansas Constitution requires that the population basis for legislative districts (and by extension, the State Board of Education Districts) be the most recent decennial federal Census as adjusted to exclude nonresident students and military personnel and to include resident students and members of the military at the place of their permanent residence.
The Kansas Constitution was amended by the voters in 1988 to require the use of adjusted U.S. Census figures for development of legislative districts. Prior to 1988, the Constitution required that legislative districts be based on population enumerated in a state-conducted Census. The current adjustment process was used for the first time for redistricting in 1992, following the 1990 federal Census.
|
Adult Nonfiction CS71 .S2585 2009
Summary: When her father left Japan, his mother told him never to return: there was no future there for him. Shinji Sato arrived in California determined to plant his roots in the Land of Opportunity even though he could not become a citizen. He and his wife started a farm and worked in the fields together with their nine children. At the outbreak of World War II, when Kiyo, the eldest, was 18, the Satos were ordered to Poston Internment Camp. Though they had lived the US for two decades and their children were citizens, they were suddenly uprooted and imprisoned by the government.
Be the first to add a comment! Share your thoughts about this title. Would you recommend it? Why or why not?
Question about returns, requests or other account details?
Add a Comment
|
Swedish researchers have found that high contents of a certain enzyme that is measured in the blood, may be linked to both heart disease and cancer.
Blood test shows when you'll die
Swedish researchers have found that high contents of a certain enzyme that is measured in the blood, may be linked to both heart disease and cancer, and could thus serve as an early predictor of who is most likely to die from these diseases. In the study, which involved nearly 2,000 people enrolled in two separate long-term trials, Johan Ärnlöv, associate professor at Uppsala University, and his colleagues, measured the levels of cathepsin S, an enzyme involved in breaking up proteins. They then tracked these volunteers for up to 12 and a half years, and found that those with the highest levels of cathepsin S were more likely to die than those with lower levels, or about half those levels. Heart disease and cancer together make up for more than 60 percent of all deaths in Sweden every year, and the study may be of great importance in the future. A simple blood test can save thousands of lives. “The results have great potential but the road to practical usage is long,” Ärnlöv says. “We don’t know why certain individuals have higher levels of cathepsin S. We only know it increases the chance to die.”
Swedish researchers have found that a simple blood test can determine whether a person may die of heart disease or cancer.
|
We can recognize the faces of our friends very quickly from just a snapshot. Within 150 milliseconds of being flashed a photo, brain signals respond differently to photos containing animals than photos with no animals. We can categorize scenes as “beach,” “forest,” or “city” when they are flashed for even shorter periods.
But we also get a great deal of information from the motion of people and animals. We can identify our friends and family members just from a point-light display of them walking. We can also detect the emotions of point-light faces, and even the species of point-light animals.
Fascinating as point-light displays are, however, we rarely see them in real life. Point-light displays suggest that motion gives us a great deal of information about the object we’re looking at, but we can’t be sure that real-world perception works the same way. A team led by Quoc Vuong has conducted a study to see if what we know about point-light displays transfers to real-world objects and scenes.
They constructed a set of composite movies like this one (QuickTime required):
In every clip, a machine was superimposed with either a walking human figure (like in this clip) or another machine. To make the task even more difficult, viewers were shown two movies simultaneously, for just two thirds of a second. Viewers had to determine if one of the two movies included a human. The relative visibility of the human figure was also varied.
Even more critically, half of the images they saw were animated, and half were still photos. Here are the results:
As you’d expect, the more visible the human, the higher the accuracy. But no matter the visibility level of the human figure, viewers were more accurate identifying humans when in the animated sequence compared to still photos.
One possible objection to these results is that the animated sequences are easier to process, whether or not they contain a human. Vuong’s team repeated the experiment, but instead of the completely still shots, they used movies of animated machines superimposed with still humans. Here are the results:
Viewers were better at identifying the still humans with animated machines, but they were still significantly better at spotting humans when both the machine and human were animated. These results also held when the experiment was repeated with upside-down movies, and with animals instead of machines, like in this movie:
So our impressive ability to identify point-light displays extends to more natural-looking movies. Vuong’s team believes that the upside-down experiment is an indicator that their results may apply to a range of different objects in motion, such as animals and even machines. If we can detect upside-down walking humans better than upside-down still humans, we’re probably also better at detecting walking mice, cats, or goats.
Vuong, Q.C., Hof, A.F., Bülthoff, H.H., & Thornton, I.M. (2006). An advantage for detecting dynamic targets in natural scenes. Journal of Vision, 6, 87-96.
|
von Willebrand Disease 2N (Subtype Normandy), Blood
Clinical Information Discusses physiology, pathophysiology, and general clinical aspects, as they relate to a laboratory test
Hemophilia A and von Willebrand disease (vWD) are bleeding disorders caused by quantitative or qualitative defects in factor VIII (FVIII) or von Willebrand factor (vWF), respectively, and constitute 2 of the most common bleeding disorders. Hemophilia A is inherited as an X-linked recessive disorder while most subtypes of vWD are inherited as autosomal dominant disorders.
vWF plays 2 essential roles in hemostasis. vWF mediates platelet adhesion to damaged blood vessel walls and vWF is a carrier protein for FVIII.
Noncovalent binding of FVIII to vWF is necessary for normal survival of FVIII in the blood circulation. In patients with severe vWD, the circulating half-life of endogenous or infused FVIII is shortened.
Mutations within the vWF gene regions encoding for the FVIII binding domain of vWF may produce a phenotype of isolated FVIII "deficiency" associated with a clinically mild-to-moderate bleeding disorder which may be misdiagnosed as HA. This mild vWD phenotype was first described in patients from the Normandy region of France, vWD Normandy (vWD Type 2N). vWD Type 2N inheritance pattern is autosomal recessive.
In an international survey, vWD Normandy was detected in 58 (4.8%) of 1,198 patients previously diagnosed as having mild hemophilia A. Three vWF gene mutations (vWF Thr791Met, Arg816Trp, and Arg854Gln) accounted for 96% of patients with mutations in the FVIII binding domain of vWF.(3) Patients who are homozygous for 1 of the 3 common mutations have reduced levels of FVIII activity, whereas patients who are heterozygous typically have normal FVIII activity. However, patients who are heterozygous for 1 of the 3 common vWD Type 2N mutations may have decreased FVIII activity in the presence of a second (compound heterozygous) mutation in the vWF gene that typically results in a Type 1 or Type 3 vWD (quantitative defect). vWD Type 2N also has been associated with a more severe bleeding phenotype among patients who are homozygous for other mutations (vWF Glu24Lys) within the FVIII binding domain of vWF.(1,2)
Additional studies suggest that 1.5% (3/199) to 13.8% (5/36) of patients with vWD Type 1 have a FVIII binding defect.(2,4)
The diagnosis of vWD Type 2N is important for appropriate genetic counseling, because the inheritance of vWD Type 2N is autosomal recessive (as opposed to the X-linked recessive inheritance of HA).
Optimal treatment or prophylaxis of bleeding requires products containing functional vWF.
Diagnosis of von Willebrand disease (vWD) Type 2N
Evaluation and genetic counseling of patients with mild-to-moderate hemophilia A with an atypical inheritance pattern
Evaluation of hemophilia A patients with a shortened survival of infused factor VIII (FVIII) (not caused by a specific FVIII inhibitor)
Evaluation of female patients with low FVIII activity and no prior family history of hemophilia A
Evaluation of patients with Type 1 or Types 2A, 2B, or 2M vWD with FVIII activity discordantly lower than the von Willebrand factor antigen level
Interpretive report will include specimen information, assay information, background information, and conclusions based on the test results.
Clinical information and results of patient testing (factor VIII coagulant activity, von Willebrand factor antigen, and ristocetin cofactor activity) are useful for test interpretation.
Cautions Discusses conditions that may cause diagnostic confusion, including improper specimen collection and handling, inappropriate test selection, and interfering substances
On-site Hemophilia Center, Special Coagulation, and/or Medical Genetics consultations are available for registered Mayo Clinic patients and may be especially helpful in complex cases. Phone consultations are available for Mayo Medical Laboratories clients.
This test will not detect other rare mutations within the known factor VIII binding domain of the von Willebrand factor (vWF) gene or other mutations in the vWF gene.
Reference Values Describes reference intervals and additional information for interpretation of test results. May include intervals based on age and sex when appropriate. Intervals are Mayo-derived, unless otherwise designated. If an interpretive report is provided, the reference value field will state this.
Clinical References Provides recommendations for further in-depth reading of a clinical nature
1. Tuley EA, Gaucher C, Jorieux S, et al: Expression of von Willebrand factor "Normandy": an autosomal mutation that mimics hemophilia A. Proc Natl Acad Sci USA 1991;88:6377-6381
2. Schneppenheim R, Budde U, Krey S, et al: Results of a screening for von Willebrand disease type 2N in patients with suspected hemophilia A or von Willebrand disease type 1. Thromb Haemost 1996;76:598-602
3. Mazurier C, Meyer D: Factor VIII binding assay of von Willebrand factor and the diagnosis of type 2N von Willebrand disease-results of an international survey. On behalf of the Subcommittee on von Willebrand Factor of the Scientific and Standardization committee of the ISTH. Thromb Haemost 1996;76:270-274
4. Nesbitt IM, Goodeve AC, Guilliatt AM, et al: Characterization of type 2N von Willebrand disease using phenotypic and molecular techniques. Thromb Haemost 1996;75:959-964
|
Arquivos Brasileiros de Endocrinologia & Metabologia
Print version ISSN 0004-2730
AMORIM, Pollyana Garcia et al. Growth hormone in children and adolescents with cystic fibrosis. Arq Bras Endocrinol Metab [online]. 2011, vol.55, n.9, pp. 671-676. ISSN 0004-2730. http://dx.doi.org/10.1590/S0004-27302011000900001.
The recombinant human growth hormone (rhGH) can improve weight gain, physical growth, clinical and lung in cystic fibrosis (CF). However, the routine use, although promising, is not established in the literature. The objective of this study was to assess the benefits of rhGH in children and adolescents with CF. We conducted a systematic review in the database PubMed, Lilacs, SciELO and Cochrane, in the period 2000-2010, using the keywords: "cystic fibrosis", "growth hormone", "children" and "adolescents". We found 77 articles and included 11 randomized controlled trials, with 290 children and adolescents with CF. The short-term use (1-24 months) of rhGH improved the height, weight, growth rate, bone mineral content and components of pulmonary function. Adverse effects, like diabetes, were not observed in the studies. The short-term use of rhGH improved growth and body composition in patients with CF.
Keywords : Growth hormone; cystic fibrosis; adolescent health and children.
|
News & AnnouncementsEmpower 3000: Fair or Unfair? Homework
Please Log in. Search the title of the selection. Read the selection. Write your answers for the two worksheets provided for homework. Bring to school.
Write your answer in your class journal.
Think about Act 2 and 3 from J. Caesar. "Which (Senator's) point of view would you have joined"? Explain in two paragraphs.
Watch video(s) in the internet links section.
|
The Chinese government introduced the one child policy in 1979 in order to slow down China’s population growth. Every year China’s population grows by ten million, putting a strain on the country which leads to social, economic, and environmental problems. However, it is only married/ urban couples that have to follow this law. Families that live in the countryside or families who have a daughter as a first child get permission to have another child. I’m going to look at the different attitudes towards the one child policy between generations in China. Looking at numbers alone there has been a significant decline in births and it has proven successful in population control, however this policy is very controversial and has led to many unhappy and suffering families.
- It’s estimated that the single child policy has prevented over 400 million births.
- It has been proven successful in cities and has provided a better education for many children
- It allows parents to spend much more time and energy on their child.
- Families that have supported the family planning policy will receive benefits from the Chinese Government such as health care and education.
- Since the single child policy was introduced there has been many reported stolen children and it was estimated that over 70, 000 children are kidnapped every year.
- Parents find that single children can find it difficult to make friends and they can feel lonely because they have no brother or sisters.
- Government Officials lose their job if they have more than one child.
- Chinese culture traditionally prefer boys which results in a significantly larger amount of men than women in China.
- People believe the policy has led to baby girls being killed, sold, or put up for adoption.
- China’s population is living longer. The first children born under the single-child policy face the prospect of caring for an increasing number of pensioners.
- The country also faces problems of men who can’t find wives due to female foetuses being aborted, resulting in a large gender imbalance.
An article featured on the BBC website by a man called Weiliang Nie looks at whether or not he thinks the single child policy is a fail or success. He grew up in China in the 1960s and 70s before the one child policy had been introduced and families were allowed to have as many children as they liked. Weiliangs’ parents had four children which was common for families living in this time period. However his generation now have to follow the one child policy which has come at a painful cost. He refers to one of his childhood friends’ who has had a second child, a daughter, yet she is registered as someone else’s child. When he does see his daughter she has to call him uncle in order for him to keep his secret and prevent the large fine he would receive. Some families however, don’t mind paying the money to have a second child as they believe it is worth it and benefits the other sibling as they are less lonely.
Another growing problem that has resulted from the single child policy is the gender imbalance. This is a very serious issue in China as more than 24 million men could find themselves without spouses as there are just not enough women. One of the main reasons that has lead to this problem is the large numbers of women who have abortions if they are pregnant with a female baby. As I mentioned earlier in the disadvantages, China’s traditional culture favours boys over girls and many families still carry this tradition. The latest figures show that for every 100 girls born in China, 119 boys are born. This gender ratio will not only lead to men having no spouses but also inter-generational marriages, where the wife is older than the husband.
Last summer I worked with a girl called Chenchen, aged 23, who was an only child due to the one child policy and was lucky enough to send her some questions to answer.
1) Do you think the one child policy was a good idea?
Answer: I’m not sure. It was a good idea in that it reduced population growth however I know lots of friends and families who would have liked to have more children.
2) Would you have liked to have had a brother or sister?
Answer: Yes I would have, but I was never lonely. I had lots of friends at school who also had no siblings, so we had a lot in common. But it would have been nicer at home to have another sibling.
3) You now live in Scotland. Has this changed the way you feel about the policy?
Answer: Well I work with people who have lots of brothers and sisters and it does seem very different. They talk about how they argue and fight which I obviously never had.
4) When you start your family, how many children would you like?
Answer: I wouldn’t want a big family. It depends if I stay in Scotland or move back to China. But ideally I think I would like 2.
5) Did your parents have a lot of brothers and sisters? And did they want more than one child?
Answer: Yes they both grew up in large families. Yes, especially my mother, as she grew up with 2 sisters and 1 brother, whom she is very close with. However they couldn’t afford to have another child.
Overall it seems like there are different opinions on the single child policy depending on the generations. My friend from work seemed quite comfortable being a single child but she does mention how her parents feel completely different. I suppose if they were brought up in big families it must have been really strange to then only be allowed one child. This is a very controversial topic but it’s very interesting to read about as it seems so different to how things are in Britain.
Joanne White – Group 6
Assignment 4 – Generations
For this assignment I decided to look a bit further into Factory working conditions in China and the effects they have on workers leaving their families behind. Focusing more to the point on why they do it. It seems to be the daughter/son’s responsibility to provide for the family when in poverty, even though the parents do not like to see their children leave. In some cases, it is merely a way of survival.
China believes strongly in respecting your elders, as it is known that the oldest person in the family should receive the most respect and honor, as they pass their wisdom onto the younger generation. The Chinese also highly believe that their ancestors are always looking down on them and their actions, perhaps making them more respectful in a way. Caring for one’s family is one of the most important things in a Chinese person’s life. Retirement homes are highly uncommon and placing your parents into one see’s you being labeled as very uncaring and a bad son/daughter. Abandoning your family is one of the most dishonorable things you could do. Even with such degenerative illnesses e.g. Dementia, most people would rather hire a carer than leave a family member alone. Taking care of an ill parent is all the children’s responsibility and those who do not contribute are almost disowned from the family all together.
“According to culture and tradition, children have responsibility for the older members in the family. The word care here means that you as a child have to personally take care of your parents and not let the nurse in the nursing home take care of them. So, it is very common to see a grown adult living with his/her family.”
Parents were cared for by all of their numerous offspring who relied on one another to work as part of a team but now China’s “one-child” policy is in order, social attitudes of China are changing.
“A family must have a son. Min’s mother had four girls before finally giving birth to a boy; in those early years of the government policy limiting families to one child, enforcement was lax in much of the countryside. But five children would bring heavy financial burdens as the economy opened up in the 1980s and the cost of living rose. As the second- oldest child, Min would bear many of those burdens”.
Factory Girls – Leslie T. Chang
Therefore children of a family in poverty feel it is their responsibility to migrate to the city to work endless hours at a mass producing factory, lifting both themselves and their family normally still back in a rural area out of poverty. You hear a lot of horror stories from workers of these factories but the colleagues are still willing to put themselves through it to make their family proud.
I watched two short documentaries called “Santa’s Workshop” and “A dollar a day: Made in China”, they focused on working conditions in a mass production toy factories and electronic factories in China
. One Swedish toy factory reports that 95% of their toys are manufactured in Hong Kong, China. Hong Kong was part of the British economy before it was reunited with China in 1997 – “enjoying more freedom and democracy than the rest of China”. The reported asked the manager of the toy store what buyers are looking for with their products and he replied with “buyers are interested in pricing”. It seems that all the people involved in running these large businesses are only interested in the profits being made. The film shows a small clip of inside the factory where workers are dealing with hot plastic for nearly 12 hours a day. He mentions how hot the factory is and that it is difficult to breathe.
The whole factory economy seem very secretive in what actually goes on, limiting camera crew to only certain areas and not allowing them to speak to any workers. Looking around the factory they notices signs warning workers that film producers would be in that day. What are they hiding?
The subject of gender is brought up quite often in these programmes and it seems that it is mainly females working under these conditions. It is explained by some workers that sons normally stay at home while the daughters migrate to the city to provide earnings for the family. One boss of the toy company says that 90% of workers are female and this is “because they are easy to manage”. On “A dollar a day” one factory boss mentions how girls are more precise and easier to manage than boys. The workers migrate from rural areas usually because “they have no choice but to come here to get better wages”. Nobody working in the factory is local residents.
Employees in this factory get paid for how fast they work. Those who work the slowest earn about 300 Yuan a month, when the average makes 500 Yuan. They are under a lot of control and follow ruins obediently; any slacking can result in a fine or dismissal. Working with plastic often results in burns or cuts, as a lack of safety equipment is seen. Any major injury caused will not even see compensation being offered.
Although it is very difficult for workers to leave their family behind, living conditions are normally better at the factory (but not much).
“My parents sent me here because they didn’t have the money to buy a new house. I really hated my parents when I had to leave home”
“The workers live in quarter, normally 12 to 20 a room”. And the only storage for personal items is on their beds.
This young girl on a dollar a day had the intelligence to go to University but her family did not have the money for it. There is a clip where she gets the opportunity to phone her family and arrange a trip home, it is an upsetting scene:
“I miss you so much. I feel so homesick. I want to go home…”
The girl hasn’t even seen her brother in almost four year and it is an emotional time for all when the trip finally goes ahead. She cannot see herself at the factory forever, as she would like to eventually open her own small shop restaurant.
It is crazy what some of the young girls actually do and put themselves through just to help their family out. It really makes you wonder if the young society in Britain would do that for their family today.
“Emigration is the act of leaving one’s native country or region to settle in another.”
In the past few decades, China has witnessed the largest human migration in history. Every year millions of workers leave their homes in rural villages in search of urban employment in the big cities. China’s “floating population” leave behind their friends and family with the hope of a better life, for both themselves and the family back home whom they can send money back to.
The migrants often find that their new life in the city is not what they hoped for. The hours are long, the pay poor and the jobs boring. They persevere because they often have people back home relying on them and because there would be great shame in returning home a failure.
On the opposite end of the scale though there is a growing trend in emigration amongst the wealthiest of Chinese. The Huran Research Institute has published statistics in 2011 revealing that 14% of China’s wealthy have emigrated out of the country or are applying to do so, and a further 46% are considering it. These “wealthy” are defined by having more than 10 million Yuan (nearly £1 million). Many go to Hong Kong, where life is easier both politically and financially but the immigrants don’t have to sever all ties with China. Others generally leave for the USA, Canada, Singapore and Australia. These wealthy mainlanders feel their families and children would have better lives overseas, and cite reasons such as higher quality education, convenience, to avoid political issues, cleanliness and safety.
Many of these expatriates will return to China in their retirement, but it’s a different story for their children, who know much less about China and will often choose to remain in the west. This younger generation will have been raised in a different culture from their parents, and hence will have different values and outlooks on life.
I talked to a friend of mine who is a student at Dundee University, he is of Chinese descent but was born here in Scotland. I asked him about the history of emigration in his family and got to understand the motivation behind the migrations of three different generations, which were all for very different reasons and essentially reflect the era that each generation came from.
For his grandmother, moving from Hong Kong from China was a matter of safety. She fled there with her family to escape the invasion of the Japanese in China. This eight year conflict claimed the lives of 20 million Chinese according to official statistics. I used Google to try and source a statistic about how many Chinese fled China during this time and couldn’t find anything along those lines, which suggests that not very many did. Perhaps my friend’s family was among the very rare and fortunate.
The prospect of a better quality education took his father to Scotland. Although he was born and raised in Malaysia, his family is Chinese. He came here to study engineering at Edinburgh University, but then never ended up returning to Malaysia upon graduating. This was mainly because he had started to make a life here, he had a job and had met his future wife, and would go on to do a PhD. I enquired about how his family felt about this permanent emigration, my friend wasn’t too sure, but he was under the impression that it was seen as a positive thing.
As an afterthought I asked, “Would you ever go to live in China?”
“No, never” he said firmly and confidently. This answer didn’t come as a surprise, but I asked for an explanation anyway. He considered the question briefly before replying.
“Mainly because of the government I guess. It’s a closed system and they are closed minded. Ironically I realize it seems that I am closed minded for saying that, but it’s true, at least for the most part. There’s much less freedom there.”
In this century in the United Kingdom, it’s almost impossible for my generation to imagine a life where we don’t have complete freedom of speech, where we don’t have the right to democracy, and where we can’t just type a few words into a search engine to find any information we could ever want to know. To suddenly have to live under a Chinese style regime would be a massive culture shock, and we’d feel it was for the worse.
There are those currently living in China who fantasize of leaving but just don’t have the money of means to do so, the generation who feel they are still young enough to have their own American Dream. In Paul Midler’s book “Poorly Made in China” he meets a factory manager who tells Midler that he is from Los Angeles in the USA, after much confusion it is finally understood that he has never actually lived there but once visited the city on holiday and now wishes it was his home. Los Angeles was his aspiration, so he called it his home.
The reason I used the word emigration apposed to immigration for this post is because I wanted to focus on the attitudes and feelings the Chinese have about people leaving home, rather than the attitudes to the millions of immigrants who arrive into China’s cities. Emigration is the act of leaving ones home for another country or region. Immigration is the act of arriving in that country or region.
Differences in generations-Money and possessions
Over the last one hundred years there and been change on a mass scale in China. How has it effected the different generations of a family? Have priorities changed? Has the value of money changed and has the possessions they valued changed?
I conducted an interview to try and answer some of these questions. The girl I interviewed was in her twenties; her parents fifty plus and her grandparents in there eighties.
I firstly asked about the value of money across the generations and how it differed. She said that the stability of China has changed over the years and this has effected how the people value their money. When talking about her Grandparents she said they came from a different world to her. China was very poor and they valued everything. They would save every penny and not purchase anything. She said her parent’s generation, now being in there 40s and 50s, purchases began to change as China was growing they started to be able to enjoy life more. They spent some money on digital products but tended to invest in stocks and property and gold. Whereas her generation like to purchase and the most expensive objects she has owned have been ‘ cell phones, laptops and digital cameras.’
She said because China has always been quite unstable due to it growth the currency is also quite unstable. The way of using money in China has changed. She said in China amongst the older generations credit cards are un-popular. She says the older generations won’t use credit cards because they are unstable and they don’t like the idea of using ‘future money’ and hate the idea of being in debt. She says this is changing now and most young people own a credit card because they love to purchase. There are still differences in her grandparents and parents generation. She said her Grandparents put all their money in the bank and love the feeling of seeing their money grow. She said for them it its kind of like OCD the happiness they seem to get from watching their money grow. Compare this to her parent’s generation who like to feel stable so invest the money in different things and spread it around. She also mentioned that to feel secure most people in their fifties own more than one property around the country maybe three or four.
There is a word in Chinese ‘Liang Ru wei chu’ that illustrates her parents and grandparents view on money it means, roughly, purchase depends on income. Meaning previous generations wouldn’t spend money they didn’t have. This has changed for her generation who feel more secure and stable. However there are still differences in her generation between urban and rural. She says that in the rural areas they have the same kind of mind-set as her grandparents and save every penny. I think this would be again to do with feeling unstable as there is a big divide between the rich and poor in China and people can still just be told to leave there homes.
The interview naturally took a side-track from my topic of money and possessions and moved into marriage and opportunity. She told me through the generations success has different properties. For the older generation who were subject to wars a poor economy for them to be successful was just to stay alive and be secure so generally they’d be married by twenty have kids and follow those steps. Whereas for her parents generation, during Chinas growth, they started to come away from the traditional steps and wanted to find a chance and grab it. It was still frowned upon for that generation not to be married by twenty five and traditions still came through. She said for her she might be expected to be married by about thirty but it wasn’t seen as that important it was more important for her generation to be seen as an individual character following her own path. They strive to be unique maybe this is by studying higher education or studying abroad. The idea of standing out from the crowd has become ever more important.
This interview uncovered a lot of interesting results and because it has changed so quickly the differences between the generations is very clear. However I don’t think it’s that different from this country and differences in generations and traditions tend to fade through the generations the only difference with China is that it has happened over a shorter period of time due to its rapid growth.Alot of globalisation seems to be occuring in China and I think this has a big influence on the differences between generations.
The interview also highlighted the divide between China, between the rich and the poor, at the moment. This is something that seems to constantly appear in research into China that half the country have become rich quick whereas the other half are still in the same position and very poor.
|
Hindi, Tamil and English: linguistic lessons in pragmatism
Press Council of India Chairman and former Supreme Court Justice Markandey Katju has lived in India all his life, but he made a two-part statement on Sept. 20 that sounds like the kind of innocent remark that would land a visitor like me in trouble.
Here is the gist of what Katju said in an op-ed in The Hindu:
“If (children) did not learn English they would only be fit to drive bullock carts (Hal chalane layak rah jayenge). I said I too loved Hindi, which is my mother tongue, but that did not mean I should behave like a fool.”
- “At the same time, people in non-Hindi speaking States such as Tamil Nadu should learn Hindi, because it is the link language in our country.”
This is, as you might suspect, a touchy subject. Hindi, one of the two official languages of India, is part of a group of languages spoken primarily in northern India. The group includes its many regional variations in the so-called Hindi Belt, its sort of twin sister Urdu, as well as Gujarati, Marathi, Bengali, Punjabi, Assamese, Nepali and more.
The primary languages of southern India, meanwhile, are Tamil, Telugu, Malayalam and Kannada. They are unrelated to the northern languages, which mostly are Indo-European in origin, sharing a common root with English and other Romance languages, Celtic languages, German languages and more.
In southern India, there is a history of people resenting the imposition of Hindi as a compulsory language, and there are people who prefer English as the language of communication with other people in India who speak different mother tongues.
These days, languages are a source of pride for many all over the world, but the idea that someone is imposing a language on you might rankle. Here is one comment on Katju’s article:
There is a trace of imposition of Hindi in this article. Voluntarily we were learning Hindi during school days five decades ago but after the imposition by fanatics from North the politicians started the agitation in Tamilnadu. That was for giving headache to the ruling govt and to gain political base. We were studying well, the third language-Hindi but it was stopped. The Northerners do not study Tamil,Malayalam,Kannada or Telugu along with English and Hindi. Studying Oriya, Marathi,Bhojpuri, Rajasthani and learning Hindi also will not be very difficult. Imposition of anything language, culture, or social norms is bringing the conflict among society members. –Chandrasekaran
Katju responded to criticism on Friday. His basic points:
- “If my suggestion that Tamilians should learn Hindi made sense to Tamilians, they should accept it, but if it did not make sense to them, they should reject it. Where is the compulsion?”
- Regarding criticism that Hindi chauvinists say that their language is superior to Tamil: no, but you’re talking about a population of some 72 million Tamil speakers vs half a billion in the Hindi belt. Think about it.
- Regarding English as a preferable “link language” to Hindi for Indians: “It’s the language of the elite. Only about five percent of Indians know English (though I myself have appealed to people to learn English, since much of the knowledge of the world is in English, and I have strongly criticised those who say ‘Angrezi Hatao (abolish English’).”
I’ve visited India on four short trips in five years, and have become familiar with the barest essentials of language politics (try getting a straight answer on whether Hindi and Urdu are different languages — not the standardised languages of today that they teach in schools, but their origins not so long ago. Best you study them yourself and draw your conclusions.). We all link some national and (in some cases) ethnic pride to the languages that we speak, but let’s leave that aside and consider one simple point: yes, it’s hard to learn a new language for many people, but when did learning a new language — any new language — ever hurt you?
|
Edward S. Curtis's The North American Indian
Selected Bibliography on Edward S. Curtis and The North American Indian
Adam, Hans Christian, ed.
The North American
Indian: the Complete Portfolios.
Koln and New York: Taschen, 1997.
English translation of a German publication; the photographs are taken from the twenty portfolios and twenty encyclopedic volumes of The North American Indian.
Cardozo, Christopher and Joseph D. Horse Capture.
Sacred Legacy: Edward S. Curtis and the North American Indian.
New York: Simon & Schuster, 2000.
With a forward by N. Scott Momaday.
Curtis, Edward S. Prayer to the Great Mystery: The Uncollected Writings and Photography of Edward S. Curtis. Edited by Gerald Hausman and Bob Kapoun. New York: St. Martin's Press, 1995.
Davis, Barbara A. Edward S. Curtis: The Life and Times of a Shadow Catcher. San Francisco: Chronicle Books, 1985.
Day, Sara, ed.
Heart of the Circle: Photographs by Edward S. Curtis of Native American Women.
San Francisco: Pomegranate Artbooks, 1997.
A Library of Congress publication.
Gidley, Mick. Edward S. Curtis and the North American Indian, Incorporated. Cambridge and New York: Cambridge University Press, 1998.
Gidley, Mick, ed.
The Vanishing Race: Selections from Edward S. Curtis's The North American Indian.
New York: Taplinger Publishing, 1977; 1987.
1987 edition includes "preface to the paperback edition."
Graybill, Florence Curtis. Edward Sheriff Curtis: Visions of a Vanishing Race. Albuquerque: University of New Mexico Press, 1986.
Lawlor, Laurie. Shadow Catcher: the Life and Work of Edward S. Curtis. New York: Walker, 1994.
Lyman, Christopher M. The Vanishing Race and Other Illusions: Photographs by Edward S. Curtis. New York: Pantheon Books, 1982.
Makepeace, Anne. Coming to Light; Edward S. Curtis and the North American Indians: a Film. Oley, Pa.: Bullfrog Films, 2000.
Pritzer, Barry. Edward S. Curtis. New York: Crescent Books, 1993.
|
iPad Accessibility Features
iPad: Changing the Setting Part 1
iPad: Changing the Settings Part 2
If you want to set up a projector to your iPad this website will tell you how. You will need an iPad to VGA adapter. That what it is called. Apple sells them for about 30 dollars. You can get a generic one for about 10 dollars. VGA is the wire that goes from your projector to your computer. You can actually use a different wire as well. But if you have ever had to set up your laptop to a projector then you would have used a VGA wire. Computer, projectors and newer TV have VGA ports. It is simple to hook your iPad to a projector or even your TV at home once you know this. You can also get an extra long VGA cord so that you can move around your classroom. Our department will often call the iPad to VGA adapter a dongle. The reasons are that it is easier to say and the old Macs connections were called a dongle.
Here are Some Great Alternatives Bowsers
|
While the content of interactive educational resources is growing on the Internet, very rarely do you find websites that allow you (and provide assistance) for downloading the content to your own computer.
Freezeray is a one of those few places where teachers can find and download interactive resources for Science investigations. In fact, these resources were developed specifically for Interactive Whiteboards.
The site organizes the resources into various categories including Physics, Biology, Technology, and Chemistry. They even have a fun place to practice Science-related literacy. The resources here include a hangman type game and various key-idea interactive resources.
As I mentioned previously, the interactive resources are downloadable and can be used freely for non-commercial purposes. The really good thing about these resources is that they are flash-based and can be imported into your Smart Notebook files.
While the site has instructions for downloading the resources by searching your Temporary Files folder, there is an easier way, especially if you have the Firefox web browser.
Here's a short video that shows how to save the flash-based (swf) version of these activities to your computer using the Firefox browser and import the file into Notebook. (This video is iPhone compatible.)
Sharing Is Caring!
|
Geometry for Praxis II ParaPro Test Prep Study Guide (page 2)
The practice quiz for this study guide can be found at:
The ParaPro Assessment will test your knowledge of basic shapes, such as triangles and circles, and it will also ensure that you remember how to identify points on the coordinate plane.
A polygon is a two-dimensional object with straight lines that create a closed figure.
- A regular polygon has sides with the same lengths, and congruent angles with the same measures.
- An irregular polygon does not have sides with the same lengths and congruent angles with the same measures.
You should be prepared to identify the following polygons:
A triangle is a polygon with 3 sides.
A quadrilateral is a polygon with 4 sides.
A pentagon is a polygon with 5 sides.
A hexagon is a polygon with 6 sides.
An octagon is a polygon with 8 sides.
There are special kinds of triangles that are important to know.
An equilateral triangle has three sides with the same length.
An isosceles triangle has two sides with the same length.
A scalene triangle has no sides with the same length.
There are also special kinds of quadrilaterals that are important to know.
A rectangle is a four-sided polygon with four right angles. All rectangles have two pairs of parallel sides.
A square is a four-sided polygon with four right angles and four equal sides. All squares have two pairs of parallel sides. Note that a square is a specific kind of rectangle.
- What type of shape is shown below?
Because the figure has straight lines and makes a closed figure, it is a polygon. Because there are exactly five straight lines, the figure is a polygon.
A circle is a curved, two-dimensional figure where every point on the circle is the same distance from the center.
There are several parts of a circle that you should know.
The diameter is a line that goes directly through the center of a circle—the longest line segment that can be drawn in a circle.
The radius is a line segment from the center of a circle to a point on the circle (half of the diameter).
You may be expected to identify some three-dimensional shapes on the ParaPro Assessment. The two most common types of three-dimensional shapes are shown below.
A cube is a three-dimensional figure where each face is the shape of a square.
A rectangular prism is a three-dimensional figure where each face is the shape of a rectangle. Note that a cube is a specific kind of rectangular prism.
Coordinate geometry is a form of geometrical operations in relation to a coordinate plane. A coordinate plane is a grid created by a horizontal x-axis and a vertical y-axis.
These two axes intersect at one coordinate point, (0, 0), the origin. A coordinate point, also called an ordered pair, is a specific point on the coordinate plane with the first number representing the horizontal placement and the second number representing the vertical placement. Coordinate points are given in the form of (x, y).
Graphing Ordered Pairs (Points)
The x-coordinate is listed first in the ordered pair and tells you how many units to move to either the left or the right. If the x-coordinate is positive, move to the right. If the x-coordinate is negative, move to the left.
The y-coordinate is listed second and tells you how many units to move up or down. If the y-coordinate is positive, move up. If the y-coordinate is negative, move down.
- What is the ordered pair of point X on the following coordinate grid?
The point on the grid is 3 units to the right of the origin. Therefore, the first number in the ordered pair is 3.
The point on the grid is 2 units down from the origin. Therefore, the second number in the ordered pair is –2.
The ordered pair for point X is (3, –2).
To find the perimeter of a figure, simply add up the lengths of all of its sides.
- What is the perimeter of the following triangle?
The triangle has side lengths of 5, 8, and 10. The perimeter is therefore the sum of 5 + 8 + 10. The perimeter of the triangle is 23.
The circumference is the distance around a circle. The circumference can be found by multiplying the diameter of the circle by pi, or π, a special number equal to about 3.14. It can also be found by multiplying the radius of the circle by 2 and then by π. The formulas for the circumference of a circle are circumference = 2πr and circumference = dπ, where r is the radius and d is the diameter of the circle.
- What is the circumference of a circle with a radius of 5?
- Following the formula area = 2πr, the circumference is equal to 2(5) π, which is equal to 10π
Add your own comment
Today on Education.com
- Kindergarten Sight Words List
- The Five Warning Signs of Asperger's Syndrome
- What Makes a School Effective?
- Child Development Theories
- Why is Play Important? Social and Emotional Development, Physical Development, Creative Development
- 10 Fun Activities for Children with Autism
- Bullying in Schools
- Test Problems: Seven Reasons Why Standardized Tests Are Not Working
- Should Your Child Be Held Back a Grade? Know Your Rights
- First Grade Sight Words List
|
Waterton Lakes National Park (established 1895, 505 km2
) is situated in the southwestern corner of Alberta on the Canada-US border. In 1932, this park was united with Montana's Glacier National Park to create the world's first international peace park. In 1995 the 2 areas were declared a WORLD HERITAGE SITE
based on the exceptionally rich plant and mammal diversity, and on the outstanding glacial and alpine scenery.
The setting is spectacular. In less than a kilometre, the dry rolling hills of the prairies soar to icy peaks nearly 3000 m high. The 3 Waterton Lakes, nestling between 2 mountain ranges, are over 150 m deep, the deepest in the Rockies. Because the park embraces both prairie and mountain, there is a great variety of plant and animal life.
PRONGHORN and coyote roam the grasslands; mountain goat, bighorn sheep, grizzly bear and marmot frequent alpine meadows and barren ridgetops.
The area, once a BLACKFOOT
stronghold, was first visited by Europeans in 1858 when Thomas BLAKISTON
explored the area. He named the Waterton Lakes after a British naturalist. In the early 1900s Alberta's first oil well was drilled near Cameron Creek at OIL CITY
The park provides facilities for tent, recreational-vehicle and primitive camping in all seasons, and has numerous trails. Four scenic parkways provide vehicle access to the interior of the park.
See also BIOSPHERE RESERVES.
Waterton Lakes National Park
Carthew Summit, Waterton Lakes National Park, looking south from Carthew Summit over sub alpine, spruce-fir forests and lush meadows (courtesy Cottonwood Consultants Ltd/photo by Cliff Wallace)
In Waterton Lakes National Park, Alberta (photo by James Marsh).
John George Brown, policeman, prospector
"Kootenai" Brown early foresaw the need to preserve the Waterton, Alberta area and campaigned strenuously on its behalf (courtesy Glenbow Museum).
MAXWELL W. FINKELSTEIN
Links to Other Sites
Waterton Lakes National Park of Canada
This illustrated Parks Canada website describes the ecology, geography, and history of Waterton Lakes National Park of Canada
Canadian Biosphere Reserves Association
CBRA/ACRB is a non-profit association dedicated to developing and maintaining biosphere reserves throughout Canada. Check out the detailed guides to Canadian biosphere reserves and news about current projects.
Waterton Lakes National Park
A vistors guide to Waterton Lakes National Park in Alberta's Rocky Mountains. Includes a history of the park, scenic photos and videos, community information, and more.
“Kootenai” Brown in the Red River Valley
A biography of frontiersman John George ‘Kootenai’ Brown, who became the first Park Superintendent of Waterton Lakes National Park. From the website for the Manitoba Historical Society.
National Parks Project
A close-up virtual tour of Canada's superb National Parks. Based on the National Parks Project TV series at Discovery World HD online.
|
LONDON, England (CNN) -- There are around 200 known types of cancers. Some are far more widespread than others.
Australian Professor Ian Frazer has developed a vaccine to prevent cervical cancer and is working on a vaccine for skin cancer.
Cancer researchers are making significant breakthroughs in unlocking the complete genetic makeup of many common cancers.
Through extensive studies and research, they are understanding exactly how the rogue cells differ from normal cells, and modifying treatments so they work on just the cancer cells.
We take a look at some of the most common types of cancers plus some possible causes, treatments and developments.
Lung cancer develops when cells of the lungs divide and grow in an uncontrolled manner.
There are two types of lung cancer: non-small cell lung cancer (NSCLC) and small cell lung cancer (SCLC). The latter is more likely to spread further in the body in its early stages.
Lung cancer is the most common cancer worldwide, according to the World Health Organization, with 1.2 million new cases every year.
Nearly all lung cancers arise because of smoking and men have always been more affected by lung cancer than women. However, a rise in female smoking worldwide has started reversing the trend.
Not all lung-cancer patients are suitable for surgery. Surgery on non-small cell lung cancers is more common than in small cell lung cancer, but can still only happen in a minority of cases.
Other options are radio therapy and chemotherapy.
In December 2008, scientists pinpointed a gene that protects against lung cancer. It is hoped the discovery of the role of the tumor suppressor gene -- LIMD1 -- may lead to new treatments and techniques to pick up the disease earlier. The disease is often not picked up until it has reached an advanced stage and many patients die within a year of being diagnosed.
Skin cancer is a malignant growth on the skin. It generally develops in the outermost layer of skin, so a tumor is usually clearly visible and easier to detect than most other cancers. Skin cancer is the most diagnosed form of the disease, surpassing lung, breast, colorectal and prostate cancer.
Melanoma is a type of skin cancer that usually starts within a mole or a dark spot on the skin. If found early, simple surgical treatment works well and usually leads to a cure, the British Medical Journal advises.
However they can spread quickly and are responsible for the majority of skin-cancer-related deaths.
It's not entirely clear why skin cancers develop, but according to the U.S. National Institute of Health, UV radiation from the sun is the main cause.
UV radiation is particularly harmful for children and teenagers and even a short exposure can lead to skin cancer much later in life.
Diagnosis and Treatment
Diagnosis is made with a skin biopsy, under local anesthetic with an injection. Treatment depends on the circumstances of the cancer and the patient; including age, type of cancer and location. Treatments can include, amongst others, radiotherapy (radiation), chemotherapy (pills) and surgery.
Scientists have recently conducted experiments on "immune-priming,"-- using the patients' own immune systems to fight the skin cancer. This therapy is still relatively new, but has been shown to boost the immune system and thereby attack skin cancers and viruses.
The Australian scientist who developed a vaccine for cervical cancer, Ian Frazer, told Australia's Medical Research Congress in November 2008 that he is working on a skin cancer vaccine that could be available within a decade.
Breast cancer is a disease in which malignant cells form in the breast tissue, leading to damage to the cells' DNA. This results in cell division and growth and eventually leads to the formation of a lump.
The malignant cells can then invade other organs where metastases (secondary lumps) may form.
Breast cancer is the most common in women, affecting one in nine women at some point in their lives.
The World Health Organization states that breast cancer is the fifth most common cause of cancer deaths, causing 502,000 deaths worldwide in 2005.
Diagnosis and Treatment
Women are encouraged to check their breasts regularly for any lumps or other irregularities, such as discharge from the nipple. General practitioners or gynecologists can also do physical checks.
To make a diagnosis, doctors can perform a mammogram or an ultrasound and take a tissue sample.
Once a lump has been identified as malignant, the most common treatments are surgery, radiation therapy and chemotherapy.
Interstitial laser thermotherapy (ILT) is a relatively new minimally invasive, laser surgery procedure that reduces the possibility of complications during and after an operation.
Prostate cancer develops in the prostate, a gland in the male reproductive system. It occurs when cells of the prostate mutate and begin to multiply out of control. These cells may spread from the prostate to other parts of the body.
Rates of prostate cancer vary widely across the world and are most common in Europe and the United States. It is least common in South and East Asia, according to the figures from Cancer Research UK. A quarter of all new cases of cancer diagnosed in British men are prostate cancers. Almost 60 per cent of prostate cancer cases are diagnosed in men aged over 70 years.
Diagnosis and Treatment
Prostate cancer is most often discovered by prostate specific antigen (PSA) screening and less commonly by physical examination through the rectum or by the appearance of symptoms.
Treatment options for prostate cancer depend on the age of the man, his health and the spread of the cancer. The most common treatments are surgery and radiation therapy.
Colorectal cancer, also called colon cancer or large bowel cancer, includes cancerous growths in the colon, rectum and appendix.
According to the WHO, colorectal cancer causes 655,000 deaths worldwide per year and is the third most common form of cancer and the second leading cause of cancer-related death in the Western world
Risk factors and symptoms
According to the American Cancer Society, the following factors increase the risk for colorectal cancer:
• Age: Most cases occur in people in their 60s and 70s. Cases in people aged 50 or under are uncommon unless a family history of early colon cancer is present.
• Women who have had cancer of the ovary, uterus, or breast have a higher risk of developing colorectal cancer.
• A history of colorectal cancer in the family
Surgery is the primary treatment, while radiotherapy and chemotherapy can be applied depending on the patient, the tumor's stage and other medical factors.
If performed at a late stage or when the cancer has already spread, colorectal cancer is unlikely to be cured with surgery.
|Most Viewed||Most Emailed||Top Searches|
|
The importance of place
Architecture professor Avi Friedman worries that we’re so focused on making our surroundings purposeful, we’re forgetting how to infuse them with the charm required to make them livable
What is it about some places that leave them seared in our imaginations, while others are so forgettable? In his latest book, A Place in Mind: The Search for Authenticity, McGill architecture professor Avi Friedman, M’Arch’83, the co-founder of McGill’s Affordable Homes Program and a recipient of the United Nations World Habitat Prize, has set out to answer that very question. From a street market in China to his childhood home in Israel, Friedman travels the globe, collecting the puzzle pieces that make up a livable, likable city – pieces he says we have been quick to discard as our cities have grown more suburban and impersonal. Writer Christopher DeWolf, BA’06, recently spoke to Friedman about the book.
You talk about finding a sense of place, but what is that exactly? And how does thinking about cities in that sense change the way we relate to them?
When you come to a place, you need to recognize that many of your observations will most likely be personal. It’s very hard to claim that everybody has the same perception or feeling of places where they are. But in general, when you come to a place that engages you, that has a story to tell, that inspires a certain feeling that you haven’t felt in other places, you recognize in your mind that it has a special sense of place.
What I did in the book was I broke the city down into fragments, all of which are parts of what make somewhere a nice place to live. I wrote abut them in isolation, but when you put them together, you get a very good place. For instance, walkability. When you walk from place to place you get a very different perception than when you see the city through the windshield.of your car.
Most people in Canada and the United States now live in suburbs – have we lost our sense of place?
We know to measure the amount of highway miles that have been added in cities, but we are not so good at measuring the social erosion that has happened. Over time, many of the social magnets or special places have been stripped out of our communities. You see reduced play spaces. Markets have been replaced by large supermarkets. We pay a heavy social toll for their disappearance. In the case of children, they end up having not as many social skills, obesity is very prevalent, they spend most of their time watching television or playing on the computer.
I remember designing a project in one Canadian town and a city councillor came to me and said she had not seen her neighbour in three months. I said, “How come?” and she said, “Well, I wake up in the morning to go to work, I enter my garage, get in my car, drive to the garage in my office building.” This lifestyle leads to no social relations among people.
Early in the book you describe a scene in an Italian town, inside a restaurant, where nothing seemed planned or choreographed. Initially you’re wary and annoyed about having to share a table with strangers. Then you notice the charm of the scratched-up wood tables and the centuries-old exposed brick and stone on the walls and the wonderful aromas from the cooking. You strike up a pleasant conversation with the other people there. You have a good time. New spaces in North America seem to be very restrictive in the way they can be used. Is this coming at the expense of spontaneous urban life?
Absolutely. I think that in the past few years we have attempted to introduce spaces with purpose and we ignore the spontaneity that in some places may arise. If you go through history, there is no doubt that many famous squares in the world have been designed, but often they have been the outcome of spontaneous tendencies of people who went there, worked there, and did things that planners cannot foresee. They have their own spark.
You speak fondly about markets. What is it that you like about them?
I enjoy markets that have been features of their neighbourhoods for decades or perhaps centuries. You can tell that they are buildings that are not only designed to function as markets but have all these other elements that make places work very well.
Markets are very engaging because they work on your many senses – you see amazing colours, hear so many noises, smell the food. You get to rub shoulders with people. You are surrounded by so many things that grab your attention.
Each market provides a different sense of excitement. I remember walking in the spice bazaar in Istanbul, where the scent is so strong, or the market in the old city in Jerusalem where you can hear people singing. They all challenge your senses. I do not get the same feeling in a mall or a supermarket.
Speaking of markets, in one chapter of the book, you describe your experience of walking through a street market in Dalian. What did you find happening in China?
When I see the direction that China is following now, I have to say with a great deal of sadness that the Western model, the American model, has become so powerful a force that even countries with rich urban cultures are abandoning them. When I was in Dalian I was stunned to see the amount of traditional homes, beautiful courtyard buildings, that had been cleared to make way for tall buildings like hotels and so on. But it’s the places in the world that have been frozen in time that interest people. People come from all over to visit Tuscany, the hill towns that have not changed in three or four hundred years. Many of these kinds of places are rapidly disappearing. We are in danger of seeing authentic places vanishing.
You also touch on another phenomenon in the developing world – shantytowns. In one part of your book, you marvel at how a slum in Tijuana has many of the elements of a good place, despite being very poor and having been built by its own residents using scavenged materials. Now that much of the world’s population lives in places like this, what can we learn from them?
There’s a tendency around the world for people to believe that the government has to provide homes for poor people. When I was in South Africa recently, however, I realized where they are being housed – in these huge townships that are very poorly designed and built, with single-family homes on large plots, which creates this huge urban sprawl that does not have the corner stores and social spaces like that.
In a shantytown, there are certain things that happen by force of nature – the scale, the way homes are placed and so on, that leads them to be lively places. If those principles can be studied and replicated, and people can be provided with the ability to house themselves, with government support in terms of providing infrastructure, the likelihood of obtaining nice places is greater than when people are placed in awkward, poor-looking environments that will never have the chance to have the kind of pull that these other places have.
When you go for a stroll around the city, which places have the sense of place you’re looking for?
I like the older parts of Montreal. I love the Plateau. I spend a lot of time walking there and I think it is one of the nicest neighbourhoods in Montreal. If I go out I will go to a corner café, to a place where people are sitting around, where storefronts are accessible. When I first came to McGill, I was fortunate enough to live right in the McGill Ghetto and it’s a very nice place to be a student, because it has a good atmosphere and everything you need.
|
How are characteristics (or traits) passed from parents to offspring?
In this section we examine some of the basic mechanisms of Mendelian genetics
and related aspects of inheritance.
What is Mendelian genetics?
At its most basic, Mendelian genetics examines how traits with 1 gene
and two alleles are passed on from parents to offspring. By understanding
Mendelian genetics, you will understand how traits can "skip" a generation,
why you get a 3:1 phenotypic ratio following a cross between two heterozygotes
(or an F1 x F1 cross who's parents were homozygous dominant and
homozygous recessive), and may more aspects of inheritance.
Some vocabulary to understand:
Phenotype (Phenotypic ratio)
Genotype (Genotypic ratio)
F1 & F2 generations
Law of Segregation
Although very simple, understanding this law is essential to understand
both phenotypic and genotypic ratios, and therefore the chance (= the
probability) an offspring will have a particular genotype and phenotype.
This law states that gametes have an equal chance of carrying either of
the two alleles carried by the parent for each gene. Thus 50% of gametes
will carry one allele and 50% the other. Clearly, where a parent is homozygous
for a gene, 100% of the gametes will carry the same allele.
Non-Mendelian mechanisms of inheritance (other mechanisms of inheritance)
Incomplete or codominance
Traits with one gene with multiple alleles or multiple genes each with
2 or more alleles
What determines a phenotype?
3) Genotype x Environment interaction
What causes variation?
Let's focus ONLY on genetic causes of variation
Allele Combination: The particular combination of alleles for all genes
you have will influence your phenotype. There are an astronomical number
of possible allele combinations. If, for example, we assume that each
gene only has two alleles (we know this not to be so), the number of possible
allele combinations can be calculated as follows: 2n where
n = number of genes.
Mutation is the ultimate source of new alleles.
Back to Reviews Page
|
Boycott or engage
A version of this article was first published: ethics.org.au - December 2011
The recent call for a boycott of Pork by Animals Australia raises a number of ethical questions around the use of boycott (named after Captain Boycott, an Irish landlord agent isolated by the Irish League in 1880) as a mechanism for change.
The premise behind a boycott is straight forward. Reduce or stop consuming something so that the economic impact will drive the supplier into behaving differently. Boycotts are one form of economic sanction. Others include such things as bans on sale, punitive tariffs or quotas. We see the use of boycott or other sanctions used in a wide variety situations. As a form of non-violent action, sanctions and boycotts are generally supported as a preferred form of action. Recently, economic sanctions have been used against various Middle Eastern countries. An example of a highly successful boycott was the sporting boycott applied to South Africa during the apartheid era.
The argument against boycott is that it can often impact groups that are not connected to the offender or are groups that the boycott is trying to help. The argument against boycotting oil from Iraq was that those most impacted were the average citizens whilst the leaders of the regime suffered little.
The other issue to address is the motivation of those boycotting. There tends to be two groups of boycotters. Those who believe that the company or regime have conducted some sort of unethical behaviour. This group will be prepared to pay a higher price for a similar product that is produced in an ethical manner. Others who join the boycott may do so because it makes them feel good. This group may be less attached to the actual ethics of the company or regime but wish to be seen as ethical themselves.
Looking at the request by Animals Australia to boycott pork there are a number of questions for consideration.
- Will a boycott be effective? The recent case of the live cattle export clearly shows how effective public outrage can be. The critical issue in this case was that the regulator (The Australian Government) responded decisively and quickly. While there are clearly advances being made in the processing of cattle in Indonesia, it is complex and clearly issues still exist. Of note is that according to a survey conducted by the Australian Bureau of Agricultural Resource Economics and Sciences (ABARES), approximately 325 people were estimated to have either been laid off or not hired between the start of the suspension and the resumption of trade at the end of June.
- Who will be impacted? If the boycott is effective then all producers and those in the supply chain will be equally affected. The question becomes should there be a generalised accountability for a specific agent failure. In other words, is the whole industry and those associated with it responsible for the actions of one abattoir.
- Is there a compelling reason for a generalised boycott? If we accept that the impact of a boycott will impact more than those responsible for the failure, is there some overriding justification. With the sporting boycott of South Africa, many anti-apartheid individuals were affected. An argument could be made, especially in the sporting arena, that engagement is aneffective way of promoting integration. In the case of a possible pork boycott, the callers for the boycott would need to make the argument that the benefit/utility of boycotting of pork would outweigh the accepted impact on those who are not associated with the specific abattoir.
- Does the principle/doctrine of double effect apply? Could an argument be made that it is acknowledged that there will be an impact on those not associated with the abattoir but that this is not the primary intention of the boycott. This argument used in some medical cases and most often in acts of war requires acknowledgment by those calling for the boycott. In the case made by Animals Australia it seems that no acknowledgement is made of the impact on those outside the abattoir. Again, an argument could be made that the boycott was primarily aimed at improving the welfare of factory farmed raised animals. That to effectively achieve this goal non-factory farmed animals would also be impacted and that this was an unavoidable consequence of the action.
- Are there any alternative actions that could be taken that do not impact those who are in the supply chain that support animal welfare? Boycotts are effective but could they be targeted? What about other non-violent actions such as a campaign to increase transparency on labelling, have everyone ask their waiter the provenance of their pork, petition government on appropriate welfare regulation, engage with industry on animal welfare concerns and so on. The list is endless.
This discussion will raise questions not only about the ethics involved in the pork industry but more broadly the ethics of what we produce, distribute and consume.
Philip Wright is an accredited Educator and Counsellor at St James Ethics Centre and a Psychotherapist in private practice. Using psychoanalytically orientated approaches, he works with individuals, groups and organisations both in Australia and overseas. He is a Member of the Australian Bone Marrow Donor Register Ethics Committee and past Chair of the Australian New Zealand Association of Psychotherapists Ethics Committee. He sits on a number of panels that investigate ethical complaints. Discuss these themes with Philip Wright in the forum
|
The near-circular orbit shown in the figure is a typical MGS mapping
orbit. MGS finally achieved such an orbit on February 19, 1999. The
altitude of the mapping orbit ranges from 230 to 274 miles, and the
period of the orbit is just under two hours. The latitude of the entry
and exit occultations varies over the course of the mission. Details about
the latitude coverage of the radio occultation measurements may be found
The locations of each of the retrieved profiles may be seen on the martian weather maps elsewhere on this site. Weather records and atmospheric profiles may be accessed by clicking the occultation points on these maps.
The signal phase is modified by propagation through the martian atmosphere because the velocity of the radio signal in the atmosphere is less than it is in the free space between Earth and Mars, and because the path length through the atmosphere increases up until the moment of occultation entry and decreases following the moment of occultation exit. The physical process where an electromagnetic wave is slowed when propagating through a dense medium is called refraction. The changing phase of the MGS signal at the times of the occultations produces a Doppler shift in the signal frequency. At occultation entry it appears as if the spacecraft is moving away from Earth, and the frequency of the radio signal decreases. At occultation exit it appears as if MGS is moving toward Earth, and the frequency of the radio transmission increases.
Once it is determined how the phase of the signal was modified by propagation through the martian atmosphere, a computer program calculates a profile of the refractivity of the atmosphere. The refractivity profile indicates the velocity of the radio signal at many altitudes in the martian atmosphere relative to the velocity of an electromagnetic wave in free space (the so-called speed of light). A density profile of the atmosphere of Mars is computed directly from the refractivity profile based on knowledge of the propagation of X-band radio signals (3.6 centimeter wavelength). The density profile describes how the thickness of the atmosphere varies with height above the surface.
Finally, the program uses formulas from basic physics (the ideal gas law and assumption of hydrostatic equilibrium) and knowledge of the composition of the martian atmosphere to compute profiles of atmospheric temperature and pressure from the profile of martian atmospheric density. It is necessary to assume that the temperature is known at some altitude high in the atmosphere. That is not actually the case, however, so there are errors in the temperature and pressure profiles which decrease rapidly as the altitude above the surface decreases from the height at which the boundary condition was specified.
The temperature and pressure profiles contain the same information that could be gained by releasing a weather balloon from the surface of Mars and measuring the temperature and pressure at regular intervals as the balloon drifted higher and higher into the atmosphere. Because it is not possible to release weather balloons on Mars every few hours for a couple of years, it is fortunate that radio scientists like those on the MGS Radio Science Team have developed remote means to make meteorological observations of other planets!
|
In the past month, I’ve been thinking and reading a lot about evaluation, particularly in light of my videoconferencing program at Berrien RESA. Evaluation is more than just counting how many videoconferences occurred (which is my usual pattern); it is determining the effectiveness of the program. To determine the effectiveness, we need to have some expected results, a way to measure them, and a way to find out if the program had the desired results.
What are the Expected Results?
One of the books I read on evaluation (McNeil et al., 2005) suggested that to evaluate a program, you should first consider what you expect the results of the program to be. So, what do you expect as the results of your curriculum videoconferencing program? What benefits do we expect for the students involved? We know that teachers see a benefit to their students, but what benefit is it specifically?
- Motivation (for what? Learning?)
- Achievement? (in specific content areas?)
- Expanded learning opportunities
- Cross cultural exposure?
- Increased communication skills?
How Can We Measure Those Results?
Next, we consider how we might measure those results. This is where I get seriously confused and unsure. Most of my teachers do one or two videoconferences a year. The highest is 12 videoconferences, and that was a preschool teacher with an am and pm class. So that was really just 6 videoconferences per class. Can six videoconferences in a school year make any measurable change in students? Can one videoconference make a measurable change beyond an anecdote?
- If we expect increased motivation, is that measurable after just one videoconference? Two?
- If we are measuring achievement, how would it be measured across my 70 schools with VC carts who use VC in a myriad of ways in the curriculum?
- If we are measuring expanded learning opportunities, maybe we just count how many they did and leave it at that?
- Do we determine the effectiveness of our videoconferences by how interactive they are? Do students learn more from a one-on-one vs. a view only session? Maybe. But sometimes the teacher needs to see a view-only before they will attempt a live interactive session.
- If we are measuring cross cultural exposure, does a Michigan-Texas videoconference count? (That’s for you, Rox!) What about connections to zoos & museums?
- How would we measure students’ increased communication skills? Teacher perceptions? Student surveys?
Measure Effectivness by Comparing Results
The next step would be to compare results to baseline data (before the program) and after the program. McNeil suggests using last year’s data as the baseline for this year.
But to do this, we have to resolve the issue of what is the benefit and can we measure it?
I’m not asking these questions because I don’t think there is a benefit. I do!! But can we get clearer and more articulate about the benefits of using curriculum videoconferencing? Can we improve our annual evaluations beyond just counting participation? Is it possible?
The problem with asking these questions is it starts to make you think that videoconferencing may not be worth doing. But are the things worth doing only those we can measure? Certainly the current NCLB climate leans that direction.
How did schools justify in-person field trips? Should there be hard SBR data to prove that field trips to a zoo or museum are worth doing before we actually do them? Similarly, do short-term learning experiences like videoconferences need hard data to show it’s worth doing?
I don’t know the answers to these questions. But I sure want to talk to you all about them!! Please comment and share your thoughts/reactions to these questions even if you don’t have an answer either! Help me think about this!!
McNeil, K. A., Newman, I., & Steinhauser, J. (2005). How to be involved in program evaluation: What every administrator needs to know. Lanham, MD: Scarecrow Education.
|
The World Wide Web has a lot to offer, but not all sources are equally valuable or reliable!
Consider the following when evaluating a website:
Consider the main purpose of the page. Web pages are not always easy to categorize and some may combine some of these categories.
Extensions(domains) on addresses can sometimes indicating reliability:
a .edu extension indicates a college or university
a .org extension indicates an organization
a .com indicates a commercial enterprise
These extensions are used in the U. S. only. Foreign sites, and some in the U.S., use a geographical extension or domain. These "extension" rules should only be applied in a general way. Some commercial sites contain high quality information but many are advertising a product or service and, therefore, are not objective sources. A person who works for the commercial enterprise may be reliable, although a person who is merely "renting" space on their web server may not be. Government sites usually have reliable information but remember that government also deals in propaganda and partisan views. Academic sites will most likely contain quality information suitable for research, but you must still check the author's background. An organization may be a legal entity that has an interest in providing reliable information. However, the information found on an organization's homepage may also be highly biased and one-sided
An author's affiliation is an important clue to the reliability of the information:
Look for any biographical statement about the author.
Look for an e-mail address or site address to determine affiliation.
Questions to ask about the author:
Don't take the information presented at face value. Web sites are rarely refereed or reviewed, as are scholarly journals and books:
Are the sources for any factual information clearly listed so they can be verified in another source? (If not, the page may still be useful to you as an example of the ideas of the organization, but it is not useful as a source of factual information).
Is the information free of grammatical, spelling, and typographical errors? (These kinds of errors not only indicate a lack of quality control, but can actually produce inaccuracies in information.)
Are the sponsor's biases clearly stated?
If there is any advertising on the page, is it clearly differentiated from the informational content?
Are there any indications that the material is kept current?
Is there an indication that the page has been completed, and is not still under construction?
Are there dates on the page to indicate:
-When the page was written?
-When the page was first placed on the Web?
-When the page was last revised?
Don’t see any date information on the page?
-In Netscape pull down “View” from the menu bar and select “Page information”
-In Internet Explorer pull down “File” from the menu bar and select “Properties”
-In Mozilla Firefox pull down “Tools” from the menu bar and select “Page Info”
Is it clear what topics the page intends to address?
Does the page succeed in addressing these topics, or has something significant been left out?
Is the point of view of the sponsor/author presented in a clear manner with its arguments well supported?
Are the links on the page relevant to the subject?
Does the content cover a specific time period or aspect of the topic, or strives to be comprehensive?
Is the site laid out clearly and logically with well organized subsections?
Is the writing style appropriate for the intended audience?
Is the site easy to navigate?
Is a search function offered?
Is the homepage easy to navigate?
Is the homepage logically organized?
Is the writing clear?
Are there numerous spelling or grammatical errors?
Are there errors in the use of HTML tags?
Do the links work?
|
A European Geopark is a territory, which includes a particular geological heritage and a sustainable territorial development strategy supported by a European program to promote development. It must have clearly defined boundaries and sufficient surface area for true territorial economic development.
… with a great geological heritage
A European Geopark must comprise a certain number of geological sites of particular importance in terms of their scientific quality, rarity, aesthetic appeal or educational value. The majority of sites present on the territory of a European Geopark must be part of the geological heritage, but their interest may also be archaeological, ecological, historical or cultural.
A territory developing the «Geotourism »…
A European Geopark has an active role in the economic development of its territory through enhancement of a general image linked to the geological heritage and the development of Geotourism
…in cooperation with its inhabitants
A European Geopark has direct impact on the territory by influencing its inhabitants’ living conditions and environment. The objective is to enable the inhabitants to reappropriate the values of the territory’s heritage and actively participate in the territory’s cultural revitalization as a whole.
An experimental territory…
A European Geopark develops, experiments with and enhances methods for preserving the geological heritage
…inside a thematic network
A European Geopark must work within the European Geopark Network to further the network’s development and cohesion. It must work with local enterprises to promote and support the creation of new by-products linked with the geological heritage in a complimentary spirit with the other European Geoparks Network members
|
are text string messages
given to a Web browser by a Web server. Whenever you visit a web page or navigate different pages with your browser, the web site generates a unique ID number which your browser stores in a text (cookie) file that is sent back to the server each time the browser requests a page from that server. Cookies allow third-party providers such as ad serving networks, spyware or adware providers to track personal information. The main purpose of cookies is to identify users and prepare customized Web pages for them.
Cookies can be categorized as:
• Trusted cookies
are from sites you trust, use often, and want to be able to identify and personalize content for you.
• Nuisance cookies
are from those sites you do not recognize or often use but somehow it's put a cookie on your machine.
• Bad cookies
are those that can be linked to an ad company or something that tracks your movements across the web. They are called "profiling cookies," "persistent cookies," "long term tracking cookies," "third party tracking cookies" or "tracking cookies”.
The type of cookie that is a cause for concern is the last category because they can be considered a privacy risk. These types of cookies are used to track your Web browsing habits (your movement from site to site). Ad companies use them to record your activity on all sites where they have placed ads. They can keep count of how many times you visited a web page, store your username and password so you don't have to log in and retain your custom settings. When you visit one of these sites, a cookie is placed on your computer. Each time you visit another site that hosts one of their ads, that same cookie is read, and soon they have assembled a list of which of their sites you have visited and which of their ads that you have clicked on. They are used all over the Internet and advertisement companies often plant them whenever your browser loads one of their banners. Cookies are NOT a "threat"
. As text files they cannot be executed to cause any damage. Cookies do not cause any pop ups nor do they install malware.
As long as you surf the Internet, you are going to get cookies and some of your security programs will flag them for removal. However, you can minimize this by reading "Blocking & Managing Unwanted Cookies
|
Monday, June 27, 2011
Root cause of Osteoporosis
Low calcium inreceive and low estrogen levels at menopause are proposed as the main cause of osteoporosis. However, an intercultural perspective notes that this is not true. A study shows that osteoporosis is less general in countries where calcium inreceive is much lower than that of the United States. The calcium inreceive among the Japanese is just over 540 mg to 1200 mg for Americans yet their rate of hip fracture is half. Research shows that the rate of hip fracture is highest in countries where people have higher inreceive of calcium.
Most women experience low levels of estrogen at menopause, but not everyone be familiar withs osteoporosis. low bone density and bone loss in progress can be detected with tests if osteoporotic fractures can not be predicted. The test measures bone mass in different elements of the system and detects degradation before a high bone fracture. But they are unable to predict fractures. This is because almost half of women with osteoporotic fractures may not have a density "osteoporotic" bone. They may have moderately low bone density called osteopenia, or normal bone density. Therefore, women with good bone density should also underreceive a program of strong bone building.
In fact, the bone factors including ozone as the main cause of osteoporotic fractures. There are many bone-depleting factors combine to cause the fracture. Thus, the cause of osteoporosis vary from person to person. So what treatment and prevention. Each case must be analyzed separately for each program. However, the nutritional supplement therapy, changes in lifestyle, better diet and exercise are good tools for strengthening bones.
|
a. Medical operations in a chemical warfare environment will be complex. In addition to providing care in protected environments or while dressed in protective clothing, medical personnel will have to treat chemically injured and contaminated casualties, sometimes in large numbers.
b. A mass casualty situation occurs whenever the numbers or type of casualty exceeds the capabilities of the unit to treat and manage them in a normal fashion. An erroneous reaction to such a possibility is to assume that the problem is too great to cope with and preparations would be futile. Rather, the success of the medical department to function effectively in a chemical war and to treat, successfully, the maximum number of casualties will directly relate to the efforts made in advance to prepare for the possibility.
c. The doctrine, organisation and equipment available to handle chemical casualties will vary between countries and most particularly between Services, because of differences in military operational requirements. However, whatever the system there will be a common set of problems that must be addressed in the management of chemical casualties because the clinical condition of the casualty will be the same or similar regardless of which Service he or she is a member, and because of similarities in the environment in which the casualty must be treated.
The objectives are:
a. To conserve the fighting strength.
b. To continue to provide medical services and support to the maximum extent possible.
c. To protect medical personnel from chemical injuries while handling contaminated casualties, or while working in contaminated areas.
d. To minimise morbidity and mortality from conventional and chemical injuries.
e. To avoid the spread of contamination into medical vehicles and facilities.
a. The physical characteristics of chemical agents have been described in the individual chapters for each class of chemical agent. These characteristics, the method of employment, and the meteorological environment in which they are used will have a major impact on the type and number of casualties produced.
b. Some agents, such as nerve agents, cyanide, and phosgene are highly lethal, and a large proportion of casualties may die unless care is given immediately after an attack. Other agents, such as mustard and Lewisite may be more incapacitating than lethal. The onset of symptoms will differ by type of agent and by route of exposure. Nerve agents and cyanide, especially by the inhalation route of exposure, are characteristically very rapid in onset of effects, whereas mustard and phosgene may have a latent period of several hours between exposure and onset of symptoms. During the latent phase the prognosis and future clinical course will not be apparent and the decision on whether to treat or evacuate will be difficult.
a. One of the most difficult aspects of chemical warfare is that the chemical agents may persist in the environment for extended periods of time. This is especially true of agents such as VX, the mustards, thickened GB, or GD, which may remain as contact hazards for hours or days.
b. On the chemical battlefield, three types of environments may exist:
(1) An uncontaminated area where there are no chemical agents present.
(2) A contaminated area where chemical agents are present in a liquid state (and probably in a vapour state as well) presenting a surface contact hazard.
(3) A vapour-only environment, for example, in a downwind hazard area.
c. Complete decontamination of a contaminated environment may be difficult or impossible. However it may be possible to achieve sufficient decontamination, particularly in small areas, to create a vapour only hazard area. Thus it may be possible to decontaminate equipment so that no further surface contact hazard exists, even though chemical agent vapours may continue to be off-gassed from agent adsorbed onto or absorbed into the surface. In such environments, it may be possible to work without the full protective clothing ensemble, although respiratory and eye protection would still be required. This is because most agents in a vapour state penetrate through the skin very slowly. However, mustard at high vapour concentrations may still cause skin injury, particularly if the skin surface is wet or moist as may be the case in a warm environment.
d. Where a liquid hazard exists, decontamination of skin and eyes must be accomplished quickly if it is to be effective. Chemical agents may penetrate or react with the skin and eyes within minutes, so successful decontamination must be carried out immediately after exposure. Once agent is decontaminated, or has been absorbed, no further risk of contamination exists. The casualty's body fluids, urine, or faeces do not constitute a CW hazard.
e. Individual and collective protection are the first line of defence against chemical agent contamination. Individual protection comprises the respirator and protective clothing including gloves and boots. Full protective clothing is particularly important for persistent agents and agents that pose significant skin injury or skin penetration effects. For agents posing a respiratory or eye injury threat exclusively, the respirator would suffice. Individual protection imposes physiological and psychological stress on the individual, impairs communication, and reduces performance to a certain degree, depending on the individual's job performance requirements.
f. Collective protection is desirable, particularly for medical care. Adequate collective protection may not be possible, or may be difficult to achieve and will require personnel and equipment resources. In some instances, it may be feasible to establish a vapour only hazard area, and work within that area at less than full individual protection, such as using respiratory and eye protection. Limited medical care can be achieved in this manner, but full examination and definitive surgical treatment is impossible without full collective protection.
g. Collective protection provides the capability to medically manage severely toxic or injured decontaminated casualties in an environment where medical personnel are unencumbered by wearing individual protective equipment. Likewise, the casualties benefit from the capability of the medical unit to make full use of available medical equipment and procedures. A significant percentage of casualties (15-30%) can not be adequately treated in a contaminated environment without collective protection as their treatment requires the removal of their respirator.
h. In the presence of a CW threat, equipment and supplies should be kept in unopened, sealed or covered containers until required for use. The use of chemical agent resistant material (CARM) will provide good protection against liquid contamination, but even the use of conventional tentage will significantly reduce contamination by a liquid agent for a limited period.
a. Chemical weapons may cause large numbers of casualties in poorly protected or untrained personnel. World War I experience showed that large numbers of casualties most frequently occurred with units that were surprised or inexperienced in chemical warfare. Such casualty surges will require careful preplanning and training for medical units if they are to continue to operate efficiently.
b. All medical units must be prepared to receive mass casualties caused by or contaminated with chemical agents. Mass casualties are considered to be those who are produced within a relatively short period of time and who because of their number and type exceed the medical support capabilities for their care.
c. Casualty sorting must take into account the possibility that some casualties may be contaminated. Some provision for emergency treatment of contaminated casualties needs to be made, since some critical care may be required before decontamination can be accomplished. Proper triage procedures are an essential element in handling large surges of casualties. (See Paragraph 1107.) With adequate advance planning and training, mass casualty situations can be managed and excessive morbidity and mortality reduced. Lack of such preparation, or a mistaken belief that such preparations are futile, are sure ingredients for disaster.
a. Differential diagnosis is one of the first and most difficult aspects of managing chemical casualties. Unless it is known to which agent the casualty was exposed, it may be difficult to establish a diagnosis with certainty. Further, the casualty may still be partially or fully encapsulated in a protective ensemble, precluding elucidation of any but the most simple signs and symptoms. Knowledge of the principal signs and symptoms is necessary to determine the clinical diagnosis. The rapidity of the onset of symptoms may be an important clue, for example in nerve agent poisoning or cyanide poisoning. In some instances, it is better to act rather than try to obtain a certain diagnosis, particularly if the condition of the casualty is serious and rapidly deteriorating. In forward treatment areas, the diagnosis should be kept as simple as possible, and be keyed to making decisions that will lead to some specific action or actions.
b. When chemical casualties are received at a medical unit, they may also have traumatic wounds or illnesses due to other causes. These patients must be managed so as to minimise the injuries resulting from chemical exposure without aggravating their traumatic wounds or illnesses.
a. Triage is one of the most important tools for handling combat casualties, particularly in mass casualty situations. Basically, it is a medical decision process used to arrange casualties in priority order to ensure the most effective use of limited medical resources and minimise morbidity and mortality. Triage is a continuous, ongoing process through the casualty care chain and should be utilised whenever casualties must be assigned priority for treatment, evacuation or decontamination. Triage decisions should be made by highly experienced personnel familiar with chemical and conventional injuries. Triage criteria should be determined in advance and practised. They must be relevant to the medical capabilities of the medical unit. The four standard NATO mass casualty triage categories, adapted for chemical casualties, are as follows:
(1) Immediate treatment (TI). This includes those requiring emergency life saving treatment. Treatment should not be time consuming or require numerous, highly trained personnel, and the casualty should have a high chance of survival with therapy.
(2) Delayed treatment (T2). The general condition permits some delay in therapy although some continuing care and relief of pain may be required before definitive care is given.
(3) Minimal treatment (T3). This includes those with relatively minor signs and symptoms who can care for themselves or who can be helped by untrained personnel.
(4) Expectant treatment (T4). This group is comprised of patients whose treatment would be time consuming, require numerous highly trained people, who have life threatening conditions beyond the treatment capabilities of the medical unit, and would have a low chance of survival. It must be noted that the decision to place a casualty in the expectant category is not necessarily a decision to render no therapy. Rather, the triage categories determine the priority in which casualties are treated.
b. Chemical poisoning, besides being difficult to treat in itself, will complicate the therapy for other conditions. The addition of antidote therapy may further complicate management of other conditions requiring drug therapy, e.g., use of muscle relaxants for surgery or the use of analgesics. Some of these drug interactions are currently unknown, and the medical staff must remain alert for unusual reactions to otherwise common therapy on the battlefield.
a. Field Medical Operations. Field medical operations are conducted with several echelons of care, with increasing capabilities, and more sophisticated equipment towards the rear. The most forward medical support is usually provided by enlisted medical personnel with limited equipment, drugs, and medical capabilities.
b. Far Forward Treatment. Major advances have been made in casualty survival by advances in medical and surgical capability, and most importantly by advances in rapid evacuation and early stabilisation of casualties. On the chemical battlefield, early treatment and stabilisation will be particularly critical, since the lethal agents have very rapid onset of severe, life threatening effects. This means that far forward treatment, often by non-medical personnel, will be of even greater importance than in conventional warfare.
c. Casualty Care Systems.
(1) A specific example of a casualty care system is described in AMedP-7(A), Concept of Operations of Medical Support in a Nuclear, Biological and Chemical Environment. Because the mission requirements of each Service differ markedly, the organisation of medical support, the types and amount of medical resources at the echelons, and the evacuation distances between echelons will differ greatly. Further, there will be other national differences, such that the description of a particular system will not coincide with other national or Service systems.
(2) However, when the necessity of certain functional capabilities to handle different systems is considered, important similarities between the different systems can be identified. Nine functional phases of casualty care have been identified. Not every casualty will pass through all phases. Further, some phases such as evacuation, may be performed several times. Although the phases are arranged in order, the exact temporal order may vary from system to system, or be modified by force of circumstances. The first three phases, pre-attack, self aid and buddy aid will be carried out by non-medical personnel in the units themselves. The remainder of the phases will generally be carried out by medical personnel and units.
a. The steps taken before an attack occurs will be the most important in determining how many and how severe the casualties will be. The protective mask and clothing are the first line of defence. Some nations have pre-treatments available for protection against certain chemical agents. Training will be essential to maximise protection of personnel and equipment. With multiple dose pre-treatments, strict discipline to ensure proper use will be necessary. The immediate commander exercises primary responsibility for ensuring that all necessary steps are taken. Medical personnel have a staff advisory role to the commanders in assisting them on matters of medical importance. For instance, commanders need to be advised of the physiological stress characteristics of the protective ensembles and how performance capabilities may be altered. The relation between environmental temperature and heat stress needs to be emphasised, especially in training situations, to avoid unnecessary heat casualties. Medical units will generally follow the same training and procedures for protecting themselves as do the non-medical units.
b. An example of possible guidance given for the prevention of heat casualties is given in Paragraph 1127. Each country may wish to issue its own specific guidelines.
a. The goal in this phase is to protect oneself from agent exposure during and immediately after an attack, to stop any further exposure, or to initiate immediate therapy if a significant exposure has occurred.
b. Since it is by definition "self care," it is carried out only by personnel still capable of functioning. For agents with rapid onset, some personnel may not have time to take any steps before they are severely incapacitated and will by definition not pass through this phase. Since personnel in this phase will still be able to function to a certain degree, it is important that any treatment that they take not be incapacitating in itself. Some individuals will take such self aid mistakenly when they have not had a significant exposure, or even deliberately. Since the preservation of the unit effectiveness is most important at this point, additional casualties from the antidotes must be avoided.
c. The specific antidotes available for self care are discussed in the chapters for the different classes of agents, and are further prescribed in national and service doctrines. The specific steps in self-administration of the antidotes are likewise part of national and service doctrine and training. A critical factor in use of self aid antidotes is clearly defining the specific conditions under which they will be taken. Most commonly, they are taken when the individual notices a specific set of symptoms, characteristic for the agent. Additionally, self decontamination kits and their use are described in national and service doctrine.
a. Buddy aid is the care given by non-medical personnel to personnel who are not able to care for themselves. Incapacition of various degrees is the marker differentiating between self care and buddy care.
b. Many units do not have medical personnel assigned or attached, or the medical personnel themselves may be casualties. Since immediate care is often so important in treating chemical casualties, buddy care will be the determining factor in the success of treatment. Unit commanders must take considerable care to ensure that all personnel have a adequate training to perform buddy care for chemical agent casualties. Such training is essential since the normal instinct of soldiers to help one another may be hampered by the inability in protective clothing to recognise that help is needed. Medical personnel may assist commanders in providing training.
c. Since the numbers of medical personnel are limited, particularly in forward units, commanders may wish to have a few non-medical personnel trained to a higher level of medical proficiency than would be feasible for all personnel. This could be valuable in resuscitation of nerve agent casualties for example, where the procedures are more complex. Such trained personnel would also provide back-up for medical personnel who may become casualties.
d. The antidotes available for buddy care will usually be the same as those provided for self aid. Since the casualty will be already incapacitated, the concern for further incapacitation from antidotes no longer applies, and further or higher doses of antidotes may be given if available. The individuals providing buddy care should not use their own antidotes to treat a casualty since they may need it themselves, but should use those belonging to the casualty, or any others available.
e. Commanders will have to exercise some control on buddy care, so as not to compromise mission accomplishment, but must also recognise their exclusive responsibility for the welfare of the casualties while they are still in the commanders' units. Manpower intensive procedures such as resuscitation must be applied judiciously, and only to those likely to benefit in order to avoid tying up too many personnel. Similarly, casualty evacuation out of the unit often requires the unit's own personnel initially and must be tightly controlled to retain personnel within the unit. Again, unit survival must be the overriding consideration.
a. Initial medical care is the first care given by medical personnel. Although for administrative reasons medical care is sometimes defined as beginning when a casualty is treated by medical personnel, from a functional consideration medical care should be a continuous process, and this phase is a continuation of care given in preceding phases.
b. The goals of the initial medical care are to return to duty promptly all personnel still effective, and to stabilise and prepare for evacuation those casualties who require further medical care. Even though the medications, equipment, and medical personnel resources available far forward are limited, this phase will still be highly critical for successful outcome. As a result of certain agents, casualties reaching this point may be severely incapacitated. Triage will be important in determining priorities of care and evacuation. The specific therapy available in this phase will depend on the unit, national and Service doctrines, and policies.
Given the rapid onset and severe course of poisoning by some of the chemical warfare agents, nerve agents in particular, consideration for life support of vital, cardiovascular and respiratory function will often be required. Other conditions such as hemorrhage or shock from conventional wounds will also require immediate care. The ability to successfully manage these conditions will depend on the resources available at the various echelons. Triage criteria may dictate that some of these casualties will have a low priority of care. However, it is vital to make some effort to stabilise a casualty before evacuation to higher echelons and some effort at stabilisation should precede time consuming efforts such as full casualty decontamination. Therefore, some means of handling severe casualties should be incorporated early on in the system of managing casualties at each echelon. Hemorrhage, severe respiratory distress, cardiovascular collapse, shock, and seizures are among the conditions requiring prompt attention.
Evacuation of chemically injured casualties entails more than transportation. Monitoring is important to ensure that the casualty's condition is not deteriorating. Some provision for in transit care will also be critical. Since some casualties may be contaminated, the casualty evacuation system must be organised in a way as to minimise the spread of contamination. Since mass casualties may occur, and the number of medical vehicles may be inadequate to meet the increased load, unit commanders need to have contingency plans to supplement medical vehicles for casualty evacuation, or be prepared to retain casualties within their units for longer periods of time. Aeromedical evacuation is desirable when feasible, but the combat situation, the chemical environment and the possibility of contaminating helicopters may preclude their use far forward, in the initial stages of evacuation.
a. The goal of casualty decontamination differs from personal and unit decontamination. In addition to preventing exposure of the agent, casualty decontamination also has the goal of preventing exposure of medical care personnel and facilities to contaminated casualties. The requirement for casualty decontamination will be a function of the agent used, environmental factors, and particularly time. Liquid chemical agents on the skin may react with, or penetrate it rapidly. Some method of monitoring contamination would be valuable in determining the degree of decontamination required.
b. It is imperative that at least limited decontamination is performed as soon as possible. This will diminish the chance of recontamination of the casualty, or contamination of medical personnel and facilities from any agent left on the clothing or equipment. Given the time it takes to evacuate casualties, the quantity of liquid agent on the skin or clothing will have diminished or even disappeared due to evaporation. Often careful removal of the clothing and equipment, with spot decontamination of skin areas that may be at risk of recontamination when the clothing is removed, will be just as effective as full decontamination, and can be accomplished more quickly and with fewer personnel. Protecting the wound from any further contamination with protective dressings is desirable. Further management of wounds should follow normal treatment procedures.
c. The hazard of off-gassing and further contamination from clothing and equipment removed from contaminated casualties requires that these items be disposed of properly. Several methods may be utilised for this purpose, such as impermeable bags or containers, or bleaching powders.
d. Disposal sites for these items must be marked in accordance with the standard NATO markings.
Specific therapy of the chemical casualty should be initiated as far forward as possible. It may occur across several echelons of care, involving increasingly sophisticated medical treatment as the casualty is evacuated to the rear.
Following successful medical intervention, it must be decided whether a casualty should be returned to duty, held, or evacuated further to the rear for further treatment and convalescence. For casualties with minor exposures, it is desirable to return them to duty as soon as possible, and as far forward as possible, although this is not always operationally feasible. For casualties with severe poisoning, the course may be prolonged, and a long convalescence may be expected. The disposition of mustard injuries is dependent not only on the extent of injury, but also on the site of injury, as is described in Chapter 3. Care must be exercised in early mustard or phosgene injuries not to confuse the latent period with absence of injury. Nerve agent casualties with depleted cholinesterase levels are likely to be more susceptible to subsequent poisoning from nerve agents until their cholinesterase levels return to normal.
a. Combined injuries occur when a casualty is affected by conventional weaponry and also by the use of nuclear, chemical or biological weapons. The situation in which a casualty is contaminated with a chemical agent, but not suffering from such an agent's effects is dealt with in AMedP-7(B).
b. Wounds which are not contaminated should be dressed in the usual way. They should then be covered with agent proof material (either impervious material or material similar to that of the protective suit) and any pressure bandage considered necessary may then be applied over the protective covering. These precautions may prevent the casualty becoming a mixed chemical and conventional casualty.
c. The object of this section is to consider the effect of poisoning by chemical agents, and the effect of drugs used in the treatment of such poisoning upon the handling and treatment of casualties who are suffering from conventional wounding. A summary of possible interactions is listed in Table 11-I.
a. The dangers presented by this form of combined injury are those of the nerve agent itself, those of the interaction of respiratory depression with the conventional injury and those of the reduced cholinesterase activity upon drugs used in anesthesia during subsequent surgery; even carbamate pre-treatment may affect muscle relaxants to a limited extent.
b. Signs of nerve agent intoxication will call for treatment as described in Chapter 3.
c. Loss of blood will complicate respiratory failure, so that the administration of oxygen, if available, and positive pressure resuscitation if necessary, should be applied at the earliest indication of need. The need for replacement of blood lost through conventional injury will be correspondingly greater if respiratory depression is present. Reduced cholinesterase activity will affect the use of relaxant drugs used during anesthesia. On basic principles the action of anticholinesterases (including to a lesser extent pyridostigmine pre-treatment) may be expected to potentate the action of depolarizing relaxants (e.g., succinylcholine) prolonging their action, but to oppose the action of non-depolarising relaxants of the curare type increasing the necessary dose. Drugs, such as opiates and other drugs, which reduce respiratory drive should be used with caution in cases of nerve agent intoxication.
a. This form of combined injury increases the stress element involved in the induction of pulmonary oedema. The latent period between exposure and the development of pulmonary oedema may possibly be shortened and the pulmonary oedema itself may be more severe.
b. The casualty should be kept at rest as far as possible during evacuation and steroid treatment if used should be applied at the earliest moment. There is no contraindication to the use of opiates or other systemic analgesics in order to treat pain or shock from the conventional injury. Oxygen therapy may be required, but fluid replacement should be used with caution. The final decision on the necessity for fluid replacement must be made on the basis of the casualty's condition, bearing in mind the danger of precipitating or increasing pulmonary oedema.
a. Combined injuries of this type will present especial danger from respiratory depression and from the therapeutic reduction of the oxygen carrying power of the blood, owing to the formation of methaemoglobinaemia in treatment.
b. The need for treatment of cyanide poisoning is urgent and must be started in accordance with Chapter 5. Oxygen therapy together with positive pressure resuscitation may be required all the more urgently in the presence of marked hemorrhage.
c. Opiates and other drugs which reduce respiratory drive must be used with caution in these combined injuries as the respiratory centre is depressed in cyanide poisoning.
a. Where the conventional injury is itself contaminated by a persistent nerve agent the danger of the casualty absorbing a lethal dose of nerve agent through the wound is very great and the prognosis is correspondingly bad. Although the wound track resulting from a conventional weapon injury in surrounded by devitalised tissue, there is rapid penetration of the tissues by nerve agent and a lethal dose may be quickly absorbed especially if a persistent agent contaminates the wound.
b. Decontamination of the skin surfaces around the wound should be carried out and then a surface dressing applied. The wound itself should be protected from further contamination and the integrity of the suit restored. Wounds may be irrigated using a solution of hypochlorite and then flushed with normal saline. Hypochlorite should not be used, however, within the abdominal or thoracic cavities, nor with intracranial wounds. Early surgical excision of the contaminated wound may offer the best chance of success but autoinjector treatment should be started immediately the wound contamination is diagnosed and repeated as necessary.
c. Surgery of the contaminated wound offers minimal danger to medical and nursing staff if gloves made of butyl rubber are worn. If these are not available then two pairs of latex rubber gloves should suffice if washed at short intervals in hypochlorite solution and changed frequently. The evacuation of casualties with combined injuries requires careful observation while on route to a surgical unit and autoinjector treatment continued if signs of poisoning persist or worsen.
d. For conventional wounds not directly contaminated but with the surrounding skin affected by a chemical agent, decontamination of the skin should be carried out and any poisoning treated as appropriate for the particular agent involved.
e. Where the conventional injury is not directly contaminated, but skin absorption is thought to have occurred, skin decontamination should be carried out in the recommended way. Any signs of nerve agent intoxication should be treated. The casualty should be kept under as close observation as circumstances allow in case signs of delayed absorption of agent appear. If it is necessary to evacuate without medical supervision, consideration may be given to the use of one injection from the automatic injection device as a precaution against delayed absorption of nerve agent.
a. Vesicant agents will debilitate the casualty and may seriously delay the healing of any wound due to systemic effects, even if the wound itself is not directly contaminated. A contaminated wound will be very slow to heal and may also lead to rapid systemic absorption of the agent.
b. If the contamination of a wound with Lewisite occurs (immediate pain, disproportionate to the severity of the wound is suggestive of this) therapy with dimercaprol (BAL) will be required at an early stage.
c. The area around the wound should be decontaminated and the wound dressed. The dressed wound should be protected from further contamination with material similar to that of the protective suit.
d. Thickened mustard may be carried into wounds on fragments of cloth. These wounds should be carefully explored using a no-touch technique. Fragments of cloth should be removed and placed in a bleach solution. This removes the hazard from mustard vapour off-gassing. Wounds should be irrigated using a solution containing 3000-5000 ppm free chlorine (dilute "milton" solution) with a dwell time of approximately 2 minutes. The wound should then be irrigated with saline. This technique should not be used in the abdominal, or thoracic cavities, nor with intracranial head injuries.
e. Opiates should not be withheld if the condition of the casualty calls for their use.
Collective protection greatly enhances the treatment of casualties in a contaminated environment as 15-30% of casualties can not be adequately treated without removal of their respirator.
Head wounds, after being attended to and dressed will necessitate the casualty being evacuated in a casualty bag or half bag or hood. In emergency the casualty's head may be protected in a pervious blouse from a spare protective suit.
a. The use of individual protective equipment and casualty bags imposes a significantly greater heat stress upon the individual. In warm environments and at moderate work rates personnel are susceptible to heat injury.
b. The medical officer's responsibilities may include providing advice to commanders about work/rest cycles and of the need for increased fluid intake.
c. Medical attendants need to be especially aware of the need to replace fluids in casualties wearing individual protective equipment.
d. Protective equipment makes monitoring casualties difficult and a high index of suspicion for heat stress must be maintained at all times.
e. Table 11-II may be applied as guidance for the prevention of heat casualties in acclimatised individuals. In situations where work is heavy or prolonged, the risk of heat injury exists at wet bulb gradient temperatures (WBGT) below 78°F (25.5°C).
|
Paul was a first-century preacher who appeared on the scene shortly after Jesus was crucified and came back to life again. He wrote about one quarter of the New Testament. He was especially gifted when it came to announcing the God of the Bible to the polytheists who dominated the culture of the Roman imperial world. So we find him, for example, in the great city of Athens, carefully explaining what a difference it makes to see that there is but one God and that he cannot be manipulated. At the time Athens had the reputation of being the most learned city in the Roman world, followed by Alexandria in Egypt.
When Paul gives his address to some philosophers and teachers in Athens, he explains what he holds to be the truth. Theirs is a world of gods, and the very nature of their religion is “you scratch my back, I scratch your back.” But Paul says, “The God who made the world and everything in it [thus you find him articulating the Bible’s teaching about creation from Genesis 1–2] is the Lord of heaven and earth and does not live in temples built by hands” (Acts 17:24). Paul does not mean that God may not disclose himself in a temple if he chooses to do so. What he means is that God cannot be reduced to the temple where he is manipulated and domesticated by a priestly class. You cannot get him into a position where you can manipulate him to do your will by providing cash to a certain class of priests, connected with a temple, who are allegedly experts in figuring out what the gods want. The God of the Bible is too big for that; he made everything, he is sovereign over the whole lot, and he cannot be manipulated.
D.A. Carson, The God Who is There, (46)
|
It appears likely that your pooch's wolf ancestors only tolerated a carniverous diet and didn't have the digestive enzymes needed to handle starch. Scientific studies in Sweden show that, during his evolution from wolf to domestic pet, the dog developed genes that allowed him to digest starch. Humans show similar genetic developments based on increased carb consumption. A shared diet appears to have played a role in bonding man and dog.
Doggy Dietary Needs
The short answer is that starches are not bad for dogs as long as they don't form the majority of the dog's diet. Excessive carbohydrate intake can cause digestive problems and weight gain. Kibble dog food contains some starch, which most dogs tolerate well. You can also give your pooch potatoes and rice. He may even like some pasta occasionally. These starchy foods provide fiber as well as energy. An adult dog only needs protein to form 18 percent of his daily diet. The rest is fiber, carbs, fats, vitamins and minerals.
- Tom Brakefield/Stockbyte/Getty Images
|
"Few persons can be made to believe that it is not quite an easy thing to invent a method of secret writing which shall baffle investigation. Yet it may be roundly asserted that human ingenuity cannot concoct a cipher which human ingenuity cannot resolve..."
Edgar Alan Poe - "A few words on secret writing"; 1841
Human desire to communicate secretly is at least as old as writing itself and goes back to the beginnings of our civilisation. Methods of secret communication were developed by many ancient societies, including those of Mesopotamia, Egypt, India, China and Japan, but details regarding the origins of cryptology, i.e. the science and art of secure communication, remain unknown.
We know that it was the Spartans, the most warlike of the Greeks, who pioneered cryptography in Europe. Around 400 BC they employed a device known as the scytale. The device, used for communication between military commanders, consisted of a tapered baton around which was wrapped a spiral strip of parchment or leather containing the message. Words were then written lengthwise along the baton, one letter on each revolution of the strip. When unwrapped, the letters of the message appeared scrambled and the parchment was sent on its way. The receiver wrapped the parchment around another baton of the same shape and the original message reappeared.
In his correspondence, Julius Caesar allegedly used a simple letter substitution method. Each letter of Caesar's message was replaced by the letter that followed it alphabetically by three places. The letter A was replaced by D, the letter B by E, and so on. For example, the English word COLD after the Caesar substitution appears as FROG. This method is still called the Caesar cipher, regardless the size of the shift used for the substitution.
Simple substitution ciphers are easy to break. For example, the Caesar cipher with 25 letters admits any shift between 1 and 25, so it has 25 possible substitutions (or 26 if you allow the zero shift). One can easily try them all, one by one. The most general form of one-to-one substitution, not restricted to the shifts, can generate
26! or 403,291,461,126,605, 635,584,000,000
possible substitutions. And yet, ciphers based on one-to-one substitutions, also known as monoalphabetic ciphers, can be easily broken by frequency analysis. The method was proposed by the 9th century polymath from Baghdad, al-Kindi (800-873AD), often called the philosopher of the Arabs.
Al-Kindi noticed that if a letter in a message is replaced with a different letter or symbol then the new letter will take on all the characteristics of the original one. A simple substitution cipher cannot disguise certain features of the message, such as the relative frequencies of the different characters. Take the English language: the letter E is the most common letter, accounting for 12.7% of all letters, followed by T (9.0%), then A (8.2%) and so on. This means that if E is replaced by a symbol X, then X will account for roughly 13% of symbols in the concealed message, thus one can work out that X actually represents E. Then we look for the second most frequent character in the concealed message and identify it with the letter T, and so on. If the concealed message is sufficiently long then it is possible to reveal its content simply by analysing the frequency of the characters.
In the fifteenth and the sixteenth centuries, monoalphabetic ciphers were gradually replaced by more sophisticated methods. At the time Europe, Italy in particular, was a place of turmoils, intrigues and struggles for political and financial power, and the cloak-and-dagger atmosphere was ideal for cryptography to flourish.
In the 1460s Leone Battista Alberti (1404-1472), better known as the Renaissance architect, invented a device based on two concentric discs that simplified the use of Caesar ciphers. The substitution - i.e. the relative shift of the two alphabets - is determined by the relative rotation of the two disks.
Rumour has it that Alberti also considered changing the substitution within one message by turning the inner disc in his device. It is believed that this is how he discovered the so-called polyalphabetic ciphers, which are based on superpositions of Caesar ciphers with different shifts. For example, the first letter in the message can be shifted by 7, the second letter by 14, the third by 19, the fourth again by 7, the fifth by 14, the sixth by 19, and so on repeating the shifts 7, 14, 19 throughout the whole message. The sequence of numbers - in this example 7, 14, 19 - is usually referred to as a cryptographic key. Using this particular key we transform the message SELL into its concealed version, which reads ZSES.
In technical terms the message to be concealed is often called the plaintext and the operation of disguising it is known as encryption. The encrypted plaintext is called the ciphertext or cryptogram. Our example illustrates the departure from a simple substitution; the repeated L in the plaintext SELL is enciphered differently in each case. Similarly, the repeated S in the ciphertext represent a different letter in the plaintext: the first S corresponds to the letter E and the second to the letter L. This makes the straightforward frequency analysis of characters in ciphertexts obsolete. Indeed, polyalphabetic ciphers invented by the main contributors to the field at the time, such as Johannes Trithemius (1462-1516), Blaise de Vigenere (1523-1596), and Giovanni Battista Della Porta (1535-1615), were considered unbreakable for at least another 200 years.
(Not so) unbreakable
The first description of a systematic method of breaking polyalphabetic ciphers was published in 1863 by the Prussian colonel Friedrich Wilhelm Kasiski (1805-1881), but, according to some sources (for example, Simon Singh, The code book), Charles Babbage (1791-1871) had worked out the same method in private sometime in the 1850s.
The basic idea of breaking polyalphabetic ciphers is based on the observation that if we use N different substitutions in a periodic fashion then every Nth character in the cryptogram is enciphered with the same monoalphabetic cipher. In this case we have to find N, the length of the key, and apply frequency analysis to sub-cryptograms composed of every Nth character of the cryptogram.
But how do we find N? We look for repeated sequences in the ciphertext. If a sequence of letters in the plaintext is repeated at a distance which is a multiple of N, then the corresponding ciphertext sequence is also repeated. For example, for N=3, with the 7, 14, 19 shifts we encipher
The repeated sequence ACUL is a giveaway. The repetition appears at a distance 9 thus we can infer that possible values of N are 9 or 3 or 1. We can then apply frequency analysis to the whole cryptogram, to every third character and to every ninth character; one of them will reveal the plaintext. This trial and error approach is getting more difficult for large values of N, i.e. for very long keys.
In the 1920s electromechanical technology transformed the original Alberti's disks into rotor machines in which an encrypting sequence with an extremely long period of substitutions could be generated, by rotating a sequence of rotors. Probably the most famous of them is the Enigma machine, patented by Arthur Scherbius in 1918. (See Claire Ellis's article about the Enigma and its role in the Second World War, also in this issue of Plus.)
A notable achievement of cryptanalysis was the breaking of the Enigma in 1933. In the winter of 1932, Marian Rejewski, a twenty-seven year old cryptanalyst working in the Cipher Bureau of the Polish Intelligence Service in Warsaw, mathematically determined the wiring of the Enigma's first rotor. From then on, Poland was able to read thousands of German messages encrypted by the Enigma machine. In July 1939 Poles passed the Enigma secret to French and British cryptanalysts. After Hitler invaded Poland and France the effort of breaking Enigma ciphers continued at Bletchley Park in England. A large Victorian mansion in the centre of the park (now a museum) housed the Government Code and Cypher School and was the scene of many spectacular advances in modern cryptanalysis.
Despite its long history, cryptography only became part of mathematics and information theory in the late 1940s, mainly as a result of the work of Claude Shannon (1916-2001) of Bell Laboratories in New Jersey. Shannon showed that truly unbreakable ciphers do exist and, in fact, they had been known for over 30 years. They were devised in about 1918 by an American Telephone and Telegraph engineer Gilbert Vernam and Major Joseph Mauborgne of the US Army Signal Corps, and are called either one-time pads or Vernam ciphers.
Both the original design and the modern version of one-time pads are based on the binary alphabet. The message, or plaintext, is converted to a sequence of 0's and 1's, using some publicly known rule. The key is another sequence of 0's and 1's of the same length. Each bit of the message, or the plaintext, is then combined with the respective bit of the key, according to the rules of addition in base 2:
0+0=0,The key is a random sequence of 0's and 1's, and therefore the resulting cryptogram - the plaintext plus the key - is also random and completely scrambled unless one knows the key. The plaintext can be recovered by adding (in base 2 again) the cryptogram and the key.
In the example above, the sender, traditionally called Alice, adds each bit of the plaintext (01011100) to the corresponding bit of the key (11001010) obtaining the cryptogram (10010110), which is then transmitted to the receiver, traditionally called Bob. Both Alice and Bob must have exact copies of the key beforehand; Alice needs the key to encrypt the plaintext, Bob needs the key to recover the plaintext from the cryptogram. An eavesdropper, called Eve, who has intercepted the cryptogram and knows the general method of encryption but not the key, will not be able to infer anything useful about the original message. Indeed, Shannon proved that if the key is secret, the same length as the message, truly random, and never reused, then the one-time pad is unbreakable. Thus we do have unbreakable ciphers!
How to distribute them?
There is, however, a snag. All one-time pads suffer from a serious practical drawback, known as the key distribution problem. Potential users have to agree secretly and in advance on the key - a long, random sequence of 0's and 1's. Once they have done this they can use the key for enciphering and deciphering, and the resulting cryptograms can be transmitted publicly, for example, broadcasted by radio, posted on Internet or printed in a newspaper, without compromising the security of messages. But the key itself must be established between the sender and the receiver by means of a very secure channel - for example, a very secure telephone line, a private meeting or hand-delivery by a trusted courier.
Such a secure channel is usually available only at certain times and under certain circumstances. So users far apart, in order to guarantee perfect security of subsequent crypto-communication, have to carry around with them an enormous amount of secret and meaningless information (cryptographic keys), equal in volume to all the messages they might later wish to send. This is, to say the least, not very convenient!
Furthermore, even if a "secure" channel is available, this security can never be truly guaranteed. A fundamental problem remains because, in principle, any classical private channel can be monitored passively, without the sender or receiver knowing that the eavesdropping has taken place. This is because classical physics - the theory of ordinary-scale bodies and phenomena such as paper documents, magnetic tapes and radio signals - allows all physical properties of an object to be measured without disturbing those properties. Since all information, including cryptographic keys, is encoded in measurable physical properties of some object or signal, classical theory leaves open the possibility of passive eavesdropping, because in principle it allows the eavesdropper to measure physical properties without disturbing them. This is not the case in quantum theory, which forms the basis for quantum cryptography.
We continue the story in the next issue of Plus.
About the author
Artur Ekert splits his time between the University of Cambridge, where he is a Professor of Quantum Physics at DAMTP and a Professorial Fellow of King's College, and the National University of Singapore, where he is a Distinguished Professor. He is one of the discoverers of quantum cryptography.
|
Hundreds of additional titles available for
online reading when you join Gateway to the Classics
THE DIVINE MUSICIAN
ORTH-WEST of the Ægean, where the cliffs of Pelion rise
sheer out of the sea, dwelt long ago Cheiron, the
centaur, the wisest of living things, half man, half
horse. Many brothers had he, who in form were like
himself, but their hearts within were hard and wild,
and because of their untamed passions and their cruelty
and lust they were hated alike by gods and men. But
Cheiron was gentle and mild. He knew all manner of
strange things; he could prophesy, and play upon the
lyre, and cure men of their hurts by means of healing
herbs. He was brave withal, and had been in many a
bloody fight, and knew the arts of war full as well as
the arts of peace. Wherefore the old Hellenes called
him Cheiron, the Better One, and sent up their sons to
live with him that they might be taught all the things
which man should know. In a hollow cave on the
mountain-side he had his home. Far up above him the
snow-capped peaks of Pelion kept watch over the
nestling townships of the plain, and far, far below the
the Ægean washed without ceasing on the rocks of
that pitiless coast, now soft and soothing as the song
a mother sings to her child, now loud and boisterous
beneath the lash of the storm-wind, when the seabirds
fly screaming to the shelter of the shore. All around
were dark forests of chestnut, pine and oak, where many
a fierce beast had his lair. In the branches of the
trees the wild birds built their nests and filled the
dark glades with song. About the mouth of the cave the
ground was trampled hard beneath the tread of many
feet, and paths led this way and that, some into the
heart of the forests, others down the steep cliff to
Every morning at sunrise a troop of boys and youths
would come forth from the cave, and, dividing into
groups, would go their several ways to fish or to hunt,
or to follow the course of some stream to its unknown
source in the mountains. Sometimes Cheiron himself
would go with them, if he thought they had need of his
help; but more often he left them to their own devices,
to follow each one his own bent as Nature prompted him.
In the evening they would come home and tell him of
their doings in the day; and he would praise or blame
them, according as they had done well or ill, and show
them how they might do better another time. Then they
would go to their couches of dried moss and leaves, and
sleep the deep sleep of youth and health, while the
cool night breeze blew in upon their faces from the
mouth of the cave, and put fresh life and strength into
their tired limbs. In the winter-time, when the night
was longer than the day, and the snow lay deep upon the
hills, they would light a great fire in front of the
cave with logs they had stored in the
summer months, and Cheiron would take his lyre and sing
to them of all things in heaven and earth, while they
lay round about and listened. The songs which he sang
to them then they never forgot, because Cheiron was
wise, and spoke to their souls in his singing. So they
laid up his songs in their hearts; and many a long year
after, when they were grown men far away, and some
danger or difficulty stood in their path, the drift of
his teaching would come back to them in the words of a
song, and their hearts would grow brave and strong once
more to act worthily of their boyhood's sunny days on
Pelion. Many a hero whose name still lives among man
had been trained by Cheiron in his youth—Peleus,
who married a goddess, and Achilles his son, the
swiftest and bravest of mortal men; and Jason, the
leader of the Argonauts; and Asklepios, the mighty
healer; and, not least among them, Orpheus, the
greatest of Greek musicians and mystics, whose tale I
will tell you now.
One day, as the shades of evening were beginning to
fall, Cheiron stood before the mouth of the cave
waiting for the lads to come home. Sooner than he
expected he saw one of them far away coming down a path
from the mountains, and he marvelled that he should
return so soon and alone. As he came nearer Cheiron
saw that he walked with his eyes upon the ground, deep
in thought. Every now and again he stopped and looked
round upon the peaceful hillsides stretching calm and
smiling in the golden glow of the evening; and when he
had gazed for a moment he sighed, as though he would
breath into his soul the beauty he saw around him, and
then went on his way once more with his eyes on the
So he walked till he came close to the cave and saw
Cheiron standing in the entrance. Then he ran up to
him and put his hand upon his shoulder.
"My father," he cried, "look round upon the hills, hast
thou ever seen them so fair as they have been this
Cheiron smiled at his words.
"Orpheus," he said, "the fair face of the earth changes
but little. In the soul of man it lies to look upon
her and see her beauty or to be blind."
"Till this day I have been blind, Cheiron," he said.
"And who has lifted the veil from thine eyes, my son?"
asked his master.
"I know not," he said. "But this morning, while yet it
was dark, there came to me a strange unrest and a
longing to be alone. So I crept forth from the cave
whilst you were all sleeping, and climbed up the
mountain-side—up, up, in the grey light before
dawn, till I came to the place where the white snow
lies like a cloak about the shaggy shoulders of Pelion.
There I left the track of my footsteps where no feet
but mine had trod, and climbed up upon a boulder and
looked out across the sea. And I saw the great sun
rise out of the east. As I looked it seemed that I
beheld the face of God; and as snow and sea and the
forests awoke to life in the light of His glory, my
soul awoke within me. All the day long I wandered
about the forests and hills; and I saw the beauty of
the trees and the grass, and the grace of the wild deer
as he bounded over the rocks, as I had never seen it
before. The wonder of this day lies like a burden on
my heart that I fain would ease, yet I have no words to
tell of it."
Then Cheiron took up the lyre which was lying by his
side and passed his fingers gently over the strings.
"Orpheus," he said, "many a long year ago, when thou
wast a little lad, thy mother Calliope brought thee to
me. And she put thy hand in my hand, and said:
'Cheiron, make a man of my son. Make him brave and
fearless and strong, a worthy companion of the noble
lads thou hast around thee. When the right time comes
I will breathe my spirit upon him, and he shall be
great, as few in this world are great.' This day she
has kept her word, Orpheus. She has breathed her
spirit upon thee, and has opened the eyes of thy soul
and made them see."
"Who is my mother Calliope?" asked the lad.
"She is the Fair-voiced One who speaks through the lips
of mortals by music and song, Orpheus. With her
sisters, she dwells for ever by the sunlit streams of
Helicon, where they follow in the footsteps of Apollo,
their lord, across the green lawns and the flowery
meadows. All knowledge, all music of sound and of
words, comes to men by their gift—those nine
great sisters, the Muses. Happy art thou to be her
son. Take now this lyre from mine hand. Ease the
burden of thy soul in song, and learn how great is the
gift she has given thee."
So Orpheus took the lyre from his master, and struck
the chords, as all the lads who dwelt with Cheiron knew
full well how to do. But instead of the old songs that
he had learnt from his childhood, a new song came to
his lips, and he sang as he had never sung before. Far
away upon the hillsides his companions heard his voice,
and they stopped upon their homeward way to listen, as
the evening breeze bore the sound to their ears. When
they knew that the voice came from home, they hastened
on and drew silently near, that no sound might disturb
the singer, and throwing themselves upon the ground at
his feet, forgot their weariness and hunger as they
listened. On and on he sang, forgetful of all else but
his song, till the red glow of the evening died away in
the west and the stars shone pale in the twilight.
There was a strange magic about his music which drew
all living things to his feet, as a magnet draws the
cold heart of steel. From the woods and forests they
came, and from the bare hillsides—the lion, the
leopard and the trembling fawn. The snake came forth
from his hiding-place, the rabbit from his hole, and
the wild birds wheeled about his head and settled on
the brow of the cave. The very trees seemed to hear
him, as they swayed their heads to and fro to the
rhythm of his song. As he looked round upon his
comrades whilst he sang, his heart grew strong within
him, for he felt that a strange new power had been born
in his soul, which could bow the heads of men beneath
his will as the wind bows the rushes by the stream. So
he sang on as the twilight deepened into night, and all
the stars of heaven came forth to listen, till at
length his song died upon his lips, like a breeze
lulled to rest at sunset. For a moment the creatures
lay spellbound around him; then one by one they crept
back to their homes, with their fears and their hatreds
tamed for a while by the magic of his singing. And his
companions crowded round him with words of praise and
"Who taught thee thy magic song, Orpheus?" they cried.
"The sunrise and the snow," he answered, "and the
teaching of Cheiron, and my happy days with you, and
the spirit of my mother Calliope—all these have
taught me my song."
But his answer was a dark saying to them, and not one
of them understood it, save Cheiron. He knew that it
is the commonest things in life that are the material
of all that is beautiful and fair, just as a temple may
be built of common stone; but that the children of the
Muses are few, who can by music and art open the blind
hearts of men to see.
Thus did the gift of song fall upon Orpheus, so that he
became the greatest of all singers upon the earth. All
day long he would wander about the woods and the hill,
and tame the heart of every living thing with the magic
of his voice.
One day it chanced that he came into the wood where he
had never been before, and he followed a grass-grown
track which led to the mouth of a cave. On one side of
the cave stood a tall beech-tree, whose moss-covered
roots offered a tempting seat, and close by a clear
stream gushed forth from the rocks. He drank eagerly
of the water, for he had wandered far and was thirsty;
and when he had quenched his thirst, he sat down on the
roots of the beech-tree and began his song. As before,
the wild things gathered about him, and crouched at his
feet, tame and silent, as he sang; and from the shadow
of the cave crept a wood-nymph, and lay upon the grass,
with her chin between her hands, looking up into his
face. For a time he did not see her, so silently had
but at last the power of her eyes drew his eyes upon
her, and he turned his head and looked at her. When he
saw her, his arm fell useless by his side and his voice
died away in his throat, for he had never looked upon
anyone so fair. Her hair was black as the
storm-cloud, but her eyes were blue as the summer sky,
and she lay like a white flower in the grass at his
feet. For a long moment he gazed into her face without
speaking, as she gazed back at him, and at last he
FROM THE SHADOW OF THE CAVE CREPT A WOOD-NYMPH, AND LAY UPON THE GRASS.
"Who art thou, maiden?" he asked.
"I am Eurydice," she answered.
"Thy hair is black as midnight, Eurydice," he said,
"and thine eyes are bright as the noonday."
"Are not midnight and noonday fair to thine eyes?" she
"They are fair indeed, but thou art fairer."
"Then I am well content," she said.
"I know not thy name nor thy face, Eurydice," said he,
"but my heart beats with thy heart as though we were
"When two hearts beat together, Orpheus, they are
strangers no more, whether they have known each other
all their days or have met as thou and I have met.
Long ago the fame of thee, and of thy singing, reached
mine ears, but I hardened my heart against thee, and
said, 'It is an idle rumour, and he is no better than
other men, before whose face I flee.' But now the gods
have brought thy steps to the hollow cave where I
dwell, and thou, by thy magic, has drawn me to thy
feet, so that I, who doubted thy power, must follow
thee whithersoever thou wilt."
"Shall I sing the a song, Eurydice—the song thou
hast sown in my heart?"
"Yes, sing me that song," she answered.
So he struck the chords of his lyre and sang her the
song that was born of her beauty. One by one the wild
creatures stole back to the forest, for that song was
not for them, and they two were left alone beneath the
spreading boughs of the beech-tree. As he sang,
Eurydice crept closer to him, till her head rested on
his knee and her long black hair fell in a cloud about
his feet. As she drew nearer his voice grew lower,
till it became a whisper in her ear. Then he laid his
lyre on the ground beside him and put his arms about
her, and their hearts spoke to each other in the tongue
that knows not sound nor words.
So it came to pass that Orpheus returned no more to
dwell with Cheiron and his companions in the hollow
cave below Pelion, but lived with Eurydice, his wife,
in her cave in the heart of the forest. But he never
forgot his boyhood's happy days, nor all that Cheiron
had done for him. He would come often to see him and
take counsel with him, and sing to the lads his magic
song. For a few short years he lived a life the gods
might envy, till the dark days came, when not even
music could bring comfort to his heart. For one day,
as he roamed with Eurydice through the dark forest, it
chanced that she unwittingly trod upon a snake, and the
creature turned upon her and pierced her white foot
with its venomous fang. Like liquid fire the poison
ran through her veins, and she lay faint and dying in
"O Eurydice," he cried, "Eurydice, open thine eyes and
come back to me!"
For a moment the agony of his voice awoke her to life.
"Orpheus," she said, "beloved, this side of the river
of death we can dwell together no more. But love, my
dear one, is stronger than death, and some day our love
shall prevail, never again to be conquered."
When she had spoken her head sank down upon his breast,
and her spirit fled away, to return no more. So he
bore the fair image of his wife in his arms, and laid
her in the depths of the cave that had been their home.
Above her head he placed a great pine torch, and all
the long night watches he sat with his arms about her
and his cheek against her cheek; and his heart groaned
within him with a grief too great for words. Ere the
day dawned he kissed for the last time the lips that
could speak to him never again, and laid back her head
on a pillow of leaves and moss. Then he pulled down
the earth and stones about the mouth of the cave, so
that no one could find the opening, and left for
evermore the home he had loved so well. Onward he
walked in the grey light of dawn, little caring where
he went, and struck the chords of his lyre to tell all
the earth of his grief. The trees and the flowers
bowed down their heads as they listened, the clouds of
heaven dropped tears upon the ground, and the whole
world mourned with him for the death of Eurydice his
"Oh, sleep no more, ye woods and forests!" he sang,
"sleep no more, but toss your arms in the sighing wind,
and bow your heads beneath the sky that weeps with
me. For Eurydice is dead. She is dead. No more shall
her white feet glance through the grass, nor the field
flowers shine in her hair. But, like last year's snow,
she is melted away, and my heart is desolate without
her. Oh! why may the dried grass grow green again, but
my love must be dead for ever? O ye woods and forests,
sleep no more, but awake and mourn with me. For
Eurydice is dead; she is dead, dead, dead!"
So he wandered, making his moan and wringing the hearts
of all who heard him, with the sorrow of his singing.
And when he could find no more comfort upon earth he
bethought him of the words of his wife:
"This side of the river of death we can dwell together
no more. But love, my dear one, is stronger than
death, and some day our love shall prevail, never again
to be conquered."
He pondered the words in his heart, and wondered what
she might mean.
"If love is stronger than death," he thought, "then my
love can win her back. If I can charm the hearts of
living things with the magic of my song, I may charm,
too, the souls of the dead and of their pitiless king,
so that he shall give me back Eurydice, my wife. I
will go down to the dark halls of Hades, and bring her
up to the fair earth once more."
When hope was thus born anew in his heart he grew brave
for any venture, and pressed forward on his way till he
came to the place men called the mouth of Hades.
Nothing daunted by the tales of horror they told him,
he entered the fearsome cave, which led deep down into
the bowels of the earth, where noisome vapours chocked
breath in his throat, and the dark forms crouched in
his path and fled shrieking before him, till at last he
stood by the shores of the ninefold Styx, that winds
about the realms of the dead. Then he shouted aloud to
Charon, the ferryman, to row him across in his boat.
When the old man heard his voice, he stopped midway
across the stream.
"Who is it that calls me in the voice of the living?"
"It is Orpheus," he answered. "I am come to fetch back
Eurydice, my wife."
But the old man laughed, and his laugh cut the heart of
Orpheus like a knife.
"O beardless innocent," he said, "who gave thee power
over life and death? I tell thee that many have stood
by the shores of this stream and entreated me to take
them across, that they might bring their dear ones back
with them. But no living soul shall sit in my boat,
nor shall the dead, who have sat in it once, ever
return to sit in it again. Go back to earth, young
man, and when thy time has come, thou too shalt sit in
my boat, never fear."
"That time has come, Charon," he said, "and I shall sit
in thy boat this day."
Raising his lyre, he struck the chords, and his love
taught him the tune and the words to sing. Steadfastly
he gazed at Charon, and the magic of his singing drew
the old man towards him as surely as though the rope of
the boat were in his hands. Without ceasing his song,
he took his place in the stern, and in time to the
music Charon dipped his oars in the stream, so that the
boat swung over the river as it had never swung before.
As it stranded in the shallow water, Orpheus leaped
lightly to the shore.
"Farewell for the present, Charon," he cried; "we shall
meet again ere long."
He hastened on his way, playing and singing his magic
song. Resting on his pole, the old man looked after
him with wonder in his heart, and shaded his eyes with
his hand. For a ray of the sun seemed to shine for a
moment in that cold grey land as Orpheus passed by.
The pale flowers of hell tossed their heads to and fro,
as though the west wind played through their leaves,
and their colour and their scent came back to them once
more. With a sigh, Charon breathed in the perfume from
the air, and tossed back the grey locks from his brow
and straightened his drooping shoulders.
"It is long since I smelt the fresh smell of the
earth," he muttered. "Who is this young god, who can
bring light to the darkness and life to the realms of
So till Orpheus passed out of sight and the sound of
his singing grew faint in the distance Charon stood
looking after him, and then with a sigh he sat down in
his boat and bent to his oars once more.
And Orpheus went on his way, with hope beating high in
his heart, till he came to the portals of the palace of
Death. On the threshold lay Cerberus, the three-headed
hound of hell, who night and day kept watch beside the
gate to see that no one passed in save those who had
died upon earth, and that those who had passed him once
should pass him never again. When he heard Orpheus
coming, he sprang to his feet and snarled and growled
and bared his sharp white fangs; but as the
strains of music grew clearer he sank silent to the
ground, and stretched his three great heads between his
paws. Orpheus, as he passed by, bent down and stroked
him, and the fierce beast licked his hands. So did he
enter into the gates of Death, and passed through the
shadowy halls, till he stood before the throne of
Pluto, the king. A dim and awful form did he sit,
wrapped about in darkness and mist, and on his right
hand sat Persephone, his wife, whom he stole from the
meadows of Sicily. When he saw Orpheus his eyes
gleamed like the gleam of cold steel, and he stretched
forth his gaunt right arm towards him.
"What dost thou here, Orpheus?" he asked.
"I am come to ask thee a boon, O king," he answered.
"There be many that ask me a boon," said Pluto, "but
none that receive it."
"Yet none have stood before thee in the flesh, as I do,
O king, to ask their boon."
"Because thou hast trespassed unlawfully on my domain,
dost thou think that I will grant thee thy boon?"
"Nay; but because my grief is so great that I have
dared what none have dared before me, I pray thee to
Without waiting for an answer, he struck his lyre and
sang to them the story of his life, and how he had
loved and lost Eurydice. The eyes of the pale queen
brightened when she heard him, and the colour came back
to her cheeks, as the song brought back to her mind the
days of her girlhood and the sunlit meadows of Sicily.
Then a great pity filled her heart for Eurydice, who
had left the green earth for ever, and might not
return, as she herself did, in the spring-time, living
only the dark winter months below. As Orpheus ceased
his song she laid her hand upon her husband's.
"My lord," she said, "grant his boon, I pray thee. He
is brave and true-hearted, and he sings as no man has
ever sung before."
But the stern king sat with his head upon his hand and
eyes cast down, deep in thought. At length he spoke,
and his voice was soft and kind.
"Orpheus," he said, "thou hast touched my heart with
thy singing. Yet it lies not with me to grant thee thy
"But if the queen, thy wife, may return to the earth in
the spring-time, may not Eurydice, too, come back at
thy command?" asked Orpheus.
"The ways of the gods are not the ways of mortals,
Orpheus; they walk by paths you may not tread. Yet,
though I have no power to give thee back Eurydice, thou
mayest win her thyself if thou hast the strength."
"How may that be?" cried Orpheus. "For the sake of
Eurydice I have strength for any venture."
"No strength of the flesh can win her, Orpheus, but the
strength of a faith unfaltering. I will send for her,
and when thou seest her stand within the hall, holding
out her hands towards thee, thou must harden thy heart,
and turn and flee before her by the way thou camest.
For the love of thee she will follow, and she will
entreat thee to look at her and give her thy hand over
the stony way. But thou must neither look at her nor
speak to her. One look, one word, will be thine
undoing, and she must vanish from thine eyes for ever.
The spell of thy song still
rests upon the guardians of my kingdom, and they will
let thee and thy wife pass by. But think not by word
nor deed to help her. Alone she passed from life to
death, and alone she must pass back from death to life.
Her love and thy faith can be the only bond between
you. Hast thou the strength for this?"
"My lord," cried Orpheus, " 'tis but a small thing
to ask for a love like mine."
"It will be harder than thou thinkest," the king
replied. "Nevertheless, I will call Eurydice."
He signed to a messenger to fetch her. In a few
moments he returned, and behind him came Eurydice from
the garden of Death. The dank dew hung heavy about
her, and she walked with her eyes upon the ground,
while her long black hair hid the paleness of her face.
Thus did she come into the centre of the hall, and, not
speaking or moving, Orpheus gazed upon her till she
raised her eyes and saw him. With a cry she sprang
"Orpheus!" she cried.
But, remembering the words of the king, he turned and
fled before her through the misty halls and out by the
great gate, where Cerberus lay tamed with his heads
between his paws. And he tried to shut his ears to her
pleading as they sped across the plain, but every word
that she said cut his heart like a stab, and more than
once he almost turned to answer her, so piteous was her
"Oh, Orpheus, what have I done? Why dost thou flee
from me? Oh, give me one word, one look, to say thou
lov'st me still."
But he remained firm in his resolve, and sat himself in
Charon's boat, and steeled his heart, whilst she sat
beside him, but could not touch him. For he was a
living soul, and she was a shade, and might not touch
him if she would. But still she pleaded with him.
"O Orpheus, my heart is starving for one look, one
word. I know thou lovest me, but oh! to see thine eyes
tell me so and hear thy lips say it."
He longed to turn and clasp her in his arms, and tell
her how he loved her better than life. But still he
refrained, and hugged his lyre close to his breast in
his agony; and as soon as the boat touched the shore he
leapt out and hastened up the steep, dark path, whilst
the sweat stood out in drops upon his brow, so hard was
the way and so stifling the air. Behind him followed
Eurydice, and if the way was hard for him, for her it
was ten times harder. She had no strength for words,
and only by her sobs did Orpheus know she was following
still. So they went on, till at length the air grew
pure and fresh, and the daylight shone before them at
the mouth of the cave. With eager steps Orpheus
pressed forward, longing for the moment when he might
clasp his wife in his arms and speak to her once more.
But as the way grew easier for him, it grew harder for
Eurydice; since no one may pass from death to life
without sore travail and pain. So she struggled and
stumbled after him, and her heart gave way within her
as she felt she could follow no farther.
"Orpheus!" she cried in her despair, "thy hand."
"ORPHEUS!" SHE CRIED IN HER DESPAIR, "THY HAND."
Ere reason could restrain him, his heart had answered
her sudden cry, and he turned and held out his arms to
help her. All too late he knew his folly. For even as
he was about to hold her she slipped away, and as smoke
borne away on the wings of the wind, so was she borne
away, helpless and lifeless, to the realms of the dead,
and her voice floated back like the echo of a dream.
"Farewell, Orpheus. Alas! Alas! farewell!"
So for the second time did he lose Eurydice; and if his
grief was great before, it was ten times greater now.
For as the cup of joy had touched his lips it had
slipped from his hand and broken, and he knew that the
chance the gods had given him once they would give him
never again, but that all his life long he must dwell
in loneliness without Eurydice his wife. Blindly he
went forward with his lyre beneath his arm. The
strings hung broken and lifeless, for the rocks and
thorns had torn them as he passed on his way up from
Hades. But he heeded not nor made any effort to mend
them, for the strings of his heart hung broken too, and
the music in his soul was dead. In black despair he
wandered on, and the sunshine to his eyes was darkness,
and the fair forms of earth were sadder than the
phantoms of Hades had seemed to him while hope still
beat in his breast. As a colt that has wandered far by
unknown paths returns at last surely to his homestead,
so did his feet carry him back to Pelion and the dear
home of his boyhood. Not till he stood in the path
which led up to the cave did he know where he had come;
but when he saw the mouth of the cave before him his
eyes were opened once more, and a faint joy stole into
his heart as he went on and sat down on a stone
outside. All was silent and deserted, and he sat for a
while alone with his own sad thoughts, till he felt a
touch upon his shoulder, and looked up into the face of
Cheiron standing beside him.
"Oh my master!" he cried.
"My son, thou hast suffered," said Cheiron.
"I have been down into Hades, Cheiron," he answered.
"My child," said Cheiron, "I know it all."
He gazed upon him, his great mild eyes full of pity,
and Orpheus gazed back at him, and knew that he
understood, though how he had learnt his tale he could
not tell. His heart drew comfort from the sympathy
that understood without words, and was softened as the
parched earth is softened by rain, so that he took
Cheiron's hands between his, and bowed his head upon
them, and wept.
Thus it came to pass that he returned to his boyhood's
home, and dwelt once more with Cheiron and his lads
beneath the shade of snow-capped Pelion. In time the
bitterness of his grief was purged away, and he
remembered Eurydice as something bright and fair that
had been woven into the web of his life while yet it
was young, and which could never be taken away. As he
listened again to the old songs which Cheiron had sung
to him and his comrades when they were lads, the fire
and the eagerness of his youth were born once more
within him. When he saw the elder ones go forth into
the world and little lads brought up to take their
place with Cheiron, he felt how life stands ever
beckoning and calling to those in whose veins the blood
of gods and heroes runs, and they go forth to rule and
to serve, to fight and to labour, in answer to the call
which the foolish do not hear. So one morning he took
his lyre, which for many a long day had lain silent,
and putting fresh strings for the ones that were
broken, he passed his fingers lovingly over them as of
the spirit of music sprang to life once more in his
heart, as the flowers spring to life when the winter is
past, so that once again he could charm every living
thing by the magic of his song.
When Cheiron knew that his power had come back to him
he was glad.
"Orpheus," he said, "thou hast conquered. A weaker man
than thou art would have lain crushed beneath the foot
of adversity. But those who bravely rise again are
stronger than before."
"Master," he said, "when I saw the broken strings of my
lyre and felt my voice choked within me, I said, 'With
the breaking of this string the music dies and becomes
a voiceless echo of the past, just as now Eurydice is a
shade in the shadowy land while her body is dust upon
earth,' and lo! ere the strings were mended or the
voice grew strong again, the soul of song lived once
more in my heart, as on the day when first my mother
Calliope breathed her spirit upon me. If music may
live without sound or words, may not the soul live
without bones and flesh? This is a mystery, and I must
seek the wide world for an answer."
And Cheiron smiled upon him.
"It is good to seek," said he, "though thou find no
answer in the end."
"Yet will I find an answer," said Orpheus.
So when the call of Jason came soon after, for him to
sail with the heroes in the good ship Argo for
the finding of the Golden Fleece, and to be their
minstrel on the stormy seas, he went down right gladly
to Iolchos. At the sound of his song the gallant ship
leapt over the
stones and into the sea like a charger ready for
battle, though before she had been too heavy to move.
So he sailed with the heroes on their perilous venture,
filling their hearts with courage and hope, and took
them safely through many a danger by the magic of his
song. But though many had set out, there were few that
returned, and he saw the wreck of many a promising life
on that terrible voyage, but found no answer for his
quest. He bowed his head in reverence to the memory of
those who, for the sake of adventure and honour and a
noble name, had poured forth their lives like water on
a thirsty soil, knowing full well when they set forth
that the danger would be for all, but the prize and the
dear home-coming for few.
So, as soon as might be, he set forth again to wander
the wide world alone with his lyre. Some say he went
to Egypt, others to Crete, but wherever he went he
found the great god Dionysos, the god of many
names—Bromios, Bacchos, Zagreus—who fills
men's minds with inspiration and divine madness, so
that they become one with him and with the life that
lives for ever behind the forms of things that die. He
ate of the flesh of the mystic bull, which is the god
himself, and to the sound of his lyre the Mænads
danced over the mountains and through untrodden woods,
and held to their breasts young lions, and cubs of the
untamed wolf. Far away from towns and cities, where
custom and language raise barriers between man and man,
on the breast of the untouched earth they danced their
mystic dance, and became one with Bacchos and with all
things that have life in the present, or have
lived in the past. There Orpheus found Eurydice again
in the communion of soul with soul, and learnt what she
had meant when she said, "Some day our love shall
prevail, never again to be conquered." So it came to
pass that he became the priest of Bacchos, the mystic
god, who is one with Life and Love. And he wrote upon
tablets the rule of life, by which, through purity and
initiation, men may become one with god, and when they
have been purified by birth and re-birth in many
diverse forms, they may win, because they are one with
him, the immortal life that changeth not, like the life
of the stars in heaven.
The tale goes of Orpheus that he at last came to Thrace
and the wild mountain lands that lie to the north of
Greece. There he tamed the fierce hill tribes with the
magic of his song, and lived a life of abstinence and
purity and ecstasy of the soul. But the followers of
Dionysos who dwelt in those parts looked on him
askance; for whereas they worshiped the god with
sheding of blood and rending of goats, in the madness
that is born of wine, the ecstasy of his worship was
born of music and beauty, and he would have no part nor
lot in their wild revels. And because there is no hate
that is greater than the hate of those who worship one
god in divers way, there came a day when the mad frenzy
of the Mænads was turned against Orpheus himself.
As he sat looking forth on the sunrise and singing as
he touched his lyre, the raving band came up behind
him, full of madness and of wine. And they tore him
limb from limb in their frenzy, as they had torn the
wild goats before, and cast his head into the Hebrus,
thinking to silence his singing for ever.
But his head floated on the waves of the eddying
stream, fair and fresh as in life, singing as it
floated its magic enchanting song. Gently the river
bore it along and down to the sea, and the blue sea
waves kissed it and passed it from one to the other,
till at last they cast it up, still singing, on the
shore of the Lesbian Isle. There the Muses came and
buried it, and made of its tomb a sacred shrine, where,
for many a long year, men came from far and wide to
worship and consult the oracle. About that shrine the
nightingales sang more sweetly than in any other spot
on earth, for they learnt their song from the lips of
Orpheus himself. And men bound themselves in a holy
brotherhood which they called by his name, and lived by
the rules he had written on his tablets. Some of those
who pretended to follow him were charlatans and rogues,
and brought dishonour and ridicule upon his name, while
others kept the letter without the spirit of his law;
but among them were those of a pure and blameless life,
who kept his doctrines, and handed them down from
generation to generation, till in time they became the
foundation-stones of the great philosophies of
Pythagoras and Plato.
Thus did Orpheus live and die, and pointed out to men
the path of immortality by purity and abstinence and
ecstasy of the soul. There were many of old who hated
his doctrine, and many who hate it now; and, indeed, it
is not one by which every man can live. But there are
those to whom it brings peace and joy, though they call
it by other names than his; and these are the Bacchoi,
the initiated, who have seen the inward light, and
their souls are at peace.
|
What is developmental delay?
Developmental delay is when a child does not reach his/her developmental milestones by a time or age that is expected. Developmental milestones are tasks most children learn or develop that commonly appear in certain age ranges. For example, head control, rolling, crawling, walking and talking.
Child development refers to the process of development and the achievement of certain developmental milestones. Abnormal delays in development, preventing a child from reaching these milestones refers to developmental delay. These may affect a child’s motor, speech and language and social skills. A child that has delay in all these areas is said to have global developmental delay.
Child milestones develop in an ordered fashion over time.Children develop at different rates and have different strengths and weaknesses which means that a diagnosis of developmental delay is often difficult unless a child’s development is substantially below their expected level.
Physiotherapy treatment will improve motor developmental milestones such as rolling, sitting, crawling and walking and physical development such as balance, coordination and mobility. Physiotherapy will also promote correct positioning, and provide fun and stimulating exercises to gain postural stability and coordination. Physiotherapy will also aim to increase physical development by helping children achieve their milestones as soon as possible.
What causes developmental delay?
Developmental delay may be caused by many reasons. Genetic and environmental factors have an increasing impact on a child’s development.
Children are at risk of acquiring developmental delay if they are born with a genetic or chromosomal abnormality such as Down’s Syndrome. This abnormal development may occur in the womb while the baby is still growing.
Developmental delay may also occur due to premature birth, genetic and heredity disorders, and exposure to infections either before or after birth.
Every child with developmental delay present differently. Some children may have delays in a particular area, such as walking while the rest of their skills may continue developing on time.
A parent may become concerned if their child’s physical, speech, or intellectual development seems slower in one or more areas than the average range of development occurring in most children.Diagnosis may be complex as many other conditions have similar symptoms. Many children for whom the reason for their developmental delay may not be established will be classed as undiagnosed developmental delay.
What are the signs of motor developmental delay?
Motor developmental delay affects a child's ability to use their muscles and may involve fine and/or gross motor skills.
Gross motor delays affect the large muscles in the arms, legs or trunk resulting in movement difficulties.
Fine motor delays affect the smaller muscles, commonly in the hands which causes problems with handwriting and the ability to grasp objects.
Some of the signs of a motor delay include:
- Achieving developmental milestones such as rolling, sitting, crawling and standing later than the predicted age
- Stiffness in the upper and/or lower limbs
- Reduced tone in the trunk compared with other children of a similar age
- Difficulty with handwriting
- Problem with tying shoelaces
- One side of body is used significantly more than the other
- Difficulty walking
- Very clumsy compared with other children of a similar age
Physiotherapy for developmental delay
Physiotherapy treatment should be started as early as possible as a child’s brain can adapt easily therefore they respond well to treatment. Physiotherapy will help a child’s ability to learn how to complete everyday tasks more effectively and will improve balance, walking, handwriting and general physical activities.
At Physio.co.uk we offer an early intervention when waiting lists are long and you are looking for treatment. Our specialist neurological physiotherapists at Physio.co.uk are experienced in treating babies and children with developmental delay and significant progress can be made. Physiotherapy treatment will focus on:
- Increasing muscle strength
- Stretching stiff joints
- Improving balance and coordination
- Promoting normal patterns of movement
- Achieving milestones
- Achieving maximum potential
- Improving quality of life
- Promoting independence with everyday tasks
- Exercises to increase muscle strength and control so that your child is able to shift their body weight and balance better
- Exercises to increase mobility and their success of learning to walk based around everyday activities Physiotherapy may involve exercise for the hand to improve writing and grasping objects
- Mirror imaging to increase your child’s awareness of where their limbs are in space at rest and during movement (proprioception)
- Muscle stretching to lengthen muscles, reduce contractures and increase range of movement
- Correcting and varying positioning to improve head and trunk control. For example, supporting your child in sitting to develop weight shifting, rotation, coordination and balance
- Exercises to increase quality of movement or teaching new ways of moving
- Advice about supportive devices such as using a wheelchair, orthotic devices or other adaptive equipment if necessary
- Hydrotherapy treatment helps relax stiff muscles and joints and maximises mobility in water
Our physiotherapists understand that each person with developmental delay has different difficulties so our specialised treatment is suited to your child’s needs.
Physiotherapy treatment will involve using a variety of exercises that are both fun and effective in a stimulating and safe environment. Physiotherapy treatment has the ability to help your child achieve their maximum potential and develop independence.
We also offer also home-based programmes for preschool children. Our dedicated physiotherapists at Physio.co.uk will involve parents in the treatment programme and provide support and advice on exercise that should be carried out between treatments. If you would like to book a full assessment call us now on 0330 088 7800, book online or alternatively request a free phone consultation.
|
An excerpt from the book, “After Suicide: Help for the Bereaved” by Dr Sheila Clark
Allow yourself a fifteen to twenty minute grief period every day. Make sure you can be alone and have put on the answering machine so you won’t be disturbed. This time acts as a safety valve. In it you can deal with any emotions that you have stored up.
You may wish to use different ways of grieving at these times: thinking, crying, praying, meditating, writing or drawing.
You may like to keep a diary. Write down your feelings, your grief and the memories of your loved one. You will then notice how your grief changes over a period of weeks and months. This will be proof to you of your progress. Keep the diary in a safe place; the memories you have written down about your loved one will be precious for you in the future.
Alternatively, you may feel more comfortable with pictures or diagrams.
Many people find crying a relief. Rather than being an indication of weakness, tears are often a sign of strength and show that you are prepared to work through your grief. Some people find it difficult to cry, and yearn for tears to release their grief.
The process can seem long and lonely, so find someone whom you can confide in, for example, a relative or friend.
If you have difficulty finding someone suitable, your doctor or local community health centre may be able to help in this way, or refer you on to a specialist grief counsellor. Some people find the experience of someone else who has been through a similar situation invaluable.
|
Why dirt and microbes are good for your child.
With the development of antibiotics, vaccines, and sterilization techniques, the world has seen a sharp decline in the spread of infectious diseases. However, Finlay (Microbiology/Univ. of British Columbia) and Arrieta provide ample evidence showing that our world of prescription antibiotics, antibacterial soaps, and hand sanitizers—all used to combat disease and encourage hypercleanliness—are also contributing to a steady increase in “diabetes, allergies, asthma, inflammatory bowel diseases (IBD), autoimmune diseases, autism, certain types of cancer, and even obesity.” Beginning with pregnancy, the authors discuss the pros and cons of antibiotic use by mothers and how they change their microbial environment and can cause asthma, eczema, and hay fever in infants. Vaginal births deliver a multitude of beneficial microbes to the infant, and the authors suggest those who need caesarean sections consider a technique called “seeding,” wherein the mother’s vagina is swabbed to collect secretions that are wiped on the baby, the mother’s chest, and nipples. This provides the infant with important beneficial microbes necessary for development after the near-sterile environment of the womb. Breast milk comes with its own set of microbes beneficial to the infant, helping the intestines mature sufficiently to handle the next stage of development: the introduction of solid foods. The authors discuss the advantages of having pets and the need for exposure to the wild outdoors. They give special attention to the links between antibiotics and the increase in obesity, diabetes, and inflammatory bowel diseases—in children and in adults. Short do's and don’ts lists help solidify the information. Overall, claim the authors, parents must be less hypervigilant about fighting bacteria, as many types of them are actually necessary for our children to be vigorous and strong.
Solid, easily assimilated evidence showing how microbes are an integral part of a child’s healthy life.
|
Feminist Applepieville: architecture as social reform in Charlotte Perkins Gilman's fiction
Metadata[+] Show full item record
Charlotte Perkins Gilman used her fiction to supplement, or "flesh-out," her theories on the necessity for women's economic independence and emancipation from household work. Women's place, she believed, was alongside men in making society peaceful, productive, and egalitarian. All domestic work would thereon be performed as a professionalized, commercialized service. This move would give both dignity to these laborious chores, and provide incomes for women who were previously dependent on their male family members. The redesign of the home and neighborhood was of primary importance in realizing this societal transformation. Thoughtful architecture and urban planning would create not only the stage for this new society, but the society itself.
|
A more perfect union
By Michael E.C. Gery
Humorist Roy Blount Jr. recently suggested that we elect our public officials by lottery, because "then we wouldn't attract the kinds of people who run for office these days." It's another expression of how bitter Americans are about our government.
What happened to make us feel this way?
We have a pretty good track record. We set up a system of self-government so that "we the people of the United States" could "form a more perfect union, establish justice, insure domestic tranquility, provide for the common defense, promote the general welfare, and secure the blessings of liberty to ourselves and our posterity." And we've done that for a good 225 years.
We set in stone certain rights for everyone: the freedom to speak, assemble, broadcast, practice religion, petition the government, arm a militia; rights to a fair trial, protection from unwarranted search and seizure, from cruel punishment, from self-incrimination; the right to equal treatment under the law. We welcomed immigrants — our ancestors — to come here, become citizens and enjoy these rights, too.
And along the way we tried making the union more perfect when we knew it needed improvement, in order that, as President Abraham Lincoln said, "government of the people, by the people, for the people, shall not perish from the earth." We prohibited slavery. We placed limits on the size, control and practices of business. We made sure women had the same rights as men. We helped stop tyrants around the world from abusing and killing their own people.
Eighty years ago, when the nation's economy collapsed, we pulled ourselves out of a Great Depression, not by giving money to business interests that failed, but by putting ourselves to work making roads, bridges, dams, armories, national parks, photographs and literature, farm communities. We established the Social Security system to provide working people with pensions and disabled people with a safety net. We protected bank deposits. We sent aid to communities after natural disasters. We loaned money to rural communities to help them bring electricity to their homes and businesses.
Fifty years ago we began taking steps to end racial discrimination, secure voting rights for everyone, end pollution of our air and water, ensure the health and safety of our workplaces. We sent young volunteers to poor communities here in America and around the world to show them we are good-hearted people who help others. We set up federal agencies to support scientific and technological innovation, arts, humanities, weather and atmospheric study, disease control, communication technology, and the safety of air travel, highway travel, mines, food, drugs, and consumer products. We established the Medicare and Medicaid health care systems for elderly and poor people who can't pay the costs of private insurance and medical care.
Today we're still working at it. We're fixing what broke and making improvements so that our children can learn more, so we all can live and travel safely, earn a living, appreciate nature, seek medical treatment, ensure freedom and justice for all, and pay our fair share for all of this. Let's stop pointing the finger and laying blame. Let's start productive discussion and get on with the work of making a more perfect union.
|
It can be gravely frustrating when you do not understand something. You may want to give up, you may be fed up, you may say to yourself this just is not be for me, BUT DON’T! You can always figure it out! If you find yourself getting very frustrated take a break for a few minutes, get some food, take your mind off of what you are doing for just 10 minutes. By taking that break your mind can reset and recover from intense frustration. That 10-minute break may be what your brain needs to think about that problem in different way so that you can solve it. When it is a concept you just do not get, and reading the book and going over practice problems has not worked, ask someone for some help. That is probably the best advice I can give, to not be too proud to ask for help! When you ask for help, your friend/parent/tutor may be able to explain the concept in a different way than your teacher can and that might just be what sets that light bulb off inside your head! Just remember, its ok to ask for help, we all need help at one point or another!
|
Euphorbia leucodendron is called by several common names, including cat tails euphorbia, stick bush and pencil tree. That’s because of its upright, succulent branches, which make it resemble a small tree. You must grow Euphorbia leucodendron as a houseplant or an annual, except in U.S. Department of Agriculture plant hardiness zones 10 and 11, where it can live in the landscape. It is very sensitive to frost.
A spineless succulent, Euphorbia leucodendron puts out narrow, jointed stems that rise vertically, then outwards, to form a shrub. It reaches 4 to 6 feet tall and 3 to 4 feet wide in warm climates. In summer, the light-green foliage is topped with small, chartreuse cups holding tiny flowers. These are followed by small, red fruit. The stems of Euphorbia leucodendron bear tiny, brown scars where leaves have dropped.
Soil that has excellent drainage is best for Euphorbia leucodendron, so it is a good choice for containers in full sun. If planted in the ground, it prefers sandy loam. It doesn’t need much watering, and does fine in hot weather with a monthly soak. Soak potted plants more often. Euphorbia leucodendron also is deer resistant. Move the plant indoors as cooler weather approaches.
As a houseplant, Euphorbia leucodendron needs direct sun, so place it in a south- or west-facing window. Outdoors, it makes a strong vertical accent when mixed with other succulents in a container planting. In USDA zones 10 and 11, it can be planted as an evergreen, succulent hedge.
Like most euphorbias, Euphorbia leucodendron bleeds a sticky, white sap when cut. The sap can irritate skin and cause eye damage, and it may be toxic if eaten by animals or humans. Wear gloves and goggles when you prune or weed around the plant, and protect children and pets from encounters with it.
|
- Virtual and Augmented Reality
With Virtual and Augmented Reality, the world seems to encounter a new way of interaction with each other. VR and AR will soon open the gates for the flow of information. It leads to a development of new apps, mobile applications and software’s which will support it. Rooms will soon become live with all the other things, and digital connection is seen.
- Digital Twin
Digital Twin is software based on a physical thing/system. It consists of various sensors that understand, adjusts, improvises and gives you the result; it is called as an artificial intelligence system. It combines a lot of data to give the user an improvised and better form of the input. Soon, this technology will be used by individual, companies and professionals to make the world a better place.
- Blockchain and Distributed Ledgers
Blockchain is a sort of digital ledger system in which the transaction is recorded using hashing and encryption techniques. It provides security and is helpful to trace the transactions. This system tends to change the working model of the organization and try to make it a better and reliable system.
- Conversational System
This system is mainly designed to focus on chat bots controlled voice devices. The mesh through which the humans are connected soon moved from desktops screens to virtual reality. It seems to shorter the boundary between beings, and a greater interaction is observed between the user and the device.
- Intelligent Apps
These Apps makes the human’s life better and faster. VPA’s or virtual personal assistant acts just like a regular assistant the only difference is that it is always with you, at your hand’s reach and doesn’t cost you anything. It guides you, and from keeping you up with your schedule to booking a table for dinner, it handles all your work and helps you lead a healthy life by releasing all your stress.
- AI and Machine Learning
It stands for Artificial Intelligence. AI and Machine Learning are the combination of many learning techniques which includes neutral networks, NLP, etc. These systems adopt the new method and bids farewell to the old algorithm. It is what makes a system smarter and intelligent. AI gives rise to many applications and software. It even increases the possibility of having cars in the future with self-driving and self-decision-making capabilities.
- Intelligent Things
It refers to things in the physical reality going beyond programming to explore the changes due to AI and Applied Machine Learning to deliver life turning technology and interact openly with the surrounding and humans. These things include drones, smartphones, self-controlled vehicles, etc. it is the future of innovation and gives a different picture to Earth.
- Digital Technology Platforms
It is the blocks through which a digital business is put together in today’s scenario. The five keys of establishing a successful digital business are
- Having a system that could handle such huge and enormous information
- Providing a better experience for users
- Internet of Things and its services
- The working environment of business
- Analyzing and handling the business intelligently
- Adaptive Security Architecture
It is all about creating a better and advanced security system that is almost impossible to crack. It is designed not only provide security but also adapts itself for a present as well as future. It prevents our data from being in the hands of hackers and other non-authenticate users.
- Service Architecture
The architecture through which our system is build is also changing with the change in the way our technology is changing. It is more advanced, reliable and composite than what it used to be one decade earlier. The data transfer rate increases with a minimal loss of data during transmission.
|
to Tie a Kelvin Knot
for Tying a Kelvin Knot
instructions for tying a Kelvin knot are shown below. We assume that
you are right-handed in the following instructions. The figures below
are mirror images. They are what you will see if you stand in front
of a mirror.
At the beginning, the wide end of the tie should be on your right
side and the other end should be on your left side. Note that the tie
should begin inside out.
Cross the narrow end over the other end. Now three regions are formed
(Left, Right and Center).
Bring the wide end over from the Left region to the Right region.
Bring the wide end under the knot from Right to Left.
Bring the wide end over the knot to Right.
Bring the wide end under the narrow part of the tie from Right to
Bring the wide end down and pass the loop in front. Ensure that the
knot is tightened.
Use one hand to pull the narrow end down gently and use the other
hand to move the knot up until it reaches the center of the collar.
What Do You Want to Do Next?
Want to Help Us?
|
As a parent or guardian, you are your child’s first and most important teacher. One important point to remember – a child learns more in the first 3 years of life, than at any other time. Every moment of every day is a learning experience.
Louisiana’s Birth to Five Early Learning & Development Standards (ELDS)
Inclusive Services for Special Needs Children
Milestones develop in a sequential fashion so this means that a child will need to develop some skills before he or she can develop new skills. Each milestone that a child acquires builds on the last milestone developed. To find out more information about age-appropriate developmental milestones click on a specific age below.
- First 6 Weeks
- 1½ to 3 Months
- 3 to 6 Months
- 6 to 9 Months
- 9 to 12 Months
- 1 to 2 Years
- 2 to 3 Years
- 3 to 5 Years
- 5 to 7 Years
Early Childhood Resources
NAEYC for Families – the world’s largest organization working on behalf of young children
Quality Start Child Care Rating System: A Louisiana Initiative
|
This year hydraulic fracturing, or fracking, made its debut in headlines across America. Even though fracking has occurred for decades, the expansion of the practice and the understanding of public health impacts have only recently come to light to the general public.
Fracking is the practice of extracting gas and oil from deep in the bowels of the earth by pumping in large volumes of pressurized water mixed with a concoction of toxic chemicals. The laundry list of chemicals that can be used is frightening:
Here's a video that shows how these toxic chemicals work their way into our environment, including our drinking water and air.
Reserves of oil and gas that were once thought to be too deep and difficult to be worth tapping into are now being drained through fracking. Even urban communities like Los Angeles and Long Beach are at risk.
While some praise fracking as a solution to satisfying our ever increasing appetite for fossil fuel and a way to wean our nation off of foreign energy, the serious health and environmental impacts are only beginning to be realized. And because of industry-friendly legal loopholes, we may never know how much exposure to toxic chemicals we are being subjected to since fracking companies are not required to disclose what chemicals they are using, nor where they are fracking.
Some communities around the nation are wising up to the problems of fracking as they trace the source of public health crises back to exposure to fracking chemicals that worked their way into water. Currently, a number of states are considering bans and restrictions, while others have already succeeded.
Sacramento lawmakers have a chance to make a smart choice for the health of all Californians by mandating the disclosure of basic information around fracking practices. Assembly Bill 591would specifically make companies disclose the chemicals they use, the amount of water they’re pumping, and where they are fracking.
New for the 2016 legislative session: The 43rd annual California Environmental Scorecard rates elected officials on 2016, another successful year for the environment in spite of heavy opposition from polluting industry.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.