text
stringlengths 124
652k
|
---|
Chapter 14
The Map
--Genesis 1.2
The world map is a three-dimensional grid of turfs. Three coordinates (that is, numbers) are necessary to pinpoint the location of an individual turf in the grid. These have the symbolic names x, y, and z.
The x coordinate specifies east-west positioning. A value of 1 is the western edge of the world and a value of world.maxx is the eastern edge. On the player's screen, x increases from left to right. The y coordinate goes from 1 in the south to world.maxy in the north and normally increases from the bottom to the top of the screen.
The z coordinate goes from 1 to world.maxz and often represents high to low altitude. However, the interpretation of z is entirely up to your code since there are no built-in procedures that move objects between z-levels. Level 1 could be ground level and subsequent levels could descend into the earth. Or level 1 could be a world map and the other levels could be detailed city maps. It's entirely up to you. Most action takes place in the x-y plane because that is what players can see.
1. Spatial Instructions
There are a number of instructions for working with coordinates and objects on the map. When you want to produce some sort of spatial effect, these are the building blocks you will need.
1.1 view list
The view instruction returns a list of all visible objects. It is often used without any arguments, but may take a range and center object as parameters.
view (Range=world.view,Center=usr)
Range is the maximum distance to look.
Center is the central object in the view.
Returns a list of visible objects.
The default view range may be adjusting by setting world.view. The default is 5, which gives you an 11x11 viewport. However, you can increase it up to a maximum of 10, which gives you a 21x21 viewport. (The size of icons may be automatically scaled in order to conveniently fit the map viewport on the player's screen.)
As a convenience, the arguments may be specified in any order. This feature is most often used when one wishes to specify a different center of view while still using the default range. For example, if you wanted src rather than usr as the center, you could write view(src) rather than view(5,src) or even view(,src).
The range of -1 includes the center object and its contents. A range of 0 adds the center object's turf or room and any other objects inside it. A range of 1 extends to the region on the map one square away from the center (in a diagonal or straight direction). A range of 2 includes the next line of turfs and so on. The default range of 5 includes the entire 11x11 map seen by the player.
Figure 14.24: Viewing Range
2 2 2 2 2
2 1 1 1 2
2 1 0 1 2
2 1 1 1 2
2 2 2 2 2
Portions of the view may be blocked by opaque objects. Lighting also plays a role. If the background area lighting is on (area.luminosity = 1), all objects inside are illuminated. Otherwise, individual turfs or objects on the map may be luminous, lighting up themselves and the objects around them. If nothing is lit up, only the objects immediately around the center (up to a distance of 1) are visible.
The way in which opaque objects affect the view is rather complicated. Roughly speaking, opaque objects block the view of anything behind them. To improve the appearance of the view, any opaque objects on the edge of this strictly visible region are also made visible. This is known as boundary highlighting and often yields a much improved effect.
1.2 oview list
The oview instruction is the same as view except it excludes the center object and its contents. In other words, it excludes the objects in view(-1). This is most often useful when broadcasting a message to everyone in view except the perpetrator of some action.
1.2.1 Point of View
When describing events in the game to players, one may stick strictly to third person or use a mixture of second and third person. For example, when a player smiles, everyone could see the text "[usr] smiles", or everyone but the player could see that and the player could instead see "You smile".
The advantage of a strict third person point of view is simplicity. It tends to have the feel of a story in which the player's mob is one of the characters. A second person point of view, on the other hand, is less like a story and more like a play in which the player is actively taking one of the roles. It's up to you which effect you want.
Strict 3rd person output can simply be generated by broadcasting to all in view(). A second person point of view would instead use oview(). The following examples contrast the two methods.
//3rd person description
view() << "[usr] smiles."
//2nd person description
usr << "You smile."
oview() << "[usr] smiles."
Commonly, actions involve three groups of people: one who performs an action, another who is acted upon, and everyone else. In a second person system, the first two people would get a specially tailored second person description and everyone else would get a third person description.
The following example demonstrates how this could be achieved.
mob/verb/smile(M as mob|null)
if(!M) //no target mob specified
usr << "You smile."
oview() << "[usr] smiles."
usr << "You smile at [M]."
M << "[usr] smiles at you."
oview() - M << "[usr] smiles at [M]."
Recall that the - operator produces a list with the specified item removed. If that was not used in this example, the mob being smiled at would see the third person description as well.
1.3 range and orange instructions
The range instruction is exactly like view except it ignores visibility. All objects within the specified range are included in the list whether they are visible or not.
Similarly, the orange instruction behaves like oview except it also ignores visibility. It returns the same list as range minus the central object and its contents.
(In case you use it in conversation (I do all the time) it is pronounced `oh-range' and not `orange' like the color. Still, it might be useful to poets in search of a rhyme. Her hair was orange\ And she was in my oh-range...)
range (Range=world.view,Center=usr)
orange (Range=world.view,Center=usr)
Range is the maximum distance to look.
Center is the central object in the view.
Returns a list of objects within range.
1.4 locate instruction
The locate instruction is used to get the reference of an object by specifying some unique property of the object. In the case of turfs, the map coordinates may be given. The object type, tag name, and \ref value may also be used to identify the desired object.
locate (x,y,z)
locate (Type) in Container
locate (Tag) in Container
x,y,z are turf coordinates.
Type is the object type.
Tag is a unique text string identifier.
Container is the optional location or list.
Returns the object or null if none.
Using locate() one could place new players on the map at a specific coordinate. The following example moves them to the middle of the map rather than the default position at (1,1,1).
if(!loc) //new player
loc = locate(world.maxx/2,world.maxy/2,1)
This is just one of many cases in which locate() is used to access an object in the code that was created on the map using the map editor. Rather than specify a coordinate, it is usually more convenient to use the tag variable of the object. This can be assigned to a special value and used to find the object at run-time.
The following example moves new players to a specially tagged location.
loc = locate("start")
A turf would have to be tagged "start" for this to work. Editing the tag variable, as well as other properties of objects, in the map editor will be discussed in section 14.3.
1.5 block instruction
The block instruction generates a list of all turfs in a rectangular section on the map.
block (SW,NE)
SW is the south-west turf.
NE is the north-east turf.
Returns a list of turfs in the block.
The following example uses this to find a particular turf in a region of the map.
var/SW = locate(1,1,zLevel)
var/NE = locate(world.maxx,world.maxy,zLevel)
return locate(Type) in block(SW,NE)
This procedure could be used to connect z-levels of the map. If each level had one up-stairs and one down-stairs turf, these could be connected in the following manner.
var/dest = LocateInLevel(/turf/upstairs,z+1)
var/dest = LocateInLevel(/turf/downstairs,z-1)
There are many other ways of making turfs which transport the user from one location to another. The destination could be in some fixed position relative to the original turf (for example z+1 or z-1). Another useful method is to mark the destination with a special tag.
1.6 get_dist instruction
The get_dist instruction determines the distance between two locations. The distance is the same as the range parameter to view(). If the objects are in the same place, it is 0. If they are in neighboring positions, it is 1, and so on. (Note that get_dist does not compute the geometric Euclidean distance. It treats diagonal movements as equal to straight ones.)
get_dist (Loc1,Loc2)
Loc1 is the first location.
Loc2 is the second location.
Returns the separating distance.
This could be used to determine if the target of an action is within range as in the following example.
if(get_dist(src,enemy) > 1) return
//do the damage...
In this case, mobs can only strike targets in neighboring positions. The details of the rest of the procedure have been omitted. A typical combat system requires some randomness, which you will see how to do in chapter 16.
2. Movement
There are a number of instructions relating to movement of objects on the map. They are listed in figure 14.25.
Figure 14.25: Movement Instructions
The three main groups are walk, step, and get_step. These each perform the same computation but differ in how they apply the result. The walk instructions continually move an object, taking multiple steps if necessary. The step instructions do the same except only a single step is taken. The get_step instructions do not move any objects, but return the next location that would be stepped to according to the given walking algorithm.
Which group of movement instructions you would want to use depends on how much control you need to take over the process of moving an object. The walk group of instructions completely automates the movement, whereas step allows you to control the timing yourself. For complete control, you can use get_step so that even the decision about whether to move the object or not is left up to you.
The available walking algorithms are described in the following sections. When a ready-made algorithm does not exist to suit your purpose, you may still be able to use one of these in conjunction with your own additions.
2.1 walk instruction
The walk, step, and get_step instructions are for movement in a fixed direction.
walk (Obj,Dir,Lag=0)
step (Obj,Dir)
get_step (Obj,Dir)
Obj is the object to move.
Dir is the direction to move.
Lag is the delay between steps in 10$^th$s of seconds.
The direction argument takes one of the constants NORTH, SOUTH, EAST, WEST, NORTHEAST, NORTHWEST, SOUTHEAST, or SOUTHWEST. These are the same values used to indicate the direction an object is facing with the dir variable.
The step instruction returns 1 on success and 0 on failure and get_step returns the next turf in the given direction. The walk instruction returns immediately and continues to operate in the background since it sleeps before each step.
Only one walking operation may be in effect at one time on a particular object. That means that when walk is invoked, any previous walking operation on that object is aborted. To clear any existing walking operations, one can therefore specify no direction at all: walk(Obj,0).
There are a couple of related instructions for dealing with directions. These are described next.
2.1.1 get_dir instruction
The get_dir instruction computes the direction from one location to another. If the true direction is not exactly equal to one of the eight standard directions (NORTH, SOUTH, and so on), the closest one will be chosen.
get_dir (Loc1,Loc2)
Loc1 is the first location.
Loc2 is the second location.
Returns the direction from Loc1 to Loc2.
2.1.2 turn instruction
The turn instruction rotates a direction by the specified amount.
turn (Dir,Angle)
Dir is the initial direction.
Angle is the angle to rotate.
Returns the new direction.
The angle is specified in degrees. For example, turn(NORTH,90) yields WEST, a 90 degrees rotation in the counter-clockwise direction. Negative angles may be specified to achieve clockwise rotations as well.
The following example defines a guard mob who paces back and forth continuously.
spawn for() //spawn an infinite loop
if(!step(src,dir)) dir = turn(dir,180)
sleep(30) //three seconds
By changing the initial direction the guard is facing, he can be made to pace in the desired line. This example shows how you can use the existing walking algorithms for your own purpose--in this case a linear pacing algorithm. Rotating by 90 degrees or 45 degrees instead would produce motion in two dimensions instead of just one. Of course then the guard might wander off and neglect his duties!
2.2 walk_towards
The walk_towards, step_towards, and get_step_towards instructions move in the direction of another object. If the target object changes position, the walking algorithm automatically adjusts the direction of motion accordingly.
walk_towards (Obj,Targ,Lag=0)
step_towards (Obj,Targ)
get_step_towards (Obj,Targ)
Obj is the object to be moved.
Targ is the destination.
The return values of these are the same as the fixed-direction movement instructions that have already been described. In fact, all movement instructions behave the same except for the specific stepping algorithm that is employed.
2.3 walk_to instruction
The walk_to, step_to, and get_step_to instructions move to another target object, taking intervening objects into account and attempting to intelligently maneuver around them if possible. If the target is too far away (more than the width of the map view), no action is taken.
walk_to (Obj,Targ,Dist=0,Lag=0)
step_to (Obj,Targ,Dist=0)
get_step_to (Obj,Targ,Dist=0)
Obj is the object to be moved.
Targ is the destination.
Dist is the maximum desired distance.
One use for this would be a verb that allows a player to automatically follow another one. That can save a lot of needless key presses, which may otherwise bog down the network. Note that the command takes the player's current distance from the target as the desired range to maintain so that one can avoid crowding in on the leader.
As a convenience in situations like this, pressing any direction key will stop the automated walking algorithm. This applies even to the center key, which merely calls walk(src,0) by default, allowing the player to stop in place.
2.4 walk_away instruction
The walk_away, step_away, and get_step_away instructions move to another target object, taking intervening objects into account and attempting to intelligently maneuver around them if possible.
walk_away (Obj,Targ,Dist=world.view,Lag=0)
step_away (Obj,Targ,Dist=world.view)
get_step_away (Obj,Targ,Dist=world.view)
Obj is the object to be moved.
Targ is the destination.
Dist is the minimum desired distance.
An example using this algorithm is a command to run away from someone.
2.5 walk_rand instruction
The walk_rand, step_rand, and get_step_rand instructions generate seemingly random motion. The object being moved appears to wander aimlessly. That is different from wandering mindlessly, which would be the result of random movement. In fact, this algorithm is not very random but instead uses a technique known as edge following to create the effect of purposeful motion.
walk_rand (Obj,Lag=0)
step_rand (Obj)
get_step_rand (Obj)
Obj is the object to be moved.
The following example uses this walking algorithm to make certain mobs meander through the world.
if(wander) walk_rand(src)
All you have to do to see this in action is define some mobs with the wander variable initialized to 1. The algorithm works best with some edges to follow, so a maze-like map with many tunnels and rooms with walls is ideal.
3. Programming for Map Design
In the simplest scenario, designing the world map is merely a matter of selecting object types which were defined in the code and dropping them onto the map. The individual objects on the map are called instances of the object types and as a group are referred to as the initial map population.
Depending on your preference, it is possible to do little or all of the map design from the code. By creating turfs and other objects with new() part or all of the map could be generated at run-time. Since this is a rather cumbersome method, it is usually reserved for cases where the map is laid out according to some algorithm. For example, a maze-like map could be randomly generated so that it is different each time it is played.
Map generating algorithms are an interesting topic, but the techniques involved are fairly abstract and rely very little on the particulars of the DM language. For an example, refer to the DM Code Library. One of the useful items to be found there is the "Amazing Maze Generator," which can make seemingly infinite dungeons and the like.
In most situations, map design is done principally in the map editor. It is even possible to go beyond simply using pre-defined object types. Using the map editor's instance editing feature, you can modify individual objects to suit your own purposes. This allows one to avoid cluttering up the code with object types which are really just minor variations of a more general type but which are required to make instances on the map.
Using the map editor to its fullest potential, one can write code which is fairly general and independent of the map. This is especially convenient when the programmer and map designer are different people. In fact, the code can be written once and used to design many different maps. This process is referred to as writing a world code base which is then used to create an endless variety of world instances. These could be networked together using techniques described in section 12.6.
The map instance editor allows one to modify the object's variables. For example, you can change the name of an object, its icon, its density, and so forth. There is no limitation to built-in variables; those defined in the code may also be modified. In this case you may wish to specify what sort of value may be given to the variable. This prevents mistakes and also helps inform the map designer about a variable without requiring the poor fellow to read the code.
3.1 Variable Input Parameters
Object variables may be declared in much the same way as verb arguments to provide extra information to the map editor. Both the input type and a list of possible values may be specified. Otherwise a variable simply defaults to accept any type of value.
var/VarName as Type in List
VarName is the variable being defined.
Type is the input type.
List is the list of possible values.
The valid input types include all those which may be used in a verb argument definition. These are described in section 4.5.1. The list of possible values can be a list of constants or a range of integers. The following example demonstrates both possibilities.
wealth as num
strength in 1 to 100 //defaults to "as num"
alignment in list("good","bad","neutral")
background as text
Figure 14.26: Hands-free programming!
Dream Maker's instance editor is a powerful tool, if used appropriately. It can allow you to quickly make unique entities without having to derive new classes for everything. It is also quite simple to use, requiring no other coding knowledge than the ability to fill out forms. Consider the previous code:
wealth as num
strength in 1 to 100
background as text
Now suppose you have derived a monster type from this, say, /mob/goblin. Using the instance editor, you can place a bunch of unique goblins on the map without having to modify the DM code one bit:
1. Select the goblin type in the tree.
2. Click on the Edit button in the adjacent panel. This will bring up a dialog with the properties of the goblin.
3. Modify these properties by changing the values in the form. If you enter invalid values, the editor will correct you. It does this by looking at the specified filters. For instance, the strength property must be a value between 1 and 100. If it is not in this range, it must be reset. In this fashion, you can change names, descriptions, icons, and so on. You can make a horde of goblins, each with unique identifications and traits.
4. One particular useful property is the tag. This is just a text string that can be used to distinguish instances in the locate() instruction. So if you want to make a "chief goblin" without deriving a new type, you might want to set the tag to "chief goblin" and set the other properties accordingly. You can then locate this goblin later on by doing locate("chief goblin").
5. After you are done editing the goblins, place them on the map by selecting the corresponding instance in the panel (they will be sorted by tag). If you want to re-edit them later, you can use the Look option and proceed from there. |
CN Mobile Logo
Search form
The information contained within the paper is comprehensive but somewhat oversimplified. This is because contemporary surgical technology has surpassed the ability to succinctly describe the myriad varieties of procedures in current use by head and neck surgical oncologists. The reader needs to be aware that certain terms, such as hemilaryngectomy and supraglottic laryngectomy, are now used to collectively characterize numerous procedures that are each distinctly different and can potentially have either a beneficial or an adverse impact on patients' ultimate speech and swallowing functions.
For example, the authors state that when a significant part of the tongue base is removed, the patient may never be able to relearn to swallow, requiring conversion of the surgical procedure to a total laryngectomy. In fact, recent reconstructive developments using tissue transfer techniques seem to avoid the necessity of total laryngectomy with resection of the tongue base.
The information presented by the authors on the apparent benefits of range of motion (ROM) exercises is intriguing. However, it is unclear whether patients who did and did not receive instruction in ROM exercises had similar-stage disease, underwent similar antitumor treatments, and had similar comorbid factors, or whether they were ultimately randomized to treatment groups. Although this is a simple statement to make, undertaking a controlled study in patients with head and neck cancer is a difficult task. However, there is no question that all of these factors can adversely affect the ability to effectively rehabilitate the patient.
In addition, head and neck cancer patients tend to be noncompliant,[1-3] and it is difficult to imagine sustaining adherence to an ROM exercise program in this patient population. These comments are made not as a criticism of the data presented in this article, but rather, as a statement of reality that addresses the importance of close communication among health-care professionals involved in treating this complex patient population.
The authors make the strong statement that all head and neck cancer patients "should be evaluated" following treatment. In these times of cost containment, it is critically important that all health-care professionals recognize the importance of focused utilization of consultants and technologies directed by the head and neck surgical oncologist. Once again, that is why this area requires close communication among health-care professionals to coordinate the appropriate utilization of these services.
In my opinion, it is essential that the head and neck surgical oncologist be the leader of this effort because of the surgeon's intimate knowledge of the patient's overall health status and stage of disease, but especially because of his or her knowledge of precisely what was accomplished at the time of surgery in terms of the amount of tissue resected and the reconstructive techniques utilized. The numerous modifications of standardized surgical techniques now available necessitate an interactive communication network. Hopefully, this will maximize the efficiency of other health-care professionals to optimize the results of their efforts. I have personally experienced numerous examples of the inappropriate involvement of speech and swallowing therapists by health-care professionals who were not even knowledgeable about the patient's disease or specific surgical or nonsurgical treatment he or she had received.
In summary, Dr. Logemann and her co-workers should be congratulated on an excellent paper. Head and neck cancer patients will certainly benefit from their continued research addressing critically important rehabilitation issues in this patient population.
1. Laramore GE, Scott CB, Al-Sarraf M, et al: Adjuvant chemotherapy for resectable squamous cell carcinomas of the head and neck: Report on Intergroup study 0032. Int J Radiat Oncol Biol Phys 23:705-713, 1992.
2. Schuller DE: Do otolaryngologist-head and neck surgeons and/or chemotherapy have a role in the treatment of head and neck cancer? Arch Otolaryngol Surg 117:498-501, 1991.
3. Schuller DE, Metch B, Stein DW, et al: Preoperative chemotherapy in advanced resectable head and neck cancer: Final report of the Southwest Oncology Group. Laryngoscope 98:1205-1211, 1988.
Loading comments...
|
Three Clever Uses for Rubber Bands
The answer to staying safe in the kitchen, a great kids lunch, and a clean paint can are all found in the humble rubber band. Here are some easy tips to make the most of these flexible helpers.
Cutting board safety
Put a rubber band on either side of a cutting board to avoid accidents. The rubber bands act as grips to keep the board from moving and will keep you safe.
Cool Kids' Lunches
This is a great one for the kids'! Slice up an apple and use a rubber band to keep it together until you're ready to eat. This saves your kids from using a knife, keeps the apple from browning and makes the apple easy to eat.
Clean Cans
Put a rubber band around a can of paint to wipe off excess paint from your brush. This keeps your brush in fine form, and the edges of your paint can clean.
Also on CBC |
zum Directory-modus
Subject - Immunology
Antibodies are also called immunoglobulins (Ig). They are soluble glycoproteins which can be found in the blood and in extracellular fluids of different tissues. They are produced by B cells and recognize specific epitopes. Binding of an antibody tags the corresponding antigen for phagocytosis by scavenger cells and provokes an immune reaction that induces the formation of various antibodies with identical specificity.
Y-shaped structure of an antibody molecule. The heavy chains of the two arms are coloured in brown and light grey, the two light chains are green and blue. PDB Code: 1IGT.
Antibodies are subdivided into five classes (IgG, IgA, IgM, IgD, IgE), that differ in structure, time of formation during an immune reaction and/or site of action. Sometimes the immune system produces antibodies that are directed against cells of the body itself ("autoantibodies") and cause autoimmune diseases. These autoantibodies can attack organs (e.g. antibodies against the thyroid gland in Hashimoto's disease) or bind to messenger substances, receptors or other components of the cells.
See also: antigen
Recommended Learning Units
Autoimmunity - an IntroductionLevel 130 min.
BiochemistryMedicinal Chemistry and BiochemistryImmunology
Autoimmune DiagnosticsLevel 140 min.
BiochemistryMedicinal Chemistry and BiochemistryImmunology
Autoimmune diseases can affect every organ in the human body. The symptoms of these diseases thus vary correspondingly. Very often, they resemble the symptoms of other diseases and are difficult to differentiate. Highly specific laboratory techniques are used to support formation of a diagnosis. These methods are described in this chapter. |
Jan 9 2013
Well, the evidence just keeps building and building how the earth is getting warmer and warmer. Those of us in New York know that massive Hurricane Sandy could have never sustained its energy without the ocean and Gulf Stream being warmer. The worst drought in United States history at one point last year covered two-thirds of the nation. Massive wildfires burned down over a thousand homes - especially in Colorado.
Now comes even more disturbing news.
First, currently Australia is undergoing the worse heat wave in its history. Towleroad.com is reporting that the heat has been setting so many records that the Weather Agency in Australia has had to add new colors to the map since they have never been this high in that nation's history. Temperatures are easily surpassing 120F and possibly will set an all time record this week. At least a half a dozen towns have been burned to the ground in Tasmania and massive wildfires are continuing to burn. The wildfire level has been raised to "Catastrophic" by the national government.
Purple is the new color added for over 120F degrees
The second piece of news is that it is now official that 2012 is the warmest year in history of the United States. We surpassed the old record by an entire degree which is stunning and we are over three degrees above the average for the last century! Seven of the top ten warmest years have occurred in the last fifteen years!
The situation with Climate Change is getting worse by the year. The pace of the change is moving far quicker than anyone expected! |
Bethnal Green Tube disaster: Winston Churchill covered up Britain's worst civilian disaste
A NEW book explores the deaths of 173 people crushed in a Tube station during the Second World War and the Establishment's desperation to conceal the truth.
Londoners had long been accustomed to trying to get comfortable underground in Tube stations Londoners had long been accustomed to trying to get comfortable underground in Tube stations []
IT WAS an early spring evening in 1943 when the air-raid sirens wailed out across the East End of London.
From every corner of Bethnal Green, people emerged and set off for the shelter of the Tube station.
At the entrance steps something went badly wrong. The crowd panicked and 173 people - including 62 children - were crushed to death in the darkness.
The Bethnal Green Tube station disaster was the worst civilian incident of the Second World War but is little known because Winston Churchill banned media coverage at the time over concerns that the Nazis would use the calamity as propaganda.
It was years before the public knew the truth about a tragedy that claimed more lives than Hillsborough or Aberfan.
A small plaque at today's Bethnal Green station commemorates the horror. But the grubby bronze memorial has not aged well and is barely visible in the gloom over the stairwell.
DEADLY TRAP The cramped entrance to Bethnal Green Underground station DEADLY TRAP: The cramped entrance to Bethnal Green Underground station
However, its assertion that the victims are not forgotten is true. For not only has an award-winning American author crafted a novel based on the tragedy but a charity has won planning permission for a £500,000 memorial and gained the support of TV presenter Tommy Walsh who is using his contacts to try to get it built this year.
The charity is still £160,000 short of the sum required but its organisers are hopeful that Jessica Francis Kane's novel, The Report, about the investigation into the tragedy that was suppressed until after the war, will help to draw attention to their cause.
"It was the largest civilian tragedy of the war but it's barely known, " says Kane. "As I worked on the book I was surprised by how few people were aware of it."
She began writing shortly after 9/11. "I was watching the process of gaining an independent inquiry into 9/11 playing
out in the press and it reminded me of what I knew about Bethnal Green. I started thinking about these reports and wondering about what we hope to gain from them - how they never capture the truth because it is impossible to compress a disaster into a single story."
In the case of the Bethnal Green disaster this is especially true.
Over the years the version most commonly told by locals is slightly at odds with the official testimony in the suppressed report that shows no one was sure what went wrong that night - even those who lived to tell the tale.
What is certain is that on March 3, 1943, Berlin had been heavily bombed two days earlier and reprisals were expected.
"They knew this might come so they were getting quite nervous, " explains Sandra Scotting, the secretary of the Stairway To Heaven Memorial Trust, whose mother survived the tragedy but whose two-year-old cousin was crushed to death.
Inside the station there was normally an infectious community spirit.
With the track at the new station not yet laid - work had been interrupted by the war - there was plenty of room, with nearly 5,000 bunks and space for an additional 2,000 people.
"The entrance was narrow and due to the blackout it was inky dark but lots of people were already safely down in the station, " explains Scotting. "Unfortunately two buses disgorged at once and at the same time a woman holding a baby fell at the bottom of the stairs pulling another man on top of her. In the dim light the people behind fell on top of them."
According to testimony gathered later by local magistrate Laurence Dunne in his sensitive official report, a deafening and unfamiliar noise then began.
"Everyone thought it was some new kind of bomb - they had grown accustomed to the sound of other bombs which they knew by heart. It turned out to be a brand new anti-aircraft rocket gun being fired in the nearby park.
"Nobody knew it was there otherwise they would not have run for the shelter entrance, causing more pressure on the bottleneck there."
According to Kane, the official report offered the gun as a possible factor that caused the crush. "Some witnesses say they heard something, some didn't. It was difficult to be conclusive. "
Whatever had startled the crowd, they could not see that people at the bottom of the stairs had fallen.
It was dark and the steps were slippery from the rain. Within 30 seconds it is estimated that 300 people were wedged in the space between the 19 steps and the ceiling - an area measuring around 15ft by 11ft.
One of those who survived was Sandra's late mother Ivy Brind.
"She was holding her two-year-old nephew Barry Seabrook and saw the crowds at the entrance so she turned to go back home, " Sandra recalls.
"Unfortunately, the tide of people coming towards her just threw her back, through the doorway and down the stairs. She lay on her back with Barry in her arms while people fell on top of them. She was there for three or four hours before being rescued. They took Barry away from her and she thought he went to hospital but next morning she found him in the makeshift mortuary at the church."
In all, 27 men, 84 women and 62 children died. More than 60 survivors needed hospital treatment.
"The authorities wanted to keep the accident secret so they sent men from another shaft to try to pull people from the bottom but that proved impossible, " says Scotting.
It wasn't until children went to school and found empty desks and bosses started asking what had happened to their employees that the truth came out. "But they were told not to say anything so they kept to that, " says Scotting.
The official inquiry was kept secret too but was published after the war. At the time there had been local anger at a suggestion that the crowd had panicked for no reason.
"A tight-knit community that had by all accounts behaved nobly during the Blitz was suddenly blamed for a terrible accident, " says Kane.
"They were outraged and demanded an inquiry, which was initially refused. Churchill's main concern was morale but he also said that it might set a difficult precedent to investigate this one tragedy.
"Of course at the time he didn't know it would ultimately be the largest civilian tragedy of the war."
To order The Report by Jessica Francis Kane (Portobello Books) at £12.99 with free UK delivery, send a cheque or PO made payable to Express Bookshop to: Report Offer, PO Box 200, Falmouth TR11 4WJ or call 0871 988 8367 (10p per minute from UK landlines) or buy online at To make a donation, go to
ALF MORRIS, then 13, was trapped near the bottom of the stairwell with his aunt.
"An air-raid warden called Mrs Chumley grabbed me by my hair, " says Alf, now 81 and chairman of the Bethnal Green memorial charity.
"I was hollering and hollering as it hurt but she didn't let go and eventually pulled me free by grabbing under my arms.
"My aunt was trapped against a wall. I remember she was wearing a heavy coat and they grabbed hold of her shoulders and pulled her free and she left her coat and shoes behind. She was black and blue all over. Another few minutes and she would have been dead."
Alf recalls how items taken from the pockets of the dead were used to identify victims.
His father was asked if he recognised a little girl named Vera Trotter and her mother.
Their faces were so badly bruised that he could only identify the child by her shoe, from which he had pulled a nail the week before.
Alf emerged from the Undergound the morning after the tragedy to find the stairs had been washed. The only evidence anything had happened was a pile of shoes and an abandoned pram. |
Below is a look at the past morbidity (how many people became sick) of what were once very common infectious diseases, and the current morbidity in the U.S. There's no smallpox and no polio, almost no measles, dramatically less chickenpox (also known as varicella) and H. influenza (that's not flu, but a bacteria that can cause deadly meningitis.
This should drive home how effective the common childhood inoculations, made by Merck, Sanofi, GlaxoSmithKline, and Novartis, are. The pneumococcal vaccine, made by Pfizer, has resulted in dramatic drops in meningitis and pneumonia. When Bristol-Myers Squibb lost a patent case related to its hepatitis B drug the other week, investors shrugged, because children here are vaccinated against hepatitis B, so this isn't a big market. The pertussis (whooping cough) vaccine has been failing us, because immunity against it fades. But there's still a dramatic reduction in what was once a common disease.
You can see more of Farrant's work here.
vaccine infographic created by Leon Farrant
More on vaccines:
How Pneumococcal Vaccine Nearly Eliminated A Killer Of Infants
One Of My Favorite Charts On The Power Of Vaccines |
Biography of Alexander Hamilton
This principal architect of the Federalist Papers is exceptional and enigmatic among figures of the revolutionary period. Belatedly and only grudgingly admitted to the canon of great American thinkers, Hamilton's importance as an early nationalist, a leading exponent of Federalism, and a political and financial visionary in the critical post-revolutionary years only fully came to light in the mid-twentieth century, as scholars viewing the financial and administrative histories of the early United States began to reconsider his achievements. He is best remembered as an outspoken proponent of strong central government and for his authorship of the Federalist Papers, but his many other achievements and characteristics make him a difficult figure to grasp. He was a brilliant, influential, and well-respected patriot, but he was also a fiercely ambitious self-promoter and opportunist, criticized for his arrogance as much as he was admired for his intellect and drive.
Born in the small Caribbean island of Nevis in 1755, then part of the British West Indies, Hamilton's humble origins made him an unlikely candidate for post-revolutionary prominence on the continent. His father's mediocrity in business and his mother's early death seemed to limit his possibilities, but his maternal relations' recognized the young man's promise at an early age, and afforded Hamilton enough support to relocate to Boston in 1772 at the age of 17. Shortly thereafter he moved to New York and enrolled in King's College, now Columbia University. His intellectual pursuits soon gave way to a desire to promote the revolution. "I wish there were a war," he confided in a letter to a friend. Between an inspirational speech he made in the "fields" of New York City (City Hall Park), and his authorship of two pamphlets decrying Loyalist arguments, a young revolutionary was born. When conflict broke out, he assumed the role of artillery captain and was noted for his service in the battles of Long Island, White Plains, Trenton, and Princeton. General Nathanael Green recommended Hamilton to George Washington, who in March 1777 took him on as an aide-de-camp and personal secretary. After a dispute with the commander-in-chief caused him to resign, he continued his distinction in service commanding infantry at the battle of Yorktown.
After the war ended, Hamilton settled in New York and embarked upon a distinguished legal career. In this period he completed a stint in the Continental Congress in 1782-3 and developed his law practice, but most notable was the key role he played in the 1786 Annapolis Convention which addressed issues in interstate commerce. It was his argumentation in the latter convention that highlighted the shortcomings of the government established under the Articles of Confederation. Importantly, it established his reputation as the foremost proponent of a strong central government for the newly independent colonies, paving the public intellectual foundation for the substantial architectonic changes he would engineer in the federal government while in office. He attended the Constitutional Convention in Philadelphia in 1787, but his outspoken support of strong government, particularly his proposition of electing a president for life, placed him in the minority. At any rate, the power of his two fellow New York delegates, both Anti-Federalists, ensured his inefficacy; they outvoted him two-to-one on nearly every issue.
In spite of his inability to effect much of an influence at Philadelphia, Hamilton nevertheless became the Constitution's most vocal supporter in New York during the ratification debates. Even though the document probably fell short of his desires, he spared no effort in promoting it during a critical period in arguably the most critical state. The primary means by which he did this was of course the publication of the Federalist Papers. Exactly how many of the anonymous letters comprising this work were written by Hamilton is in dispute, but it appears he wrote at least 51 of the 85 total tracts. The essays were less useful convincing voters directly of the Constitution's necessity, but they became a staple for public debaters in Virginia and New York. They clearly helped enhance the force of Federalist arguments in the key debates, bargains, and negotiations leading up to ratification.
It is in the Federalist Papers that the political pragmatism and nationalism of Hamilton are most evident. He makes his most convincing arguments for a strong American state here, and his commentary on subjects from foreign affairs to public administration. His ardent nationalism and occasionally dogmatic personality color his writings, which determine in large part the character of the entire document. Even though James Madison penned Federalist 10 and 51, perhaps the most famous essays in the collection, Hamilton's contributions to the volume's development were probably paramount. It was Hamilton who enlisted Madison and Jay to the task in the first place; when Madison and Jay departed from the project, Hamilton continued writing tirelessly. He probably exerted more influence on his companion's work than they upon him; the nature of his personality probably dictated the inevitability of such an outcome.
Following ratification, Washington appointed Hamilton the first Secretary of the Treasury. The nation's finances still in disarray after the war and independence, Hamilton's proposals to pay the foreign debt and improve public credit were hotly debated in Congress. Among them were certain provisions, particularly federal assumption of state debts and the establishment of a central bank, that drew considerable resentment for the extra short-term burdens they would place upon the recovery effort. The public's weak grasp of political economy must have made Hamilton's proposals appear unnecessarily difficult. In spite of this, the reforms ultimately won out. Historians have since pointed to them as key factors in helping sustain the early American state, particularly through its confrontation with Britain in the War of 1812.
The first Secretary of the Treasury also had considerable influence over foreign policy. He convinced Washington to adopt a policy of neutrality toward wars in Europe, in spite of strong public desires to support France. In addition, his instructions laid the groundwork for the 1794 agreement with England now known as Jay's Treaty, which settled longstanding disputes and provided for the evacuation of British troops on American borders. He was appointed Inspector General of the Army under President Adams, at Washington's urging. His disputes with Adams during this period were key causes of cleavages in the Federalist party and the party's subsequent defeat at the hands of the Republican party in the election of 1800.
Returning intermittently to his law practice through the 1790s, the hiatus from public life Hamilton took after the election of 1800 was cut short by an untimely and infamous death at the hands of Aaron Burr. Owing in part to Hamilton's electoral support of Thomas Jefferson over Burr, who he considered dangerous, Burr challenged Hamilton to a duel on July 11, 1804 at Weehauken, New Jersey. Even though some evidence indicates Burr intended only to maim Hamilton, a mortal wound he dealt to the latter's midsection resulted in death on the following day.
Hamilton's legacy is most easily recognized in his authorship of the Federalist Papers. There, his role as a proponent for strong central government and his nationalistic fervor are most evident. But his contributions to public finance and public administration while Secretary of the Treasury, only recently rediscovered by scholars, must rank among his most important achievements. Historian of United States public administration Leonard D. White has called him "the greatest administrative genius of his generation in America, and one of the greatest administrators of all time." Perhaps begrudged a prominent place among the founding fathers for his attention to pragmatic concerns over ideals, Hamilton's role in ensuring the survival and prosperity of the early republic was clearly crucial.
In spite of this, Hamilton remains an elusive figure. Historians are often at a loss to explain his self-aggrandizing and opportunistic tendencies, qualities which do not flatter the statesman in the way his life achievements do. He left enormous volumes of letters, tracts, and personal papers with which historians have reconstructed his role in the early republic, but our understanding of Hamilton's psychology, the origins of his professional aspirations, and the nature of his intellectual prowess are less clear. Certainly a key personality in American history, Alexander Hamilton's personal life probably deserves more scholarly attention than it has received thus far.
Study Guides on Works by Alexander Hamilton |
Jessie Poquerusse Headshot
Is The Internet Bad For Your Health?
Posted: Updated:
On the bright side, new online platforms, such as Uniiverse, have surfaced with the aim to re-connect you to the real-world and encourage face-to-face interactions; thereby helping counter the virtual cycle you and others around you may be stuck in, and improving your overall well being. Here is the science behind it.
Inside Your Brain
Smile. Laugh. You are simply interacting with other humans. But you're experiencing an overwhelming sense of joy and relaxation. Something important is at play. Behind the scenes, endorphins and dopamine are flowing through your bloodstream, relieving pain and enhancing your sensation of reward and well-being.
Today, it is clearer than ever that these simple physical manifestations of human interaction are essential to your happiness and well-being. From John Donne's "No Man is an Island" to Immanuel Kant's controversial theory of "unsocial sociability," man has always recognized his inherent sociability and the necessity of collaborative living. Contemporary breakthroughs in science elucidating the "neural correlates," or physiological mechanisms, of social interactions provide more empirical evidence than ever that collaborative living is key to human health and progress.
Connecting with people provides a sense of unity and common purpose that deepens and propels our daily short-term and visionary long-term actions. At the foundation of this lofty suggestion is a plethora of evidence highlighting the various neurochemicals released and brain circuits enhanced during social interactions.
Unlock Rich Dreams
On a psychological level, collaboration is a powerful tool towards accomplishment. A mosaic of studies have highlighted, in contexts ranging from educational institutions to urban neighbourhoods, that perceived collective efficacy significantly boosts groups' aspirations, motivational investment, morale, resilience to challenges, and final productivity. Not too shabby a yield for simple collaboration!
For example, instead of single-handedly vowing to consume less gas or opt for alternative transportation methods in order to "live greenly", join a web-based ridesharing community, such as the one offered on Uniiverse. Being a part of a local and global ridesharing community will enhance both your perceived and actual efficiency at abating that guilty carbon footprint.
Balance Minds and Bodies
On a neurochemical level, the hormone oxytocin plays a central role in the stress-protective effects of social interaction. Meta-analyses of the effects of this golden chemical have demonstrated that it immediately and drastically quenches stress and alleviates mood in response to psychosocial stressors. Not yet convinced? Oxytocin has been shown to exert as far-reaching effects as lowering blood pressure and increasing the rate of wound healing. Also in the realm of physical benefits of sociality, palpable benefits of social living range from decreased heart attacks to increased vitality and life expectancy. Believe it or not, social support is a prime factor in remission from and psychological adjustment to illness as ravaging as cancer.
Offer to pick up your neighbor's groceries every Tuesday and, beyond earning cash and feeling awesome about yourself, enjoy the long-term butterfly effects of that single oxytocin release. Join a sharing economy and boost mental and physical health.
Fulfill Hearts
Finally, beyond shadow of a doubt, social living is a key ingredient to the recipe of life and well-being. In a world plagued with a plethora of mental and emotional pathologies, alternative approaches to emotional health are more relevant and poignant than ever. While most of us mindlessly ingest drugs as a "quick and easy fix," focusing on a supportive social matrix and support offers the potential to circumvent these classical, dangerous and unsustainable solutions.
Take mood-lifting drugs. Both antidepressants and cocaine stimulate the cerebral region in charge of mediating feelings of love and depression, and the former essentially thwart all feelings of love. And as Helen Fisher said in her TED Talk, "A world without love is a deadly place."
But you can get your buzz without drugs. By stimulating the release of the neurochemicals that elicit feelings of satisfaction and well-being, collaborative living and social support provide natural alternatives to overcoming emotional challenges. Bond with like-minded peers in a sushi-making class or rock climbing clinic and reap the emotional rewards in a natural and sustainable way.
In addition to making every day more productive, fun and meaningful, these types of collaboration offer a host of mental, emotional and physical benefits. Share your services, promote your unique skills or simply reach out to like-minded people to stifle your stress, boost your health and enhance your well-being. The time is now to turn away from your screen and start experiencing real-life. |
Let's Take Mental Illness Out of the Shadows
02/18/2014 04:50 pm ET | Updated Apr 20, 2014
I've read several good articles about mental illness in our local newspaper here in my small town in Maine. The headline of the last article I read was, Mentally Ill Wait Too Long. The article stated, "More than 500 Mainers are on the waiting list for the most basic mental health services, with an average wait of two months and sometimes waiting nearly a year." I read that sentence and immediately had a sense of despair and disbelief. How can this be?
Mental illness can be as destructive and fatal as serious physical illnesses, but mental illnesses do not get the same level of attention and care. Mental illness often places a terrible burden and a huge impact on families. Often there is a societal perception that mothers are somehow responsible. On top of this serious emotional strain for a family caring for a child with mental illness, there is the added strain of waiting two months or up to a year to get the help they need. Mental illness is not given the attention that it needs. The situation is so dire I often think someone should sue the Department of Health and Human Services, if only to bring some attention to how desperately help is needed.
Two psychiatric doctors recently wrote a letter to The New York Times quite eloquently about the state of care for the mentally ill in this country. It was in response to an article The New York Times ran titled, "When It Comes to Mental Health Coverage, a Long Line of Patients Is Still Waiting." Their letter, which you can read here, gets it right. Every child needs access to the right treatment at the right time.
What physical ailment takes a year to be taken care of? How do those who are mentally ill and need help survive a year? How does a family or a mother with a seriously ill child survive a year's wait? This is exactly what we are asking those struggling with a mentally ill child to do, and it is unacceptable.
I remember some 50 or so years ago when my husband and I became involved with mental illness in our state. We were struggling to bring mental illness into the 20th century in Maine. There was a lady from the northern part of the state whose husband had left her with a very dangerous and mentally ill son in his teens. She came to all our meetings. She was struggling to stay financially solvent. She was simply overwhelmed. She was in her mid-30s, and our group tried to help. One day after a meeting, we learned that she died suddenly. It was a terribly sad situation.
Today, in my older age, I want to pass on advice to mothers with seriously mentally ill children:
You are not alone.
We need advocacy, not shame.
We should support one another.
Sharing your stories with other mothers can be helpful to you and to them.
We should all search for answers.
We should give voice to mental illness so we can shed light on the impact of mental illness in our society and find resources to help us.
We can empower other mothers by sharing our stories.
We need to learn our rights.
We need to ask questions and demand answers.
Sometimes I dream about mothers of mentally ill children gathering together in small groups and then those groups grow in numbers and turn into bigger groups. I dream that we can change what I call the shadow of mental illness and bring light to such an important issue, impacting so many families. I don't want mental illness to be the forgotten illness. I don't want mothers to feel alone. I want mothers to speak up and become empowered.
I wish there were simple answers, but there aren't. Together we can find solutions. Perhaps if mothers can speak out and share with each other, we can form powerful groups of healing and mental illness could take a new step forward toward awareness and progress. If we join together for change, we can take mental illness out of the shadows. |
Guide to Spelling: Hooked on Phonics
Follow the Rules! Spelling Rules
Who can trust the rules of life? You really can go swimming right after you eat; men do buy the cow even after they've gotten the milk for free. Spelling, fortunately, has some valid rules. Here are three nifty ones that will serve you well.
1. The -ceed/-cede rule. There are only three verbs in English that end in -ceed: succeed, proceed, and exceed. All the other verbs with that sound end in -cede. For example:
• secede
• intercede
• concede
• accede
• cede
• precede
2. The -ful rule. Remember that the sound full at the end of a word is spelled with only one l. For example:
• careful
• graceful
• healthful
• hopeful
3. i before e except after c … Remember this baby from the eighth grade? (Or were you too busy putting Clearasil on your nose and ogling the teacher to pay attention to something as mundane as spelling?) Here's the rule (and it even has a bouncy rhyme to it):
• i before e except after c or when sounded as a as in neighbor and weigh
• Here are some words that fit the rule.
i before eexcept after csounded as a
• And here are some words that don't:
• either
• neither
• foreign
• height
• leisure
• seize
• weird
• (Hey, is anything perfect? I never promised you a rose garden, only some neat-o spelling rules.)
Danger, Will Robinson
There's only one English verb that ends in -sede: supersede.
Danger, Will Robinson
The one exception to the “full” rule? The word full itself!
Add ie or ei to complete each word.
1. f____rce 7. n____ghbor
2. s____ge 8. c____ling
3. bel____ve 9. for____gn
4. rec____pt 10. rel____f
5. conc____t 11. w____rd
6. dec____ve 12. v____n
1. fierce 7. neighbor
2. siege 8. ceiling
3. believe 9. foreign
4. receipt 10. relief
5. conceit 11. weird
6. deceive 12. vein
book cover
|
تواصل معنا
ITT Controls
263 - 2014
ITT Barton Model 199
The Barton Model 199 Differential Pressure Unit (DPU) is a mechanical device which accurately measures differential pressure relative to a gas or liquid flowing through a process system, or to the level of a liquid contained in a process vessel. For process flow measurements, the DPU of the Barton model 199 is connected across a primary device (a venturi, an orifice plate or a flow tube) located in the process system. For liquid level measurements, the DPU may be connected in a variety of ways to measure the difference in pressure caused by variations in the level of the liquid in the process vessel.
The Barton Model 199 DPU is a dual bellows assembly enclosed within pressure housings. The dual bellows assembly consists of two opposing internally connected liq-Venting uid-filled bellows, a center plate, Connection range springs, overrange valves, Torque Tube and a torque tube assembly. Shaft The pressure housings are connected by Pipe or tubing to the primary device located in the sys-Mounting tem piping. Variations in differen-Bracket tial pressure within the pressure housings cause the bellows to expand or contract in a linear direction towards the side having the lowest pressure. The linear movement of the bellows is converted into angular rotation when transmitted to the torque tube shaft by the drive arm and this mechanical motion actuates the mechanism of the process monitoring instrument. The process monitoring instrument that is connected to the torque tube assembly may be an indicator, a switch, a transmitter, a recorder, or other process control device. |
Meet New Friends!
Kidzworld Logo
History of Afghanistan
You can't get away from hearing about Afghanistan. Turn on the TV, the radio, open a newspaper and it's Afghanistan this, Afghanistan that. In case you're not sure what to believe about this country, here are the simple facts. No mumbo jumbo.
Famous Afghans
Meena: Born in the capital city of Kabul, she is only known by her first name. Meena left university in the 1970s to organize and educate women. She founded the Revolutionary Association of the Women of Afghanistan (RAWA), created a bilingual magazine that advocated women's rights, established schools for refugee children, started a women's hospital and a center in Pakistan where women could sell crafts to support themselves. Meena was assassinated in Quetta, Pakistan in 1987. She was 30.
Khushal Khan Khattak: Khushal Khan Khattak was born in 1613. He was a famous Afghan warrior, poet and tribal chief of the Khatak tribe. He was kept prisoner in the Gwaliar fortress in Delhi. When he was allowed to return home to Peshawar, he persuaded the Afghans to fight the Mongols who had invaded their land. He died in 1690. His grave says, "I have taken up the sword to defend the pride of the Afghan, I am Khushal Khattak, the honorable man of the age."
Osama Bin Laden: This stinkin' rich businessman was actually born in Saudi Arabia (to one of that country's wealthiest families) and not in Afghanistan. The US managed to get him exiled from his home country and right now he's thought to be hiding out in Afghanistan. He's wanted by the FBI for organizing the September 11th terrorist attacks.
A Brief History od Afghanistan
Afghanistan has been at war for hundreds of years. The country was first invaded by Asians about 1500 B.C. and then by the Persians. Alexander the Great conquered most of Afghanistan about 330 B.C. Since then, Arab Muslims, Mongols, the United Kingdom and Russia have all fought for control of the country. In 1919, the British bowed out and Afghanistan became independent.
In the late 1970s came invasion by the Soviet Union but it wasn't long before the locals rebelled - they didn't like the communistic policies. The Soviet Union sent in thousands of troops to battle it out with the rebels who called themselves mujaheddin, which means holy warriors. The Soviets had better equipment but the mujaheddin was supported and armed by the United States. In 1988, the Soviet troops began retreating from Afghanistan. Eventually, the mujaheddin overthrew the government. Several different coalitions began governing the country but they fought amongst themselves so things weren't stable.
Who Are the Taliban?
By the late 1990s, a group of fundamentalist Islamic fighters called the Taliban had taken control of most of Afghanistan. The Taliban ("talib" is Pashto for 'religious student' or 'seeker of knowledge') were backed by Pakistan when they walked into Kabul, the capital of Afghanistan. They executed the former communist president and hung his body up for everyone to see. The Taliban controlled more than 90 percent of Afghanistan until the United States removed them from power in 2002, following the September 11th terrorist attacks.
Afghan Critters
Five-toed Dwarf Jerboa: Picture a gerbil. Now put really long hind legs on that gerbil and you have a five-toed jerboa. Jerboas are not related to gerbils but they look a lot like them. These fuzzy, hopping guys are rodents that live in dry, almost desert-like regions.
Ibex: This animal is kind of like a goat but is larger and the horns are much longer. The horns can grow as long as three feet (almost one meter) and are nicely curved with several rings or ridges. If you're a Capricorn or know someone who is, look up the sign. The goat looks like an ibex.
Marbled Polecat: This small mammal belongs to the weasel family. It eats mice, rats and other rodents, fish, reptiles, insects and fruit. It usually lives alone in an underground burrow. Don't frighten a polecat. Just like skunks, polecats spray a nasty-smelling fluid from scent glands under the tail.
Afghanistan - Did U Know?
• Afghanistan has the second largest number of land mines - there are over 10 million landmines scattered throughout the country. Between three and four percent of the population is disabled, thanks to fighting or mine accidents.
• Due to a poor health care system, one in four children dies before they turn five. 75 percent of the surviving children don't ever go to school.
• Under the Taliban, Girls and women weren't allowed to attend school or university. That would explain why only 47 percent of adult males and 15 percent of females can read.
Where have you been? Seen anything cool, scary, wild or freaky?
Related Stories:
Related Stories
• Los Angeles.
• San Diego.
• Sacramento.
• San Francisco.
Random In The Forums
Abbergrl posted in General:
reply about 9 hours
gpc78 posted in Poetry & Stories:
"Mellisa169" wrote:(So um, what are we going to do. In the private section or something, post something on Wattpad......WE SHOULD POST CH ON WATTPAD) YES OMG OMG OMG YES YES YES OMG
reply about 9 hours
When I'm bored, I usually complain about it to @Zyro so he gives in and roleplays with me XD
reply about 18 hours
ValenciaRose posted in General:
"CloudNineGirl" wrote:I like to read and listen to music. And eat p; for me there's usually always food involved.
reply about 19 hours
the_moon posted in Say Anything:
yeah were partying w/ john podesta
reply about 19 hours |
What shape of the sun?
You might also like... What Force Causes The Earth To Orbit The Sun? Physics. It is gravity.... What Are The Geological Forces That Shapes The Earth? - Read more
What shape, our star? Until now, astronomers had presumed the shape of the sun changed along with this cycle. The flow of matter in the sun's interior and atmosphere ... - Read more
Discussion about What shape of the sun?
What shape of the sun? resources
shape of the sun - The Naked Scientists
oval, hexagon, clearly round, which one? the old people said that sun's shape is having 6 sides. so what do you think about shape of the sun, or it is just looks
shape of the sun - group picture, image by tag ...
group pictures, images by tag, find image, find picture, find tag, shape of the sun
Understanding Sun: The Shape Of Sun | Ekalavvya.com
For more than 50 years, researchers have found it quite challenging to measure the sun’s shape. A new study, announced on August 16, throws new light on solar ...
What shape do the planets orbit the sun in? - qfak.com
I'm doing this Science Project and whenever I google this the only thing that pops up is Ellipse. Is this the actual shape? Is this the shape that all planets orbit in
What is the shape of the if4 ion | Daily Sun
Yay to local foods at Manndible...and the rest of Cornell! Fuel for the revolution :)
What shape do planets trace as they orbit around the sun?
At that time astronomers confirmed that other stars have objects that appear to be planets in orbit around ... orbit around the Sun, ... Sun than Neptune; that is ...
The Phases of the Moon for Kids - Time - Woodlands Junior ...
The revolution of the Moon around the Earth makes the Moon appear as if it is changing shape ... The phases of the Moon depend on its position in relation to the Sun ...
The Sun - Shapes and Sizes of Space
The Sun, like the Earth and Moon is a spherical shape like that of basketball or soccer ball. However the closer you get to the Sun the bigger it looks.
The Shape of the Sun, Miracle Cures, Hidden Pyramids, and More
This week, archaeologists found new pyramids in Egypt, scientists discovered that the sun actually isn't the shape we thought it was, and we found the most bizarrely ...
What your nose shape says about you | The Sun |Features
Want the full article and instant access? To access The Sun website you need a membership
What shape is the sun? - Cork Flat Earth Society
What shape is the sun? Welcome, Guest. Please login or register. Did you miss your activation email? September 30, 2014, 04:07:45 AM. News: The Flat Earth ...
Shape of the Sun... - YouTube
This video is unavailable.
Earth - Wikipedia, the free encyclopedia
Strange Sun shape in Rijeka 18.12.2012, but....look at the sky and the cloud line.
Position of the Sun - Wikipedia, the free encyclopedia
The Sun's declination can be used, ... and also by changes in the speed of its orbital motion around the Sun produced by the elliptical shape of the orbit.
What is the shape of the earth's orbit around the sun?
The Orbit of the Moon around the Sun is Convex! ... , we can assume that the orbits of the Earth around the Sun and the Moon around the Earth are both circles.Read more
Related Questions
amrapali complaints - how to solve this error "can't convert string into integer"?
would soldiers been allowed to remove their uniform when on leave and in public?
do you call it geography when you're looking for london?
who signed the 1 5 and 10 dollar bill?
what is your m1 carbine worth 2-43 inland arms gen motors ssn?
how successful was the usa in entering peace agreements following vietnam?
can my boyfriend charge me if i go to get my stuff with my key ? after we broke up?
is there a sergeant micheal smithi in nigeria us army?
was crimea independence from ukraine the same as canada and australia independence from britain?
how do you make project slides on wordpad?
who issued the affordable care act?
okay i havnt been to basic training yet and i missed this weekends rsp drill, they called and told me i would be out as awol, what will happ?
what is used in an attempt to make short-range predictions of when earthquakes will occur?
what is the opposite of a bird?
does anybody know the address of the hut where president obama was born?
parth or ayush.... smart boy name for my baby?
how wide is west london academy?
calculate the ph of a buffer that is 0.130m in nahco3 and 0.300m in na2co3. please help!!?
can anyone who knows the factors that are rensponsible for water movement, explain them to me?
please help for this problem?
explain how buffers stabilize the ph of a solution. include an example please?
how far mississippi navigible?
plzz help: integration dx/x+2?
how to convert mg/ml to mg/g ?
nylon bristles of a toothbrush or shaving brush becomes soft, if dipped in water, why ? |
home online coaching research articles research links definitions workshop information plan ideas
Source: Forbes, Feb 19, 2001 p113.
Title: Kernels of Truth.(agricultural policy and genetically modified
crops)(Statistical Data Included)
Author: Karl A. Thiel
Full Text COPYRIGHT 2001 Forbes, Inc.
Call it the new colonialism. Europe has a new power over farmers in distant lands, controlling what they grow and what they don't, demanding that they use certain farming methods even if it means ignoring technologies that could improve yields, feed more people, and save lives.
Despite the proven benefits of genetically modified (GM) foods and the promise of better things to come, continuing controversy has led to European Union policies and regulations that limit growing and selling GM foods (sometimes called genetically modified organisms, or GMOs). These policies have had a sweeping impact worldwide, confusing researchers, scaring off investors, and hurting farmers.
European outcry over GM foods, spurred by organized anti-biotech activists, has caused regulators to declare that foods with any amount of genetically modified ingredients must be labeled as such. That creates problems for exporters and grocery chains, which are reluctant to stock so-called Frankenfoods. GM critics got a boost in September when genetically modified StarLink corn, approved in the United States for use as animal feed but not for human consumption, was found in Taco Bell brand taco shells, prompting a national recall.
"We didn't need the taco shell problem," sighs Steven Burrill of Burrill & Co., which manages an $86 million agricultural biotechnology investment fund in San Francisco. "It has had a dramatic impact on the public capital markets, on the regulators, and on the public companies. Every company that's in ag-biotech is trying to say that what they are doing doesn't create or augment GMOs." Tellingly, Burrill's fund has not invested in companies that create GMOs. Rather, he has favored companies with information and genomics technologies that could help in identifying important genetic traits.
But there's more at stake than the fluctuations of the stock market. If the chilling effect of public opposition halts new research, we could lose a host of new technologies that read like a progressive activist's fondest wish list:
Clean-burning fuels such as combustible alcohols and canola oils could be efficiently produced with plants that have had their metabolic pathways engineered by researchers. Such fuels would be renewable, requiring no drilling and little refining. (Some vehicles in Europe already run on fuels derived from canola, but making the technology commercially feasible is still a distant hope.)
Genetically engineered pulp trees might soon require fewer chemical pollutants for the production of paper. One day, trees may grow faster and stronger as plantation crops and relieve the pressure to log old-growth forests.
Crops engineered to require less fertilizer would result in less nitrogen spread on the ground, reducing greenhouse gases and groundwater contamination.
Starvation could be eased. In fact, agricultural biotechnology is already having an impact. Golden rice, engineered to produce high levels of beta carotene, is being distributed free in Third World countries, where Vitamin A deficiencies result in hundreds of thousands of cases of blindness and other preventable illnesses every year. But it is a transgenic crop, meaning it has genes from another species, the very definition of what critics deride as Frankenfood.
With golden rice as the model, companies are racing to develop foods they hope will taste better, last longer, and be more nutritious. Researchers also seek to expand the food supply by making crops drought-resistant and salt- tolerant, able to thrive on land currently unsuitable for farming. In China and elsewhere, efforts are under way to create strains of rice that would resist rice blast fungus, a devastating crop disease responsible for famines in Asia.
What are the chances that this important work will be stopped in the United States, home to some of the world's leading ag-biotech companies? Europe may be unique for a number of reasons. Cases of mad cow disease in the United Kingdom and now continental Europe, dioxin in Belgian food, HIV in the French blood supply, and other recent government debacles have shaken the faith of the public in their regulatory agencies. Consequently, many European consumers are unwilling to accept the government's word that GM foods are safe.
But most surveys show that American consumers are relatively unconcerned about GM foods, says Thomas J. Hoban, a sociology and food science professor at North Carolina State University who has monitored public perception of the foods for more than a decade. Even after the StarLink incident, biotechnology was near the bottom of the list of things that worry consumers at the supermarket.
But unlike Europe, in this country, regulatory agencies-the U.S. Department of Agriculture, the Food and Drug Administration, and the Environmental Protection Agency-oppose mandatory labeling of foods containing GMOs. An American Medical Association committee recently concluded that GM foods don't pose serious health risks and don't require special labeling. The U.S. philosophy, in essence, is that food should be labeled if these products differ significantly from their conventional counterparts. In the eyes of the government, the genetic modifications of current crops don't cross that line because the alterations are tiny compared with many things that already go unnoted on food labels.
"There are 200 genetically different corn hybrids used to produce the yellow dent corn for the commodity markets in the U.S., and they're all quite different," notes Wallace Beversdorf, head of R&D at Novartis Seeds. "They differ in protein content, oil, in many attributes, including susceptibility to fungi....We don't label all that. It's still No. 2 dent corn." Adding a single gene with a single protein product is, for consumers, irrelevant, he maintains.
David Schmidt, senior vice president for food safety at the International Food Information Council, argues that labeling would make insignificant differences look important, and that the scientific language needed to explain it might in effect become a skull and crossbones in the eyes of shoppers.
Still, others in the industry are beginning to wonder if labeling might offer more benefit than burden. "If we had labeling, we probably wouldn't have had half the chaos we've had," says Burrill. Even Beversdorf concedes that some form of labeling may be inevitable, particularly if U.S. consumers, stirred up by the StarLink recall and European outcry, begin to demand it. Labeling here would also ease efforts toward harmonization of international trade laws, he acknowledges.
Some go even further. Dave Summa, president and CEO of Mendel Biotechnologies in Hayward, California, suggests that industry could turn a perceived liability into a benefit by creating a new category of "green foods" and communicating the message that they are "grown in a better way," he says.
"What we're doing is growing more food on the same land, destroying less land by having better growing practices, using fewer chemicals," Summa says. "We in the industry could get together and say we're going to create a 'green' mark that would meet certain standards," such as 50% lower use of pesticides and fertilizers. "Then people would feel good about what these technologies are doing."
The gulf between the biotech industry and activist groups may be too broad to span, but industry still hopes to win over consumers. "Education is important, but it's not going to be enough," says Keith Walker, president of the Plant and Industrial Products Division at ValiGen, a San Diego, California, company researching ways to make drought-resistant and saline-tolerant crops. Indeed, educating people about biotechnology has become a political process, with anti- biotech activists on one side, industry on the other, and the media in the middle. In Europe, Walker suggests, consumers will need to regain faith in regulators if GM crops are ever going to have a chance.
For now, the fact that GM foods must be labeled in Europe, making supermarkets reluctant to touch them, has had ripple effects. One instance occurred in Canada, where researchers at the Crop Development Centre at the University of Saskatchewan (Saskatoon) developed a transgenic strain of flax seed resistant to sulfonylurea herbicides already in the ground. The herbicides used on cereal grains in western Canada's alkaline soil do not break down well, making it difficult to grow broadleaf plants like flax. This new strain could thrive where conventional varieties withered.
But Europe is a major market for flax, so exporters who ship there would have to guarantee that their product contains no GM seed, which would be impossible if the crops were grown anywhere in western Canada. That requirement meant 10 years of research went down the drain, says Gordon Rowland, a flax breeder and former director of the Crop Development Centre. The seeds, which were never planted, are being destroyed and the product is being deregistered. The hard lesson is that in food-exporting countries like the United States and Canada, farmers must consider the demands of Europe as well as domestic regulations, a tricky balancing act.
"If there were tolerances for transgenics in shipments, I'm sure that the [GM] variety could have gone ahead," says Rowland. "You could have guaranteed that there would be, at worst, a very low level of any transgenics in a shipment."
But that's not the way it works. "There is zero tolerance, and that's impossible," he notes. "If you've got a [GM] variety out there, you cannot absolutely guarantee there won't be some mixing or contamination at some point in the process."
The added irony is that flax is largely used for its oil, which contains no protein or DNA, transgenic or otherwise. (Most objections to GM foods have to do with the fear of consuming novel genes or allowing their "escape" into the environment, neither of which would be possible after the DNA and proteins are removed.) In any case, the oil is used largely for industrial applications such as paints, inks, and linoleum rather than food.
European resistance to GM foods also hurts U.S. sugar beet farmers, who are struggling against foreign competition. Roundup Ready sugar beets-already approved for commercial use-would save farmers $90 to $100 per acre in weed control costs, according to Hoban of North Carolina State. "But they're afraid to implement the technology because of the downstream processing companies," he says. Major food processing companies wouldn't want to risk buying the product because the sugar would be rejected by European grocery stores. This is despite the fact that refined sugar contains no protein or DNA and would be indistinguishable from products with a conventional origin.
So far, these kinds of problems are more a matter of economics than survival. Industry insiders point to the enthusiasm for biotechnology in countries like China and India, where the focus is less on profit and more on feeding large populations and averting famine. But as researchers develop more crops like golden rice, the discontinuity between Europe and the rest of the world could trigger bigger problems. For example, if an engineered rice strain resistant to blast fungus were not planted because of European concerns, an epidemic might cause widespread famine. "Harmonization [of labeling requirements] is key, but I don't see anything happening for the next couple years," says Beversdorf, who works in Basel, Switzerland. "I hope I'm wrong."
Meanwhile, the battle for the hearts and minds of the American public continues. While most consumers remain sanguine about (or oblivious to) genetically modified foods, researchers are becoming increasingly discouraged about what they see as a cynical campaign by activist groups to turn the public against technology that could help bring relief to a needy world. "Almost 30,000 children die of nutritionally related diseases in this world every day," says ValiGen's Walker.
But arguing in support of the environmental benefits of GMOs may be an uphill battle. Some of the biotech industry's best potential allies have already staked out positions in opposition. Greenpeace calls for "no genetic manipulation of nature," a rallying cry that if taken literally would outlaw farming practices extending back to the Neolithic Age. In May, the Sierra Club called for "a moratorium on the planting of all genetically engineered crops...including those now approved."
In the end, it may be economics that brings us together again. Europe is in essence demanding its own supply chain of food, and consumers will ultimately pay for it. For important crops such as soybeans that come from outside Europe, the onus of assuring GM-free cargo will fall to importers. Such specialty crops are nothing new; Japanese importers regularly commission farmers to grow special varieties of soybeans and keep them separate from other crops. Farmers are happy to oblige-for a price. European shoppers, who already pay more for food than Americans, may one day become frustrated with food costs in much the way they balked at high gas prices last year. At that point, European grocers may have the courage to stock GM foods, duly labeled, on their shelves.
Karl Thiel is the editor in chief of DailyTwist, an online magazine on the biotechnology industry published by DoubleTwist.
[ Mackinac Center | Search | Debate Home ]
-Ask the Debate Coach a question
-Questions, problems to webmaster |
• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month
How does our knowledge of events affect our understanding of Mr Birling and any other character you find interesting? Why do you imagine Priestley set his play in the past? Is the play as relevant today as it was in 1946?
Extracts from this document...
'An Inspector Calls' was set in 1912 but was 1st produced in 1946. Research the historical events mentioned in the play. How does our knowledge of events affect our understanding of Mr Birling and any other character you find interesting? Why do you imagine Priestley set his play in the past? Is the play as relevant today as it was in 1946? 'An Inspector Calls' was written by J.B. Priestley in 1945 shortly after the Second World War. However, it is set in 1912 prior to the Great War. At that time, Britain still had its Empire and was a wealthy country. Priestley wrote the play intentionally, as he saw an urgent need for social change and used the play to express his desire for social equality. The play takes us into the comfortable and complacent world of the Birling family, at their home in the industrial city of Brumley, in the North Midlands. The family are enjoying a dinner party in celebration of their daughter Sheila's engagement to Gerald Croft, when a mysterious police inspector arrives and says that he is investigating the suicide of a young working-class girl, Eva Smith. ...read more.
Mr Birling also predicts that: war with Germany would not occur, as it would upset profit making of business men, such as himself (the war started two years later), he claims there will be no problems with labour relations (there was a general strike in 1926) and in 1940 all will be "peace and prosperity". An audience in 1946 were still suffering the effects of the lack of peace in 1940 and to them, all of these predictions must have seemed fairly humorous as they could easily understand Mr Birling's foolishness by his false predictions. He seems oblivious to the warning signs of such serious issues in spite of his son's attempts to warn him. Also, Mr Birling chooses to blank out many of the bad aspects of life, which he conceitedly believes no on values highly as they do not concern him directly. Priestley's device of writing in hindsight on this occasion makes the play meaningful to the audience, as they would learn from the mistakes of Mr Birling. One of Priestley's main messages to the audience of 1946 is that all human beings are guilty of taking things for granted and they should not consider themselves safe from trouble just because England has won the war. ...read more.
However, similar themes and messages are still present with these different issues. 'An Inspector Calls' clearly conveys the idea that the Birling household was an ivory tower on its own island in a sea of despair, unable to look beyond itself. Today, Britain could be described in the same way in the light of world poverty, and therefore this is an example of how Priestley's messages can be relevant in the modern society, even though the issues involved have changed. I believe the overall moral in "An Inspector Calls" has something to do with how events can take effect on someone's life over a period of time. We should think about the less fortunate than ourselves, and how our actions could take a massive impact on others who live and work around us. I think that Priestley hoped the play would challenge the audience of any year, with their moral beliefs of right and wrong. Everybody's interpretation of "An Inspector Calls" is different, and indeed the play teaches different people, different things. The viewer is made to think carefully about the hidden messages, and consider the possible consequences of a wrong action. The play should make us think about past thoughtless actions and what we would do if we are ever in that situation again. ?? ?? ?? ?? - 1 - ...read more.
The above preview is unformatted text
Found what you're looking for?
• Start learning 29% faster today
• 150,000+ documents available
• Just £6.99 a month
Not the one? Search for your essay title...
• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month
See related essaysSee related essays
Related GCSE J.B. Priestley essays
notice you told him [the Inspector] it's every man for himself.o As Birling tries to talk about preventing a scandal, Eric warns him that "you're starting to pretend than now that nothing's happened.o To sum up, Eric changes from a young man who reluctantly accepts his father's ideas into one
2. 'An inspector calls' - what is the main message and is it still relevant ...
Priestly follows all of the three unities. Unity of place- Priestly based his play in one scene. Unity of time- Priestly kept the play the same length of time as the okay takes to act. Unity of Action- Priestly made his play based on one storyline, no sub-plots.
As Mr Birling believes that through experience he knows that there will be no war, he claims the Titanic is "unsinkable" (act1, pg7) the audience can understand his foolishness and how dense he is. The inspector build tension up tension between the Birlings family at a early stage, by questioning
Also, it portrays the Inspector as much more powerful, as Eric is not hesitating in answering. The strength and power of the Inspector is revealed once more, and Eric is now seen weak, lonely and confused character. This works well in getting sympathy from the audience, as earlier on Eric
1. The message of an inspector calls is as relevant today as it was first ...
Birling sacked Eva Smith, a girl who committed suicide. Mr Birling, a wealthy, rich successful business man fired Eva as he thought she was jeopardising his business. She led some work colleagues in a strike for higher wages. "Well it's my duty to keep labour costs down" (Act 1 p.g 15)
2. Why do you think Priestley chooses to set the play in 1912? What effect ...
Many people saw the end of the Edwardian era and the on set of war as the end to a time of peace and stability. But, it was a period of false security and Priestley uses this to emphasize the dramatic force of this play.
1. 'An Inspector Calls' is a play with important messages for any society'. Explore the ...
As this play was written shortly before Hitler's defeat in World War Two it could possibly have been designed for the audience of the immediate time to show that Hitler hated people being equal and that the Allies were fighting against this.
The lighting explains what is happening in the play. At the beginning of the play, I did not have a clear understanding of the mood. At the beginning the lighting was intimate in the production. When the Inspector comes the lights get brighter, as a sign that he has come
• Over 160,000 pieces
of student written work
• Annotated by
experienced teachers
• Ideas and feedback to
improve your own work |
Key to grades
Strong scientific evidence for this use
Good scientific evidence for this use
Unclear scientific evidence for this use
Fair scientific evidence against this use (it may not work)
Grading rationale
Evidence gradeCondition to which grade level applies
High cholesterol
Niacin is a well-accepted treatment for high cholesterol. Multiple studies show that niacin (not niacinamide) has benefits on levels of high-density cholesterol (HDL or "good cholesterol"), with better results than drugs such as "statins" like atorvastatin (Lipitor®). There are also benefits on levels of low-density cholesterol (LDL or "bad cholesterol"), although these effects are less dramatic. Adding niacin to a second drug such as a statin may increase the effects on low-density lipoproteins. The use of niacin for the treatment of high cholesterol associated with type 2 diabetes has been controversial because of the possibility of worsening blood sugar control. People should check with a physician and pharmacist before starting niacin.
Niacin (vitamin B3) and niacinamide are U.S. Food and Drug Administration (FDA)-approved for the treatment of pellagra, or niacin deficiency. Pellagra is a nutritional disease that occurs due to insufficient dietary amounts of vitamin B3 or the chemical it is made from (tryptophan). Symptoms of pellagra include skin disease, diarrhea, dementia, and depression.
Clogged arteries
Niacin decreases blood levels of cholesterol, which may reduce the risk of clogged or hardened arteries. However, niacin also can increase homocysteine levels, which may have the opposite effect. Overall, the research supports the use of niacin in combination with other drugs to reduce the risk of clogged arteries. More research is needed in this area before a firm conclusion can be drawn.
Heart disease
Niacin decreases levels of cholesterol, and other chemicals in the blood, which can reduce the risk of heart disease. However, niacin also increases homocysteine levels, which can increase this risk. Research has shown beneficial effects of niacin, especially in combination with other drugs, for preventing heart disease and fatal heart attacks. Further study is needed to draw conclusions.
Age-related macular disease (eye disease)
Early evidence suggests that niacin may have beneficial effects in age-related macular degeneration (AMD), a disease that often leads to vision loss. More well-designed studies are needed for conclusions to be reached.
Alzheimer's disease (mental decline)
Dementia can be caused by a severe lack of niacin in the body. Early evidence suggests that taking more niacin in the diet may slow the onset of Alzheimer's disease and mental decline. Further research is needed before a conclusion can be drawn.
Erectile dysfunction
Early research suggests that niacin has a beneficial effect on erectile dysfunction. However, further well-controlled studies are needed to draw conclusions.
Early research shows that niacin may be beneficial in the treatment or prevention of headaches. More research is needed.
Hepatitis C
Early research suggests that niacin may decrease blood levels of hepatitis C, a virus that damages the liver. Notably, niacin has been also associated with liver damage. Further research is necessary for a conclusion to be made.
High blood phosphorous level
Early evidence shows that niacinamide had reduced high phosphate levels in the blood. However, more research is needed before a firm conclusion can be made.
Osteoarthritis (niacinamide)
Early research suggests that niacinamide may be useful in the treatment of osteoarthritis. Further research is needed before a conclusion can be made.
Skin conditions
Niacinamide has been used in skin care products, including moisturizers, anti-aging products, and treatments for rosacea, a skin condition involving facial redness and pimples. The benefits of niacinamide in skin care needs to be further studied before conclusions can be made.
Type 1 diabetes (slowing progression)
Non-human research shows that niacinamide delays the onset of insulin dependence in type 1 diabetes. However, human research assessing whether niacinamide slows progression of type 1 diabetes has yielded unclear results. Further study is needed for conclusions to be reached.
Type 2 diabetes
Limited research shows unclear effects of niacin on outcomes of type 2 diabetes. Human research has also shown that niacin increases blood sugar levels. People should seek medical advice before starting niacin. Further research is needed to draw conclusions.
Type 1 diabetes mellitus prevention (niacinamide)
In human research, niacinamide lacked an effect on the development of diabetes (type 1). Evidence is mixed and more study is needed in this area.
Uses based on tradition or theory
Alcohol dependence, anemia (lack of red blood cells), anti-aging, antioxidant, anxiety, arthritis, Bell's palsy (face paralysis), blood thinner, bone marrow suppression (results in decreased blood cells), breast cancer, bursitis (joint inflammation), cancer prevention, cancer treatment side-effects, cataract prevention, chest pain, chronic diarrhea/hypokalemia (long-term diarrhea resulting in low potassium levels), circulatory/blood flow disorders, coronary artery (heart) disease, cosmetic uses, dementia (confusion), depression, diabetes mellitus (type 1) treatment, diabetic complications (high cholesterol), diarrhea, digestion improvement, dizziness, drug-induced hallucinations, swelling, encephalopathy (brain disease), erythema induratum (skin disorder), glossitis (inflamed tongue), growth, heart attack prevention, hearing loss, hepatic encephalopathy (confused thinking due to liver disorders), high blood pressure, HIV, hyperactivity (abnormally active), hyperkinesis (excessive movement), infectious diarrhea (choleric), insomnia, intermittent claudication (leg pain from clogged arteries), ischemia-reperfusion injury prevention (protection from injury caused by lack of blood flow), itching, leprosy (fatal infection), liver disease, liver cancer, lupus (cholesterol abnormalities), memory enhancement, Meniere's syndrome (inner ear disorder), menstrual pain, metabolic syndrome, migraine headache, motion sickness, multiple sclerosis (disease of the nervous system), nervous system disorders, nutrition, obesity (too much body fat), pain, painful menstruation, pancreatitis (inflamed pancreas), parasite infection, Parkinson's disease, peripheral vascular disease (blocked arteries in the legs), polymorphous light eruption (skin disorder due to sunlight), pregnancy, premenstrual syndrome (PMS), prostate cancer, psoriasis, psychosis, Raynaud's disease (reduced blood flow to extremities), ringing in the ears, schizophrenia (for identifying the disease), scleroderma (scar tissue build-up on skin), sedative, seizure disorder, sexual arousal (orgasm improvement), skin inflammation, sleep quality, smoking cessation, stroke, sun protection, swelling, tardive dyskinesia (involuntary movements), taste disturbances, thyroid disorders, tuberculosis, vasculitis (erythema diutinum), ulcers, vascular spasm (blood vessels), vertigo, wound healing.
|
Chest Exercises
3 Surefire Moves to Bust Out Some Bigger Pecs
Add some size to your chest with these proven cable exercises.
One of the most famous chests in bodybuilding belong to that of the Austrian Oak himself, Arnold Schwarzenegger. In his prime, Arnold's chest was truly the center piece of his physique.
So how can you pump up some Arnold-like pecs of your own? First it's important to understand what muscles are involved when working this part of your body. Your chest muscles are composed of the pectoralis major and minor. The pectoralis major is the bigger chest muscle and travels from the collar bone to the sternum, attaching to the upper arm. The purpose of this muscle is flexion and adduction of the shoulder as well as inward shoulder rotation. The pectoralis minor is a small triangular muscle located under the pectoralis major and also helps with shoulder flexion, adduction and rotation.
Exercises such as flys and crossovers are ideally suited for shaping and increasing striations, and using cables is one of the best machines to help develop an incredibly cut chest. With that said, here are my top 3 exercises to help sculpt your pectoral muscle.
1. Cable Crossover
With a slight bend on your elbows in order to prevent stress at the biceps tendon, extend your arms to the side (straight out at both sides) in a wide arc until you feel a stretch on your chest. Inhale during this portion of the movement.
Return your arms back to the starting position as you exhale. Make sure to use the same arc of motion used to lower the weights. Hold for a second at the starting position.
Sets: 3
Reps: 12-15 |
Ask Question, Ask an Expert
Ask Homework Help/Study Tips Expert
Homework Help/Study Tips, Others
• Category:- Homework Help/Study Tips
• Reference No.:- M925446
Have any Question?
Related Questions in Homework Help/Study Tips
Research papersearch the internet to find a spreadsheet
Research PaperSearch the Internet, to find a spreadsheet program that will assist you in completing this assignment. The spreadsheet and calculations are to be attached at the end of the paper as an appendix after the Re ...
Imagine you are narrating a guided tour throughout the
Imagine you are narrating a guided tour throughout the ancient Greek and Roman worlds. Create a 700- to 1,050-word tour guide describing the places and artifacts that the tourists will see. Include the following in your ...
Part 11 explain the difference between a genotype and a
Part 1: 1. Explain the difference between a genotype and a phenotype. 2. What are the 3 different ways that trisomy 21 can be expressed? 3. What are the differences and similarities between Klinefelter syndrome and Turne ...
Health care marketersplease respond to the following
Which rhetorical appeal logos pathosethos affects you most
Which rhetorical appeal (logos, pathos,ethos) affects you most. Why? Answer this question in three to four complete sentences or more.
Assignment the application paperusing the textbook and
Assignment : The Application Paper Using the textbook and Argosy Online Library references that you may select, write a paper (minimum 750 words) using APA standards, that answers the questions below. First, from the Arg ...
Film genreschoose a movie that you have viewed in the past
Film Genres Choose a movie that you have viewed in the past and can re-watch to complete the below worksheet. Please refer to our course readings. Part I: Examining Narrative (at least 300 words total). Questions Answers ...
Assignment 1 antisocial personality disorder vs borderline
Assignment 1: Antisocial Personality Disorder vs. Borderline Personality Disorder Discuss the similarities and differences between antisocial personality disorder and borderline personality disorder. What are the practic ...
Discussion questionin your initial post this unit choose
Discussion Question In your initial post this unit, choose two of the following questions to answer in about a paragraph each.(Note: some of these questions are adapted from Greene and Lidinsky.) 1. Edmundson chooses to ...
This link talk about what is conversation
This link talk about what is "conversation" means. make sure use simple word and simple sentence. Think about the idea of research and scholarship as a conv ...
• 4,153,160 Questions Asked
• 13,132 Experts
• 2,558,936 Questions Answered
Ask Experts for help!!
Looking for Assignment Help?
Start excelling in your Courses, Get help with Assignment
Ask Now Help with Problems, Get a Best Answer
A cola-dispensing machine is set to dispense 9 ounces of
What is marketingbullwhat is marketing think back to your
Question -your client david smith runs a small it
Inspection of a random sample of 22 aircraft showed that 15
Effective hrmquestionhow can an effective hrm system help
|
ESO / M. Kornmesser
Strong winds have been observed around low-mass and high-mass stars, but stars such as the sun present less evidence of high wind conditions.
By Astrobiology Magazine contributor
updated 2/16/2012 2:45:30 PM ET 2012-02-16T19:45:30
Standard models predict that our sun was much dimmer in its youth, but devising a way to keep the early Earth from freezing over has not been easy for climate modelers. An alternative solution — currently being re-examined by a group of researchers — is to assume our sun started out a bit heftier (and therefore brighter) than expected.
Most stars tend to increase in luminosity as they get older. This is due to their cores becoming denser and thus hotter over time. Assuming our sun has followed this same trend, one can estimate that it was 30 percent fainter 4.5 billion years ago.
"The faint young sun presents us with a paradox, because the predicted temperatures on Earth and Mars would have been too cold for liquid water," said Steinn Sigurdsson of Penn State University.
Too cold for liquid water? Not likely. Evidence in the oldest rocks suggests that Earth had liquid oceans as far back as 4.4 billion years ago. On Mars, scientists have built up a case that it, too, was warm and wet around 4 billion years ago.
1. Space news from
1. KARE
Teen's space mission fueled by social media
2. Buzz Aldrin's vision for journey to Mars
3. Giant black hole may be cooking up meals
4. Watch a 'ring of fire' solar eclipse online
To avoid the so-called " faint young sun paradox," scientists over the past 25 years have explored taking the sun off the "standard" evolution curve. By starting off with a smidgen more mass, the early sun would be bright enough to maintain liquid water temperatures on Earth and Mars. The catch is that the sun would need to have had an extremely powerful solar wind to blow off the excess mass and return it to its "normal weight."
Sigurdsson and his colleagues are tackling this problem anew. With funding from the NASA Astrobiology Institute, they will use improved computer models along with the most recent solar data to compare various scenarios, as well as look for possible signatures in the sun that might reveal a "crash diet" in its past.
Greenhouse solution
The young massive sun hypothesis doesn't get a lot of attention these days.
"I think it is a plausible hypothesis, which has not found great favor with the traditional climate science community," said Renu Malhotra of the Lunar Planetary Lab at Arizona State University, who is not involved with the current project. She wonders if others see it as a bit too easy, like cutting the Gordian knot.
When Carl Sagan and George Mullen first identified the faint young sun paradox in 1972, they proposed to solve it by having ammonia, a powerful greenhouse gas, trap heat in the Earth's early atmosphere. But it was later shown that ultraviolet light from the sun would quickly destroy this ammonia.
Most of the current attention is on models that assume the early Earth was blanketed by large quantities of carbon dioxide (as much as 100 times the current levels). However, this doesn't jibe with the geologic record, in which siderite (FeCO3) — a mineral that forms readily in high CO2 conditions — is largely absent in the oldest rock samples.
Even if one could find enough greenhouse gases to keep Earth warm, this route doesn't seem plausible for Mars. Being farther from the sun, the Red Planet would need an unfeasibly large greenhouse effect. The amount of carbon dioxide needed, for example, is so high that clouds of CO2 begin to form, reflecting heat away rather than trapping it.
"There's no greenhouse solution for Mars," Sigurdsson said. "But geochemists may not be ready to give it up."
The Viking Project / NASA
The winds of change
Previous work has found that this "open door" is really just a small window; the increase in solar mass has to be somewhere between 2 and 5 percent. Any less and the Earth won't warm up enough. Any more and the sun evolves into a different star than we know it to be.
Besides the mass, the researchers can adjust other relevant parameters, like the relative concentration of elements that the sun starts off with, as well as the degree of turbulence inside the sun's churning plasma.
"We have a lot more data on the sun now to tighten the constraints on our models," Sigurdsson says.
If the current solar wind had been constant over the lifetime of the sun, then our star would have lost only about 0.05 percent of its mass. Most scientists believe the solar wind was stronger in the past, but how much stronger is debatable.
To provide enough planet warming without overstepping any solar constraints, the sun had to lose the extra mass in roughly the first few hundred million years, Sigurdsson said. That implies a solar wind that is about 1,000 times faster than what we currently observe.
"You can likely find people that will say it is not feasible, but we need better observations to constrain the models," said Soren Meibom of Harvard University, who is also not involved with the project.
The Solar Heliospheric Observatory (SOHO) captured the coronal mass ejection (CME) from a huge solar flare on Jan. 23.
Strong winds are known to exist around high-mass and low-mass stars, but medium-sized stars such as our sun don't appear to be as windy.
"It is quite challenging to find strong support for (a massive young sun) in astronomical observations of young sun-like stars," Malhotra says. "Young sun-like stars appear to lose mass initially very quickly."
Stellar stretch marks
In 2007, Malhotra and David Minton, who's currently at Purdue University, looked to see if the orbital dynamics of the solar system could hold any signatures of a massive young sun. For instance, the planets would have started out in tighter orbits due to the sun's stronger gravity. But it turns out the difference is probably too small to have left any noticeable traces.
According to Malhotra and Minton, the most promising place to look for an orbit-related signature would be in the distribution of irregular satellites, which are moons like Saturn's Phoebe and Jupiter's Himalia that are in distant, inclined orbits. As the sun loses mass, it could increase the efficiency at which planets can capture irregular moons. Malhotra says she plans to study this effect more closely in the future.
The goal of Sigurdsson's project is to look in the sun itself for some leftover changes, or "stretch marks," from an earlier, more massive period. They hope to find something that would be detectable with future helioseismology efforts, which study vibrations generated in the solar interior.
"The core of the sun will hopefully provide us with some sort of sign," Sigurdsson said.
© 2013 All rights reserved. More from
Discussion comments
Most active discussions
1. votes comments
2. votes comments
3. votes comments
4. votes comments |
Archive for January, 2011
The Maximum Score in the Game “Entanglement” is 9080
January 21st, 2011
On a Standard-Size Game Board
On a Larger or Smaller Game Board
Further Variants of the “Look-and-Say” Sequence
January 13th, 2011
In two previous posts, I explored Conway’s famous “look-and-say” sequence 1, 11, 21, 1211, 111221, 312211, …, obtained by repeatedly describing the sequence’s previous term, as well as a simple binary variant of the sequence. In this post I will use similar techniques to explore some further variations of the sequence – a version where each term in the sequence is read in ternary, and a related sequence where no digit larger than 2 may be used when describing its terms.
As with the regular look-and-say sequence, the way we will attack these sequences is by constructing a “periodic table” of elementary non-interacting subsequences that all terms in the sequence are made up of. Then standard recurrence relation techniques will allow us to determine the rate of growth of the length of the terms in the sequences as well as the limiting distribution of the different digits in the sequence.
The Ternary Look-and-Say Sequence
Since we have already looked at the regular (i.e., decimal) look-and-say sequence, which is equivalent to the base-4 version of the sequence since it never contains a digit of 4 or larger, and we have also looked at the binary version of the sequence, it makes sense to ask what happens in the intermediate case of the ternary (base-3) version of the sequence: 1, 11, 21, 1211, 111221, 1012211, … (see A001388).
As always, we begin by listing the noninteracting subsequences that make this version of the sequence tick. Not surprisingly, it is more complicated than the corresponding table (of 10 subsequences) in the binary case, but not as complicated as the corresponding table (of 92 subsequences) in the decimal case.
# Subsequence Evolves Into
1 1 (3)
2 10 (5)
3 11 (19)
4 110 (21)
5 1110 (2)(4)
6 111210 (2)(8)
7 111221 (2)(16)
8 1121110 (22)(4)
9 112211 (23)
10 112221 (21)(20)
11 11222110 (21)(24)
12 1122211210 (21)(25)
13 1211 (7)
14 121110 (6)(4)
15 1221 (9)
16 12211 (10)
17 122110 (11)
18 1221121110 (12)(4)
19 21 (13)
20 211 (15)
21 2110 (17)
22 211210 (18)
23 212221 (14)(20)
24 22110 (26)
25 221121110 (27)(4)
26 222110 (2)(24)
27 22211210 (2)(25)
The (27×27) transition matrix for this evolution rule is included in the text file at the end of this post. Its characteristic polynomial is
The maximal eigenvalue of the transition matrix is thus the largest root of x3 – x – 1, which is approximately 1.324718. It follows that the number of digits in the terms of this sequence grows on average by about 32.5% from one term to the next.
The Look-and-Say Sequence with Digits 1 and 2
Closely related to the ternary version of the sequence is the sequence obtained by reading the previous term in the sequence, but with the restriction that you can never use a number larger than 2 (see A110393). This sequence begins 1, 11, 21, 1211, 111221, 21112211, …, and the sixth term is obtained by reading the fifth term as “two ones, one one, two twos, one one”. Because only two different digits appear in this sequence, it is perhaps not surprising that its table of noninteracting subsequences is quite simple:
# Subsequence Evolves Into
1 1 (2)
2 11 (5)
3 111 (7)
4 1211 (3)(6)(1)
5 21 (4)
6 22 (6)
7 2111 (1)(6)(3)
The transition matrix associated with this evolution rule is
As before, the average rate of growth of the number of digits in the terms of this sequence is determined by the magnitude of the largest eigenvalue of this matrix. A simple calculation reveals that this eigenvalue is √φ = 1.272…, where φ = (1 + √5)/2 is the golden ratio. Furthermore, we can answer the question of how many 1s there are in the terms of this sequence compared to 2s by looking at the eigenvector corresponding to the maximal eigenvalue:
What this means is, for example, that the second elementary subsequence (11) occurs φ times as frequently as the fourth elementary subsequence (1211). By weighting the subsequences by the entries in this vector appropriately, we can calculate the limiting ratio of the number of ones to the number of twos as
Download: Transition matrices [plaintext file] |
Continue reading the main story
The contemporary desire for interactivity in the experience of art derives, obviously, from the heady sense of control over information to which we've become accustomed as users of computers. The problem with applying that model to works of art is that in order to get anything out of them, you have to accept that the artist, not you, is in control of this particular package of ''information.'' And that's the paradox of movies on DVD: the digital format tries to make interactive what is certainly the least interactive, most controlling art form in human history.
When you're sitting in a movie theater, the film is in absolute, despotic control of your senses. It tells you where to look and for how long, imposes its own inarguable and unstoppable rhythm, and your options for interaction are pretty severely limited. You can wise off quietly to your companion or loudly at the screen, or, in extremis, you can walk out, but nothing you can do, short of storming the projection booth, will affect the movie itself: it rolls on serenely without you, oblivious as the turning world.
It's that imperious, take-it-or-leave-it quality that, in the early days of cinema, aroused the suspicions of devotees of the traditional arts, who would argue that watching a film denied the audience some of the freedoms available to readers -- who could set their own pace rather than meekly submit to a rhythm imposed on them by the creator of the work -- and to theatergoers who were at liberty to look wherever they wanted to at the action on stage and whose reactions could actually affect the play's performance. Eventually, we all learned to stop worrying and love the art form, but the skeptics and reactionaries had a point: the techniques of film are unusually coercive, a fact quickly grasped both by the art's early masters, like D.W. Griffith, Fritz Lang, Sergei Eisenstein and Alfred Hitchcock, who reveled in their ability to manipulate the viewer's responses, and by the leaders of totalitarian states, who recognized cinema's potential as an instrument of propaganda.
The manipulative power of cinema is neither a good nor a bad thing; it is what it is, and all movies partake of it in varying degrees. The films of Jean Renoir, for example, are markedly freer than those of Hitchcock, but the freedom they offer is relative; although the long takes, deep focus and improvisatory acting style of Renoir's ''Rules of the Game'' (1939) allow the viewer's imagination more room to roam, the director is nonetheless in complete control of what we see and what we hear. In fact, just about the only way a film artist can subvert his or her own authority is by significantly limiting the use of the medium's expressive resources, as, for example, Andy Warhol did in the mid-60's. His eight-hour-long ''Empire'' (1964), a single shot of the Empire State Building, with no cuts, no camera movement and no sound, is about as uncoercive as a film can be. It's the most interactive movie ever made.
All I'm saying, really, is that watching a film is, and should be, an experience different from that of playing Myst or placing an order on Amazon. I suspect that many DVD owners use their players exactly as I do, as a way of recreating as nearly as possible at home the experience of seeing a film in a theater. The DVD picture is sharp, the sound is crisp and the film is almost invariably presented in its correct aspect ratio -- i.e., letterboxed for movies made in wide-screen process, as all but a few since the mid-50's have been. The DVD player is, by common consent, the best-selling new device in consumer-electronics history. It's said that the ''market penetration'' of DVD players (which were introduced in 1997) into American homes is progressing at a rate twice that of the VCR. And the unprecedented ''penetration'' of this format cannot be attributed solely to the Rohypnol of advertising hype; the DVD is a distinct improvement over the videocassette, and even over the extinct laserdisc.
But the DVD is a gift horse that demands to be looked squarely in the mouth, because it has the potential to change the way we see movies so profoundly that the art form itself, which I've loved since I was a kid, is bound to suffer. What does it mean, for example, when a director recuts or otherwise substantially alters the theatrical-release version of his or her film for the DVD, as Peter Jackson did for the four-disc Special Extended Edition of ''The Lord of the Rings: The Fellowship of the Ring''? This cut, half an hour longer than the film that was shown in theaters and that sold millions of copies in its first two-disc DVD incarnation just four months earlier, is obviously the definitive version of ''Fellowship'': clearer, fuller, richer emotionally and kinetically. Better late than never, I guess, but I still felt a little cheated at having to watch this grand, epic-scale adventure on the small screen. And don't the hardy souls who every now and then peel themselves off their Barcaloungers, trek to the multiplex, stand in line for $4 sodas and dubious popcorn and then subject themselves to the indignity of sitting in a room with hundreds of rank strangers -- don't they deserve the best version of the movie? At least when Steven Spielberg re-edited and digitally rejiggered his ''E.T.: the Extraterrestrial,'' he had the decency to give it a brief stopover in movie theaters on the way to its final destination as a multidisc Limited Collector's Edition DVD.
It's thoughtful of Spielberg, too, to include in the DVD package, alongside the spiffy new ''E.T.,'' a disc containing the original 1982 theatrical version of that justly beloved movie, which is not only the sole extra worth watching in the whole overstuffed grab bag of goodies -- what viewers, I wonder, are thrilled to discover therein a two-hour film of John Williams conducting the score at the Shrine Auditorium? -- but is also a stern warning to filmmakers who might be tempted to tinker with their past work: in almost every respect the old version is better. Although the two brief scenes Spielberg has restored to the picture are nice, you wouldn't miss them if they weren't there (as the filmmaker evidently didn't when he left them on the cutting-room floor two decades ago), and the digital removal of the guns carried by the government agents in the original's climactic chase just seems silly.
What's most damaging to ''E.T.'' is the way Spielberg has tampered with the movements and facial expressions of the eponymous alien itself. A team of computer wizards has labored mightily to make E.T. cuter -- an undertaking that, as even those of us who admire the picture would have to agree, has a distinct coals-to-Newcastle quality.
I'm sure most filmmakers occasionally look at their past movies and wish they'd done one thing or another differently, but before the rise of the DVD, they rarely received much encouragement (i.e., financing) to roll up their sleeves, get under the hood and fine-tune or soup up their vintage machines. That state of affairs changed when the consumer-electronics industry discovered, to its delight, that many members of its affluent and highly penetrable market could be induced to buy the same entertainment product, with variations, over and over again. (One day you wake up to find you have 17 ways of listening to Elvis's ''Heartbreak Hotel.'') For movie lovers, a new DVD Director's Cut of ''The Fellowship of the Ring'' or ''E.T.'' or ''Apocalypse Now'' or even ''X-Men'' can be a powerful incentive to reach for the wallet yet one more time.
The restoration of older films that were mutilated before their theatrical release or that have suffered from disfiguring wear and tear is, of course, welcome. There's every reason to shell out for the DVD's of David Lean's ''Lawrence of Arabia,'' Hitchcock's ''Vertigo'' and ''Rear Window,'' with their images and sounds, which had faded badly over the years, now buffed by crack restorers, and Orson Welles's baroque 1958 noir ''Touch of Evil,'' which replaces the distributor's release cut with a version that conforms more closely to the director's own extensive notes on the editing of the film. (Like the new ''E.T,'' all those restorations played briefly in theaters.) In each of those cases, the DVD allows us to see the film as its maker wanted it to be seen.
But most of the current mania for revision appears to be driven by motives other than a burning desire for aesthetic justice. It's not that I don't believe Steven Spielberg when he says that his ''perfectionist'' impulses were what spurred him to rework ''E.T.''; it's that I don't believe that without the financial incentive of DVD sales he would have given in to those impulses -- or, perhaps, felt them at all. Although the film's 20th anniversary, last year, supplied a pretext for revision, nothing in the finished new version argues very strongly for its necessity. God knows, there are DVD packages far crasser than the Limited Collector's ''E.T.'' (For an especially pungent recent example, see ''X-Men 1.5.'') I'm picking on Spielberg here because he's a great filmmaker and a man who loves and respects the history of his art; if even he can be seduced into tampering with his own work, then the innocent-looking little DVD is rolling us down a very steep slope indeed.
Revisiting past work is almost never a good idea for an artist. Every work of art is the product of a specific time and a specific place and, in the case of movies, a specific moment in the development of film technology. Sure, any movie made before the digital revolution could be ''improved'' technically, but the fact is that the choices the director made within the technical constraints of the time are the movie. It wasn't so long ago, maybe 15 years, that filmmakers took up arms against Ted Turner and his efforts to ''modernize'' old black-and-white films by computer-coloring them. Colorization was an easy target, both because the process was surpassingly ugly and because it was inflicted on films without the consent of their makers. But would the principle have been any different if the colorization technology had been better, or if the directors had somehow been persuaded to perform the evil act themselves, on their own movies, of their own apparent free will? If Georges Méliès, the wizardly animator of silent cinema, were alive today, would he boot up his computer and take another crack at ''A Trip to the Moon''? Would we think more highly of him if he did?
That's kind of where we are with DVD's today. We're all well past the point of being shocked at the compromises people make in the name of commerce, but I still wonder why filmmakers have been so meekly compliant with the encroaching revisionism and interactivity of the digital format. For many, I suppose, it's simply a matter of taking the bad with the good. The huge upside of the DVD, for filmmakers, is that it makes their work widely available, in a form that more or less accurately reflects their intentions: they long ago learned to live with the reality that ultimately more people would see their films on a small screen than on a large one -- the directors of Spielberg's generation themselves received a fair amount of their movie education from television -- and at least on DVD the movies aren't interrupted by commercials or squashed into a ''full-frame'' presentation. So the filmmakers tell themselves, I guess, that the more insidious features of the format don't really matter: that the making-of documentaries don't make them sound like hucksters and blowhards; that the deleted scenes and alternate endings don't subtly impinge on the formal unity of the work; that all the revisions and digital tweaks they agree to don't undermine the historical integrity of the picture; that voice-over commentaries don't drown the movie in a torrent of useless information; that scene access doesn't encourage viewers to rearrange the film to their own specifications; that the user-friendly conventions of the format will not steadily erode the relationship between movies and their audience.
The men and women who make films need to put up more resistance to the rising tide of interactivity, because, ''Casablanca'' notwithstanding, there's no guarantee that the fundamental things will continue to apply as time goes by. The more ''interactive'' we allow our experience of art -- any art -- to become, the less likely it is that future generations will appreciate the necessity of art at all. Interactivity is an illusion of control; but understanding a work of art requires a suspension of that illusion, a provisional surrender to someone else's vision. To put it as simply as possible: If you have to be in total control of every experience, art is not for you. Life probably isn't, either. Hey, where's the alternate ending?
There's not much point speculating on what the ending will be for the strange process of DVD-izing cinema. Many suspect that the DVD is already the tail wagging the weary old dog of the movies. Will the interactive disc ultimately become the primary medium, with film itself reduced to the secondary status of raw material for ''sampling''? Maybe; maybe not. The development of digital technology, along with the vagaries of the marketplace, will determine the outcome, and neither of those factors is easily predictable. What's safe to say, I think, is that the DVD -- at least in its current, extras-choked incarnation -- represents a kind of self-deconstruction of the art of film, and that the DVD-created audience, now empowered to take apart and put together these visual artifacts according to the whim of the individual user, will not feel the awe I felt in a movie theater when I was young, gazing up at the big screen as if it were a window on another, better world.
I no longer look at movies with quite that wide-eyed innocence, of course, but it's always there somewhere in the background: an expectation of transport, as stubborn as a lapsed Catholic's wary hope of grace. Perhaps the DVD generation, not raised in that moviegoer's faith, will manage to generate some kind of art from the ability to shuffle bits and pieces of information randomly -- the aleatory delirium of the digital. It just won't be the art of D.W. Griffith, Jean Renoir, François Truffaut, Sam Peckinpah, Andrei Tarkovsky and Roman Polanski.
Feeling slightly melancholy, I call up David Lynch, who is not only a director whose works -- ''Blue Velvet,'' ''Mulholland Drive'' -- demand a pretty high level of surrender on the part of the viewer, but also one who has in recent years refused to allow voice-over commentary or scene access on the DVD's of his movies. ''The film is the thing,'' he tells me. ''For me, the world you go into in a film is so delicate -- it can be broken so easily. It's so tender. And it's essential to hold that world together, to keep it safe.'' He says he thinks ''it's crazy to go in and fiddle with the film,'' considers voice-overs ''theater of the absurd'' and is concerned that too many DVD extras can ''demystify'' a film. ''Do not demystify,'' he declares, with ardor. ''When you know too much, you can never see the film the same way again. It's ruined for you for good. All the magic leaks out, and it's putrefied.''
He's not opposed to DVD per se. Lynch just finished supervising the DVD of his first feature, ''Eraserhead'' (1976), which, while eschewing the usual commentary and chapter stops, will contain a few extras (the nature of which he declines to reveal). We spend a few minutes discussing one of his favorite DVD's, the Criterion Collection's ''Complete Monterey Pop,'' and agree that D.A. Pennebaker's groundbreaking concert film is the sort of movie the format serves well; even the scene access is, in this case, mighty useful. But Lynch says that filmmakers need to be very careful about the way they present their delicate, tender creations on DVD. ''Don't do anything to hurt the film, and then you're rockin.' ''
I hang up, leaving David Lynch to rock on, and find that I'm feeling more hopeful that the relationship between movies and their audience will survive the current onslaught of interactivity -- that this need not be the beginning of the end of a beautiful friendship. So I dig out the no-frills DVD of ''Mulholland Drive,'' slide it into its little tray and pick up the remote. And I tell the machine to play it.
Continue reading the main story |
'Human brain is a keener detective of auditory change than visual change'
Subscribe to Oneindia News
Washington, Jan 20 : Human brain is capable of differentiating the minutest visual and auditory changes.
However, several studies have shown that that even a small span of time in between pre- and post-change images can disturb the brain's ability to detect visual discrepancies.
In a recent study, the aforesaid psychologists assessed the effect of time gaps on change detection in audition.
The researchers' goal was to determine if the brain uses similar mechanisms to perceive auditory changes as it does with vision.
In the study, the participants detected a pitch change in one tone presented together with other tones.
The experimenters reasoned that if auditory change detection is similar to the visual process, a complex sound should be remembered less well than a simple sound.
The analysis found that the participants were able to remember even the most complex sounds despite the time delays.
The findings of the study indicate that brain uses more efficient mechanisms in auditory memory than in visual memory
Please Wait while comments are loading... |
Definition of phase noun from the Oxford Advanced American Dictionary
jump to other results
1. 1a stage in a process of change or development during the first/next/last phase the initial/final phase of the project a critical/decisive phase the design phase His anxiety about the work was just a passing phase. She's going through a difficult phase. The wedding marked the beginning of a new phase in Emma's life.
2. 2each of the shapes of the moon as we see it from the earth at different times of the month the phases of the moon
3. Idioms
in phase/out of phase (with something)
jump to other results
1. 1working/not working together in the right way The traffic lights were out of phase.
2. 2 (physics) if two or more light or sound wave cycles are in phase, their high and low points occur at the same time; if they are out of phase, they occur at different times
See the Oxford Advanced Learner's Dictionary entry: phase |
Definition of close adverb from the Oxford Advanced Learner's Dictionary
BrE BrE//kləʊs//
; NAmE NAmE//kloʊs//
jump to other results
• (closer, closest) near; not far away They sat close together. Don't come too close! She held Tom close and pressed her cheek to his. I couldn't get close enough to see. A second police car followed close behind.
• Idioms
be close to/near the mark
jump to other results
to be fairly accurate in a guess, statement, etc. Such guesses are thought to be close to the mark. ‘The Times’ was nearer the mark when it said…
near; in a place where somebody/something can be reached easily There are good cafes and a restaurant close at hand.
close by (somebody/something)
jump to other results
at a short distance (from somebody/something) Our friends live close by. The route passes close by the town.
almost; nearly She is close on sixty. It is close on midnight. a profit close to £200 million a situation in which somebody only just wins or loses, for example in a competition or an election Mr Taylor’s election defeat was a close-run thing. The invasion never happened but it was a close-run thing. in a position very near to something The picture looks very different when you see it close to.
close up to somebody/something
jump to other results
very near in space to somebody/something She snuggled close up to him.
come close (to something/to doing something)
jump to other results
to almost reach or do something He'd come close to death. We didn't win but we came close. The welfare state never came close to eliminating poverty.
hold/keep/play your cards close to your chest
jump to other results
to keep your ideas, plans, etc. secret
run somebody/something close
jump to other results
(British English) to be nearly as good, fast, successful, etc. as somebody/something else Germany ran Argentina very close in the final.
to take a risk by doing something that is dangerous or that may be illegal
See the Oxford Advanced American Dictionary entry: close |
OMG! Is there nothing worse than an ear hematoma? I currently have three patients recovering from recent bouts of the bulbous earflap phenomenon knows as the “aural hematoma.”
In these cases what happens is that the space between the cartilage of the ear and its overlying skin separates to accommodate the blood of a nearby ruptured vessel. In some pets it looks like a big bleb on the ear’s tip but in others it can reach near-balloon proportions.
Dogs get ‘em.
Cats get ‘em (though less frequently).
Even people get ‘em (rarely, thanks to our flat-against-our-skulls earflaps).
(poor kid)
Most of the time ear hematomas are considered a traumatic injury. The ear gets a vigorous shake and POP goes the vessel. Sometimes a nearby object (the wall, perhaps?) intervenes and the ear gets cracked against its surface, facilitating the unseen bleeding. Often there’s an ear infection occasioning the repetitive head-shaking, ear-flapping maneuvers which lead to the hematoma.
But there are other causes, too. Much less often, an ear hematoma can be a sign of a clotting disorder. Failure of the blood to clot normally can become evident via bruising. And an ear hematoma is simply one of the more dramatic manifestations of just that—a garden-variety bruise.
Problem is, most bruises take a reasonably long time to resolve. Because of the relatively large volumes of blood involved and the constant movement inherent to the area (especially in a long-eared dog’s anatomy), ear hematomas are especially slow-healers, regardless of its origin—more so if the underlying cause is not appropriately diagnosed and treated.
That’s why so many of you elect to have the ear surgically repaired. Though in most cases surgical repair is not strictly necessary, surgery is usually undertaken if a cosmetic outcome is desired or if the entire ear canal is occluded by the ballooning bulge of the hematoma . In these latter cases, healing of the infection (which most often leads to the problem in the first place) is made almost impossible by the size of the darn thing.
Though I relish removing all the squishy half-congealed blood and sewing up the ear quilting bee-style (one of perhaps a hundred different techniques used to treat aural hematomas), I detest the surgery’s aftermath: bandaging and rebandaging and bandaging again…
It’s a nightmare, not least for the pets whose ears have to suffer our ministrations for weeks on end. That’s why I do my best, if at all appropriate, to talk my clients out of it. “Just say no to surgery!” I’ve been known to beg.
Nonetheless, some of my clients are convinced this is an evil emergency. Should I not take my hard cold steel to the ear will it not engulf the head with its nastiness? Well…not usually…so let’s give it a few days…the ear’s not going anywhere, much though that balloon might indicate otherwise… |
University of Nevada, Las Vegas
The University of Nevada, Las Vegas completed an HIA to inform decisions by the Nevada State Legislature on proposed modifications to the availability of full-day kindergarten and on allocating state funding to support full-day kindergarten in high-risk schools. The HIA highlighted connections between full-day kindergarten and academic success. In particular, the study found that black, Hispanic, English language learners, and low-income students who attend full-day kindergarten tend to score higher on standardized tests in third and fifth grade, increasing these students’ likelihood of eventually graduating from high school. Greater lifetime educational attainment could, in turn, affect healthy behaviors such as exercise and healthful eating, reduce disease risk, and improve life expectancy. Furthermore, students in full-day kindergarten may have greater access to school meals and services, such as vision and hearing screenings, which could also improve health.
In addition to addressing the factors above, recommendations from the HIA include prioritizing funding for full-day kindergarten for schools with high levels of English language learners and students receiving free and reduced-price school lunches; promoting physical activity and healthy behaviors through school meals, nutrition programs, recess, and exercise programs; and evaluating the effectiveness of full-day kindergarten.
HIA in the United States
Search our Interactive Map
View the Map
At A Glance
Completion Date
2015, June
Organization Type
Educational Institution
One year |
The Mind-bending Physics Behind Interstellar, with Neil deGrasse Tyson & Christopher Nolan
Most of us are aware of the concept of time travel. In any case, it appears almost everywhere in our science fiction. There are as well a lot of giant and powerful black holes. From Star Trek to Doctor Who to Star Wars, science fiction is jam-packed with things that comes between actuality and imagination. But where does one should actually stop and the other begin? As it turns out, physics is a bit foggy, and from time to time it is a rather tough to draw a perfect line in the sand. Take one of the most recent box office successes, Interstellar. Just how precise is the physics in this movie? As it turns out, quite precise. Although it would be a bit of an expanse to say that every part of Interstellar was 100 percent scientifically correct, most of the movie was scientifically conceivable.
Certainly, Christopher Nolan’s Interstellar summonses scientific critique. They called upon theoretical physicist Kip Thorne, to assist as a script adviser and executive producer on the film, and they also issued a companion tome, The Science of Interstellar, clarifying many of the scientific ideas used in the movie. Here, astrophysicist Neil deGrasse Tyson argues about the science behind the film with Nolan. Go on a journey to discover some of the most motivating ideas in physics:
“Explore Einstein’s Theory of Relativity, the math that supports the possibility of time travel, the physics of wormholes and the practicality of warping space-time. Learn why clocks tick faster on the ISS and GPS satellites than they do here on Earth, why neutron stars have powerful magnetic fields, and why hydrogen appears twice on the periodic table. Plus, Neil recites his poem about falling into a black hole, and Bill Nye “rants” about why there’s no place like home, not even on an exoplanet or Mars.”
The Mind-bending Physics Behind Interstellar, with Neil deGrasse Tyson & Christopher Nolan The Mind-bending Physics Behind Interstellar, with Neil deGrasse Tyson & Christopher Nolan Reviewed by Umer Abrar on 5/27/2015 Rating: 5
1 comment:
1. Neil Degrasse Tyson T-shirts. The good thing about science is that it's true whether or not you believe in it. Let me get this straight...we are expected to believe on faith like religious people that all theories and concepts of science are true whether we believe it or not? Does anyone here realize how bizarre that statement is? Theory does not equal fact. This is exactly the same as saying the Bible is true whether you believe it or not. How's that for powerful manipulation brainwashing. And science makes fun of religious people that believe on faith? There is no reality, only our perception or delusion of reality, which ever you chose to believe. If you let yourself fall victim to a belief bias of any kind that's when you start forcing the pieces together, even when they don't fit at all. Its medication folks grin.
Is pop science becoming a cult? Cult's typically reduce things to black and white. Shades of grey are strictly forbidden, not allowed. After all if theirs alone is the ultimate Truth, than every other group must be wrong, which leads to an 'us versus them' mentality. You're either with the group or you're an outsider. (This is often the aspect of the paranoia of cult leaders, as well) You must accept everything without question or not. You must except theory as fact or not, or you will be shunned by the group as a non-believer. This goes part of the way to explaining how group members end up distancing themselves from other groups like people that believe in God, after all they know nothing about science, how could they if they believe in God?. Enter Science vs religion. These followers of celebrity science are made to believe that outsiders (i.e., those not in the group following science) are a bad influence and are stopping them from growing, evolving, progressing in some way.
The cult psychology of black and white thinking extends to many other areas, too. You are fully committed or not, either you believe in the teachings, concepts and theories of science or not, you must accept everything without question or not. You must except theories, and concepts as fact or not, how's that for powerful manipulation brainwashing. This pseudo- identity is designed to protect itself. Using reason and logic with them is usually hopeless and counterproductive because it only serves to isolate the person further. Discussions are counterproductive with group members as they teach that family, friends and outsiders will not understand, either you believe in science or not. These members avoid any discussions about their cult like traits. The similarities are exactly the same as any religious cult, viewing outsiders as blasphemer's, the evil of the devil attempting to hamper their true knowledge.
Autonomous thoughts and ideas seem to be prohibited by the same people who profess themselves to be free from the shackles of belief. The comments from these supposedly freethinkers are the antithesis of what they proclaim to be.
Template images by sololos. Powered by Blogger. |
Its blazing yellow eyes seem triumphantly wild.
We almost lost this magnificent predator to man-made poison – DDT.
Everyone needs a reminder that it was a very close call.
Now, there are so many eagles on the Delaware River (from Canada, joining year-round resident eagles) that they're being tracked by “eagle paparazzi,” says Patricia Diness, a staffer with the new Delaware Highlands Conservancy.
“It's like watching someone at a buffet,” says Diness.
“I still get goose bumps when I see them,” says Orey. “And to think what they've gone through, and come back from almost becoming extinct.”
Watching and studying eagles “is captivating; and once you get into this, you can't stop,” says Kevin Keller of South Fallsburg, another eagle-veteran Conservancy volunteer.
“I've often told Patricia it's a good thing you don't pay me, because I'd have to give it back – and probably 99 percent of the volunteers feel same way,” he says.
And yes, they feel that way even on freezing days.
“We were out there on Jan. 4, and it was so cold you wouldn't believe it, but some people looking for eagles did show up,” says Keller.
The Delaware River's big eagle population has become widely renowned.
“Now the thing is, keep habitat for them,” says Diness. “And though they're off the endangered species list, they could go right back on it if were not really, really careful.”
It was touch-and-go, but it worked.
In a word, bald eagles are “marvelous” survivors, says Keller.
They're also our national symbol.
|
Heat management in CSP
Joyce Laird
The PRATT & Whitney Rocketdyne (PWR) name is normally connected to rocket science and high-powered engine technology, but this aerospace leader is now lending its extreme heat management expertise to the renewable energy industry…and the CSP sector in particular. Could this be an indication that the much heralded “demise” of CSP is somewhat premature?
Pratt & Whitney Rocketdyne (PWR) chose to focus on renewable energy when it became apparent that the energy management and materials-design capability that keeps rocket systems operating efficiently in outer space could provide benefits to terrestrial solar systems.
Randy Parsley, program area manager of PWR's Renewable and Alternative Energy division, Canoga Park in California, says that while the company is looking at a wide range of potential solar technologies, currently there is one flagship solar thermal project on its slate: Concentrating Solar Power (CSP), using molten salt thermal storage technology.
Why start with CSP technology?
To truly understand the new focus, says Parsley, one needs to look at PWR's heritage – which includes many years working with the Department of Energy (DOE) on energy projects: “This includes cooling nuclear reactors with molten salt or liquid metal, and of course our years of success with thermal control situations in the space program,” he says. “Moving into the renewable energy industry was a natural step for us. We took our existing capability and configured it into a solar/thermal receiver configuration”.
The first limited CSP tests with molten salt were done on a small scale in the early 1990s. The project, called Solar Two, was a DoE-funded project, and this proved the viability of thermal energy storage with molten salt, which forms the basis of PWR's current commercial activity.
PWR's molten salt technology has been exclusively licensed to SolarReserve, headquartered in Santa Monica CA. This US-based international developer of solar power projects develops commercial scale solar projects using PWR's technology: “Today, the first commercial scale project using the technology is under construction in Nevada. It leverages this experience but is 10 times larger than the original demonstration project,” Parsley says. SolarReserve received a US$737 million U.S. Energy Department loan guarantee to build the project – the 110 MW Crescent Dunes project, near Tonopah, Nevada.
PWR's high temperature molten salt technology
The type of salt used in the PWR CSP concept has a different chemistry, but is not unlike, basic fertiliser, which is solid while at room temperature. However when the salt used in CSP plants is heated to 550 degrees F, it transforms into a liquid that looks and behaves somewhat like water. Further, it remains a liquid at low pressure up to over 1,050 degrees F, at which point it creates high-temperature steam to drive a standard (though more efficient) steam generator:
The way this plant works – the “cold” liquid salt returns from the steam generator to be stored in a large tank at 550 degrees F, and is then pumped up the tower to the top of the receiver.
In the receiver, the sun's concentrated solar power heats the liquid salt to over 1,050 degrees F, and that is “the key”, says Parsley: “That is where PWR has the knowledge and expertise because of former applied aerospace and rocket technology. That is the difficult part of the design.”
The 550-degree salt runs through tubes that have special materials and high-heat transfer rates, which correlate with many of the issues that PWR rocket projects have faced and solved. When heated to 1,050 degrees F, the molten salt comes back down from the top of the receiver to a “hot tank” that, over the course of a day, fills up with this 1,050-degree salt to store thermal energy.
“Now, what you have is a large tank of high-temperature salt, storing the sun's thermal energy, so that it can be used to create steam any time it is needed,” Parsley says. “You just pump some of that hot salt through a heat exchanger to create steam. While you are creating this steam, the salt cools down back to 550 degrees. It is then cycled back into the cold tank to be reheated by the sun's thermal energy the next day.”
What makes this technology unique for CSP is that the salt is a completely closed loop system and requires little or no replenishment. Parsley says that it doesn't ever change in basic composition. “Water turns to steam and back. Salt is different because it does not ever change its phase from liquid to gas. It's pure liquid salt at 550 degrees and when it is heated to 1,050 degrees, it is just the same liquid salt – only hotter. Also, since there is no phase change, there is no significant change in the pressure or volume of the salt. This allows overall system pressures that are much lower. You just use the same salt over and over, every day, 365 days a year.
“By simply optimising the solar field for more storage, enough energy can be stored to run for 8, 10 or even 24 hours without the sun. It can easily run all the way through the night without the sun. That is our expertise. And that's the technology we exclusively licensed to our customer, SolarReserve,” Parsley adds.
The heat is on
There are of course other CSP plant configurations using molten salt, but they are ‘bolt on' systems, meaning they are added on to the plant. Also, ‘bolt on' salt systems do not achieve the high temperatures that the power tower with integrated storage does. According to Parsley, some trough plants have molten salt bolted onto their main plant but it is much less efficient: “They can't get the temperature much above 700 degrees,” he says, “and there is a big difference between 700 and 1,050 degrees; this is where our experience with rocket engines comes in. We have so much experience in heat transfer under very challenging conditions that we can manage this extreme heat very efficiently.”
The configuration of this type of plant is a large tower (500 to 600 feet high) in the centre of a reflector field. The 100-foot tall PWR receiver sits on top of that tower. This receiver is manufactured to PWR-proprietary specifications, drawing on its space program design expertise.
The receiver consists of 14 panels, each containing 66 tubes. The 14 panels are assembled in a cylindrical formation. Each tube is approximately 80 feet long and made of a proprietary composition with a coating that absorbs the sun. Parsley says the assembled receiver looks like a big black cylindrical radiator:
“When the sun is aimed onto the receiver, the tubes get hotter and hotter. When fully operational capturing the sun's energy during the day, the tubes glow white hot. To ensure tower integrity, PWR has also provided the heat shielding that is placed above and below the panels to keep other parts of the receiver from becoming hot”.
Surrounding the 650-foot tower, with the receiver on top, are thousands and thousands of movable mirrors, called heliostats. Each one of these mirrors moves every 10 seconds to reflect the sun back to the receiver at the top of the tower to heat the salt to 1,050 degrees.
Along with this proprietary receiver and heat-control technology, PWR supplies the control system for all of the mirror assemblies. “Our software tells each mirror where to point every 10 seconds,” Parsley says. “We are responsible for this receiver operation and durability. We also have performance warranties that we provided; we have to be in control of how much energy gets placed upon this receiver. Therefore, we also provide the software for the collector field.”
Along with Crescent Dunes' SolarReserve plant currently under construction in Nevada, U.S., PWR has a separate US$15 million DoE technology contract, specifically focused on reducing the cost of this type of plant in the future.
Crescent Dunes meanwhile, is set to be online and producing power by December 2013.
Currently, this CSP project represents the initial major step for PWR's focus for growing the renewable energy business. However, the company has indicated that there are several things in the pipeline related to other solar and renewable energy avenues.
This is just the beginning for PWR, which is looking beyond CSP into CPV, Waste-to-Energy and some biomass opportunities, but as Parsley says, “these emerging technologies must be competitive in the marketplace without incentives or they are not going to make it.”
It will be interesting to see whether CSP will ever truly fall into this category. One thing is certain: Companies with the expertise of PWR entering the sector can only help strengthen its credentials further.
PWR and the case for CSP
As is well known, CSP projects operate by concentrating the sun's thermal energy to eventually make steam that drives a steam turbine and generator. There are a few different CSP technologies, but the most common are either the trough or power tower systems.
For CSP solar trough systems, the sun is first concentrated to heat oil before the hot oil is used to make steam that in turn, drives a turbine to produce power.
With solar power towers, the sun is reflected to a central receiver that sits atop a single tower in the centre of the mirror field. Some power towers, such as the technology that was developed by PWR, use molten salt as the energy capture fluid, which allows for energy storage, and the ability to generate steam whenever needed, day or night.
Direct-to-steam CSP systems, whether trough or tower, are harder to control, PWR's Parsley says, and it is very difficult and expensive to add even a limited amount of storage, far short of the molten-salt approach.
All CSP has some thermal inertia that improves the ability for grid integration. From this respect, it is better than solar PV and CPV, which exhibit power fluctuations due to clouds passing over the field. But this thermal inertia is really not enough to make CSP technology truly competitive to PV or CPV in a market increasingly driven by cost.
But according to PWR, its molten salt technology brings a large change to the issue of intermittency – with the ability for long-term storage and reliable power generation, making CSP much more competitive in cost, with higher-value power that can be dispatched when needed.
Share this article
More services
This article is featured in:
Solar electricity
Comment on this article
|
You are here
What Drinking Green Tea Can Really Do for You
But if you dig into the actual health effects of the brew, you'll see that a lot of studies have been done on animals or on cell cultures. Adding to the confusion, despite all that's been printed, the FDA has shot down most statements about green tea benefits, and the approved ones aren't exactly inspiring: “Green tea may reduce the risk of breast or prostate cancer although the FDA has concluded that there is very little scientific evidence for this claim.”
So what can a cuppa green truly do for you? Anandh Babu Pon Velayutham, Ph.D., an assistant professor of nutrition at the University of Utah, studies the effects of green tea. He clears up the confusion on five claims:
Green Tea Boosts Metabolism
True. This is one of the claims dieters live by, so the good news is that it's true. Study after study has shown that green tea can boost your body's ability to burn fat, in turn helping you lose weight. [Tweet this news!] Of course, for best results you'll want to make other dietary changes, such as eating more protein and leafy greens and less sugar.
RELATED: 20 Genius Ways to Use Matcha
Green Tea Can Improve Cholesterol
Green Tea Can Prevent Some Cancers
Green Tea Helps Reduce Blood Sugar Levels
Green Tea Improves Brain Function
Maybe. A new piece of research from the University of Basel found that drinking green tea might help with short-term recall, but further testing is required to make any sort of official claims related to memory. [Tweet this fact!]
RELATED: Why Can’t I Remember Names Anymore?!
And, although a number of the green tea studies tracked the use of green tea extract supplements, Velayutham says you can expect the same benefits when you drink actual cups of steaming green tea. He recommends drinking about 3 cups of green tea a day and forgoing the supplements entirely because too many green tea catechins can be a bad thing. As many as 10 cups of green tea each day is safe, but it's easy to go above that dosage when taking pills instead.
By Jessica Cassity for |
The Sukhothai kingdom was an early kingdom in the area around the city Sukhothai, in north central Thailand. It existed from 1238 till 1438. The old capital, now 12 km outside of New Sukhothai in Tambon Muang Kao, is in ruins and is a Historical Park
The city of Sukhothai was part of the great Khmer empire until 1238, when two Thai chieftains, Pho Khun Pha Muang and Pho Khun Bang Klang Hao, declared their independence and established a Thai-ruled kingdom. Pho Khun Bang Klang Hao later became the first king of Sukhothai, calling himself Pho Khun Si Indrathit (or Intradit). This event traditionally marks the founding of the modern Thai nation, although other less well-known Thai kingdoms, such as Lanna, Phayao and Chiang Saen, were established around the same time.
Sukhothai expanded by forming alliances with the other Thai kingdoms, adopting Theravada Buddhism as the state religion with the help of Ceylonese monks. Intradit was succeeded by his son Pho Khun Ban Muang, who was followed in 1278 by his brother, Pho Khun Ramkhamhaeng. Under King Ramkhamhaeng the Great, as he is now known, Sukhothai enjoyed a golden age of prosperity. Ramkhamhaeng is credited with designing the Thai alphabet (traditionally dated from 1283, on the evidence of the controversial Ramkhamhaeng stele, an inscribed stone allegedly bearing the earliest known Thai writing). At its peak, supposedly stretching from Martaban (now in Burma) to Luang Prabang (now in Laos) and down the Malay Peninsula as far south as Nakhon Si Thammarat, the kingdom's sphere of influence was larger than that of modern Thailand, although the degree of control exercised over outlying areas was variable.
After Ramkhamhaeng's death, he was succeeded by his son Loethai. The vassal kingdoms, first Uttaradit in the north, then soon after the Laotian kingdoms of Luang Prabang and Vientiane (Wiangchan), liberated themselves from their overlord. In 1319 the Mon state to the west broke away, and in 1321 Lanna placed Tak, one of the oldest towns under the control of Sukhothai, under its control. To the south the powerful city of Suphanburi also broke free early in the reign of Loethai. Thus the kingdom was quickly reduced to its former local importance only. Meanwhile, Ayutthaya rose in strength, and finally in 1378 King Thammaracha II had to submit to this new power.
Silajaruek Sukhothai (Stone Inscriptions form Sukhothai kingdom) are hundreds of stone inscriptions that form a historical record of the period. Among the most important inscriptions are Silajaruek Pokhun Ramkamhaeng (Stone Inscription of King Ramkamhaeng), Silajaruek Wat Srichum (an account on history of the region itself and of Srilanka), and Silajaruek Wat Pamamuang (a Politico-Religious record of King Loethai).
Sukhothai became a tributary state of Ayutthaya between 1365 and 1378. In 1412 Ayutthaya installed a chief resident, and King Thammaracha IV was installed on the throne by Ayutthaya. Around 1430 Thammaracha moved his capital to Phitsanulok, and after his death in 1438 the kingdom was reduced in status to a mere province of Ayutthaya.
From Wikipedia, the free encyclopedia |
Quick Quiz
Suitable for any level.
Make several photocopies of the front of a 'Word Up' question sheet from a level of difficulty suitable for your class. You will need one copy for every two students.
How it Works
1. Divide the class into pairs and place a copy of the question sheet face down in front of each pair.
2. Explain that the members of each pair must work together to answer as many questions as they can within ten minutes. They should write their answers on their question sheet and may answer the questions in any order they wish. If they can think of more than one answer for a particular question, they should write this also. (If correct, these 'extra' answers are included in the pair's score.)
3. Check your watch and then say "Go!". Each pair then turns over their question sheet and begins writing their answers. You might like to give a 'two-minute' and then a 'one-minute' warning as time runs out. Stop the quiz after exactly ten minutes.
4. After the quiz, read each question and elicit answers from your class. If no-one can answer a question correctly, give the correct answer(s). Each pair notes the number of correct answers they have written (including any 'extra' answers). The pair with the highest number wins.
- If your class has an uneven number of students, have them form one group of three with the rest in pairs.
- If you would like your students to do two quizzes, print out copies of another set of questions from either the same level of difficulty or from a higher level to make the second quiz more challenging.
<< Back to free games
© 2009 TEFLGames.com |
Tuesday, April 6, 2010
People say that the land beneath Paris is like Swiss cheese. Outside the frequented subway, most tourists and residents spend their lives aware of only the Paris aboveground. But beneath the thin slice of city on the crust is a vast city below known only to a few.
Since the start of the Middle Ages, Paris has been built just as much underground as it has above. As deep as 30 meters below the city, subways, sewers, telephone grids, quarries, water lines, bomb shelters, crypts and tunnels for both the living and the dead form one of the largest man-made underground networks on the planet.
Just before the 19th century, Paris public health officials ordered all the cemeteries inside Paris closed. The remains of some six million dead, three times the current living population of Paris, needed to find a new final resting place. A network of quarries below the city was the decided destination for the bones.
If you have ever wondered now much space six million skeletons take up, the answer is a massive amount. Le Tombe-Issorie, now simply known as Les Catacombes, is a city for the dead below the city for the living. These anonymous bones are stacked underground in macabre arrangements.
Visitors are welcome in select areas of the catacombs, but because of its massive size, most of it remains forgotten. Or at least, forgotten to public.
The forgotten maze of taverns and passageways in the catacombs has spawned a class of people called cataphiles, or catacomb lovers. Using old maps of the quarry, and using technology to make digital layouts, these youthful lawbreakers have become masters of this underground world. Equipped with headlamps and knowledge of these forbidden caverns, they escape to Paris’ underground where they gather in groups around campfires, drinking beer, playing guitar and, of course, making crapes.
Though these groups normally number only a few, there have been underground concerts in these caverns with hundreds in attendance. The cataphiles are drawn here by the same force that has always drawn youth: an exciting place that they are forbidden by law from entering.
I first learned of the catacombs and their lovers at a bar in Paris’ Montmarte Quarter. In the same district where Picasso, Renoir and other artistic innovators famous enough to only need a last name, once drank wine and remade the world before blank canvasses, it seemed a good place to ask, “Can we make an unofficial visit to the catacombs?”
“Yes!” my friends answered, and we began to make plans.
But having only a short time left in Paris was not enough for these plans to be carried out and I left without a visit to them. I learned that when doing illegal things in Paris, you should give yourself at least a few days to plan properly. I was at least able to talk with Parisians who had been visitors to this underground world. They showed me photos and told me their tales.
Aboveground, Paris, like all big cities, can be hectic. Everyone is rushing to anywhere. But below ground, people can be and do as they like. Provided, of course, they don’t get caught. Liability behooves me to warn any would be unofficial visitors that any illegal activity carries with it an array of risks. The book, “Beneath Paris,” cautions appropriately:
Visiting subterranean Paris outside designated areas is not to be taken lightly. Authorization is imperative, as is strict adherence to safety regulations. Otherwise, intruders may be prosecuted, or worse. Serious accidents, deadly accidents, do happen. We will spare you an exhaustive list, but intruders run the risk of falling, drowning; being asphyxiated by toxic gases, being electrocuted; being crush by falling rocks, catching any number of infections, and getting lost.
Not finding a good cataphile guide in time, I opted not to run these risks. I would not recommend anyone taking them. Having said that, sound advice is not what stops risk-takers from taking risks. People run risks all the time for a thrill. We jump out of planes, attach bungee cords to ourselves and jump off bridges, and go careening down snow-covered peaks with one or two boards attached to our feet. Traveling, and just living, is risky.
Since the size of the catacombs makes it virtually unguardable, cataphiles will continue to visit, and if you talk to one of them, they will encourage you to join them and tell you that it is not risky if as long as you know what you are doing.
I have heard that said many times and seen both positive and negative outcomes happen to those uttering these words. So if I go to Paris again, an unofficial visit to the catacombs will certainly be something I will consider.
By Luke Armstrong
About the Author
© 2016 |
Go to the Globe and Mail homepage
Jump to main navigationJump to main content
'Financial advisers': What exactly do they do? Add to ...
To the uninitiated, a financial adviser is a financial adviser is a financial adviser. But behind the scenes, a more fragmented and convoluted flow-chart you could not create.
Some advisers are only allowed to sell mutual funds and government savings bonds. Some are licensed to also sell exchange-traded funds and individual securities like stocks and bonds. Life insurance agents can sell products that on the surface look and feel like mutual funds, but carry some complex features and benefits with arguably much less compliance and regulatory burden. And those who offer broad advice or coaching but who do not advise or transact on securities with respect to an individual’s particular circumstances are not even required to be licensed at all. They can provide guidance on asset allocation and can steer investors to model portfolios that they can implement themselves, as well as provide financial planning.
Different financial adviser licensing bodies have different licensing requirements but compared to graduating medical or law school, they are all about the equivalent of one semester in summer school. Of course, many advisers study and train beyond the relaxed licensing requirements, which is a good thing. The flipside of that coin is that there are dozens of designations an adviser can put behind their name which further confuse the public.
Just looking at financial planning alone, here are three you might come across: the Certified Financial Planner (CFP), the Registered Financial Planner (RFP), and the Personal Financial Planner (PFP) designations. If a problem of choice isn’t enough to wrap one’s brain around, across most of Canada anyone can simply call themselves a financial planner without any licensing or designations.
A former colleague of mine had earned seven different designations but chose to only use three: the CFA (Chartered Financial Analyst), the CFP, and the FCSI (Fellow of the Canadian Securities Institute). His belief was that having the better part of the alphabet after his name was more laughable than laudable.
He’s right. If there are so many designations available, the perceived value of those designations diminishes. Some require a few weeks to obtain, others require the sacrificing of one’s personal life for the better part of three years. How does the average consumer tell the difference?
Consumers should not be left to hope, as they walk into the financial adviser’s office, that this is the right fit for them. Everyone acknowledges that financial literacy could be higher, but that’s only part of the solution. A collective professionalization and simplification of the industry itself, from top to bottom, is necessary to install a higher level of confidence from consumers.
Consumer advocates aren’t the only ones pushing for this change – so are financial advisers themselves. Advocis, an association representing over 11,000 advisers in Canada is asking for tougher standards right on the front page of their website.
Is it too much to ask that someone who merely takes orders, or has a monthly quota for credit card accounts to open, is not commonly, or from a regulator’s perspective, called a financial adviser? Can we reserve that for professionals who provide comprehensive planning and advice, and who act in the best interests of clients above anyone else?
Report Typo/Error
Follow on Twitter: @preetbanerjee
Next story
In the know
The Globe Recommends
Most popular videos »
More from The Globe and Mail
Most popular |
Sino-Soviet Split
Published: 1967
Play Audio Archive Story - UPI
Announcer: In 1967, the rift between Russia and Red China was intensified, and they made no attempt to hide the feud. Radio Moscow had this comment.
Radio Moscow: "The Soviet Union has warned China, they reserve the rights to take any 5:36 steps necessary, unless China ensures the right and of public citizens."
Announcer: Charges and countercharges between Peking and Moscow almost led to a break in diplomatic relations.
If Mao lost any sleep in 1967, it was because of his countryï?½s internal unrest, and not the feud with Russia. This unrest which led to purges of Mao's dissenters, didnï?½t help to get them into the United Nations this past year. Neither did the fact that they exploded their first hydrogen bomb.
A move to seat them in the United Nations failed again; the move has failed since 1950. While relations with the two giants of communism teetered, Russia and the United States took action to cement their relationship. Although there was stiff congressional opposition to it, a councilor treaty between Moscow and Washington was passed.
A space treaty was agreed to by the United States, the Soviet Union, and 60 other nations. The treaty limits military activities in space. Signing the treaty for Russia at the White House was their Ambassador, Anatoly Dobrynin.
Anatoly Dobrynin: "Outer space presents a new great challenge to mankind. International cooperation in this field, on the basis of equality provided for in the treaty will allow all countries to actually participate in the peaceful exploration and use of outer space."
Announcer: The District Attorney of New Orleans, Louisiana, became an internationally known figure when he decided to launch his own investigation of the assassination of President Kennedy. District Attorney James Garrison tells why.
James Garrison: "We began looking in to the question of a possible role of individuals in the City of New Orleans with regard to what ended up as the assassination of President Kennedy. When I began studying this out of curiosity, some of the material written about the Warren Commission Report."
Announcer: Despite criticism from many sources, Garrison is determined to continue his investigation.
Continuing too is the race to the moon, but the efforts by the United States and Russia came to a tragic halt early in 1967. This was the announcement from Cape Kennedy.
Unknown Speaker: "A fire broke out, there has been a fatality, we do not know who it is yet. We are waiting on word now from the Cape."
Announcer: The complete story of space, tragedy, failure, success, coming up next on United Press International's 1967 In Review.
Most Popular
Jerry 'The King' Lawler, Lita removed from WWE weekly programming
Oakland Raiders at Kansas City Chiefs: Preview, prediction, pick to win
Cat assists in capture of Pennsylvania fugitive
Georgia cargo plane crash kills pilot
Amy Schumer responds to critics of recent 'Barbie' casting: 'They can scream as loud as they want' |
Accessibility links
Millions of Hindus Take Holy Dip in River Ganges on Last Day of Religious Festival
• Anjana Pasricha
In the northern Indian town, Haridwar, millions of Hindu devotees have taken a ritual bath in the Ganges River on the last of four auspicious days during a three-month religious festival. The festival, billed as the world's biggest religious gathering, has attracted more than 40 million pilgrims since it began in mid January.
The bathing ritual marked the climax of the three-month Hindu festival known as the Kumbh Mela. Wednesday was the last of four days which are considered to be particularly auspicious for the dip in the river which Hindus regard as sacred.
Organizers estimate that more than eight million people took a dip on Wednesday, along a 15 kilometer stretch of the river. The first to participate in the ritual were hundreds of Hindu holy men called "naga sadhus." The naked, ash-smeared ascetics live and meditate in seclusion in forests and mountains and only emerge to take part in the Kumbh festival. Dozens of foreigners also took part in the ritual.
Hindus believe the ritual bath in the Ganges cleanses them of sin and frees them from the cycle of birth of rebirth.
The Kumbh Mela attracts staggering numbers. Organizers say as many as 40 million people have streamed into temple-dotted Haridwar since mid January when the festival began. It concludes later this month.
The festival's chief organizing officer, Anand Bardhan, outlines the logistics of housing the devotees in pilgrim encampments.
"It is just very massive planning and massive execution, which includes security forces, security arrangements, the sanitation, the medical facilities, the water supply, the power supply etc," said Barhan.
Just before the start of Wednesday's bathing ritual, two people were killed when they were hit by a car carrying Hindu holy men.
On top of the agenda for organizers is preventing stampedes. There have been previous mishaps at previous festivals. Dozens of people were crushed to death in a stampede 2003.
The Kumbh Mela is held every three years and commemorates a mythical battle between the gods and demons about a pitcher containing the nectar of immortality. Four drops are said to have fallen on four different Indian towns and the festival rotates between these towns.
It has been described as a spectacle of devotion unparalleled for its sheer scale and color. |
Digital Electronics/Number Base System
From Wikibooks, open books for an open world
Jump to: navigation, search
In digital electronics how information is represented is key and there are different radices, i.e. number bases, that a numbering system can use, with the most common ones being: binary (base-2), octal (base-8), decimal (base 10) and hexadecimal (base 16). When a reference is made to a numbering system's base, i.e. its' radix, the base number represents the number of digits used in that numbering system. As an example, we are all familiar with the decimal numbering system and the digits used it are: 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9. The numbering systems that have a base/radix less than 10 recycle the "digits" used to be common with the decimal numbering system. Therefore the digits for binary are: 0 and 1, the digits for octal are: 0, 1, 2, 3, 4, 5, 6 and 7. For the hexadecimal numbering system, base 16, the digits are: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F.
The decimal numbering is obviously linked to the fact that us humans have 10 fingers...10 digits. However, the other "common" numbering systems in digital electronics are linked to logic, in particularly boolean logic and boolean algebra as developed by George Boole. In logic, including the philosophical kind, there can only be two answers: TRUE or FALSE. In digital electronics, we can represent TRUE as a high voltage (historically 5 Volts, but it has changed to save power) which we denote as a 1 and we represent FALSE as low voltage (0 Volts, but lower voltages can also be used too) which we denote as a 0. Therefore with two values to work with we then have the binary numbering system. The octal numbering is simply a more compact group of three binary digits. So instead of having to type "101" we can just type "5"; assuming that the numbering system is known to be octal based. In a similar manner, hexadecimal based numbering system is based on a grouping of four binary digits, so "D" is easier to type instead of "1101"
Beyond Digits, Representing Numbers[edit]
Now that we understand a numbering system's radix, the next step is to use these digits to present numbers, ideally large numbers. Independent of the numbering system's radix, the order of digits as they are listed in the representation of a number is of GREAT "significance", pardon the pun, and needs to be fully understood to be able to use any numbering system properly; even the decimal numbering system. The digit furthest to the right has a numerical weight of , which is always 1 given that any number raised to the zero power is one. The next digit moving to the left has a numerical weight of , which is the first digit where the radix value begins to being a factor. The weighting for each subsequent digit continues to increase by one with respect to the "power" that the radix is raised. And like in our more traditional decimal numbering systems there are ALWAYS zero digits in front of the highest weighted digit, but we simply do not bother writing all those zeros as such zeroes are not significant. The same is true with other radices, hence the order of the digits is representing a number in any radix is significant.
The next sections provide illustrations on how numbers are represented in the differing radices.
Number of Base Two[edit]
Base two numbers only use the two digits 0 and 1 . Any number greater than 1 is represented by a series of 0 and 1 digits
= 14
Numbers that contain only two digit 0 and 1 are called Binary Numbers. Each 0 or 1 is called a Bit, from binary digit. A binary number of 4 bits is called a Nibble. A binary number of 8 bits is called a Byte. A binary number of 16 bits is called a Word on some systems, on others a 32-bit number is called a Word while a 16-bit number is called a Halfword.
Using 2 bit 0 and 1 to form
a binary number of 1 bit, there are 2 such numbers 0 and 1
a binary number of 2 bit, there are 4 such numbers 00, 01, 10, 11
a binary number of 3 bit, there are 8 such numbers 000, 001, 010, 011, 100, 101, 110, 111
a binary number of 4 bit, there are 16 such numbers 0000, 0010, 0100, 0110, 1000, 1010, 1100, ..., 1111
Therefore , using n bits there are 2n binary numbers of n bits
Numbers of Base Ten[edit]
Base ten numbers use ten digits, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9. Any number greater than 9 is represented by a series of digits in the 0 through 9 range.
Numbers of Base sixteen(hexa decimal)[edit]
Base sixteen numbers use sixteen digits 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f. any number greater than 15 is represented by digits in the 0 through f range.
Communication (Conversion) between numbers of Different base[edit]
The same number 14 expressed
in base ten is 14
in base two is 1110 .
Hence , any number in our base ten system can be represented by a binary number of certain bit |
Fishing line
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Fishing line with hooks attached
A fishing line is a cord used or made for angling. Important parameters of a fishing line are its length, material, and weight (thicker lines are more visible to fish). Factors that may determine what line an angler chooses for a given fishing environment include breaking strength, knot strength, UV resistance, castability, limpness, stretch, abrasion resistance, and visibility. Most modern lines are made from nylon or silk.[1]
Fish are caught with a fishing line by encouraging a fish to bite on a fish hook. A fish hook will pierce the mouthparts of a fish and is normally barbed to make escape less likely. Another method is to use a gorge, which is buried in the bait such that it would be swallowed end first. The tightening of the line would fix it cross-wise in the quarry's stomach or gullet and so the capture would be assured.
Trolling is a technique in which a fishing lure on a line is drawn through the water. Trolling from a moving boat is a technique of big-game fishing and is used to catch large open-water species such as tuna and marlin. Trolling is also a freshwater angling technique often used to catch salmon, northern pike, muskellunge and walleye. This technique allows anglers to cover a large body of water in a short time.
Long-line fishing, also known as a trot line is a commercial fishing technique that uses many baited hooks hanging from a single line.
Snagging is a technique where the object is to hook the fish in the body. Generally, a large treble hook with a heavy sinker is cast into a river containing a large amount of fish, such as a Salmon, and is quickly jerked and reeled in. Due to the often illegal nature of this method some practitioners have added methods to disguise the practice, such as adding bait or piercing the jerking motion.
Early lines[edit]
As written in 1667 by Samuel Pepys, the fishing lines in his time were made from catgut.[2] Later, silk fishing lines were used around 1724.[3]
Modern lines[edit]
Fishing line
Modern fishing lines intended for spinning, spin cast, or bait casting reels are almost entirely made from artificial substances, including nylon, polyvinylidene fluoride (PVDF, also called fluorocarbon), polyethylene, Dacron and Dyneema (UHMWPE). The most common type is monofilament, made of a single strand. Fishermen often use monofilament because of its buoyant characteristics and its ability to stretch under load. The line stretch has advantages, such as dampening the force when setting the hook and when fighting strong fish. On very far distances the dampening may become a disadvantage. Recently, other alternatives to standard nylon monofilament lines have been introduced made of copolymers or fluorocarbon, or a combination of the two materials. Fluorocarbon fishing line is made of the fluoropolymer PVDF and it is valued for its refractive index, which is similar to that of water, making it less visible to fish. Fluorocarbon is also a denser material, and therefore, is not nearly as buoyant as monofilament. Anglers often utilize fluorocarbon when they need their baits to stay closer to the bottom without the use of heavy sinkers. There are also braided fishing lines, cofilament and thermally fused lines, also known as 'superlines' for their small diameter, lack of stretch, and great strength relative to standard nylon monofilament lines. Braided, thermally fused, and chemically fused varieties of 'superlines' are now readily available.
Specialty lines[edit]
Tenkara lines are special lines used for the fixed-line fishing method of tenkara. Traditionally these are furled lines the same length as the tenkara rod. Although original to Japan, these lines are similar to the British tradition of furled leader. They consist of several strands being twisted together in decreasing numbers toward the tip of the line, thus creating a taper that allows the line to cast the fly. It serves the same purpose as the fly-line, to propel a fly forward. They may be tied of various materials, but most commonly are made of monofilament.
Stainless steel line leaders provide:
- bite protection - it is extremely hard for fish to cut the steel wire, regardless of jaw and teeth strength and sharpness,
- abrasion resistance - sharp rocks and objects can damage other lines, while steel wire can cut through most of the materials,
- single wire (single strand) leaders are not as flexible as multi strand steel wire, but are extremely strong and tough,
- multi strand steel wire leaders are very flexible, but are somewhat more abrasive and more damage prone than single strand wires.
Titanium fishing fishing leaders are actually titanium-nickel alloys that have several very important features:
- titanium leader lines are very flexible, regardless if they are single or multi strand lines/wires,
- these lines are very elastic - they can stretch up to 10% without permanent damage to the line itself - perfect for hook setting,
- these lines are knottable just as nylon monofilament lines,
- surface is rather hard and abrasion resistant - great for fishing toothy fish,
- titanium wire is corrosion resistant and can last for a long time, even surpassing stainless steel wires,
- due to the strength and elasticity, titanium wires are almost entirely kink-proof.
Copper, monel and lead core fishing lines are used as heavy trolling main lines, usually followed with fluorocarbon line near the lure or bait with fishing swivel between the lines. Due to their high density, these fishing lines sink rapidly in water and they require less line for achieving desired trolling depth. On the other hand, these lines are relatively thick for desired strength, especially when compared with braided fishing lines and they often require reels with larger spools.
See also[edit]
1. ^ The World Book Encyclopedia Volume 7. Field Enterprises Educational Corp. 1968.
2. ^ The World Book Encyclopedia Volume 7. Field Enterprises Educational Corp. 1968.
3. ^ The World Book Encyclopedia Volume 7. Field Enterprises Educational Corp. 1968. |
From Wikipedia, the free encyclopedia
Jump to: navigation, search
For other uses, see Fitz (disambiguation).
Fitz (pronounced "fits") is a prefix in patronymic surnames of Norman origin, that is to say originating in the 11th century. The word is a Norman French noun meaning "son of", from Latin filius (son), plus genitive case of the father's forename.[1] Whilst Fitz is now the standard form used by modern historians the word appears in ancient documents with various spellings such as fiz, filz, etc. The word has developed in modern French to fils de, with which it is thus cognate.
Norman gentry and noble families under feudal society held one or more manors from an overlord, who himself held directly from the Duke of Normandy, the sovereign. Such families took their surnames from their principal manor on which they resided and which formed their seat. This was the case for example with William the Conqueror's great noble adviser Roger de Beaumont (c. 1015–1094), ("Roger from Beaumont"), who took his surname from his manor of Beaumont-le-Roger in Normandy. His eldest son was called Robert de Beaumont, again after the family seat.
However, where a distinguished Norman warrior perhaps held no land, and thus was not an established member of feudal society, or was from an obscure family, such a naming convention was unavailable. In such families therefore the word Fitz was preposed to the fore name of the warrior's father to give the warrior and his further descendants a surname by which they could be known. Thus Fitz Gilbert, meaning "son of Gilbert" would be adopted as a surname by the warrior christened "Baldwin", giving "Baldwin FitzGilbert". If we assume Baldwin's son was christened "William", his name would become "William FitzBaldwin FitzGilbert. However it is rare to find this naming practice extending beyond two generations and eventually the family name became "FitzGilbert" alone, the name of the patriarch, with the name of the patriarch's son being dropped. It must be asked why the father, in this case Gilbert, was not himself Fitz of his own father, the answer seems unclear. The Domesday Book of 1086, written in Latin, names a few examples such as Turstin filius Rolf,[2] who was known in Norman-French documents as Turstin FitzRolf.
Norse origins[edit]
The Normans were descended from Norsemen or Vikings and the usage appears to reflect the Scandinavian tradition of adding -son after (usually) the father's name. There are, however, exceptions in which the name of a more noteworthy mother (Fitz Wymarch) or a parent's title (Fitz Count, Fitz Empress) was used instead. Such surnames were later created for illegitimate children of royal princes.[3] Other names were Normanized from another language, such as FitzPatrick (from the original Gaelic Mac Giolla Phádraig) or FitzDermot (from Mac Gilla Mo-Cholmóc), but are not of Norman or Norse descent.
The Devon historian Tristram Risdon (d. 1640) wrote: "From the Conquest unto the time of King Edward the First [reigned 1272–1307] the addition of 'Fitz' was so frequent with the Normans that to avoid confusion in that kind men were commanded to assume unto themselves local names."[4] Thus for example the ancient Anglo-Norman Devonshire family of "FitzBarnard" assumed the surname "de Speccot", from the name of their Devon seat,[5] Speccot in the parish of Merton.
From the Stuart era (1603-1714) and later, a pseudo-Anglo-Norman usage of Fitz was adopted for younger sons of the British royal family who lacked a legal surname, and particularly for illegitimate children of kings, princes, or general upper class men, for example Fitzroy, (meaning "son of the king", from the French fils du roy); Fitzjames, son of king James II (1685-1688); and FitzClarence, son of the Duke of Clarence, later King William IV (1830-1837). More generally, in literature the prefix Fitz has been used to connote nobility, for example in Anthony Trollope's 1862 novel Orley Farm which features the fictional rakishly aristocratic figure Lord John Fitzjoly.
Irish usage[edit]
The Irish surname FitzGerald is thought to derive from Gerald de Windsor, a Cambro-Norman nobleman whose son and grandson were involved in the Norman invasion of Ireland.
The Irish name Fitzpatrick does not indicate a Norman origin of the family; it is the translation into English of the Gaelic surname Mac Giolla Phádraig. Other surnames beginning "Mac Giolla" were made into "McGilli-" (e.g. McGillicuddy), but the Fitzpatricks had their name changed by monarchical decree of Henry VIII as part of their submission under the Crown's surrender and regrant policy in the 1530-40's.
Historic persons[edit]
Prominent families[edit]
(Names are variously spelled with or without capital letter after "Fitz-")
Other uses[edit]
Fitz is also a stand-alone German surname originating in the Palatinate region of Germany.
1. ^ Thus Robertus, latinised form in the nominative case of the father's forename suggests his son's name in Latin as Filius Roberti ("son of Robert")
3. ^ Oxford English Dictionary, "Fitz", sense a. Retrieved 2013-10-26.
|
Ham on Rye
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Ham on Rye
First edition cover
Author Charles Bukowski
Country United States
Language English
Genre Autobiographical novel
Publisher Black Sparrow Books
Publication date
September 1, 1982
Pages 288
ISBN 0-87685-558-3
OCLC 8553358
813/.54 19
LC Class PS3552.U4 H3 1982
Preceded by Women
Followed by Hollywood
Ham on Rye is a 1982 semi-autobiographical novel by American author and poet Charles Bukowski. Written in the first person, the novel follows Henry Chinaski, Bukowski’s thinly veiled alter ego, during his early years. Written in Bukowski’s characteristically straightforward prose, the novel tells of his coming-of-age in Los Angeles during the Great Depression.
The title may be a play on J. D. Salinger's 1951 book The Catcher in the Rye, which is one of the most notable coming-of-age novels about American males. Both Bukowski and Salinger were first published professionally in 1940s in the literary magazine Story, edited by Whit Burnett. However, Bukowski's admiration of John Fante also suggests that a phrase in Fante's Ask the Dust, "liverwurst on rye," may have inspired the title "Ham on Rye." A third possibility is that the title is a dig at the New York literary critics who generally disdained Bukowski's work, dismissing him as the equivalent of a ham actor with an overwrought, amateurish style. Thus, Bukowski may be appropriating the insult and boldly declaring himself a ham writer fueled by rye whiskey. Still another possible interpretation is that Hank perceived himself as being sandwiched, or trapped, between his highly dysfunctional parents during his formative years.
Like his previous works, Ham on Rye is set in Los Angeles where the author grew up. Bukowski keeps his descriptions of his hometown grounded in reality, paying more attention to the people that make up Los Angeles than to the city itself. This type of description does not venerate or idealize the city, a contrast to other so-called "Los Angeles Novels".[1] Scenes outside of Los Angeles show Chinaski as an intruder, as with an early scene where he and his family are chased out of an orange grove.[2] The story takes place at home, at his different schools, at the doctor's office (for his never-ending acne treatments) and at various other locales around town.
The novel focuses on the protagonist Henry Chinaski. It begins with Chinaski's early memories. As the story progresses the reader follows his life through the school years and into young adulthood. Chinaski relates that he has an abusive father, and his mother does nothing to stop his father's abuse. She is, in fact, a victim of her husband's brutality as well. Henry is not athletic but wants to be and therefore tries hard to improve. Football is difficult for him, but he enjoys the violence that comes with it. He has only slightly better results in Baseball. As Chinaski progresses through grammar school, the focus of Henry's attention is on sports, violence and girls. And as Henry grinds his way through Junior High School he discovers the manifold pleasures of alcohol and masturbation. As Henry begins High School, his father, who is experiencing inter-generational downward mobility, makes him go to a private school where he fits in even less amongst all the well-heeled, spoiled rich kids with their flashy, colorful, convertible sports cars and beautiful girlfriends. To make matters worse, Chinaski develops horrible acne that is so severe that he has to undergo painful, and mostly ineffective, treatments from the doctor. He becomes a human guinea pig for every experimental treatment that comes down the pike. The reader eventually follows Chinaski to college and reads of Henry's attempt to find a worthwhile occupation.
Like his previous autobiographical novels, Ham on Rye centers on the life of Henry Chinaski, this time during his childhood and teenage years. Throughout the course of the novel, Bukowski develops his misanthropic anti-hero character that is seen in his other works like Post Office and Hollywood. Chinaski, growing up middle class in Los Angeles during the Great Depression, is shown developing into a sarcastic loner. This stems in large part from his home life, in which he is beaten frequently (often for no reason) by his father. He becomes alienated from the children at school simply for somehow being different in a way that none of them could ever coherently articulate. The post-facto rationalizations they concoct for their hostility, however, involve his inability to play sports and his being viscerally revolted by cruelty to animals, the latter being one of the favorite past-times of neighborhood men and boys alike. The grotesque-looking boils of his acne vulgaris will eventually turn their excuses for hating him into an ostracizing trifecta.
Chinaski has been compared to both Frankenstein's monster and Kafka's Gregor Samsa, because of his alienation and outcast resulting from his "monstrous" appearance.[3] He often resorts to violence when confronted with those who alienate him, giving him a tough guy image to his peers. However, he rarely is completely confident with his own abilities and often second-guesses himself.
The Chinaskis[edit]
Like Henry, the rest of the Chinaskis are modeled after Bukowski’s own family. For example, Henry’s parents, like Bukowski’s, had met in Germany after World War I.
• Emily Chinaski: Chinaski's grandmother on his father’s side. The beginning of the novel starts with his earliest memory of his grandmother; she would proclaim “I will bury all of you!” Other than that, his best memory of visiting her home involves him and his parents leaving to go visit his grandfather, who does not live with Emily. Later, she appears with a crucifix to rid him of "the devil" causing his acne.
• Leonard Chinaski: Chinaski's grandfather, separated from Emily. Though Chinaski's father admonishes Leonard for being a drunk (his breath stinks of alcohol), Chinaski himself remembers Leonard as a beautiful man. When Chinaski meets him for the first time, he gives the boy a gold watch and a German Iron Cross.[4]
• Henry Chinaski, Sr.: Chinaski's father. He met Henry's mother overseas in Germany, where Henry, Jr. was born. At the beginning of the novel, Henry, Sr. works as a milk man. He is a harsh, cruel man who physically and verbally abuses his son from a young age. He also physically abuses his wife Katherine, particularly after she catches him cheating on her with a woman on his milk route. Henry, Sr. regards the rest of his family, particularly his brothers John and Ben, with disdain. He often disparages them for being alcoholics and womanizers, two traits his son would later develop. At the onset of the Great Depression, he loses his job but continues to spend the day driving around to appear to the neighbors as if he was still employed. His son gets more jaded to his abuse as time goes on, and the two become openly hostile towards each other by the end of the novel. Eventually, Henry, Sr. throws his son out of the house after finding Henry’s short stories.
• Katherine Chinaski: Chinaski's mother. A native German, she met and married Henry Jr.'s father in Germany post World War I. She is also called Katy. Katherine is a loving mother, though she is subjugated by Henry, Sr.’s abuse. Chinaski initially resents his mother for not saving him from his father’s wrath, but later comes to regard her as another victim like himself. Though often disappointed with how her son lives his life, she really loves him and often displays a confidence that he will better himself. Her love for her son is perhaps best shown when she warns him that his father found his stories. Like her son, she eventually calluses to Henry, Sr.’s abuse, shown in the novel by her disregard of his later tirades.
• Ben Chinaski: Chinaski's uncle. Ben is only present in chapter three, and Chinaski remembers him as “a very handsome man… he had dark eyes which glittered, were brilliant with glittering light.” Ben is 24 and lives in a sanitarium because he is dying of tuberculosis. Despite this, Henry Sr. treats Ben with open hostility, ridiculing him for his debauchery. Ben takes it in stride, paying more attention to his nephew and sister-in-law.[5]
• Anna Chinaski: Chinaski's aunt through marriage to John Chinaski, Henry, Sr.’s brother. In chapter four, Anna appears as an abandoned wife with two children, all three on the brink of starvation. Her husband has been gone quite sometime, leaving Anna and the children penniless. Henry Sr. mercilessly belittles his brother and makes light of Anna’s situation. He claims that John is wanted for rape (whether this is true or not is uncertain) and that he’ll come back “when he’s tired of the hens.” Like Ben, Anna treats Henry’s father coldly and pays more attention to Katherine, who brings her food for her children.[6]
Other characters[edit]
• Various Teachers: Mr. Hall, Mrs. Westphal, Mrs. Fretag, Wagner, Mr. Stanhope, Miss Gredis, etc.
• "Friends": Robert Becker, David (Another loner that attaches to him.), Lila Jane (His first romantic interest), Red, Chuck, Eddie, Gene, Frank, Baldy, etc.
1. ^ Fontana, Ernest. 1985. Bukowski's Ham on Rye and the Los Angeles Novel. The Review of Contemporary Fiction. 5 (3): 4–8
4. ^ Ham on Rye, Chapt. 1
5. ^ Ham on Rye, Chapt. 3
6. ^ Ham on Rye, Chapt. 4
External links[edit] |
Jim Coplien
From Wikipedia, the free encyclopedia
Jump to: navigation, search
James O. "Jim" Coplien (also known as Cope) is a writer, lecturer, and researcher in the field of computer science. He held the 2003–4 Vloeberghs Leerstoel (Vloeberghs Chair) at Vrije Universiteit Brussel and has been a visiting professor at University of Manchester.
He is known for his involvement in founding the pattern movement as part of the Hillside Group, organizing events in the Pattern Languages of Programs conference series, and his writings on software design patterns and organizational patterns.
Cope was a founding Member of Hillside Group with Kent Beck, Grady Booch, Ward Cunningham, Ralph Johnson, Ken Auer and Hal Hildebrand. He has started up several of the conferences in the Pattern Languages of Programs (PLoP) conference series and is a longstanding pattern author and PLoP shepherd. His pattern form, the "Coplien Form,"[1] is a simplified way to structure a pattern in preparation for writing a more literate version in Alexandrian form. Together with Trygve Reenskaug, he was a principal in the design of the data, context and interaction (DCI) paradigm.
Books he has written or co-written include:
His early work on C++ idioms was one of the three primary sources of the popular Design Patterns.[citation needed] He also named the curiously recurring template pattern C++ idiom.[1] His work on organizational patterns was an inspiration for both extreme programming[2] and for Scrum daily standups.[3] In Organizational Patterns of Agile Software Development book he co-presented an alternative version of Conway's law.
• ^ Coplien, James O. (February 1995). "Curiously Recurring Template Patterns". C++ Report: 24–27.
External links[edit] |
Lingo (programming language)
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Lingo is a verbose object-oriented (OO) scripting language developed by John H. Thompson for use in Adobe Director (formerly Macromedia Director). Lingo is used to develop desktop application software, interactive kiosks, CD-ROMs and Adobe Shockwave content.[1][2]
Lingo is the primary programming language on the Adobe Shockwave platform, which dominated the interactive multimedia product market during the 1990s.[3] Various graphic adventure games were developed with Lingo during the 1990s, including The Journeyman Project, Total Distortion, Mia's Language Adventure, Mia's Science Adventure, and the Didi & Ditto series. Hundreds of free online video games were developed using Lingo, and published on websites such as Miniclip and
Lingo can be used to build user interfaces, to manipulate raster graphics, vector graphics and 3D computer graphics, and other data processing tasks.[4][5] Lingo supports specialized syntax for image processing and 3D object manipulation.[6] 3D meshes can also be created on the fly using Lingo.[6]
Lingo was invented by John H. Thompson at MacroMind in 1989, and first released with Director 2.2. Jeff Tanner developed and tested Lingo for Director 2.2 and 3.0, created custom XObjects for various media device producers, language extension examples using XFactory including the XFactory application programming interface (API), and wrote the initial tutorials on how to use Lingo. Dave Shields tested and documented Object-based Lingo for Director 3.13 and 4.0. He ran build scripts to create weekly releases for testing, originated the Macromedia KnowledgeBase, created examples of how to write Lingo XTRA plug-ins in C++, and assembled the Golden Master disks of Macromedia Director that were shipped to the duplicator.
Lingo was quickly adopted by burgeoning multimedia community during the 1990s and the already popular Director product. Initially, about 90% of the users only used 10% of Lingo's features; primarily go to the frame by multimedia authors of tutorials and presentations. However, 10% of the users were game developers who took a wider interest in the other 90% of its abilities, including their own function extensions by creating their own XFactories/XObjects. The Journeyman Project is a prominent example of this.
Lingo is embedded into Adobe Director, and can be added as scripts on objects or on the timeline. Lingo is an object-oriented programming (OOP) language, and supports Smalltalk-like verbose syntax, OO dot syntax, and inheritance.
Verbose syntax[edit]
When Lingo was created, a verbose syntax was designed to mimic spoken language, so it would be easy for new users. Users could write HyperTalk-like sentences such as:
if sprite 5 is visible then go to the frame
In go to statements, the "to" is optional, and unlike other programming languages, go statements reference frames in Director's Score, not specific code lines.
Lingo was also initially very robust by providing object generation through a notion called factory, which led to the language's extensibility through External Factories (XFactories) or XObjects. For Director 3.13 and later versions, extensibility occurred via a different type of plug-in called an XTRA, based upon the Microsoft Component Object Model (COM).
Dot syntax[edit]
Although it is still possible to use the verbose syntax, the current version of the language fully supports OO dot syntax, so that the code looks more like standard programming languages such as JavaScript or C++.
The equivalent in new scripting style would be:
if sprite(5).visible then _movie.go(_movie.frame)
This format uses elements of the Director Object Model, introduced in Director MX 2004. The syntax in prior versions would be like:
if sprite(5).visible then go the frame
There are 4 types of Lingo scripts in Director, each with a specific purpose. Each type of script may be added to certain types of compatible objects.
• Cast scripts work only with their member, not all events can be used with them.
• Behavior scripts are attached to a sprite or inserted into a frame. Sprite behaviors are often used to give control of the sprite's properties and movement. Frame behaviors can be used to create a pause or delay within a certain frame in the score. Behaviors make it easy to program in an object-oriented way, as you can directly see the relationship between the programming and the item they are attached to. They can also control or interact with other sprites, making them a true object.
• Movie scripts are not attached to sprites nor can they be instantiated as Objects. They are available throughout the program (movie) and are especially useful for holding global handlers and initializing global variables at the start or end of the movie.
• Parent scripts are used to birth (create instances of) an object into a variable using the new command. These objects can control sprites and other media remotely, without being attached to any one sprite, may be used to control data or other non-displayed items, and are useful for recursion routines such as pathfinding. A Parent script can be used to create or destroy an object at any time, freeing them from the confines of the score that a Behavior is limited to.
Behavior and parent scripts encourage good object-oriented programming. Movie scripts are not as OOP-oriented. However, they can still be used to make black-box handlers, where other objects can input raw data and receive answers back, without knowing the inner workings of the box. Using the strengths and ease-of-use of Director's programming methodology, with the advantages of OOP makes for a powerful and fast programming environment.
Lingo supports object inheritance by a slightly idiosyncratic system: a script can have an ancestor property which references another object (usually also a script, although other objects such as cast members can also be ancestors). Properties and methods of the ancestor are inherited by the parent. Behavior scripts are also a kind of ancestor of the sprites to which they are attached, since properties and methods of the behavior can be accessed by reference to the sprite itself. In this case, it is a kind of multiple inheritance, as one sprite may have several behaviors.
Lingo 3.0 was also extensibile through External Factories (XFactories) or XObjects (later replaced by Lingo Xtras), which provided programmatic extensions to Director. For example, controlling external media devices such as CD-ROM and Video tape players through Macintosh SerialPort. XObject API was openly available to developers and media device producers, which added to the popularity and versatility of Lingo. Macromind was very active in positioning the XObject API as standard for external media devices to collaborate through Lingo; and its interest as a standard achieved a lot of involvement from prominent and burgeoning media product companies through an ad hoc group called the Multimedia Association.
Starting with Director version 4.0, Lingo was extensibile through a new improved class of external plugin called Xtras. Xtras were developed in C++ using the Microsoft Component Object Model (COM). The standardization with COM helped attract developers to creating a market for such plug-ins.
Imaging Lingo[edit]
Imaging Lingo was introduced with Director 8.0, and allowed developers to write high-performance image manipulation commands using a simple syntax. There are some similarities to functions of image applications (like Photoshop), that make it easy to create dynamic, code-based visual effects. Image manipulation was also added into ActionScript 3.0 with the BitmapData class. As this included more sophisticated commands, Director was also updated to allow conversion between the BitmapData object and its own Image objects.
Director 8.5 introduced a DirectX 3D engine that could be scripted with Lingo. Lingo was updated substantially to support the new 3D objects and now includes a full-featured set of 3D commands. An Xtra was also created to enable use of the Havok 3D Physics engine, and later the AGEIA PhysX engine, in Director 11.
Other languages[edit]
These other languages are perhaps not as well known as the Macromedia language. However, a legal anomaly remains in the UK that the trademark of the word 'Lingo' is held by Linn Smart Computing.
• A language called Lingo was released for software development under Windows. This version was designed as a compilable high level programming language.
• A programming language based on Smalltalk was developed for the Rekursiv processor developed by Linn Smart Computing in Scotland, UK. This language was named Lingo[7] and is significant because its makers successfully obtained a trademark in the UK.
• LINGO is also a programming language for solving linear, nonlinear and integer optimization problems, first developed in 1988 by LINDO Systems Inc. This language is still in production.
External links[edit] |
Scientific management
From Wikipedia, the free encyclopedia
Jump to: navigation, search
"Taylorism" redirects here. For witty, epigrammatic remarks about the philosophy of history coined by A. J. P. Taylor, see Taylorism (history).
Frederick Taylor (1856–1915), leading proponent of scientific management
Its development began in the United States with Frederick Winslow Taylor in the 1880s and '90s within the manufacturing industries. Its peak of influence came in the 1910s;[2] by the 1920s, it was still influential but had entered into competition and syncretism with opposing or complementary ideas.
Pursuit of economic efficiency[edit]
Relationship to mechanization and automation[edit]
Effects on labor relations in market economies[edit]
Taylor's view of workers[edit]
Taylor often expressed views of workers that may be considered insulting.[4] He recognized differences between workers, stressed the need to select the right person for the right job, and championed the workers by advocating frequent breaks and good pay for good work.[11] He often failed to conceal his condescending attitude towards less intelligent workers, describing them as "stupid" and comparing them to draft animals in that they have to have their tasks managed for them in order to work efficiently.[12]
Taylorism, anomie, and unions[edit]
With the division of labor that became commonplace as Taylorism was implemented in manufacturing, workers lost their sense of connection to the production of goods. Workers began to feel disenfranchised with the monotonous and unfulfilling work they were doing in factories. Before Scientific Management, workers felt a sense of pride when completing their good, which went away when workers only completed one part of production. "The further 'progress' of industrial development... increased the anomic or forced division of labor," the opposite of what Taylor thought would be the effect.[14] Partial adoption of Taylor's principles by management seeking to boost efficiency, while ignoring principles such as fair pay and direct engagement by managers, lead to further tensions and the rise of unions to represent workers needs.
Taylor had a largely negative view of unions, and believed they only led to decreased productivity. Although he opposed them, his work with scientific management led disenfranchised workers to look to unions for support.
Taylor's implementations[edit]
Implementations of scientific management often failed to account for inherent challenges such as the individuality of workers and the lack of shared economic interest between workers and management. As individuals are different from each other, the most efficient way of working for one person may be inefficient for another. As the economic interests of workers and management are rarely identical, both the measurement processes and the retraining required by Taylor's methods were frequently resented and sometimes sabotaged by the workforce.Emerges from the identification of problem desire for improvement, discussion of problems with other to find the best solution.
Early decades: Making jobs unpleasant[edit]
Later decades: Making jobs disappear[edit]
In a central assumption of scientific management, "the worker was taken for granted as a cog in the machinery."[18] While scientific management had made jobs unpleasant, its successors made them less remunerative, less secure, and finally nonexistent as a consequence of structural unemployment.
Successors to scientific management such as "corporate reengineering" and "business process reengineering" envisage as a distant goal the elimination of all unskilled, or even most skilled human labor, an aspiration that stems from scientific management's reduction of process to discrete units. As the resultant commodification of work advances, no skilled profession, not even medicine, is immune to the efforts of scientific management's successors, the "reengineers" often derided as "bean counters" and "PHBs".[citation needed]
Effects on disruptive innovation[edit]
Relationship to Fordism[edit]
Influence on planned economies[edit]
Soviet Union[edit]
East Germany[edit]
East German machine tool builders, 1953.
Taylorism is, according to Stephen P. Waring, considered very controversial, despite its popularity. It is often criticized for turning the worker into an "automaton" or "machine."[25] Due to techniques employed with scientific management, employees claim to have become overworked and were hostile to the process. Criticisms commonly came from workers who were subjected to an accelerated work pace, lower standards of workmanship, lower product quality, and lagging wages. Workers defied being reduced to such machines, and objected to the practices of Taylorism. Many workers formed unions, demanded higher pay, and went on strike to be free of control issues. This ignited a class conflict, in which Taylorism was initially meant to prevent. Efforts to resolve the conflicts included methods of scientific collectivism, making agreements with unions, and the personnel management movement. [26]
The Watertown Arsenal in Massachusetts is an example of the application and repeal of the Taylor system in the workplace, due to worker opposition. In the early 1900’s, neglect in the Watertown shops included overcrowding, dim-lighting, lack of tools and equipment, and questionable management strategies in the eyes of the workers. In April 1909, Frederick W. Taylor had visited Watertown, along with Carl G. Barth, and reported on their observations at the shops. Their conclusion was to apply the Taylor system of management to the shops to produce better results. Efforts to install the Taylor system began in June 1909. Over the years of time study and trying to improve the efficiency of workers, criticisms began to evolve. Workers complained of having to compete with one another, feeling strained and resentful, and feeling excessively tired after work. There is, however, no evidence that the times enforced were unreasonable. [27] In June 1913, employees of the Watertown Arsenal in Massachusetts petitioned to abolish the practice of Scientific Management there.[28] A number of magazine writers inquiring into the effects of Scientific Management found that the "conditions in shops investigated contrasted favorably with those in other plants."[29]
Another reason for criticizing Taylor’s methods is that Taylor believed the scientific method included the calculations of exactly how much time it takes a man to do a particular task, or his rate of work. However, the opposition to this argument is that such a calculation relies on certain arbitrary, non-scientific decisions such as what constituted the job, which men were timed, and under which conditions. Any of these factors are subject to change, and therefore can produce inconsistencies. [30]
Google's methods of increasing productivity and output can be seen to be influenced by Taylorism as well.[32]
See also[edit]
2. ^ Woodham 1997, p. 12
3. ^ Drury 1915, pp. 15–21.
4. ^ a b c Taylor 1911
5. ^ a b Hartness 1912
12. ^ Taylor 1911, p. 59 quote:
13. ^ Braverman 1998.
14. ^ Melossi, Dario (December 2008). Controlling Crime, Controlling Society: Thinking about Crime in Europe and America. Wiley.
15. ^ a b Mullins 2004, p. 70.
16. ^ Drury 1915, pp. 170–174
17. ^ Noble 1984.
18. ^ Rosen 1993, p. 139, quote:
19. ^ Hounshell 1984, pp. 249–253.
20. ^ a b Sorensen 1956, p. 41. quote:
21. ^ Beissinger 1988, pp. 35–37.
22. ^ Hughes 2004.
23. ^ Hughes 2004, p. 251, quoting Stalin 1976 p. 115.
24. ^ Sorensen 1956, pp. 193–216.
25. ^ Drury 1915, pp. 195-198
26. ^ Waring 1991, p. 14
27. ^ Aitken 1985, p. 85
28. ^ Drury 1915, p. 141
29. ^ Drury 1915, p. 194
30. ^ Aitken 1985, p. 21
31. ^ Dawson 2005.
32. ^ Carr, Nicholas G. (June 2010). The Shallows. New York City: W. W. Norton & Company.
33. ^ Kanigel 1997
34. ^ Head 2005.
Further reading[edit]
External links[edit] |
Productivity stuck on auto-creep
Tim Scott’s piece on productivity earlier this week led me to this ACAS report on the subject. As you might expect, they focus on what has been happening in the workplace:
A range of macro solutions have been offered by Government and others, including capital and financial investment in infrastructure. But it is now understood that these can only yield lasting improvements if workplaces are operating at their best. The way workplaces are organised, the part played by managers and leaders, and the role and involvement of employees can help deliver better outcomes for individuals, organisations and the economy.
In an ACAS paper published in February, Ian Brinkley remarked:
The macro-economists have tortured just about every dataset they can get their hands on in just about every way possible.
It is always possible that a new insight will provide the missing part of the explanation, but so far we are coming up short.
In other words, lots of very clever people have looked everywhere and still can’t work out what’s wrong.
He continues:
There is a growing consensus that the bit of the productivity puzzle we cannot easily explain is based on what is going on in the workplace – in other words, there is a significant part of the fall in productivity shortfall that is attributable to employment relations in its widest context.
Or, as Tim says,“It’s the workplace, stupid!”
A recent paper by the National Institute of Economic & Social Research (NIESR) suggests they might be right. The productivity fall, say the report’s authors, has happened across the board.
The most striking feature is the widespread weakness in total factor productivity within firms, pointing to the importance of a common factor in explaining productivity weakness.
Commenting on the paper in the FT, Matthew Klein says:
Adding to our confusion is a fascinating new paper from the National Institute of Economic and Social Research, which shows the UK productivity problems aren’t concentrated in any particular sector and (mostly) can’t be blamed on the inability of good firms to grow at the expense of bad ones. Moreover, there is no noticeable difference in the performance of companies that relied heavily on bank lending before 2008 and those that didn’t, nor is there a significant difference between big and small companies.
Rather, all businesses experienced a big drop in underlying productivity since 2008.
So the collapse in productivity isn’t because of dependence on bank lending nor zombie firms taking resources that should go to better ones. The productivity problem can’t be blamed on the skill level of the workforce either. What we seem to be seeing is a general and sharp decline in productivity across UK organisations.
So what has happened? What has been going on in Britain’s workplaces?
The NIESR report makes a suggestion, though, tantalisingly, it leaves the discussion for another day.
[We conclude that other common factors, which we do not explore in this article, for example general demand weakness coupled with flexible wages, are likely to have been central in explaining the stagnation in UK productivity growth.
This goes back to the hand car wash argument, where cheap labour means that firms don’t need to invest in equipment. Instead, new and existing firms just find ways of profiting from the ready supply of cheap labour.
Some might argue that the labour market needs to be more flexible so that managers can push workers harder and sack those who don’t perform but recent IMF paper concluded that labour market deregulation does nothing to improve productivity and might even make it worse.
Screen Shot 2015-07-02 at 18.19.41
Research in the US and in the UK, France and Germany has shown that unfair dismissal laws encourage firm level innovation. by providing protection for employees to take risks and by encouraging firm to take risks on new projects.
A flexible labour market and stagnant wages, therefore, might have the opposite effect. When managers have more power, employees keep their heads down and their bosses get lazy.
As Gary Miles of Roffey Park said when the Beecroft proposals were announced, removing employment protection lets poor managers off the hook. It absolves them from tackling performance issues. If it gets easier to sack people without explaining why, you don’t need to spend time trying to understand the source of the problem, you just blame the worker, sack him and get someone else. Of course, Beecroft’s proposals were not enacted but the raising of the unfair dismissal threshold and the introduction of tribunal fees has had a similar effect. An employer’s risk of being taken to a tribunal is much reduced.
All this is circumstantial, of course but so far, every attempt to explain the productivity puzzle has drawn a blank. The UK’s stagnating productivity has come at a time when employment protection has been eroded, training investment has been in decline and non-regular employment, such as zero hours contracts, self-employment, temporary employment and part-time work, has increased. As I said earlier this year, the productivity puzzle leaves Britain’s managers with some serious questions to answer. With one of the largest graduate workforces in the EU and one of the largest shares of high-skilled jobs our productivity should be higher than it is.
Like ACAS, the UK Commission for Employment and Skills has been calling for improvements to management practices for some time. Yesterday, Sara Mosavi said that management needs to shift up a gear if Britain’s productivity is to be improved. She’s right but when cheap and flexible labour allows you to coast along on auto creep and still make money, why would you bother?
This entry was posted in Uncategorized. Bookmark the permalink.
12 Responses to Productivity stuck on auto-creep
1. sdbast says:
Reblogged this on sdbast.
2. “but so far, every attempt to explain the productivity puzzle has drawn a blank.” Not EVERY attempt. See: Rightshifting and the Marshall Model, which explains it clearly, at least for knowledge-work firms.
– Bob
3. ThinkPurpose says:
Reblogged this on thinkpurpose and commented:
Cheap labour and lazy management thinking= a perfect storm
4. Kamo says:
I am somewhat biased, but in my personal experience many of the senior managers I deal with have become “generic” clones peddling the same washed out shtick. They go on training courses which “equips” them with generic tools and techniques which they use as the basis to spout forth about “ruthless prioritisation” and “automation” and “efficiency”, problem is they have precious little idea of how to kick on past those stock responses because they lack underlying expertise or tacit knowledge to build solutions for issues with specific characteristics. Once you’ve actually prioritised and automated where possible it’s very unhelpful for the same senior manager to trot out the same lazy, worn out response. Instead of building on and complementing a genuine understanding of the actual workings of the specific business they are engaged it, these generic managerialist techniques seem to substitutes for that genuine understanding. I find it a bit like allowing a mechanic to perform open heart surgery because they’ve read a Haynes manual on cardiopathic medicine, they may be the very brightest mechanic whose been to the very best public school and read PPE at Oxbridge, but you’d still prefer the surgeon who has actually spent years and years really understanding and building expertise in cardiopathic medicine.
5. Quaestorix says:
What you say and what is in the excellent ACAS report feels instinctively right and it is good to see that they stress the importance of HR’s contribution in improving the situation. One thing which puzzles me. If this is right, I wonder why US productivity significantly higher than it is in the UK both absolutely and on trend given that employment protection is even less there. Is it because of more investment in technology perhaps?
6. Patricia Leighton says:
Regarding productivity and having worked and researched in France, Germany and the Netherlands and l think a major problem is poor management and management systems. Patricia Leighton
Sent from my iPad
7. Jamie says:
This is a very interesting topic and is very important for Britain’s future. However, despite the fact that I normally like your blog, I am very sceptical of your conclusions.
The Productivity Problem Industry (PPI) has set itself the task of explaining Britain’s productivity problem and has failed despite the fact that “lots of very clever people have looked everywhere”. Nevertheless, management is declared guilty despite the fact that “all this is circumstantial, of course”. This is exactly what poor management would say. “We have tried our best so it must be someone else’s fault”.
It is not clear to me what precisely is being measured in national productivity statistics. Here is a quote from a recent FT article.
“Note this definition of productivity is different from the one we used in our charts above, which is based on the ONS’s attempt to account for changes in hours worked and the quality of the workforce”
Even within a single article two different definitions of productivity are being used. However, neither is spelled out. This matters. I have read quite a few articles about the productivity problem and have seen very different conclusions. NIESR says “the productivity fall … has happened across the board”. However, here is some data from ONS which suggests that there are considerable variations by industry. Which is correct?
This suggests to me that there are significant problems with the compilation and use of the statistics: what precisely is being measured in each industry; what sources are used for the raw data; what adjustments are made to account for things like the quality of the workers; how do different researchers reach very different conclusions; which conclusions should a reader believe?
It seems to me like the single most useful thing that the PPI could do would be to explain, using examples, how productivity is measured in different industries. It might start with itself. How is the productivity of academic economists and statisticians measured? It’s not obvious how this would be measured or even what the units of measurement would be. [Of course, the PPI is just type of professional service so the same questions apply to any professional service e.g. consultancy, law, advertising, R&D in electronics or pharmaceuticals where the value of the service provided is often intangible].
The same then applies to all other industries. How are they measured? For example, how is the productivity of the vast number of different activities of the public sector collated into a homogenous total? Is it a measure of physical throughput or financial value per person hour or something else? The public sector doesn’t sell anything so how would any financial value be calculated?
I have looked for a resource which would explain how macroeconomic productivity is defined and calculated but I have been unable to find one. Is such a resource available? Have any bloggers discussed how the statistics are compiled as opposed to how they are analysed? My gut feel is that productivity figures are probably only valuable when comparing like with like e.g. one factory producing cars with another, or one industry versus a similar industry. In the public sector, each segment would require its own measures in order to see anything valuable. HMRC could use tax return throughput or similar but how would you measure the productivity of the military where, in ideal circumstances, they are required only to train and be on stand-by?
8. metatone says:
To answer Quaestorix in part, our experience (as a company who provide various kinds of support in the innovation arena) in the US and UK indicates a couple of issues.
1) Austerity and recession create a vicious circle. AKA aggregate demand matters. Investment of any kind remains hobbled in UK companies by a recession mindset. One of the dirty truth that economists like to obscure is that productivity improvements are very hard to come by without increased investment.
2) The culture of management in the USA (for all the faults which are well documented) has an optimistic bent. They do believe in trying to get things done better/faster/cheaper. Sometimes it works, sometimes it doesn’t. However, fatalism rules in UK management circles, so very often people don’t really try.
3) The Oxbridge influence hobbles UK business by Oxbridge educated managers prioritising hiring consultants and providers headed by Oxbridge types. Some are very smart – many are mediocre.
4) It’s perhaps instructive as well that the major consultancies in the UK scene could be divided into those who began as management consultancies and those who began as accounting firms. The indigenous UK firms are mostly of an accounting heritage. This is symbolic of more differences in the wider business culture.
9. Pingback: What Humans Aren’t | Creative Ideas for Starving Artists
10. Dipper says:
I have questions but no answers.
1. In banking (and other industries) many people are now engaged in compliance and regulation. Does this add value? My view is it does. A product or service that has been through a verification process that delivers guarantees is worth more than the same product or service that has not been through that process. But is that reflected in the productivity figures?
2. Is it correct that in-work benefits are effectively a subsidy to relocate low-paid jobs and the workers from continental Europe to the UK? In which case how is the subsidy reflected n the productivity numbers?
11. Mark L says:
…and here’s the Treasury’s take on productivity. After all the politics in the main body of the report, Annex A appears to have been written by an actual analyst in HMT.
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s |
JavaScript Vs JScript Vs ECMAScript
September 15, 2008
Netscape originally developed a scripting language for use in its browsers, calling it LiveScript. Java being an internet buzzword at that time, for marketing reasons they renamed the scripting language to JavaScript. Brendan Eich (born 1961) is the creator of the JavaScript programming language. Now he is the Chief Technology Officer at the Mozilla Corporation.
Microsoft implemented its own version of JavaScript and called it JScript.
Netscape, Microsoft and others started standardizing the scripting language, using the ECMA standardizing organisation ( for that. Thus the language standard is now called ECMA Script.
ECMA standard is only about the core language, with data and objects like numbers, strings, booleans, Object, Array, Function, Date, Math, but NOT about application specific objects like browser specific objects (document, window, links, images etc).
The core features of Netscape’s JavaScript and Microsoft’s JScript are pretty much compliant with the ECMA Script standard, but the application specific objects like the browser DOM (Document Object Model) and the server object model differ, slightly less with time.
One Response to “JavaScript Vs JScript Vs ECMAScript”
1. When I first heard of Java I thought it was cup of good coffee. Good example and history lesson.
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
%d bloggers like this: |
psychology studies for memory
all the studies you need to no for PSYA1, memory topic, condensed into revision format
HideShow resource information
short term memory (STM) capacity
tested the capacity of the STM (how much it can hold)
asked participants (p's) to recall a list of words, starting with 3 words.
after each correct recall Jacobs addeed a word to the list each time until recall was incorrect.
in order to control time he used a 1/2 second menodrome
in order to measure capacity Jacobs took the average score of the p's recall
STM capacity ranges from 5-9 items
memory improves with age
digits recalled better than letters
1 of 14
STM duration
Peterson & Peterson
used 24 students
p's presented with trigrams of consenants e.g. QVX and a 3 digit number
had to count backwards in 3's from the 3 digit number until told to stop (distractor task)
p's then had to recall their trigram after 3,6,9,12 and 18 seconds
no body could recall the trigram successfully after 18 seconds
duration of the STM is 18seconds
2 of 14
STM encodeing
two conditions:
i) p's given list of words that were acoustically simular
ii) p's given list of words that were acoustically disimular
i) simular - 55%
ii) disimular - 75%
STM encodes info acoustically
3 of 14
Long Term Memory (LTM) duration
used p's who had graduated from a USA high school
392 p's, the oldest graduated 50 years ago
2 conditions:
i) recognition group - p's given a list of names to match with the photos from a year book
ii) recall group - p's just had to remember the names of their former peers from the photo
i) recognition - 90% accurate when graduated 14 years ago, 60% accurate when graduated 47 years ago.
ii)recall - 60% accurate when graduated 7years ago, >20% accurate when graduated 47 years ago
duration of LTM is unlimmited, but does need some prompting
4 of 14
LTM encodeing
2 conditions:
i) p's given list of words semantically simular
ii) p's given list of words semantically disimular
p's had to wait 20minutes before recalling the list (to ensure it went into the LTM memory)
i) simular - 55% accurate
ii) disimular - 88% accurate
LTM encodes info semantically
5 of 14
research into misleading questions EWT
showed p's 7 videos, ranging from 4-30 seconds long
then all p's had to fill in a questionnaire
5 different questionnaires, all had the same filler questions but there was one critical question:
'how fast were the cars going when they _____ into eachother'
the 5 different questionnaires had 5 different verbs to fill the gap:
smashed, hit, bumped, collided and contacted
smashed: average speed estimate 40.8mph
contacted: averaged speed estimate 31.8mph
6 of 14
more research in to misleading questions
150 students shown a video of a multi-car crash
then asked 1 of 3 possibilities:
i) how fast were the cars going when they hit each other?
ii) how fast were the cars going when they smashed into eachother?
iii) control group - weren't asked about speed
1 week later p's were asked: 'did you see any broken glass?' - there was no broken glass
i) hit - 7 p's reported seeing broken glass
ii) smashed - 16 p's reported seeing broken glass
iii) control - 6 p's reported seeing broken glass
7 of 14
the effect of age on EWT - young
children give fewer details and are unlikely to correct missunderstood information
supported by ROBBERT AND LAMB:
reviewed 161 abuse interviews
68 of those contained missunderstood info or the interviwer misinterpretated the child
2/3 of these interviews remained uncorrected
DENT is also supported by FIN ET AL
interviewed witnesses (kids and adults) to a staged bank robbery
after a day both ages were equally accurate in their recall
after 5 months, the children struggled to remember any detail
FIN ET AL suggested childrens interviews should be video-taped as often court hearings can take 5 months
8 of 14
the effect of age on EWT - the young
CECI AND BRUCK concluded there a 3 things which effect a childs recall:
i) repated Q's - if the interviewer repeats Q's the child will assume they have given an incorrect answer and change theirs
ii) sterotypes - if a child hears something negative about the accused, they are more likely to report that infomation in the interview
iii) encouragement - phrases such a 'think really hard' or 'its really important' may encourage a child to make up detail in order to impress the interviewer
9 of 14
the effect of age on EWT - elderly
young adults (av.35yrs) and eldery adults (av.70yrs) shown silent tape of a kidnapping
then given 2 summaries to read after 10minutes
1 contained accurate info the other contained inaccurate info
p's then had to recall the video
the elderly were more likely to include the inaccurate detail in their recall
10 of 14
the effect of age on EWT - Elderly, A02
p's shown video of staged crime
3 age groups, children (7-9yrs) young adults (16-18yrs) and elderly (60-85yrs)
the children and eldely were less accurate in recall than then young adults
BUT the elderly were no less suseptible to misleading q's then young adults, only children were effected by them.
11 of 14
the effect of anxiety on EWT
reviewed 21 studies and concluded that anixiety has an effect on EWT in accordance to the Yerkes-Dodson Law, i.e as anixiety increases so does performance up to a optimum point, after this point performance decreases.
supported by LOFTUS study
2 conditions;
1) p's overheard low key discussion about faulty computers, person emerged with greasy hands and a pen
2) p's overheard hostile and heated argument, crashing chairs and smashing glass, person emerged with bloody hands and a paperknife.
P's asked to pick the person who emgered from 50 photos
1) low anxiety - 49% accurate. 2) high anxiety - 33% accuarte
12 of 14
The Cognitive Interview
founded by Giselman
after a study, he found that a cognitive interview produced 41.4 correct facts compared to standard interview only producing 29.4 correct statements
the cognitive interview consists of 4 stages:
1) contextual reconstruction - witnesses have to report pshycial surrounds and emotional feelings
2) they are econuraged to report every detail, no matter how minute
3) the order of the events changed - i.e. witness may be asked to recall the events in a reverse order - incase any detailed is missed - different way of thinking
4) change perspectives - witnesses asked to recall events from someonelses perspective (view)
13 of 14
Cognitive interview - more research
reviewd 27 studies, found that the cognitive interview was more accuarte in every case.
but after interviewing the police force, concluded it had limmited use due to the 4th instruction (changing perspective)
held interviews with members of the police force and found that they thought the congnitive interview was very time consuming and is now only used in serious crimes
found the interview to be uneffective on kids under the age of 6years. Now, the interview can only be used on children aged 8+ years.
14 of 14
No comments have yet been made
Similar Psychology resources:
See all Psychology resources »See all Psychology case studies resources » |
Transcendentalism was a religious and philosophical movement in the 1820s and 30s in the Eastern region of the U.S. Transcendentalists believe in the goodness of people and their nature, therefore protesting against predestination, and ideas like that from the religious and political parties that they believed corrupted the purity of individuals. Ralph Waldo Emerson's essay Nature, written in 1836, was considered the start of transcendentalism as a major cultural movement. In his essay, and like most written speeches/essays about transcendentalism, he urged individualism among the people. In that same year, the Transcendental Club was formed in Massachusetts by Ralph Waldo Emerson, George Putnam and Frederic Henry Hedge. Along with the death of Margaret Fuller in the late 1840s, came the dying out of transcendentalism, but it was soon followed by a second wave of Transcendentalists.
Primary Source:
By Steven A. Carbone II
2010, VOL. 2 NO. 11 | PG. 1/1
What else you should know:
The roots of Transcendentalism date back to the 1800's when New England was predominantly ruled by Calvanist ideas. William Ellery Channing was one of the main voices of a Transcendentalism, as well as Ralph Waldo Emmerson. In the beginning, Transcendentalism was mainly thought of as a religious movement, later becoming known as a political as well as a philosophical movement due to Emmerson's publication of the essay "Nature."
This is Ralph Waldo Emmerson, the author of "Nature" and one of the founders of the Transcendental club.
This is Margaret Fuller. Her death was the cause of the death on Transcendentalism.
Comment Stream
2 years ago |
Baby Teeth. Maybe Another Study Will Save The Adults.
On November 24, 1961 the journal Science published an article that reported a study of Baby Teeth in the St Louis area. The project focused on Strontium 90 which can replace calcium in bones. The women of the world were outraged at the levels of Strontium 90 because their hips are close to unborn children in their wombs. Children absorb radiation more rapidly than do adults because they are growing. That is why Baby Teeth studies can motivate change.
President Kennedy was able to use the Baby Tooth study to gather public support to sign the Nuclear Test Ban Treaty on August 5, 1963 in Moscow. This treaty banned nuclear bomb tests in the atmosphere and in outer space. Leuren Moret said that one reason for the American government to have hyped the polio epidemic was to cover up the damage done to young children from above ground nuclear tests. Most cases of real polio were actually caused by hastily created vaccines. Additionally, the government deliberately put cancer viruses in the polio vaccine because they do not like us. Subsequently, they have used adjuvants in vaccines to sterilize us, to damage the brains of our children and to otherwise harm our health.
Too bad for us that the medical establishment paid no public attention to the doctor in North Carolina who saved 50 young patients from polio by administering 100 grams of vitamin C daily in an IV for 7 days. Privately, they did pay attention to him. They ran him out of town for saving the lives of children.
Some of the people at the time also used the Baby Tooth data to argue that nuclear power plants were harmful to our health. I would point out that America’s aging nuclear power plants have proven to be dangerous to operate after 40 years. I would cite the San Onofore plant at San Diego California as a perfect example of what can happen to older nuclear power generators. The operator replaced existing pipes with cheaper material to save money. It had to be shut down permanently when scientists revealed that it would meltdown within months if it were allowed to go back online.
I have two main objectives in wishing to start another Baby Tooth study or rather several studies.
I would like to have a Baby Tooth study in Iraq. An Iraqi medical school should be paid by those of us in NATO countries whose governments participated in the war and occupation of Iraq. America used Depleted Uranium. It has been charged that Dick Cheney had helicopters to gather data on radiation levels so he could order more bombing to increase the radiation count in certain areas that he deemed to be too low for his nefarious goals. Depleted Uranium has produced devastating effects on the children of Fallujah. I want that Iraqi medical school to study the Baby Teeth of Fallujah. They should also study the teeth of children in Baghdad which is only 69 kilometers (43 mi) away. I would also like the doctors of the Mideast to study wind patterns and to do a Baby Tooth survey in a neighboring country to determine the effects of DU on allegedly allied populations. This proposed Mideast Baby Tooth study could be used for War Crimes prosecutions.
I would also like one or hopefully more major university medical schools to do Baby Tooth studies in America, Europe and the Pacific Rim in areas that seem to be the most in the line of prevailing winds from Fukushima. The latest news from Fukushima is that the ground underneath is producing Strontium 90, Cesium 134 and 137. This could not happen unless there had been a critical nuclear reaction from the debris under Fukushima.
Fukushima is an ongoing crime that, if not solved, will definitely become an Extinction Level Event. Let me repeat for emphasis those three words: Extinction Level Event.
Unfortunately, we live in a society whose political leaders and corporate media are incapable of independent and honest thought and are completely lacking in integrity.
Related Articles:
The 6 Levels Of The American Government
About horse237
3 Responses to Baby Teeth. Maybe Another Study Will Save The Adults.
1. Pingback: Baby Teeth. Maybe Another Study Will Save The Adults. | THE INTERNET POST
2. Sr-89 and Sr-90 are radioactive isotopes of strontium.
In the Periodic Table, strontium lies just below calcium and behaves chemically like calcium.
When cows graze on pastures where fallout Sr-89 and Sr-90 are deposited (usually by rainwater that washes out the air), these isotopes of strontium are processed into milk, just like calcium.
The 1961 studies were helpful in identifying the danger of exploding nuclear weapons in air, where air currents carried the fallout usually from West to East in the northern hemisphere.
Oliver K. Manuel
3. Pingback: links 161 | Cindy's Zone 2
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s |
시간 제한 메모리 제한 제출 정답 맞은 사람 정답 비율
5 초 512 MB 0 0 0 0.000%
Given an array of spots with coordinates in the range from −20,000 to 20,000, determine the fewest additional spots needed to generate a pattern with some symmetry. The symmetry can be around a point or across a line. If the symmetry is around a point, the point does not need to be a spot in the data, or even a point with integral coordinates. If the symmetry is across a line, the line may be at any angle. The coordinates of the additional spots may or may not be within the −20,000 to 20,000 limits.
Each input will consist of a single test case. Note that your program may be run multiple times on different inputs. The first line of input will consist of a single integer n (1 ≤ n ≤ 1,000) indicating the number of spots. Each of the next n lines will hold two space-separated integers x and y (−20,000 ≤ x, y ≤ 20,000), which are the coordinates of a spot. The locations of all spots are guaranteed to be unique.
예제 입력
0 0
1000 0
0 1000
1000 1000
예제 출력
예제 입력 2
0 0
70 100
24 200
30 300
480 400
0 100
0 200
0 400
100 0
300 0
400 0
예제 출력 2 |
Highlighting pharmacokinetics, pharmacodynamics and mechanism of action
« Zoloft’s Pros and Cons | Zoloft’s Everything Else »
US brand name: Zoloft
Generic name: sertraline
Zoloft’s Half-Life & How Long Until It Clears Your System
Half-life: 26 hours , plasma clearance: five to six days.
Steady State
Steady state reached in 4–7 days, concentration is 38.9 ng/ml
How sertraline Works
the current best guess at any rate
Sertraline is the second-most potent SSRI on the US market (Paxil is the most potent)2. With its action as a dopamine reuptake inhibitor and its effect on the 5HT1A receptors, Zoloft probably affects dopamine enough, directly and indirectly, to have a meaningful impact, both good and bad, on side effects. Zoloft may also work on the sigma 1 receptors, and that would explain why it’s so effective for anxiety disorders.
Active Ingredient
sertraline hydrochloride
Shelf Life
Tablets: 5 years.
Keep Crazymeds on the air.
Donate some spare electronic currency
you have floating around The Cloud
« Zoloft’s Pros and Cons | Zoloft’s Everything Else »
Pages and Forum Topics Google Thinks are Relevant to Your Mental Health
1 After five times the half-life you'll have reached what's called "Plasma clearance," or "not enough left in your bloodstream to latch onto your brain and do anything." It's based on Julien's calculations from A Primer of Drug Action, and half-life multiplied by five is the generally accepted estimate of how long it takes a single dose of any given drug to be eliminated from the blood stream/plasma of someone with a normal metabolism. That's also the rough estimate for steady state if they can't get, or won't provide a number for that.
The next level is "Complete clearance", and is a complex equation based on a lot of factors which may or may not: be published in the PI sheet, include personal data like your weight, or even completely figured out by corporate and independent researchers. It usually winds up being within (as in usually, but not always, after) 2-5 days of plasma clearance no matter what, but sometimes can take weeks. Sometimes a drug will clear from your brain and other organs before it clears from your blood.
2 In terms of sheer raw power of pure sertraline at serotonin transporter binding sites. All sorts of other factors are involved in determining a drug's potency. As I write all over the place "potency" and "efficacy" are two completely different things. See the pages on SSRI & SNRI Dosage Equivalents and Pharmacokinetics for more information.
Enable Crazymeds’ Financial Solvency!
Improve Your Social Media Skills
Follow our Highly Irregular Updates and Paranoid Rants Other News
Square this Circle
For Site News and NeuroPsych Research
Show us teh like™
Crazymeds: The Blog
Crazymeds’ Tumblr
Mentally Interesting Advocacy
OpEd News
Daily Kos
Sites That Probably Suck Less Than Crazymeds
Crazymeds Merchandise
Available at Straitjacket T-Shirts
Vaccines Cause Immunity bumpersticker at Straitjacket T-Shirts
Stuck Up
Mentally Interesting button at Straitjacket T-Shirts
Button It! |
A Guide to Butcher Block Care
Maintaining Your Butcher Block
No longer limited to the local meat shop, the butcher block is now a popular surface material for countertops, work tables, and cutting boards in commercial and residential kitchens. Those who use them value their natural wood appearance, sturdy nature, and durable construction. There are two different types of finishes that can be applied to butcher block surfaces, each requiring different care.
A sealed butcher block is finished with a lacquer, varnish, glaze, or other type of sealant, while an unsealed butcher block receives an oil finish. Although the sealed surface requires very little maintenance, it is not suitable for use as a work space or prep area for anything that involves knife work. The oil-finished butcher block requires regular maintenance, but can be used as a direct work space and withstand heavy-duty use. To get the best results and longest life from your sealed or oil-finished butcher block surface, you should practice proper butcher block care.
Butcher Block Maintenance
To maintain proper sanitation, both sealed and oil-finished butcher block surfaces should be cleaned with hot water and mild soap after use. To avoid cross-contamination, dedicate one work space or cutting board to raw meats and another to vegetables and other ingredients.
If you are working with or cleaning a cutting board, you should never submerge or soak it in water or run it through the dishwasher, as this can cause the board to become waterlogged and warp. Although surfaces can be left to air dry, it is necessary to get rid of excess water with a clean paper towel, cloth towel, or rag. Moisture can severely damage butcher block surfaces, which is why it's important to maintain the surface's protection.
Sealed blocks don't need to be resealed unless the seal is damaged, which can happen if they are used as a cutting surface. However, oil-finished blocks rely on oil being reapplied to protect against moisture and bacteria and need to be re-oiled every few weeks or when the board shows signs of drying. Use the following oiling process for optimal butcher block care:
1. Use a rag to apply an even coating of NSF-approved John Boos Mystery Oil or other cutting board oil to a clean, dry board. Although food grade mineral oil can be used, regular cooking oils should never be used, as they can become rancid and transfer flavors to your foods.
2. Let the oil sit overnight, then remove any excess with a clean, dry rag or towel.
3. If you are re-oiling a cutting board, do the top and sides first, then repeat the process to the bottom.
If dry spots persist after the surface has been re-oiled, you should repeat the process. You may also wish to further protect your butcher block with John Boos Block Cream, which can be applied using the same process.
Wood Countertops Pros and Cons. Sarah White, Chicago Mag. Published March 2012. Accessed December 2015.
Cleaning and Protecting Your Butcher Block Surface. B.E. Conrad, DoItYourself.com. Accessed December 2015.
John Boos Frequently Asked Questions. Accessed December 2015. |
Dismiss Notice
Join Physics Forums Today!
What made the scientists to think about Antimatter
1. Mar 11, 2006 #1
I just want to know what made the scientists to think about Antimatter...
And whats the use of it????
2. jcsd
3. Mar 11, 2006 #2
I'am not to sure there is a modifed veriosn of[itex] E = m c^2[/itex] with [itex]E = - or + m c^2[/itex] I think they created it in particle acceltor's.
There's currently no use for it other then research.It is very expensive and hard to produce and it hard to keep in container.It is possible to use it as power source but not yet if ever.
4. Mar 11, 2006 #3
Read up on the ideas of Dirac. He's pretty much accrediated with the prediction of antimatter.
5. Mar 11, 2006 #4
From Wikipedia:
In 1928 Paul Dirac developed a relativistic equation for the electron, now known as the Dirac equation. Curiously, the equation was found to have negative energy solutions in addition to the normal positive ones. This presented a problem, as electrons tend toward the lowest possible energy level; energies of negative infinity are nonsensical. As a way of getting around this, Dirac proposed that the vacuum can be considered a "sea" of negative energy, the Dirac sea. Any electrons would therefore have to sit on top of the sea.
Thinking further, Dirac found that a "hole" in the sea would have a positive charge. At first he thought that this was the proton, but Hermann Weyl pointed out the hole should have the same mass as the electron. The existence of this particle, the positron, was confirmed experimentally in 1932 by Carl D. Anderson.
Have something to add?
Similar Discussions: What made the scientists to think about Antimatter |
So soda consumption might not actually rot your brain, causing the uncontrollable desire to consume others. But calories devoid of micronutrients might have a behavioral consequence, and the sugary variety of soda might well be causing depression in those vulnerable to fructose malabsorption. Have a look at my previous post on the subject.
The experimental design of the Boston soda study was pretty simple. Boston public high school students were randomly selected and asked to answer a survey. Those who answered that they drank five or more cans of non-diet soda every week comprised 30 percent of the sample. They controlled for a bunch of covariates (but I can think of several million more). Alcohol, age, gender, race, sleep, smoking, family dinners.
Heavy soda drinkers had similar BMIs to less heavy soda drinkers, and were no more likely to have less than six hours sleep. White, Black, and Hispanic kids are all equally likely to be heavy soda drinkers, but Asians were significantly less likely to be quaffing five or more cans a week.
Heavy soda users were far more likely to smoke or drink alcohol, and were far more likely to carry around a knife, have been violent with a sibling, a date, or another young person. When the sample was split into four quartiles rather than two, the violence link remained linear, suggesting a dose response relationship.
And that's pretty much it. A rather limited self-report study with some statistical crunching. No causal relationship can be inferred; though there are some sensible physiologic explanations as to why soda could make you knife your sister, it isn't proven here. Brain-eating was not examined.
Image credit
Image credit
Copyright Emily Deans, MD
You are reading
Evolutionary Psychiatry
Can You Spice Up Your Antidepressant?
The evidence for curcumin in depression.
Your Brain on Daylight Savings
Even minor abrupt shifts in the circadian rhythm can cause issues.
The Cutting Edge of Gut Health and Disease
|
What are some common steps to starting a franchise?
Quick Answer
Self-evaluation, research, attending a discovery day, speaking to other franchisees and finding a suitable location are some of the common steps to starting a franchise. Other steps include choosing a franchise and securing funding, signing the agreement, obtaining the necessary permits and insurance and hiring staff and opening the business.
Continue Reading
Full Answer
Those who intend to start a franchise should ask themselves what appeals to them about opening the business. They should also ask themselves whether they can work long hours and commit to different business methods that have little variation. They also need to consider whether they have a genuine interest in that particular field of business.
Attending a discovery day is the next step. This is a meeting between the franchisor and other potential franchisees. Those in attendance can see the support that the franchisor can offer. To successfully start a franchise, an individual must speak to other franchisees and find out whether they are happy with the support provided by the franchisor.
Finding a suitable location is important. The individual should choose a location where he can easily get customers. Some franchisors help in selecting a suitable location. Securing funding is the next step. Financing options include small business administration loans and bank loans among others.
Before starting the franchise, the individual must sign an agreement. Some franchisors can negotiate the agreement terms while others are rigid. Obtaining the necessary insurance and permits is the next step. Every industry has its requirements for both insurance and permits. Finally, a franchise owner needs to hire staff before opening the business.
Learn more about Managing a Business
Related Questions |
What are the different error codes of a Whirlpool oven?
Quick Answer
Most Whirlpool oven error codes are numbered from F1-E0 to F1-E9, and F0 to F9, while other errors such as "PF" and "LOC" are not numbered. The error codes are classified under two-digit and four-digit categories.
Continue Reading
Full Answer
Two-digit error codes, such as F5, are caused by oven door and latching switch problems. When they occur, disconnect the device from the power source, then check the wires and connections for possible defects. Other common causes of two-digit error codes include door failures, board failures, oven door lock failures and function key failure.
Four-digit error codes, such as F1-E1, F2-E0, F3-E0 and F3-E1, are caused by safety flip flop problems, shorted keypads and faulty temperature sensors respectively. For example, when the oven is too hot, it displays error F3-E2. To solve error F3-E2, disconnect the oven from the power source for approximately 30 seconds, and then restart it.
Other error codes like "PF" are a sign of temporary power failure in the oven. To clear this error, press the Stop/Clear keypad to reset your control settings. To solve error "LOC," press and hold the control button of the oven for approximately 3 seconds, and then release it. This error occurs when the control local feature has been activated.
Learn more about Ovens & Ranges
Related Questions |
codeA guest post by Kasper Grud Skat Madsen, who currently works as a Ph.D. student at the University of Southern Denmark. His research interests are data stream management and cloud computing. He is a contributor to storm and storm-deploy. Furthermore, he is involved in a project trying to extend Storm, called Enorm.
This is my third post in a series that covers Storm. The first post showed how to develop a simple topology. The second post showed how to deploy the topology on Amazon EC2. In this third post on Storm, we investigate how to do multi-threaded computation from within a task.
Storm requires that the emit method on the OutputCollector (used for emitting tuples from one task to another) must always be called from the same thread, otherwise NullPointerExceptions will occur from within Storm itself. In this post I present two ways to do multi-threaded computation while complying with the limitation.
Solution 1 – Tick Tuples
Storm can be configured to send special tuples to all bolts with a given frequency. These tuples are called tick tuples. The way it works is that Storm starts a hidden spout, which emits tick tuples to all bolts, with the desired frequency. Tick tuples can be used to handle the discussed limitation of Storm, by grabbing output from a set of threads, and emitting on each received tick tuple (in this way, only one thread is used). The main disadvantage is the increased latency. To begin using tick tuples, add the following to the Config:
The tasks can distinguish tick tuples, with the following logic:
By using tick tuples, it is therefore possible to use multiple threads in a task, while emitting from only one. Beware though, there is no guarantee that tick tuples will be received with the exact timing requested.
Solution 2 – A dedicated emitter thread
Define a class that reads from a thread-safe queue and emits. All worker threads can put tuples in the thread-safe queue, and there cannot be any problems, as only one thread will actually emit.
NOTE: The following code snippet, serves as an example meant to convey an idea. Often code snippets are written in a simplified style to support understanding. Please do not use the code directly in production.
The method emitDirect, takes three arguments: target task, target stream and data. Simply execute the ThreadSafeOutputCollector in its own thread, and call the emitDirect to emit data. The emitDirect assumes data is sent using the directGrouping. It is your task to extend the above class, to support ordinary emit.
Both of the presented solutions can be employed to handle the discussed limitation of Storm. Which one is better, depends largely upon your exact problem.
See below for Storm and Hadoop resources from Safari Books Online.
Not a subscriber? Sign up for a free trial.
Safari Books Online has the content you need
Getting Started with Storm introduces you to Storm, a distributed, JVM-based system for processing streaming data. Through simple tutorials, sample Java code, and a complete real-world scenario, you’ll learn how to build fast, fault-tolerant solutions that process results as soon as the data arrives.
Storm Real-time Processing Cookbook begins with setting up the development environment and then teaches log stream processing. This is followed by real-time payments workflow, distributed RPC, integrating it with other software such as Hadoop and Apache Camel, and more.
Hadoop: The Definitive Guide, 3rd Edition you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. You’ll also find illuminating case studies that demonstrate how Hadoop is used to solve specific problems. This book is ideal for programmers looking to analyze datasets of any size, and for administrators who want to set up and run Hadoop clusters.
Tags: emitter thread, Hadoop, multi-threading, Storm, Tick Tuples,
3 Responses to “Multi-threading with Storm”
1. J
1/ “_runThread” needs to be volatile
2/ class BufferedData needs to be static final.
3/ calling Thread.interrupt is not good code. I can hear 1999 calling for their own old style of MT coding.
• Kasper Madsen
Hi there,
Thx for the comments.
1. You are right, though in practice very rarely a problem :)
2. The class BufferedData, can be declared static final, but it need not be. When doing this post, I judged it would be better to use an inner class for two reasons: (1) the inner class can access global variables making the code easier to extend, (2) and the example less cluttered.
3. I don’t agree on this part. The _queue.take() is blocking, so the execution might wait for new data here. In case we need to kill the thread, we call interrupt to inform the _queue.take() that it should stop waiting. If we didn’t do this, then killing the thread could potentially take a very long time. It is possible to use a non-blocking function on the queue to avoid the interrupt, but I don’t see any problems with the interrupt. It is a core part of Java, and used many places.
• J
1. it is a problem. Without the volatile keyword, there is a race condition, the worker thread might not see the changed value and block again indefinitely.
2. The inner class needs to be static final in this example (where no members of the enclosing class are accessed), when changing the code later, one can always remove the “static” qualifier. This is simple and good engineering discipline.
3. using Thread.interrupt() is always bad form, you have no guarantees about the state you leave the resources used by the worker thread in (in this simple example there’s none of that, but this doesn’t scale to more complex systems). Better use a poison pill to cleanly shut the worker down. Orderly shutdown is the only way to robustness :) |
The current global labor force stands at about 2,600 million and this figure is continuously increasing as another 40 million people join each year. According to the World Health Organization, many people spend the majority of their time at work, increasing their exposure to hazardous activities, materials and substances. In light of this, one of the most popular workplace safety jargons today is the Hierarchy of Hazard Control. It is a term that's frequently associated with safety management systems that are structured around hazard management in the world of work.
What Is the Hierarchy of Hazard Control?
The Hierarchy of Hazard Control seeks to protect workers by ranking the ways in which hazards can be controlled, providing employers with a framework for reducing the risk to employees. The hierarchy is as follows, where the highest items have the greatest effect on improving safety outcomes.
1. Elimination
2. Substitution
3. Isolation
4. Engineering Controls
5. Administrative Controls
6. Personal Protective Equipment
The idea behind this hierarchy is that the control methods at the top of the list are potentially more effective and protective than those at the bottom. Let's look at what each level of the hierarchy entails.
1.Eliminate the Hazard
The best way to control a hazard is to eliminate it. This can be achieved by making changes to the work process so that the task is no longer carried out, or by physically removing the hazard altogether. Elimination is the most effective way to control hazards and should be used whenever possible. However, it can also be the most difficult to implement, especially if the process is still at the design or development stage. For example, dangerous machinery is often required, and while it can be made safer, it can't be eliminated.
2. Substitute One Risk for a Lesser One
Substitution is the second most effective method for controlling hazards. It is similar to elimination but involves the substitution of one risk for another. For example, one hazardous chemical could be swapped for one with less risk. However, for substitution to be effective, the new replacement must not produce greater hazard. Another type of substitution involves using the same chemical, but in a different form; for example, a chemical in its powder form can be more hazardous (inhalation hazard) than in its pellet form.
3.Isolate the Hazard From the Person at Risk
Isolation involves separating the hazard in time or space from the person or persons at risk. This can be achieved by isolating the hazard through containment or enclosure. These methods aim to keep the hazard "in" and the worker "out" or vice versa. For example, an enclosure can be built around a piece of equipment to reduce the hazards associated with noise.
4. Use Engineering Controls
If a hazard cannot be eliminated nor isolated and a safer substitute cannot be found, the next best approach is the use of engineering controls. Engineering controls are implemented by making changes to the design of an equipment or process to minimize its hazard. Although engineering controls are the most expensive solution, they provide the advantage of reducing future cost. The two basic types of engineering controls are process control and ventilation. Process control involves changing the way a job activity or process is performed to reduce hazards, such as the use of electric motors rather than diesel motors to eliminate diesel exhaust emissions. Ventilation is a method of control that strategically "adds" and "removes" air in the work environment, such as the use of local exhaust fans to control titanium dioxide dust in a paint manufacturing factory.
5.Use Administrative Controls
If engineering controls cannot be implemented, administrative controls should be considered. However, because they do not actually remove or reduce the hazards, they are less effective in comparison to other control measures in the hierarchy. There are usually also many difficulties associated with the implementation and maintenance of control measures. Administrative controls involve making changes to the way in which people work and promoting safe work practices via education and training. Administrative controls may involve training employees in operating procedures, good housekeeping practices, emergency response in the event of incidents such as fire or employee injury, and personal hygiene practices such as the washing of hands after contact with hazardous materials.
6.Use Personal Protection
This is the least effective method of controlling hazards because of the high potential that personal protective equipment (PPE) will become damaged. If PPE is inadequate or fails, the worker is not protected. PPE can also often be uncomfortable, which can place an additional physical burden on the worker. Therefore, PPE should only be used in combination with other control measures from the hierarchy or if there are no other more effective ways to control the hazard. Examples of personal protective equipment include respirators, gloves, protective clothing, hard hats, goggles and ear plugs. (Learn more about PPE and how to use it in 6 Personal Protective Equipment Guidelines Every Employee Should Know.)
The Role of Management
It is the responsibility of management to design jobs safely or redesign them when a hazard is detected. Management should, therefore, gain a sufficient understanding of the Hierarchy of Hazard Control to ensure that the most appropriate control measure is selected and is working effectively in reducing or eliminating hazards and preventing injuries or accidents in the workplace. However, selecting an appropriate control measure is not always easy. It often involves conducting a risk assessment to evaluate and prioritize the hazards and their risks.
The Role of Employees
It is the role of employees to promote the use of the Hierarchy of Hazard Control to ensure that management is providing the most effective methods of hazard control. It is also important for employees to maintain an open line of communication with management regarding potential hazards and the manner in which they should be controlled.
Why Follow the Hierarchy?
Although work contributes to economic achievements, the work environment can expose workers to hazards that give rise to injuries and diseases. Strategic tools like the Hierarchy of Hazard Control can help companies tackle some of the most demanding challenges of modern business by reducing costs, minimizing waste and errors, and preventing injuries and accidents. Furthermore, adhering to this hierarchy will ensure that productivity is increased and business operations are running as efficiently as possible. |
Dr Hannah Fry: the mathematical models that underpin our sexual success
In an extract from her new book, Dr Hannah Fry explains how mathematical modelling underpins everything from the possibility of finding a partner to the number of sexual partners we have in a lifetime
maths love
Illustration by David Biskup
What are the odds?
Or how mathematician Peter Backus weighed up his chances of finding love…
Just as it’s not possible to calculate precisely how many alien life forms there are, it’s also not possible to calculate exactly how many potential partners you may have. But all the same, being able to estimate quantities that you have no hope of verifying is an important skill for any scientist.
It also applies to maths student Peter Backus’s well-publicised quest to see whether there were intelligent, socially advanced women of the same species out there for him to date. And the idea is the same: break the problem into smaller and smaller pieces until it’s possible to make an educated guess. These were Backus’s criteria:
Leaving him with just 26 women in the whole world he would be willing to date.
Personally, I think that he is being a little picky. In effect, he’s suggesting that he only gets on with one in every 10 women he meets, and that he only finds one in 20 attractive enough to go out with.
I think there’s room to be a bit more generous. Maybe the numbers should go a little more like this:
1. How many people of the right gender are there who live near me? (In London -> 4 million)
5. How many are likely to be attractive? (20% -> 20,800 women)
6. How many are likely to find me attractive? (20% -> 4,160 women)
7. How many am I likely to get along well with? (20% -> 832 women)
Almost a thousand potential partners across a city, then.
But there is another issue. If Backus could relax some of his criteria just a bit, he’d have a much bigger pool of potential partners to work with. In fact, he could instantly quadruple his chances if he were a little less fussy about his future love holding a university degree. And the pool of ladies would be much, much larger if he were willing to expand his search to outside of London.
Strangely though, opening our minds to all potential partners seems to be the opposite of what we do when we’re single.
The statistics of sex
In 1996 Swedish scientists asked 2,810 people how many sexual partners they’d had. The results were intriguing…
Much like several surveys that had gone before, the scientists found that the average number of sexual partners was actually lower than you might think: around seven for heterosexual women and around 13 for heterosexual men. But before we start reinforcing any old-fashioned theories about promiscuous men and chaste women, the eagle-eyed among you might question this discrepancy. And you’d be right to do so. By virtue of the fact that there are roughly the same number of heterosexual men and women in the world and that sex has to occur between two people, the average number of partners for both men and women should be the same. And yet, the difference in male and female averages comes up time and time again in surveys of this kind.
There are a few possible explanations for this difference. Perhaps men are more likely to exaggerate. Perhaps men and women have different definitions of what has to take place to add a partner to their total. But perhaps more significantly, it appears that the way men and women arrive at their number is different. Women tend to count upwards, listing their partners by name. This does tend to give quite accurate results, but if you forget anyone while counting, you are prone to underestimating your true number of partners. Men, on the other hand, are much more likely to approximate: “Say… five a year for the last four years.” Again, an acceptable method, but it does rather leave you at risk of overestimating. This theory is strengthened when you realise that a surprising number of male answers happen to be divisible by five.
Beyond looking at averages, though, the Swedish study also provided the data for a revolutionary finding.
In 1999 Fredrik Liljeros and a team of mathematicians plotted all of the responses from the Swedish survey on a graph and found a startlingly simple underlying pattern. The list of 2,810 responses all lie on a near-perfect curve like that here, showing a clear pattern in the number of partners each participant had admitted to.
Most people had had relatively few sexual partners – which is why the left-hand side of the curve is so high. But there were some responses from people with an extraordinary number of conquests, which is why the right-hand side of the line on the graph never quite reaches zero. If the Swedish survey is representative of the population at large, the curve suggests that there will always be some chance of finding someone with any number of sexual partners, however large. Granted, there won’t be many people in the world with 10,000 or even 1,000 partners, but the pattern predicts that there will always be some.
All of this can be wrapped up in a single formula that allows you to predict how many people we’ve all slept with. If you pick a person in the world at random, the chances that they will have had more than x sexual partners is just x-a.
The value of a comes directly from the data. To give you an example, the team found the Swedish women had a value of a = 2.1. If this number were representative of all of us, the chances of someone having more than 100 partners would be 0.006%, suggesting that just over one in 15,800 of us have accomplished that feat. The probability drops the higher the numbers go, but the chances of finding someone with more than 1,000 partners would then be 0.00005%, or one in every 2 million people.
Before I completely explode with excitement over the elegance of the mathematics, I think it’s worth pausing for a second to appreciate how extraordinary this finding is. For all our free will, and despite the seemingly complicated set of circumstances that lead to our sexual encounters, when you look at the population as a whole there is a startlingly simple formula lying behind everything that we’re doing.
The happily ever after
Or how maths can help, even once you’ve tied the knot.
Wt+1= w+rwWt+IHW(Ht)
Ht+1 = h + rHHt + IWH(Wt)
These equations might look like gibberish at first, but they’re actually describing a very simple set of rules for predicting how positive or negative we can expect the husband and wife to be in the next turn of their conversation.
The equation for the husband follows the same pattern.
As Gottman and Murray were the first people to apply a mathematical model to marital conflict, they were free to choose how this influence term would look, and decided that the following version fitted well with everything that had been observed in real-life couples.
If we take the influence (IHW) that a husband (Ht) has on his wife as a guide, the graph here shows the mathematical model chosen by the team.
Wherever the dotted line is high on the IHW scale, it means that the husband is having a positive impact on his wife. Likewise, wherever the dotted line dips below zero on the IHW scale, the wife is more likely to be negative in her next turn in the conversation.
Imagine that the husband does something that is a little bit positive: he could agree with her last point, or inject a little humour into their conversation. This action will have a small positive impact on the wife and make her more likely to respond with something positive, too.
This happens until a point, T+, where the husband does something really nice, like telling her he loves her or agreeing to go with her to that new play she’s been wanting to see. Anything more positive than T+ will have a big impact on the wife and is much more likely to see the couple draw themselves into a nice, stable conversation with lots of positive reinforcement.
At the other end of the spectrum, if the husband is a little bit negative – such as interrupting her while she is speaking – he will have a fixed and negative impact on his partner. At some point T− though, known as the “negativity threshold”, the husband is sufficiently annoying to cause his wife to lose her cool completely and respond very negatively to him. This threshold turns out to be quite important in understanding the spirals of negativity that occur in couples.
Now, I always thought that good relationships were about compromise and understanding, and so would have guessed that it was best to aim for a really high negativity threshold. A relationship where you give your partner room to be themselves and only bring up an issue if it becomes a really big deal.
But actually, the team found that the exact opposite was true. The most successful relationships are the ones with a really low negativity threshold. In those relationships, couples allow each other to complain, and work together to constantly repair the tiny issues between them. In such a case, couples don’t bottle up their feelings, and little things don’t end up being blown completely out of proportion.
© 2015 by Dr Hannah Fry. Adapted excerpt from The Mathematics of Love by Hannah Fry (Simon & Schuster & TED £7.99) to be published on 12 February. Click here to order a copy for £6.39
Dr Hannah Fry: ‘With this book, I wanted to deliberately choose the subject that was furthest away from maths and prove that even in that setup, maths has something to offer.”
Hannah Fry interview: ‘We do things optimally without even realising it’
You’re a mathematician – what’s your background?
I’m an academic. I did my PhD in fluid dynamics and now I work at the University College London in an interdisciplinary department looking at patterns of human behaviour in urban settings. So lots of things about cities and crime and transport – anything to do with that. The aim is to try to derive understanding from the world around us and then use that understanding to feed back into design.
Why write a book about maths and love?
I am always frustrated by the way people view maths. I think people have this hang-up from school that maths is this dusty old textbook that was finished hundreds of years ago, and all the answers are in the back. Whereas in my job I struggle to find anything that maths can’t offer an interesting perspective on.
Do you take a mathematical approach when you give dating advice to your friends?
It is not like getting out the statistics, but if friends are doing online dating then yes, I think there are bits of advice that definitely apply.
You say in the book that people shouldn’t try to look too good in their online profiles…
That’s really surprising. The most messaged person on OKCupid is a woman in New York and she is really beautiful but she’s covered in tattoos. The idea is that people see her and she really divides opinion.
Think about it from the perspective of the person doing the approaching. If you think someone is beautiful but you suspect that everyone else will think they are beautiful, then there is loads of competition and you are probably just going to make a fool of yourself and be rejected. Whereas if you think a person is really beautiful and you suspect other people won’t think the same, there is more incentive to get in touch. Basically whatever it is that makes you unique and individual, play up on that.
There’s a secondary point here. If you see somebody who is generically really beautiful, chances are they are not getting as many messages as you might think, so you might as well give it a go!
Most of the examples you give involve heterosexual couples. Does the maths also work for same-sex couples?
Many of these examples are based on mathematical papers and there are times where it is easier mathematically if you have two groups of people who are targeting each other – so translating that into the traditional story of boy meets girls is how it has worked. But I think all of the take-homes apply across the board.
Are we wired to be mathematical?
We do things optimally without even realising it. For example, there is an idea in the book about rejecting your first 37% of partners and then picking the next one after that – humans do that kind of thing anyway. Although it does happen, and successfully, most people do not marry their high-school sweetheart. So we have these tools to be able to optimise things quite naturally. Maths is just giving you a way to describe it.
Have you applied any of these strategies to your own life?
I did the guest-list one for my wedding. When you are planning a guest list it is really difficult to know exactly how many people to invite to make sure that on the day you end up with the right number. This is a way of assigning probabilities to how likely you think your guests are to arrive or not to arrive, which will give you a way to work out how many people to invite to your wedding.
Has online dating made it easier to unearth the maths behind attraction?
Yes. Whereas a lot of this stuff would previously happen behind the scenes, now you have this world of data that allows you to look into the way that people speak to one another, and the way that people talk about themselves and interact with one another, in a way that we were never able to before. From a mathematical or statistical point of view that opens up dating to this type of analysis and investigation.
Interview by Nicola Davis |
Why peanuts вest nuts for your health
Why peanuts вest nuts for your health
During festive times when people are relaxing, there is often the need to snack as one chats with family and friends.
In instances like these, health experts advise to snack on healthy foods, such as peanuts.
A study published in recent months confirmed peanuts' acclaimed health benefits, that they may protect against major causes of death.
The paper published in the International Journal of Epidemiology highlighted the link between nut intake and lower mortality rates from several major causes of death.
These include respiratory disease, neurodegenerative disease, diabetes, cancer and cardiovascular diseases, according to Medical Xpress news.
READ ALSO: Food items that saved every Ghanaian student's life in secondary school
Peanuts and tree nuts both contain various compounds such as some fatty acids, various vitamins, fiber, antioxidants, and other compounds, that possibly contribute to containing these diseases.
The study by researchers from Maastricht University found that although you are unlikely to gain these health benefits from peanut butter, the bread-spread is not associated with mortality.
Just that peanut butter contains added components like salt and vegetable oils, and the adverse health effects of salt and trans fatty acids from the vegetable oils could inhibit the protective effects of peanuts.
READ ALSO: Avoid these bad habits before you sleep
Related news
Six Ways Cats Make You Live Longer
Six Ways Cats Make You Live Longer
Six Ways Cats Make You Live Longer |
There's Something Very Unusual About This Little Village
There should be more places like this.
Imagine having to explain over and over why you can't remember people, or feeling lost every time you have to find your neighborhood grocery store.
These are just a few of the frustrations someone suffering from Alzheimer's disease — a form of dementia causing problems with memory, thinking and behavior — might experience
Every 67 seconds, someone in the United States develops this debilitating illness.
Though there is no cure for the degenerative disease, people can at least find relief in a little village in the Netherlands, made especially for seniors suffering from severe cases of Alzheimer's and dementia.
The gated village in the town of Weesp takes up just one city block. It is called Hogewey.
It has 23 houses where 152 seniors live, aided by trained geriatric nurses and specialists.
According to Psychology Today, the staff wear normal clothing (instead of clinician's clothing) and call themselves "villagers." They are available around the clock to help the elderly residents.
"If they [the residents] forget their wallet, no problem," explains Dale Archer M.D. on his Psychology Today blog. "If they get lost, there's always a 'villager' to help them get home, and if they load up with 20 cans of tomato sauce, an aide will return the extras to the grocery later that day."
Residents of Hogewey live together in lifestyle groups that consist of about seven people with shared interests.
Hogewey's website explains that specialists try to make the residents' lifestyles as recognizable as possible by providing repetitive stimuli. Residents are challenged to continue participating in that lifestyle with maximum privacy and autonomy.
But not only do they get to manage their own households with the assistance of staff members, they also get to enjoy the many facilities offered in the village in a safe way.
Just like any other neighborhood, Hogewey has streets, squares, a garden and a park.
It also has its own grocery store, movie theater, beauty salon, barber shop, restaurant, bar...
And this massive chessboard.
The facilities are not only open to residents, but also to people in surrounding neighborhoods, according to Hogewey's website.
Given the quality of care, it's understandable that Hogewey has a long waiting list.
Psychology Today notes this way of treating Alzheimer's and dementia is groundbreaking, and that officials say it only takes a few weeks for Hogewey residents to show dramatic improvement.
Fortunately, Hogewey won't be the only one of its kind, as plans are already set in motion for a similar village to be built in Bern, Switzerland. One may even be built in the United States.
(H/T: Bored Panda |
Thieves steal from school transportation facilities. Vandals break into local school bus lots. Universities and community colleges are victimized by auto theft. This loss of equipment has cost schools countless dollars. School transportation security often is overlooked, but it is essential to an education institution.
When tires get slashed, vehicles get spray painted, or any other type of vandalism occurs, schools suffer the monetary loss. When students slash tires in order to get classes cancelled, a district could lose thousands of dollars.
Dedicated space
During tough economic times, it is essential that schools protect transportation systems. Spending a little for protection can save a school a lot of money in the long run. Prevention is the best response.
Some easy and cost-effective steps can enhance an already established security program. If a school does not have a transportation security program, it should begin one immediately.
In addition to saving schools money, a high-quality school transportation security program can prevent violent encounters and other crimes. A couple of years ago, a school bus driver was stabbed to death after her ex-boyfriend boarded her school bus prior to the start of her day. Had there been better physical security measures in place, the attack might have been prevented.
The first step in establishing a high-quality school transportation physical security program is to designate a specific area where all school transportation vehicles will be parked and stored. Education institutions should not allow school-related transportation vehicles to be parked at private residences, on the street, in parking garages or at other commercial properties. A dedicated parking facility where all vehicles will be left when unattended is essential. This includes not only school buses, but also vans, cars and trucks.
This designated parking area must have security lighting, and the lights must turn on automatically. Dusk-to-dawn lights are good and generally provide sufficient lighting capabilities. The lights also must turn on during other times of darkness, such as during storms or other low-visibility situations. The light must be sufficient to illuminate the entire parking complex.
Designated users
Access control and perimeter security also are critical to a security program. The parking lot perimeter must have a fence that effectively keeps unauthorized people out. A six- to eight-foot chain-link fence with triple-strand barbed wire on top generally will suffice.
Once the perimeter is set, an education institution must have a system for allowing authorized people inside and keeping unauthorized people out. Gates with locks are one way. Schools that use this method must make sure that only properly vetted employees are allowed to handle keys. If lock keys are lost or stolen, all locks must be changed immediately. One effective security method is to have people enter a building and from there move to the parking area. This method enables office personnel to screen those entering the facility and reduces the number of lock keys. Additionally, this method reduces the number of entry and exit points, which are vulnerable to security breaches.
Keys to vehicles must be locked inside a box in the transportation office. When keys are assigned to drivers, the education institution should record who received the keys, when they were issued and when the keys were returned. Do not allow drivers to retain copies of vehicle keys or lock keys. School systems should conduct a key inventory quarterly. |
Besson MB-36
Besson MB-36
Страна: Франция
Год: 1930
Единственный экземпляр
Flight, December 1926
The Paris Aero Show 1926
Flight, December 1926
The Paris Aero Show 1926
ALMOST the only machine in the exhibition concerning which it was found difficult to obtain any detailed information was the large three-engined monoplane flying-boat exhibited by Marcel Besson. The machine has a very large flying-boat hull of rather pleasing lines, but the single step and straight Vee bottom is scarcely in keeping with the most modern British ideas on the subject of flying-boat design.
A placard on the stand announced that this machine, the type M.B.36, with three Gnome-Rhone-Jupiter engines, has an area of 130 sq. m. (1,400 sq. ft.). The weight empty, but equipped, is given as 5,150 kg. (11,330 lbs.). The load carried is 2,850 kg. (6,275 lbs.), giving a total loaded weight of 8,000 kg. (17,600 lbs.). The commercial load is given as 1,350 kg. (3,000 lbs.) and the machine is said to have a range of 900 km. (560 miles). A top speed of 180 km./h. (112 m.p.h.) is claimed. The machine has accommodation for 14 passengers and there are two large luggage compartments.
The M.B.36 was exhibited with its wing uncovered, so that a certain amount of detail could be seen, although for some reason or other those in charge of the stand refused to have anything on the machine sketched in detail. The wing structure did not impress one as being any too strong. Altogether the wing structure gave one the impression that it had originally been intended to build it in metal, but that at the last moment it became necessary to rush through a wooden wing. The mountings of the three Jupiter engines were in the form of very small girders of small diameter steel tubing, cross braced with piano wire and placed inside the wings. These mountings looked far from substantial, and it seems fairly certain that they will have to be re-designed before the machine becomes a practical proposition. With a slightly improved wing structure there does not, however, appear to be any reason why the M.B.36 should not be turned into quite a useful commercial seaplane.
Three-quarter rear view of the Marcel Besson M.B.36. The machine is fitted with three "Jupiter" engines |
How to Win a Legal Writing Competition in 3 Surprisingly Easy Steps
I have been an organizer and grader for a number of writing competitions over the years. Collectively, I’ve reviewed dozens of writing competition submissions, some good, most not so good. This post provides you with a three-step protocol for legal writing competition success. You might be surprised that it is easier to win than you think.
Step 1: Research competitions
Your first step is to learn about the competitions. It can be hard to get credible information about writing competitions because they change their rules or shut down entirely without much notice. My mom, her researcher and I have worked together to compile the legal writing competitions into a book, “How to Pay for Your Law Degree.” Most law schools have a copy on campus which you can review for free (usually in the law library, but sometimes in the financial aid or career placement offices). Or, if you want, you can order your own copy for about $30 at Amazon.
You should scan the book to get a sense of what writing competitions exist, the paper topics that might fulfill some competitions, typical deadlines and eligibility requirements.
Step 2: Write a Paper
Armed with some knowledge of writing competition requirements, your next step is to write a paper that can compete.
To help you write your paper, if you don’t already own it, you should get Prof. Eugene Volokh’s book Academic Legal Writing: Law Review Articles, Student Notes, Seminar Papers, and Getting on Law Review. This book helps you navigate every step in the paper-writing process.
The book will answer most of your questions, but let me add a little advice about writing a paper that can win writing competitions. From my perspective, the key to winning is picking a good topic. This may be obvious, but students often focus more effort on conforming to the Bluebook and the style manuals; those are helpful, but they will not determine your success in a writing competition. Instead, pick a good topic and execute it competently, and you position yourself well for victory. In contrast, pick a poor topic, and even if you execute it brilliantly with the finest footnotes and no style errors, you still aren’t competitive.
Regarding topics, I recommend that you start thinking about topics early. By doing so, you can start collecting material and thinking about the topic in your spare mental cycles rather than rushing around at the last minute. Stated differently, it’s easier to write a good paper on deadline with a warm start than a cold one. Also, it is hard to write a good paper in a single semester. You might consider ways to work on your paper before and after a semester to make sure you have adequate time to refine your thoughts, develop your arguments and polish your paper.
As Volokh discusses in his book, students routinely make some errors selecting topics that reduce or eliminate their chances of winning a writing competition. Some examples:
* case notes. Personally, I think blogs have mooted student-written case notes. It is very, very rare that a student case note can add something to the collective understanding of a case that the blogosphere didn’t already say in the first week following the case. But even if you disagree with me about that, case notes have almost no shot of winning a writing competition because they are too topically narrow and unambitious compared to other papers.
* topics driven by current events. Virtually every time I grade a writing competition, I see papers on a topic that briefly got a lot of press coverage about 12-18 months beforehand, but that no one is still discussing any more. These papers also have almost no chance of winning.
* topics on pending legislation or cases on appeal. Occasionally these papers are perfectly timed, but usually something happens between the time the student selects the topic and the writing competition evaluation—such as the legislation dies or gets radically revamped, or the case settles or the new opinion hasn’t issued yet but is imminent. Those intervening developments usually undercut the paper’s most interesting facets.
* me-too topics. Students tend to gravitate towards overgrazed topics where it is hard to find something unique to say. There are certain topics that students just can’t resist (in my field, they include online music/file-sharing and keyword advertising). As a grader, when I see the eighth entry on online file-sharing, an overwhelming sense of ennui sets in—either the paper better knock my socks off, or I’ve seen and heard it all and the paper looks derivative. In effect, student papers play a game of Scattergories against each other (a process I describe in more detail here). In particular, when two or more writing competition submissions are on the same general topic (don’t laugh—it happens frequently), almost invariably they both knock each other out because neither paper seems original. At best, the grader will compare the two papers against each other, and the lesser paper is doomed. So to avoid the pitfalls of grader ennui and scattergories, avoid the me-too topics.
* topics that are too hard. Occasionally students go the other direction and pick a topic that is too hard for students to successfully execute. I remember grading one paper that simultaneously undertook three really hard tasks: (1) a constitutional analysis, (2) analysis of an international treaty, and (3) a multi-country comparative analysis. Whew! I think most law professors with their resources and experience could not successfully execute this topic even if they worked on it for years, and a student writing his/her first academic paper had no chance of succeeding.
Whatever topic you select, make sure you love it. In effect, you marry your topic because you will typically spend several hundred hours working on it over the course of months or even years. Ideally, your topic will have something to do with your desired future practice. Your research can lay a foundation for your substantive knowledge in that area and signal your interests to future employers.
A final note about writing the paper: your paper competes based on its original analysis, not its recap of the prior literature. When I’m grading a paper, I skip over the paper’s recap of the law (unless I don’t know the area well) and look for the paper’s unique insights into the issue. If that’s only one paragraph in the conclusion, the paper has zero chance of winning.
Step 3: Apply!
Winning a writing competition is a big deal. Usually you win cash, which is always nice. Sometimes you also get guaranteed publication for your article. With some competitions, you get a free trip to an awards presentation ceremony. For example, the Entertainment Law Initiative Writing Competition flies out the winner and the honorable mentions to attend the GRAMMY awards ceremony and related parties.
A writing competition victory also has incalculable benefits for your resume. It represents external validation of your writing skills. As you know, employers value writing skills highly, so a win could significantly improve your job prospects.
So there are ample reasons to compete. Yet, amazingly, fewer students do so than you might think. I have been involved with several writing competitions where we have received a shockingly low number of submissions. It is not atypical for lesser-known or niche competitions to have less than 2 submissions for every prize available.
In some cases, the odds are even more favorable. For example, for the past 3 years I have run ASCAP’s Nathan Burkan copyright-themed writing competition at SCU. ASCAP gives us the right to designate a winner ($600) and runner up ($250) at SCU; the winner then competes nationally for more money. Each of the past 3 years, we have gotten only one submission for the local SCU competition. In other words, we have had $250 and an honorific just waiting for someone to apply and we couldn’t give it away. As the marketing slogan goes, “you can’t win if you don’t play.”
Now, some writing competitions do have a lot of submissions, making the odds of success much lower. But if you do your research, you can find competitions that other students may have overlooked; and if you write a competent paper on a good topic, your paper will stand out and compete well even in popular contests.
Good luck!
[Note: some of the links are Amazon Affiliates links] |
People With Control Issues
Many of us experience a need to control others. We want others to see things and do things our way. Shostrom (1968) described several types of manipulators:
1.The dictator: wants to control others by orders, i.e. by virtue of his/her authority, position, status, or rank. Such a person believes he/she knows what is right and what you should do.
2.The weakling: controls or defies authority by using his/her weakness, sometimes in powerful ways, such as "Oh, I forgot," "I didn't understand," "I just can't do it," or "I'm so nervous." This is passive-aggressiveness.
3.The calculator: sees the world as a contest of wits. He/she is constantly plotting, conning, pressuring, persuading, selling, seducing, or trying to outwit others.
4.The clinging vine: wants to be cared for, dependent, submissive, and faithful. As a helpless, grateful, cuddly child, he/she gets others to do a lot for him/her.
5.The bully: uses his/her anger, toughness, viciousness, and threats to intimidate others and get his/her way. The "tough guy" and "the bitch" are common characters.
What can you do about being manipulated?
First, recognize what is happening. Second, stand up for your rights. Think and decide for yourself assert yourself. Build your self-esteem so that you are not overly dependent on others.
What if you are the manipulator?
Controllers or manipulators use five basic methods of persuading or influencing others (Kipnis & Schmidt, 1985):
(1) Carefully stating the reasons and logic for changing, (2) assertively reminding and urging someone to change,
(3) soliciting others to support your proposals, (
4) going over someone's head to get support from "higher ups," and
(5) working out a deal so you get part of what you want.
Naturally, different leaders use different methods:
(1) the "steam rollers" go for broke and aggressively use all the methods--they won't take no for an answer, and may even threaten, shout, and demand,
(2) the "rational ones" rely only on hard facts, logical analysis, careful plans, and compromise,
(3) the "pleasers" actively persuade others but mostly "politic," focusing on offering "pay offs," flattery, and personal charm, and
(4) the "onlookers" mostly stay out of the controversy.
In a second study, Schmidt and Kipnis (1987) found that the "steam rollers" got the lowest job evaluations, contrary to what is taught by some Business Schools. Male "steam rollers" were disliked even more than female "steam rollers," contrary to the common notion that pushy women are the most resented. Sexism does occur, however, when you ask, "Who got the best job evaluations?" "Rational" men and "Pleaser" or "Onlooker" women! Conclusion: men's ideas and women's quiet pleasantness are valued, not women's ideas nor men's pleasant passivity.
Note what methods you use to influence people in different situations. Consider the possible advantages of using the rational approach. Nasty aggressive tactics put others down while soft tactics may put you down. Practice relating to others as intelligent, reasonable equals and in a manner whereby both of you can be winners.
Unconscious controlling of others
The manipulations described above involve conscious, overt control (requesting, persuading, buying off, threatening) or conscious-to-the-controller but hidden-to-the-victim control (deception).
Beier and Valens (1975) concentrate on a third kind of control--unaware control.
Neither controller nor controlee realize the purpose or goal (like in "games"). The authors say unconscious control is the most common, powerful, and effective control. Many forms of unaware control are learned by young children: cuteness, weakness, illness, fear, anger, sadness, goodness, giving, love, etc. These acts and feelings can all be used to subtly influence others.
There is obviously no quick, conscious defense against this control, because we don't know what is happening or how. Is there any defense at all? Yes, learn how to detect the subtle control, then extinguish it by preventing the payoffs. It can be done.
Here are the steps, suggested by Beier and Valens, for avoiding "unaware control."
(1) Become as unemotional as possible so you can observe the interaction (with the controlling person) as objectively as possible.
(2) Observe the effects, i.e. note the results of your interactions, and assume that whatever happens (especially repeatedly) was the unconsciously intended outcome. If you got mad...or felt guilty...or gave them a loan, assume that was the other person's unconscious intent. Don't be mislead by the person's words or "logic," don't try to figure out what made you respond the way you did, just note what pay offs the other person's actions and/or feelings lead to.
(3) Disengage from the relationship--stop responding in your usual, controlled-by-other-person way. Be understanding, not angry. Listen, but don't rescue him/her. Become passive resistant to the controller then, observe his/her reaction to your non-response.
(4) Next is the key step: now, instead of giving the old manipulated response or no response, give a new surprising response that does not go along with what the manipulator expects (and unconsciously wants) but does not threaten him/her either.
Example: suppose a person (child, spouse, boss) gets attention and status by being nasty and yelling. You could start responding differently by simply saying, "It's good to express your feelings." You give no argument, you show no fear of his/her long verbal abuse, and you make no concessions and don't cater to his/her whims.
(5) Give him/her space--just let the other person find a new and better way to interact with you. You should not try to become a controller of the other person and tell him/her what to do instead, be free to experiment with different styles of interacting with this person.
Problems with boundaries and being controlled? Is control ruining your relationship? Help is available!!
Cheryl Dusty D.Div.
Healing OurselvesHome
Client Testimonials
Essential oil herbal blends for healing emotionl & physical ailments
Save Money on Your Wedding!
Your Spiritual Growth
Contact Us
Dealing with Anger
Death, Dying, Grief and Loss
Emotional Abuse
Earth Change Info and Survival Info
Ethanol Made at Home
Free Daily Astrology Forecast
Help Is Only A Phone Call Away
HANDBOOK for 2010
Healing Ourselves
Make Flower Essences and Essential Oils
Relationship Anger
Survival Water
What's a Relationship Intuitive?
Who Is The Cherokee Angel ?
Web Design by Cherokee Angel |
Originally created 01/13/04
Mars rover should roll from lander later this week
PASADENA, Calif. -- NASA's Spirit rover has been on Mars for more than a week but still hasn't landed.
Instead, the six-wheeled vehicle sits parked 16 inches above the dirt and rocks of a planet it traveled 300 million miles to explore. Its wheels have yet to touch down on the surface.
The sequence of maneuvers needed to get the rover to roll into action has taken longer and proved more complex than expected. And the air bags that cushioned the rover's landing on Mars have been obstructing the vehicle's path, despite repeated efforts to pull them back.
As a result, the rover will probably not set its wheels down on the martian soil until Wednesday or Thursday, at least 12 days after its arrival on Mars. That is a week longer than NASA anticipated at launch.
The delays have caused much teeth-gnashing among mission members.
"The timing is a sign of the complexity and the complexity is the concern," said Richard Cook, deputy project manager of the $820 million double rover mission.
The scientists on the project are eager for Spirit to begin exploring Mars for signs that it was once wetter and more hospitable to life. But the engineers worry about the rover becoming stuck, toppling or otherwise damaging itself, perhaps fatally. Both groups want Spirit rolling on Mars before its identical twin, Opportunity, arrives Jan. 24.
For now, Spirit remains atop the opened petals of the lander that delivered it to the Red Planet
When Spirit bounced onto the surface of Mars on Jan. 3, NASA thought it would take a week for Spirit to unfold, photograph its surroundings and make some cursory scientific measurements before trundling off. But the process has gone more slowly than expected.
Further delaying Spirit's departure were two sections of the air bags blocking the ramp straight ahead of Spirit. NASA has been forced to plot a secondary and more risky route for the rover to use. That will require the rover to pirouette 115 degrees to its right.
Spirit's first steps should take 75 seconds to complete. It is a maneuver engineers have simulated more than 500 times on Earth.
"In all likelihood, it will be our most dramatic move," said Kevin Burke, a mechanical systems engineer on the mission,
The only previous rolling robot that the National Aeronautics and Space Administration sent to Mars was a simple affair. The microwave oven-sized Sojourner stood up, raised its antenna and shoved off just a day after its July 4, 1997, arrival on Mars aboard the Pathfinder spacecraft.
The golf cart-size Spirit is the robotic equivalent of the Sojourner rover and the Pathfinder lander rolled into one. There's nothing simple or fast about getting it ready.
"People want to know why it's taking so long. Well, it's a lot more complicated," said Rob Manning, who oversees the entry, descent and landing portion of the mission for NASA's Jet Propulsion Laboratory.
NASA had to fold, origami-like, the boxy rover to fit it into its pyramid-shaped lander. Just about everything that sticks out from the rover's foil-covered body had to be tightly stowed, including its solar arrays, camera mast, high-gain antenna, wheels, suspension and robotic arm.
"It boils down to putting a square peg in a round hole," mission manager Jennifer Trosper said.
Reversing the process takes time.
Chris Voorhees, a mechanical systems engineer on the mission, called it one of the most complex sequences ever performed on a robotic spacecraft.
Just getting Spirit to stand up from the crouched position it held during the seven months since launch required 12 pyrotechnic devices, nine motors, six latches and four sets of hazard-avoidance camera images - plus numerous sensors to monitor the entire orchestration, Voorhees said.
NASA hopes the design will also work for Opportunity. After that, the space agency probably will drop the landing scheme altogether for rover missions now on the drawing board.
"Certainly, it's more complicated than you'd like it to be," Trosper said.
For now, NASA officials continue to counsel patience with Spirit.
"You have this expensive asset on the surface of Mars. If you don't get it off on day 10, it's not the end of the world," said Firouz Naderi, manager of the Mars exploration program at JPL. "You have to take your time."
On the Net:
Trending this week:
© 2016. All Rights Reserved. | Contact Us |
[muh-chik-uh-leyt] /məˈtʃɪk əˌleɪt/
verb (used with object), machicolated, machicolating.
to provide with .
(transitive) to construct machicolations at the top of (a wall)
Read Also:
• Machicolation
[muh-chik-uh-ley-shuh n] /məˌtʃɪk əˈleɪ ʃən/ noun, Architecture. 1. an opening in the floor between the corbels of a projecting gallery or parapet, as on a wall or in the vault of a passage, through which missiles, molten lead, etc., might be cast upon an enemy beneath. 2. a projecting gallery or parapet with such openings. […]
• Machida
[muh-chee-duh; Japanese mah-chee-dah] /məˈtʃi də; Japanese ˈmɑ tʃiˌdɑ/ noun 1. a city in E central Honshu, Japan, on the Tsurumi River: a suburb of Tokyo.
• Machinable
[muh-shee-nuh-buh l] /məˈʃi nə bəl/ adjective 1. (of a material) capable of being cut or shaped with tools. Compare . 2. (of a letter or package) capable of being safely sorted by mail machinery, as a parcel sorter. adj. 1896, from machine (v.) + -able. Related: Machinability. Machine-readable. Having the softcopy nature. [Jargon File]
• Machilid
[mak-uh-lid, muh-kahy-] /ˈmæk ə lɪd, məˈkaɪ-/ noun 1. .
|
Skip to main content
Monday Reads: The Hawaiian Petrel Edition
“And over this desolate face of nature a stern silence reigned, scarcely broken by the flapping of the wings of petrels and puffins.” —20,000 Leagues Under The Sea, Jules Verne
The mysterious, rarely seen Hawaiian petrel are true seafarers, living nearly all of their lives over the open ocean. Earthjustice is working in the Aloha State on behalf of these endangered birds. Once plentiful throughout the islands, they are colliding—literally—with human development, killed when they fly into power lines.
For the non-birdwatchers among us, these birds may seem to be a nondescript bird species—but they aren’t ‘just another bird.’ Today, Monday Reads presents not one, but three interesting tidbits to better acquaint you with the Hawaiian petrel.
1. Petrels were named after St. Peter. They both walk on water (sort of).
The name ‘petrel’ is commonly thought to have originated from the French version of St. Peter’s name. The birds have long, thin legs (which don’t work too well on land), and several species will slightly dip their feet into the water and seemingly hover while feeding, giving the illusion that they are walking or standing on the water’s surface.
The Hawaiian petrel’s scientific name is Pterodroma sandwichensis, and no, they were not named by a scientist who was exceptionally hungry for lunch. The ornithologist Robert Ridgway named the birds after an early moniker for the Hawaiian Islands, the Sandwich Islands. (And no, this name was not bestowed by a hungry explorer; James Cook came up with it in honor of his patron, the fourth Earl of Sandwich.)
2. Stranded in the ocean? Think that seeing a petrel means land is near? Guess again.
Petrels are pelagic birds, meaning that they spend the majority of their lives out over ocean waters and return to land only to breed. If you’re lost out on the open ocean and you see a petrel, chances are, you’re not any closer to land than before the bird appeared.
Even when the petrel is nominally back on solid ground, scientists have found that they will fly over 6,000 miles on two-week foraging trips—even all the way to Japan!—to find food for their young.
During the months that they spend out on the ocean, Hawaiian petrels will feast on squid, fish, plankton and crustaceans. And when they get thirsty? A built-in desalination system takes care of that; the petrel’s specially adapted bill includes tubes which allow them to “sneeze” out the salt from seawater.
3. One kid a year….for 40 years…
At around six years of age, Hawaiian petrels will begin returning to Hawaii annually to breed, laying a single white egg each year. For the next 40 years, they will go back to the same nest site.
The fact that Hawaiian petrels generally lay only one egg a year (with no guarantees that the chick will survive to adulthood), and take six years to even start the process, is one reason why the population of this unique bird is so vulnerable once the adult population has taken a dip.
One way we can help the Hawaiian petrel is to reduce deaths through such incidents like flying into power lines. A study found that these types of collisions can easily be avoided through measures like shielding the lines with trees, or reducing the height of utility poles. Read more about how Earthjustice is working to have the Kaua'i Island Utility Cooperative implement measures like these. We’ll keep you posted on new developments.
More Reads:
Tags: Monday Reads
Terms of Use
|
You are here:
Physics/specification required for optical fibre
i m an engineering student pursuing a mechanical engineering.
I m working on a project which is related to transfer of heat(infrared energy) through optical fibre. so what kind of specification an optical fibre required to transmit infrared energy..It would be helpful for us if u can provide some guidance on this topic.
Actually, while not an optics guy myself, I worked in a building next to guys who designed and made optical fiber for special clients. It turns out that optical fiber is fantastically complex, compared to the simple "total internal reflection" example given in most physics textbooks! It's ridiculously thin, yet to make it a waveguide instead of a simple internal-reflection light pipe it has somewhere between 20-30 layers of material around the core fiber, intended to gently guide the infrared light back along the center with minimal loss. Yes, I typed "infrared." It turns out that most commercial fiber optics are designed to transmit along such frequencies, making lasers far cheaper. At least, this was the case 9 years ago, and I'm not sure they've made radical wavelength shifts since then. So first you need a fiber that will conduct in the IR band and not absorb it. Then you need one with a relatively high index of refraction to keep the light inside the fiber. Beyond that, fiber optic cable is a bit of black magic that's known better to chemists and industry insiders than to nuclear physicists like myself. But for experimental purposes, you should probably not reinvent the wheel, but rather start with some commercial optical fiber. You should be able to secure it in quantity and cheaply.
All Answers
Answers by Expert:
Ask Experts
Dr. Stephen O. Nelson
©2016 All rights reserved. |
1. The process whereby a gas becomes a liquid or a solid.
2. A chemical reaction between two organic compounds which produces (among other things) water, ammonia, or a simple alcohol.
3. A chemical reaction between two molecules which links them together and expels a molecule of water. For example, the joining of two amino acids by a peptide bond during the formation of a polypeptide.
Con`den*sa"tion (?), n. [L. condensatio: cf. F. condensation.]
The act or process of condensing or of being condensed; the state of being condensed.
He [Goldsmith] was a great and perhaps an unequaled master of the arts of selection and condensation. Macaulay.
2. Physics
The act or process of reducing, by depression of temperature or increase of pressure, etc., to another and denser form, as gas to the condition of a liquid or steam to water.
3. Chem.
A rearrangement or concentration of the different constituents of one or more substances into a distinct and definite compound of greater complexity and molecular weight, often resulting in an increase of density, as the condensation of oxygen into ozone, or of acetone into mesitylene.
Condensation product Chem., a substance obtained by the polymerization of one substance, or by the union of two or more, with or without separation of some unimportant side products. -- Surface condensation, the system of condensing steam by contact with cold metallic surfaces, in distinction from condensation by the injection of cold water.
© Webster 1913.
Log in or registerto write something here or to contact authors. |
Atomic Clock Can Detect Minute Changes in the Fabric of Space-Time
atomic clock
Scientists have created a new atomic clock that detect can minute changes in the fabric of space-time. The new clock that uses a strontium atom is so precise that it will neither gain nor lose one second in the next 15 billion years. Moreover, it can detect minuscule ticks in the speed of the cosmic clock whether if it is under two centimeters farther or closer to the center of the Earth due to the properties of gravity.
Jun Ye, a physicist at JILA, stated, “Time can be intricately connected to gravity.” Although this sounds like science fiction, the notion of it lies within one of Einstein’s basic theories. The ability of the hyper-sensitive clock to determine the tiniest changes in depth or altitude is based on Einstein’s theory of relativity. The farther an object gets from a central point of gravity, the faster time moves. Researchers have proved this theory over the decades by comparing the speeds of other hyper-sensitive clocks located at different altitudes, either on board airplanes or satellites, and comparing them to those on the ground.
Though, decades have come and gone, allowing scientists to create an even better atomic clock. This allows scientists to detect a change in time even with a two centimeter fluctuation in altitude from the center of the Earth. Ye stated the new version of the atomic clock is a modified model of an optical lattice clock that counts the spins of strontium atoms that are caught within a network of lasers. They used a strontium atom because it is a very stable atom. Ye explained the clock measures of speed of an electron as it goes around the nucleus of the atom at just about one million billion times per second.
To actually calculate the movement of the electron, the research team hit a few thousand strontium atoms with a “clock laser.” The laser can be configured so that it rises and falls in its electric field to match the orbit of the electrons around the nucleus of the strontium atom. The result of this was an atomic clock that is several orders of magnitude more precise than the cesium atomic clock that is used currently.
The cesium atomic clock that is used now is like a wall clock with a second hand that goes around at nine billion times per second. Though, Ye explained the strontium atomic clock, “moves at the speed of a million billion times per second.” Moreover, he stated they are, “basically keeping track of ripples of light,” detecting minute changes in the fabric of space-time.
In the latest process of the formation of the optical lattice clock, the researchers were able to reduce timing errors by building highly sensitive thermometers around the strontium atoms. Therefore, the effects of the heat on the atoms can be measured more accurately. Furthermore, they were able to reduce the effects of the network of lasers on single atoms to better measure the movement of electrons.
An atomic clock with this level of preciseness may seem daft; however, it has great scientific implications. The new clock will allow scientists to better understand the fundamental laws that govern space-time, as well as providing more insight into the properties of dark matter. Since the strontium atomic clock can detect minute changes in the fabric of space-time, one may think that a more precise clock would be impossible to make. Though, Ye stated if scientists can make a clock 1,000 times more accurate it would be possible to, “hear the symphony of the Universe.
By Alex Lemieux
Seattle Times
National Monitor
Product Design & Development
Photo by Nathanmac87 – Flickr License
Your Thoughts? |
Hawaiian Volcano Observatory
Mauna Loa
Other Volcanoes
Volcanic Hazards
March 8, 2001
A weekly feature provided by scientists at the Hawaiian Volcano Observatory.
Haleakala Crater formed between 145,000 and 120,000 years ago
Haleakala Crater is a large erosional valley at the summit of Haleakala volcano, East Maui. It formed after the rimrock lava flows were erupted around the top of the volcano about 145,000 years ago, give or take about 10,000 years. Determined by the potassium-argon method of dating, this age and other supporting evidence were newly obtained by scientists from the Hawaiian Volcano Observatory and their colleagues at Kyoto University, Japan.
An interpretation first offered in the 1940s is that the crater formed as two large valleys coalesced from the south and north flanks of the volcano. The canyon openings, Ko`olau and Kaupo Gaps, expanded into the summit area along the main rift zone that crosses the volcano.
Kaupo Gap on the south flank probably originated when a large section of the mountain slid southward. The resulting debris-flow deposit--a large landslide--is exposed in sea cliffs about 9 km (6 miles) south of the crater in the Kaupo area. A lava flow that overlies the debris flow at the 100-m (340-ft) elevation is about 120,000 years old. The eastern segment of Haleakala Crater, which opens southward through Kaupo Gap, must therefore have formed largely in the time between 145,000 and 120,000 years ago.
Less clear is the origin of the northern gap, Ko`olau, which is on the rainy side of East Maui. Ke`anae Stream downslope of Ko`olau Gap has thick deposits of sand and gravel exposed near the coast at Ke`anae Point. These sedimentary deposits are overlain by a lava flow about 43,000 years old. No debris-flow deposits are exposed along the flanks of Ke`anae Valley. We presume that the north-flank landslides were smaller than those on the south flank, and that streams carved away the debris as each slide formed. This reworked debris was deposited as the thick sand and gravel at the mouth of Ke`anae Valley before the 43,000-year-old lava flowed down the canyon from Haleakala Crater.
Canyons and valleys are difficult to date because they destroy evidence of their growth as they deepen and widen. In the case of Haleakala Crater, lava flows from five sites around the rim of Haleakala Crater range in age from about 200,000 years to 145,000 years. These lava flows issued from the axial rift zone, which would have been the summit of the volcano prior to extensive erosion. The deepening valleys etched their way along either side of the rift zone, diverting lava flows into the canyons. From that time forward, the central flanks were barren of lava, and the crater rim was never again buried. Conceivably some lava flows slightly younger than 145,000 years might exist as rimrock, but more extensive dating is required to find those needles in the volcano's lava haystack.
The exact timing of crater formation probably never will be determined, because the crater likely grew in stages. To recognize that such a short duration, only 30,000 years, is sufficient for extensive erosion is an exciting discovery in our understanding of Hawaiian geology. Large landslides are probably the key to understanding rapid rates of erosion, because they redistribute large amounts of rock quickly. Erosion is an ongoing process, but its rate varies greatly across thousands of years.
Eruption Update
Eruptive activity of Kilauea Volcano continued unabated at the Pu`u `O`o vent during the past week and provided visitors with an occasional glimpse of surface flow activity on Pulama pali and on the coastal flats. Lava is pooling in the coastal flats and not entering the ocean at this time. A broad active flow front extends 1.5 km (0.9 mi) from the end of the Royal Gardens access road to the west. The closest flow to the ocean is 0.7 km (0.4 mi) from the sea coast.
One earthquake was reported felt during the week ending on March 8. A resident of Hawaiian Ocean View Estates subdivision felt an earthquake at 7:42 a.m. on Sunday, March 4. The magnitude-3.0 earthquake was located 27 km (16 mi) north of Ka Lae at a depth of 2.44 km (1.5 mi).
HomeVolcano WatchProductsPhoto GalleryPress Releases
How Hawaiian Volcanoes Work
The URL of this page is
Updated: March 12, 2001 |
Pronunciation of Polymeric
English Meaning
Having the same percentage composition (that is, having the same elements united in the same proportion by weight), but different molecular weights; -- often used with with; thus, cyanic acid (CNOH), fulminic acid (C2N2O2H2), and cyanuric acid (C3N3O3H3), are polymeric with each other.
1. Of, relating to, or consisting of a polymer.
Malayalam Meaning
Transliteration ON/OFF | Not Correct/Proper?
;ബഹുഭാര്യാത്വം - Bahubhaaryaathvam | Bahubharyathvam ;
Found Wrong Meaning for Polymeric?
Name :
Email :
Details : |
Kamis, 16 Desember 2010
Modes of Interpreting 2
• Common use of Sight Translations
Sight Translation is most often used in the public sector with medical appointments. If a patient speaks a different language to their doctor a Sight Translator might be used to read an explanation of a diagnosis from a medical textbook to the patient. Alternatively they might be used to read the directions and dosage of medication to a patient who speaks a different language
• Sight Translation
In the event you have a short text you require translating, but you don't have time to wait for a full translation, you require a Sight Translator. Sight Translations differ to most other types of Interpreting as the original message is delivered to the Interpreter in written form. The Interpreter reads the document in its source language translates it to the audience's selected language and delivers the translation orally. In most cases this means the Interpreter speaks in the target language simultaneously as reading in the source language.
• Sight Translators
Sight Translators require to be able to multitask to be able to read a text in language and deliver it in another language, as well as being able to reply to any questions or comments from their audience. Sight Translators also require the reading and translation skills of regular translators but the oral delivery and presentation skills of an Interpreter.
Tidak ada komentar:
Poskan Komentar |
Sunday, October 19, 2008
A 'Mean' Problem to Ponder
It's that time of year folks! Here's a problem for you or your students to think about as a warm-up for this week or for the SATs or for just developing logical thinking. It might also deepen student thinking about the distribution of data. You might find this question trivial but don't be too quick to judge this until your students try it! I would allow a calculator to be used. Observe how students approach this: Guess-Test, consideration of the 'mean', etc...
In a certain high school election, there were 12 candidates for President of the Student Council. If 1600 votes were cast and Denise received more votes than any of the others (i.e., she received a plurality), what is the least number of votes she could have received?
jd2718 said...
When a kid tells me that something is easy, I ask them to show me.
And here, I glanced, it was easy. And then I stopped to answer. I like the twist. It took me a moment longer than I thought at first blush.
mathmom said...
I missed the "twist" at first and might not have bothered to even look at the given numbers until JD mentioned it.
I asked my youngest the question (before noticing the twist) with easier numbers -- 1000 voters, 10 candidates, and he answered quickly (and correctly). When I asked him about 14 voters and 3 candidates, he decided the problem was "boring" (too hard) and left the room. ;-)
Dave Marain said...
Thanks jonathan and mathmom--
It appears that the 'twist' made the problem more interesting than the main logic!
Ok, the answer to this question is 135, not 134 as most students would conjecture (until they actually check to see if it works!).
Because of insanity, I actually did this problem algebraically in addition to incorrectly 'guessing' that the answer was 1 more than the mean. Further, I solved the problem in more general terms using T for the total number of votes cast and N for the number of candidates. If K represent the fewest number of votes Denise could have earned, K must satisfy:
K + (N-1)(K-1) ≥ T
Solving for K we obtain
K ≥ T/N + 1 - 1/N.
Note that T/N is the mean.
Of course K has to be an integer, so K would be the least integer greater than or equal to the expression on the right side of the above inequality. (This can be described using the 'ceiling' function).
Now, here's the rub. Depending on the remainder when T is divided by N, the value of this integer is either [Mean] + 1 or [Mean] + 2, where [...] represents the greatest integer (aka 'floor' function).
Can you determine the rule!
Hint: For T = 1600 and N = 12, the remainder is 4.
Kate said...
Funny, this problem scratched the "pigeonhole principle" part of my brain, not the "arithmetic mean" part. But either way I think I did the same thing - divided, tested, and adjusted.
Dave Marain said...
Funny, Kate, but I had that same itch too! I see it both ways, distribution about the mean and pigeons flying into their coops! Worth exploring further...
Do you think your students would struggle at all with the logic? the adjustment? Let me know if you try it.
mathmom said...
I didn't really think about it in terms of the "mean" just thought about dividing the votes evenly, and then adjusting slightly.
Dave Marain said...
I think that's how the 'problem solvers' in the class would see it too. However, it is my experience that many students struggle "seeing" what appears somewhat "obvious" to others, i.e., those who have developed number sense vs. those who operate more mechanically and procedurally. This type of question tends to discriminate between these two groups in my experience. However, the brain is strengthened by doing many of these kinds of problems. This tends to close the gap somewhat between the two groups. But I'm preaching to the choir here!
Eric Jablow said...
There's a similar problem accessible to 10-year-olds.
P.S. 279 wishes to send its 70 3rd graders on a field trip to the Rose Planetarium. The school buses have seats for 30 people, but one teacher and one parent volunteer will be on each bus. How many buses will the school need?
Many students will answer 2½, no many times one tells them that ½ a school bus isn't very useful.
mathmom said...
Dave, I think for kids who don't "see" the logic of it right away, it would be good to take the "solve a simpler problem" approach to see if they can start to see how it "works".
Eric, I think your problem is accessible to younger kids as well (2nd grade). And if you ask them that young, they won't tell you 2½ ;-)
Dave Marain said...
'Making it simpler' is always my favorite.
There's an additional subtlety in the 'tweaking' with the question I posted, since, depending on the total number of votes, one adds ONE or TWO to the greatest integer value of the mean (see my comment above). So rounding up may not be enough here.
Kate said...
Nah I don't think the logic of the pigeonhole principle is too hard for even young kids. Start with socks in a drawer and build it up. There are lots of good Math Olympiad type resources of questions of varying difficulty. Older kids can think about Ramsey! |
Tuesday, August 14, 2012
How a biological imbalance in our natural flora of the scalp can lead to Hair Loss
Hair loss results from a combination of the following:
1. Genetic predisposition
2. Poor nutrition
3. Weak immune system
4. An environment that leads to an overgrowth of Candida fungus (Yeast).
1. Genetic predisposition,Male and Female Pattern Baldness
The most common cause of hair loss is a hereditary condition called male-pattern baldness or female pattern baldness. It usually occurs gradually and in predictable patterns — a receding hairline and bald spots in men and thinning hair in women. Pattern baldness is most common in men and can begin as early as puberty, and this type of hair loss may involve both hair thinning and miniaturization (hair becomes soft, fine and short).One cause of male pattern baldness is genetics, or having a family history of baldness, which influences the age at which you begin to lose hair, the rate of hair loss and the extent of baldness. Research has found that male pattern baldness is associated with male sex hormones called androgens, which have many functions including regulating hair growth.
Evolution in men:
Typically, at first the hair begins to thin (recede) at the front sides (temples), and at the same time, the hair usually becomes thin on the top of the head (the crown). As the bald patch gradually develops in the middle of the scalp, it will join the receding sides, creating the first patch at the front. Each hair on your head has a growth cycle and because of MPB, this growth cycle begins to decline causing hair follicle to shrink, by producing shorter and finer strands of hair. Eventually, the growth cycle for each follicle ends and no new hair will grows in its place.
Facts in Males: The male pattern baldness (MPB) form of androgenetic alopecia accounts for more than 95% of hair loss in men.
About 25% of men who suffer from MPB begin the painful process before they reach 21.
By age 50 approximately 85% of men have significantly thinning hair.
Evolution in women:
A similar condition affects women but in a different pattern. As it tends to particularly affect either the top of the head or an overall thinning of the entire hair equally. Hair thinning in women is more common after the menopause, and typically increases with age, and it's higher for women with a history of hair loss on either side of the family.
Fact in Women:
2. Poor Nutrition of Hair Follicles:
Some causes of poor nutrition of the hair can be by the following:
Deficit of nutrients (anemia, lack of B vitamins and others), your body prioritizes organs that are more vital, and fewer nutrients will go to nourish the hair.
Stress is also a big factor, due to your body being under stress it requires and uses more nutrients, than usual, restricting again delivery of nutrition to your hair follicles.
Blood flow circulation is "food for your cells". That's why it's important to massage your scalp, especially in the areas that you have less hair. Hence why hair stylists usually massage your head and scalp during the wash, under warm water.FYI: Minoxidil only works because increase blood flow in the small vases temporarily, when you stop using, your hair will start to fall again.
3. Weak immune System:
Our immune system is our system of defense and has the responsibility to support our health, when it fails, our body will react with symptoms and diseases. For example, the skin, mouth,and intestines, are covered by millions of individual microorganisms that don’t do us any harm. In fact,they protect us from becoming infected with harmful microbes, these microorganisms are known as our body flora. However if microbe numbers grow beyond the normal range (due to a weak immune system) or if microbes populate areas of the body normally not colonized (due to poor hygiene or injury), it can result in many diseases.
Body PH Balance
When your body’s natural pH balance is upset, the candida can grow out of control, creating a systemic problem. Good healthy bacteria and a properly functioning immune system are essential when fighting this stubborn infection.When the balance between good microorganism that live in our body is disrupted, it causes us to be sick. Specially at the scalp, leading to the start of dandruff, itching, oily hair and hair loss.
4. Body reaction due to Overgrowth of Candida in the scalp:
a)Activation of the sebaceous gland, which produces more oil. The oil is a protection for our skin and scalp. If we use shampoo to try to control or suppress the excess of oil in the scalp, we will weaken our scalp defenses and accelerate the progression hair loss. You can help your hair using healthy oils 1 x a week like a coconut, Rosmarinus, or our Vida Hair Oil that has the best combination of organic & essential oils.
b) Candida overgrowth in the scalp will activate the skin renovation and desquamation process, causing increased presence of flakes, dead skin, and dandruff and itching. That reaction is also a mechanism of defense, when they don't work anymore, the scalp will go into atrophy, becoming bald dry and not a healthy scalp. That is why we don't recommend anti-dandruff shampoos, because you will be "without flakes" and also with less hair.We developed Vida Hair Shampoo and Vida Hair Lotion to control an overgrowth of Candida, helping your scalp to be healthy again.
c) First we have to understand that we have 3 types of Hair Follicles that grow in the scalp:
Terminal = thick, fully pigmented, regular hair.
Lanugo = an intermediate hair that grows between the terminal and vellus hair phases.
It pigmented and thicker than vellus hair but weaker than the terminal.
Vellum = a thin non-pigmented hair that can only see in certain angles of the light.
The hair first starts to fall before completion of the regular hair life cycle. The new hair will be weak and thin, growing slowly, falling out before it should. The hair will be more fragile until eventually disappearing. A healthy hair will become lanugo, and then vellum, and then terminal. To reverse this process, we developed Vida Hair Shampoo, Vida Hair Lotion, Vida Hair Oil.
d) The immune system is our system of defense.This system is working all the time to fight and balance the overgrowth of Candida, while at the same time, consuming many nutrients. In this process, we deplete of vitamin and minerals, hence why is critical to address the internal factors that accelerate the process of Hair Loss. We formulated Vida Hair Oral Spray to support the nutrients necessary for the hair and to break the vicious cycle of stress and hair loss.
The Vida Hair Treatment healing process occurs in reverse order:
1. First, the hair will stop falling out.
3. Healthy hair will begin to grow back.
We believe that Medicine and Science are just one!
First we found a formula that stimulate hair grow Healthy & Stronger and deliver amazing results.We developed a study with 469 patients for 6 years to understand why works !
Vida Homeopathy Formulas stimulate the Immune system to fights Candida.
Click here and find more how : Vida Hair Kit to balance your System
Find more about original research
Find More about us
Are you looking to grow out your Hair? "ll send you VIP specials and future blog posts, so you can have a long luscious hair !
Sign up to my FREE newsletter by clicking HERE: |
A mixed layer beneath melting sea ice in the marginal ice zone using a one-dimensional turbulent closure model
• Motoyoshi Ikeda
A level 2 second-order turbulent closure model is employed to study the surface mixed layer developing between sea ice and a relatively warmer background water in the marginal ice zone. The model is driven by a suddenly imposed ice-water stress and warming in the water. The mixed layer rapidly develops in 1 day and afterwards is gradually eroded at its bottom mainly by an inertial oscillation. The ice velocity is larger with the stronger stress, but the mixed layer is thicker. Hence the length scale of ice travel before complete melting is nearly independent of the ice-water stress. Higher temperature of the background water gives more heat to ice but produces a thinner mixed layer. The product of the travel distance and (the background temperature minus the freezing point) is larger for the warmer water. Heat flux through the ice due to atmospheric forcing is a minor mechanism for melting in the marginal ice zone. |
Shakespeare Bridge
The Shakespeare Bridge in the Franklin Hills section of Los Angeles, California was built in 1926. It is made of concrete and decorated in a Gothic style. It was named after famous playwright William Shakespeare and was designated a Los Angeles Historic-Cultural Monument #126 in 1974.
The bridge was rebuilt in 1998 after the Northridge earthquake due to concerns that the structure would not be stable in an earthquake. As part of the seismic retrofit, the deck, sidewalks, and railings were removed and reconstructed using reinforced concrete. The expansion joints were also removed, so the bridge is now a one-piece structural diagram built to transfer all seismic forces into the abutment walls at either end of the bridge. All of the rebuilding was done in an effort to preserving the historic appearance of the bridge.
2 photos
Building Activity
• OpenBuildings
OpenBuildings added a digital reference
about 5 years ago via |
Dixon's A&P course expectations
From OpenWetWare
Jump to: navigation, search
Dixon's Bio Web
Anatomy and Physiology
A&P Course Expectations
How to write objectives
Parent's Guide to A&P
AP Biology
E-mail me!
Course Description:
Welcome to A&P. In this class we will study the structures and functions of the parts of the human body. We'll explore questions such as: What did Kendrick Perkins do to his knee? How does the body fight off disease? How can a fetus control a mother's hormones? If I can drink Dr. Pepper, why does one of its ingredients make my muscles hurt so much when I exercise? What did Tom Brady do to his knee? These topics can be fascinating as well as challenging. What did Dustin Pedroia due to his, umm, foot?
This class should provide a good preparation for college nursing, medical technology, pre-med, and other allied health fields. We’ll do labs involving microscopes, real bones, and dissections of the heart. We’ll learn how to take blood pressure. Whenever possible we will connect our learning to medical and "real life" situations. Expect to use the newspapers and magazines as resources..
From the Program of Study: “Anatomy and Physiology is a laboratory course primarily intended for students planning careers in health and medical related fields such as nursing, medical or dental technology physical therapy and occupational therapy. Major topics include morphology and physiology of the cell and interactions of the body systems, including the skeletal, digestive, respiratory, nervous, immune and reproductive systems. Anatomy and physiology includes laboratory activities, teacher demonstrations, classroom lectures and dissections.
Teacher Contact
James Dixon
School-Wide Academic Expectations for Student Performance (emphasized in this course):
Solve problems analytically and critically
Use technology effectively
Behavioral Expectations:
All rules in the SHS Student Handbook will be enforced.
I think it is reasonable for us to have certain expectations for each other. You can expect me to treat you with respect, as individuals, and to not insult your intelligence. I will come to class prepared, return work in a timely fashion and make the subject as interesting as I know how. I will be available almost every afternoon should you have any problems, questions or comments.
I expect you to treat me and each other with respect, to not insult your own intelligence by taking the lazy way out and saying "I can't do this!" without really trying. You should come to class prepared, ready to think, and with an open mind. I expect you to seek me out after school should you be having any difficulties. It comes down to this: Respect yourself. Respect each other, Respect this place.
Assessment Methodology and Grading Policy:
These will be consistent with the school-wide rubrics, as presented in the student handbook.
Grades will be calculated on a Total Point System and therefore these percentages should serve only as approximations.
Tests and quizzes. At the conclusion of each unit, there will be a major unit exam. These exams will be of varied format including multiple choice, matching, true/false, short essay, and lab practical portions. Smaller quizzes will also be given during the unit. These may be of a surprise nature. Approximately 60-70% of term grade.
Homework and Participation. You will have homework every night. These nightly assignments will often form the basis of the next class activity, or check for understanding of previous work. The most common homework assignment will be note-taking from the textbook. The homework will be crucial to your success on tests and larger assignments. My assessment of your participation in class activities will also affect your grade. Active participation in lab experiments, group and individual work, being prepared to start class with your book and notebook ready, completing class assignments, asking and answering questions (at least trying) will all positively affect your grade. Disrupting class, being poorly prepared, excessive time out of class will adversely affect your grade. You are expected to keep a notebook for this course. I recommend that you have a 3 ring binder that can hold some lined paper for notes/work and that can be used to keep handouts. I will check this periodically. Approximately 15-20% of term grade.
Larger Assignments: Lab reports special projects. We will conduct labs that will require writing lab reports. The format for these will be explained later Approximately 15-20% of term grade.
Suggested materials
3 ring binder
Lined paper
Colored pencils
Personal tools |
Do children really get sugar rushes?
People often get cross when you tell them there's no such thing as a sugar rush. Especially parents. They have witnessed, time and again, their offspring going ape at parties, after mainlining jelly and ice cream. "Sugar high," sigh the grownups, resigned to the inevitable crash. This observation has been passed down through generations, like DNA.
I must admit I was taken aback when a fellow parent hit me with the news that there is no scientific basis for the belief that sweeties make kids hyper. (It's old news, by the way, which makes it even odder that so many of us still haven't got the memo.) It's such a deeply entrenched assumption, although I had in the past questioned whether I was too quick to blame sugar for my son's ill behaviour (or my failure to control a three-year-old).
The evidence
Sugar, the food additive, has never seemed more evil. We are addicted to the stuff and it has fully replaced fat as the widely accepted culprit behind obesity. But one thing that it doesn't do is fuel sudden bursts of hyperactivity. Scientists started looking into this in earnest in the 1970s after an American allergist, Benjamin Feingold, advocated the removal of food additives to treat hyperactivity in children. In 1995, a meta analysis of the 23 most reliable studies (using known sugar quantities, and placebos, and with the children, their parents and the researchers blind to the conditions) was published in the Journal of the American Medical Association. Sugar simply had no discernible effect on the children's behaviour in these studies.
Tricks of the mind
How can millions of parents have got it so wrong? Easily: expectation causes cognitive biases, which cloud judgment. Back in 1994, a study in the Journal for Abnormal Child Psychology assembled a group of 35 boys, aged between five and seven, whose mothers said they were behaviourally sensitive to sugar. Some of the children's mothers were told their sons had been given a large dose of sugar, and the rest were told their boys were in the placebo group. In fact, all children had been given placebos.
The mothers were filmed interacting with their sons and, says the study, "mothers in the sugar expectancy condition rated their children as significantly more hyperactive". Behavioural observations, it continues, "also revealed these mothers exercised more control by maintaining physical closeness, as well as showing trends to criticise, look at, and talk to their sons more".
The other consideration is that sweets and cake are often bestowed on special occasions, when children are already excited, egg each other on and even ham up their general clowning about to satisfy parental expectation.
The mid-afternoon sugar hit
An indignant friend, who refused to believe any of the above, pointed out that grownups need a sugary pick-me-up in the afternoon. "It's giving us an energy boost, right?" Well, not according to Luc Tappy, a sugar expert at the University of Lausanne. "What would be the effect on brain energy?" he asks. "I would say not much." Blood glucose is well regulated, you see, to ensure the brain has enough of the stuff, come what may. "You will have almost the same amount of glucose transporting around your brain when your blood sugar is relatively low or quite high," he adds. The only time you'll ever consciously feel a difference in brain energy is if you correct (with sugar) hypoglycemic symptoms such as difficulty in concentrating, incoherent thoughts and anxiety.
OK, so I'm a healthy person who, after lunch, did a few hours of hard brain work at my computer. By teatime, I'm weary and want sugar. Do I have a brain energy deficit that needs treating with sugar? "Feeling tired," says Tappy, "doesn't mean that your brain lacks sugar or energy, but taking a break and eating something maybe allows you to take a rest and give you a psychological boost."
The myth of the sugar low?
We've all been warned about the sugar low, which customarily follows the sugar rush. If you ingest a lot of sugar in one hit, insulin production will be over stimulated (to regulate your blood sugar levels). Some 90 to 120 minutes after you ingested the sugar, all that insulin can bring on hypoglycemia. "This reaction is observed after the ingestion of concentrated beverages" of around 25-50g of sugar, says Tappy, and is easy to produce in the lab. However, it's hard to assess how often it actually occurs in real life. First, people can complain that they feel shaky, weak and have palpitations, and suspect they have low blood sugar, but these are common symptoms and could have other causes such as low blood pressure, or anxiety. Second, says Tappy, most of the time you don't take in concentrated sugar on an empty stomach – you will usually have eaten other foods, too, which will slow down gastric emptying.
So it's not that a sugar low is impossible, but these things are never as cut-and-dried as they are often presented. I am not here to defend the sweet stuff – many of its crimes are indisputable. But why does the sugar rush thesis remain so prevalent? No smoke without fire?
• Follow Amy Fleming on Twitter
|
Physicists unravel mystery of repetitive DNA segments
December 6, 2010
Rice physicists use an atomic force microscope to grab and stretch individual strands of DNA. Credit: C. Kiang/Rice University
These mysterious "poly(dA) repeats" are sprinkled throughout the human genome. Scientists have also found them in the genomes of animals, plants and other species over the past decade. But researchers do not know why they are there, what function they perform or why they occur only with the DNA base adenine and not the other three DNA bases -- cytosine, guanine and thymine.
"Previous investigations of poly(dA) have suggested that adenine bases stack in a very uniform way," said Ching-Hwa Kiang, a co-author of the new study and assistant professor of physics and astronomy at Rice. "Our investigation focused on what happens when single strands of poly(dA) were stretched and these stacks were pulled apart."
Kiang's research group specializes in studying the physical and mechanical properties of proteins and nucleic acids, and their primary tool is one of the mainstays of nanotechnology research -- the , or AFM. The business end of an AFM is like a tiny phonograph needle. The tip of the needle is no more than a few atoms wide, and the needle is at the end of an arm that bobs up and down over the surface of what is being measured. While nanotechnologists use the device to measure the thickness of samples, Kiang's group uses it in a different way.
To begin her experiments, Kiang first places a thin coating of the proteins she wishes to study on a flat surface. This is placed under the AFM arm so the bobbing AFM needle can dip down and grab the ends of one of the proteins. As the arm retracts, it unravels the protein.
All proteins fold into a characteristic shape. Like tiny springs, they remain in this compact "lowest energy" state unless they are pried apart.
The new study on poly(dA) was conducted by Kiang, Rice graduate student Wuen-shiu Chen and colleagues at Rice and National Chung Hsing University (NCHU) in Taiwan. The team discovered that poly(dA) behaves differently depending upon the speed with which it is stretched. When the AFM bobbed rapidly, the poly(dA) segments behaved like any other segment of single-stranded DNA. But when the AFM motion was slowed, the team found that the amount of force required to stretch the poly(dA) changed. At two particular locations, the strand lengthened for a short distance without any additional force at all.
"Typically, single strands of DNA behave like a rubber band: The resistance increases as they stretch, meaning you have to pull harder and harder to continue stretching them," Kiang said. "With poly(dA), we found these two points where that doesn't apply. It's as if you have to pull harder and harder, and then for a brief time, the band stretches with no additional force whatsoever."
Kiang said the exact causes and implications of the phenomenon are unclear. But scientists know that double-stranded must be pried apart at discrete locations so that the cell's machinery can read the genetic code and convert it into proteins. There has been some speculation that the adenine repeats play a role in ordering genomic information; Kiang said the new findings raise even more questions about the role the repeats might play in gene regulation and packaging and how they might be potential targets for cancer drugs.
Explore further: Protein folding: Diverse methods yield clues
Related Stories
Protein folding: Diverse methods yield clues
August 6, 2009
(Aug. 6, 2009) -- Rice University physicists have written the next chapter in an innovative approach for studying the forces that shape proteins -- the biochemical workhorses of all living things.
Unraveling the physics of DNA's double helix
July 12, 2007
Physicists create first robust DNA building blocks
December 9, 2005
Stretching DNA to the Limit: DNA damage in a new light
April 20, 2007
AFM positioning: Shining light on a needle in a haystack
November 10, 2010
Recommended for you
New method for studying individual defects in transistors
December 6, 2016
New aspect of atom mimicry for nanotechnology applications
December 2, 2016
Click here to reset your password. |
CMS observes melting of Upsilon particles in heavy-ion collisions
December 20, 2012 by Achintya Rao, Cern
Candidate Υ decay to two muons observed in a lead-lead collision at the LHC. The two red lines (tracks) are the two muons, the mass of orange lines are tracks from other particles produced in the collision, whose energy is measured in the electromagnetic calorimeter (red cuboids) and the hadron calorimeter (blue cuboids).
In 2011, CMS presented early evidence that Upsilon (Υ) particles produced in lead-lead collisions "melt" as a consequence of interacting with the hot nuclear matter created in these heavy-ion interactions. CMS has since updated and extended this result using additional data collected in the 2011 heavy-ion run, and the observation now has a significance of greater than 5σ (or 5 standard deviations), the gold standard for claiming a discovery in high-energy physics.
Hot nuclear matter
The familiar proton is a composite particle made up of quarks held together by gluons. One of the properties of these elementary quarks and gluons is that they cannot exist freely and are always bound together to form hadrons. At least not at the temperatures we come across daily: Our best understanding of the tells us that at the very prevalent in the first following the Big Bang, quarks and gluons existed freely as a homogenous medium called the quark-gluon plasma (QGP).
Smashing heavy inside particle colliders creates a hot nuclear matter thought to be similar to the primordial QGP. Apart from colliding , the dedicates beam-time to colliding lead nuclei (Pb) and the resulting collisions have provided physicists with a wealth of valuable data to study the hot nuclear matter. While it isn't possible to observe this medium directly, its presence can be inferred based on the expected behaviour of the particles that interact with it.
Figure 1: The peaks in red show the measured Υ events in PbPb collisions, with the blue lines showing the expectations if the excited states were not suppressed with respect to the ground state.
A literal melting pot
To explore the properties of the medium, CMS compares the properties of the particles produced in (PbPb) with those produced in proton collisions (pp). A novel candidate for these analyses is the Υ particle, a made of a and its own antiparticle. Just as an atom can exist in an —an electron can receive some energy and move to a higher orbital—so can composite particles such as the Υ. The Υ(1S) state is the ground state, while excited states include the Υ(2S) and Υ(3S) that are more loosely bound than the ground state. A remarkable aspect of this measurement is that CMS is the first experiment to successfully separate the signals of the three Υ states in heavy-ion collisions, thanks to the superb mass resolution of the CMS detector.
Figure 2: The more central the PbPb collisions, the greater the suppression. Events with more interacting nucleons (protons/neutrons) in the colliding nuclei — indicating greater centrality in the collisions — show a higher suppression of Υs than peripheral collisions with fewer interacting nucleons.
Theorists predicted in the mid-'80s that having to traverse the hot medium will cause particles such as Υs, produced in these interactions, to "melt" or be suppressed in it. It is important to note that this suppression doesn't mean that these particles weren't produced in the first place, but that the bound states were possibly destroyed as a result of interacting with the medium before they could decay into muons. The more loosely bound the state, the more easily it would melt; so, the (3S) state would be suppressed more than the (2S) state, while the (1S) state would be the least suppressed of the three.
Observing such a sequential suppression in the number of Υ particles detected in collisions of relative to those in at the same energies helps probe the properties of the hot, dense medium.
The previous CMS analysis used just 7.3 μb−1 (inverse microbarns) of PbPb data from 2010, whereas the new study uses 20 times as much data: 150 μb−1 of PbPb collected in 2011. Since the lead-ion runs took place at a per-nucleon energy of 2.76 TeV and the proton run at the time was at 7 TeV, the LHC provided a special pp run in early 2011 at 2.76 TeV, with CMS collecting around 230 nb−1 (inverse nanobarns) of data. CMS measured the decays of the three Υ states into two muons in both PbPb and pp collisions and found that the rates in the former were significantly suppressed compared to the latter, as expected if a QGP were formed. The ratio of Υ(2S) to Υ(1S) in PbPb collisions was found to be approximately 21% that of the same ratio in pp collisions. Similarly, the ratio of Υ(3S) to Υ(1S) was found to be only around 6% in PbPb collisions relative to those with protons.
In addition, all three states were found to be suppressed in PbPb collisions. The suppression is further demonstrated by the fact that it is more pronounced in very central heavy-ion collisions—ones where the nuclei collide head-on (higher Npart in Figure 2)—as opposed to peripheral collisions. This behaviour is expected as central collisions release more energy and the hot would consequently have a higher temperature, thereby melting more particles. And because the more excited states melt at lower temperatures, the sequential suppression is an excellent indicator of the temperature of the nuclear medium produced in PbPb collisions.
The 2011 results had a significance of 2.4σ; the current results are over 5σ in significance, implying a probability of less than one in 3.5 million of obtaining a false positive. This observation represents an important milestone in the study of heavy-ion collisions and has been made possible by the excellent performance of the LHC itself as well as collaborative efforts between the particle-physics (pp) and nuclear-physics (PbPb) groups at CMS. In early 2013, the LHC will smash protons with lead nuclei, and the resulting cold nuclear matter will help analyse the intricacies of the observed sequential suppression.
Explore further: Proton-ion collisions: Behind the scenes of a hybrid interaction
More information:
Related Stories
Recommended for you
The case for co-decaying dark matter
December 5, 2016
Materials made of self-spinning particles
December 5, 2016
High-precision magnetic field sensing
December 2, 2016
Click here to reset your password. |
Psychology Wiki
34,203pages on
this wiki
Add New Page
Talk0 Share
Ad blocker interference detected!
Syntropy is a term popularized by Buckminster Fuller but also developed by others to refer to an "anti-entropy" or "negentropy". The following definition, referencing Fuller, can be found on a web site on "Whole Systems": "A tendency towards order and symmetrical combinations, designs of ever more advantageous and orderly patterns. Evolutionary cooperation. Anti-entropy."[1] Fuller's use dates to 1956[2].
Others who have contributed important ideas include Luigi Fantappié, Italian mathematician, who apparently coined the term syntropy in 1942, published in 1944, describing a unified theory of the physical and biological world[3]. His ideas incorporated general systems theory ideas from Ludwig von Bertalanffy on negentropy and from Ilya Prigogine on the thermodynamics of dissipative systems. Richard Feynman "and Fantappié (1949) showed that syntropy inverts the arrow of time, and lets information move from the future to the past." [4].
Nobel Prize winner Albert Szent-Györgyi apparently proposed to replace the term negentropy with syntropy in 1974 [5]. His ideas are explained in some depth at a Creation Science website [6] although he was not an advocate[7]
In 1988, Mario Ludovico gave a formal definition of syntropy as a measurement of the degree of order/organization internal to any system formed by interacting components. According to that definition, syntropy is a quantity complementary to entropy: The sum of these two quantities is constant for the system considered, and defines the transformation potential of the system. On this basis, the theory develops equations apt to describe any possible evolution of complex systems, particularly concerning biological/social systems.[8]
There is "an open access journal" Syntropy "dedicated to the study of syntropy in the fields of psychology, sociology, economics, ecology and spirituality" [9].
References & BibliographyEdit
1. Whole systems website[1]
2. Fuller, Buckminster [2]
3. website [3]
4. Sintropia website [4]
5. Albert Szent-Gyorgyi at website[5]
6. website [6]
7. website [7]
8. Ludovico, M., Syntrophy pdf file [8]
9. website [9]
Syntropy is described in the book by Steve Cook and John Daniels, Designing Object Systems: Object-Oriented Modelling with Syntropy (Prentice Hall 1994, ISBN 0-13-203860-9).
• Giuseppe Arcidiacono, Entropia, sintropia, informazione, Di Renzo Editore, Roma, 2006
A formalized definition of "Syntropy", as a quantity complementary to "Entropy" and a measurement of systems organization in:
• Mario Ludovico, "L'evoluzione sintropica dei sistemi urbani - Elementi per una teoria dei sistemi autofinalizzati" ("Syntropy in the Evolution of Urban Systems - Elements for a Theory of Self-Organized Systems"), Bulzoni Editore, Roma (Italy), 1988 and 1991
Also on Fandom
Random Wiki |
Wednesday, October 29, 2008
Global Triggers
Christian Sinclair, MD said...
Thanks for sharing your hospitals approach to these issues.
In looking at global triggers as harm as perceived by the patient, how do these triggers take into account disease progression which may not be amenable to any therapy? Some patients may accept that as 'that is the way things are' to the other end of the spectrum that perceives that 'medicine should be able to stop this.' I would imagine patients along that spectrum would see varying degrees of harm in that. How do these global triggers account for patient subjectivity/perspective?
Paul Levy said...
Good question, but that is more detailed that this approach gets into. This tool is really just a statistical tool. Certain markers on the patient record have been found to be correlated by IHI over time with the existence of adverse events. The markers represent actions of commission, i.e.. things that have taken place, not acts of omission, i.e. failure to engage in certain therapies.
I'll let others more expert than I expand on this -- in case I am getting it wrong or not explaining it right.
Alex Carbo, MD said...
In response to the reader’s question, we do not count harm that is caused by the underlying disease process. To quote directly from the IHI website: “In determining whether an adverse event has occurred, consider that an adverse event is defined as unintended harm to a patient from the viewpoint of the patient. There are several important aspects:
Would you be happy if the event happened to you? If the answer is no, then there was harm.
Was the event part of the natural progression of the disease process, or a complication of the treatment related to the disease process? The harm identified should be the result of some medical treatment.
Was the event an intended result of the care (e.g. a permanent scar from surgery)? If so, then this is not considered harm.
Psychological harm by definition has been excluded as an adverse event.”
Your readers may take some issue with the last two points. But as you have noted, even if the tool is not perfect, it is much better than most current systems that rely on voluntary reporting.
Anonymous said...
Does IHI have comparative data from similar institutions to share? Why are your sister hospitals so silent? Why don't insurance companies pay for such tools and reward institutions based on their performance?
Fran Griffin (IHI) said...
Great questions and discussion on our Global Trigger Tool! At IHI we have seen data collected with this tool, some via our own chart reviews (publication in progress) and much by hospitals themselves who have worked in our projects. The overall findings are generally very similar with harm detected in approximately 35% of charts or 40-50 harm occurrences per 100 admissions.
This is how we determined our goal for the 5 Million Lives Campaign. Using the more conservative figure of 40 occurrences per 100, applied to 37 million annual admissions in US hospitals, that would indicate 15 million occurrences of harm to patient per year. The Campaign interventions do not address all types of harm, so we set the goal at protecting 5 million lives from harm.
Our first publication on our methodology and process for inter-rater reliability was published last month in the Journal of Patient Safety. We hope to have our paper on results of reviews published in the near future.
Fran Griffin, IHI
Anonymous said...
I realize this comment will be read by nobody since it's so late, but I wanted to thank you for making me aware of this program and in doing so, "forcing" me to register to join the IHI in order to read the Global Triggers tool! I learned quite a bit from their website. I just wish that someday there could be a one-stop shop website for performance (and process) improvement; right now there are multiple organizations doing similar things (Leapfrog, IHI, AHRQ, JC, etc.) and I bet it's difficult for the poor hospitals to stay abreast of it all and pick the best methodologies.
Anyhow, rock on - keep talking long enough and the rest of Boston medical care will be forced to listen! |
Sacred Texts Sacred Time Index Previous Next
April--The Month of Venus
This month of April has only thirty days, which is the number said to have been given to it by Romulus. The king who came after him gave it only twenty-nine, but Caesar, when he altered the calendar, gave it thirty again.
The name April comes from the Latin word aperire, which means "to open", and the month was no doubt so named because it is during April that the earth, which has been bound by the sharp frosts of winter, once again opens beneath the warm rays of the sun; the withered sheaths fall away from the ripened buds, which, opening out, disclose to our eyes their long hidden treasures of beautiful colour.
We find that the month was sacred to Venus, the Roman Goddess of Beauty, and some people think for this reason that the name April comes not from aperire, but from Aphrilis, which in turn comes from Aphrodite, the name given to the Goddess of Beauty by the Greeks.
Venus is said to have sprung from the foam of the sea, and to have made her way to Mount Olympus, the home of the gods, where, because of her wonderful beauty and grace, she was welcomed as the Goddess of Love and Beauty. All the gods fell in love with her, but she scorned them all, and Jupiter, to punish her for her pride, ordered her to marry Vulcan, the God of Fire, who was deformed and very rough in his manner. He had been thrown from the top of Mount Olympus by Jupiter in a fit of anger. Had he not been a god, he would, of course, have been killed by the fall, but he escaped with a broken leg which made him lame for the rest of his life. He now lived on the earth, and spent his time at the forge making many wonderful and useful things from the metals which he found buried in the mountains. He built gorgeous palaces of gold for the gods, which he decorated with precious stones, forged the terrible thunderbolts used by Jupiter, and also made the arrows used by Venus's son, Cupid. Vulcan was naturally worshiped by all blacksmiths and workers in metal, and a great festival called the Vulcanalia was held in his honour.
Cupid, whom we have just mentioned, was the God of Love; he never grew up, but remained a little chubby boy, with beautiful wings. He always carried a bow, and with his arrows pierced the hearts of young men and maidens in order to make them fall in love with one another.
Another son of Venus was Aeneas, the great hero who was supposed to have been the founder of the Roman race. He escaped from Troy, when at the end of ten years' siege it fell into the hands of the Greeks, and after many adventures reached a part of Italy, called Latium, where in later times his descendants, Romulus and Remus, founded the city of Rome.
The story of Aeneas has been wonderfully told by the Roman poet Virgil in his great work called the Aeneid. In this book Virgil wishes to show that Augustus, the emperor of his time, being a descendant of Aeneas, was also descended from the gods, since Aeneas was said to be the son of Venus.
Part of the story of Troy, or Ilium, is told in the Iliad of Homer, the great Greek poet. We read there of the fierce struggles which took place before the walls of the city, of deeds of strength and valour, and particularly of the final combat between the great heroes Hector the Trojan and Achilles the Greek, in which the Trojan was killed. In spite of many successes in the field, the Greeks were unable to gain an entry into the city, nor were the Trojans able to drive the Greeks from the shore, and it seemed as if neither side would ever secure the victory.
At last Ulysses, a Greek prince who was renowned for his cunning, formed a plan for entering the city and thus finally bringing to an end the war that had lasted for ten years. The Greeks built a wooden horse of such size that a number of men could be hidden within its hollow sides. This horse, filled with fighting men led by Ulysses, was left on the shore, while the army embarked in their ships and sailed away as if tired of the endless struggle. The Greeks also left behind a cunning slave, named Sinon, who was to play an important part in the plot. The Trojans, overjoyed at the departure of the Greeks, flocked down to the shore and crowded round the enormous wooden horse, full of wonderment at its strangeness. Many wished to drag it into the city at once, while some were filled with suspicion and urged their companions to distrust anything made by their enemies. Sinon, when questioned by the Trojans, pretended that he had been ill-treated by the Greeks, and spoke with hatred and anger against them. He explained that the horse was an offering to the sea god, Neptune, whose help the Greeks would need on their journey home, and he advised the Trojans to seize it and take it into the city. In spite even of those who suggested that armed men might be hidden in the horse, the Trojans dragged it into the city with great triumph, pulling down part of the wall to admit it, since it was too large to go through the gates.
Then followed a night of feast and revelry; the Trojans in their excitement laid aside their armour and their weapons, and gave themselves up to wild merrymaking. The smoky flare of the torches lit up a scene of mad delight. Suddenly shouts of alarm arose on every side, followed by the clash of weapons. Armed men poured in on the astonished Trojans, and in a short time Troy was in the hands of the Greeks. Under cover of the darkness and the noise Ulysses and his companions had crept from their hiding-place, had overpowered the careless sentries, and opened the gates for the Greek army, whose ships had returned in the night. Thus, through the help of the clever Ulysses, the Greeks overcame the army that had so often beaten them in the field, and by a trick brought to a victorious end the great Trojan war, for which the Goddess Venus had been responsible, as we shall read in a later chapter.
The Old English name for the month of April was Oster-monath or Easter-monath, because it was the month sacred to Eastre, or Ostara, the Goddess of Spring; the same name is still kept by the Germans, who call it Ostermonath. The time of year known as Easter is named after this goddess, and though Easter is now a Christian festival, it was in the first place a feast held by the Saxons in honour of their goddess Eastre. It was the custom for the people to give one another presents of coloured eggs, because the egg is supposed to represent the beginning of life, and the feast was held in the spring-time, when Nature awakes to a new life from the death of winter. The custom, which we still have, of sending Easter eggs to our friends, is therefore a very, very old one indeed.
Next: Chapter V. May--The Month of Maia |
FAQs on spyware and malware
You've seen it all on spyware – from what it is, to prevention, to remedies to quizzes. But have your spyware questions been answered? Ed Tittel answers the most frequently asked questions on spyware in an on-demand SearchSMB webcast.
How do you know differentiate between spyware and a Web-activity monitoring program?
Most Web activity monitoring programs do not collect data about individual users or insinuate themselves onto end-user systems. They are usually installed on servers and keep track of incoming activity from that vantage point instead. For example, WebTrends software tracks visitors, IP addresses, geographical locations, duration of visit, pages visited and more on Web sites. Spyware generally seeks to install itself on client systems, usually without informing users or asking their permission to do so. It seeks to gather more personal or sensitive information about users (account names, passwords, credit card numbers and logins). In most cases, you'll notice new items of software showing up as defaults in your Web browser, discover new toolbars, or you may even notice new processes mysteriously joining the startup group. In all these cases, if you Google on the name of the items involved, you can determine quickly and easily if it's benign or malign. How do you know if your employees are blocking spyware or adware correctly?
The only way to be sure is to scan machines to see what can be found. Numerous Web-X or Active-X-based scanners are available to perform check-ups, in addition to end-user packages that may or may not be installed on such machines. Make sure that any and all anti-spyware software installed on a machine is current and that real time monitoring and blocking is enabled. Run scans run regularly as well. Use a different package to run a backup scan on each machine at least once a week. Useful Web-based scans include www.spyaudit.com; www.pestscan.com; and www.xblock.com//download-freeware.php. What kinds of policies do companies make for spyware and adware?
These are generally the same as those for viruses and other more familiar types of malware: 100% pest-free computers, best achieved by installing and using two or more anti-spyware packages on all desktop and server machines: one to provide real-time detection and blocking, along with regular (daily scans), another to provide regular clean-ups (once a week) to catch items the first package may have missed. What's the difference between spyware and adware?
Both types of software install themselves without asking permission -- and often without informing users that they're being installed. Adware typically tries to take over what shows up in banners on regular Web pages and may also lead to a few or an inundation of advertisements in separate pop-up or pop-under windows. Spyware typically tries to monitor and harvest activity and sensitive personal data about the users on the machines on which it runs. It often tries to package up and send that data to malicious third parties as well. Are different spyware and adware precautions required for wireless networks or PCs?
Not really, except that wireless networks and PCs generally require stronger security measures to operate because of the broadcast nature of wireless networking and related opportunities for uninvited outsiders to eavesdrop on wireless network communications. Most experts recommend that all wireless computers use encrypted virtual private network connections to access networks and servers. Our budgets are limited. What are the must-haves for spyware if I can't spend a lot?
For new desktops running Windows XP SP2, a combination of the Microsoft Antispyware package (currently available as a free beta) along with some other good free antispyware (such as LavaSoft Ad-Aware SE or Spybot-Search & Destroy) should be sufficient, as long as administrators are also willing to tweak or establish group policy controls to lock down Internet Explorer a bit from its defaults. The built-in IE security components do at least an adequate job, if not better. For older desktops running Windows, the same anti-spyware combination will also work, but admins will want to add a pop-up blocker (both Google and Yahoo offer good free toolbars that include this functionality) and a BHO (browser Helper Object) handler (BHO Demon, www.definitivesolutions.com is shareware that does an excellent job at providing this kind of protection) to match the same kind of coverage that's built into Windows XP SP2. Is it necessary for me to find the root of the spyware problem? Once fixed, could it happen again the same way?
Provided that the source of infection can be identified and clean-up is successful, it's not necessary to get to the root of a spyware problem. But unless some kind of anti-spyware software is installed, or users never return to the Web sites from whence such infestations originate, it is possible that spyware could reinfect an unprotected system. Some experts say it's a matter of when, not if, systems will be reinfected. You should install at least one antispyware package on every machine that accesses the Internet, with real-time blocking turned on and regular scans from another package. What's the first thing we should do when we know someone has been affected by spyware?
The first thing is isolate the computer from the Internet to prevent any harvested information from being communicated to an unwanted or uninvited third party. Next, a thorough scan should be performed to identify all forms of spyware present. Then clean up any spyware on a computer (most of the time anti-spyware packages will do the cleanup automatically, but manual cleanup is sometimes necessary.) Only when the machine gets a clean bill of health and appears to be behaving normally and correctly should Internet access be restored. Is spyware completely preventable?
No it's not. By taking proper precautions, 99.9% of spyware will be foiled. But because new spyware is created all the time, new sources of infestation are always possible, and some will fall prey to them before effective countermeasures are developed. That said, best anti-spyware practices and teaching users basic rules of safe computing should help most organizations avoid most spyware, and deal quickly with what small percentage manages to get through their various levels of protection. Why can't anti-spyware programs handle 100% of possible threats?
See my column, Spyware vs. viruses: Two different fights. Viruses tend to come in neat little packages, either as items disguised within other files or as attachments to messages of some kind or another. Spyware is both more complex and diffuse. It tends to arrive through a temporary piece of software that gains permission to run on a user's machine from a Web site. It is a lot harder to recognize all the ways spyware can seek to take up residence on a computer, because it involves numerous scripting languages, active Web content of all kinds and any code that a Web page seeks to run whenever users download its contents. Spyware also has a larger frequency of incidence (or discovery of new spyware items, or variants of known items) and a much greater mutation rate than viruses appear to enjoy.
Dig Deeper on Small-business IT strategy
Start the conversation
Send me notifications when other members comment.
Please create a username to comment. |
1.6 Secondary Sources
• What is the difference between a
primary and secondary source?
• What are the primary ones – below?
Mark’s Secondary Sources
To know what secondary
sources Mark used
To evaluate secondary sources
To contrast the reliability of
secondary and primary sources
What is a primary source?
How much of what you learn about
in school eg in science, geography, is
from a primary source?
If not from primary sources, where
do you get your information? Do you
trust this information?
1. Using P.16 AQA book, write out the headings and
answer the questions :
Collections of teachings:
what was in the collection?
The Passion narrative:
what is it?
why is this important and reliable source?
Ur Markus: what is it?
Oral Tradition: why is it considered a
secondary source?
Which secondary source is least reliable?
Do you think Marks’ written secondary
sources are generally reliable?
**Would you personally put more faith in the
primary or the secondary sources that Mark used?
Which ones?
• Name 2 primary
• Name 2 secondary
• Which is more
reliable? Primary or
secondary? Why?
Complete the reasons why some sources are
** Why might some of these sources not be
100% reliable? 2 reasons.
Eyewitness information from Peter is reliable
Mark’s personal experience is reliable because..
Mark was directly inspired by God so he is
reliable because...
Oral tradition is reliable because...
Written accounts of stories about Jesus’ miracles
etc are reliable because...
Earlier documents eg collections of Jesus’
sayings/ UR Markus in Aramaic are reliable
People in those days had very good
memories and remembered
accurately. St Paul even quotes oral
tradition when explaining how
Communion should be celebrated
20 years after Jesus.
Mark heard Peter himself,
many times, telling what he
had seen and heard, and he
was closest to Jesus
They were
written down
very soon after
Jesus, while
the stories
were told by
The stories are written in
Aramaic, which is how they
were first told, and Mark
was using this Aramaic
version & translating it.
Mark could tell for
himself that facts
like the Last Supper
and the arrest were
true, as he may
have been there.
The Holy Spirit
would have helped
Mark explain
truthfully &
correctly who
Jesus was
Overall, how reliable were Mark’s
sources? Score 1-5
Oral tradition
Personal experience
Written documents eg UR markus
Divine inspiration?
similar documents |
Presentation is loading. Please wait.
Presentation is loading. Please wait.
Chapter Two Overview of the Financial System Slide 2–3 Primary Function of Financial Markets Primary function: To facilitate the flow of funds from.
Similar presentations
Presentation on theme: "Chapter Two Overview of the Financial System Slide 2–3 Primary Function of Financial Markets Primary function: To facilitate the flow of funds from."— Presentation transcript:
2 Chapter Two Overview of the Financial System
3 Slide 2–3 Primary Function of Financial Markets Primary function: To facilitate the flow of funds from savers to borrowers Improves economic efficiency In the absence of borrowing, one can only “eat what they kill” Hard to accumulate wealth without saving
4 Slide 2–4 Function of Financial Markets
5 Slide 2–5 Six Functions of Financial Markets & Intermediaries 1.To transfer economic resources through time, across borders & among industries 2.To provide a mechanism for the pooling of resources & the subdividing of shares in enterprises 3.To provide a mechanism to clear & settle payments 4.To provide mechanisms for managing risk 5.To provide price information to help coordinate decentralized decision making 6.To provide ways of dealing with the incentive problems that arise due to asymmetric information Source: The Global Financial System: A functional perspective by Crane, Froot, Mason, Perold, Merton, Bodie, Sirri & Tufano
6 Slide 2–6 Transfer economic resources The financial system facilitates the transfer of economic resources through time, across geographic regions, and across different industry sectors Facilitates the efficient allocations of household capital to the most productive use in the business sector Facilitates the efficient separation of ownership and management of money Facilitates specialization in production according to the principles of comparative advantage
7 Slide 2–7 Mechanism for the pooling of resources Mechanism for the pooling of funds from small investors to undertake large scale indivisible investments in enterprises Mechanism for subdividing of investments in enterprises to facilitate diversification and distribution Can be done through financial intermediaries or the market mechanism Examples: Bank deposits & loans; mutual funds; common stocks; securitization
8 Slide 2–8 Payments System Payments System: Set of institutions and arrangements that facilitate transfer of purchasing power from A to B Includes methods for clearing and settling cash and securities transactions Payments go through two steps: first they are cleared, then they are settled. Clearing is the daily process by which CPA members exchange deposited payment items and the net amounts owed to each other are then determined Settlement is the procedure by which CPA members use funds on deposit at the Bank of Canada to fulfil their net obligations to all other members.
9 Slide 2–9 Canadian Payments System (CPA) Over eighteen million times a day, Canadians withdraw cash from banking machines, use cheques, debit cards and pre-authorized payments, or make other payments that result in one financial institution owing money to another. These transactions total more than $147 billion a day which, over the 2003 calendar year, amounted to more than 38 times Canada's GDP. Prior to 1980, the Canadian payments system was administered by the Canadian Bankers Association The CPA was created as a not-for-profit organization by an Act of Parliament in 1980 & assumed control of the Canadian payments system in The Association’s mandate, as amended through the Canadian Payments Act in 2001, is: (i) to establish and operate national systems for the clearing and settlement of payments and other arrangements for the making or exchange of payments, (ii) to facilitate the interaction of the CPA’s systems with others involved in the exchange, clearing and settlement of payments, and (iii) to facilitate the development of new payment methods and technologies. The Act also explicitly identifies public policy objectives for the CPA. It states that the Association will: Promote the efficiency, safety and soundness of the clearing and settlement systems Take into account the interest of users.
10 Slide 2–10 Managing Risk Ways to manage uncertainty and control risk Risk-pooling versus risk-shifting Risk-pooling – Insurance - individual losses are spread over a large number of members in the pool, thereby reducing the impact on any one member Risk shifting – Derivatives - risk is assumed by those willing to absorb a loss in exchange for a higher expected return Basic ways of managing risk: Insurance Diversification Other hedging strategies
11 Slide 2–11 Price Information Provision of price information to help coordinate decentralized decision-making in various sectors of the economy A primary function of markets is to allow the trading of assets A secondary function of markets is to provide price information that affects consumption-savings decisions and portfolio wealth allocation decisions Capital is analogous to water. Water will always flow downhill. Capital will always flow to the source of the highest, risk-adjusted returns. Market prices provide the information that investors require to make their portfolio investment decisions.
12 Slide 2–12 Dealing with the incentive problems : Adverse Selection and Moral Hazard Asymmetric information – problems arise when two parties to a transaction have access to different information Adverse Selection Before transaction occurs Potential borrowers most likely to produce adverse outcome are ones most likely to seek a loan and be selected Moral Hazard After the transaction has occurred The use of private information for personal gain
13 Slide 2–13 Adverse Selection in Insurance Markets Adverse selection can be a problem when there is asymmetric information between the seller of insurance and the buyer; in particular, insurance will often not be profitable when buyers have better information about their risk of claiming than does the seller. Ideally, insurance premiums should be set according to the risk of a randomly selected person in the insured slice of the population (55-year-old male smokers, say). In practice, this means the average risk of that group. When there is adverse selection, people who know they have a higher risk of claiming than the average of the group will buy the insurance, whereas those who have a below-average risk may decide it is too expensive to be worth buying. In this case, premiums set according to the average risk will not be sufficient to cover the claims that eventually arise, because among the people who have bought the policy more will have above-average risk than below-average risk. Increasing the premium will not solve this problem, for as the premium rises the insurance policy will less attractive to more of the people who know they have a lower risk of claiming. One way to reduce adverse selection is to make the purchase of insurance compulsory, so that those for whom insurance priced for average risk is unattractive are not able to opt out.
14 Slide 2–14 Moral Hazard in Insurance Markets Moral hazard means that people with insurance may take greater risks than they would do without it because they know they are protected, so the insurer may get more claims than it bargained for. Fire insurance increases the incentive to commit arson, especially if someone is operating a failing business and decides that they'd rather have the cash from the insurance proceeds on the buildings than the buildings themselves. (The value of a business often is based on profitability; after arson, the owner can claim the business was profitable.) In a worst case scenario (from the insurer's viewpoint), the building is over-insured or valuable contents are removed but claims are filed that they were destroyed in the fire. Many, perhaps most, police investigations of arson are the result of leads from suspicious insurance adjusters. More generally, having insurance discourages preventive measures, such as proper fire prevention. For example, the expectation of US federal government disaster aid seems to encourage the residents of Malibu, California to let bushes and trees grow near their houses, as part of their landscaping. This increased vegetation raises the risk of fire damage to their houses. Automobile insurance reduces the costs to insured people who have accidents, making people less cautious when driving (compared to how they would drive if they paid 100 percent of the damages they cause in an accident).
15 Slide 2–15 Moral Hazard & Insurance: Examples You never know who might be listening. One fairly common type of fraud people commit is buying coverage after their car's been damaged. What's less common is when they buy it from the scene of the accident. Take the case of the motorcyclist who wiped out and, while lying on the side of the road with a ruptured spleen, had the presence of mind to call PROGRESSIVE to buy coverage. What he didn't know was that a witness who saw the accident also heard him make the call. In another case, a couple's car caught on fire. While the husband was on the phone with Progressive buying a policy, his wife was overheard yelling in the background that the car was about to explode. Unintended consequences. Some people figure the easiest and quickest way to collect insurance money is to destroy their car by setting it on fire. Not necessarily. Consider the case of two brothers who were hired to set a car on fire. They doused it with gasoline, and to make sure the vehicle would be completely destroyed, they decided to throw in a pipe bomb. The bomb exploded, setting one of the men on fire. He was likely killed instantly from the explosion, but his brother, not realizing that, rushed to extinguish the flames and ended up catching on fire. He ran toward a nearby highway for help and flagged down a state trooper who had come to investigate the black cloud of smoke. The man told the trooper what he and his brother had done and then, like his brother, passed away from his injuries.
16 Slide 2–16 Moral Hazard & Insurance: Examples What's wrong with this picture? A customer said some parts were stolen from his car, and to support his claim, he submitted what appeared to be phony invoices along with Polaroid photos. At first blush the photos looked pretty good, but something seemed a little odd about them. On closer inspection, investigators realized the guy had taken extreme close-ups of a toy car that was the same color and make of his actual car. The customer eventually admitted he took photos of the toy car in an attempt to get his claim paid. Miracle cure? A passenger riding in a customer's car was injured in a crash and needed chiropractic treatment. No problem. The customer's insurance covered it. However, sometime before completing the prescribed series of doctor visits, the passenger died of unrelated, natural causes. Now, you'd think that a person who is deceased would no longer benefit from a doctor's care, but evidently, the chiropractor thought otherwise. He continued to bill for treatment for a full month after the patient's death. That's gonna leave a mark. A woman decided to take her boyfriend's motorcycle for a ride. Unfortunately, she didn't know how to drive and crashed it. Luckily, she wasn't injured. The man, however – afraid his insurance wouldn't cover the damage to his motorcycle because his girlfriend wasn't listed as a driver on his policy – decided to pretend that he had crashed the motorcycle. He figured he needed some injuries to make his story credible, so he tied himself to the back of a truck and asked a friend to drag him around a little bit to produce the road rash he would have gotten from the wreck. Well, he got the injuries he wanted, but they didn't do him any good. His girlfriend told investigators that in fact it was she who crashed the motorcycle.
17 Slide 2–17 Classifications of Financial Markets 1.Debt Markets Short-Term (maturity < 1 year) Money Market Long-Term (maturity > 1 year) Capital Market 2.Equity Markets Common Stock Forms part of the Capital Market
18 Slide 2–18 Classifications of Financial Markets 1.Primary Market New security issues sold to initial buyers 2.Secondary Market Securities previously issued are bought and sold
19 Slide 2–19 Classifications of Financial Markets 1.Securities are traded on an Exchange Trades conducted in central locations (e.g., Toronto Stock Exchange) 2.Securities are traded Over-the-Counter Dealers at different locations buy and sell
20 Slide 2–20 Internationalization of Financial Markets International Bond Market Foreign bonds – any bond sold in a domestic market, denominated in the domestic currency, by a foreign issuer Eurobonds – sold in a foreign market by a non-resident issuer and denominated in a currency other than the currency of the country where the bond is issued
21 Slide 2–21 Foreign Bonds Yankee bonds – A bond issued in the United States, denominated in U.S. dollars, by a foreign issuer Samurai Bonds – A bond issued in Japan, denominated in Yen, by a foreign issuer Bulldog Bonds - A bond issued in the UK, denominated in pounds sterling, by foreign issuer Matador bonds - A bond issued in Spain, denominated in pesetas, by a non-Spanish company Matilda bonds – A bond issued in the Australian market, denominated in Australian dollars, by a foreign entity
22 Slide 2–22 Eurobonds - Characteristics Trading A Eurobond is a tradable instrument: it is intended to be bought and sold during the period up to it maturity. It is usually launched through a public offering and is listed on a stock exchange. Payments There is no central register where holders of the issue are named. Eurobonds are, in this sense, a bearer instrument - interest is paid upon presentation of detachable coupons, while the principal amount is repaid on presentation of the Eurobond itself. Listing Although Eurobonds are listed in several stock exchanges, the London and Luxemburg stock exchanges are those most frequently used. Taxation Eurobonds are not subject to tax and largely free from government regulation.
23 Slide 2–23 International Stock Markets
24 Slide 2–24 Financial Intermediaries
25 Slide 2–25 Size of Financial Intermediaries
26 Slide 2–26 Regulatory Agencies
27 Slide 2–27 Regulation of Financial Markets Three Main Reasons for Regulation 1.Increase Information to Investors Decrease adverse selection and moral hazard problems Provincial securities commissions (such as the Ontario & Alberta Securities Commission) force corporations to disclose information 2.Ensure the Soundness of Financial Intermediaries Prevents financial panics Chartering, reporting requirements, restrictions on assets and activities, deposit insurance, and anti-competitive measures 3.Improve Monetary Control Reserve requirements Deposit insurance to prevent bank panics
Similar presentations
Ads by Google |
Details of this Paper
Maths: Imagine you are a manager at a major bottling company
Question;Imagine you are a manager at a;major bottling company. Customers have begun to complain that the bottles of;the brand of soda produced in your company contain less than the advertised;sixteen (16) ounces of product. Your boss wants to solve the problem at hand;and has asked you to investigate. You have your employees pull thirty (30);bottles off the line at random from all the shifts at the bottling plant. You;ask your employees to measure the amount of soda there is in each bottle. Note;Use the data set provided by your instructor to complete this assignment.;Faculty Note: Provide students the data set below or your;own for the completion of this assignment.;Bottle Number;Ounces;Bottle Number;Ounces;Bottle Number;Ounces;1;14.5;11;15;21;14.1;2;14.6;12;15.1;22;14.2;3;14.7;13;15;23;14;4;14.8;14;14.4;24;14.9;5;14.9;15;15.8;25;14.7;6;15.3;16;14;26;14.5;7;14.9;17;16;27;14.6;8;15.5;18;16.1;28;14.8;9;14.8;19;15.8;29;14.8;10;15.2;20;14.5;30;14.6;Write a two to three (2-3) page;report in which you;1. Calculate the mean, median, and;standard deviation for ounces in the bottles.;2. Construct a 95% Confidence;Interval for the ounces in the bottles.;3. Conduct a hypothesis test to;verify if the claim that a bottle contains less than sixteen (16) ounces is supported.;Clearly state the logic of your test, the calculations, and the conclusion of;your test.;4. Provide the following;discussion based on the conclusion of your test;a. If you conclude that there are less than;sixteen (16) ounces in a bottle of soda, speculate on three (3) possible;causes. Next, suggest the strategies to avoid the deficit in the future.;Or;b. If you conclude that the claim of less soda;per bottle is not supported or justified, provide a detailed explanation to;your boss about the situation. Include your speculation on the reason(s) behind;the claim, and recommend one (1) strategy geared toward mitigating this issue;in the future.;Your assignment must follow;these formatting requirements;?;Be typed, double spaced, using;Times New Roman font (size 12), with one-inch margins on all sides. No;citations and references are required, but if you use them, they must follow;APA format. Check with your professor for any additional instructions.;?;Include a cover page containing;the title of the assignment, the student?s name, the professor?s name, the;course title, and the date. The cover page and the reference page are not;included in the required assignment page length.;1.
Paper#60647 | Written in 18-Jul-2015
Price : $27 |
Haven't found the Essay You Want?
For Only $12.90/page
Gender and Video Games Essay
The current development in the literature concerning videogames and gender constitutes the formulation of perceptions of how not only game developers but also players establish their individual and collective identity in this process. Their relationship then corresponds to creating specific norms and principles that seek to identify specific ideas concerning their representation of reality and also their ability to capitalize on existing genres for cultivating game play and the issues related to acceptance of existing norms.
Due to this, to better understand the relationship circumventing around video games and gender, fair amount of analysis must be made not only in its ability to represent the gaming public but also in the impact it creates towards taking the issue into a bigger picture as it relates to the construction of social norms and roles. Assessing Video Games and Gender Indeed looking at previous literature studies, it can be seen that misrepresentation remains apparent especially among the representation of gender in video games.
Here, common patterns of male masculine figures and characters continue to dominate different platforms and games. Such idea remains to be seen particularly, during the earlier times wherein there is a corresponding depiction of players that are relatively male and ultimately dominate both the primary and secondary characters. Here, Williams, Martins, Consalvo and Ivory (2009) study highlights these apparent trends by arguing that “the most popular games are less representative than the typical game produced by developers, indicating that players also play a role in the cycle of creation and consumption” (p.
828). Similarly, such actions then establish the formation of implications relating towards both businesses and gamers alike. Given the constant marketing and exploration of new strategies to expand the level of gamers within a specific platform, there are indeed restrictions that this gender bias and formulation of games create. It necessitates not only hindering the potential appeal of these games towards consumers but also induce common means for limited appreciation and also shortage in sales.
These dynamics in turn necessitate a constricted response to the ever growing number of patrons of video games as it encompasses the majority of participants and involve other actors who also place emphasis in their capacity for media to exhibit their common associations and relationship within the platform (Williams, Martins, Consalvo, Ivory, 2009). Opening up Patterns for Diversity and Change Assessing the validity of how video games embrace diversity, careful analysis needs to be made in the manner that video games seek to portray and outline the views concerning the gaming culture.
Since social symbols often connote this process to be a male/masculine endeavor, earlier platforms somehow inhibit female participation in such activity and more often than not associated with male roles and tendencies (Williams, Martin, Consalvo and Ivory, 2009). However, this started to change as new designs and models have been introduced to cater to the changing perceptions of gender roles related to video games and adherence to the objectives to transcend over common representations that platform has over male and female responsiveness.
Recognizing the current needs for embedding gender equality within the video game platforms, many game developers now seek to apply these strategies in the formulation of new titles that seek to connote better ability for people to utilize their perception of themselves within a particular game. This brought about significant changes as designers brought into consideration diversity and equal representation of male and female roles in the process.
This dynamics then consolidated better means for outlining not only significant areas related to the overall game play but also in the appeal it gives towards different individuals regardless of their racial and gender associations (Brandtzaeg and Heim, 2009). Seeing this, the study by Jansz and Vosmeer indeed offer a good analysis of how the game ‘Sims 2’ address these changing trends and outline the evolution of gaming from a masculine and male dominated genre to a more lax and diverse area that induces common connections between masculinity and femininity.
By using this game as an example, the study was able to highlight significant changes in these perceptions and was able to ascertain common ideals shaping and furthering opportunities accounting to how diversity serves as an instrument in merging the idea of gender and video games together. To complement this process, it takes into account creating video games that are not only responsive to the needs of gamers but also reach out towards their ability to utilize connections over the roles specific characters play.
Here, Jansz and Vosmeer (2010) argues, “developing gender and games theory requires more detailed insight into the mutual shaping of game content, game play, and gender identities” (p. 247). By collaborating on these three aspects accordingly, the ability of growth of video games have indeed showcased a reality that is more conducive and responsive to the needs of individuals by offering a variety of platforms wherein interaction and associations remain possible. Videogames, Violence, and Gender Roles
Another precept shaping the understanding concerning the idea of videogames and gender is the corresponding perceptions and roles it provides participants. Since this element is one part of media, it is through this that representations about culture and gender roles are provided among individuals regardless of age, race, or cultural affiliations. These dynamics in turn necessitate both positive and negative responses in terms of the establishment of identity and formulation of specific patterns of behavior innate within the characterization of primary and secondary characters in a particular game.
In essence, there continues to be a relationship in the way individuals ascertain their preferences in games with their innate social behavior and ability to denote a particular response to each theme of a video game played (Brandtzaeg and Heim, 2009). Seeing these diverse variations concerning the ability to extract experiences and ideas from video games, it then presents the formation of specific behavior and inputs depending on the themes provided. Such actions then result in current diversity of games available in the market today.
As Brandtzaeg and Heim (2009) argue, “the new electronic gaming landscape is complex, and consists of a vast array of choices in different game content genres tailored towards a range of user profiles in regards to highly different interests and content preferences” (p. 71). These in turn result in the formulation of specific behavior that equally shapes an individual’s personality and the manner that each one seeks to equate this in the formulation of their identity and role within social institutions.
Associated with the formulation of gender roles, there are also instances of video games promoting violence as themes in its platforms. Such dynamics then necessitate impact on individual behavior as they try to ascertain specific tendencies towards the acceptance of violence to be a social norm and apparent in different scenarios and environment. Though research and literature may argue differently concerning this stance, it also goes to show the impact that video games can provide towards the inducement of violent and aggressive tendencies among gamers.
Here, it is what Kim refers to as desensitization of violence within video games genre and points out its impact not only in the formulation of gender roles but also the acceptance of its role within the development of a player’s identity (Kim, n. d. ). Under this process, there continues to be new developments happening in video game technology that aides the desensitization of violence among consoles. These in turn contributes to further exposure and creates a real-life scenarios wherein players experience an almost-real setup where violence as a theme is depicted.
Here, Kim (n. d. ) argues that “as video games become more sophisticated, there is a wide range of input devices at various levels of realism – from pushing keys on a keyboard to a turning wheel to drive or actually shooting a gun” (p. 5). Such realities then brings about the question of how such games provide the means to explore means to correspond the manner to ascertain violence, videogames and gender. It does take into account the value of how these themes permeate within choices and ability to partake in the gaming experience of individuals.
By establishing these relationships, it can help analyze the formulation of behavior as well as how it corresponds to the nature of furthering opportunities to extract behavioral responsiveness on the part of individuals who partake in such endeavor. (Jansz, and Vosmeer, 2010). To conclude, the idea of gender and video games have undergone an expansion of literature that takes into account its development from a more conservative and masculine-oriented dimension towards the creation of games that seeks to highlight and induce elements of diversity.
By taking account of these areas, it was able to consolidate better means to reach out towards different gamers and allow better means for access among people. Though there may still be corresponding bias views concerning gender, it was able to construct a new playing field wherein new games are able to cater towards the dynamic needs among gamers. Alongside this development, there is also the corresponding perspective of shaping new means to carry out effective means to extract gender roles among players.
These elements manifest in the themes and perceptions utilized by individuals who participate in such endeavor. One element that can be seen in these areas is the corresponding violence that video game creates. Though there are contrasting views in the impact on human behavior, it plays a crucial role in establishing analysis in its association with the interplay of social norms and roles through the spectrum of perceptions and choices of video game genres. References Brandtzaeg, P. B. and Heim, J. (2009) Children’s Electronic Gaming Content
Preferences and Psychosocial Factors: Is there a connection? Nordicom Review. 30 (2), pp. 69-86 Jansz, J. , Avis, C. and Vosmeer, M. (2010) Playing The Sims 2: An exploration of gender differences in players’ motivations and patterns of play. New media and Society. 12 (2), pp. 235-251 Kim, O. T. Effects of Violent Video Games on Desensitization: The Role of Gender, Previous Exposure, and Input Device. Williams, D. , Martins, N. , Consalvo, M. and Ivory, J. (2009) The virtual census: representations of gender, race, and age in video games. New media and society. 11 (5), pp. 815-834
Essay Topics:
|
Theories and History of Police: Notes on Cesare Birignani’s ‘The Rational City’
What is a city?“The Paperholder,” drawing by Gabriel de Saint-Aubin (1749), in: M. Guillauté, Mémoire sur la Réformation de la Police, soumis au roi en 1749
1. On November 26, 2010, titled “The Rational City: Urbanism and Police Science in the Ancien Régime
How is it constituted? What are its functions? How is it to be governed? Who are its citizens? How should it look like? In the 18th century European and, in particular, French intellectuals proposed novel formulations of such questions and conveyed a wealth of competing arguments, radically changing the practice of urban planning and ultimately redefining the very idea of the city. Cesare Birignani, teaching fellow at Columbia University and visiting professor at Versailles and UIUC, offered an alternative reading to revisit the common understanding of the rational city and the emergence of Urbanism under the rubric of ‘Police Science’. In the seminar he held at the Berlage Institute[1] he explored a series of historical transformations in the way the city was problematized in the ancien régime by discussing both a series of administrative and juridical practices developed to manage the city of Paris, and a corpus of texts produced in the period between the end of the seventeenth century until the Revolution. As part of a series titled “The Historical Project: Whatever Happened to Operative History” Birignani’s seminar was also an occasion to discuss his methods, radically opposed to any attempt to make history “operative.”
Birignani’s thesis examines two historical phenomena and their mutual relation: first, the emergence of a new “rationality” of the city, as it developed in the discourse and practices of police, the institution that mostly controlled urban transformation; and second, a profound cultural change in the way the city, in both its material and political sense, was conceived. Such an analysis can help to revisit some of the basic assumptions in the study of the city of the Enlightenment (e.g., the very notions of Enlightenment, rationality, order) and consider anew the long-standing question of the relationship between architecture and society.
Terminologically, until the mid-eighteenth century, the term police did not refer to a kind of organized administrative agency or specialized body of men; police designated not really an entity but an act. Indeed, it is more convenient to read it as a verb: ‘to police,’ rather than ‘the police.’ By this definition police stands for a set of functions instead of an actual institution. In 1694 the Dictionnaire de l’Académie française defined police as ‘order.’ Later the Encyclopédie-the key text of Enlightenment-equated police with ‘government.’ As a whole, eighteen-century definitions of policing focus on the “governing human beings and making them happy in light of the general interest. […] The public interest was thus linked to the idea of ‘civilisation’, which permitted a nation to live according to orderly and reasonable customs.”[2]2. Arlette Farge, “Police,” in Encyclopedia of the Enlightenment, ed. Michel Delon, trans. Philip Stewart and Gwen Wells (Chicago: Fitzroy Dearborn, 2001). In 1752 Diderot used the term ‘police’ in the article ‘beau’ (beautiful) in opposition to the term ‘sauvage,’ since policing was to draw people away from barbarism and encourage civilisation; so the state, the city or the people were promoted to be ‘policé’ (policed).[3]3. Denis Diderot, Encyclopédie: articles ‘Âme,’ ‘Beau,’ ‘Certitude,’ ‘Droit naturel.’ For a century, police stood for the rational regulation that kept the society and the city in a clearly defined power structure and juridical framework. At that time it certainly did not have those negative implication as it has today; most writers like Voltaire and Rousseau used the term in a very positive sense: a policed state, a policed city or a policed people indicated a civilized city or a civilized state.
At the rise of the Enlightenment ‘police science’ was born to formulate a new rationality of the city in order to make it knowable, readable and therefore manageable. While the European city was described as an irrational body of settlement[4]4. See Jean-Jacques Rousseau,Confessions, Book IV, and René Descartes, Discourse on the Method: Part II ‘police science’ turned the city as such into an object of knowledge. Consequently, Birignani traces the emergence of urbanism in the mid-eighteenth century in the form of an autonomous discipline. He described two key projects which have theoretically and practically established the police as a new paradigm: the reform of the police during Loius XIV in 1666,[5]5. This project is extensively documented by M. Guillaute, the police officer of Île-de-France, in the manuscript Mémoire sur la Réformation de la Police de France first published in 1749. and the publication of the book series Traité de la Police by Nicolas De La Mare in 1705.
Until the mid-seventeenth century Paris was not a homogeneous juridical space. There was an attempt to reduce Paris to a limited consistent juridical and political domain, and ‘police science’ was a guarantee to carry out this project. In 1666, Louis XIV and especially Jean-Baptiste Colbert, the prime minister of the king, decided to centralize police functions in order to solve the institutional conflicts. They established a council for the reformation of the police in the form of a committee to redraw fundamentally the juridical environment of Paris and to clarify who had the police function. A new post was consequently established by this committee, the lieutenant general of police.
In 1675 Nicolas De La Mare, a French police commissioner, started a monumental project to compile urban regulations as a Traité. The first volume of Traité de la Police was published in 1705. He succeeded to publish only two other volumes during his lifetime.[6]6. A part of the series was published after his death by Anne-Louis Lecler du Brillet who took over the notes that De La Mare left from the unpublished materials gathered them in the book Continuation du Traité de la Police that deals mostly with Urbanism (De la Voirie).
7. In the 18th century the term Urbanism did not exist. The term that was used most often was embellissement which did not have any precise juridical meaning. But the term that bore the closest meaning was the term voirie.
He divided the police domains into eleven major scopes of action in which it should intervene: religion, morality, public health, food supply, urbanism,[7] commerce, etc. De La Mare can be seen as the one who formulated the ideology of police by writing a systematical history of jurisprudence in France. As Birignani puts forward, police functions not only by means of violence and power but primarily by ideology. The fundamental object of police, according to De La Mare, is to leave man in the most perfect happiness that he can enjoy in his life. Nevertheless, in police ideology, man’s happiness is not antithetical to the idea of control; on the contrary, it is control and management that guarantee individuals’ happiness and social welfare.
The new conception of the city that emerged from ‘police science’ constructed a new rationality of the city. This holistic understanding can be seen, according to Birignani, as the origin of Urbanism: the knowledge of the management of the city. The city, which previously had been approached just by punctual interventions, now became a complex object of study. Paris began to be projected as a network of nodes and links in an urban system. This knowledge was not just to make the city clean with straight streets and smooth circulation; in fact, it was to limit and thus to define the city by documenting and numbering every single object. As a result, the city was mapped and projected in fundamentally new plans. The map of water network, published in 1738 by Lecler du Brillet, can be seen as the first infrastructural map of Paris. In 1765, Pierre Patte combined all the projects that had been submitted for the competitions and future projects into a single map of the city. This is one of the first attempts to illustrate the city as a cohesive system based on simple multiplication of an archetype (the royal square). In these projects the city was redesigned and perceived as a whole, to be defined not through walls but by application of a certain rationality.
Birignani sees the De La Mare’s Traité as a remarkable breakthrough towards shaping a new consciousness about the city. However, the utter pragmatism of ‘police science’ is strongly underlined. It was Françoise Choay who first denied any theoretical status of De La Mare’s project: “De La Mare’s attempt to reveal the logic behind the decisions and regulations as the logic was an illusion.”[8]8. Françoise Choay, The Rule and the Model, (Cambridge, MA: The MIT Press, 1997) Police dealt with the contingency of the city; its object was not to cope with the necessities of the ideal city of the utopian writers, but to deal with the city that actually existed with all its messiness and complications. Thus, ‘police science’ is an outlook to manage the city in the most expedient way; it no longer aims to project a new city but to maintain and improve the status quo of the city in its utmost better condition, it performs to make the machine function better.
Birignani’s contribution voluntarily stops here. Birignani hesitates to confirm any mutual relation between the political machine and the ‘police science,’ and to see the latter as an apparatus-a permanent state of coup d’état which is able to secure the stability of society and at the same time providing happiness to individuals. In other words, Birignani resists the temptation to theorise ‘police science’ as an example of a diffused, bureaucratic governmentality opposed to a centralized model of sovereign power, as Michel Foucault attempted to do in one of his last contributions.[9]9. Michel Foucault, Security, Territory, Population: lectures at the College de France 1977-1978, (London: Palgrave Macmillan, 2007)
In his desire to extract ontological categories, Foucault is responsible, according to Birignani, to suffocate the individuality of the figures found in historical evidence to a faceless, anonymous murmuring. Instead, Birignani chooses to render history through an exposition of the statements and the utterances as they are found in the archive, against any attempt to interpret and organize them. The historian is no longer a narrator but someone who fundamentally acts as a mediator to purify a particular historical episode from present ideological or political commitments. In this sense, history is considered as a form of resistance, which has to remain autonomous. The quest of the “true meaning” of a determinate historical event, and the “objectiveness” of its rendering can only be achieved through the renunciation of any attempt to make history living: as Carlo Ginzburg declared, to make a history that is “really dead.”[10]10. Keyvanian, C., “Manfredo Tafuri: From the Critique of Ideology to Microhistories” in Design Issues journal, Vol. 16, No. 1 (2000) p. 3-15.
Despite the architectural historian’s scholarly obsession not to manipulate the facts by theorising them, the death of history is still loaded with operative potentiality. Another historian obsessed with objectivity admitted that “an elaboration of mourning” might be proposed “with the aim of enlarging the scope of those questions that operate critically within contemporary architectural culture.”[11]11. Manfredo Tafuri, Interpreting the Renaissance: Princes, Cities, Architects (New Haven and London: Yale University Press, 2006), emphasis in the original. Indeed, the Art of Police is today even more pervasive and efficient in the management of the city than it was in the eighteenth century. In this light, Birignani’s project, with its “weak power of analysis,” might be read as a retroactive manifesto of police: the one that De La Mare did not succeed to finish. |
Muslims And Jews Fight Racism In Denmark
One of the ongoing false beliefs in the Middle East by both Israelis and Arabs is the inability of both groups to work in a cooperative manner to further the cause of peace. The Jewish Community in Denmark has forged an alliance with the United Council of Muslims (MFR) to campaign against all forms of racism in the country. It is not just a fight to bridge differences between the two religions, but to confront racism in any form. Finn Schwartz of the Jewish Community, emphasizes, “it is a collaboration on racism and deals with anti-Semitism and Islamophobia. For the Muslims the campaign is aimed at Danish society, while Jews want to address the genera prejudices and pre-conceptions in society as well as Muslims’ anti-Semitism.”
Both groups believe the media has focused too much on conflict between Muslims and Jews while ignoring all aspects of racism in society. To the extent that racism ends in a society, to that extent will prejudice against Muslims and Jews come to an end. |
1929 Auburn Boat-tail Speedster
Engine: Lycoming Straight 8
Displacement: 268 Cubic Inches
Horsepower: 98 BHP
Cost New: $1,395.00
In 1926, Errett L. Cord became president of the Auburn Automobile Company, launching what was later to become the Auburn-Cord-Duesenberg Company. The Auburn Boat-tail Speedster was the epitome of the decade known as the Roaring Twenties. First produced in 1928, the Boat-tail Speedster was built on the same chassis as the rest of the Auburn line, but its styling put it at the head of the line. The whole car was designed to give the impression of speed. The low price of the Auburn Speedster put it in reach of thousands of Americans, who had never been able to afford such styling or performance before. The cars sold well, but did not come anywhere near the sales of the regular sedans offered by Auburn. While 1929 was the best sales year that Auburn had, the Stock Market Crash would lead to the end of the line.
Auburn produced 32,301 vehicles for the year, surpassing DeSoto, Hudson and Packard. With a price of $1,395, the Speedster became the performance car for the masses. Business Week hailed the 1931 Auburn as "more car for the money than the public has ever seen." |
Studies Magnifier and Hat
Solving the Diet-Cancer Mystery:
Scientific Studies Provide Clues
Controlled Trials: What Are They?
In controlled trials, scientists don’t just observe what happens to study subjects as they eat what they would usually eat. They make specific changes to the participants’ diets to see how those changes affect them. One group of study participants, the “intervention group”, consumes foods or nutrients scientists think may protect against cancer. Other participants, the “control group,” get a different “food prescription” – often just a placebo.
Test Group
Most controlled trials are randomized and double-blind. “Randomized” means that study subjects in the two groups don’t differ in any major way other than in what they’ve been asked to eat, so the results aren’t affected by unrelated things. “Double-blind” means that neither the scientists nor the people in the study know who’s in which group.
Strengths of Controlled Trials
Controlled trials avoid many of the types of bias that can be found in other studies. They also let scientists keep tight control over the enormous complexity of our daily menus.
Weaknesses of Controlled Trials
Controlled trials are often called the scientific “gold standard.” This can be true in many situations, but for unraveling the mystery of linkages between diet and cancer prevention, this investigation method may not be perfect.
It’s hard to “blind” people to dietary modifications. You know what you’re eating, and you’ll be aware if someone changes it. That’s why many controlled trials involving diet and cancer give the nutrients in the form of a supplement. But even if scientists show that an isolated supplement produces no anti-cancer effects, this wouldn’t tell us anything conclusive about how whole foods or diets made up of many different foods affect cancer risk.
And since cancer can take decades to develop, it’s hard to know if a study has lasted long enough. Nevertheless, a positive result from a controlled trial can provide strong evidence that a particular nutrient has a protective effect against cancer.
Next Button |
How Courts Work
Steps in a Trial
The Jury Pool
The trial jury in either a civil or criminal case is chosen from a list called a venire or jury pool that has been compiled by the court. The method of selecting names for the venire varies. In many states the list is compiled from voter registration lists or drivers license lists. (In some jurisdictions, the federal and state courts use the same lists for a given area.) The jury pool is sometimes compiled with the help of jury commissioners appointed by the presiding judge.
Most states require that a court official screen the list of potential jurors to eliminate people unqualified or ineligible under state law. Traditionally many people were exempted from jury duty because their jobs were considered so important to society that they couldn't be released from them for jury duty. These automatic exemptions and excuses are becoming less and less common. In many states they have been sharply cut back or completely eliminated.
>>Diagram of How a Case Moves Through the Courts
>>Civil and Criminal Cases
>>Settling Cases
>>Pre-trial Procedures in Civil Cases
>>Jurisdiction and Venue
>>Pre-Trial Conferences
>>Pre-trial Procedures in Criminal Cases
>>Bringing the Charge
>>Arrest Procedures
>>Pre-Trial Court Appearances in Criminal Cases
>>Plea Bargaining
>>Civil and Criminal Trials
>>Officers of the Court
>>The Jury Pool
>>Selecting the Jury
>>Opening Statements
>>Direct Examination
>>Motion for Directed Verdict/Dismissal
>>Presentation of Evidence by the Defense
>>Final Motions
>>Closing Arguments
>>Instructions to the Jury
>>Jury Deliberations
>>Motions after Verdict
The Human Side of Being a Judge | Mediation |
You've got family at Ancestry.
Find more Janc relatives and grow your tree by exploring billions of historical records. Taken every decade since 1790, the U.S. Federal Census can tell you a lot about your family. For example, from 1930 to 1940 there were 29 less people named Janc in the United States — and some of them are likely related to you.
Start a tree and connect with your family.
Create, build, and explore your family tree.
What if you had a window into the history of your family? With historical records, you do. From home life to career, records help bring your relatives' experiences into focus. There were 58 people named Janc in the 1930 U.S. Census. In 1940, there were 50% less people named Janc in the United States. What was life like for them?
Picture the past for your ancestors.
In 1940, 29 people named Janc were living in the United States. In a snapshot:
• 2 were disabled
• For 15 females, Mary was the most common name
• 11% of adults were unmarried
• On average men worked 44 hours a week
Learn where they came from and where they went.
As Janc families continued to grow, they left more tracks on the map:
• Most immigrants originated from Yugoslavia
• 22 were born in foreign countries
• The most common mother tongue was Slovak
• 2 migrated within the United States from 1935 to 1940 |
You've got family at Ancestry.
Find more Stavrakas relatives and grow your tree by exploring billions of historical records. Taken every decade since 1790, the U.S. Federal Census can tell you a lot about your family. For example, from 1930 to 1940 there were 1 less person named Stavrakas in the United States — and some of them are likely related to you.
Start a tree and connect with your family.
Create, build, and explore your family tree.
What if you had a window into the history of your family? With historical records, you do. From home life to career, records help bring your relatives' experiences into focus. There were 10 people named Stavrakas in the 1930 U.S. Census. In 1940, there were 10% less people named Stavrakas in the United States. What was life like for them?
Picture the past for your ancestors.
In 1940, 9 people named Stavrakas were living in the United States. In a snapshot:
• 3 adults were unmarried
• 8 rented out rooms to boarders
• Most common occupation was bartender
Learn where they came from and where they went.
As Stavrakas families continued to grow, they left more tracks on the map:
• Most immigrants originated from Greece
• 50% were first-generation Americans
• 4 were born in foreign countries
• They most commonly lived in Illinois |
Kouichi Okamoto, Form of Light Force Transmission installation.
Courtesy Kyouei Design Kouichi Okamoto, Form of Light Force Transmission installation.
One approach to creating a novel design application is to intentionally reinterpret a material's intended function. For example, solder is a soft metal alloy typically used to join wires and electrical components together. However, in the case of a recent work by Japanese designer Kouichi Okamoto, solder is used as a primary surfacing material rather than a connective substance.
To make his "Form of Light Force Transmission" installation, Okamoto heated solder in a container and dripped the molten material slowly and methodically on a wood panel. Over time, the collection of solder drips began to coalesce, resulting in a dappled, blurred mirror surface. After the solder cooled, Okamoto peeled the metal skin off the substrate and reattached it to vertical wall panels. In a final twist, the designer used the solder planes to conduct electricity for light by clipping the installation's light fixtures and electrical cables to the conductive metal.
Although it required a long and painstaking process to produce, Okamoto's installation imparts a rich and unexpected quality that results from its surprising misuse of a common material.
|
Web Results
Square yard - Wikipedia
They use it when calculating job costs and when quoting prices. Carpet installers, however, operate with square yards. Since most construction measurements ...
Square Yards Calculator - Inch Calculator
Yardage Calculator - Carpet Cave
Cubic Yards Calculator - Calculator Soup
Calculate cubic yards, cubic feet or cubic meters for landscape material, ... and this is your answer; Where (ft<sup>2</sup>) = square foot, (ft<sup>3</sup>) = cubic foot, (yd<sup>3</sup>) = cubic yard ...
How do you convert feet into square yards? | Reference.com
Convert square feet into yards by multiplying the length of a space by the width of the space to calculate the area of the space. Divide the sum by 9 to arrive at ...
www.ask.com/youtube?q=How Do You Figure Square Yards?&v=j0V2dFpzcd8
Square Feet to Square Yards - Metric Conversion
How much carpet will you need? | Bankrate.com
... and I would love to know how to change square feet to square yards ... Calculator at http://entisoft.earthlink.net/scripts/unitscgi.exe For your ...
How to Figure Square Yards
Difficulty: Easy
Source: www.ehow.com |
1. Commerce, either by barter or by buying and selling; interchange of goods and commodities; trade. A merchant of great traffic through the world. (Shak) The traffic in honors, places, and pardons. (Macaulay)
2. Commodities of the market. You 'll see a draggled damsel From billingsgate her fishy traffic bear. (gay)
3. The business done upon a railway, steamboat line, etc, with reference to the number of passengers or the amount of freight carried. Traffic return, a periodical statement of the receipts for goods and passengers, as on a railway line. Traffic taker, a computer of the returns of traffic on a railway, steamboat line, etc.
Origin: Cf. F. Trafic, It. Traffico, Sp. Trafico, trafago, Pg. Trafego, LL. Traficum, trafica. See Traffic.
2. To trade meanly or mercenarily; to bargain.
Origin: F. Trafiquer; cf. It. Trafficare, Sp. Traficar, trafagar, Pg. Traficar, trafegar, trafeguear, LL. Traficare; of uncertain origin, perhaps fr. L. Trans across, over _ -ficare to make (see -fy, and cf. G. Ubermachen to transmit, send over, e. G, money, wares); or cf. Pg. Trasfegar to pour out from one vessel into another, OPg. Also, to traffic, perhaps fr. (assumed) LL. Vicare to exchange, from L. Vicis change (cf. Vicar).
Retrieved from ""
First | Previous (Traducianism) | Next (Trafficking) | Last |
Subsets and Splits