content
stringlengths 71
484k
| url
stringlengths 13
5.97k
|
---|---|
Our Ice Wine is produced from Vidal Blanc harvested in the critical range of 18-20° F and then pressed at that temperature. The juice is warmed to 60° F and inoculated with a double the normal amount of yeast to insure fermentation. The fermentation is quite slow and proceeds for 6 to 8 weeks due to the stressful conditions for the yeast. When fermentation completes, the wine is settled, racked and cold stabilized. A final, polishing filtration is performed before bottling this wonder of nature. Minimal handling insures the concentrated fruit flavors and aromas are retained in the bottle.
The classic dessert wine is produced from grapes naturally frozen in the vineyard in the old-world tradition. Intense aromas and flavors of honey, pineapple and apricot dance in an amber liquid more like nectar than wine. This is dessert in a glass that you want to savor sip, by sip. An ethereal experience you won’t forget! | https://whitepinewinery.com/index.php/wines/tech-sheets/48-2017-white-pine-ice-wine |
By Philip Runco. Photos by Clarissa Villondo.
Freshly Tapped spotlights one recently released beer, whether it be a flagship, one-off, seasonal, or modified recipe.
Today, we explore Days Gone By, a dry-hopped tripel from Hellbender Brewing and Brasserie St. Feuillien.
Previously in Freshly Tapped: DC Brau’s Collaboratron, Right Proper, Stone, and Pen Druid’s Soused; Denizens’ Backyard Boogie; Port City’s Colossal 6; Ocelot and Meridian Pint’s Talking Backwards; Right Proper and Pizzeria Paradiso’s Maslow; Union and Ocelot’s Lucifer’s Trees; 3 Stars and Charm City Meadworks’ Two-Headed Unicorn; Aslin and Meridian Pint’s The Adventures of Audrey; Atlas Brew Works’ Dance of Days; Old Ox’s Funky Face; Handsome Beer’s White Ale; Ocelot and Bluejacket’s Raised on Promises; and 3 Stars’ #ultrafresh.
________________
On the second Monday morning in April, Ben Evans was working on the production floor of Hellbender Brewing, doing what he usually does where he usually does it, when he found himself in the company of a rather unusual guest.
It wasn’t a stranger per se, although the two had never met or even heard the sound of each other’s voices. It was more of a pen pal – someone the Hellbender brewer had been trading e-mails with since November. Now, six months and a 4000-mile trip later, the correspondent was standing in his Riggs Park brewery. A stout figure with hair fading to grey, the man looked just like the pixelated images Evans had seen on the internet, but he introduced himself anyway: He was Alexis Briol, Directeur de Production at Brasserie St. Feuillien.
The European brewmaster had just traveled all the way from Hainaut, a French-speaking province of Belgium that’s been home to St. Feuillien for 144 years. And he was thirsty. So, with pleasantries out of the way, Evans led Briol into Hellbender’s otherwise vacant tasting room and began pouring him beer.
From kölsch to red ale to saison, the two gradually worked through samples of Hellbender’s line-up until arriving at one last beer: a dry-hopped tripel called Days Gone By.
This was the beer that had been the subject of all those e-mails – a beer with a recipe formulated and refined over six weeks of transatlantic messages.
This was the moment that Evans had been fretting about for months – the moment he would serve the final product of that long-distance collaboration to a brewer who produces one of the world’s iconic takes on the style.
“I was definitely nervous,” Evans says. “It was the first time he’d be trying our tripel.”
As the two sipped on the bright yellow ale, Evans waited for a reaction, but an avalanche of feedback would not be forthcoming. This had nothing to do with the beer, though, and everything to do with a language barrier: Evans doesn’t speak French, and Briol’s English is more functional than polished.
“The whole American beer nerd descriptor thing – like, talking about the nose and the bouquet and stuff – didn’t really happen,” Evans recalls. “I have no doubt that Alexis could have waxed philosophic about aromas and flavors forever in French, but when he was trying to explain it to me, it was just: ‘This beer is very good.’”
Through such unadorned words and reading the Belgian brewmaster’s facial expressions, Evans slowly gained confidence that his counterpart was indeed satisfied with their tripel. The two had accomplished what they set out to do: marry a traditional Belgian style with the hops and hopping techniques of the United States.
That this happened to have been accomplished using a Meura 2001 mash filter, well, that was no coincidence.
________________
When Ben Evans heard that the Crafter Brewers Conference would be coming to DC in 2017, he admits that the thought did cross his mind.
“Knowing that all of these Belgian breweries would be in town and that most of them have a mash filter system,” he says, “I was hoping something cool might happen.”
Cool things tend to happen when Crafter Brewers Conference (or “CBC”) arrives in your city, especially if you’re a local brewery. While the annual gathering of over 13,000 industry participants is basically a massive trade show crossed with a flurry of seminars and workshops, it also serves as a showcase for the host city’s beer scene. And one way that big, out-of-town breweries participate in that celebration is by brewing collaboration beers at local breweries. That’s why an American craft beer titan like Stone Brewing ends up making beers with Right Proper and DC Brau.
“It’s nice to drink beers brewed by local brewers at an event like CBC,” says Firestone Walker Brewmaster Matt Brynildson. “It’s important that those brewers are showcased. We’re trying to promote the region as much as we are a trade show and technical events.”
Firestone Walker was in on the fun this year, too. The Paso Robles brewery – and member of the Duvel Moortgat family – teamed with DC Brau to make a pale ale called Green Card. The two breweries didn’t really know each other but had been brought together by Hop Head Farms, a company seeking to spotlight new hop varietals grown in Michigan and imported from Germany. That’s another impetus behind some CBC collaborations: They can serve as vehicles to help agricultural producers or equipment manufacturers pitch their wares. Never tried the Cashmere hop? Well, take a sip of this.
And as everyone got asked to the dance, Hellbender was uniquely situated for something cool on account of those mash filter systems that Evans mentions.
To take a step back, a mash filter system is a piece of brewing equipment that separates wort (the sugary, tea-like liquid that will eventually be hopped, fermented, and turned into beer) from spent grain (the remnants of malt leftover from extracting those sugars and proteins) using a series of filter plates. For a deeper look into how such a system differs from a traditional lauter tun, revisit our Tap Takeover: Hellbender, but for the purposes of this story, there are three things to note.
First, a mash filter system allows a brewery to use higher percentages of unmalted or dehusked grains like oats and wheat without fear of a “stuck mash.” This means it can produce fuller-bodied beers with flavors from their grains that other breweries are simply unable to unlock.
Second, a brewery with this type of system can mill any of its grains down to a fine, flour-like powder, which translates to a more efficient starch-to-sugar conversion. Greater efficiency means using less grain and water per batch, and that’s both an economic and an environmental perk.
And, lastly, only a handful of breweries in the U.S currently have these systems – and one of them is Hellbender. Early in its planning stages, the two-and-a-half-year-old brewery had decided to take advantage of a new, smaller model of the system that a company called Meura (in coordination with Wisconsin’s Aegir Brewing Systems) had recently unveiled with nascent craft breweries like Hellbender in mind.
Over in Belgium, however, it’s an entirely different landscape. That’s where Meura developed the technology over 125 years ago, and it’s where institutional breweries like De Koninck and Rodenbach have long used mash filter systems ten to twenty times larger than Hellbender’s.
So, when CBC landed in DC, it was only natural for Meura to play matchmaker. After all, how often does CBC land in a city with a mash filter system? And what better way to show it off than a splashy beer?
In late fall, Evans got an e-mail from the equipment manufacturer telling him to expect a message from a Belgian brewery. Hellbender would indeed have some CBC good fortune: It would be brewing a beer with one of most prestigious practitioners of the mash filter system, Brasserie St. Feuillien.
“You had this nearly 150-year-old brewery in Belgium reaching out to a DC brewery that, at the time, was just about two-years-old,” the head brewer observes. “That’s pretty cool.”
________________
After Hellbender committed to brewing with St. Feuillien, some education was in order.
“The first thing I learned was how to properly pronounce it,” Evans shares. “I think I had always said Foo-ellen.”
Pronounced Foo-yen, “Feuillien” derives from the name of a 7th century Irish monk called Foylan who met a gruesome end in the village of Le Roeulx. Although he was never officially canonized, locals erected a chapel to honor his martyrdom, and later built another, bigger one on that same ground in 1125: the Premonstratensian Abbey St-Feuillien du Roeulx. At some point, this abbey began producing beer, a tradition – and source of income – that it would foster until the killjoys of the French Revolution destroyed the property 1796.
Almost a century later, the village’s brewing legacy was resurrected by Stephanie Friart, who founded the Brasserie Friart on the outskirts of Le Roueulx in 1873. For four generations, this brewery has stayed in the Friart family, most recently coming under the control of Stephanie Friart’s great-grandniece Dominique in 1980. During that time, it has accrued international renown for its abbey ales, most notably the St. Feuillien Blonde, St. Feuillien Cuvée De Noël, St. Feuillien Saison, and the big, bready St. Feuillien Tripel. (It wasn’t until 2000 that Brasserie Friart officially adopted the name of its St. Feuillien series.)
“Dominique and St. Feuillien have been giant champions of traditional Belgian styles,” says Dean Myers, beer director at Brasserie Beck, who cites St. Feuillien Saison as his gateway into a career of Belgian beer. “Amongst this explosion of craft popularity, it’s really encouraging to see a brewery that’s devoted to its traditional beers. They’re not adding fruit to their beers. They’re doing Belgian beer the way that it used to be done.”
It would be a mistake, however, to characterize St. Feuillien as a staid operation. Over the past decade, Dominique Friart has overseen a period of significant investment, most notably by partnering with Meura in 2012 to install a state-of-the-art automated brewhouse with, of course, a shiny new mash filter system.
“I’ve long been inspired by Dominique Friart,” says Drew McCcormick, the Executive Beverage Director of Pizzeria Paradiso. “It’s personally motivating to see women in leadership roles in the beer industry – and a female brewmaster who has been at it for so long!”
While Friart’s brewery has remained committed to its Belgian classics, it also hasn’t been afraid to experiment outside of them. In 2010, St. Feuillien teamed with California’s Green Flash to brew a Belgian strong golden ale that combined Belgian yeast and spices with American Amarillo hops. It was called Bière De L’Amitié – or, “friendship brew.” Since then, that friendship has blossomed into a full-blown business relationship. Three years ago, the breweries announced a partnership whereby St. Feuillien would produce and sell the Green Flash’s West Coast IPA across Europe. They also collaborated on an initial version of the Belgian Coast IPA, a light-bodied, hoppy hybrid of Belgian and American styles that has turned into a St. Feuillien flagship.
“IPA is not a style traditionally brewed in Belgium, but as the proliferation of hops in flavoring beers spreads across the world, eventually you’ll see people start to play with the style,” observes Myers, whose restaurant hosted a St. Feuillien event during CBC. “It’s really been interesting to see Alexis do some of these things. From talking with him, it’s not that he needs inspiration or reinvigoration, but it keeps him on his toes.”
Given this history, it makes sense that Briol would want to continue the interpolation of American hops into Belgian classics with Hellbender. All they had to do was nail down a recipe. Of course, that’s easier said than done.
________________
________________
For over a week, I tried to get Alexis Briol’s attention. I was hoping to talk with him about Days Gone By. A telephone conversation would have been great. Some question and answer over e-mail would have done the trick. I even would have settled for a generic statement or two.
Eventually, I received an e-mail from the St. Feuillien brewmaster with the subject line: “Some details – Hellbender St-Feuillien ‘Days Gone By’ collab.” It wasn’t really a response to my message so much as a standalone fact sheet for the beer. “Please find here some details about the beer,” he wrote.
Yeast: Belgian abbey beer yeast
OG/FG: 18,8 °P / 2,2 °P
Alcohol: 8,8 % ABV
Bitterness: 42 IBU
Malt: Pilsen (mainly)
Sugar: Cane sugar (some)
Hops…
Bitterness: Millenium
Aroma : Sterling / Citra / Amarillo / Spice?
Dry-hopping : Azacca/ Idaho
I had to chuckle at “Spice?” Belgian brewers are notoriously secretive about what spices – if any – they use to accentuate the spicy yeast character of their rustic ales. And as Jeff Alworth writes in The Beer Bible: “Breweries like St. Feuillien use [spices] so skillfully in their ales that it is difficult to tell which element of the spicy flavor comes from the yeast and which comes from actual spicing.”
Putting aside the possible existence of a mystery spice, these ingredients added up to a style that Briol called a “Tripel IPA hybrid.”
In his initial e-mails to Evans, the Belgian brewmaster had pitched the idea of a Belgian ale with an American twist, but declined to spitball any particular styles.
“In my mind, I really wanted to defer to his expertise and have this beer be more of a learning experience on our end,” says Evans, who prodded Briol to suggest some base recipe ideas.
Briol sent back two. One was a grisette – a well-hopped, low-ABV farmhouse ale – brewed with an array of specialty grains that would showcase what the Meura mash filter system could handle. The other was a tripel – a light-colored but boozy ale from the monastic tradition – brewed with next-generation American varietals.
Evans mulled these options with Hellbender co-founder Patrick Mullane (who is currently overseeing Hellbender’s new self-distribution model) and brewer Joe Miller. While the multigrain grisette was intriguing, the DC brewery worried it might be too similar to its flagship Souther Torrent Saison, which is also a sessionable farmhouse ale brewed with a healthy amount of wheat. So, Hellbender opted for the more formidable tripel.
The decision presented a double-edged sword of sorts. On one hand, Evans would get to tap the mind of the brewmaster responsible for one of the world’s best tripels. On the other, there would be a direct point of comparison to that same tripel, and the brewmaster responsible for it would be crossing the Atlantic to taste the results himself.
“We’re very anxious to see what they think about this beer,” Evans told me a few weeks before CBC. “At the same time, it gave us a lot of confidence having Alexis put together a base recipe that he was confident in. There wasn’t really a whole lot we could screw up if we followed his extremely detailed methodology. It was very cool to see how they do it. We just had to get the right yeast pitch, make sure there was healthy fermentation, and then stick the dry-hopping.”
Briol and Evans would trade e-mails about the recipe for over a month and a half. The communication was hardly seamless. The Belgian brewmaster would pepper his feedback and instructions with French terms, which left Evans scrambling for Google.
“I sort of had to figure some stuff out,” the DC brewer says with a laugh.
This wasn’t new territory for Evans. Coming to brewing from a background in neuroscience and microbiology research, he was used to such barriers.
“For most of my colleagues, English was their second language,” he shares. “Having been an English minor and done a lot of writing, I would assist them with their proposals and papers.”
Calibrating the recipe for Days Gone By, it helped that at least both Hellbender and St. Feuillien’s systems spoke the same language.
“For the first time in two-and-a-half years, we saw another brewery using Centigrade instead of Fahrenheit,” Evans say. “Our American manufacturers had decided when they built around a Belgian piece of equipment to program everything as liters and Celsius.”
On paper, the recipe in Briol’s e-mail reads simply enough. 100% Pilsen malt. Some sugar. Abbey ale yeast. But unlocking the flavors is in these ingredients is about process.
“The base recipe that he put together included water chemistry and all of the step mash process and fermentation temperatures,” Evans says. “It’s all very important for getting the right body and flavor out of a malt like pilsen. That was where I wanted to defer to his expertise 100%.”
________________
St. Feuillien doesn’t run up much of a water bill.
The Belgian brewery draw its own H20 from a well within its building, reaching down some 215 feet to a creek beneath them. There, water is naturally filtered by the bedrock, imbuing the liquid with calcium and magnesium ions, and a “hard” character.
Water chemistry is not something that the average beer drinker talks about, but it has a big effect on a beer’s mouthfeel and what flavors are most pronounced. An Irish stout, for example, is brewed with hard water, which gives it an immediately recognizable chalky character and accentuates the malt’s roast. By contrast, lighter beers like Kolsch or Czech Pilsner tend to be brewed with soft water.
When it comes to traditional styles, a beer’s water chemistry is often adjusted to match the characteristics of the city where it was historically produced. Logically, then, producing a tripel with St. Feuillien meant mimicking the hard water of Le Roeulx.
“We definitely added a lot of hardness in this recipe,” says Evans, although he can’t completely explain why. “A lot of it was blind faith in the Belgians more than anything else. We know that these guys are making great beer, and at the end of the day, I went into this admitting that this guy knows a hell of a lot more than me, and I wanted to learn something from him.”
In a hoppy beer, hard water rounds out the bitterness and boosts the hops’ aromatic characteristics, which is important when the goal is to make a “tripel IPA.” But where exactly in the brewing process those hops would be added was the subject of debate between Hellbender and St. Feuillien.
“I liked the way that they introduced the hops, but they were a little high on the bittering hops and a little low on the flavor and aroma hops,” Evans recalls.
This taps into a larger discussion going on in craft brewing: how to calculate bitterness levels. Specifically, the debate breaks down over whether hops added in the whirlpool for flavor and aroma should be counted towards a beer’s IBU levels. Hellbender says yes.
“We count whirlpool additions as being nearly fully isomerized, so it’s really like a 15-minute boil addition because the wort is still incredibly hot and the hops are swirling around in it,” Evans explains. “The old school method was to say, ‘Oh that’s all zero IBUs.’ But those hops are adding a lot of bittering. You could make a beer that’s calculated on a normal calculator at 40 IBUs, but if you don’t count the whirlpool hops, it might actually be 80.”
Knowing that St. Feuillien wanted to produce a tripel around 40 IBUs, Hellbender dropped down the initial recipe’s bittering hops, and added more to the whirpool and dry-hopping phases.
“They may or may not learn anything from our dry-hopping and whirlpool methods,” Evans told me a few weeks ago. “No matter what, you need a nice bittering backbone in one of these things.”
In traditional Belgian tripels, that bittering backbone often comes from spicy, earthy German and Czech hops like Hallertau and Saaz.
“I don’t think I’ve ever seen as many beers with Saaz hops as when I went to Belgium,” says Evans, who took a trip to Europe with Mullane a few years back to see larger mash filter systems in action. “And the Belgians have to use massive amounts of them because those hops don’t have very many alpha acids”
Days Gone By, on the other hand, would serve to showcase the bright, citrusy hops of the Pacific Northwest. The selection of those particular hops fell to Hellbender.
In the boil, Evans and Miller opted to use Citra, Amarillo, and Sterling. And while they had initially planned to use Citra again – along with Mandarina Bavaria – in the dry-hop, they changed course to two newer peachy, tropical cultivars that would complement the citrusy character of the boil.
The first is Idaho 7, a pungent and increasingly popular experimental variety grown by Jackson Hop Farm in Wilder, Idaho.
“Opening a bag of hops, I don’t think I’ve ever had a stronger smelling experience than with Idaho 7,” Evans. “It’s got a lot of dankness but also fruity notes and tropical components to it. It goes a long way in dry-hopping because of how incredibly aromatic it is.”
The other hop, Azacca, is comparatively more subdued.
“Azacca is not as potent of an aroma hop as a lot of people tout it as,” Evans continues. “It’s got some nice, subtle tropical fruit flavors and some stone fruit character, too.”
Hellbender didn’t have much experience brewing with either hop, so Evans and Miller made a one-off double IPA called Hello, Goodbye to experiment with Idaho 7. The resulting brew was so aromatic that Hellbender decided to use less of it – and more Azacca – in Days Gone By.
“We loved the flavors but it came out strong, and we didn’t want it overwhelm the Belgian yeast strain,” Evans shares. “We didn’t want the dry-hops to be the focus of the entire beer after we had worked so hard on all the other stuff.”
When it comes to tripels – even a “tripel IPA hyrid” – there’s no mistaking that a good yeast strain is the star of the show.
________________
________________
Collaborating with Hellbender, Alexis Briol was an open book – to a point.
That point was the specific yeast strain that St. Feuillien uses to ferment its tripel.
Mash rest procedures, water chemistry, fermentation procedures – these things were all fair game. But when Evans floated the idea of borrowing St. Feuillien’s yeast for this beer, he received a polite “no thank you.”
“I offered to grow up a quantity of their yeast if they sent to us via the mail,” the Hellbender brewer recalls. “He just pointed us in the direction of an existing abbey ale yeast strain from White Labs.”
Picking the right yeast was paramount. Some abbey yeasts produce esters that taste like apples, pears, and honey. Others lean towards phenolic flavors like clove and smoky aromas.
“We really wanted a recommendation because we didn’t want any phenolics in this beer,” Evans says. “We just wanted it to be very estery – something that would complement the American hops we were using.”
Hellbender sought to amplify the fruity characteristics of its abbey ale yeast by open fermenting the beer. In an open fermenter, a yeast strain is under significantly less pressure, allowing it produce more expressive flavors.
“Yeast is a microorganism,” brewing scientist Jasper Akerboom explained last year. “It breathes just like us. It need access to oxygen, especially in the beginning of fermentation, to promote cell growth. Now, imagine if you have a conical fermenter – a good old fermentation tank with a pointy bottom. Yeast can do its job in there, but there’s no real access to oxygen. It works, but the aromas and the flavors are not as nice because the yeast is under more stress than if it were in an open fermenter.”
The challenge for Hellbender was that its open fermenter isn’t nearly as hi-tech as its regular tanks. There’s no feedback loop. It’s just glycol chilled. So, as the beer was fermenting, Evans was left to monitor the temperature and hope for the best.
“We pitched at a fairly warm room temperature and let it free rise up to very hot,” explains the head brewer. “Alexis had a very specific ramp that St. Feuillien does, and we just lucked out that the beer hit all the temperatures that it was supposed to hit, otherwise, I’d be fiddling with the jackets, turning them on or off, and checking the probe. We’ve done that before with other beers, but I’d be fretting over it all the time.”
Since open fermentation enables a yeast to be more active, it also produces a drier beer. And from the kölsch to the coffee stout, a lack of residual sugar is the hallmark of a Hellbender beer.
“I generally don’t like a beer where ‘sweet’ is a descriptor,” Evans says. “With this beer, I wanted the estery aromatics to trick your pallet into thinking the beer would taste sweet but then have it finish dry. All my favorite tripels finish on the drier end.”
As a result, there’s a bit of trickery in the booziness of the beer, too. Tasting Days Gone By, there is no way you would peg it at 8.8%. As with all tripels, that ABV was boosted by the addition of sugar early in the boil.
“In a beer like this, the sugar completely ferments out,” explains Evans. “It doesn’t add any flavor. It just lightens up the beer and adds alcohol without adding body. You end up with this really dry, crisp, refreshing beer. That makes it a little dangerous too, because it drinks like a session Belgian pale ale and you don’t really notice how big it is.”
For the last notable ingredient of Days Gone By, we return to our old friend “Spice?” While the spices of the St. Feuillien Tripel remain shrouded in mystery, we know that Days Gone By contains coriander purchased down the street from Hellbender at an Indian market. Added during the boil, this spice complements the citrus character of the hops and abbey ale yeast.
“Indian coriander is intensely aromatic and citrusy, and a little spicy,” Evans says. “It was made for beer. In comparison, European coriander is a little dull – it’s a background spice for meat.”
Per Briol’s instructions, Hellbender exercised a gentle hand when adding the coriander. In fact, Hellbender recently used more in a 5-barrel batch of witbier than each 19-barrel half-batch of the Days Gone By.
“What’s crazy is that it still came through,” Evan remarks. “When I taste the beer, I can pick up that coriander.”
Never doubt a Belgian when it comes to spices.
________________
________________
On the fourth and final night of CBC, Brasserie Beck hosted Alexis Briol for a St. Feuillien tap takeover.
Beer Director Dean Myers had planned for Briol to say a few words to the crowd and then wander from table to table, mingling and conversing with guests. The last part never happened.
“It was very interesting to see how popular he was with younger brewers at the end of our bar,” Myers relays. “He kind of just got trapped. Even at CBC, where everything is American craft focused, all I kept hearing all night was, ‘Oh the Belgians, they know how do it right.’”
Ben Evans was in attendance, too. It was his 35th birthday, and he and his wife were having a nice Belgian dinner to celebrate.
When Briol spoke to the crowd, he addressed Evans as talk turned to Days Gone By.
“He said, ‘We made an excellent beer, but of course we did, we’re two very good brewers with very good brewing systems,’” Evans shares. “It was kind of cool. He seemed happy with the beer. He called it a true marriage of American and Belgian beers while still being true to the traditional tripel style in a lot of ways.”
Drew McCormick, who was one of the first to serve the beer at the Dupont Pizzeria Paradiso, has similar praise for this synthesis. | https://brightestyoungthings.com/articles/freshly-tapped-days-gone-by |
Mash for 60 minutes at 154°F (68°C). Boil for 75 minutes. Chill to 65°F (18°C) and pitch the yeast. Ferment at 68°F (20°C) until final gravity is reached.
For the cold-brew addition, combine 4 oz (113 g) of medium-roast coffee (medium-coarse ground) with 32 fl oz (946 ml) of filtered water at room temperature for 48 hours. Strain the brewed coffee into the beer post-fermentation, during conditioning.
BREWER’S NOTES
Our A30 Corporate yeast strain is banked at Imperial Yeast in Portland, Oregon. It’s a publicly available strain, by request. The original strain is Siebel BRY96. If you can’t get your hands on A30 Corporate or Siebel BRY96, Safale US 05 is another alternative.
From coffee and spices to chiles and fruit, Craft Beer &Brewing Magazine®’s online class Adding Flavors to Beer shows you how to complement malt and hops with flavors that flagrantly violate the Reinheitsgebot. Sign up today! | https://beerandbrewing.com/cloudburst-brewing-s-boom-roasted-coffee-porter/ |
I've been drinking more and more Saisons lately and telling myself that I really needed to brew one of my own for quite some time.
Well, I brewed a "winter" (black) saison back in February, but never really a "traditional" Saison style beer. By the summer of 2014, I knew I finally had to get one done.
Just as with the Arctic Vortex, I decided to stay away from spices and fruit, allowing the spicy saaz hops and the wonderful flavors and aromas from the French saison yeast shine through unadulterated. I also am trying to keep the alcohol on the low side of the style.
About the name (Hail Storm): Summers in Colorado are wonderful, but way too often we get way too many hail storms. Just as I used a weather phenomenon (Arctic Vortex) for my winter Saison, I decided to use the Hail Storm for my summer Saison. Not sure what I'll use for Autumn.
For more specifically about this beer see Sheppy's Blog: Hail Storm.
Make a 1500ml starter of the yeast the day before brew day to make sure it is active going into fermentation.
6g gypsum, 3g chalk to get the water Calcium up above 100 ppm.
Pitch a little below 65 degrees. Try to keep it there for the first 12 hours or so, but let rise as it wants after that.
Bought ingredients yesterday. Made starter today. Brewing tomorrow.
Still have Kraussen. Yesterday,moved from basement to main level of house for warmer temperatures. 77 degrees now.
Been sitting warm for about a week. Should keg today.
Kegged Sunday 7/22. Sitting in beer fridge right now.
Still drinking, but it should be gone soon. Need to brew the autumn saison. | http://www.sheppybrew.com/recipes/recipe.aspx?id=92 |
Born about twenty years ago, Rince Cochon beer was formerly produced by the brewer SBA, in Annoeulin, France. Since 2010, the light ale is brewed by Haacht, Belgium and meets a great success in Europe and in United States.
Made from water, malt, hops, barley and yeast, Rince-Cochon is a high fermentation beer typical of northern France and Belgium. It is sweet and slightly golden, but with a high alcohol level: 8.5% vol.
This specialty beer has aromas of fine malty aromas and slightly sweet flavors, giving it a rich and complex taste. | https://www.bienmanger.com/2R2369_Rince_Cochon_Products.html |
An extremely popular strain used for a broad spectrum of lager styles. Works happily at lager fermentation temperatures to produce clean aromas and flavours, that emphasise the malt and hop characters of the beer. This strain will also cope with slightly warmer fermentation temperatures, for the Californian Common style.
Ingredients: Brewing Yeast
Net Weight: 10g
Program: Lager
Or if using Custom Program: | https://brewart.com/us/store/ingredients/yeasts/yeast-7 |
American independent cinema has been an important creative and cultural media entity for the past fifteen years. The approach of this sector is one of cultural construction that simultaneously provides a socio-political reference through which critics and audience can attach certain films to popular movements and ideas. Declarations of Independence questions the supposed autonomy of this cinema and asks if independent film can possibly survive in the face of the mass-production and profit of Hollywood. Berra’s text presents the reader with a unique structural approach to the subject matter with his arguments mirroring the actual film production process. He gives detailed insight into the core product with reference to specific films and studies of audiences and their enthusiasm for this type of alternative media. American Independent cinema continues to grow as a fashionable scene and Declarations of Independence analyses its popularity, economic viability and the production process of so-called ‘niche’ cinema. Berra uses directors such as Quentin Tarantino and Steven Soderberg as examples of those who have crossed successfully into the cultural mainstream, altering media and public perception. This comprehensive book is a useful resource for scholars as it gives an overview of the industry from conception of a film right though to festival exposure and public consumption. Berra also presents a strong academic argument and places the discussion of this increasingly popular genre within a wider socio-political context.
John Berra is a lecturer in Film and Language Studies at Renmin University of China. He is the author of Declarations of Independence: American Cinema and the Partiality of Independent Production (2008); editor of the Directory of World Cinema: American Independent volumes 1, 2 and 3; editor of the Directory of World Cinema:Japan volumes 1, 2 and 3; co-editor of World Film Locations: Beijing (2012) and World Film Locations: Shanghai (2014); and co-editor of the East Asian Journal of Popular Culture. He has also contributed to Electric Shadows: A Century of Chinese Cinema (2014). He is also a contributor to magazines, including Electric Sheep and Film International. | https://www.intellectbooks.com/declarations-of-independence |
Physiological models of performance for scleractinian corals
Hoogenboom, Mia O. (2008) Physiological models of performance for scleractinian corals. PhD thesis, James Cook University.
|
PDF (Thesis front)
|
Download (232kB)
|
PDF (Thesis whole)
|
Download (2MB)
Abstract
A fundamental objective of ecology is to evaluate the conditions that permit different species to survive and reproduce, that is, to identify each species’ ‘niche’. The overarching aim of this thesis was to identify and quantify the primary processes that influence the distribution and abundance of reef-building, scleractinian corals. My general approach was to develop and calibrate process-based models that link physiology to environmental conditions, and quantify ecological performance as a function of physiology.
Light intensity is a fundamental determinant of coral performance. For several photosynthetic taxa exposure to high light levels causes a decline in daily carbon gain. In this thesis I first investigated whether this phenomenon (i.e. photoinhibition) had energetic consequences for coral symbioses. Surprisingly, results demonstrated that costs of photoinhibition are negligible under short-term exposure to high irradiance (Chapter 2). I subsequently investigated whether costs of photoinhibition manifest over a longer time-period due to changes in the photosynthetic apparatus that arise during photoacclimation to high light intensities (Chapter 3). Analyses revealed that repeated exposure to high light intensity causes changes in the photosynthetic machinery such that high-light habitats do not provide maximal energy acquisition. In fact, I found evidence of a strong reduction in energy available for growth and reproduction for corals growing under high light.
Corals potentially avoid costs of excessive light exposure by altering colony morphology. Previously, no framework has been available that allowed comparison of energy acquisition for multiple, complex coral morphologies, in response to varying light conditions, while taking into account the flexibility in coral photophysiology. Using a novel, three-dimensional geometric model of light capture in combination with a comprehensive photosynthesis dataset, in Chapter 4 I demonstrate that morphological plasticity maximizes the amount of energy corals have available for growth and reproduction. In addition, results showed that variation in morphology is most important at niche boundaries whereas physiological flexibility is important in intermediate habitats.
In addition to light intensity, water flow velocity varies markedly between reef habitats and has a strong influence on coral metabolism. In this thesis, I built on existing models of gas exchange to incorporate the effects of light intensity, flow velocity and colony size into a single model (Chapter 5). Analysis of this model showed that the branching coral Acropora nasuta has a positive energy balance over a wider range of conditions than both a massive (Leptoria phrygia) and a foliose species (Montipora foliosa). Moreover, colony size was revealed as having a strong influence on niche width: large colonies of all three species had a positive energy balance over a broader range of conditions than small colonies.
The overarching aim of my thesis was to evaluate the performance of corals in response to environmental gradients. This work quantifies the mechanisms through which light and flow influence coral physiology. Model predictions were strongly correlated with observed tissue biomass and reproductive output. In addition, an optimality model based on morphology-specific energy acquisition as a function of the ambient light-regime, adequately captured observed variation in colony shape across a depth gradient. Overall, this thesis provides new insight into the processes underlying the habitat distributions of reef-building corals, achieved by quantifying environmental effects on physiology and integrating these effects into an energy-budget framework.
|Item ID:||8189|
|Item Type:||Thesis (PhD)|
|Keywords:||coral reef ecology, light intensity, photoinhibition, coral reef habitats, coral metabolism, scleractinian corals, coral morphology|
|Additional Information:||
|
Chapter 4 has been published in Ecology. Copyright by the Ecological Society of America. Citation: Mia O. Hoogenboom, Sean R. Connolly (2009) Defining fundamental niche dimensions of corals: synergistic effects of colony size, light, and flow. Ecology: Vol. 90, No. 3, pp. 767-780.; 2. | https://researchonline.jcu.edu.au/8189/ |
Score distribution:
-
Positive: 5 out of 6
-
Mixed: 1 out of 6
-
Negative: 0 out of 6
-
Jun 25, 2018I realize that visual novels have a hard time getting the attention of anyone outside of a very specific niche, so raving about VA-11 HALL-A probably won’t mean much to most. At the same time, however, if any visual novel could appeal to people who don’t usually have time for the genre, it’s this one. It’s an innovative approach to a genre that too easily falls into ruts, and it’s well worth the time of anyone looking for something a little different.
-
Nov 22, 2017VA-11 HALL-A is a brilliant point and drink adventure game with memorable characters, a superb soundtrack, and some of the best writing out there that has found a new home on the Vita.
-
Dec 4, 2017VA-11 HALL-A should be a must-buy for indie lovers and VN junkies alike.
-
May 15, 2019VA-11 HALL-A is a very good visual novel, with strong themes, despite some problems due to its genre. If you like reading, VA-AA HALL-A is a must have.
-
Dec 15, 2017VA-11 HALL-A is a game best enjoyed in short bursts, when a player wants to relax with a title that makes few demands and offers pleasant company. Though it lacks the dramatic heft to propel it into the upper tiers of videogame storytelling, it doesn’t really aspire for such lofty goals and avoids the pretension that such titles occasionally evince. Much like a comfy bar in real life, it’s a good place to visit, but no one needs to stay for long.
-
Playstation Official Magazine UKJun 5, 2018The lack of an engaging drama or choice means this one isn't so much a digital page-turner but best enjoyed at your leisure, ideally with a nice cool drink to hand. [Issue#150, p.88]
Score distribution: | https://www.metacritic.com/game/playstation-vita/va-11-hall-a |
Kevin Gifford: What do you think a comic needs in order to deserve being called "manga"? Do you consider the professional work you produce to be manga?
Lindsay Cibos: This is tricky to define, since manga is not just one particular style of art, or a particular type of story genre, but instead a full spectrum of genres and art styles that differ greatly from one creator's work to the next, making it difficult to pinpoint just what makes manga a manga. Is it the unique panel layouts, the black-and-white line art coupled with screen tone, a fluid and detailed inking style, the amount of dialogue on a page, story pacing, art style, camera angles, backgrounds (or lack thereof in some cases)? A black-and-white comic alone probably isn't enough to be a manga, even if it has screen tone and characters popping out of panels, but if it has a careful balance of all the above, with, most importantly, a strong influence of Japanese comics, then chances are that it can be called manga.
Purists might argue that to be considered manga, a comic needs to have been created by specifically a Japanese artist born in Japan to be considered manga, and given its primary meaning, "Japanese comics" they're partially correct.
However, if you think of manga as an amalgam of Japanese stylistic sensibilities, there's no reason why one's ethnicity and origin should define whether or not a particular work is manga, so long as the creator can capture the qualities and spirit of manga.
I use the words "manga", "graphic novel", "sequential art" and "comic" interchangeably to describe Peach Fuzz, and whether or not an individual considers it manga is less important than whether or not they find the book to be an enjoyable read. Still, when it comes down to it, I grew up being far more influenced by manga then by traditional American comics, and these influences materialize in the comics I create, making Peach Fuzz more manga than anything else.
KG: Do you see yourself in competition with Japan-produced comics, or do you see yourselves as all in the same boat -- or something different altogether?
LC: Considering how limited shelf space still is in the graphic novel/manga section of bookstores and comic book stores, I see myself in competition with all comics, not just ones produced by Japanese artists. I guess in that way, I do consider all creators to be in the same boat. On the other hand, due to a lingering bias towards Western-produced manga, it's difficult to even get carried in stores and then accepted by manga fans, giving Japanese-produced manga the advantage.
KG: Do you see any reader bias against your professional work because you aren't from Japan, or because your work stars Americans living in the U.S. dealing with commonly American issues?
LC: I don't see any bias towards Peach Fuzz specifically because of its decidedly American setting and cast of characters. There are plenty of manga that aren't set in Japan or centered around Japanese culture, and in fact having a unique story and an American setting helps set it apart from the rest of the crowd.
However, there definitely still is a lot of bias from readers towards work produced by non-Japanese creators, though I hope that this will change as time goes on and more and more quality manga are produced outside of Japan. Just as manhwa (Korean comics) were faced with a similar bias when they first hit the American marketplace, but achieved a general acceptance as more were released over a period of time, I expect the same will happen for Western manga. In the meantime though, it's going to be an uphill climb for Western creators seeking acceptance.
KG: How do you think Western manga will expand in the future? Do you think it could take a significant chunk from sales of more traditional U.S. comics, or will it continue to be a niche marketplace?
LC: As more creators are influenced by manga, and companies continue to support them, and as long as manga fans embrace them, we should continue to see more Western manga titles. And that's a good thing, because there are plenty of talented Western creators who have worthwhile stories to tell.
Manga's popularity, and more importantly sales, may eventually play a major role in how American comic companies view the industry. We've already seen both major players in the American comic industry take tentative steps to try to pull in fans of manga.
As far as manga taking over the industry, probably not. The American comic companies have a tried-and-true formula that has stood the test of time as well as evolved to suit the needs of its key audience, generation after generation. I don't think manga is pulling fans away from traditional American comic so much as it's giving people who didn't previously have comics that appealed to them something to read.
|
|
|
|
Copyright © 2010 Jared Hodges & Lindsay Cibos. All rights reserved. Distribution or reuse in any form is prohibited without prior arrangement. | http://jaredandlindsay.com/interview-newtype.html |
Gartner is beginning the research process for the 2014 Magic Quadrant for Application Performance Monitoring. Will Cappelli and myself will be running the research as we have for the last few years. The release is currently planned for the 4th quarter of 2014, and we will be sending out surveys to vendors next week. Based on the data below, if you believe you qualify for the research please get in touch with myself via email or Twitter (@jkowall):
The 2013 Magic Quadrant saw minor changes around the weighting and importance of analytics and mobile. The 2014 research once again sees importance in these two critical trends, but also a focusing on SaaS delivery being essential as enterprises continue to adopt various public cloud delivered applications, services, and infrastructure.
Market Definition Is Unchanged
In the 2014 Magic Quadrant, the market definition will remain unchanged from the 2013 version (see “Magic Quadrant for Application Performance Monitoring”). While we have made changes in the application definition. Gartner defines an application as a software program or group of programs that interact with their environment via defined interfaces and which are designed to perform a specific range of functions. They may be end user facing, presenting a user interface, or provide the interface between two applications themselves. Applications are not (normally) wholly independent as they typically require an operating system or multiple operating system instances to manage their use of physical and logical computing, storage and network resources within a data center, or provided by 3rd parties.
Gartner defines APM as having five dimensions of functionality:
- End-user experience monitoring (EUM) — The capture of data about how end-to-end latency, execution correctness and quality appear to the real user of the application. Secondary focus on application availability may be accomplished by synthetic transactions simulating the end user.
- Application topology discovery and visualization — The discovery of the software and hardware infrastructure components involved in application execution, and the array of possible paths across which these components communicate to deliver the application.
- User-defined transaction profiling — The tracing of user-grouped events, which comprise a transaction as they occur within the application as they interact with components discovered in the second dimension; this is generated in response to a user’s request to the application.
- Application component deep dive — The fine-grained monitoring of resources consumed and events occurring within the components discovered in application topology discovery and visualization dimension. This includes server-side components of software being executed.
- IT operations analytics — The combination or usage of techniques, including complex operations event processing, statistical pattern discovery and recognition, unstructured text indexing, search and inference, topological analysis, and multidimensional database search and analysis to discover meaningful and actionable patterns in the typically large datasets generated by the first four dimensions of APM. Additionally these data sets are increasingly being analyzed for not only operational information, but business and software analytics.
Inclusion Criteria
Vendors will be required to meet the following criteria to be considered for the 2014 APM Magic Quadrant. In comparison to 2013, we have adjusted numerical thresholds.
■ The vendor’s APM product must include all five dimensions of APM (EUM, application topology discovery and visualization, user-defined transaction profiling, application component deep dive, and IT operations analytics). The deep-dive monitoring capabilities must include Java and .NET, but also may include one or more key application component types (e.g., database, application server). The solution must include user-defined transaction profiling, IT operations analytics technologies applied to text and metrics collected by the other four dimensions.
■ The APM product must provide compiled Java and .NET code instrumentation in a production environment.
■ Customer references must be located in at least three of the following geographic locations: North America, South America, EMEA, the Asia/Pacific region and/or Japan.
■ The vendor should have at least 50 customers that use its APM product actively in a production environment.
■ The vendor references must confirm they are monitoring at least 200 production application server instances in a production environment.
■ Some features of the APM offering must be available via a SaaS delivery model. This offering must be delivered directly from the vendor.
■ The product must be shipping to end-user clients for production deployment and designated with general availability by July 15th 2014.
■ Total revenue (including new licenses, updates, maintenance, subscriptions, SaaS, hosting and technical support) must have exceeded $5 million in calendar year 2013.
In addition to these criteria, we will be evaluating the vendor’s ability to cross multiple buying centers, as well as its ability to target specific verticals as validated by reference customers. Detailed criteria and subcriteria will be published along with the final research later this year.
Evaluation Criteria
While a vendor may meet the inclusion criteria for the APM Magic Quadrant, placement within the finalized Magic Quadrant will depend on its scoring in a number of categories. Ratings in these categories will be used to determine final placement within the 2014 APM Magic Quadrant. The 2014 evaluation criteria are based on Completeness of Vision and Ability to Execute.
Completeness of Vision
Market Understanding: This criterion evaluates vendor capabilities against future market requirements. The market requirements map to the market overview discussion and look for the following functionality:
■ EUM, including real and synthetic availability testing
■ Runtime application architecture discovery
■ User-defined transaction profiling
■ Application component deep dive
■ IT operations analytics for problem isolation and resolution
■ IT operations analytics to answer questions about software or business execution■ Ability to address the mobile APM market
Marketing Strategy: We evaluate the vendor’s capability to deliver a clear and differentiated message that maps to current and future market demands, and, most importantly, the vendor’s commitment to the APM market through its website, advertising programs, social media, collaborative message boards, tradeshows, training and positioning statements.
Sales Strategy: We evaluate the vendor’s approach to selling APM to multiple buying centers. We also evaluate the vendor’s ability to sell in the appropriate distribution channels, including channel sales, inside sales and outside sales.
Offering (Product) Strategy: We evaluate product scalability, usability, functionality, and delivery model innovation. We also evaluate the innovation related to delivery of product and services.
Business Model: This is our evaluation of whether the vendor continuously manages a well balanced business case that demonstrates appropriate funding and alignment of staffing resources to succeed in this market. Delivery methods will also be evaluated as business model decisions, including the strength and coherence of on-premises and SaaS solutions.
Vertical/Industry Strategy: We evaluate the targeted approaches in marketing and selling into specific vertical industries. Commonly, APM solutions are bought and targeted toward the financial services, healthcare, retail, manufacturing, media, education, government and technology verticals.
Innovation: This criterion includes product leadership and the ability to deliver APM features and functions that distinguish the vendor from its competitors. These include unique approaches to application instrumentation, mobile visibility, and catering towards the increased demands of continuous release. Specific considerations include resources available for R&D, and the innovation process.
Geographic Strategy: This is our evaluation of the vendor’s ability to meet the sales and support requirements of IT organizations worldwide. In this way, we assess the vendor’s strategy to penetrate emerging markets.
Ability to Execute
Product/Service: Gartner evaluates the capabilities, quality, usability, integration and feature set of the solution, including the following functions:
■ Day-to-day maintenance of the product
■ Ease and management of deploying new APM
■ Ease of use and richness of functions within the product
■ Product deployment options and usability
■ Integration of overall APM-related portfolio or unified APM offering
Overall Viability (Business Unit, Financial, Strategy and Organization): We consider the vendor’s company size, market share and financial performance (such as revenue growth and profitability). The leadership within the company in terms of people, what employees think of the leadership, and the ability to drive the company forward. We also investigate any investments and ownership, and any other data related to the health of the corporate entity. Our analysis reflects the vendor’s capability to ensure the continued vitality of its APM offering.
Sales Execution/Pricing: We evaluate the vendor’s capability to provide global sales support that aligns with its marketing messages; its market presence in terms of installed base, new customers, and partnerships; and flexibility and pricing within licensing model options, including packaging that is specific to solution portability.
Market Responsiveness and Track Record: We evaluate the execution in delivering and upgrading products consistently, in a timely fashion, and meeting road map timelines. We also evaluate the vendor’s agility in terms of meeting new market demands, and how well the vendor receives customer feedback and quickly builds it into the product.
Marketing Execution: This is a measure of brand and mind share through client, reference and channel partner feedback. We evaluate the degree to which customers and partners have positive identification with the product, and whether the vendor has credibility in this market.
Customer Experience: We evaluate the vendor’s reputation in the market, based on customers’ feedback regarding their experiences working with the vendor, whether they were glad they chose the vendor’s product and whether they planned to continue working with the vendor. Additionally, we look at the various ways in which the vendor can be engaged, including social media, message boards and other support avenues.
Category: apm it-operations monitoring
Thoughts on Criteria for the 2014 Magic Quadrant for Application Performance Monitoring
-
[…] Source: Criteria for the 2014 Magic Quadrant for Application Performance Monitoring […]
-
Jonah,
Thanks for publishing these details on the blog. This is the way this information should always be shared to ensure full participation by Gartner clients and non-clients alike. Kudos to you.
Simon
-
Jonah,
Clarification-
“must provide compiled Java and .NET code instrumentation “.
In last year’s Magic Quadrant, it was stated with an “or”:
“The APM product must provide compiled Java or .NET code instrumentation in a production environment.”
It appears support for both Java AND .NET is a must have for inclusion in the 2014 MQ. If a vendor does not have either of these, would it disqualify the vendor?
-John
-
Good to see the added emphasis on Mobile APM and tightened criteria of complied Java AND .NET.
Also nice to see analytics broken down into two distinct use cases of diagnostics & business.
Setting the criteria objectively is perhaps the most challenging task for any analyst as it must strike the right balance between:
• Objectively addressing the market needs and covering all aspects related to the people, processes, and technology needs for APM;
• Ensuring that the criteria are not too broad to be all-encompassing as this can potentially lead to misleading comparisons; as well as
• Ensuring that the criteria are not too rigid or risk the research being limited to a small subset of the wide ranging needs for APM.
Overall the new criteria are more reflective of the current state of the market needs and drivers; however they don’t adequately address the lifecycle & DevOps aspect of APM.
Other points to consider (especially in light of the Gartner definition for an application):
• Provide specific criteria for none Java & .NET apps (as these still make a good percentage of enterprise applications)
• Given the importance of EUM, Gartner should consider raising the bar higher on this dimension to ensure that there is enough breadth in the offering to address a broader range of application portfolio.
• With regards to Mobile APM, it would be wise to apply the various APM dimensions to this and mandate crash analytics for component deep-dive.
Please note that these are my personal analysis @rkatanasho.
-
In broader way this is right criteriae for APM evaluation. Looking forward for more APM features inclusion.
-
[…] goal of application performance management framework is to provide the end-users with the absolute best experience from beginning-to-end. While most APM […]
Leave a Reply
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog. | http://blogs.gartner.com/jonah-kowall/2014/05/29/criteria-for-the-2014-magic-quadrant-for-application-performance-monitoring/ |
The panel denied Portland's appeal from Judge Jerome's decision denying its Petition for Apportionment against the towns of Raymond and Casco. Moses was an EMT and firefighter who claimed PTSD as a gradual work injury resulting from his exposure to various traumatic events. Portland entered into a consent decree accepting the injury and granting Moses medical and incapacity benefits. Portland then filed petitions against Raymond and Casco for apportionment contribution.
Judge Jerome found that, although Moses’ prior work for Casco and Raymond contributed to his PTSD, Portland failed to establish that he suffered a unique work injury during those prior employments. She relied on the §312 IME opinion of Dr. Barkin that Moses’ work for Portland was his “predominant stressor.”
The panel affirmed Judge Jerome's ruling that both §354 and §201(4) require an actual injury, in addition to a "significant contribution" to an employee's disability. It also affirmed her ruling that Moses suffered a single gradual injury, rather than a series of gradual injuries each time he responded to a call for emergency services. This decision reflects the limited application of §201 (4) in apportionment cases, and calls into question whether apportionment is truly available in gradual injury cases. | https://complawmaine.com/decision/2016/city_of_portland_v._moses_&_town_of_raymond_&_town_of_casco |
Definition of niche in English:
niche
noun
1A shallow recess, especially one in a wall to display a statue or other ornament: each niche holding a shepherdess in Dresden china
More example sentences
- Zeno built a tall wall with about 20 niches for statues of gods and goddesses behind the stage.
- In 1549, Jafar founded Kudus Mosque and fastened the rock in its mihrab, a niche in the mosque wall facing Mecca.
- The center of Schinkel's building also contained a large rotunda, modeled on the Pantheon in Rome, where statues of the ancient gods inhabited niches recessed in the circular floor.
2 (one's niche) A comfortable or suitable position in life or employment: he is now head chef at a leading law firm and feels he has found his niche
More example sentences
- I'd carved a very comfortable niche, so to speak.
- He developed his expressive skills and, simultaneously, found a comfortable social niche, allowing passers-by to see what he was doing and occasionally exchanging a few words.
- As no networks for ethnic women existed, there was no crutch to lean on and I had to find a suitable niche for myself without affirmative action assistance.
2.1 Ecology A role taken by a type of organism within its community: the niche left vacant by the disappearance of wolves
More example sentences
- At the same time, the various oral communities that live on the body are highly dependent on the environmental conditions that normally prevail within each niche.
- Some early humans may have started eating meat as a way to survive within their own ecological niche.
- The ecological role and niche of coiled cephalopods can be studied by considering the common morphological characters of these fossils.
3A specialized segment of the market for a particular kind of product or service: he believes he has found a niche in the market smaller cooperatives must find and develop a niche for their speciality product
More example sentences
- By its very nature, a good database provides background information that might suggest opportunities for direct marketing to specific segments or market niches.
- Production managers prefer long production runs of standardized products, but marketers increasingly try to satisfy market niches with specially adapted products.
- Obviously, Fletcher has a knack for creating a useful product that fits a niche in the market.
adjective
Denoting or relating to products, services, or interests that appeal to a small, specialized section of the population: other companies in this space had to adapt to being niche players a niche show that ran on late-night television the video game industry is no longer niche
More example sentences
- I personally think that the video component becomes more important the less niche your product is.
- These are niche market vehicles, not meant to appeal to everyone.
- Companies that might get involved tend to be small because they consider these products niche, says Pandolfo.
verb[with object]
Place (something) in a niche: these elements were niched within the shadowy reaches niched statues
More example sentences
- Honey is not as big as Essence, Heart & Soul is not as big as Essence, but a combined circulation of 500,000 is big enough where it has to be looked at, and it's also niched enough where advertisers can make more efficient buys for their targets.
- Anyway, here I am, being niched as The Guy Who Says Blogs Are Not For Making Money.
- It is unfortunate but fairly likely that Griffiths will be niched and pigeonholed with this debut novel.
Origin
Early 17th century: from French, literally 'recess', from nicher 'make a nest', based on Latin nidus 'nest'.
More
nest from Old English:
A nest was originally a ‘sitting-down place’. The Old English word comes from the same ancient roots as nether (Old English) and sit (Old English). The related word nestle (Old English) first meant ‘build a nest’, and did not take on its modern meaning until the 16th century. Niche (early 17th century), ‘a shallow recess’ or ‘a comfortable or suitable position’, is another related word.
Words that rhyme with nichebabiche, Dalglish, fiche, Laois, leash, nouveau riche, pastiche, quiche, Rajneesh, schottische
For editors and proofreaders
Line breaks: niche
Definition of niche in:
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed. | http://www.oxforddictionaries.com/definition/english/niche |
The value of an investment, and any income from it can fall as well as rise and investors may not get back the amount invested. Past performance is not a guide to future returns.
-
The year 2020 felt somewhat surreal for UK investors. Not only was our local economy hit hard by the pandemic, but whole sectors of the stock market came under pressure, including many high-profile firms. Meanwhile, the headlines told of the continued rise of US tech giants and Chinese platform companies. With that backdrop in mind, Lucy Haddow, Managed Fund specialist, speaks to UK specialist Kathleen MacMillan about the questions most often asked by investors of the portfolio’s UK equity holdings. Kathleen works closely with the Managed Fund’s co-manager Iain McCombie, who has responsibility for the UK equity portfolio.
1. How do you think about the fund’s allocation to the UK? What is there to be optimistic about in your home market?
The Managed Fund’s strategic asset allocation is 75 per cent equities, 25 per cent bonds and cash. We typically split the equity exposure equally across four regions, one of which is the UK. Our approach to asset allocation versus this starting point is that it is driven by the availability of investment ideas.
As of end December 2020, the Managed Fund had around 17 per cent of the portfolio invested in UK equities, so slightly less than our strategic allocation of 19 per cent. We’re still finding great opportunities, but 2020 was a challenging year. While the Fund’s UK equity holdings outperformed the broader UK stock market, returns lagged behind other regions and our preference is to add incrementally to holdings that have been weaker, rather than rush to increase their size.
That said, since the start of 2021, we have been making additions to the fund’s UK equity exposure with new buys including Close Brothers, a merchant bank, as well as Persimmon, the UK’s largest house builder.
Our optimism about the opportunities available is driven entirely by our active approach to stock picking. This allows us to invest in a small subset of very carefully selected, homegrown companies with solid competitive strengths, innovative ideas and fantastic growth opportunities. The opportunity set is truly diverse, and contains world leaders in fields such as healthcare, advanced manufacturing and long-term savings.
2. The UK seems to lag behind other regions on technology. What’s your view?
One of the big misconceptions about the UK stock market is that it is little more than big banks, big pharma and oil majors. There is actually a raft of really exciting online platform businesses that fly below the radar.
Indeed, the Managed Fund has invested in several of these for many years. Rightmove is a great example. It’s the UK’s largest online property portal and has been held in the fund since 2011. With around 80 per cent market share, we think its dominance should be self-reinforcing over time, with both buyers and sellers increasingly turning to the most popular site in order to transact.
But we are not just focused on the established online disruptors. Draper Esprit, purchased for the Managed Fund in 2020, provides a fantastic way to access early stage opportunities. It’s a venture capital business that invests in early stage European technology companies such as the smart-banking app Revolut, and the telemedicine business, Push Doctor. In a relatively short time, the investment team at Draper Esprit has built up an interesting portfolio of fast-growing businesses that have the potential to be significantly larger on a long-term view.
-
-
3. How do you consider ESG when investing in the UK?
While the Managed Fund’s focus is on engagement, rather than exclusion, our starting point is to focus on well-managed companies with sustainable competitive advantages, and we would typically avoid those companies where poor governance, environmental or social factors are detrimental to future prospects.
The consideration of ESG factors is therefore a key component of our long-term, active, growth-focused investment approach – not just in the UK, but in all equity regions as well as fixed income.
During 2020, we saw unique challenges in engaging with companies on our clients’ behalf. However, our approach to stewardship did not change, and we were able to maintain good access to companies, despite most of us working from home for a significant proportion of the year. This allowed us to continue to effect change among the strategy’s holdings where needed. UK-listed highlights included our discussions with:
- Abcam, the UK life sciences company. In this instance we made it clear we would not support some proposed changes regarding remuneration. We were pleased to see them subsequently dropped, allowing us to support the final remuneration proposal.
- Rio Tinto, the Anglo-Australian diversified metals and mining group. We have engaged several times with the company following the Juukan Gorge disaster in Australia in May 2020 to understand how this dreadful incident could have happened and what steps have been taken to learn from the mistakes. While the contrition of the company is genuine, in our view, we have pushed for governance improvements that we think are in the best interests of all stakeholders. At the company’s request, we have also provided guidance and advice on its efforts towards meeting its goal of best-in-class ESG reporting, and we consider our active ownership relationship as helpful to its responsible ambitions.
4. How do you find exciting opportunities in the UK?
As bottom-up stock pickers, our time is spent finding companies which should offer superior long-term profit growth. In addition to company meetings, we have regular, focused investment trips (when we are able to travel!) to meet with founders, owners and senior management of businesses. We also have a number of independent ‘inquisitive researchers’ who employ a more investigative approach to research.
The value of our investigative researchers was underlined with the recent purchase of Games Workshop, the Nottingham-based miniature gaming company, which was first explored in early 2019.
Following this, we visited the company’s Nottingham headquarters and, given our enthusiasm, then sent one of the researchers to follow up and challenge our initial takeaways.
Further research and debate amongst the team convinced us that the company's high-quality intellectual property and expanding market opportunity were not adequately captured in the current valuation. While the product is ultimately of niche appeal, we have come to believe that the niche is growing and will be sufficiently large to result in significantly higher revenues and profits in five to ten years’ time. We therefore took an initial holding for the fund in 2020.
-
-
5. Where are you seeing innovation and market leaders emerge in the UK?
The UK market provides access to a wide range of innovative businesses that might not be household names but are world-class operators and market leaders in their respective industries.
- Genus, held since 2018, is an excellent example. It’s a world-leading animal genetics business which analyses DNA to find the strongest genetic profiles to breed ‘elite’ cows and pigs. By selecting animals with desirable characteristics, Genus is able to help farmers to produce pork, beef and milk more sustainably. As we continue to see a growing population with more disposable income, we believe that Genus will benefit from a rising demand for meat and dairy products.
- Halma is another great example; possibly the biggest UK company you’ve never heard of! Held since 2000, it develops technologies which help to save lives and protect critical infrastructure, covering everything from detecting fires and gas leaks to monitoring air and water pollution. For over a decade, Halma has grown at a brisk pace, consistently increasing both revenues and profits on an annual basis and delivering excellent returns to long-term shareholders.
-
We believe that despite what the headlines suggest, there are exciting investment opportunities to be found in the UK. Our focus is on identifying the subset of exceptional growth businesses within our home market that we believe can make a real difference to the returns generated for investors in the Baillie Gifford Managed Fund over the long term.
-
Important Information and Risk Factors
The value of an investment in the Fund, and any income from it, can fall as well as rise and investors may not get back the amount invested.
The views expressed in this article are those of Lucy Haddow and should not be considered as advice or a recommendation to buy, sell or hold a particular investment. They reflect personal opinion and should not be taken as statements of fact nor should any reliance be placed on them when making investment decisions.
This communication was produced and approved in April 2021 and has not been updated subsequently. It represents views held at the time of writing and may not reflect current thinking.
Any stock examples and images used in this article are not intended to represent recommendations to buy or sell, neither is it implied that they will prove profitable in the future. It is not known whether they will feature in any future portfolio produced by us. Any individual examples will represent only a small part of the overall portfolio and are inserted purely to help illustrate our investment style.
All information is sourced from Baillie Gifford & Co and is current unless otherwise stated. The images used in this article are for illustrative purposes only.
This is a marketing communication and should not be considered as advice or a recommendation to buy, sell or hold a particular investment. No reliance should be placed on these views when making investment decisions. This article does not constitute, and is not subject to the protections afforded to, independent research. Baillie Gifford and its staff may have dealt in the investments concerned.
Baillie Gifford & Co and Baillie Gifford & Co Limited are authorised and regulated by the Financial Conduct Authority (FCA). Baillie Gifford & Co Limited is an Authorised Corporate Director of OEICs.
The Baillie Gifford Managed Fund is on the Monetary Authority of Singapore’s List of Restricted schemes. This presentation has not been registered as a prospectus with the Monetary Authority of Singapore. Accordingly, this information memorandum and any other document or material in connection with the offer or sale, or invitation for subscription or purchase, of shares in the Fund may not be circulated or distributed, nor may the shares be offered or sold, or be made the subject of an invitation for subscription or purchase, whether directly or indirectly, to persons in Singapore other than (i) to an institutional investor pursuant to Section 304 of the Securities and Futures Act, Chapter 289 of Singapore (the “SFA”) or (ii) otherwise pursuant to, and in accordance with the conditions of, any other applicable provision of the SFA.
Baillie Gifford Overseas Limited is wholly owned by Baillie Gifford & Co. Baillie Gifford Overseas Limited provides investment management and advisory services to non-UK clients. Both are authorised and regulated by the Financial Conduct Authority.
Baillie Gifford Asia (Hong Kong) Limited 柏基亞洲(香港)有限公司 is wholly owned by Baillie Gifford Overseas Limited and holds a Type 1 and a Type 2 licence from the Securities and Futures Commission of Hong Kong to market and distribute Baillie Gifford’s range of collective investment schemes to professional investors in Hong Kong. Baillie Gifford Asia (Hong Kong) Limited 柏基亞洲(香港)有限公司 can be contacted at Room 3009-3010, One International Finance Centre, 1 Harbour View Street, Central, Hong Kong, Telephone +852 3756 5700
Baillie Gifford Managed Fund B Acc Annual Past Performance To 31 December each year
2016 2017 2018 2019 2020 Baillie Gifford Managed Fund B Acc 17.7 15.0 -2.6 21.3 33.9 IA Mixed investment 40%-85% Shares Sector Median 13.2 10.0 -6.0 15.8 5.1
Source: StatPro, net of fees, in sterling. Class B Acc shares, calculated on a close of business NAV. Comparator Benchmark: IA Mixed Investment 40-85% Shares Sector Median (Net). The manager believes this is an appropriate benchmark given the investment policy of the Fund and the approach taken by the manager when investing.
Past performance is not a guide to future returns.
51770 ALL AR 0179
-
YOU MAY ALSO LIKEInsights.Visit Baillie Gifford's Insights page.Navigating the Great Dividend Crisis.Co-head of the Baillie Gifford Equity Income Team James Dow delivers a webinar giving insight into his thoughts on how investors can navigate the current global dividend crisis.Income Through a Growth Lens.Toby Ross shows how Baillie Gifford’s growth approach to income investing, starts from a very different philosophical position compared with our peers. Take a look from a different angle.Strategic Bond Fund Update.Kevin Mitchell, client manager, hosts a webinar with Torcail Stewart and Lesley Dunn, co-managers of the Strategic Bond Fund, in which an update on the fund is given and questions from clients are answered. | https://www.bailliegifford.com/en/uk/intermediaries/insights/ic-article/2021-q1-baillie-gifford-managed-fund-s-uk-champions-all-ar-0179/ |
Now that ‘Westworld’ Season 2 is in the rearview mirror, we can look back with a little bit more clarity on the season and how it really did with the fans and critics. On the one hand there has been a lot of critical praise, 6 Emmy nominations including one for Best Drama, but it seems a lot of fans were disappointed by the second season, falling off after the thrilling first season and complaining about confusing plot points, lack of action, or just general malaise when it came to the show (none of which I agree with, but all things I heard over the course of the season). And the ratings proved it, as the show dropped a bit in that department after its first season, enough so that people noticed.
When HBO Programming Chief Casey Bloys was asked this past Wednesday at the Television Critics Association’s press tour in Beverly Hills his thoughts on the “widespread backlash” to ‘Westworld’ Season 2, his answer surprised some of the press who thought he might be a bit more worried about the expensive show:
“I’m not sure I would agree that the backlash was ‘widespread. We’re thrilled about the Emmy nominations. What I love about Westworld is that the people who love it really love it. Even the people who dislike it feel the need to discuss it and talk about it and let you know they dislike and debate it. And for a show to arouse that kind of feeling, that’s what we want.”
When asked whether the show was still too confusing, Bloys pushed back, claiming that they actually made the show LESS confusing in Season 2, a sentiment I personally agree with:
“We sent out the first five episodes [to critics] and most of the reviews felt the storytelling had been clarified. Look, it’s not for casual viewers. It requires your attention. [Showrunners Jonathan Nolan and Lisa Joy] like to challenge their viewers and many feel they are rewarded by that. It’s a unique show and that’s what we look for.”
It is very nice to see the show get such support from Bloys and HBO in general, though one does wonder how far that support will carry them if they continue to lose viewers. While I love ‘Westworld’ I know it is not as universally loved as ‘Game of Thrones,’ and it might get even harder to become enamored of the series the further into its twisty storyline each season gets. It will have a hard road ahead of it in the coming years if it does not find a way to appeal to more audience members, but maybe that is ok, being a niche show gives it a little more freedom. What are your thoughts on ‘Westworld’ Season 2? Did you enjoy it? Or did you dislike it? Feel free to share your opinions in the comments below! | https://sciencefiction.com/2018/07/27/westworld-not-casual-viewers-hbo-boss-defending-critical-hit/ |
Swab, R. M., Regan, H. M., Keith, D. A., Regan, T. J. & Ooi, M. K. J. (2012). Niche models tell half the story: Spatial context and life-history traits influence species responses to global change. Journal of Biogeography, 39 (7), 1266-1277.
Abstract
Aim While niche models are typically used to assess the vulnerability of species to climate change, they have been criticized for their limited assessment of threats other than climate change. We attempt to evaluate this limitation by combining niche models with life-history models to investigate the relative influence of climate change and a range of fire regimes on the viability of a long-lived plant population. Specifically, we investigate whether range shift due to climate change is a greater threat to an obligate seeding fire-prone shrub than altered fire frequency and how these two threatening processes might interact. Location Australian sclerophyll woodland and heathland. Methods The study species is Leucopogon setiger, an obligate seeding fire-prone shrub. A spatially explicit stochastic matrix model was constructed for this species and linked with a dynamic niche model and fire risk functions representing a suite of average fire return intervals. We compared scenarios with a variety of hypothetical patches, a patch framework based upon current habitat suitability and one with dynamic habitat suitability based on climate change scenarios A1FI and A2. Results Leucopogon setiger was found to be sensitive to fire frequency, with shorter intervals reducing expected minimum abundances (EMAs). Spatial decoupling of fires across the landscape reduced the vulnerability of the species to shortened fire frequencies. Shifting habitat, while reducing EMAs, was less of a threat to the species than frequent fire. Main conclusions Altered fire regime, in particular more frequent fires relative to the historical regime, was predicted to be a strong threat to this species, which may reflect a vulnerability of obligate seeders in general. Range shifts induced by climate change were a secondary threat when habitat reductions were predicted. Incorporating life-history traits into habitat suitability models by linking species distribution models with population models allowed for the population-level evaluation of multiple stressors that affect population dynamics and habitat, ultimately providing a greater understanding of the impacts of global change than would be gained by niche models alone. Further investigations of this type could elucidate how particular bioecological factors can affect certain types of species under global change. ?? 2012 Blackwell Publishing Ltd. | https://ro.uow.edu.au/scipapers/4413/ |
Lost your password?
Cyber security
Home
Cyber security
When cyber security meets artificial intelligence…
Cyber security is a game of cat and mouse. "Rats" always have the upper hand, because new malware is always hidden and difficult to detect. Despite billions of dollars being poured into the field each year, cyberattacks continue to occur and hackers make a fortune from them.
Author:liu, tempo
/
Date: 2021-08-13
/
Views:97
How does artificial intelligence affect Cyber Security?
Artificial Intelligence (AI) is a new technical science which studies and develops theories, methods, technologies and application systems for simulating, extending and extending human Intelligence. It consists of different fields, such as machine learning, computer vision and so on.
Author:liu, tempo
/
Date: 2021-08-04
/
Views:79
Artificial intelligence, Internet of Things, smart cities… the technological development trends in the next 30 years are all included in this report
If you are concerned about future technology development trends and technology venture capital, then the "2016-2045 Emerging Technology Trends Report" published by the U.S. Department of the Army is worth a look. The report is based on 32 research reports on scientific and technological trends published by government agencies, consulting agencies, think tanks, and scientific research institutions in the United States in the past five years. Through a comprehensive comparison and analysis of nearly 700 technological trends, the 20 most noteworthy technological development trends were finally identified.
Author:liu, tempo
/
Date: 2021-07-28
/
Views:58
mobile qrcode
AI information in ozmca.com
@thaibahtbag
[email protected]
[email protected]
Hot Topics
What is artificial intelligence suitable for? What can you do?
2021-10-09
0
The demand for AI skills has more than doubled over the last three years, according to Indeed. Job postings in the field of AI have gone up by 119%.
Applications of Artificial Intelligence | about AI
History of Artificial Intelligence | AI
Artificial Intelligence Tutorial for Beginners | Learn AI Tutorial from Experts
Trend analysis of digital medical investment
Latest Topics
What is artificial intelligence suitable for? What can you do? | https://www.ozmca.com/tag/cyber-security/ |
"The field of Machine Learning seeks to answer these questions: How can we build computer systems that automatically improve with experience, and what are the fundamental laws that govern all learning processes?"
– from The Discipline of Machine Learning by Tom Mitchell. CMU-ML-06-108, 2006.
NSF grant to UCLA computer science professors Todd Millstein and Guy Van den Broeck will support research to democratize emerging AI-based technology. Two computer scientists at the UCLA Samueli School of Engineering have received a four-year, $947,000 research grant from the National Science Foundation to make machine learning – a branch of artificial intelligence where computer programs learn and improve on their own – more widely available and easier to work with. "Machine learning has been really successful in the past decade, leading to state-of-the-art techniques for language translation, face recognition and other compelling applications, but these advances have mainly come from experts with specialized knowledge at major technology companies and at universities," said Todd Millstein, professor of computer science and the principal investigator on the research. "Our primary goal with this research is to democratize machine learning, so that programs that utilize it can be written by anyone." Machine learning technologies are powered by probability models.
October is historically the most volatile month for stocks, but is this a persistent signal or just noise in the data? Follow me on Twitter (twitter.com/pdquant) Over the past 32 years, October has been the most volatile month on average for the S&P500 and December the least, in this article we will use simulation to assess the statistical significance of this observation and to what extent this observation could occur by chance. We will be using Daily S&P500 data for this analysis, in particular we will use the raw daily closing prices from 1986 to 2018 (which is surprisingly hard to find so I've made it publicly available). The inspiration for this post came from Winton, which we will be reproducing here, albeit with 32 years of data vs their 87 years.
In the middle of the historic city of Bristol in England, about 150 engineers are currently designing the most sophisticated computer AI chip in the world. The "Colossus" has 1216 processors fitted on a chip characterized by the size of a postage stamp. Designed specifically for artificial intelligence (AI) applications, the AI chip draws its name from the computer that was used by cryptographers at Bletchley Park during World War II. "[Colossus] was all top-secret for decades after the war, so the Americans thought they invented everything first. Now it is clear to the world that they didn't," claimed Simon Knowles, the inventor of the novel AI chip.
Increasingly, businesses are using ML to strengthen their competitive advantage and drive innovation. Is your organisation embracing this shift or are you falling behind? If you are on the "bias-for-action" side of the scale and have already started steering your organisation towards digital & ML transformation, are you confident you are doing so in the right way? Over the past decade, data has become increasingly important and has even been described as the "new oil". Organisations with extensive user data can leverage data to increase sales and customer retention.
Two Princeton University computer science professors will lead a new Google AI lab opening in January in the town of Princeton. The lab is expected to expand New Jersey's burgeoning innovation ecosystem by building a collaborative effort to advance research in artificial intelligence. The lab, at 1 Palmer Square, will start with a small number of faculty members, graduate and undergraduate student researchers, recent graduates and software engineers. The lab builds on several years of close collaboration between Google and professors Elad Hazan and Yoram Singer, who will split their time working for Google and Princeton. The work in the lab will focus on a discipline within artificial intelligence known as machine learning, in which computers learn from existing information and develop the ability to draw conclusions and make decisions in new situations that were not in the original data.
Artificial intelligence (AI) has a perception problem, as many people think of the technology primarily as a job killer. However, collaboration between humans and AI opens the opportunity of putting the design and manufacturing of goods of all kinds on a new, better foundation by curating intelligence. That's why we should rethink our expectations for machine intelligence and how it will affect our future. The role of a human as the most intelligent creature on earth may not last much longer. Technologies like artificial intelligence and machine learning are taking on operations that could previously only be conducted with human intelligence – and in some cases they're doing even better than we do.
Business-to-consumer (B2C) businesses have made it a priority to incorporate machine learning into customer-facing functions, integrating it into sales and marketing. For business-to-business (B2B) companies, however, translating data into actionable marketing strategies can be a more difficult proposition. Selling to organizations invariably requires embarking on a much longer and more complex journey, culminating in an order of much higher value than in the consumer realm. With hundreds of thousands, if not millions, of dollars at stake, a misguided marketing investment could lead to financial losses. "The availability of data and the importance of having the focus on the full customer journey is coming a little later to the B2B world," says Laura Beaudin, a partner at Bain & Co. "A lot of expectations in terms of customers manifested themselves in the consumer world before they brought those expectations to their business-purchasing world."
The robots are coming, if not already here: A 2017 study conducted by the McKinsey Global Institute revealed that up to 800 million jobs worldwide are at risk of being replaced by automation by 2030. According to our calculations, you have two options as far as the machine apocalypse goes: One, you could wait anxiously until your job is inevitably stolen by a C-3PO wannabe, or two, you could one-up the robots by training to work in the field of Artificial Intelligence. Let's suppose you go with the second option (probably the wiser choice, all things considered). Now, how do you go about getting said AI training? A good place to start is -- where else -- online.
With more and more artificial intelligence (AI) solutions emerging each year, it's safe to say that this technology is here to stay. Statista predicts that the global AI market will be worth more than $10.5 billion by 2020, and forward-thinking businesses continue to incorporate AI into their everyday operations in the form of automation and customer service chatbots. If your business hasn't yet jumped on the AI bandwagon, you might be wondering what you're missing -- and whether you really need to find out. While it's true that many businesses have found worthwhile use cases for this technology, it may not necessarily be the right time for your company to explore AI. According to Forbes Technology Council members, here are nine questions to determine if artificial intelligence is a smart investment for your business right now. | https://aitopics.org/class/Technology/Information%20Technology/Artificial%20Intelligence/Machine%20Learning?start=30&filters=taxnodes%3ATechnology%7CInformation+Technology%7CArtificial+Intelligence%7CMachine+Learning |
CW+ Premium Content/E-Handbooks
Access your Pro+ Content below.
Infographic: 10 AI and machine learning trends
Sponsored by TechTarget ComputerWeekly.com
Artificial intelligence technologies are transforming business processes at large. As enterprises expand the uses of AI, this field starts to move towards new domains, such as conceptual design, smaller devices and multi-modal applications. Here are the 10 top AI trends for 2022.
Table Of Contents
- Automated machine learning (AutoML)
- AI-enabled conceptual design
- Tiny ML
- Quantum ML
- Democratized AI
And more...
Access this CW+ Content for Free! | https://www.computerweekly.com/ehandbook/Infographic-10-AI-and-machine-learning-trends |
15 Best AI Newsletters
A curated list of 15 newsletters to stay informed on the latest AI news and research.
The field of AI is moving incredibly fast, and it’s almost impossible to stay up to date with all the new inventions. In my opinion, subscribing to a few well-written newsletters is the best way to keep up with the most important trends.
So here’s a curated list of 15 newsletters to stay informed on the latest AI news and research.
#more
1. The Batch | DeepLearning.AI¶
Stay updated with weekly AI News and Insights delivered to your inbox.
2. Paper with Code Newsletter¶
Stay informed on the latest trending ML papers with code, research developments, libraries, methods, and datasets.
3. Ahead of AI By Sebastian Raschka¶
News, trends, and educational nuggets related to Machine Learning & AI to stay ahead of the field.
(New issues dropping on the first Monday of each month.)
4. Import AI¶
Import AI is a weekly newsletter about artificial intelligence, read by more than ten thousand experts.
It’s written by Jack Clark, co-founder of Anthropic, an AI safety and research company. He was previously the Policy Director of OpenAI.
5. AI Weekly¶
A weekly collection of AI News and resources on Artificial Intelligence and Machine Learning.
6. Deep Learning Weekly¶
Bringing you everything new and exciting in the world of deep learning from academia to the grubby depths of industry every week right to your inbox.
7. The Algorithm by MIT Technology Review¶
A weekly newsletter that helps demystify artificial intelligence.
8. Inside AI¶
The latest in AI, Robotics, and Neurotech. Daily round up of new articles about AI.
9. Last Week in AI¶
Weekly text and audio summaries of the most interesting AI news, as well as editorials commenting on recent events.
10. Eye on A.I.¶
At the intersection of artificial intelligence and industry. (Weekly)
11. The European AI Newsletter¶
Covering everything that is happening in Europe around artificial intelligence.
12. ChinAI Newsletter¶
Jeff Ding's weekly translations of writings from Chinese thinkers on China's AI landscape.
13. Machine Learning Monthly¶
Monthly Machine Learning News by Daniel Bourke and Zero To Mastery.
14. TLDR¶
TLDR is a daily newsletter with links and TLDRs of the most interesting stories in startups 🚀, tech 📱, and programming 💻! | https://www.python-engineer.com/posts/15-best-ai-newsletters/ |
This is the first A14D Africa National workshop among other workshop planned to take place.The theme was Application of AI/ML in Geospatial Engineering.
Artificial Intelligence (AI) is the branch of computer science; attempts to make computers that act like humans.
The branches of AI include: Natural Language Understanding, Speech Recognition and Synthesis, Robotics, Multiagent Systems, Knowledge-Based and Expert Systems, Machine Vision, Machine Learning, Pattern Recognition, Planning, Knowledge Representation, and Searching.
Artificial intelligence (AI) and Geospatial science: increased demand and supply for geospatial data due to better remote sensing data capture techniques using for example improved sensors, Unmanned Aerial Vehicles (UVAS) such as drones, and aircraft equipped with the high quality sensors. ML help both consumers and providers of data understand it.
This workshop featured one of our PHD student Ms Susan Okeyo,AI4D Ph.D scholar who presented on Leveraging Geospatial Technology for smallholder farmer Credit Scoring using Machine Learning.
She among the beneficially of a Phd scholarship offfered by Swedish International Development Cooperation Agency(SIDA).
The workshop brought together other scholars in the field of AI/ML search as
1.Professor Galcano Canny Mulaku -he is the lead supervisor of Ms.Susan and gave remarks on the AI and the AI4D Scholarship programme.
2.Dr.Collins Mwange -he is the 2nd Supervisor and presented on the AI in Geospatial Engineering opportunities and challenges
3.Dr. Davis Segera -from the department of Electrical and Information Engineering,University of Nairobi,He presented on Geospatial AI a breakthrough in solving complex spatial problems.
4.Mr.Isaac Chaan-from Strathmore University,he presented on Empowering local communities using Big data and AI
5.Mr.Bernard Onyango-from International Organisation for Migration
6.Professor Elisha Opiyo Omulo-from the department of computing and informatics ,University of Nairobi,he presented on Relevance Trends in Geospatial AI.
The participants came both from Geospatial Engineering Students,Staffs in the department and invited quests. | https://geospatial.uonbi.ac.ke/latest-news/first-ai4d-africa-national-workshop |
Economic diversification and the wealth of nations: Lessons and the path forward for Nigeria (3)
Third, Nigeria must become an economy driven by innovation. We have seen this trend in services such as financial technology (FinTech), but we need to have it both as a policy and as a way of economic life in other aspects of science and technology that can be turned into the local mass manufacturing of value-added products of innovation in our country. This requires a revamp, and the socialization of the idea of intellectual property, which drove innovation to become the main creator of the wealth of economically advanced countries.
Fourth, for Nigerian innovation to drive economic diversification, we must pay very special attention to trade policy. As a result of its inability to achieve structural economic transformation, Sub-Saharan Africa including Nigeria’s share of global merchandise exports has remained virtually stagnant for two decades between 1998, when the continent’s share of global merchandise exports was 1.9%, and 2018, when it was 2.5%. Global trade is based far more on manufactured, complex products (about 50%, than on primary commodities such as agriculture which account for less than 10%.
Read Also: Economic diversification and the wealth of nations: Lessons and the path forward for Nigeria
The fact that most of Nigeria’s trade is with advanced economies makes our trade disadvantage worse. With Nigeria’s ratification of the African Continental Free Trade Act in November 2020, we must now shift our strategic trade focus toward African countries. But this requires that we manufacture competitively and manage the phenomenon of dumping from foreign countries such as China. We need to seek a special dispensation from the World Trade Organization’s Special & Differentiated tariff regime with a strong case for why Nigeria should adopt “smart protectionism” for a limited period to ensure the survival of its infant industry at home.
Fifth, industrial policy must be the basis of our push toward economic diversification, since it is the basis on which we can push for a more favorable international trade environment. Industrial policy requires a certain amount of state intervention even in a market economy, provided that such intervention is targeted and ultimately productive for broad manufacturing sectors, as opposed to special favors for individual industrialists that distorts the market playing field for competitors in the same sector. Industrial policy will typically include identifying areas in which productive knowledge exists to confer competitive advantage, targeted subsidies for export industries, special economic zones, import-substitution industrialization, and temporary protectionist measures for some key sectors such as manufacturing.
Sixth, foreign exchange policy in Nigeria needs to be revamped away from state control, which encourages scarcities, smuggling and arbitrage, if we are to create incentives for a diversified economy. Artificial exchange rates only encourage an import-based economy. Allowing the naira to find its true value in the marketplace will discourage imports of unnecessary items (except, with the appropriate tariffs, for consumers that can afford it) and encourage exports to earn foreign exchange.
Seventh, as explained above, achieving economic diversification depends, at its core, on the existence of knowhow or productive knowledge. This requires Nigeria to focus on creating the skills amongst its young population that will drive competitive manufacturing for exports. This calls for a revamp of the education sector in favour of science and technology, at least for the next two to three decades. This is how China was able to achieve spectacular economic transformation and become the world’s second largest economy.
Eighth, Nigeria’s 1999 Constitution, by placing ownership of natural resources exclusively in the hands of the central government, creates a dis-incentive for economic diversification because it hampers a regional approach to economic diversification and economic management in what is supposedly a federal state. We need a constitutional restructuring that will devolve fiscal autonomy to regions or states, which will engender competitive manufacturing and the diversification that will drive it. This was the case in the First Republic, when Nigeria recorded its best levels of broad based economic growth rather than subsequent boom and bust cycles that were driven by reliance on oil rents.
Finally, Nigeria’s economic policy makers need to begin to measure economic diversification outcomes in an empirical manner. Measuring the sectors of the economy that contribute most effectively or have the promise of diversification, and the exact extent to which this is so, will help the government develop targeted export policies and incentives that will drive diversification. The Theil Index is a well established way to measure economic diversification.
All of this is why the Economic Advisory Council to the President needs to become a full-time body. Managing Nigeria’s economy to transformation will require capable hands that work on it full-time, doing the granular work and analysis that will drive policy. It is important that such a council, and the rest of the country’s economic management apparatus, acquire and establish strong competence in industrial policy if our economy is to become truly diversified.
In conclusion, economic diversification is a 24/7 agenda of decades, not just a slogan. It needs to be made the central thrust of economic policy in Nigeria because we simply cannot achieve development without it. | https://businessday.ng/opinion/article/economic-diversification-and-the-wealth-of-nations-lessons-and-the-path-forward-for-nigeria-3/ |
Eliot on Berbel and Marquese and Parron, 'Slavery and Politics: Brazil and Cuba, 1790-1850'
Márcia Regina Berbel, Rafael de Bivar Marquese, Tâmis Parron. Slavery and Politics: Brazil and Cuba, 1790-1850. Trans. Leonardo Marques. Albuquerque: University of New Mexico Press, 2016. 368 pp. $29.95 (paper), ISBN 978-0-8263-5648-2.
Reviewed by Lewis Eliot (University of South Carolina) Published on H-Slavery (March, 2020) Commissioned by Andrew J. Kettler (University of California, Los Angeles)
Printable Version: http://www.h-net.org/reviews/showpdf.php?id=54583
Slavery and Politics is a comparative study of Brazil and Cuba that seeks to “integrate both societies into the broader context of nineteenth-century global capitalism” (p. 3). Authors Rafael Marquese, Tãmis Parron, and Márcia Berbel present what they feel is an important contribution to the historiography of nineteenth-century slavery and the global consequences of the Haitian Revolution in the Atlantic World. They contend that despite shared characteristics, in particular the persistent enslavement of Africans and resistance to republicanism, analyses of Brazil and Cuba have tended to isolate the two regions. In so doing, important aspects of Second Slavery have been left unexamined.
The authors focus on international arguments in favor of slavery and their reception and implementation in Brazil and Cuba. Through this focus, Slavery and Politics principally asks how such ideologies buttressed Brazilian and Cuban politics in the aftermath of the Haitian Revolution. The authors justify this approach in four ways. They firstly contend that commonalities between Brazil and Cuba had existed since Europeans’ early conquest of the Americas but were accentuated in the decades after 1791. They then insist that both states were composed of similar planter classes. These slave owners were extremely influential when crafting imperial policies and consequently are important to look at in concert. Finally, both states shared common histories of pro-slavery positions and, even in the nineteenth century, worked to expand the use of slave labor in Latin America and the Caribbean.
The work is composed of four chapters that provide a chronological analysis of Brazilian and Cuban pro-slavery ideologies during the age of revolutions and era of emancipation. To successfully connect the two states, Marquese, Parron, and Berbel necessarily employ a broad approach that focuses on sweeping global trends that highlight commonalities between Brazil and Cuba. In a sense, therefore, the book is as much an examination of the international pro-slavery response to the Atlantic abolition movement, using Cuba and Brazil as case studies, as it is a comparison. The pro-slavery philosophies, as well as the planters and politicians who were attracted to them over and above loyalty to their state, ran counter to the global movement toward abolition yet were in fact global ideologies as well.
Chapter 1 provides a sweeping comparative overview of slaveholding in the Americas between the early 1500s and late 1700s, organized around a comparison of Iberian and Anglo-French slavery. According to Marquese, Parron, and Berbel, this period witnessed the rise and fall of an Iberian-dominated Atlantic World that gave way to a “northwestern European Atlantic system” (p. 27). Focusing on this longue durée allows the authors to stress that there were distinct, albeit subtle, differences in slaveholding ideologies between the northwestern and southwestern Atlantic Worlds that became ever clearer as they heard the crescendo of the Haitian Revolution. Although it focuses on Brazil and Cuba for its examples, this chapter essentially presents an examination of slavery scholarship from Eric Williams (Capitalism and Slavery ) to Laurent Dubois (Avengers of the New World ), via the likes of Frank Tannenbaum (Slave and Citizen: The Negro in the Americas ), David Brion Davis (The Problem of Slavery in Western Culture ), and Robin Blackburn (The Overthrow of Colonial Slavery, 1776-1848 ). While this is a useful historiographical reminder, the target audience for this work should either have a clear understanding of this material already or at least know where to find it independently.
The second chapter focuses on the period between 1791 and 1824. The first section explores the influence of the Haitian Revolution on Brazilian and Cuban slaveholding ideologies up until the “collapse of the Iberian Atlantic system” in 1808 (p. 76). The chapter then follows the constitutional experiences of 1810-24 and shows how slaveholders responded and evolved their thinking in response to the geopolitical upheavals of the early nineteenth century. The authors touch on questions of citizenship throughout this chapter and through this inquiry reveal some important divergences. Brazil developed its infant independence and established increasingly close ties to the British Empire, while Cuba became ever more tightly connected to the Spanish metropole.
Chapter 3 concentrates on evolutions in Brazilian and Cuban governance during the 1820s and 1830s. The chapter begins with the formalization of the Brazilian Parliament and the régimen de las facultades omnímodas for captains general in Cuba of 1825, which centralized colonial power in Havana through to the ascension of the Regresso Conservador in Brazil and the exclusion of Cuban deputies from Spanish Court in 1837. As British imperial officials strove to drive wedges between their Atlantic rivals through the rhetoric of abolitionism, Brazilians’ more amenable responses led to the end of the legal transatlantic slave trade to Brazil, though illicit trading continued. In Spanish Cuba, officials were loath to any ideas of abolitionism despite the political turmoil in the metropole. This more overtly pro-slavery approach was, according to the authors, the signature ideology of the Second Spanish Empire and marked the end of Iberian ideological synergy in the Americas.
The final chapter expands on analysis of Brazilian and Cuban ideological divergences, initially presented in the second and third chapters, between 1837 and 1850. Although there remained a slaveholding consolidation between the two states through “the expansion of slavery and the contraband slave trade,” practical differences continued to appear (p. 187). As Brazil matured as an independent state, its elites came to increasingly rely on connections to the British Empire. This partnership came at a cost to its slaveholding philosophies, if not its slave labor force. The authors point to an increased frequency of enslaved rebellions and loss of the contraband slave trade to demonstrate how elites felt the effects of Brazil’s alliance with the British Empire. Meanwhile, Spanish imperial representatives and planters in Cuba remained hostile to any argument against their continued slaveholding and importation of enslaved people from Africa. Rather than align with Britain regardless, Spanish Cuban authorities pointed to British consular officials in Havana like Robert Madden and David Turnbull as proof of their direct involvement in enslaved restlessness on the island. By the mid-nineteenth century, the abolitionist work of the British Empire in the southern Atlantic began to fade as an increasingly expansionist and, at least implicitly, pro-slavery United States meant that from 1850 both Cuba and Brazil could look north for anti-abolitionist inspiration.
The authors continue to highlight the importance of the United States in their epilogue. They end with a call to include the United States in examinations of the later nineteenth-century Atlantic World. Due to the central place of slavery in the narratives of the Third Atlantic and the economic importance of the United States to slaveholding coffee and sugar planters in Brazil and Cuba, by the 1850s slavery in the Americas could once again not be divided between Iberian and Anglophone spheres. Furthermore, the United States was the “greatest international bulwark against British antislavery pressure” and therefore biggest hindrance to the global abolitionism of the age of emancipation (p. 266). To this end, Slavery and Politics complements the transnational scholarship of Daniel B. Rood (The Reinvention of Atlantic Slavery: Technology, Labor, Race, and Capitalism in the Greater Caribbean ). Where he examines the technology and economics of nineteenth-century Atlantic slavery in the Greater Caribbean, Marquese, Parron, and Berbel look at its political culture.
Marquese, Parron, and Berbel are methodical in the presentation of these arguments. Given the enormous amount of narrative and analytical information tackled in each chapter, they opt to separate their historiographical grounding and present examinations of the relevant literature at the opening of each. While a helpful modification of the traditional approach, this does raise the question as to why they did not simply provide eight, more manageable, chapters. Despite the three authors commendably integrating their ideas cohesively, as it stands, the four-chapter format is rather unwieldy due to these vast combinations of historiography and history.
Additionally, the role of the British Empire as a lingering abolitionist heel to Brazilian and Cuban planters and later a direct aggressor in their attempts to preserve slavery is initially understated. The authors argue that British abolitionists played a key role in the Atlantic pro-slavery narrative but hide their involvement in the initial pages of the book. More upfront explanation of the role of the British Empire would have provided some helpful structural direction.
Slavery and Politics relies almost exclusively on parliamentary records. While certainly an important and voluminous source base for assessing the public motivations of an elite political class, it does have its shortcomings. For the most part this is benign. In discussion of Brazilian nonracial constitutionalism, however, the reluctance of the authors to interrogate their subjects’ discussions of inclusivity with more rigor is frustrating. Admittedly, questions of subjecthood are of secondary interest in the work, but they are nonetheless important. A more inquisitorial reading of their sources for understandings of citizenship would have therefore been welcome.
That said, the analysis and depth of historical insight in Slavery and Politics is impressive. The authors marshal a great deal of research and pay close attention to its importance not only to their primary comparisons of Brazil and Cuba but also to their secondary critique of the global capitalist system that birthed their slaveholding regimes. Slavery and Politics is therefore important reading for scholars looking to better understand Second Slavery in the Atlantic World. Additionally, it provides a useful counter to works that privilege a seemingly inevitable abolitionist dominance, which will make it interesting for those already well versed in the subject.
Note
. Dale W. Tomich, “The ‘Second Slavery’: Bonded Labor and the Transformation of the Nineteenth-Century World Economy,” in Rethinking the Nineteenth Century: Movements and Contradictions, ed. Francisco O. Ramirez (Westport, CT: Greenwood Press, 1988), 103-17.
Citation: Lewis Eliot. Review of Berbel, Márcia Regina; Marquese, Rafael de Bivar; Parron, Tâmis, Slavery and Politics: Brazil and Cuba, 1790-1850. H-Slavery, H-Net Reviews. March, 2020. URL: http://www.h-net.org/reviews/showrev.php?id=54583This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. | https://networks.h-net.org/node/11465/reviews/6051104/eliot-berbel-and-marquese-and-parron-slavery-and-politics-brazil-and |
China’s Terracotta Army has mystified scholars since the 8,099 clay warriors and horses were first discovered in Emperor Qin Shihuang’s mausoleum in 1974. The figures, meant to protect the emperor in the afterlife, were buried with him around 210-209 B.C.
At least one mystery about the imposing faux army recently was solved. It is now known that the horses and warriors were constructed in different locations, based on analysis of pollen found in fragments of terracotta that were collected from the clay figures.
The findings have been accepted for publication in the Journal of Archaeological Science.
"When the plants were flowering in the time of the Qin Dynasty 2000 years ago, the pollen flew in the air and fell in the clay, even if the pollen could not be seen with the naked eye," lead author Ya-Qin Hu told Discovery News.
Hu, a scientist in the Institute of Botany at Beijing’s Chinese Academy of Sciences, and colleagues crushed the collected terracotta fragments, washed them and performed gravity separation. The resulting organic residue was mounted in glycerol and observed under a powerful microscope.
Using these methods, the researchers identified and recovered 32 different types of pollen. The pollen found in the terracotta warrior sample was mostly from herbaceous plants, such as members of the mustard and cabbage family, the genus of plants that includes sagebrush and wormwood, and the family of flowering plants that includes quinoa, spinach, beets and chard.
The pollen detected in the terracotta horse sample, however, mostly came from trees, such as pine, kamala and ginkgo.
Hu explained that pollen in clay often is destroyed after objects are fired. Some granules survived in the terracotta, however, because the figures appear to have been fired at inconsistent temperatures with parts of the objects —especially thicker portions — not undergoing complete firing.
Based on the pollen differences, the researchers conclude that the horses were produced near the mausoleum, while the warriors were made at an as-of-yet unknown site away from the region.
The horses are large (over 6 feet long) and heavy (nearly 441 pounds) compared to the warriors, which weigh around 330 pounds. The horses also are more delicate, given their relatively fragile legs. The scientists therefore theorize that whomever planned the Terracotta Army’s construction determined it would be easier to have the horses built closer to the destination site to minimize transport.
Michael Nylan is a professor of history at the University of California at Berkeley who specializes in early Chinese history.
Nylan told Discovery News that because scientific access to the terracotta figures is difficult, it would be hard at present to verify the findings.
Pollen analysis in recent years, however, has led to some remarkable discoveries, including solving murder cases and determining the origins of other artwork.
Hu said, "We believe this work may open a new window for archaeologists to consider the possibility of finding pollen in ancient terracotta or pottery, as the pollen may tell us some stories that we want to know, but that are still unknown." | https://www.meta-religion.com/Archaeology/Asia/China/pollen_reveals.htm |
Earlier this month, two experts from the Museum of Terracotta Soldiers and Horses of Shi-Huang-Di near Xi’an, China, visited Wright State University. As part of their itinerary on August 13, Vice Curator Wang Mingsheng and Chief Chemist Rong Bo visited the Archives, as well as meeting with some of our public history students and officials from the National Museum of the United States Air Force.
The Wright State University Public History Program will soon be participating in a partnership forged by the university and the Museum of Terracotta Soldiers and Horses. Under the terms of the partnership, Wright State experts would go to the site to conduct research aimed at expanding the excavation and better protecting and displaying the mausoleum. The university would accept students from the museum seeking to learn more about conservation, historic preservation, and exhibition preparation.
Our very own Dawne Dewey, Head of Special Collections & Archives and Director of the Public History Program, plans to visit the Chinese museum in October as part of the exchange.
The Museum of Terracotta Soldiers and Horses is part of an archaeological site and mausoleum in which thousands of terracotta soldiers and other figures depicting the armies of China’s first emperor, Qin Shi Huang, were unearthed. It is believed to be one of the most important findings of the 20th century. The funerary art was buried with the emperor in 210 to 209 B.C. to protect him in the afterlife and was discovered by some farmers in 1974. The mausoleum is a World Heritage Site, listed by the United Nations, Educational, Scientific and Cultural Organization as of special cultural and/or physical significance. The museum’s labs are working to restore and preserve the terracotta figures, which are made of a clay-based ceramic.
You can read more about our guests and about the partnership between WSU and the museum in these press releases from the Wright State Newsroom: Aug. 13, 2013; Aug. 7, 2013; and June 15, 2012. | https://www.libraries.wright.edu/community/outofthebox/2013/08/29/archives-welcomed-experts-from-the-chinese-terracotta-warriors-museum/ |
XI'AN, April 15 (Xinhua) -- One of the country's most important museums will raise bronze chariots, which belonged to China's first emperor, from a subterranean showroom to a new exhibition hall above ground.
Emperor Qinshihuang's Mausoleum Museum, home to the 2,000-year-old terracotta warriors, will undergo an overhaul this year to accommodate the surge of visitors to the site, said Zhou Kuiying, deputy director of Shaanxi Provincial Administration of Cultural Heritage.
Zhou said one of the highlights is the construction of a new exhibition hall for the bronze horse-drawn chariots, which are displayed in a small underground room that is very cramped during high season.
The timeline and other details of the renovation work have not yet been disclosed.
Qinshihuang, China's first emperor, is remembered for unifying the country and building the Great Wall. He had an entire army of clay warriors and horses created to help him rule in the afterlife when he died in 210 B.C.
The terracotta army around Qinshihuang's mausoleum is one of the greatest archeological finds of modern times. It was discovered in Lintong County, 35 km east of Xi'an, in 1974 by farmers who were digging a well.
The mausoleum was later declared a National Heritage site and a World Heritage site.
The museum received about 2 million visitors annually before 2012 but this jumped to 5 million in 2013 and has continued to rise. In 2016, 5.6 million people visited the museum. | http://www.xinhuanet.com//english/2017-04/15/c_136211081.htm |
On our Tai Chi China Trip, we visited Xian, and we went to see the Terracotta Army.
These sculptures, made out of terracotta clay, are something that will stay with us for life. It was special to have witnessed their creations, as the magnitude and detail of the warriors evoked a strong sense of culture, pride, awe and wonder.
There is also a sense of the long history linked to these sculptures, as they depict the armies of Quin Shi Huang, who was the first Emperor of China.
We stood fascinated with how the people lived at those times. As well as how they as a nation came together to build what they believed would be an army ready to protect the Emperor from any ghost armies of his many victims – he was tyrant leader after all. It is said that these warriors would protect him into his after life. | http://www.mingsmartialarts.co.za/2018/05/ |
Xi’an: Two Hours Flight From Beijing
Two hours flight from Beijing brought us to Xi’an, Shaanxi province in northwest China. I had studied about Banpo Neolithic settlement and Terracotta Army but seeing these in person was an awesome experience. There I was, on my birthday, looking at the remains of 6,500-year-old Banpo village and the life size army of Qin Shi Huang, the first Emperor of China, buried underground!
A day before, our guide Mr. Cheng drove us directly from the airport to the fourteenth century fortification of the ancient city of Xi’an. The enclosed city, 14 square miles, has seen the rise and fall of many dynasties. The rectangular wall is wider at the base than the top. The walkway along the top is 8.7 miles long with four watchtowers, corner towers and drawbridges. A moat surrounds the fortification. Inside the wall some of the rare old temple structures and market places echo elements of the early Chinese architecture. The wall is the largest and best-preserved wall in China. Walking three miles on the walkway in the afternoon heat listening to Mr. Chang’s commentary was one of the most memorable times.
The next day our first stop was the museum of Terracotta Funerary Army, thousands of life size statuary of warriors of the first emperor of China, Qin Shi Huang. The display of warriors, chariots, horses, acrobats, musicians and other officials were buried with the emperor in 210-209 BCE. Its function? To protect the emperor in his afterlife as they did during his life. Most of the figures originally held metal weapons such as spears, swords, or crossbows that must have increased their realism. The mausoleum was accidently found by a farmer and excavated in 1974.
During lunch we talked about history, architecture and politics. Mr. Cheng should have been a history professor. Open minded, thoughtful and well informed we learnt a lot from him.
In the afternoon we visited Wild Goose Pagoda, a Buddhist structure. 210 feet high, it offers a magnificent view of the city. Constructed in 652 during Tang Dynasty, it was renovated in the Ming. Some of the floors are meant for worshipping some others for storing Dharma Sutras, Buddhist scriptures, brought to China from India by the monk, scholar and traveler, Hsuan-Tsang or Xuanzang (c. 602-663 CE). Hsuan-Tsang was ordained as a full monk in Chengdu at the age of twenty. Soon after he traveled to India, collected as many Buddhist scriptures as he could and, once back home, translated the original Sanskrit texts into Chinese.
As we drove back to our hotel there was a lot to take in. I wanted to take a shower and order room service. But when we opened the door to our room we were greeted by red rose petals on the bed and rose-bouquet in a green vase. And with a view of the dazzling city in the background was a cake of fresh fruit. A small golden gift box lay on the table. It held gorgeous green jade jewelry, a gift from my husband. Chinese women say ‘if you’re not wearing jade you’re not fully dressed.’ He had made reservation for dinner. | https://www.madhubazazwangu.com/2016/09/xian-two-hours-flight-from-beijing/ |
How Chinese medicine uses the potency of herbs – Dustin Grinnell
In 221 BC, Qin Shi Huang became the first emperor of China after conquering the warring states and unifying an immense territory. A leader of colossal vision, Qin oversaw the building of the Great Wall, constructed a national road system and standardized China’s currency. To protect him in the afterlife, the emperor spent almost forty years building a mausoleum in his imperial city of Chang’an in central China, guarded by the Terracotta army.
Obsessed with immortality, Qin commissioned alchemists to scour the country in search of an “elixir of life,” a concoction that would cure all diseases and stave off death. These alchemists brought back plants, minerals, animals, insects and metals from every corner of China. After repeatedly ingesting small silver balls of mercury, a highly poisonous metal, the emperor grew increasingly ill. On a tour of eastern China, he died of mercury poisoning, killed by the very elixir he had hoped would grant him eternal life. | https://chinachannel.lareviewofbooks.org/author/dustin-grinnell/ |
Emperor Qin Shi Huang was the first emperor of China. He gained the throne at the age of thirteen, serving until his death at the age of fifty. Within the time he served as ruler, Qin Shi Huang performed some of the most extraordinary tasks ever seen on this planet. He commanded his people and fought beside them as a great warrior during the Warring States Period. He led his men into battle time and time again until he brought together the seven states as one unified China. The emperor was a vicious leader blinded by his one true ambition, to create the greatest nation the world had ever seen. Unfortunately, with every action he took towards unifying his great nation, increasing paranoia of betrayal by his people and his court members followed. Through his reign, Emperor Qin Shi Huang created many enemies. These enemies (usually the rulers of one of the seven states) would send assassins to attempt murder of the emperor. Qin Shi Huang escaped death by assassination three times. He began having visions and night terrors of the enemies he had slain coming to haunt him in the afterlife. His paranoia of betrayal led him to create an army so grand that no person or creation could haunt him in the afterlife. He commanded pottery craftsmen around the nation to start working on the Terracotta Army, which was made up of thousands of life-size solders, horses, weapons, and caravans to help protect him after his death. Once China was unified as a nation, the emperor’s worries did not halt. He embarked on a project which would span the entire empire. The Great Wall of China’s construction required hundreds of thousands of citizens to slave over the massive feat. Regardless, the emperor thought the wall would keep China a unified nation, protecting it from any threatening forces and putting his nightmares to rest.
As Qin Shi Huang grew older he began thinking of who would take care of his strong nation once he was gone. The answer laid within him the entire time. The emperor began on a journey for eternal life. With a growing desire to live and rule for eternity, the emperor unknowingly drove himself to insanity. He tried various elixirs, including mercury. Doctors and alchemists thought that this mystical substance was highly indicative of increased longevity. Little did they know that by prescribing the elixirs they were actually destroying the emperor’s body, and more importantly, his brain. Eventually, the mercury elixirs and his restless thoughts pushed him over the edge. The Great Emperor, Qin Shi Huang, died and the search for immortality ended. China lost its maker.
It is said that Qin Shi Huang is buried in the largest underground mausoleum, about a football field in size. The tomb is surrounded by 180 separate pits of pottery figures depicting dancers, musicians, and artists, along with the Terracotta soldiers. On the ceiling of the tomb, thousands of gems made to look as if the cosmos of the night danced above him. On the expansive floor, his nation is recreated. The floor is a map of all he unified including the peaks and valleys of the land, as well as all the rivers and oceans. These valleys are said to be filled with liquid mercury which is circulated by a machine to recreate the actual flowing of water and as long as that water was flowing, the emperor would continue to exist in his underground tomb.
The River Runs Silver is a piece written about Emperor Qin Shi Huang. I wanted to depict not just the emperor himself but also the structures he built, the people he led, the armies he forged, the enemies he made, the paranoia he had, and the nation he unified. Although the emperor was a ruthless and vicious man, I believe that everything he did had one purpose: to create one nation with a unified people. He loved his country and people so much that nothing would stop him in securing that passion he held.
The strength of love he had for China is what keeps him alive today. And so, The River Runs Silver. | http://www.christiankolo.com/the-river-runs-silver |
There Are 8,000 Known Terracotta Warriors. But Archaeologists in China Just Found More Than 200 Others
At the tomb of Emperor Qin Shi Huang, nearly 200 more warriors from the ancient China Terracotta Army were unearthed.
The remains of the two chariots, 12 clay horses, bronze swords, arcades and decorative helmets on the site were also found by archeologists.
During the recent excavations of the No. 1 pit in an area covering 400 square meters (4 300 square feet), the finding, which was confirmed by the state-run Xinhua News Agency.
Most of the newly-found warriors were divided into two groups. One group is carrying poles, while the other carries bows, by Shen Maosheng who led the digging.
The Terracotta Army was built around 2,200 years ago to protect Emperor Qin Shi Huang in the afterlife. The army, which consists of an estimated 8,000 soldiers, over 500 horses and 130 chariots, was assembled in three main pits near to the emperor’s mausoleum.
It was first discovered in 1974 by farmers digging in northwest China. Excavations soon revealed a huge complex with thousands of soldiers, each with individual features.
The tomb is believed to span around 38 square miles and, along with the Terracotta Army, contains a mass grave of laborers and craftsmen. The complex is believed to have taken around 30 years to build.
Archaeologists launched a new excavation at No.1 Pit in 2009. The 200 new warriors were found as part of this effort. This project aimed to better understand the military service system and equipment used by the Qin Dynasty army.
According to Xinhua, No.1 Pit contains 6,000 clay warriors and horses. It is estimated to be 750-feet long and 200-feet wide.
Scientists are still working to understand how this vast army was created. Last year, researchers led by Marcos Martinon-Torres, from the Department of Archaeology at the U.K.’s University of Cambridge, announced that the weapons at the site had been remarkably well-preserved because of the natural conditions in the pits where they were buried. Previously, it had been suggested that they had been coated in some sort of advanced, anti-rust technology.
“In some ways the Terracotta Army feels like an extraordinary playground for archaeologists: It is large, complex, well-preserved, meticulously excavated and great fun,” he told Newsweek at the time. “It raises countless questions that demand tailor-made collaborative approaches and keep all of us amused.”
While the Qin Dynasty lasted just 15 years, it was the first time China was ruled as a unified country. As well as the Terracotta Army, Emperor Qin Shi Huang was also responsible for the construction of the Great Wall of China. | https://archaeology-world.com/archaeologists-excavate-200-more-chinese-terracotta-warriors/ |
A noted Chinese archaeologist has located the tomb of Ziying, the third and last emperor of the Qin Dynasty (221-207 BC) about 500 metres from the mausoleum of Emperor Qin Shihuang in the suburbs east of Xi’an, capital of the northwestern Shaanxi Province.
Ziying’s tomb, 109 meters long, 26 meters wide and 15.5 meters deep, was the second largest in the area after the grave of the first emperor himself, said Yuan Zhongyi, former curator at the Museum of the Terracotta Warriors and Horses of Qin Shihuang.
The tomb was found in 2003, and archaeologists have since been trying to identify its occupant. Subsequent excavations of bronze ware and textiles indicated the tomb dated back to the Qin Dynasty.
Yuan, who has been excavating and studying heritage pieces from the mausoleum since 1974, has come to the conclusion that the most likely occupant was Ziying, who ruled the Qin Dynasty for 46 days before it ended and he himself was killed.
"This one has to be Ziying’s tomb as the tombs of all other rulers of Qin have been located. It was natural to bury the last emperor hastily close to the mausoleum when Qin toppled," the official Xinhua News Agency quoted Yuan as saying.
He said the size, location, and sacrificial items contained in the tomb also indicated the very high status enjoyed by its owner.
Ironically, while Qin Shihuang has always been remembered as the emperor who built the Great Wall and had an entire army of clay warriors and horses sculpted to help him rule in the afterlife, his empire outlived him by only three years, according to the new find.
When Qin Shihuang died in 210 BC, his youngest son, Hu Hai, ascended the throne. Within three years the Qin Empire fell apart and the second emperor committed suicide. His tomb is located in the southern suburbs of Xi’an.
But the true identity of Qin’s last emperor Ziying remains controversial. Some historians say, he was the nephew or elder brother of the second emperor, while others believe he was the younger brother of Qin Shihuang. No one knows who was killed in 206 BC. | https://www.impactlab.com/2007/09/30/tomb-of-chinas-third-and-last-qin-dynasty-emperor-discovered/ |
Emperor Qin Shi Huang, historically a ruthless leader, created an army of Terracotta soldiers and war horses, and buried them in pits below the ground facing the nations he had conquered while alive. The emperor believed if he were attacked after death, his copper army, currently 8000 strong, would protect him.
In this original 60" X 36" acrylic, the horses have been "awakened." Their golden orbs have become eyes that see and understand the flames in the distance. The male horse on the left is confident and the young horses on the right are eager but, despite her bravery and willingness to fight, the mare in the middle knows the consequences of war.
Copyright © 2019 BossMaresArt.com - All Rights Reserved. | https://bossmaresart.com/women-equality-horses-1 |
China's ancient warrior sculptures to go on show in Te Papa
Te Papa is spending $2.6 million to bring eight of China's ancient terracotta warriors to New Zealand.
The army of sculptures, which secretly guarded the tomb of China's First Emperor Qin Shihuang for 2300 years, were discovered by chance in 1974 by a farmer digging a well.
The exhibition will feature eight warriors, two full-sized horses and two half-size replica bronze chariots, each drawn by four horses, as well as more than 160 works of ancient Chinese art.
The Ministry of Business Innovation and Employment contributed $500,000 to the Te Papa exhibition through its major events development fund.
Dr Rebecca Rice, curator of the exhibition, who visited the First Emperor's mausoleum in Xi'an, said the exhibition would provide visitors with a deeper understanding of the First Emperor's vision and his unification of China, shaping the nation as we know it today.
The First Emperor's Terracotta Army is located 1.5km east of the Emperor's burial mound in Xi'an, in the province of Shaanxi.
It is estimated that there are 8000 soldiers in total, with about 3000 having been excavated to date.
The life-size, life-like soldiers, each weigh 100-300kg and stand about 180cm high. They vary in height, uniform, and hairstyle in accordance with rank. Originally, the figures were painted with bright pigments, however much of the colour has faded over time.
Scholars continue to debate the function of Qin's Terracotta Army. Some think that, due to the fact the soldiers face east, they were intended to protect the First Emperor in the afterlife. Others question the soldiers' readiness for battle, as they are not fully armoured.
The Te Papa exhibition opens in December.
By the numbers:
2300 years old (age of the terracotta warriors)
8 full-sized terracotta warriors
2 full-sized terracotta horses
100-300kg weight range of the warriors
180cm height of the warriors
2 half-size replica bronze chariots, each drawn by four horses. | http://www.bizpodia.com/2018/09/chinas-ancient-warrior-sculptures-to-go.html |
Xian is absolutely one of the silk roads highlights! It is the capital of the Shaanxi province and one of the oldest cities in China with more than 3,100 years of history. Xian has more than 8 million inhabitants and is home of the famous Terracotta Army.
After a 122 km journey with just a few climbs in the morning, we arrived in Xian metropolitan area. Although it’s a big city, cycling through it is easy. Traffic is relaxed and the flagging is properly done. After cycling most of the day on my own, I met Candice at a busy intersection. Together we find our way, the last 10 km to the hotel, which was a bit confusing at the end. Apparently there was extra flagging for the support vehicles, which was a dead end for us… anyway, after reaching the hotel, we checked into our rooms and went for McDonalds, just around the corner! Ice cream for Candice, milkshake for Jan 😉
I went for a walk through the old Muslim quarters, and found myself walking in very narrow streets with a lot of people, ‘restaurants’, and al kind of stuff for sale. Really interesting to see what people eat, drink or otherwise consume. My favorite was the ‘egg-kebab-stick’. Or maybe the ‘sticky-rise-with-sugar-dessert-stick’. Ah, and I found the bicycle bell I was looking for. It’s like an old traditional bell, with two bells, producing a great ring-ring-ring-ring sound! My roommate Pascal says I put too much stuff on my bike, but it is good fun! The old Muslim quarter is a great place to walk around, relax, look at all what’s for sale, eat a little bit here and there. Perfect ending of a nice Silk Route day.
Although it was a rest day, I had to get up early. Zaibi has organized a tour to the Terracotta Army. This collection of terracotta sculptures was discovered by a group of farmers when they were digging a water well in the spring of 1974.
The warrior and horse sculptures are a form of funerary art buried with the emperor in 210–209 BC and whose purpose was to protect the emperor in his afterlife, and to make sure that he had people to rule over.
The figures vary in height according to their roles, with the tallest being the generals. The figures include warriors, chariots and horses. Current estimates are that in the three pits containing the Terracotta Army there were over 8,000 soldiers, 130 chariots with 520 horses and 150 cavalry horses, the majority of which are still buried in the pits. Other terracotta non-military figures were also found in other pits and they include officials, acrobats, strongmen and musicians.
It’s a one hour drive from the hotel and we get there around 08:30AM being one of the first. A Chinese tour guide, he ‘working name is Simon’, led us to the first and largest pit. Impressive! To me it seems a pretty weird idea to create terracotta warriors for the afterlife. But then again: different times, different ideas. And these terracotta warriors were made more than 2000 years ago. Although there are many warriors and I can imagine that it was a lot of work to create these, the size of the hall makes the sculptures themselves rather small. Even more due to the distance from where I’m able look at the sculptures.
Still, walking around the three pits, the terracotta warriors are impressive! It gives a really nice insight on China’s history. This has always been, and still is, a very proud nation which has created impressive things, including this terracotta army. And although there are many sculptures still buried in the ground and restoration will take a long time before completed, this was absolutely one of my highlights so far!
The afternoon is spend in bicycle cleaning, laundry and again a McDonalds Milkshake 😉
What a great city Xian is! | https://www.jankremer.net/category/silk-route-2012/china/page/2/ |
The mausoleum of China's first emperor Qinshihuang, near which the world-famous terracotta army was unearthed, would stay underground in peace in the foreseeable future, a leading expert said.
"I would not witness the excavation in my life. In the foreseeable future the mausoleum will maintain the status quo," said Prof. Cao Wei, deputy curator of the Museum of the Terracotta Warriors and Horses of Qinshihuang.
Chinese researchers in 2002 confirmed that there was a huge underground palace in the mausoleum by using remote sensing and geophysical exploration technologies, which Cao said did no harm to the mausoleum.
The Shaanxi government is planning to set up a 2.9-square-km theme park of the Qinshihuang mausoleum site and a museum of bronze chariots unearthed near the mausoleum of Emperor Qinshihuang.
The 2,200-year-old mausoleum was discovered in Lintong county, 35 km east of Xi'an, in 1974 by peasants who were digging a well. The Chinese terracotta army buried around the mausoleum was one of the greatest archeological finds of modern times.
More than 1,000 life-size figures were found, representing the Emperor's army and including officers, horses, archers, and chariots. No two soldiers in the army are alike. Each of the sand-colored statues has a different facial expression and hairstyle, and craftsmen are believed to have modeled them after areal army.
The discovery of the terracotta army, listed as a world heritage site by UNESCO since December 1987, has turned Xi'an, capital of the northwestern Shaanxi Province, into one of the nation's major tourist attractions.
A museum opened in 1979 which covers the original excavation site leaving the repaired soldiers in the place they were found. It has since received about 60 million visitors, including at least six million from abroad.
Emperor Qinshihuang ruled from 221 to 207 B.C. It is believed there are a large quantity of historical cultural relics in his mausoleum. | http://www.chinadaily.com.cn/ezine/2007-09/03/content_6075234.htm |
Xian, which means ‘western peace’, is 750 miles southwest of Beijing. Xian was the center of Chinese political power for 11 dynasties over almost 2,500 years. It was previously the capital of all of China, and it remains the capital of modern Shaanxi province. It has a population nearing 7 million.
The Western Zhou dynasty was first to establish its capital near Xian, then called Changan, in 1066 BC. The Qin dynasty, in which Emperor Qin Shi Huangdi united all of China, left its extensive legacy in and around Xian. It was also the home of the Tang dynasty (618-907 AD) which left a colorful legacy. Xian remained the capital of China until the third Ming emperor, Yongle, moved the capital to Beijing in 1420.
Xian was the eastern end of the Silk Road over which trade developed, and wealth poured in. By the 9th century, in the late Tang dynasty, Xian was the largest and wealthiest city in the world. The population was more than one million, and there were more than 1,000 temples within the vast city wall. The Silk Road also brought people of different ethnicities and faiths, and Xian remains a culturally diverse city.
Xian is rich in history, and it is the home of the Shaanxi History Museum. Its historical richness has long drawn a moderate amount of tourism to the area. However, the Terracotta army was discovered in 1974, and Xian has since become a priority to most tourists visiting China. It was a ‘must see’ for us, and we were not disappointed.
This architecturally attractive building houses more than 370,000 relics dating back to prehistoric times. There are collections of bronzes, pottery, jade, ethnic clothing, furniture, and more. The collections are well displayed, and information is provided in both Chinese and English. There is more here than can be experienced in a single day.
This is a state run factory that reproduces various sizes – from about 4” tall to life sized – of a few of the more recognized terracotta warriors. They also make and sell jade-decorated lacquered furniture and silk hand tied rugs.
They provide useful information on the making of terracotta figures, and it is interesting to watch them made. And, of course, they also sell them.
Some of their lacquer finishes were nice; however, they do not do any inlaying of jade – it is all glued on the finished piece. Although it is visually attractive, it lacks the artistry of inlaid work, and it would be a maintenance nightmare.
The silk carpets were lush. We particularly liked a small ‘prayer rug’ that supposedly had 1,000 knots per square inch and a texture like velvet.
However, this experience was a slightly milder version of the experience we had at the state run jade factory outside Beijing. The sales persons were pushy, and they quickly convinced us that we did not want to buy anything from them. We were ready to go see the real terracotta warriors!
8,000 Life-size warriors in formation
Emperor Qin Shi Huangdi, the emperor who united all of China in 221 BC, was a ruthless despot with many enemies. He was also reportedly preoccupied with death and his own legacy. He left quite a legacy – only a small fraction of it known to date.
In 1974, some local peasants were digging a well and came across some terracotta shards. As more shards were unearthed, the diggers realized that they might have found something of historical interest, and they stopped digging and notified local authorities. Indeed, those shards were the location of one of the most significant archaeological discoveries of the 20th century. Those shards were the beginning of the massive archeological digs that continue today and will likely continue for years to come.
Emperor Qin Shi Huangdi had ordered the development of a massive necropolis of which the terracotta army was one component. Shards from the terracotta army are what the farmers found while digging a well.
The terracotta army was designed to protect Qin Shi Huangdi in the afterlife. Archeologists have uncovered approximately 8,000 life sized warriors and horses so far. Each warrior is unique. Each has a unique face, hair, dress, etc. with remarkable detail such as the tread on the soles of their shoes.
The army is arranged in three ‘pits’ near one another. The total area of these pits is approximately 225,000 square feet – more than five acres.
The first and largest pit measures 750 feet long by 200 feet wide with a total area of more than 153,000 square feet – just over 3.5 acres. This pit has been well excavated since its discovery in 1974. There are more than 6,000 warriors in pit 1, and there are 45 chariots with horses. The life sized warriors, horses, and chariots are arranged in 9 columns. This army is in a defensive formation.
The second pit, which is still being excavated, is less than half the size of pit one. It measures slightly less than 65,000 square feet – approximately 1.5 acres. Pit 2 contains 11 wooden chariots and 67 pottery chariot horses. It also contains 32 terracotta cavalrymen and 163 terracotta warriors with nearly 900 bronze weapons and 29 pottery horses. These appear to be in four separated groupings.
Pit 3, in which excavation has just begun, is only 5,400 square feet. It appears to be the army’s command center. It contains 1 wooden chariot, 68 terracotta warriors, 4 terracotta horses, and 34 bronze weapons.
The terracotta army is just a piece of Emporer Qin Shi Huangdi’s tomb. There is a large hill nearby that is believed to contain the actual tomb; however, it has not yet been excavated for numerous reasons including rivers of mercury within and surrounding it. However, a few items have been recovered, and they are spectacular. On display nearby are two bronze chariots that have been recovered. Each is half size, and each is made up of more than 3,600 individual pieces. These were found within wooden coffins.
It is estimated that the building of this tomb employed 700,000 to 800,000 workers over more than a decade. Unfortunately, it is also believed that many of those workers as well as the emperor’s concubines were buried alive with him in the actual tomb.
Clearly a few snapshots and brief paragraphs cannot capture the scope of this. It is probably the most amazing man-made thing either of us has ever seen. The interested reader is referred to the April, 1978, issue of National Geographic magazine. This was the cover story of that issue.
It was once common for Chinese cities to be enclosed within walls. The Xian city wall was built in 1370 by the first Ming emperor, Hong Wu. The wall was built of rammed earth, lime, and glutinous rice. The wall was built on the foundations of the former Tang imperial palace. Although most city walls have disintegrated over time, the Xian city wall has been maintained and is intact.
This wall is nine miles long and encloses Xian’s city center which is approximately 1.75 miles north-south and 2.75 miles east-west – a total of 4.8 square miles. The wall is 39 feet high and up to 59 feet thick in places. Although it appears enormous, it is actually a very small version of the city wall that the Tang dynasty had built around 30 square miles of Xian – more than six times the area enclosed by the Ming-built wall. However, the Tang-built wall did not survive.
Visitors can climb the wall and walk around it or even rent bicycles to ride around. It is a great vantage point from which to look over the sights of ancient and modern Xian.
On top of – not outside of – city wall
Xian was located at the eastern end of the historic Silk Road, and numerous ethnicities and faiths entered Xian via that route. A substantial sized Muslim population developed within Xian, and it remains today.
The Great Mosque was built during the Tang dynasty, and it draws many visitors. However, we were more interested in experiencing the slice of life to be found roaming the streets of the Muslim Quarter. It was a rich and colorful marketplace with mostly shops and eateries at street level and living quarters on the second level. The Muslim Quarter is a lively section of town inside the city wall.
Little Wild Goose Pagoda
This pagoda is one of the few surviving structures built during the Tang dynasty. During that time period, most temples were built of wood, and they were at risk of fire. This temple was built to store sacred scriptures brought from India over the Silk Road, and those scriptures needed to be protected from fire, so the temple was built of brick. This 141 foot high pagoda was completed in 709 AD.
Although the temple was fire resistant, it was not invulnerable to earthquakes. Sometime prior to 1487, the top of the pagoda fell off during an earthquake. In 1487, another earthquake caused a large fracture along its length; however, another earthquake a century later reversed the damage.
Although we learned the history of the unusual name of this pagoda, neither of us can remember it. There is also a Big Wild Goose Pagoda.
Tang Dynasty Show – This was an evening show in a dinner theater designed to show off the grandeur of the Tang dynasty. It was a performance of Tang-era dancing in period costumes. We do not know the degree of authenticity in the costumes we saw, but they were magnificent! It was a pleasant evening.
We would have liked to spend more time in Xian, but we could not. We had reservations to fly to Wuhan then drive 200 miles further west to begin our trip up the Yangtse River. | https://svpassage.com/index.php/xian/ |
In central China, a vast underground mausoleum conceals a life-size terracotta army of cavalry, infantry, horses, chariots, weapons, administrators, acrobats, and musicians, all built to serve China's first emperor, Qin Shi Huang Di, in the afterlife. Lost and forgotten for over 2,200 years, this clay army, 8,000-strong, stands poised to help the First Emperor rule again beyond the grave. Now, a new archaeological campaign is probing the thousands of figures entombed in the mausoleum.
With exclusive access to pioneering research, "Emperor's Ghost Army" explores how the Emperor directed the manufacture of the tens of thousands of bronze weapons carried by the clay soldiers. NOVA tests the power of these weapons with high-action experiments and reports on revolutionary 3D computer modeling techniques that are providing new insights into how the clay figures were made, revealing in the process the secrets of one of archaeology's greatest discoveries.
What do the Chinese People Believe? | https://fontanalib.kanopy.com/video/nova-emperors-ghost-army |
The International Astronautical Federation welcomes the establishment of IAF Regional Groups aimed at improving the exchange of information on space activities and facilitating the development of regional cooperation in space venture and space applications.
The IAF Regional Groups are formally established by the IAF General Assembly following a recommendation from the Bureau. It is expected that IAF Regional Groups will be established in the Asia-Pacific Region, in Africa, in Latin America and possibly elsewhere. Each Regional Group will define the group of nations belonging to its region. IAF Regional Group are composed of IAF Members based in the region on a voluntary basis. No IAF Member based in a specific region can be excluded from an IAF Regional Group.
The IAF Regional Groups advise the IAF via its Bureau on matters pertaining to the outer space activities of their region.
The IAF Regional Groups review and report to the IAF via its Bureau on the status of the space activities and technologies in their region. They submit recommendations to encourage and facilitate cooperation in their region in the uses of outer space. The IAF Regional Groups encourage institutions, corporations and individuals based in their region, especially those from the developing nations, to take interest and participate in the activities of the Regional Groups and in the wider framework of IAF. They coordinate representatives of the region in promoting space research and technology, formulating local demands in technology and applications, define regional interests, discuss membership matters, political priorities and stimulate proposals on potential venues for futures IACs.
The IAF Regional Groups Chairs and their members are invited to work closely with other existing regional forums for exchange and cooperation in space activities in order to deepen the understanding among various actors in the region and to strengthen the regional cooperation and capacity for application of space technologies for peace and sustainable development.
The IAF Regional Groups will work in cooperation and coordination with the other IAF Regional Groups in order to facilitate exchange and dialogues to strengthen international cooperation in space activities at a global and inter-regional level.
For the history of the IAF Regional Groups, read the Daejeon Declaration. | https://www.iafastro.org/committees/iaf-regional-groups/ |
The Prime Minister of India was on a two-day visit to Russia to attend the 20th India-Russia annual summit and the 5th meeting of the Eastern Economic Forum (EEF) in Vladivostok.
- This is the first time that an Indian Prime Minister visited the Russian Far East Region (Vladivostok).
Key Takeaways
- Special and Privileged Strategic Partnership: Both the leaders agreed to facilitate, in all possible ways, exploring the impressive potential of their strategic partnership to the fullest, while demonstrating the special and privileged nature of the partnership.
- Supported India’s decision on J&K: Russia has backed India’s move on Jammu and Kashmir, saying that the changes in the status are within the framework of the Indian Constitution.
- Both the countries underlined the primacy of international law and emphasised their commitment to the purposes and the principles stated in the UN Charter including the inadmissibility of interference in the internal affairs of member states.
- Development of Russian Far East: India would extend a $1 billion line of credit towards the development of the Russian Far East.
- An area of special interest for India is the exploration of hydrocarbon reserves along the coast of Russia’s Far East.
- Also, engaging closely with East Asia is in line with India’s policy goal of “Act East”.
- Maritime Route: A proposal was made to have a full-fledged maritime route between Chennai and Vladivostok.
- Vladivostok is at a short distance from Russia’s border with China and is also the largest port on Russia’s Pacific coast.
- India is building nuclear power plants with Russia’s collaboration in Kudankulam on the sea coast in Tamil Nadu’s Tirunelveli district. The opening of a sea route is likely to help in the project.
- It will also increase India’s presence in the Indo-Pacific, and especially the South China Sea, a deeply contested patch of the ocean.
- Collaboration in Space: Russia, would help train Indian astronauts for the manned space mission — the Gaganyaan project.
- Both sides expressed concern over the possibility of an arms race in outer space and advocated peaceful uses of outer space.
- Economic Cooperation:
- The two leaders decided to take the bilateral trade from the current $11 billion to $30 billion by 2025.
- The work on promoting mutual settlements of payments in national currencies will be continued.
- Create new technological and investment partnership, especially in advanced high-tech areas and find new avenues and forms of cooperation.
- Agreed to speed up preparations for the signing of the India-Russia Intergovernmental Agreement on Promotion and Mutual Protection of Investments.
- Agreed to intensify work for eliminating trade barriers. This would be facilitated, inter alia, by the proposed Trading Agreement between the Eurasian Economic Union (EAEU) and India.
- Military Cooperation:
- The talks highlighted that the sanctions imposed by the US on Russia has no effect on India strengthening cooperation with the country in strategic sectors such as energy and defence.
- Both the countries are successfully implementing their bilateral programme on military and technical cooperation up to 2020 and working to update the same to extend to another 10 years.
- Cooperation in International Issues:
- Called for reform of the UN Security Council. Russia expressed its support for India’s candidacy for permanent membership of the UNSC.
- Condemned terrorism in all its forms and manifestations and called on the international community to set up a united front to fight against this evil.
- Reiterated their commitment to further strengthen global non-proliferation. Russia expressed its strong support for India’s membership in the Nuclear Suppliers Group (NSG).
- India is ready to play a significant role in the Arctic Council.
- Support an inclusive peace and Afghan-led and Afghan-owned reconciliation in Afghanistan.
- Reaffirmed their commitment to building an equal and indivisible security architecture in Asia and the Pacific region.
Exercise TSENTR 2019
- Exercise TSENTR 2019 is part of the annual series of large scale exercises that form part of the Russian Armed Forces' annual training cycle.
- The series rotates through the four main Russian operational strategic commands i.e Vostok (East), Zapad (West), TSENTR (Centre) and Kavkas (South).
- The 2019 exercise will be conducted by the Central Military Commission of Russia.
- The exercise is planned between 9th September to 23rd September 2019 at Donguz training ranges, Orenburg, Russia.
- Apart from host Russia, military contingents from China, India, Kazakhstan, Kyrgyzstan, Tajikistan, Pakistan and Uzbekistan will also take part in this mega event.
- These annual exercises have slowly begun taking an international character, with Belarus participating in ZAPAD-2017 and China and Mongolia participating in VOSTOK-2018.
- The exercise aims at evolving drills of the participating armies and practising them in the fight against the scourge of international terrorism thereby ensuring military security in the strategic Central Asian region. | https://www.drishtiias.com/daily-updates/daily-news-analysis/india-russia-4 |
The Commonwealth of Independent States (CIS) is a regional intergovernmental organisation formed in 1991, and currently composed of Azerbaijan, Armenia, Belarus, Georgia, Kazakhstan, Kyrgyzstan, Moldova, Russia, Tajikistan, Turkmenistan, Uzbekistan, and Ukraine.
The aim of the organisation is to facilitate and strengthen cooperation among its member states in the political, economic, ecological, humanitarian, cultural, and other fields. Other objectives of CIS include: support the economic and social development of member states withing a common economic space, ensure human rights and fundamental freedoms in accordance with universally recognised principles, facilitate cooperation among member states in ensuring international peace and security, and promote peaceful settlement of disputes and conflicts between member states.
Areas of cooperation for CIS members include economy, finance, security, humanitarian issues, legal matters, exchange of scientific and technical information, and inter-regional and cross-border issues. Economic cooperation also covers aspects related to information and communications technologies and the information society. In this area, the CIS had adopted, for example, a Strategy of cooperation in the construction and development of the information society up to 2025, as well as an Action Plan for its implementation. Cybersecurity and cybercrime issues are also in the attention of CIS member states, who have agreed on a framework of cooperation on combating crimes committed through information technologies, and adopted an agreement on cooperation in the field of ensuring information security. | https://dig.watch/actors/commonwealth-independent-states |
Russia and China have announced plans to collaborate on building a moon base for future lunar research, according to a statement appearing at the website of the Russian Federation’s space program.
The Roscosmos State Corporation for Space Activities, which oversees spaceflight and cosmonaut activities as an agency of the Russian Federation, made the announcement on Tuesday.
According to the statement, the two countries endeavor to work together, “guided by the principles of parity distribution of rights and obligations,” and will “promote cooperation in the creation of an open access missile system…aiming to strengthen research cooperation and promote the exploration and use of outer space for peaceful purposes for the interests of all mankind.”
The plan outlines construction of what the Russian space agency has dubbed the “International Scientific Lunar Station,” an experimental research facility which will either orbit, or actually exist on the surface of the Moon. The aim of the moon base will be “to carry out multidisciplinary and multipurpose research work, including the exploration and use of the Moon, lunar observations, fundamental research experiments and technology verification with the possibility of long-term unmanned operation with the prospect of a human presence on the moon,” the Roscosmos statement reads.
The timing of the statement appears to coincide with the birthday of cosmonaut Yuri Gagarin, whose 108-minutes in orbit around the Earth marked the first human spaceflight. Gagarin was born on March 9, 1934.
Roscosmos says that Russia and China have maintained a tradition of cooperation with their spacefaring aspirations. “To date, within the framework of interaction in the field of lunar and deep space exploration,” the Russian agency said, “an Agreement has been signed and is being successfully implemented between the Roscosmos State Corporation and the Chinese National Space Administration,” which in addition to the proposed lunar research facility will be aimed at cooperation between the two agencies with relevance to Russia’s Luna-Resurs-1 orbital spacecraft, as well as China’s Chang’e-7 lunar mission.
It was reported late last year that Russia had been hesitant to commit to future involvement with the United States on future operations, specifically NASA’s project Gateway, a proposed orbital lunar base which will aim to lay the groundwork for future long-term human activities on the Moon, “as well as a staging point for deep space exploration.” Gateway is described by NASA as “a critical component of NASA’s Artemis program.”
Last October during a panel at the International Astronautical Congress, director general of Roscosmos Dmitry Rogozin said that he doubted Russia would play a significant role with the Gateway project, despite commitments from other international partners which included Japan, Europe and Canada, saying that the lunar Gateway “in its current form is too U.S.-centric.”
“Russia is likely to refrain from participating in it on a large scale,” Rogozin said at the time. | https://thedebrief.org/russia-and-china-plan-to-build-a-moon-base-russian-space-agency-says/ |
sit up agonist and antagonist muscles
As it moves, a second muscle acts as an opposing force to resist the movement. Antagonist and agonist muscles work in pairs to accomplish a full range of movements and actions. Select your Enquiry Subject They lengthen during the dumbbell lifting phase and shorten during the dumbbell lowering phase. For example, the tongue itself is a composite muscle made up of various components like longitudinal, transverse, horizontal muscles with different parts innervated having different nerve supply. Agonist muscles and antagonist muscles refer to muscles that cause or inhibit a movement. Skeletal striated muscle, or "voluntary muscle", primarily joins to bone with tendons. Thus the short fibers of pennate muscles are more suitable where power rather than range of contraction is required. The majority of muscles are grouped in pairs, with an antagonist to each agonist muscle. Antagonist and agonist muscles often occur in pairs, called antagonistic pairs. An example of an antagonistic pair is the biceps and triceps; to contract, the triceps relaxes while the biceps contracts to lift the arm. Likewise, the opposing muscles may be unable to stretch sufficiently to allow such movement to take place (passive insufficiency). This term typically describes the function of skeletal muscles. 11.1 Describe the roles of agonists, antagonists and synergists Interactions of Skeletal Muscles in the Body . But what are agonist and antagonist muscles and what are their roles in muscle movement? , Cardiac muscle is specific to the heart. One muscle of the pair contracts to move the body part, the other muscle in the pair then contracts to return the body part back to the original position. There is an important difference between a helping synergist muscle and a true synergist muscle. While the arm is flexed, the triceps act as the antagonists during a bicep curl. For the knee to flex while not rotating in either direction, all three muscles contract to stabilize the knee while it moves in the desired way. Synergist muscles perform, or help perform, the same set of joint motion as the agonists. However, muscle contraction cannot act to push the bone back into its original position, and because of this, muscles work in 'antagonistic muscle pairs'. One muscle of the pair contracts to move the body part, the other muscle in the pair then contracts to return the body part back to the original position. However, muscles don't always work this way; sometimes agonists and antagonists contract at the same time to produce force, as per Lombard's paradox. Some fixators also assist the agonist and act as a synergist. During slower joint actions that involve gravity, just as with the agonist muscle (mentioned above), the antagonist muscle can shorten and lengthen. When it is extended, the biceps act as the antagonists. While the arm is flexed, the triceps act as the antagonists during a bicep curl. Your body is made up of muscle pairs. They move our bones and associated body parts by pulling on them – this process is called muscle contraction. During flexing of the forearm the biceps brachii is the agonist muscle, pulling the forearm up towards the shoulder. With this kind of specialised knowledge in your utility kit, you will be able to get better results for yourself and others when working out. Also, sometimes during a joint action controlled by an agonist muscle, the antagonist will be slightly activated, naturally. Read about our approach to external linking. The insertion and origin of a muscle are the two places where it is anchored, one at each end. Should You Include Foam Rolling In Your Pre-Workout Routine? Find out more in the article. The abdominals can act as fixators to stabilise the body for hip and knee movements. Muscles, however, are not specifically antagonist or agonist. The hamstrings are the agonist and the quadriceps are the antagonist. As one muscle contracts, the other relaxes. The trapezius muscle can act as a fixator when the biceps is flexing the elbow joint. In the contact and recovery phase, the quadriceps contract to extend the knee while the hamstrings lengthen to allow the movement.
To use an automotive analogy, this would be similar to pressing your accelerator pedal rapidly and then immediately pressing the brake. Here it is important to understand that it is common practice to give a name to a muscle group (e.g. The abdominals would be acting as fixators. In the contact and recovery phase, the quadriceps. The insertion of a muscle is the structure that it attaches to and tends to be moved by the contraction of the muscle. The "elbow flexor" group is the agonist, shortening during the lifting phase (elbow flexion). The quadriceps are the agonist and the hamstrings are now the antagonist.
David Caero Ethnicity, Maci Knee Surgery Blog, English To Farsi Translator, Don John Of Austria Poem, Funny Things To Post On Someone Else's Facebook, 22 Nosler Hog Hunting, Scottish Border Collie, Geometric Tortoise Interesting Facts, Love Sosa Meme, How To Make An Upside Down Question Mark On Google Docs, What Happened To Bubba Sparks 2019, Juice Movie Script, St Francis Symbols, Suigetsu Hozuki Death, Charles Tisseyre Et Nevine Ayad, 57 Oldsmobile J2, Lillian Miles Age, Cz 527 Picatinny Rail, Johnny Clegg Merchandise, Rajapalayam Dog For Sale In Namakkal, Nhl 20 Eashl Playoffs Schedule, 2017 Isuzu Mux Service Schedule, Ford Nesc Website, Ransom Directors Cut 2, Lucy Bronze Salary, How To Tell If A Scarab Bracelet Is Real, Stevens Model 67 Ejector Problems, Tay Strathairn Tooth, Null Hypothesis Example, Dsdm Vs Rad, Unlucky Mansion Chapter 52, Lips Tattoo On Bum Meaning, Drinking Gone Off Milk In Pregnancy, Tite Kubo Interview 2020, Francis Ngannou Height, Wakeboard Vest Clearance, Nick Super Brawl, Cheel Bird In English, | http://grandpin.ch/site/sit-up-agonist-and-antagonist-muscles-1b7456 |
The range of motion of the knee joints is often small in elderly people. These exercises strengthen the musculus quadriceps femoris, especially the vastus medialis, thereby increasing the range of motion and length of stride, stabilizing the knees, and enabling individuals to climb stairs easily.
Characteristics
-
Muscles trained
●musculus quadriceps femoris
-
-
- The design exerts an ideal load tailored to the knee muscle groups by making the load lighter than the set value near the maximum bend and extension points.
- The machine is designed to vary the weight applied so that it is ideally suited for the muscles of the knee joint. For example, the weight applied becomes lighter than the preset level at the points of maximum flexion and extension.
- Muscle strength measurement results can be displayed as a WBI value. (For WBI measurements, patient weight must be entered. When measuring, please be careful of your knee angle.)
-
Adjustment of the backrest position
-
Adjustment of the pad position
-
Adjustment of the initial angle
What is the WBI(weight bearing index)
The WBI is found by taking the maximum voluntary contraction(MVC) of the knee joint extension muscle groups and dividing it by body weight.It is used as an index for evaluating leg motor function.
Main specification
|Model||Weltonic WTS-02|
|Rated supply voltage and frequency||Single-phase 230Vac, 50 Hz|
|Power input||600 VA|
|Protection against electric shock||Class I, type B|
|External dimensions||Width 785 mm
|
Depth 1,320 – 1,450 mm
Height 1,220 mm
|Weight||83 kg|
|Trained muscles||Musculus quadriceps femoris|
|Load setting||20 – 500N / 2 – 50kg
|
Accuracy at indicated as N :±5%F.S.
|Muscle strength measurement||100 – 850N / 10 – 85kg
|
Accuracy at indicated as N :±5%F.S. | https://www.minato-med.co.jp/en/products/wt_s02/ |
Patellofemoral Pain Syndrome (PFPS) is associated with anterior knee pain, changes in functional capacity, balance and muscle strength disorders.
To quantify pain, functional capacity, strength in quadriceps (Q), gluteus medium (GM), hip external rotator (ER) muscles and balance in sedentary women with PFPS.
Twenty sedentary women, aged 18 to 25 years, were divided into two groups: PFPS (N=10) and control group (N=10). All the volunteers answered the items of the Visual Analogue Scale (VAS), the Lysholm Knee Score Scale, the Anterior Knee Pain Scale (AKPS), and the Lower Extremity Functional Scale (LEFS). The participants performed the following tests: maximal voluntary isometric contraction measured by dynamometry; postural balance using the Star Excursion Balance Test (SEBT) and a force platform. Statistical analyses were performed using the Shapiro Wilk test, the Mann Whitney U test and Spearman’s correlation coefficient. Data were submitted to SPSS 20 software.
The PFPS group presented greater pain, balance impairment and higher average velocity of oscillation; however, no differences were observed in Q, GM and RE muscle strength and in balance analyzed by SEBT.
Women with PFPS exhibited greater pain, worse functional capacity and body balance. Moderate correlation between both balance tests suggests the use of SEBT when the force platform is not available, which could facilitate and highlight the importance of clinical diagnosis with regard to postural balance.
A Síndrome da Dor Femoropatelar (SDFP) está relacionada à dor anterior do joelho, alteração de funcionalidade, déficits de equilíbrio e força muscular.
Quantificar a dor, funcionalidade, força muscular do quadríceps (Q), glúteo médio (GM), rotadores externos de quadril (RE) e o equilíbrio em mulheres com SDFP.
Avaliou-se 20 voluntárias, sedentárias, entre 18 e 25 anos; divididas em grupo SDFP (N=10) e controle (N=10). Todas responderam a Escala Visual Analógica de Dor, Lysholm Knee Score Scale, Anterior Knee Pain Scale e Lower Extremity Functional Scale, realizaram a contração isométrica voluntária máxima dos músculos Q, GM e RE por meio de dinamometria e análise do equilíbrio postural pelo Star Excursion Balance Test (SEBT) e plataforma de força. Para análise estatística utilizou-se os testes Shapiro Wilk, Mann Whitney e Correlação de Spearmann, pelo SPSS® 20.
O grupo SDFP apresentou maior dor, incapacidade e velocidade média de oscilação do centro de pressão, entretanto não foram observadas diferenças para a força muscular de Q, GM e RE e equilíbrio analisado pelo SEBT. Estabeleceu-se correlação moderada entre SEBT e Centro de Oscilação de Pressão (COP) unipodal.
Mulheres com SDFP apresentam maior dor, pior funcionalidade e alterações no equilíbrio corporal. A correlação moderada entre SEBT e o COP-unipodal aponta a possibilidade de uso deste teste funcional quando a plataforma de força não é acessível, o que facilita e destaca a importância do diagnóstico clínico do equilíbrio postural.
Patellofemoral pain syndrome (PFPS) is described as retropatellar or anterior knee aching pain and characterized by crepitation in the patellofemoral joint during and after activities, such as squatting, walking up or down stairs and sitting for prolonged periods1. Sedentary women are more likely to develop PFPS2. It affects 1 in 4 individuals, with 20 to 40% of the population with ages between 15 and 35 years3. Some anatomical variations, namely pelvic width, femoral antevesion, quadriceps angle, tibial torsion, quadriceps strength and knee joint laxity, are seen more commonly in women4. Factors believed to contribute to production of patellar pain include poor alignment between the joint surfaces, muscle shortening, weak vastus medialis oblique (VMO), different recruitment patterns between VMO and vastus lateralis (VL), weak quadriceps muscles, vigorous training and incongruity between patella and femoral trochlear groove5), (6), (7), (8.
The quadriceps muscle is responsible for activating the forces exerted on the patella, whose function is to control the position of the patella in relation to the trochlea9. Improper positioning of the patella, differences in quadriceps muscle recruitment and pain can affect balance and motor control in PFPS10. The VMO opposes the lateral vector force of the VL. The imbalance between these muscles may contribute to the emergence of symptoms as it changes the biomechanics of the knee and increases the patellofemoral compression forces. Another factor related to PFPS is the weakness of the GM and the ER muscles11), (12. Fukuda et al.13 determined that the strengthening of these muscles may reduce pain and improve functional capacity.
It is known that body balance is essential for daily life activities and sports14. With regards to PFPS, Citaker et al.15 found that women with PFPS had worse postural balance during the balance test on an unstable platform. Chen et al.16 also observed that individuals with chronic knee instability presented worse score during the Star Excursion Balance Test (SEBT).
Considering the high prevalence of women with PFPS that seek for physical therapy, the biomechanical changes previously reported in the literature, the disagreement between results established by research on PFPS, and the possibility of using SEBT as a functional test for the analysis of balance in this population, it is believed that studies are still needed to establish and determine the biomechanical standards for assessment and rehabilitation.
Therefore, the main purpose of this study was to quantify pain, functional capacity, and quadriceps (Q), gluteus medium (GM), hip external rotator (ER) muscle strength and balance in sedentary women with PFPS.
This was a cross-sectional study approved by the Research Ethics Committee of the institution (Case N. 251637/2013).
The sample size calculation was performed using the Power and Sample Size software (Vanderbilt School of Medicine Biostatistics, Nashville, TN), with 95% confidence interval, 5% level of significance and 80% power, considering the mean and standard deviation of the parameter data obtained before SEBT16. The volunteers were 20 sedentary, university female students divided into two groups: the PFPS group (n = 10) and the control group (n = 10).
The inclusion criteria for the PFPS group, according to Santos et al.5, were: presence of at least three clinical signs, such as patellar crepitus, high patella, contracture of the iliotibial band, retraction iliotibial tract, excessive subtalar pronation, patellar hypo - or hypermobility, patellar malalignment and lateral tibial torsion; report of three or more functional conditions including squatting, going up and down the stairs, kneeling, running, sitting for a long period of time; pain intensity of 3 or more in the VAS. The volunteers in the control group should not present any pain intensity in the knee joint or anywhere else in the last six months, but the presence of up to two signs of postural changes was accepted. The exclusion criteria for both groups were: recent history of knee surgery; cardiovascular, neurological or rheumatological diseases; diabetes or alteration of plantar sensitivity; use of medication; previous physical therapy; and inability to perform the functional tests proposed in this study or to attend the scheduled assessments.
The flowchart of the experimental procedures is presented in Figure 1. On the first day of data collection, all the participants filled out a form with name, age, height and weight and marked the items on the VAS-pain17), (18, the Anterior Knee Pain Scale - AKPS)19, Lysholm Knee Score Scale20 and the Lower Extremity Functional Scale (LEFS)21), (22. The volunteers were informed about the objectives of the study and agreed to participate by providing their free and informed consent.
Figure 1 Flow chart for sample selection and data collection.
Prior to performing all measurements, the subjects were familiarized with the maximum voluntary isometric contraction (CIVM), followed by the measurement of Q, GM and ER muscle strength using a dynamometer (EMG System do Brasil® Ltda, São José dos Campos - SP, Brazil).
For the measurement of quadriceps strength, the volunteer sat on a chair with the back supported and fixed, knee in open kinetic chain in 60° flexion for greater muscle activation of VL and VMO muscles23. An ankle strap connected to a force transducer was fastened to the volunteer, who was verbally encouraged to strengthen while extending the knee and maintain it during 10 seconds of MVIC (Figure 2A).
Figure 2 A - Analysis of quadriceps muscle strength. B - Analysis of hip external rotator muscle strength. C - Analysis of gluteus medium muscle strength.
For the MVIC of the hip lateral rotators, the chair was positioned laterally to the force transducer (Figure 2B). For the GM muscle, the volunteer remained in decubitus contralaterally to the member to be tested, while performing MVIC abduction at 30° (Figure 2C). All tests were carried out following a sequence protocol for data collection: quadriceps, external rotators and gluteus medium. The mean of the three values found was considered for the analysis.
On the first collection day, the SEBT was used to measure balance24), (25. For this test, the volunteer performed three repetitions, with 30-second intervals between each one. In the PFPS group, the lower limb with pain was analyzed. In the control group, the lower limb to be analyzed was chosen by the volunteer. After completing the test, the reach distance in each direction was normalized to the lower-limb length of each volunteer to obtain the percentage of the three directions, as shown in the formula below24, where A indicates the anterior distance, PM the posteromedial distance, PL the posterolateral distance, LL the length of the lower limb and the result is the percentage of the three directions.
Finally, after a week of the initial assessment, balance was tested on a force platform (BIOMEC400-EMG System do Brasil® Ltda, São José dos Campos - SP, Brazil). The participants stood with eyes open, under unipodal condition performed with the limb with pain (in PFPS group) and leg preferred for 30s. There was a rest period of approximately 30s between each trial. The procedure was repeated three times and the mean was retained for analysis26. The parameters associated with movements of the center of pressure (COP) were: the ellipse area (95%) of the COP (A-COP in cm2) and mean velocity (VEL in cm/s) of the COP sway in the mediolateral (M/L) direction.
Normal data distribution was verified using the Shapiro-Wilk test. Student's t-test was used for between-group comparisons for each variable. The Spearman’s correlation coefficient was used to examine the relationship between the balance data. The statistical analysis was performed using SPSS version 20 for Windows (SPSS Inc.; Chicago, IL, USA), with a 5% level of significance (p < 0 .05).
The groups were homogeneous regarding height, weight and body mass index (BMI). Both groups presented mean values and standard deviation, respectively: age 21.1m (1.10) and 22.0 (1.59) (p = 0.019); height 1.65 (0.06) and 1.64 (0.03) (p = 0.379); weight 60.2 (8.07) and 63.0 (7.40) (p = 0.739); and BMI 21.8 (1.79) and 23.25 (3.20) (p = 0.721). Mean and standard deviation of pain in the PFPS group were 3.75 years and 1.24 years, respectively. In the CG, it was zero. The results obtained through the questionnaires and functional scales showed that the PFPS group had increased pain and disability, with significant differences compared to the control group (Table 1).
Note: PFPS- Patellofemoral Pain Syndrome; VAS- Visual Analogue Scale; AKPS- Anterior Knee Pain Syndrome; LEFS- Lower Extremity Functional Scale.
No significant difference was observed between the groups regarding the quadriceps, hip external rotator and gluteus medium muscle strength and balance analyzed using SEBT (Table 2). The analysis of postural balance measures obtained using a force platform showed significant differences between the groups for the mean velocity of the COP sway in the mediolateral direction, with better balance control in the CG (Table 2). The correlation was considered moderate for COP-unipodal and SEBT (p = 0.046, r = 0.451) (Table 3).
Note: PFPS- Patellofemoral Pain Syndrome; SEBT-Star Excursion Balance Test; kgf - Kilogram-force; COP- Center of Oscillation of Pressure; MV- Mean Velocity.
Note: PFPS- Patellofemoral Pain Syndrome; SEBT- Star Excursion Balance Test; COP- Center of Oscillation of Pressure; MV- Mean Velocity.
The present study showed that sedentary women with patellofemoral pain syndrome exhibited greater pain, functional impairment and velocity of the COP sway in the mediolateral direction. Patellofemoral pain is multifactorial and is therefore difficult to examine and treat.
This study proved that pain and balance impairment are important aspects to be considered in the rehabilitation of this dysfunction. Pain is the main symptom of PFPS and can be subjectively evaluated using VAS which also appears to be a valid and reliable instrument17. The results of the present study showed that women with PFPS revealed a significantly greater improvement in the intensity of pain. This result agrees with Souza et al.27 that have also observed an increase in the intensity of pain in individuals with PFPS compared to controls. Piazza et al.4 added that there was exacerbation of pain during activities, such as squatting, going up or down stairs or ramp, and walking on flat surface.
With pain increase in daily life activities, the functional capacity should be considered. The use of questionnaires and the AKPS, Lysholm and LEFS scales has established significantly lower values for the PFPS group. The AKPS was validated and translated into Brazilian Portuguese for measuring PFPS19. It can also predict pain and functional limitations of the individuals. Bolgla et al.12 and Fukuda et al.28 showed that subjects with PFPS yielded a score between 64.5 and 80 in AKPS, which corroborate the score of 80 points obtained in the current study for this group. The LEFS can be used to evaluate the functional impairment of a patient with a disorder of one or both lower extremities. The results showed lower values, indicating worse functional capacity in the lower limb of women with PFPS.
With regard to functional capacity, the results obtained using the Lysholm Knee Scale questionnaire also showed lower values for the PFPS group, as well as the results obtained by Dickschas et al.29, who found similar scores to those found for individuals with chronic patellar instability.
The study has also assessed the strength of the hip abductor and external rotator muscles in women with PFPS. This assessment can be justified by the association of the weakness of these muscles with that of the knee valgus, as well as the association between the dynamic valgus and the unipodal support during functional activities and sports. It is believed that the knee valgus position gives support to the patellar lateral region with the external condyle of femur leading to chondral lesion and causing pain28. Bolgla et al.12 hypothesized that women with PFPS would demonstrate significantly less hip abductor and hip external rotator strength when compared to controls. A similar result was found by Meira et al.30 with regard to hip strength muscles.
Other authors claimed that there is less hip strength as well as greater impairment in quadriceps muscle strength31. However, no significant differences were found in quadriceps muscle strength in the study carried out by Souza et al.26 and in our study. Barton et al.8 reported that the recruitment of the GM muscle occurs significantly late during functional activities, therefore, the dysfunction could appear in muscle activation and not in muscle strength. These results may have been influenced by the sample that included young volunteers with normal daily activities, with complaints of pain, and also by a sample that obtained a maximum score of 80 (AKPS), as established by Fukuda et al.28.
The present study investigated static postural control using the SEBT16. It is a lower extremity functional test that can be easily applied in the clinical and research settings by physical therapists when a force platform, the gold standard for the analysis of body balance, is not available. The SEBT has been shown to be a reliable measure and has validity as a dynamic test to predict risk of lower extremity injury, to identify dynamic balance deficits in patients with a variety of lower extremity conditions32. Chen at al.16 observed that individuals with chronic ankle instability had significantly smaller reaching distance in the posterior-lateral and posterior-medial during SEBT. This finding differed from that of our study, which did not show any significant differences, even in the normalization of all directions. The results obtained have established a moderate correlation between the SEBT and COP-unipodal provided by the force platform; this means that the SEBT can be considered useful for the analysis of balance, mainly in clinical practice.
While using the force platform, Citaker et al.15 observed that the static unipodal standing balance in the PFPS group was significantly worse, similar to our study in which the PFPS group showed higher mean velocity of oscillation in unipodal standing, however, the difference for the ellipse area of the COP was not significant.
Our findings are in agreement with data reported by Lee et al.33, who compared postural stability between women with PFP and pain-free controls in unipodal standing on a force platform and showed worse performance and higher mean velocity of oscillation in the PFPS group. The literature demonstrates that in great lower limb impairment or imbalance caused by neuromuscular deficits, the main muscle groups used in mediallateral performance are the hip adductors and abductors returning to symmetrical stance in centre of gravity34. In addition, Gribble and Hertel35 found worse performance in the PFPS group, with significant difference regarding the ellipse area of the COP after testing sessions of isokinetic fatigue of the hip abductors. In contrast, our study did not observe significant differences in COP and in GM muscle strength.
The present study focused on the results for the characterization of functional capacity and pain in individuals with PFPS, as well as of balance impairment compared to the control group, which should be considered in further investigations. The use of the SEBT in our study is worth mentioning, considering that it is a functional and inexpensive postural control measurement tool that does not require high technology, which determines the usefulness of SEBT in the management of PFPS. As a significant contribution to clinical practice, it is suggested that evaluation and rehabilitation techniques that create balanced lower body strength in women with PFPS should be conducted. In addition, clinical tests for PFPS assessment such as AKPS, Lysholm, LEFS and SEBT should be used to reestablish the functional capacity of these patients.
However, it must be taken into consideration that the results from the present study are not consistent with those reported in recent literature probably because of the small sample size and the high degree of functional capacity observed in the PFPS group, which comprised young women with a mean score of 4 on the VAS for pain.
The results obtained showed no significant differences in the SEBT and in the ellipse area of the COP for the gluteus medium, quadriceps and hip external rotator muscle strength and balance. However, women with PFPS exhibited greater pain, worse functional capacity and body balance provided by the AKPS, Lysholm and LEFS, also greater balance impairment, higher mean velocity of oscillation in single-leg stance. Moreover, the SEBT proved to be a useful clinical parameter as it established a moderate correlation with the COP-unipodal to evaluate the dynamic balance of women with PFPS. However, further investigations should be carried out with inclusion criteria to establish higher scores for pain and lower for functional capacity. | http://www.scielo.br/scielo.php?script=sci_arttext&pid=S0103-51502017000300433&lng=en&tlng=en |
What follows is a passage from the chapter on Informational Privacy in The Value of Privacy by Beate Roessler. The author has been exploring the relation between autonomy (self determination) and the disclosure of personal information, in the sense of being able to control what significant (and identified) other people know about oneself, and how that might affect the behaviour and self presentation of an autonomous person. She then goes on to explore the same issues in relation to privacy and unspecified others, in the Bentham/Foucault Panoptic society:
“The fundamental point here is that the new information technologies may be problematic on the one hand because people are as it were being “de-privatised” against their will and the protection of privacy is in jeopardy, and on the other hand people are becoming more and more willing of their own accord to reduce or negotiate their private sphere, the dimensions of their privacy, in return for other goods.
The reason this can and should be considered a problem is that both a deliberate and a non-deliberate reduction in the protection of informational privacy may result in certain forms and dimensions of self determined and authentic behaviour not only becoming substantially less practicable, but also being conceived as less relevant, less crucial, less intrinsic to a rewarding life.
This would also entail a change in people’s self understanding to the extent that in important aspects of their lives people would be renouncing the chance to be unobserved, unidentifiable, inaccessible and protected in their informational self-determination.
This affects not only the idea of a rewarding, self-determined life, however, but also the idea of a liberal democracy itself, which is dependent upon autonomous subjects who are aware of and who value their autonomy.” (pg 120)
I think this is an exemplary analysis not just because it notices important privacy transitions related to ICTs that are happening at the moment, but because it places those transitions in the context of the autonomy of the individual (the individual life) and then relates that to foundational values of a liberal democracy. It is the kind of double contextualisation that isn’t made often enough.
Of course, you may also have doubts about the reality of individual autonomy, and informational control in contemporary society, a theme which I freely explored in my last post. But the point is to connect the privacy situation to the larger contexts, because then you can see what privacy is about, why it is worth protecting, and why it isn’t just about information management.
The Value of Privacy by Beate Roessler. Polity Press 2005. | http://datonomy.eu/2009/06/23/privacy-and-autonomy/ |
The individual must be at the center of privacy protection
The Ministry of Electronics and Information Technology, MEITY for short has drafted a Personal Data Protection Bill which is likely to be tabled in the parliament this June. We have some concerns over the drafting of the bill, which you can read here, but more importantly we are worried about the principles that form the basis of the bill.
We believe that the rights of an individual are equally important as the rights of corporates, government bodies, startups etc. But when it comes to privacy rights and data protection we strongly feel that an individual must be at the centre. Simply put, we believe that an individual’s right to privacy comes before a business’s wish to innovate, expand and contribute to the economy [digital economy?]. It may seem like common sense to some people, but to others, it may be shocking. After all, what happened to principles of equality?
Well, firstly a person’s right to privacy is a fundamental right and as observed by the Supreme Court bench which passed the privacy order, it is intrinsic to a person’s Right to Life. So naturally, we should value this over corporate desire of growth and profit. Moreover, B.R. Ambedkar, while drafting the Constitution observed that an individual is an end in himself. This idea resonates throughout our Constitution and therefore must reflect in any new laws that are passed, especially ones that affect the people directly.
It must also be kept in mind that an individual does not have the resources that corporations have at his disposal to protect himself. While it is true that the state machinery exists to serve the individual but even a well functioning system would be of no use if a law directly states that fundamental rights are to be given less importance over the digital economy.
Consider the current situation where large businesses constantly breach user privacy for self interest. By businesses, we are mainly referring to digital platforms that provide services such as social networking, shopping, food or ride sharing. They claim that without this data of their users (personal data which is taken with a fabricated consent), their innovation will be restricted and this will hamper the digital economy. For them, regulation acts as an unnecessary hindrance for growth and exploration.
Meity has referred to this problem extensively in the draft bill. It has laid out the main problem as a tradeoff between innovation and data protection. But this is not the correct way to address a problem. Regardless of what classical economists keep telling you, not everything in life is a tradeoff. It is not necessary that innovation and subsequently, the digital economy’s growth will be hampered if we protect user privacy. In fact experts and lawmakers must create a framework where the two coexist, and not just coexist but also supplement each other.
If we talk about data protection, the most common thing we have heard everywhere is that ‘data is the new oil’. But we strongly disagree. Data cannot be the new oil and it should not be treated as such. An important step towards understanding the logic that dismisses this argument of data being the new is to contextualise our understanding of data. When we use the word data, it brings to mind a very vague association of numbers and databases. But the data that we are talking about is personal data. Likes and dislikes of people, their behaviour on the internet, their shopping decisions, their politics and even their intimate details. When this personal data is seen as a resource, ready to be exploited for corporate benefit, we reduce an individual’s identity to a resource. This should not be an acceptable practice while securing the constitutional rights of people.
People should not be seen as resources and their rights must not be secured based on how useful they prove to be but because of the fact that they are people. This is why it becomes so important to advocate for rights of individuals. Although these rights are being secured in the Constitution, we must make sure that they are upheld in every subsequent law, otherwise the principles upon which the Constitution is built will no longer hold value. | https://saveourprivacy.in/blog/the-individual-must-be-at-the-center-of-privacy-protection |
She is an experienced lawyer in data protection law. Passionate about how law is challenged by new technologies. In her free time, she spends time hiking, cycling or reading a good book.
28 January has come and with it Data Protection Day. It was established to help us remember the value of our privacy. Since the General Data Protection Regulation (GDPR) was implemented in May 2018, we, the web users, are constantly being reminded of it when scrolling long privacy policies or when we’re repeatedly asked for consent to process our data in relation with a number of services we use. Consequently, many of us do not really appreciate the privacy framework — it reminds us of bureaucracy and prolongs the time before we can enjoy a new app. Many of us wonder — is it really worth the inconvenience?
The Benefits of Data Protection Law
The GDPR brought us the effective data protection tools. They enforce lawfulness, transparency and limitation of processing. They empower us — the application users with the control over our privacy. It’s us who decide to whom, when and for what purpose we provide consent regarding processing of our personal data. We have the right to request for our data to be accessed, rectified or erased. We may object to processing or withdraw our consent provided earlier. Of course, with all our rights comes a price, the time to acknowledge the information about the essentials of how our data is being processed. A data controller is required to provide us with the information on the purpose, retention, legal basis of processing and of our rights. Hence, the scrolling through long privacy policies or ticking the boxes.
What If There Were No Privacy Laws?
Since I am lucky to have my personal data protected by the GDPR and earlier — by the European Data Protection Directive, I may not be in the right position to describe the alternate reality of not having data protection laws. However, judging by the countries with weaker or lacking privacy laws, the main threats of such situation are extensive surveillance, uncontrolled profiling by service providers and lack of transparency with regards to personal data processing.
The surveillance may be mostly associated with CCTV monitoring, widely used for security reasons. In its basic form, when it’s positioned to respect other people's privacy, it should not have adverse effects. Still, the surveillance may go as far as including face recognition technology and gathering other data, including cellphone data (e.g. personal data from various apps), social media information, travels and contacts. When such data is combined and used for discriminatory reasons, it may lead to acts of suppression of individual freedoms and deepen social divisions.
Similarly, the profiling - when applied with our consent or acknowledgment it may actually enhance our user experience (Netflix, Spotify). In contrast, when profiling includes individual’s racial or ethnic origin, health status, sexual orientation and social status, it may lead — through AI-driven behavioural analysis — to discrimination, for instance, in the form of reduced visibility or availability of certain offers. The algorithm may even decide to decline you a job offer, loan or mortgage. Additionally, some profiling strategies may undermine individual autonomy and freedoms, by sending customised messages that exploit an individual’s vulnerabilities. This may bring a risk of isolation in filter-bubble and hinder the ability to make informed decisions.
The GDPR fix
She is an experienced lawyer in data protection law. Passionate about how law is challenged by new technologies. In her free time, she spends time hiking, cycling or reading a good book. | https://www.objectivity.co.uk/blog/data-protection-day-2022/ |
- Examples:
- ✅ “I am a piano player”
- ❌ “I am learning to play the piano”
Action / Behavior
- Description: The action or behavior that supports the goal
- “Because I…(BEHAVIOR)”
- Example: “I am a healthy eater…” (goal) “… because I eat mostly vegetables” (behavior)
Trigger / Condition / Situation
- Description: When & Where
- Examples:
- “Before bed”
- “When I get home”
Who
- Description: Which people, when involved, support this behavior & goal
Prioritized Human needs
https://en.wikipedia.org/wiki/Human_givens
- Security: A sense of safety and security; safe territory; an environment in which people can live without experiencing excessive fear so that they can develop healthily.
- Autonomy and control: A sense of autonomy and control over what happens around and to us.
- Status: A sense of status - being accepted and valued in the various social groups we belong to.
- Privacy: Time and space enough to reflect on and consolidate our experiences.
- Attention: Receiving attention from others, but also giving it; a form of essential nutrition that fuels the development of each individual, family and culture.
- Connection to the wider community: Interaction with a larger group of people and a sense of being part of the group.
- Intimacy: Emotional connection to other people - friendship, love, intimacy, fun.
- Competence and achievement: A sense of our own competence and achievements, that we have what it takes to meet life’s demands.
- Meaning and purpose: Being stretched, aiming for meaningful goals, having a sense of a higher calling or serving others creates meaning and purpose. | https://ro.vu/kb/life-improvement/personal-goals/ |
It is easy and natural to have a strong emotional reaction to issues of privacy and security. As skeptical, educated adults, we are quick to react whenever we feel our autonomy is being violated — as demonstrated by the incidents of graffiti on our campus commenting on the proposed cameras — or when we feel that the administration is overstepping its bounds. We advocate almost universally for the right to be treated with as much respect and dignity as we would expect any adult to be given. The question of whether to install surveillance cameras is this kind of an issue.
On Monday, Community Council voted down the installation of surveillance cameras in front of Ross and Proctor dining halls. It is a prevalent narrative: we want to be trusted, and surveillance cameras seem to impinge on that trust. We value the uniqueness of Middlebury’s open and safe community and we don’t want to see it lost to constant surveillance. We at the Campus, however, see surveillance cameras as an effort to protect that community and trust, not destroy it.
The first important restriction that makes this the case is that the cameras would be used only as an investigative tool — not for monitoring minor misdemeanors. If a student comes to them with a report of a serious crime such as theft or assault, Public Safety will be able to pinpoint that time and study the recording to try to catch the perpetrator. If they see any minor infractions in the same tape, they would disregard them. No citations should result from installing these cameras. There would have to be a strict guiding document that details who can review footage, how much footage they can see, and which footage it will be. This restriction makes the purpose of the cameras much more a defense of students than an infringement on their autonomy and is at the heart of an important distinction.
As it stands, students are feeling less and less comfortable leaving their things outside the dining halls, with a total of 38 thefts this year. The cameras are here to rectify this situation, not exacerbate it. Middlebury has always valued the relaxed atmosphere we enjoy in the midst of Vermont where we can often leave our possessions unguarded as we go eat lunch. Many of the opponents argue that this is what we are giving up by installing cameras; we at the Campus feel that this is what we are trying to protect. In this case, we need to think of our community members who have had their possessions stolen and see the surveillance cameras as a safeguard for them and for ourselves. The goal is to make the campus feel safer. Surveillance cameras should not be seen as a sign of broken trust between administration and students but as an effort to protect the trust that we all expect from and give to each other.
Many people now have strong anti-policing attitudes, and while this is a relevant and important viewpoint, students must consider the differences of intent between these cameras and other types of policing. There is a large divide between a police state and installing surveillance cameras to protect students’ belongings. Because of the investigative nature of these cameras, and their limitations to reviewing only victim crimes (i.e. theft, sexual assault), even the recent graffiti artists could not be caught on camera. The reason we support these cameras is because we want to see them keep our sense of community intact, not to direct the cameras at members of our community or in anyway impinge on free speech or expression.
Surveillance cameras will allow us to catch the right person with concrete evidence rather than possibly biased speculation and second-hand stories about who might have done it. They will protect students who cannot afford to replace their things and, if used judiciously, can protect the open and trusting culture for which many of us chose to come to Middlebury. In situations like these, it is necessary to look beyond our first emotional reaction and explore the rationale and intention behind the policy. If the cameras are used responsibly in order to protect the dignity and property of our community members, then we at the Campus fully support them. | https://www.middleburycampus.com/article/a-new-angle-in-support-of-cameras/ |
A study led by Simon Fraser University and published in the Journal of Vocational Behavior has found that as digital technology advances, many workers report a growing sense of autonomy stemming from the control they have of when, where, and which messages they respond to. But the experience shows both loving and loathing.
Workers who use mobile technology to actively connect with colleagues experience higher levels of communication effectiveness and report better work performance. Paradoxically, workers also reported that interruptions from these same technologies impaired their performance - technology giveth, and technology taketh away.
The crux of this paradox, known as the productivity paradox, seems to lay around the idea of self-determination for employees, who value feeling in control of their time. Making yourself available to support others is a choice you make, and increases this positive sense of autonomy. Employees who make themselves available exchange messages more effectively, and also benefit from the support of others. The challenge comes when interruptions come from coworkers, as these are outside the employee’s control, and may derail the employee when they were focusing on their work and making good progress.
“I think what is new about this study is that we know better what the good and the bad parts are of being connected to work all the time,” says study lead Lieke ten Brummelhuis, a professor in SFU’s Beedie School of Business. Her study addresses the love/hate relationship that comes with being constantly connected to our smartphones.
“With all the technology we have now, you are able to make active decision whether you are available for others – and that is actually good because you feel in control and you can be more effective in how you communicate. At the same time, you need to be vigilant that interruptions are not keeping you from other tasks.”
Another interesting relationship the study uncovered is the relationship between availability, interruptions and the giving or receiving of instrumental support. People who make themselves available are more likely to receive instrumental support from colleagues, and people who experience interruptions are more likely to provide the support.
It seems that control over communication is a critical aspect of autonomy in the workplace. Technology empowers workers by giving them control over where and when they connect. But this flexibility allows for constant interruptions by a barrage of incoming messages, which can lead to frustration.
“I think with this research, it's really important to keep in mind that what works for you might not work for every single individual because everyone is different,” says ten Brummelhuis. “But the main advice that probably will work for everyone is to set aside some time each day that you can dedicate to a single task and not be interrupted.”
Luckily there is a solution. Some software like Microsoft Teams allows you to set uninterrupted work time. So if you have something to focus on, it’s recommended you use it.
###
Journal
Journal of Vocational Behavior
Method of Research
Survey
Subject of Research
People
Article Title
Staying in the loop: Is constant connectivity to work good or bad for work performance? | https://www.eurekalert.org/news-releases/927500 |
The Union Home Secretary, last week, promulgated an order authorising 10 Central agencies to monitor, intercept and decrypt information which is transmitted, generated, stored in or received by any computer. Under the order, an individual who fails to assist these government agencies with technical assistance or extend all facilities can face up to seven years of imprisonment or be liable to be fined.
The notification was reportedly issued in pursuance of powers stipulated in Section 69 of the Information Technology Act, 2000, which enables government agencies to intercept personal information of citizens under certain conditions. The Ministry, in response to flak from the Opposition, has issued a clarification that the authorisation is in conformity with the process stipulated in the IT Rules, 2009.
What is missed out
The clarification assumes the legitimacy of Section 69 of the IT Act, the basis on which the IT Rules were framed. The IT Rules in turn form the source of power behind the Ministry of Home Affairs (MHA) notification. On the basis of this assumption, the clarification justifies the notification without examining the validity of its source. All that the MHA clarifies is that since the notification conforms with the IT Rules, there is no reason for eyebrows to be raised. This, argument, however, is fallacious since it fails to take a step back and peruse Section 69 of the IT Act, which after K.S. Puttaswamy v. Union of India — ‘the right to privacy case’, in 2017 — seems to fail the litmus test of constitutionality. Let us explain how.
The lowdown on the right to privacy
Why is Section 69 unconstitutional after K.S. Puttaswamy? The nine-judge bench in K.S. Puttaswamy declared that there is a fundamental right to privacy flowing from inter alia Articles 19 and 21 of the Constitution. In order for a restriction such as Section 69 allowing for interception of personal data on a computer to be constitutionally valid, it would not only have to pursue a legitimate state aim (say, for instance, national security) but also be proportionate, so that there is a rational nexus between the means adopted (i.e., authorisation of interception) and the aim.
Section 69 of the IT Act is so broadly worded that it could enable mass surveillance to achieve relatively far less serious aims such as preventing the incitement of the commission of a cognisable offence. Such surveillance could be justified to achieve relatively far less serious objectives such as a Facebook post expressing dissent against government policy which, in the state’s opinion, is offensive. The state, through the powers under Section 69, can therefore justify authorising surveillance, purporting this to be a grave concern. The language of Section 69, therefore, speaks abundantly of doublespeak, allowing for disproportionate state action, antithetical to the right to privacy.
Implications for free speech
Under Section 69, the government can intercept personal information under any of the following conditions: when it is necessary in the interest of Indian sovereignty or integrity; security of the state; friendly relations with foreign states; public order; and for preventing incitement to the commission of any cognisable offence related to these. While the first four feature in Article 19(2) of the Constitution, the last, namely preventing incitement to commission of cognisable offences, is not an enumerated restriction. A restriction in the form of authorised surveillance would not be justified unless it is in order to maintain public order, a reasonable restriction under Article 19(2).
The case against surveillance
The Supreme Court has repeatedly accepted a hierarchisation between “public order” and law and order; it explains this through concentric circles where law and order represents the larger circle within which the next circle, public order, lies, which in turn contains the smallest circle representing the security of the state — the most grave concern. While public order is characterised by public peace and tranquillity, law and order requires preventing the incitement of an offence.
However, Section 69, as mentioned earlier, allows mass surveillance even when only law and order is affected while public order prevails: merely for precluding the incitement of the commission of an offence.
Such a broadly worded provision can have potential ramifications on free speech. This is because a constant sense of being watched can create a chilling effect on online communication, crippling dissent. As far back as 1962, Justice K. Subba Rao had explained in his powerful dissent how a “shroud of surveillance” maims individual freedom by engendering inhibitions that an individual cannot act as freely as he would want to. Surveillance does not show direct discernible harms as such but rather imposes an oppressive psychological conformism that threatens the very existence of individual freedom. The Supreme Court reiterated this view in K.S. Puttaswamy.
Centre wants fake news traced
Section 69, therefore, cannot be regarded as a reasonable restriction on free speech as well. Therefore, a simple law and order requirement is an impermissible restriction to free speech unless public order, a much higher threshold, is threatened.
Another inconsistency
Section 69 also falls short of meeting with the principles of natural justice by failing to accommodate pre-decisional hearings. The Section only makes post-decisional hearings before a review committee possible as a part of its procedure, compelling people to give up their personal information without being given an opportunity to be heard.
To conclude, the MHA notification rests on shaky foundations. While the Supreme Court missed the opportunity to examine the constitutionality of Section 69 of the IT Act, looking at the IT Rules to legitimise the notification seems to put the cart before the horse. | https://www.thehindu.com/opinion/op-ed/on-a-shaky-foundation/article25828636.ece |
“The gaze is alert everywhere. This enclosed, segmented space, observed at every point, in which the individuals are inserted in a fixed place, in which the slightest movements are supervised, in which all events are recorded, in which an uninterrupted work of writing links the centre and periphery, in which power is exercised without division, according to a continuous hierarchical figure, in which each individual is constantly located, examined and distributed among the living beings, the sick and the dead – all this constitutes a compact model of the disciplinary mechanism. ” (Michel Foucault, Discipline and Punish, pg. 195-196).
When Michel Foucault wrote about his theory of disciplinary power in 1975, not one soul could have envisioned that the very society described in Discipline and Punish would ever come to fruition as it has today. Power, Foucault said, was no longer exercised directly by a sovereign who could use the threat of legitimized state violence to coerce his subjects into doing something against his or her will but that power could now be exercised even without the presence of an armed guard. This is what Foucault termed the “disciplinary society”, a society where power is distributed among multiple institutions in the most decentralized and “disindividualistic” form possible. It is a society where every individual checks and regulates themselves to the point of “normalization” out of fear that the all seeing, all knowing gaze is constantly watching them, whispering in their ears that nothing is blind from the law. This is all done without the armed guard even lifting a finger. This is the disciplinary society, a society that Foucault brilliantly described using the model of the panopticon.
Upon visiting his brother Samuel in Kirchev in what was then the Russian Empire in 1786 (today modern Belarus), the English utilitarian philosopher Jeremy Bentham conceived of what would become known as the panopticon. Bentham designed the panopticon to be a circular, 360-degree room about 100 feet in diameter. The walls of the cells would be plated with one-sided mirrors and in the center of the prison would be a large tower in which the prison inspector would be able to observe each and every prisoner through light reflected back from the cell mirrors while at the same time preventing the prisoners occupying the circumference of the prison from ever knowing precisely when they were being watched. Bentham described this process as “seeing without being seen” which “combined the apparent omnipresence of the inspector with the extreme facility of his real presence.” (Bentham, The Panopticon Writings, pg.30). Michel Foucault built his social theory of “disciplinary power” based on this “advantage” of the Panopticon by writing, “Hence the major effect of the Panopticon: to induce in the inmate a state of conscious and permanent visibility that assures the automatic functioning of power. So to arrange things that the surveillance is permanent in its effects, even if it is discontinuous in its action; that the perfection of power should tend to render its actual exercise unnecessary.” (Michel Foucault, Discipline and Punish, pg.197). This is the effect of the panopticon; to create a sense of surveillance at all times so that the victims begin to discipline themselves out of fear that somewhere the inspector inside the panopticon tower is watching their every action, ready to punish the victim at the will. All of this is done without the use of one single armed policeman. This is the panopticon.
Since the September 11, 2001 terrorist attacks, the response of the U.S government has been to place each and every one of us in Foucault’s panopticon in the name of “national security”. It began with the passage of the unconstitutional Patriot Act by Congress and President Bush in October 2001. Title II of the Patriot Act gave has given unprecedented jurisdiction to the FBI to intercept any kind of “oral and written electronic communication relating to terrorism” (Section 201) while the renewal of FISA in 2011 has allowed the FBI to even place foreigners under the scope of the all seeing, all knowing gaze of the U.S panopticon. Recently, former CIA and NSA contractor Edward Snowden revealed to the Guardian in May 2013 the full extent of U.S mass surveillance. Snowden revealed more than 300 stories regarding NSA surveillance in which the NSA mandated Verizon to turn over the phone records of millions of innocent Americans as well as the existence of PRISM, a program that allows for the NSA to access and collect personal information and data on billions of Americans from the databases of internet giants such as Google, Facebook and Apple. Even the cellphone of German Chancellor Angela Merkel is not safe from the all knowing, all seeing gaze of the U.S panopticon. President Obama, however, has defended these policies on the basis that it is based on the “need to keep the American people safe”. This is reality. We are living in perhaps the most oppressive disciplinary society of our time. We know that we are constantly being watched by the likes of the NSA and FBI, but we don’t know precisely when or where. All we know is that somewhere we are under the gaze of the U.S panopticon, and we begin to discipline ourselves to the point of total “normalization” because we fear that “Big Brother” is watching constantly and waiting to punish us to the fullest extent of the law. This is the U.S panopticon; the exercising of power through decentralized fear, forcing us to discipline ourselves. Under this all seeing, all knowing gaze, we only do good because we fear the police and the law, not because it is ethical or self-rewarding. This is the panopticon, discipline through fear of the all seeing, all knowing gaze of the tower.
It is clear that the expansion of the police state since 9/11 has thrust us all into the gaze of Foucault’s panopticon, so the question becomes how do we break the grip of fear the modern disciplinary society has on us? The answer is to smash the mirrors of the panopticon so that the tower may no longer be able to project its omniscient presence on us. By repealing the Patriot Act and abolishing the NSA, we can take down the the tower’s gaze and free ourselves from the U.S panopticon. Otherwise, a society disciplined solely on fear can only stand by and watch as it’s virtues whither away under the full force of biopolitical management. | https://thehistoricalnerds.com/2013/11/14/the-u-s-panopticon-the-gaze-is-everywhere/ |
That is hopeful information for anybody who’s going by a breakup. In any case, it is smart that shedding a relationship might make one really feel like their life is out of their management—not solely do you lose the individual in query, however you lose part of your self as properly. However over time, as you be taught to stay with out that individual, you regain the sense of autonomy you seemingly misplaced.
Along with these findings, the research additionally confirmed girls had been extra doubtless than males to expertise a drop in sense of management instantly following separation, and younger folks truly had an elevated sense of management after separation from their associate compared to older members.
And as you may think, the kind of relationship loss somebody is coping with will drastically affect how that loss impacts them: Individuals truly expertise a direct post-loss improve in sense of management following the loss of life of a associate, as grief is commonly a catalyst for development. Although curiously, there was no clear hyperlink between divorce (particularly) and perceived sense of management in these findings. | https://www.mtikiso.com/analysis-reveals-individuals-expertise-development-after-a-breakup/ |
By: Gavin Yakuse-Duffy
Virtual reality technology has been gaining momentum. The release of the Oculus Rift, Samsung Gear and the PlayStation VR are a sign these devices are making their way into everyday life. Three industries in particular that are making strides with the technology are education, medicine and journalism.
Joshua Maldonado, co-founder of Discovr Labs, said he sees VR as having the possibility to fundamentally change how the education system works. “It is going to do what the Internet did for information.” Discovr Labs is a company dedicated to the creation of a more immersive and complete learning experience, through the use of VR.
Since its establishment in 2015, Maldonado says he’s seen improvements in every classroom that has used the technology. Kids often retain 80 per cent more information than through reading, because VR is more engaging. Discovr’s simulations allow students to interact with historical places, including ancient Egypt. This gives them the opportunity to walk around and explore famous sites, such as King Tut’s tomb.
Maldonado said children aren’t the only ones seeing the rewards of this technology; adults preparing to enter the workforce are also benefitting. He said in the medical field, VR is closing the gap between theoretical knowledge and practical application, allowing life-threatening scenarios to play out in a completely safe environment.
Meanwhile in the journalism industry, these technologies are starting to be used to revolutionize storytelling. CBC News anchor Mike Wise is teaching emerging technologies in his journalism class at Humber College. He said the purpose of his class is to expose students to technologies that will be prevalent by the time they graduate. | https://www.emergemagazine.ca/2017/virtual-reality-and-360-videos-are-making-strides-in-these-top-three-industries/ |
The HydroPASSAGE project addresses hydropower challenges, which include efforts to improve environmental performance of hydropower.
( Read More )
INITIATIVE
Virtual Reality for High-Impact Learning
PNNL creates immersive software experiences to meet a variety of challenges. One such challenge in science, technology, engineering, and mathematics (STEM) education is providing quality computer science education for all students.
( Read More )
PROGRAM
WMD Counterproliferation Training
PNNL develops training, exercises, and assessments to prepare and equip border security officers to detect, identify, and interdict the illicit movements of materials, commodities, and components associated with WMD. | https://www.pnnl.gov/projects?projects%5B0%5D=research-topic%3AEnvironmental%20Performance%20of%20Hydropower&projects%5B1%5D=research-topic%3AHigh-Performance%20Computing&projects%5B2%5D=research-topic%3AWeapons%20of%20Mass%20Effect |
The world of virtual reality is rapidly evolving, and Facebook has recently made a move to revolutionize gaming with the introduction of their Passthrough API for Oculus Quest. This innovative technology will allow users to interact with the real world while playing games on their device. The Passthrough API already enables developers to enhance the user experience by providing more immersive visuals and richer interactions. | https://www.newstapping.com/facebook-passthrough-api-oculus-questclark/ |
The purpose of the University of Maryland, Baltimore (UMB) Omics Associated with Self-Management Interventions for Symptoms (OASIS) Center is to combine rigorous phenotyping of preclinical models and patients in chronic pain with cutting-edge omics methods. This approach will advance our understanding of how individual differences influence resilience, motivation, and capability to engage in self-management interventions, acknowledging that other factors such as psychosocial, environmental, and sex differences may moderate or mediate these relationships. Omics also may be mechanistically linked to response to treatment.
Why
We chose to focus the work of the OASIS Center on physical activity and exercise self-management approaches since they are often effective in managing chronic pain. Our goal is not to test the efficacy of physical activity on chronic pain reduction in experimental versus control conditions; we know these strategies work. Instead, we want to understand the omics mechanisms that will begin to inform us about the relationships that underlie the resilience, motivation, and capability to engage in, and the response of the individuals to, physical activity. We assert that our translational mechanism-based approach will accelerate the science of self-management of symptoms to produce high impact results that will move the field forward.
The OASIS Center aims to:
- advance interdisciplinary science of self-management of chronic pain investigating the degree to which omics differences, psychosocial factors, gender and the environment can explain one’s resilience, motivation, capability, and response to exercise/physical activity self-management to reduce chronic pain
- expand the infrastructure capacity at UMB to conduct rigorously designed interdisciplinary omics studies of self-management strategies to manage symptoms—the focus will be on chronic pain
- plan for, and actively pursue, intramural (SON, UMB) and extramural federal and foundation funding to enhance sustainability for Center research activities after NINR P30 Center funding has ended. Completion of our sustainability plan requires the negotiation of key internal and external collaborations.
Who
Our interdisciplinary team at the UMB nursing, medical, pharmacy, and dental schools is uniquely poised to advance the science of self-management of symptoms.
- The Multiple Principle Investigators (MPI) team provides complementary scientific and leadership expertise to the center including omics studies of chronic pain (Susan Dorsey, PhD, RN, FAAN), self-management and physical activity intervention trials (Barbara Resnick, PhD, RN, CRNP, FAAN), and chronic pain phenotyping (Cynthia Renn, PhD, RN, FAAN).
- Core directors are renowned senior scientists with expertise in behavioral phenotyping (Todd D. Gould, MD and Joel D. Greenspan, PhD) and omics (Claire M. Fraser, PhD, and Maureen Kane, PhD).
Preclinical and clinical pilot studies leverage OASIS Center resources and cores in the area of science focus. | https://www.nursing.umaryland.edu/research/research-centers/oasis/about/ |
Contextual and psychosocial factors influencing caregiver safe disposal of child feces and child latrine training in rural Odisha, India.
Subjects:
Psychosocial factors associated with mental health and quality of life during the COVID-19 pandemic among low-income urban dwellers in Peninsular Malaysia.
Subjects:
Psychosocial factors influencing smoking relapse among youth experiencing homelessness: A qualitative study.
Subjects:
The Severity of opioid dependence and its relation with psychosocial factors of addicted users.
Subjects:
Psychosocial factors and mental health in Mexican healthcare workers during the COVID-19 pandemic.
Subjects:
The relationship of dental students’ characteristics to social support, psychosocial factors, lifestyle, and quality of life
Subjects:
Influence of Social and Psychosocial Factors on Summer Vacationers’ Sun Protection Behaviors, the PRISME Study, France
Subjects:
The Psychosocial Factors Affecting Chinese Outbound Exchange and Mobility Students’ Academic Performance During COVID-19
Subjects:
Patient-reported outcome measures of musculoskeletal symptoms and psychosocial factors in musicians: a systematic review of psychometric properties.
Subjects:
Psychosocial factors and cancer incidence (PSY‐CA): Protocol for individual participant data meta‐analyses.
Subjects: | https://libraries.swbts.edu/eds?search=y&query=%22PSYCHOSOCIAL+factors%22&type=DE |
By the end of the first year, most infants have formed an attachment relationship, usually with the primary caretaker. If parents can adapt to their babies, meet their needs, and provide nurturance, the attachment is secure. Psychosocial development can continue based on a strong foundation of attachment.
How do infants form relationships?
Infants flourish under our attention. They look for eye contact, smiles, holding, and talking from us, and they respond accordingly. Reciprocal contact, or back and forth communication and smiles, is best. Our attention to a baby is very powerful.
What does a healthy parent/child relationship look like?
The ability to help a child succeed by giving clear directions, setting boundaries, offering opportunities to choose and negotiate, requesting age-appropriate behaviors and responses, accommodating individual learning style needs, giving opportunities to self-manage and staying in present time.
What precautions should be taken if a baby is given a pacifier?
Pacifier Safety
- Do not use the top and nipple from a baby bottle as a pacifier, even if you tape them together. …
- Purchase pacifiers that cannot possibly come apart. …
- The shield between the nipple and the ring should be at least 1-1⁄2 inches (3.8 cm) across, so the infant cannot take the entire pacifier into her mouth.
Do Parents influence child’s personality?
It is also a result of our upbringing. Parental influence on personality development of any child is highly significant. It decides the kind of adults we grow into. It is important to ensure that parenting style supports healthy growth and development of the child. | https://burlingamemothers.org/toddlers/what-type-of-relationship-does-a-parent-have-with-an-infant.html |
What factors contribute to a healthy lifestyle? What activities can be suggested to help influence a healthy lifestyle?
Mindset (attitude) is foundational to healthy living. The importance of psychosocial and substantive behaviors contributes to both the cause (spiritual malady) of illness and the success of treatment in the rehabilitation setting (Nathenson, 2013).
Applying the eight dimensions of wellness (Physical, Intellectual, Social, Emotional, Spiritual, Vocational, Financial, Environmental) into daily living influence a healthy lifestyle. Inner resilience, which is necessary to face the inevitable challenges of life, can be amplified by putting awareness, attention, and effort into these areas of life as appropriate. According to Hunyn and Wisk (2022), behavioral economics (BE) concepts have become well studied tools in addressing patient issues, such as weight loss, smoking cessation, and medication adherence.
Physical conditioning (walking, endurance training, exploring nature), proper nutrition (diet), prayer/ meditation, and cultivating fulfilling relationships are tangible activities that promote a healthy lifestyle. What we put into our minds is equally important. Discernment in what we read, listen (music, television, people) are self-care practices that require daily vigilance.
Utilizing resources such as SAMHSA, National Institute of Health (NIMH), National Association of Mental Illness (NAMI) and Mental Health of America (MHA) are multiple initiative-taking options to gain awareness, education, and guidance, as well as community-based resources (Community Colleges).
References
Hunyn, A., & Wisk, L. (2022). Application of behavioral economics for understanding health behaviors among adolescents and young adults. Current Opinion in Pediatrics 34 (4), 326-333. | https://martinsantosconsultant.com/2022/10/01/healthy-lifestyle/ |
Problem 12MCP from Chapter 3:
A stone is thrown horizontally with a speed of 15 m/s from t...
A. 10 m.
B. 20 m.
C. 30 m.
D. 50 m.
Projectile motion is the motion of an object that is thrown near the surface of the Earth and moves along a curved trajectory under the influence of gravity only. So, the acceleration of the object is equal to acceleration due to gravity which always acts in the downward direction. The vertical position of the object after time t, can be determined by using the following kinematics equation:
Here, is the initial position of the object, is the initial vertical velocity of the object, and g is acceleration due to gravity. | https://www.chegg.com/homework-help/stone-thrown-horizontally-speed-15-m-s-top-vertical-cliff-ed-chapter-3-problem-12mcp-solution-9780321902566-exc |
Social scientists have studied foods in many different ways. Historians have most often studied the history of specific foods, and anthropologists have emphasized the role of food in religious rituals and group identities. Sociologists have looked primarily at food as an indicator of social class and a factor in social ties, and nutritionists have focused on changing patterns of consumption and applied medical knowledge to study the effects of diet on public health. Some scholars from these and other disciplines have studied the economic and political connections created around commerce in food, regionally and around the world. Now, all of these perspectives are brought together in a single volume. Fifteen specialists currently working in Canada, England, France, Guatemala, Norway, and the United States come together to apply their expert knowledge of food and food consumption in a new context, global history. In general essays and case studies, they reflect on the connections across space and time in what people eat and assess historical patterns of change in the human diet.The book begins with a consideration of the relationship between food and global history. Part One considers the global history of the ecology of food production, the contrasting impact of New World foods on India and China, the effects of global tourism, and the interaction between identity, migration, and diet. The selections in Part Two study the impact of public policy, comparing the countries of the former Soviet bloc with Scandinavia and Western Europe, analyzing the effects of international assistance on West Africa, and looking at changes in childhood nutrition in developing countries. Chapters in Part Three study nutritional change, the dietary effects of increased wealth, and the ?Mad Cow? crisis in terms of global systems. Part Four investigates the relationship of global change to the ideologies and practices of the family meal, of food and cultural identity in Japan, and the American counterculture.
Publisher: Taylor & Francis Inc
ISBN: 9780813338842
Number of pages: 308
Weight: 425 g
Dimensions: 229 x 152 x 18 mm
You may also be interested in...
£9.99 £7.99Paperback
£9.99Paperback
£10.99 £8.99Paperback
£12.99 £9.99Paperback
£16.99Paperback
£9.99 £7.99Paperback
£10.99 £8.99Paperback
£14.99Paperback
£9.99Paperback
£25.00Hardback
£12.99Paperback
£10.99 £8.99Paperback
£14.99 £11.99Paperback
£9.99Paperback
£9.99Paperback
£10.99Paperback
Please sign in to write a review
Sign In
Sign In
Click & Collect
Simply reserve online and pay at the counter when you collect. Available in shop from just two hours, subject to availability.
Thank you for your reservation
Your order is now being processed and we have sent a confirmation email to you at
When will my order be ready to collect?
Following the initial email, you will be contacted by the shop to confirm that your item is available for collection. | https://www.waterstones.com/book/food-in-global-history/raymond-grew/9780813338842 |
Religious traditions identify themselves with, and draw sustenance from, the texts that they hold sacred. In Sarah Lawrence College religion courses, these texts command and hold our attention. As students explore the sacred text of a particular religion—whether studying Buddhism, early Christianity, or the origins of Islam—they gain insight into the social and historical context of its creation. Using critical, hermeneutical, and intellectual historical approaches, students enter into the writings in such depth as to touch what might be the foundation of that religion. In addition, work with contemporary texts (such as those by religious activists on the Internet) gives students insight into what most moves and motivates religious groups today. The College’s religion courses provide an important complement to courses in Asian studies and history.
2017-2018 Courses
Religion
First-Year Studies: The Hebrew Bible
Open , FYS—Year
The Hebrew Bible stands at the foundation of Western culture. Its stories permeate our literature, our art...indeed, our sense of identity. The Hebrew Bible's ideas inform our laws, have given birth to our revolutions and social movements, and have thereby made most of our social institutions possible (as well as the movements to remove them). What is this book? How was it written? Who wrote it? Who preserved it for us? Why has all or part of this body of literature been considered holy to the practitioners of Judaism and Christianity? Four thousand years ago, various groups from small tribe-wandering nomads would get together and tell stories. These stories were not preserved on stone tombs but in the hearts and memories of the people to whom they belonged. We will read the collection of traditions in a book called Genesis and compare these stories with other texts (written in mud and stone) such as The Epic of Gilgamesh and The Babylonian Creation Epic, which were contemporary with biblical traditions. We will read the biblical epic of liberation, Exodus; the historical books that weave theology into a history of a nation; and the oracles of the great Hebrew prophets of Israel, those reformers, judges, priests, mystics, and poets to whom modern culture owes its grasp of justice. We will trace the social, intellectual, and political history of the people formed by these traditions from the Late Bronze until the Roman age.
Faculty
Related Disciplines
First-Year Studies: Islam
Open , FYS—Year
This course will provide a comprehensive introduction to the foundational texts of Islam, the historical development of different Muslim cultures, and the contemporary issues that animate Islam’s ever-evolving manifestations. We will begin with the Qur’an, a book whose juxtaposition of narrative fragments, apocalyptic imagery, divine voice, and sociopolitical themes conveyed in rhymed Arabic prose has both entranced and confounded readers. We will look at the historical roots of the “isms” used today to describe the orientations of Sunnism, Shi‘ism, Sufism, and Salafism. Looking beyond the Middle East, where only about 20% of the current global population of Muslims reside, we will examine how migrating people, concepts, texts, and practices both transform and are transformed by existing traditions in different geographical locations. Contemporary preoccupations such as the status of women in Islam and the relationship between Islam and violence will be examined from a variety of perspectives, illustrating the intricacies of Muslim and non-Muslim acts of interpretation and their relationship to power and authority.
Faculty
Related Disciplines
The Buddhist Tradition in India, Tibet, and Southeast Asia
Open , Lecture—Fall
This intoductory course treats the evolution of Buddhism in India from the origins of the religion as a group of "world-renouncing" ascetics through the development of large, state-supported monastic communities and the emergence of the major reform movements known as Mahāyāna and Tantra. The course also focuses on the Buddhism of two regions of the world—Southeast Asia and the Tibetan plateau—where the respective traditions have been most self-consciously concerned with maintaining precedents inherited from India. Equal attention is paid to (1) matters of philosophy and doctrine, (2) religious rites and practices, and (3) social and institutional arrangements. The lectures are accompanied by copious audiovisual materials. Readings include An Introduction to Buddhism: Teachings, History, and Practices, 2nd ed., Peter Harvey, Cambridge University Press, 2013. For students who wish to continue studying the development of the Buddhist tradition in other parts of the world, a companion lecture course, The Buddhist Tradition in East Asia, is offered in the spring semester.
Faculty
Related Disciplines
The Buddhist Tradition in East Asia
Open , Lecture—Spring
This introductory course focuses on the Buddhism of East Asia: China, Korea, Japan, and Vietnam. Buddhism first began to take root in China in the early centuries of the Common Era, having been transmitted from India via Central Asia and the maritime states of Southeast Asia. Buddhism initially met with much resistance, being branded an "alien" cult that was at odds with native Chinese (especially Confucian) values. Eventually, however, the Indian religion adapted to Chinese culture and came to have a profound influence on it, spawning new schools of Buddhism such as Tiantai, Huayan, Pure Land, and Chan (called Zen in Japan). The smaller neighboring countries that fell under the sway of Chinese civilization—Korea, Japan, and Vietnam—first imported forms of Buddhism that had taken shape in China, not India; but each, in turn, further changed the religion in ways that accorded with their own indigenous cultures. Equal attention is paid in this course to (1) matters of philosophy and doctrine, (2) religious rites and practices, and (3) social and institutional arrangements. The lectures are accompanied by copious audiovisual materials. The course has no prerequisite but is suitable for students who have already taken the companion lecture, The Buddhist Tradition in India, Tibet, and Southeast Asia, which is offered in the fall.
Faculty
Related Disciplines
Chan and Zen Buddhism
Open , Seminar—Year
This course is an in-depth, historical examination of the philosophy, mythology, literature, institutional arrangements, religious practices, art, and architecture associated with this most famous and widely misunderstood branch of East Asian Buddhism. The Chan (Zen) school of Buddhism arose in China as the result of a cross-cultural exchange of epic proportions: the gradual intrusion of an alien set of religious ideas, values, and practices—those belonging to Indian Buddhism—into China between the first and the eighth centuries of the Common Era and the subsequent efforts of some 20 generations of Chinese Buddhists to defend, adapt, domesticate, and finally make the foreign religion entirely their own. Chan became the most "Chinese" school of Buddhism by defining itself in terms of indigenous concepts of clan genealogy, by exalting members of its spiritual lineage as native-born buddhas, and by allowing those buddhas to speak in the vernacular, using a mode of rhetoric that was heavily influenced by the Confucian and Daoist traditions. The course begins by outlining the Indian Buddhist doctrines and practices that were imported into China and by summarizing the indigenous cultural milieu that was initially quite hostile to the alien religion. It then explores the various compromises and adaptations of Indian Buddhist teachings, practices, and institutions that took shape within the Chan tradition and enabled it to emerge in the Song dynasty (960-1278) as the predominant school of Chinese Buddhism. The main theme of the second semester is the transmission of the Chan school of Buddhism to Japan, where it became known as Zen, and the subsequent development of the tradition in that country from the 13th century to the present. Books and readings include Encyclopedia of Buddhism and Zen Masters of Meditation in Images and Writings, Brinker, both PDF files; Buddhist Wisdom: The Diamond Sutra and the Heart Sutra, Conze, Edward, trans., Vintage, 2001; ; and The Vimalakirti Sutra, Watson, Burton, trans., Columbia University Press, 2000. A background knowledge of East Asian history, languages, or religions is desirable but not required.
Faculty
Related Disciplines
American Muslims: History, Politics, and Culture
Open , Seminar—Year
The United States has a long and complicated history with its very diverse body of Muslim citizens. Muslim slaves were brought involuntarily to this country and forcibly kept from practicing their religion. Many of their descendants began to rediscover Islam in the early 20th century and were joined by an increasing number of Muslim immigrants after the Immigration and Nationality Act ended racial quotas on immigration in 1965. White converts joined them throughout the years. Although Muslims currently comprise only 1% of the American population, their significance goes well beyond their numbers. Beginning with Malcolm X in the 1950s and early 1960s and continuing to the post-9/11 era in the 21st century, perceptions about Muslims have functioned as barometers of deep social and political anxieties. To carefully examine these anxieties is to expose major fault lines in the domestic and foreign policies of the United States. The rise of fearmongering discourse from self-proclaimed “experts” on radical Islam after 9/11 is very much connected to the religious, political, and economic objectives of different groups, which are important to investigate. This course will look behind, but also beyond, the hot-button issues that dominate current headlines, exploring the variety of ways in which Muslim Americans have flourished in America and contributed to its intellectual and creative heritage in substantial ways. Material studied throughout the year will include many examples from the rich body of American Muslim memoirs, social and political critique, theology, literature, poetry, and art.
Faculty
Related Disciplines
The Holocaust
Open , Seminar—Spring
The Holocaust raises fundamental questions about the nature of our civilization. How could a policy of genocide be carried out by one of the most advanced and sophisticated countries of Europe? In this course, we will examine how these appalling events took place, beginning with anti-Semitic ideology and policy. At the same time, we will confront a surprisingly neglected perspective of the victims, whose perspective—how they chose to respond to the impending catastrophe (through art, diary-writing, mysticism, violence, hiding, etc.)—has not been integrated into an overall history of the Holocaust. Finally, we will attempt to come to grips with the crucial but neglected phenomenon of bystanders—non-Jews who stood by while their neighbors were methodically annihilated, rescued Jews, or became perpetrators themselves. We shall inevitably be compelled to make moral judgments. But these will be of value if they are informed and based on a fuller understanding of the perspectives of the various actors in this dark chapter of European history.
Faculty
Related Disciplines
Jewish Mysticism From Antiquity to the Present
Sophomore and above , Seminar—Spring
This course examines a vibrant countertrend within Judaism known as mysticism. We begin with the biblical and ancient “Chariot” mysticism, proceed to ascetic medieval German pietism, and dwell at length on the erotically-charged “Kabbalah” that emerged in medieval Spain and Southern France—observing its unique conceptions of God, evil, demonology, sin, death, sexuality, and magic. We then follow the emergence of circles of mystics in 16th-century Safed (Land of Israel) that eventually sparked a mass messianic movement around the figure of Shabbetai Tzvi. In the second semester, we delve into the most popular and enduring Jewish mystical movement, Hasidism. Founded on the teachings of the Ba’al Shem Tov (The Besht) in 18th-century Eastern Europe, Hasidism was forged into a mass movement by charismatic miracle-workers called “tzaddikim” and spread by means of oral and written tales. We follow the emergence of Hasidic dynasties, gauge Hasidic responses to modern phenomena like Zionism and the Holocaust, and follow the movement’s continued flourishing today in tight-knit communities from Brooklyn to Jerusalem. Finally, we will examine popular contemporary neo-Kabbalah. Throughout, we strive to appreciate different manifestations of Jewish mysticism within their changing historical contexts.
Faculty
Related Disciplines
Readings in Christian Mysticism: Late Antiquity
Intermediate/Advanced , Seminar—Year
Permission of the instructor is required.
This course will focus on the intersection of Jewish theology and Greco-Roman philosophy in the early Christian texts commonly seen to contain "mystical elements." We will define these elements as texts that have to do with the desire on the part of the reader to "know," experience, or "be with" God and with the author's attempt to properly demarcate the boundaries within which these desires can be fulfilled. Christian mysticism is perhaps best thought of as erotic theology—theology that involves the desire for God. Recognizing this, we must also acknowledge that inherent to this theology is a profound paradox. What is desired must be conceived. It must be held in the grasp of one's understanding in order to be attained. While this is fine for an orange, or even wealth and power, it is much more problematic when the object of desire is God, the creator of the universe. Theologians in the early church developed a language of desire and specific sets of practices involving one's lifestyle and prayer in order to resolve this paradox and fulfill their desire. They began to ponder this paradox with a synthesis of a biblical theology of divine revelation (i.e., the revelation of God as preserved in the biblical canon, symbolized in both the revelation of YHWH on Mt. Sinai and in the incarnation of the Divine Logos as Jesus of Nazareth) and Platonic expression of a desire for the ultimate good, truth, or beauty. In order to better grasp these ideas, we will read parts of the Hebrew Bible, the Gospels, and contemplate the anthropology of desire set forth by Plato in the Symposium and the Phaedrus. Educated in the Hellenistic world, the early church fathers took these ideas for granted and attempted to find common ground with their Christian inheritance. We will study the phenomenon of Gnostic Christianity, an early attempt at synthesis of biblical material and Greek philosophy. We will then move on to encounter the great early Christian writers—such as Origen and Athanasius of Alexandria, Gregory of Nyssa, Psuedo-Dionysius, and Ambrose of Milan—and conclude our study with a lengthy look at what, for Western culture, is the seminal work of Augustine of Hippo.
Faculty
Related Disciplines
Related Asian Studies Courses
First-Year Studies: Pilgrimage and Initiation
Open , FYS—Year
1) Pilgrimage and initiation play a major role in the Hindu, Buddhist, and Sufi Islamic traditions of South Asia. This seminar introduces students to the cultures of India, Pakistan, Bangladesh, Nepal, and Sri Lanka through a comparative study of religious practices. In homes, temples, and shrines throughout this region, devotees perform elaborate rituals of initiation. These often occur at moments of life-cycle transition. Calendar-based sacraments also occur on the major holidays of each religion. When devotees celebrate these ceremonies, they are "performing" important cultural values. 2) Globally, pilgrimage festivals can be seen as codes for interpreting cultures. Meaningful journeys reflect the structure of initiation rites in that one is transformed by the experience. 3) Pilgrim fairs and festivals serve multiple functions. They provide venues not only for religious expression but also for arts performance, social negotiation, and economic exchange. 4) This seminar explores questions such as: Are pilgrimage and tourism functionally indistinguishable? What role, if any, do travelers’ intentions play in such an analysis? Is a spiritually inscribed journey qualitatively different from tourism with recreational, cultural, or service agendas? How does the transitional process of a journey relate to the experience of arrival at a destination? What do pilgrimage and initiation sometimes have in common with the experience of immigration? 5) Using travel memoirs, we explore themes of quest, discovery, and personal transformation. Postcolonial writings on spiritually inscribed journeys raise issues of dislocation, exile, memory, and identity. We inquire critically into traditional mappings of “sacred geographies” and the commercial promotion of competing destinations. 6) Sources: Within travel industries, we analyze the specialists who service many spectacles and attractions found along pilgrimage routes. Films and photographic sources are used extensively. Readings are drawn from cultural studies, history of religions, anthropology, and personal narratives.
Faculty
Related Disciplines
Images of India: Text/Photo/Film
Intermediate , Seminar—Fall
1) This seminar addresses colonial and postcolonial representations of India. For centuries, India has been imagined and imaged through encoded idioms of orientalism. In recent decades, writers and visual artists from India, Pakistan, and Bangladesh have been actively engaged in reinterpreting the British colonial impact on South Asia. Their work presents sensibilities of the colonized in counter-narration to images previously established during the Raj. Highlighting previously unexposed impressions, such works inevitably supplement, usually challenge, and frequently undermine traditional accounts underwritten by imperialist interests. 2) Colonial and orientalist discourses depicted peoples of the Indian subcontinent in terms of both degradation and a romance of empire, thereby rationalizing various economic, political, and psychological agendas. The external invention and deployment of the term “Indian” is emblematic of the epoch, with colonial designation presuming to reframe indigenous identity. 3) Postcolonial writers and artists, therefore, continue to renegotiate identities. What does it mean to be seen as an Indian? What historical claims are implicit in allegories of language, ethnicity, and nation? How do such claims inform events taking place today, given the resurgence of religious fundamentalisms? This seminar on the semiotics and politics of culture is based on works by influential South Asian writers, photographers, and filmmakers.
Faculty
Related Disciplines
Hindu Iconography and Ritual
Intermediate , Seminar—Spring
This seminar focuses on the visual cultures of India and Nepal. Hindu traditions encompass a dramatically diverse range of beliefs and practices. Iconography provides a pathway toward decoding that diversity. How are the proverbial 330,000 gods and goddesses understood to be manifestations of a common unity? How does the Hindu pantheon encode gender with respect to status, functions, and roles? Where are caste hierarchies reflected among the emblems held by multi-armed deities? In what ways does iconography narrate the history of Aryan and Dravidian interactions? Through a study of painting, sculpture, popular lithographs, and multi-media sources, this seminar offers a window into the social histories, cultural practices, and spiritual values of Indian civilization.
Faculty
Related Disciplines
Related History Courses
Spiritual Autobiography
Open , Seminar—Spring
Around 398, Christian bishop and theologian Augustine of Hippo produced one of the most influential books of all time: his Confessions—a lengthy meditation on events during the first 33 years of Augustine’s life, undertaken in an effort to comprehend how God acted through those events to transform an ambitious but confused young Roman, attracted by the exotic Asian cult of the Persian prophet Mani, into a dedicated Christian. Augustine’s book is arguably the first real autobiography ever written, and the author’s profound exploration of his own motivations and feelings led William James to term Augustine the “first modern man.” The Confessions also served as the model for hundreds of other spiritual autobiographies written over the course of the next 1,600 years, including masterworks such as The Life of St. Teresa of Ávila, William Wordsworth’s Prelude, John Henry Newman’s Apologia pro Vita Sua, Leo Tolstoy’s Confession, and Thomas Merton’s Seven Storey Mountain. In this course, students will read and discuss these and other classics of Christian autobiography. They will also be invited to examine a number of comparable works by writers standing outside the Christian tradition, including the Meditations of Marcus Aurelius and M. K. Gandhi’s Story of My Experiments With Truth. These readings are gripping, because they attempt a uniquely challenging feat: to capture the history of an individual soul’s relations with the Infinite through the language that we use to describe our everyday experience. We will combine detailed literary analysis of the autobiographies, with an examination of their content in the light of recent writing on the phenomenology of religion. Conference projects may address a wide range of topics in the general area of the history of religion and religious expression.
Faculty
Related Disciplines
Related Philosophy Courses
First-Year Studies: From Homer to Plato
Open , FYS—Year
The habit of asking questions, which constitutes Western thought, has its primary origin in Greece. In this class, we will read Greek epics, tragedies, histories, comedies, and works of philosophy in order to think about how our thinking got started. | https://www.sarahlawrence.edu/undergraduate/humanities/religion/ |
Addas, Abdullah (2015) Motivation and Attachment in the Use of Public Open Spaces in Jeddah, Saudi Arabia. PhD thesis, University of Sheffield.
|
|
|
Text
|
A.Addas Thesis Feb 2015_sheffield_landscape.pdf
Available under License Creative Commons Attribution-Noncommercial-No Derivative Works 2.0 UK: England & Wales.
Download (14Mb) | Preview
Abstract
This research investigates how the residents of the city of Jeddah perceive, use and experience open spaces within an urban context, including unplanned and peri-urban natural areas. It highlights the patterns of use of open spaces and compares these with research findings from North America and European countries. The specific cultural and historical context of Arabic countries means that key factors in use of public space are the segregation of gender and importance of religious practice. However, Jeddah is also a multicultural city, with a high proportion of migrant residents, so also provides a research context for critiquing transnational practices and attachments. The research strategy was developed from two key methodological principles. The first develops investigation of place as an integration of form, fabric and cultural practice, allowing the research to link social patterns with the physical design of the public realm. The second foregrounds storytelling methods to elicit complexity of place attachment, enabling investigation of intangible influences, such as social norms, gender norms, religion and ethnicity. A qualitative case study approach was used to investigate users’ cultural practices and experiences of public spaces. The methods used in this research were a review of maps and documents, car surveys, observations and on-site interviews. It was important to develop an open space typology to meet the diversity of use in a case study selection specific to a Gulf region context. One key finding of this research indicates that Saudi and non-Saudi users visit designed open spaces and incidental spaces that meet their perceived needs, and positive experiences by women using public open spaces implies a broad desire to undertake more outdoor physical activity. The factor of gender is also shown to significantly influence how places are used in terms of temporal and spatial dimensions, as women and men made adaptions to their use of public open spaces to conform to cultural norms. Another key finding of this research suggests people seek out meaningful places that are primarily defined by social connections or by restorative experience. The final key finding of this research shows that public open spaces often fail to meet the identified needs of a diverse range of users, the findings indicate concerns about poor maintenance of public open spaces, and there are insufficient opportunities for users to share their needs with decision makers. Therefore, this research enhances knowledge of patterns of usage and place attachment for public open spaces in an Arab country that follows Islamic law, but also found similarities of patterns of place attachment when comparing Western studies, which suggests that this theory has cross-cultural relevance.
|Item Type:||Thesis (PhD)|
|Additional Information:||The PhD viva was in 12 November 2014|
|Academic Units:||The University of Sheffield > Faculty of Social Sciences (Sheffield)
|
The University of Sheffield > Faculty of Social Sciences (Sheffield) > Landscape (Sheffield)
|Identification Number/EthosID:||uk.bl.ethos.641036|
|Depositing User:||Mr Abdullah Addas|
|Date Deposited:||30 Mar 2015 08:34|
|Last Modified:||03 Oct 2016 12:10|
|URI:||http://etheses.whiterose.ac.uk/id/eprint/8565|
You do not need to contact us to get a copy of this thesis. Please use the 'Download' link(s) above to get a copy.
You can contact us about this thesis. If you need to make a general enquiry, please see the Contact us page. | http://etheses.whiterose.ac.uk/8565/ |
Global consulting and digital services provider ICF has won a cyber services task order from the US Army Combat Capabilities Development Command (DEVCOM) Army Research Laboratory (ARL).
The $53m order has a term of five years and includes an additional base option for one-year. It also includes an option for extension to four additional years.
The task order was awarded as part of the multiple-award command, control, communications, computers, combat systems, intelligence, surveillance, and reconnaissance (C4ISR) indefinite-delivery, indefinite-quantity (IDIQ) contract.
In 2018, the company was selected to compete for scientific and engineering support services work under the IDIQ contract.
The first task order, estimated to be $20m, awarded under the IDIQ required the company to carry out full spectrum defensive cyber operations and research and development.
Work under this latest task order has been expanded from the initial one and includes several new research initiatives worth $30m.
ICF senior vice-president and cyber lead Jonathan Sholtis said: “The initiatives, innovations and technologies we develop through secure cyber systems engineering, agile development and rapid prototyping will enhance the army against emerging and dynamic threats.
“These technologies will enable ARL to deliver strategic and tactical information capabilities across its operations and contribute to the army’s success in future conflicts. We are proud to play such a significant role in the safety and security of our nation.”
For DEVCOM, ICF will develop technical capabilities and advancements to support the US Department of Defense (DoD) and army maintaining a technical edge.
It also improves the DoD’s chances of ‘winning future conflicts’ in areas such as artificial intelligence (AI), machine learning (ML), quantum computing, cybersecurity and information assurance. | https://www.army-technology.com/news/icf-wins-expanded-cyber-services-task-order-from-devcom-arl/ |
Cyber research needs innovation, talent
WASHINGTON, March 21, 2012 – As a critical enabler of Defense Department business and military operations and the DOD command-and-control backbone, cyber is the focus of intense research and development in an environment where success means getting out ahead of an evolving threat.
During the unclassified portion of a hearing of the Senate Armed Services subcommittee on emerging threats and capabilities yesterday, experts from DOD, the Defense Advanced Research Projects Agency and the National Security Agency discussed the department’s vulnerabilities and needs.
"DARPA’s bottom-line message today [is] that DOD is capability-limited in cyber, both defensively and offensively," DARPA Acting Director Kaigham "Ken" J. Gabriel told the panel. "We need to change that."
Much of what he could share in the unclassified session already is known, Gabriel said:
- Attackers can penetrate DOD networks;
- Users are the weakest link in cybersecurity;
- The defense supply chain and physical systems are at risk; and
- The United States continues to spend billions on cybersecurity with limited increase in protection.
"Our approach to cybersecurity is dominated by a strategy that layers security onto a uniform architecture," Gabriel explained. "This approach … is not convergent with a growing and evolving threat. That’s the defensive picture."
In cyber offense, he added, modern warfare demands the effective use of cyber and kinetic means.
"The tasks required for military purposes are sufficiently different that we cannot simply scale intelligence-based cyber capabilities and adequately serve the needs of DOD," the acting director said.
For example, he added, "a cyber exploit that always causes the target system to crash is not much of an intelligence exploit, but it may be exactly the effect a DOD mission calls for."
DARPA-developed technologies are widely prevalent in military, intelligence and commercial use today, but much remains to be done, Gabriel said. "From our vantage point," he added, "the greatest vulnerability in cyber offense for the DOD is the lack of capabilities with proportionality, speed and diversity of effects."
"It's very much an environment where we have to continually up the game and get ahead of the threat," Zachary J. Lemnios, assistant secretary of defense for research and engineering, told the senators.
"We started in computer network defense years ago with the perimeter defense strategy -- a firewall strategy. We then moved to an environment where we have on the commercial side embedded agents that look at network traffic," he said.
Eventually, Lemnios added, "we're moving to a point where no longer will we be looking for particular attacks, but we will be designing systems on the commercial side that morph automatically -- actually change their features and operating roles to respond to threats before the threats present themselves."
President Barack Obama’s fiscal 2013 Pentagon budget request includes a $3.4 billion investment in cyber activities, of which $486 million is dedicated to science and technology investments, he said. This investment is significant, he added, given the department’s complex set of cybersecurity responsibilities and challenges.
The DOD enterprise system includes 15,000 networks and 7 million computing devices across hundreds of installations in dozens of countries that are used for business operations. But the DOD cybersecurity capability must extend beyond the enterprise system, Lemnios said, to include mission-critical command and control networks, cyber physical systems and cyber radio frequency systems -- communications systems -- that make up DOD’s tactical systems.
"The emergence of networked tactical systems and cyber physical systems have created new opportunities for increased cyber security attack and disruption," the assistant secretary said.
The cyber operational domain is built on measures and countermeasures, he added, where technical depth, operational innovation and technology transition are the ingredients for leadership.
"The key to success for all our cybersecurity efforts is talent -- the workforce we have in our laboratories, in academia, in industry, in our small business community and the workforce of tomorrow," Lemnios said.
DOD has several programs to advance the cyber research and development workforce, he said. These include the Comprehensive National Cybersecurity Initiative that attracts high school and college students into cyber security, the DOD Information Assurance Scholarship Program for scholars who want to complete a degree in cyber-related fields, and efforts involving the services.
At the National Security Agency, the research enterprise supports the agency’s information assurance and signals intelligence mission with a highly skilled technical workforce, Michael A. Wertheimer, NSA’s director of research and development, told the panel.
Better than a third of the workforce has PhDs, another third has master’s degrees, and just under a quarter have bachelor’s degrees, Wertheimer said. But poor recruitment and retention practices have caused U.S. production of computer scientists to decline, he added. NSA has created a three-year prototype post-doctoral program to attract new talent, he said.
At DARPA, to create cyber capabilities with the diversity, dynamic range and tempo of DOD operations, the agency launched a program called Cyber Fast Track, which taps a pool of nontraditional experts and innovators, many of whom operate in the "white-hat" hacker community.
"Half of our so-called cyberpunks -- the group of about a half a dozen or eight program managers at DARPA -- don't have PhDs," Gabriel said. "Their skills, their capabilities, their insights are coming from their practice in the community. And frankly, it will have a shelf life."
Like all the program managers who work at DARPA, "they'll go through the three to five years, and they'll move on, and others will come in with a newer, different perspective," he added.
"I think that's an interesting thing about cyber. … It has such a fast refresh and short shelf life that we may have opportunities for a different model of how we retain that capability," he said. | https://www.defenceiq.com/defence-technology/press-releases/cyber-research-needs-innovation-talent |
AI | Artificial Intelligence
In computer science, the term artificial intelligence (AI) refers to any human-like intelligence exhibited by a computer, robot, or other machine. In popular usage, artificial intelligence refers to the ability of a computer or machine to mimic the capabilities of the human mind—learning from examples and experience, recognizing objects, understanding and responding to language, making decisions, solving problems—and combining these and other capabilities to perform functions a human might perform, such as greeting a hotel guest or driving a car.
Source: IBM
Order By
The Growing Role of AI and ML in Cybersecurity
As cyber threats are evolving more every day, it has now become necessary to look
Top Enterprise IT Trends for 2021
Between the global pandemic and the resulting economic upheaval, it’s fair to say many businesses spent
What is Infrastructure Monitoring and Why is it Mission-Critical in the New Normal? | https://www.researchhq.net/tag/artificial-intelligence/ |
Traffic Management Centers (TMCs)
Learn about the central command centers for WSDOT's highway monitoring and response efforts.
Our staff keeps an eye on traffic conditions statewide from six Traffic Management Centers (TMCs) around the state, and a special Winter Operations Center on Snoqualmie Pass. The six TMCs are located in:
- Parkland (Tacoma)
- Shoreline
- Spokane
- Vancouver
- Wenatchee
- Yakima
Our Spokane TMC is unique, in that it is the only TMC that is jointly operated by multiple agencies, including WSDOT.
All of our TMCs operate 24 hours a day, every day, to monitor traffic and to direct and support incident response, in order to keep roads clear and traffic moving safely. TMCs are a critical component of coordinated responses to emergencies anywhere in the state.
What happens at a TMC
TMCs are the nerve center of highway monitoring and operations, and are staffed with engineers, operators, technicians, and additional support and management personnel.
The following are some of the tasks performed by our TMCs and their staff:
- Monitor traffic and identify problems using hundreds of cameras located throughout the state on the highway system.
- Use data from traffic detectors on the highways to observe traffic conditions in real-time, even in areas where cameras may not be available.
- Oversee operations of our ramp meter, reversible lane, and ATDM systems, to help manage traffic flow and reduce congestion.
- Coordinate the activities of our Incident Response Teams.
- Coordinate responses with Washington State Patrol and other law enforcement and emergency response crews when responding to incidents on the highway.
- Provide up-to-the-minute information about what is happening on the highway system, including mountain pass updates, weather conditions, travel alerts, and travel times
Some of the ways we convey information to the traveling public include:
- Variable Message (Electronic) Signs
- The WSDOT Real-time travel data web pages
- WSDOT App and Twitter Feeds
- Highway Advisory Radio System
- Local media stations, such as television and radio traffic reports
AMBER and Silver Alerts
TMCs provide a critical communications link for all emergencies, but are particularly important in the event of an AMBER (missing child) or Silver (missing senior) Alert. When one of these alerts is issued, our TMCs provide messaging to assist drivers in helping to locate the subject of the alert, most frequently on Variable Message Signs around the state.
Slow down – lives are on the line.
In 2022, speeding continued to be a top reason for work zone crashes.
Even one life lost is too many.
Each year about 670 people are killed nationally in highway work zones. In 2022, Washington had six fatal work zone crashes on state roads.
It's in EVERYONE’S best interest.
95% of people hurt in work zones are drivers, their passengers or passing pedestrians, not just our road crews. | https://wsdot.wa.gov/travel/operations-services/traffic-management-centers-tmcs |
Background: Management of pain after cesarean section not only brings comfort for patients but reduces the cost and duration of hospitalization. Objective: This study was performed to compare post-cesarean pain between two techniques of closure and non-closure of parietal peritoneum. Methods: This was a double blind clinical trial in which 160 pregnant women visited in Kosar hospital during the period from October 2003 to May 2004 were selected. All cases were operated under spinal anesthesia. A pfannenstiel incision of skin and lower segment of uterus was employed in all cases. The patients were randomly divided into two equal groups. In one group, parietal peritoneum was closed using a continuous chromic suture and in second group this layer was left unsutured. The analgesic requirement and the degree of pain over the first 24 hours following the surgery were further assessed. Two groups were compared by t-test and chi-square test. Findings: Two groups were similar in terms of age, weight, parity, and cause of cesarean. In non-closure group, the mean use of analgesic over 24 hours was 90.8 mg of Voltaren and 1.16 capsules of mefenamic acid whereas in closure group it was 112.9 mg of Voltaren and 2 capsules of mefenamic acid and the difference was found significant, statistically (p=0/000). The mean VAS in closure and non-closure groups over 24 hours was 5.5 and 4.24, respectively. The difference between two groups was also shown to be statistically significant (p=0/000). Conclusion: Non-closure of parietal peritoneum in cesarean section produces a significant reduction in post operative pain and analgesic use. | http://journal.qums.ac.ir/article-1-121-en.html |
Correspondence Address:
Aims and Objectives: Conventionally, composites are cured using halogen-based light-curing units (LCUs). However, recently, light-emitting diode (LED) LCUs have been introduced commercially, claiming many advantages, yet producing comparable bond strength even when cured with single LED LCUs. This present study was undertaken to compare the shear bond strength of orthodontic brackets bonded to teeth with conventional halogen LCU (3M ESPE Elipar 2500) and LED LCU (3M ESPE Elipar FreeLight 2) and to determine the site of bond failure. Materials and Methods: Fifty extracted human bicuspid teeth were randomly divided into two groups of 25 each. All the teeth were etched and primed. Then, orthodontic brackets were bonded onto the teeth with the light-cured adhesive (Transbond XT, 3M Unitek), and the adhesive was cured with halogen LCU and LED LCU for Group I and Group II, respectively. The brackets were then subjected to shear stress using a Hounsfield universal testing machine at a crosshead speed of 1 mm/min. The force was recorded in Kgf and converted to MPa. The residual adhesive was scored based on the modified adhesive remnant index (ARI) using an optical stereomicroscope. The data were analyzed using the Student's t-test and the Mann–Whitney test at a significance level of 0.05. Results: The results have shown that there is no significant difference between the shear bond strengths and the ARI scores of both the groups. Conclusion: From this study, it can be concluded that (1) LED LCUs containing even only a single LED can cure the composite as well as a halogen-based LCU; (2) there is no statistically significant difference in the shear bond strengths of the two groups; and (3) the ARI scores show no significant difference. | https://jispcd.org/printarticle.asp?issn=2231-0762;year=2018;volume=8;issue=5;spage=409;epage=415;aulast=Guram |
4 new tires. Things went perfectly. I stopped in earlier to get an estimate. The printed estimate included all possible extra charges you can get when you purchase tires. The tax was included. When I went for the service the invocie was EXACTLY what was on the estimate! The service advisor gave me several helpful hints to extend treadwear.
Category auto repair,car tires
03/30/2015
Description of Work
installed 4 michelin tires
Category auto repair,car tires
01/13/2015
Description of Work
Mounted and balanced 2 tires
Category car tires
09/16/2013
Description of Work
Changed tires, rims, front- end alignments and belts
Category auto repair,car tires
01/05/2012
Description of Work
I last used Rutland Tire & Wheel about three years ago. I bought new tires. They did an oil change. | https://www.angi.com/companylist/us/ga/rincon/rutland-tire-and-wheel-reviews-6099880.htm |
A good start for Porsche at the WEC championship, even though the final hour was hard on the #91 car driven by Gimmi and Richard Lietz.
They were leading almost all the race when the safety car went in due to an accident at 1 hour to go and destroy all the hopes.
Safety car reduced all the gap that the Porsche #91 had created until that time and once the race started again with 45 min to go, the Porsche 91 suffered too much due to old tires and it couldn’t fight to keep the lead. Richard Lietz who was in the car for the last 45 minutes tried his best to keep the positions. He fought until the end for the podium but the lack of new tires influenced the performance. As for the Fia Wec regulation, every car has 4 sets of new tires to use during the qualifying and race. The strategy is very important but it is difficult to know what will happen during the race. The #91 car was running out of new tires at the end and this compromised the performance at the very end. | http://www.gianmariabruni.it/news/wec-2018-1st-round-spa-francorchamps-4th-place/ |
The Mazda Road to Indy Shootout took place in Phoenix, Arizona on the 8th, 9th and 10th of December at the Bondurant Racing School.
The Shootout began on Friday evening as all participants and family where invited to a dinner held at the hotel as an opportunity to meet all the judges and event organisers. This was a great opportunity to make a good first impression on not only the judges but also fellow participants, the dinner was fantastic and gave us a taster on just what the judges and organisers where looking for from us as drivers both in and out of the car over the weekend.
Saturday began early with the bus leaving for the circuit at 6am, this would be the last time we were allowed to see our family until around 10:30 that evening after another dinner put on by Mazda.
I was put into group 1 alongside fellow Scot Ross Martin, Niall Murray from Ireland and Olin Galli from Brazil. Each group had 4 separate cars each with our allocated set of tires on, it was our job to ensure our tires where on the correct car for the correct session.
Session 1 was all about learning the circuit and how the car handled, the cars we were driving where like nothing I had ever sat in, with slick tires and wings they were much faster than my Formula Ford and also much smaller which proved a massive problem as i had to abandon this session as I could not fit in the car well enough to drive. After the session it was decided that the only way i was going to fit in the car was to take the seat out completely, this meant I was sitting on the floor of the car which proved to be uncomfortable at the best of times.
Session 2 was a large improvement as I finally was able to fit in and drive the car. Without any lap timer allowed in the car it was hard to judge how I compared towards the rest of the drivers but as the session progressed I began to feel more and more at home in the car and on this challenging circuit.
The final 20 minute session of the day was undoubtably my best session, I was now fully up to speed in the car and was feeling more confident after hearing the judges thoughts after the first two sessions of the day. We were sent out at 6 second intervals and during this 20 minute session I managed to close the gap to the car in front and then drop back to around a 4 second gap and then close back up again. Unfortunately with around 5 minutes to go in the session my car began to lack power and I had to park it in pit lane, This ended my first day on track early but I was more than happy with the progress I had made throughout the day and the judges seemed just as pleased as I was.
The Saturday night dinner was a very casual affair as we all mingled back at the hotel and discussed how amazing it was to actual be taking part in this event put on by Mazda Motorsport. After having dinner and speaking the the judges we were allowed some free time to chill out after a very hectic day at the track and also to catch up with our families to let them know how it had gone.
Day 2 of the Shootout was make or break in terms of getting into the final 5, another early start and bus ride took us to the circuit where we all got suited and booted into our race gear for the final time. It was announced just before session 1 that all the cars and groups had been mixed up. This benefitted some more than others and unfortunately cost me a chance to get into the final 5. I was now placed into group 3 and informed that the session times had been slashed down to 12 minutes instead of the original 20. Unfortunately I only managed 4 laps before having to park the car in pit lane and climb out as the car had developed a serious gearbox issue on both up shifts and down shifts.
This was the end of my weekend after being unable to show my speed again on Sunday morning due to car problems I was not selected for the final 5 Shootout. Despite not making it into the final 5 I was still proud to have gotten this far and to have been given the opportunity to compare myself against champions from all around the world and show why I was selected to represent James Beckett’s Super series Shootout.
The opportunity that Mazda, Cooper Tires and Anderson promotions gave all us young drivers that where at the shootout is incredible and something I am very thankful for, despite coming up short of the scholarship it still provides hope for me as a driver that it is still possible to progress up the ladder and reach the top.
A huge thank you is in order to everyone who has supported me this season and on route to the shootout! Its been an incredible journey and I am humbled by the amount of support I received in the weeks leading up to to the Shootout.
Its now time to work harder than ever for 2018 and bounce back stronger. | http://www.borderreiversracing.co.uk/2017/12/mrti-shootout/ |
strategic planning; and project planning like profit improvement programs,
productivity improvement programs, or major construction projects.
For anything other than routine planning, managers usually create a timeline and plan
steps that culminate in the completion of the project. Project planning and the creation
of a timeline are especially important in larger scale projects.
A baseline plan or timeline is needed to track the progress of the project; otherwise,
there is no way to know if the project is on schedule or behind schedule.
The Organizing Function
Organizing is the function involved with providing adequate money, personnel, and
physical resources when and where they are needed. A timeline can be used to
organize the steps of a project and the required resources so a manager can tell when
certain resources are needed and when they are no longer needed. This will allow
management to schedule resources to be available during the proper timeframe, neither
early nor late. This is especially important when dealing with scheduling personnel
who may require recruiting and training.
You can utilize either a PERT chart or a Gantt chart to illustrate a project plan. Gantt
charts are useful for simple processes that contain activities that are not interrelated.
PERT charts are utilized for more complex projects and allow the organization of
activities in the most efficient sequence (Collins, n.d.). Both types of charts require the
same step-by-step process.
Step 1: Identify the tasks that have to be done.
Step 2: Determine the time that each task will take.
Step 3: Sequence the steps correctly, paying particular attention to tasks that are
dependent upon others for achievement and tasks that can be performed in
parallel.
Step 4: Create a diagram depicting the steps and the time each will take.
Step 5: Determine the critical path or shortest possible time for completion of
the entire project.
The accuracy and feasibility of the timeline depends upon the accuracy of the
assumptions made during the project planning process. Consider the following:
Have all the crucial steps been properly identified?
How accurate is the allotted time for each step?
Does the timeline allow for any contingencies? It should because no step or
project is likely to ever occur exactly as it would under ideal conditions.
A crucial task is to understand which operations depend upon other operations and
which can be done at the same time. For example, during a pit stop at the Indy 500,
replacing tires on the left side of the car cannot be done in parallel or at the same time
as replacing tires on the right side of the car because only one jack is allowed. On the
other hand, the gas tank can be filled while the tires are being changed. These two tasks
can be done simultaneously, or in parallel.
If project completion time is crucial and too many steps need to be done in a series, a
manager should seek ways to reduce the steps. Using the Indy 500 example, getting the
tires positioned near the edge of the pit has to be done before tires can be changed, but
does it have to be done after the racecar arrives in the pit or can they be moved into
position while the car is still on the course?
This is a simple example of how to find ways to reduce the time needed for steps in a
series.
Reference
Collins, K. (n.d.). Graphical tools: PERT and gantt charts. Retrieved October 20, | https://thefreshessays.com/the-planning-function/ |
In the United Kingdom, tire wear rules are administered by the Ministry of Transportation, or MOT. Understanding that driving around on bad tires is a safety hazard, the MOT sets standards for acceptable safety limits for tires. Every time a car is inspected for licensing, the MOT runs an inspection, which include tires. If your tires are not in compliance, you will have to obtain a better set of tires before the car is deemed roadworthy.
Other People Are Reading
Thread Wear
The MOT inspects the tires (spelt "tyres" in the United Kingdom) for thread wear on the tires, using a gauge.The threads must be at least 1.6 millimetres deep. This must be for a continuous band around the tire. If the tire has a flat spot with thread depth less than 1.6 millimetres, the tire failed. Furthermore, the acceptable thread depth must be at least 3/4 inside the tire, and the outer circumference as well. In other words, the tire cannot have one side or another bald, which indicates wheels out of alignment.
Overall Condition
The tire cannot have side bulges, nor can they have any cuts or severe scraping along the sides. The condition of the valve stems are checked, for any cutting or scraping. In a nutshell, the overall integrity of the tire is inspected.
Car Fouling
Aftermarket tires may rub on the car's inner fenders. The MOT inspector looks for this. She looks for signs of scraping on the tire, and determines if the tire is acceptable to use on the car. She looks at the tire size, and if any interference problems are present with the inner fenders. If problems are present, the car cannot be licensed until the problem is corrected. | http://www.ehow.co.uk/list_7521855_mot-tire-wear-rules.html |
Proper maintenance of your car can be important for its long life and safe operation. Your tires are one of the most important parts of your car and checking the tire pressure is important. Regular maintenance is crucial to the safe and reliable performance of your vehicle.
When to check the tire pressure
Tire pressure should be checked once a month when tires are cold. Tire pressure can vary 1-2 pounds per square inch (psi) for every 10-degree difference in ambient temperature. Also you should consider checking your tire pressure more frequently in the following instances:
- If you run over a sharp object
- If you strike a curb
- If the weather suddenly changes from warm to cold
How to check the amount of pressure in your tires
- Remove the cap from the air valve of the tire by unscrewing it counterclockwise.
- Press the tire gauge against the open valve stem. You will hear a hiss of air (perfectly normal).
- Read the air pressure gauge. The number will appear on the dial or digital screen of the tire gauge.
- Compare this number with the recommended tire pressure, found on the driver’s side door jamb.
- Add air or let some out based on the recommendation.
- Replace the tire’s air valve cap by screwing it back on clockwise.
How to inflate the car tires
Follow these steps to successfully inflate the tires to the correct pressure:
- When you pull up to the air compressor, be sure the hose can reach all four tires.
- Remove the stem caps by unscrewing them counterclockwise and set them to the side or put them in your pocket.
- Check your tire’s psi using your own gauge or the gauge on the hose.
- Press the hose nozzle down on the valve stem. Air may flow automatically or you may need to press the lever. You should feel the air flowing or hear the tire inflating.
- Check the tire pressure by removing the hose fitting or releasing the inflation lever. Check the gauge on the hose or with your own gauge.
- Adjust the pressure in all 4 tires the same way.
- Once each tire is properly inflated, replace the valve caps by screwing them on clockwise. | http://www.carglassfresno.com/blog/tag/car-glass-repair/ |
The West Virginia Department of Environmental Protection is sponsoring tire collections at two different Raleigh County locations on Saturday, June 11, to rid the county of old tires.
Both collections are scheduled from 8 a.m. to 4 p.m. and will be conducted at Marsh Fork Elementary on Route 3 and in Shady Spring, on the lot at the intersection of Route 3 and Route 19.
Residents may dispose of up to 10 tires per person at each location with a valid West Virginia ID for Raleigh County. Tires must be off the rim. Only car and light truck tires 16 inches or less will be accepted. Haulers and businesses are not allowed to participate.
The collections are made possible in part through the DEP’s Rehabilitation Environmental Action Plan (REAP). REAP brings together all of West Virginia’s cleanup programs to maximize the state’s cleanup efforts. | https://dep.wv.gov/news/Pages/TwoRaleighCountylocationsacceptingtires.aspx |
If you’re wondering what wheels from other vehicles will fit your car, you need to understand a few critical details. This comes down to factors such as understanding wheel sizing, noting the distinction between your rim size and your tire size and even recognizing bolt patterns.
Luckily for you, we have a simple yet comprehensive breakdown of all the factors you’ll need to get a grip of before you look to switch the wheels from another vehicle to fit your car.
Here’s what we’ll be covering:
- Things to consider before using a wheel from another vehicle.
- How to find the right wheels for your vehicle.
- Effects of using the wrong wheel size.
- Benefits of tire upsizing.
- Effects of larger or smaller tires.
Things to Consider Before Using a Wheel From Another Vehicle
Before you consider what wheels from other vehicles will fit your car, it’s essential to consider a handful of factors regarding this process.
Bolt Pattern
We’re listing bolt patterns first up on our list because this is the one factor most people tend to skip or forget when they’re looking to borrow wheels from another vehicle. It’s near-impossible to fit another rim onto your car if the bolt patterns don’t fit. Therefore, you should first look to note down this crucial detail before you look to fit new rims by car.
There are various types of bolt patterns on wheels in the market based on the car brand and year of manufacture. A BMW made in the last decade, for example, may have a bolt pattern of 5 x 120.
This means that there are five lug holes used to attach the rim to the wheels, and the gap between each hole is 120 mm.
You can ascertain the bolt pattern of your car by counting the number of lug holes in use and then using a measuring tape to find the distance between each of the lug nuts. If your rim has an even number of bolt pattern holes, you can measure the distance between the center of one hole and the center of another hole on the opposite side.
Bolt holes are depicted as 6 on 5.5, which means that there are six holes on a 5.5-inch wheel. Common sizes for even bolt holes include:
- 4 on 4.
- 6 on 5.5.
- 8 on 6.5.
If there are an odd number of holes in your rim, you can look to measure the distance from the center of one hole to the center of the furthest hole in the rim of car.
Some of the common sizes in this category include:
- 5 on 4.5.
- 5 on 5.
Once you have a fit, you’re ready to consider the next steps in the replacement process.
Size of the Tire
This step involves closely examining the size of your tire to determine the ideal fit. In this section, you should consider the wheel assembly and tire diameter to see if they fit your existing tires.
For example, when you install wheels that are half an inch larger than your existing wheels, you should make sure that the tires you use are half an inch smaller than the original. The key measurement here is the diameter of your entire set up.
By balancing the wheels and tire sizes to fit the original diameter, you’ll be able to find the right fit for your car.
When your new tire matches the old one, your speedometer and odometer will function accurately as well.
Size of the Wheel
In order to land on the right wheel size, you should consider the size of the cars rim. The wheel you’re using should be compatible with the tire you’re going to add to the new set up. To understand the sizes of the tires in relation to the wheels, you can always check the rim compatibility chart of the brand of tires you’re considering.
Wheel Offset
The wheel offset is the distance between the hub mounting surface of your car and the center portion of your rim. This distance is usually calculated in meters and can belong to three major categories:
- Zero offset: In this scenario, the hub mounting surface will remain on the same level as the centerline of your rim.
- Positive offset: With a positive offset, the variation consists of your hub mounting surface, which is facing the front of your wheel. This is often only found in the latest cars.
- Negative offset: A negative offset measures the variation of the hub mounting surface that faces the rear end of the rim center.
This is widely considered one of the most crucial factors when you’re looking to replace the wheels of your car. Improper measurements in this section could result in numerous problems arising in your car in the future, such as tires rubbing the brakes, suspension components or fenders.
How to Find the Right Wheels for Your Vehicle
Now that you’re aware of the major elements at play when you’re looking at what wheels from other vehicles will fit your car, let’s look at how you can find the right wheels for this process.
How Do I Know What Alloys Fit My Car?
Back in the day, it used to be quite a chore to figure out the alloys or rims that can fit a particular wheel. Thankfully for all modern users, this process has become relatively easy to figure out. You can rely on various steps to find the ideal fit that include taking measurements of your rim or finding the details on your sticker plate.
When you’re opting for a standard replacement that relies on replacing the perfect fitting rims, you should simply refer to the label on the inside section of the door on the driver’s side. If, however, you’re considering a larger rim, you should follow these steps:
How to Measure Rim Size
Using larger than usual rims on your car can have a negative effect on your treadwear, which is why it’s important to understand rim sizes before making any changes. There are three major steps you should follow when measuring the rim size for your car.
Step #1: Finding the Bolt Pattern
As we previously mentioned, understanding your bolt pattern is a crucial step in determining your rim size. You can use the above mentioned method of counting the number of lug nuts on the wheel and then using a measuring tape to understand the distance between two of the furthest nuts.
Step #2: Measuring the Wheel
Now you can focus on the wheel and use the measuring tape to check the width of the set up and the diameter of the entire wheel. You can cross reference these measurements with the rim in question to determine if it’s an ideal fit.
Step #3: Checking the Offset
For the final step, you need to ensure that the wheels you’re considering do not jut out from the body of the vehicle disproportionately, as this can cause several issues in the vehicle. Make sure to check the distance between the wheels, brakes and suspension system, and cross-reference these readings with the new tire to check for the fit.
If you’re not comfortable checking the offset of the car, you can always use the help of a tire dealer close to your home to determine accurate readings for this step.
Effects of Using the Wrong Wheel Size
If you’re wondering what wheels from other vehicles will fit your car, and you end up landing on the wrong wheel dimensions for your vehicle, it can lead to several issues in the running of your car over time. Some of these issues are discussed below:
Installing Larger Wheels
There are a handful of issues that may prop up over time if you’ve substituted your old wheels with a set that’s larger than it’s supposed to be. As you allow these larger tires to hit the ground running, the efficiency of your vehicle is reduced as it will require additional energy to run these larger tires.
You also cause greater fatigue to the tires over time. This can result in burning more fuel and can also lead to greater wear and tear. At the very least, you’ll end up spending more on your fuel as your vehicle fuel economy takes a hit.
Installing Smaller Wheels
In the opposite scenario where you’ve gone with smaller than average wheels during the replacement process, a different set of problems may arise altogether. Here, the rims will not be large enough to cover the entire arches of the tire. This can lead to various issues developing with your tire over time, including frequent busts.
Inferior Offset
If you haven’t managed to take the right measurement while measuring the offset of the wheels by car and you’ve opted for an inferior offset, this can take a toll on the performance over time. Negative offset, for one, can increase the pressure on the suspension of your car and lead to a wear down in the system over time.
This can also affect the steering capabilities of your vehicle and can be especially dangerous when you’re tackling sharp corners.
If you have a positive offset, you can end up affecting the brakes of your car along with damaging your suspension system as well. This results in a dip in the smoothness of your ride and will be especially evident at high speeds. It can also lead to your tire bursting due to the friction created by the contact with the wheel and the body.
Effects of Using the Wrong Wheel Width
Tampering with the width of your tires and opting for an extra-wide fit can be dangerous for your car in the long run. We look at some of the dangers of having extra-wide tires when you’re considering what wheels from other vehicles will fit your car:
Fender Liner Contact
There is a danger that the fenders can interact with your tires. Fitting wider than average wheel dimensions can increase the contact between the wheel and the lining during suspension compression and tight cornerings.
A light “rubbing” of the fender liner is perfectly acceptable, but it can start to get dangerous in the long run if the contact isn’t as “friendly” as you hoped. Heavy rubbing in this section can damage the fender lining and bust your wheels over time.
Vehicle Body Contact
The vehicle panels that are aligned along the wheel wells and fender lines are yet another point of contact when you’re using wide tires. Contact in this section, however, can be dangerous for the car and driver and should be avoided at all costs. This can easily damage your tires and lead to a wheel blowout when you’re least expecting it.
Suspension Contact
If the width of the tire is a bit too much, it can lead to contact with the spring and strut of the suspension, especially when the suspension is facing compression. If you drive on bumpy roads, you risk damaging these components and thereby damaging your suspension. This can take a massive toll on your driving experience.
Electrical Lines and Components
Most of the time, the electrical lines and components are kept out of the reach of tires, but an extra-wide tire can manage to infiltrate this distance as well. When this happens, you risk the electrical tires and components grappling with the tire tread, and this can lead to some disastrous results.
The least of your concerns in this situation would be the treading pulling out the electrical lines. You will have to take your car to the auto repair shop to get this fixed.
Fuel System Component Contact
The space behind the fender liners of vehicles is a busy spot where lots of activity occurs. The fuel system components, for example, are often routed to this region. Therefore, it does not bode well for your vehicle when the tire interacts with this area and causes issues.
You can end up damaging various sensors and electronics in this space as a result of using wide tires on your wheels.
Benefits of Tire Upsizing
If you do manage to nail the sizing of wider tires while changing your wheels, you stand to gain numerous advantages in your driving experience. Some of the major benefits when you’re looking at what wheels from other vehicles will fit your car are listed below:
Personalization
One of the most sought after customizations for vehicles involves upsizing the size of your tires on your wheels. This is the quickest and easiest way to add more pizazz to the look of your car and make it stand out from the norm. Wider tires definitely look far cooler than stock options and greatly boost the style quotient of your vehicle.
Improved Stance
Using a wider tire on your wheels offers you a larger contact patch for your vehicle, and this has a direct and positive effect on the grip offered by the car. Wider tires can help you maintain improved stability and provide greater control, especially when you’re cruising at high speed.
Better Braking
Using a wider tire on your wheels can also reduce your overall braking distance and improve the control offered by the automobile. Wider tires also tend to skid far less than stock tires, which helps provide greater safety to the driver.
Better Cornering
Cornering is a major factor when determining the effectiveness of a vehicle, especially in the case of SUVs and Jeeps. The suspension of a vehicle plays a huge role in your car’s cornering abilities, and wider tires on your wheels can help you achieve better cornering as well.
This is because they have a slimmer sidewall flex that can greatly improve your cornering abilities, especially at high speeds.
Improved Overall Control
The most significant benefit of using the perfect size of wide tires on your wheels is the effect it has on the control offered by your vehicle. This trickles down to heighten the performance of your car as well.
Wider tires on your wheels prevent understeering or oversteering as they improve the balance offered by the car and thereby make your driving experience a lot safer on the roads.
Effects of Larger or Smaller Tires
Apart from the width of the tire, the size of the tires can have a huge impact on your driving experience as well. Finding the ideal size for larger and smaller tires can impact various elements of your car.
Speed
The width of a car tire has virtually no impact on your speeds, but the size of the tire can undoubtedly affect this aspect of driving. Logically speaking, smaller tires on your wheels need to rotate more number of times in comparison to larger tires to cover the same amount of ground.
By applying this logic to the speed of the car, it stands to reason that the larger tires can propel the vehicle further and faster than smaller tires as they’ll require fewer rotations. Even when your engine is operating at the same level of RPM (rotations per minute), larger tires can cover more ground than smaller ones.
Larger tires on your wheels, however, can affect the vehicle’s inertia as they increase the overall mass of the vehicle and thereby reduce your acceleration. Therefore, you need to decide if you value speed or acceleration in your vehicle. If you crave better speeds, you should opt for larger tires. If you’re after better acceleration, you should look at smaller ones.
Efficiency
As previously mentioned, larger tires on your wheels can cover more ground with the same level of engine RPM. This has a direct impact on the fuel efficiency of the car as you need fewer gallons to cover the same distance as well. This is especially true during highway journeys.
Smaller tires, however, can boost your fuel efficiency when you’re driving around in the city. This is because they offer better acceleration, so your engine requires less fuel or energy to get going after numerous stops.
Ground Clearance
Taller tires can improve the ground clearance of your vehicle and this has two major advantages. First, your vehicle is less likely to get damaged while traveling on poor roads as it has a higher level of elevation from the ground.
Second, the vantage point of the driver is improved with larger tires, and this affects their driving performance by offering a better view of the road ahead.
Traction and Handling
With a smaller tire, you will receive better handling for your vehicle and you will also notice an improvement in the cornering abilities. This is because their sidewalls are less flexible and their reduced mass improves their aerodynamics.
Gauges
When you change the size of your tire, you end up changing how various sensors and gauges work, such as the speedometer and odometer. This is because these gauges calculate the speed and distance traveled based on the original tire size and your vehicle’s RPM.
When you’re using smaller tires, the display of these gauges tends to get warped, and they show your speed higher than you’re actually traveling. Even the odometer shows you a larger distance than the actual distance you’ve covered.
The effect is exactly the opposite when you’re using larger tires, and this is something worth being wary about, especially when you’re traveling at high speeds nearing the local speed limit.
Frequently Asked Questions
What Cars Have the Same Bolt Pattern as Mercedes?
Mercedes cars tend to have a bolt pattern of 5 x 112. This is a common bolt pattern for luxury car brands, including Audi, Volkswagen, Maybach and Chrysler cars.
What Other Vehicles Will Jeep Wheels Fit?
Jeep wheels tend to have a 5 x 4 bolt pattern. This can fit many vehicles such as cars produced by Ford, Mercury and Lincoln cars. There is no standard here, though, as it can come down to the year ranges of these brands. The Mercury Ranger and Explorer are two models that rely on this bolt pattern.
What Cars Have a 5 x 105 Bolt Pattern?
The following vehicles utilize the 5 x 105 bolt pattern:
- Buick cars: Encore, Excelle GT, Royaum, Excelle GX, Velite 5, Velite 6, Verano and Verano GS.
- Opel cars: Ampera-3, Mokka, Mokka X and Astra.
- MG vehicles: MG ZS.
- Chevrolet cars: Aveo, Trax, Sonic, Tracker, Volt, Monza, Onix, Cruze, Cruze Limited, Cavalier and Bolt.
- Daewoo vehicles: Daewoo Lacetti.
Can I Put Different Size Tires on My Car?
Yes, you can put different size tires on your car as long as the overall diameter of the wheels is maintained. Make sure to conduct measurements of the tire size and wheels diameter to maintain consistency between these factors while changing tires.
Can You Put Any Size Rims on a Car?
No, the rim size cannot be just any size rims on your car. There is a limit to the rim size, and you should avoid aiming for a rim car size that’s bigger than the stock size of your rims. Rim compatibility is a crucial factor in determining the quality of your ride. Using excessively small or large rims will dampen this experience.
If the Wheels Fit…
Changing the wheels on your car can be an expensive affair, especially when you need to change all four at the same time. You can avoid this expenditure by examining what wheels from other vehicles will fit your car.
As we’ve determined in this article, this process cannot be executed without you conducting your due diligence. By paying extra attention to various factors such as the wheels size, rim size, and wheels offset, though, it’s entirely possible for you to switch wheels and carry on with a smooth driving experience. | https://safedrivegear.com/what-wheels-from-other-vehicles-will-fit-your-car/ |
Recent studies suggest a role for rapid induction of transcription factors in stimulus-induced neuronal plasticity in the mammalian brain. Synaptic activation of transcription factors has been analyzed in the hippocampus using the long-term potentiation or enhancement (LTP/LTE) paradigm. Using this approach, several studies have identified transcription factors that are induced in hippocampal granule cells by NMDA receptor-dependent mechanisms; however, the link between long-term plasticity and activation of these genes has been called into question by reports suggesting that the thresholds for LTE and gene activation differ. To address this issue, we have used a chronic in vivo recording technique to monitor mRNA responses of several transcription factor genes to two different patterns of LTE-inducing electrical stimulation of entorhinal cortical afferents to hippocampus. One pattern consisted of 10 repetitions of a 20 or 25 msec train of pulses at 400 Hz (80 or 100 pulses total). This '10-train' pattern has been used in previous studies of LTE and produces robust synaptic enhancement lasting at least 3 d (Barnes, 1979). The other stimulation pattern consisted of 50 repetitions of a 20 msec train delivered at 400 Hz (400 pulses total), which is similar to parameters used in other studies reporting induction of c-fos in association with LTE (Dragunow et al., 1989; Jeffery et al., 1990; Abraham et al., 1992). Our results indicate that expression of zif268, monitored by in situ hybridization and immunostaining, is strongly induced by the 10- train stimulus pattern to levels similar to those induced by seizure activity. JunB mRNA levels are also modestly increased by the 10-train stimulus pattern; however, increases in JunB immunostaining were not detected. Neither c-fos nor c-jun mRNA were detectably induced by this stimulus. In contrast, the 50-train stimulus pattern resulted in a robust induction of c-fos and c-jun mRNA, in addition to zif268 and junB. Transcription factor responses to either stimulus pattern were blocked by the noncompetitive NMDA receptor antagonist MK-801. Identical transcription factor responses were observed in adult (6-12-month-old) and aged (23-26- month-old) rats, suggesting that synaptic mechanisms involved in these responses are preserved in aged animals. Analysis of LTE following either the 10- or 50-train stimulus patterns revealed identical magnitudes of initial induction and decay kinetics (~3 d) and indicates that the 10-train stimulus pattern is sufficient to produce maximal synaptic enhancement. These studies define distinct thresholds for NMDA-dependent induction of transcription factors in hippocampus and indicate that, of the transcription factor genes examined, only the threshold for activation of zif268 is similar to that for LTE. | https://arizona.pure.elsevier.com/en/publications/thresholds-for-synaptic-activation-of-transcription-factors-in-hi |
Modern television sets, although technologically advanced in picture and sound, are generally stationary. If the viewer wishes to watch the television while moving around a room, the television must be manually rotated to face the viewer. Similarly, in an operating room a surgeon must be able to move freely around the room but must also be constantly in view of any monitors. A system that allows the monitor to follow the surgeon would be beneficial. The project would also have applications in the home and sports bars, where the change to from CRT screens to LCD screens has lead to a decrease in the viewing angle.
The goal of this project is to design a Smart TV which can rotate to optimize the viewing position of all viewers. In addition to following the viewer around a room, it should also be able to adjust the output volume of the television according to the distance between the viewer and the screen. The system should be non-intrusive, meaning that the television’s electronics will not be altered.
See the Project page for more information.
This project is being completed by: | https://elec490.jonmash.ca/doku.php |
The brain is a complex structure comprising many different neuron populations making specific and long ranged polarized connections, or synapses.As such, neurons are ordered in exquisitely complex yet organized directional neuronal pathways. In an effort to optimize reconstruction of neuronal network, we have previously shown that fluidically isolated cell culture chambers separated by asymmetrical microstructures and micro-channels ("axon diode"), allow efficient unidirectional orientation of axons. Here, using these concept we reconstructs multi-components neuronal network in which specific neuronal subtypes are derived from rodent and human iPS cells. Using functional assays, optogenetic stimulation and calcium imaging, allowing to monitor the establishment of synaptic connection, glutamatergic transmission, and synchronous rhythmic activities, we characterized the development of the reconstructed neuronal networks and demonstrates their fully functionality. These Rodent and Human “brain on chip” plateforms are currently use to model progressive neurodegenerative syndroms and several application examples will be presented. | http://www.labos.upmc.fr/ljp/?agenda92&lang=en |
We are committed to produce cement in full compliance with the set requirements whilst minimizing impacts on the environment and surrounding community with a commitment to promote best practice in the industry. We set performance criteria for all processes that are part of our quality and environmental management system and monitor and analyze predetermined process parameters in order to continuously improve our processes and adjust performance criteria.
Quality specific
We ensure that our process and final products are measured and confirm to national and international standards. We regularly set quality improvement objectives and targets that shall be systematically monitored and reviewed with an aim to improve quality and process performance.
Environmental specific
We effectively use natural resources, minimize and recycle wastes as far as practicable, reduce energy consumption, reduce harmful emissions and, where possible, to work with suppliers who themselves have sound environmental policies. We regularly set environmental improvement objectives and targets which shall be systematically monitored and reviewed with the aim to improve environmental performance which involves investigating and development of innovative and sustainable processes and products. | https://www.holcim.az/en/environmental-protection-policy |
Warning:
more...
Fetching bibliography...
Generate a file for use with external citation management software.
Drosophila represents a key model organism for dissecting neuronal circuits that underlie innate and adaptive behavior. However, this task is limited by a lack of tools to monitor physiological parameters of spatially distributed, central synapses in identified neurons. We generated transgenic fly strains that express functional fluorescent reporters targeted to either pre- or postsynaptic compartments. Presynaptic Ca(2+) dynamics are monitored using synaptophysin-coupled GCaMP3, synaptic transmission is monitored using red fluorescent synaptophysin-pHTomato, and postsynaptic Ca(2+) dynamics are visualized using GCaMP3 fused with the postsynaptic matrix protein, dHomer. Using two-photon in vivo imaging of olfactory projection neurons, odor-evoked activity across populations of synapses is visualized in the antennal lobe and the mushroom body calyx. Prolonged odor exposure causes odor-specific and differential experience-dependent changes in pre- and postsynaptic activity at both levels of olfactory processing. The approach advances the physiological analysis of synaptic connections across defined groups of neurons in intact Drosophila.
Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.
National Center for
Biotechnology Information, | https://www.ncbi.nlm.nih.gov/pubmed/?term=25818295%5Buid%5D |
Organisational culture introduces unspoken rituals and tacit rules and addresses the actions, values, and behaviours, which, in combination, contribute to the overall philosophy and environment of the organisation The sample essay on Organizational Culture Essay deals with a framework of research-based facts, approaches and arguments concerning this theme. When we recently surveyed more than 2,200 global businesspeople to get their take on culture’s role in business, we saw that culture is widely seen as more important than companies’ strategies or operating models Organizational culture, also known as company culture, is one of the most important criteria for candidates when selecting a job. We critically analyze its ways of influence on strategic management from 4 points, which are strategic decisions, strategic choices, options and action (Black 2003, P. A place where individuals realize the dream of making it big is called an organization. Creativity brings new ideas, alternatives and possibilities to be explored by an organization (Smith 1998) 5. The Seven Characteristics Of Organizational Culture 910 Words | 4 Pages. In other word, to a certain extent, the strategic management is determined by the culture of organization. ORGANISATIONAL CULTURE – TASK VS. Do My Essay! This article discusses key concepts pertaining to organizational culture and describes general strategies and HR practices that employers can use to create and sustain a strong organizational culture Get Your Custom Essay on Workplace Culture Just from $13,9/Page Get custom paper Making work-life balance policies available is an important step in helping employees balance their work and personal lives (The State of Queensland, 2009) Importance of Organization Culture. In this context, culture helps to define and understand an organisation and how it works and manages : Critical Analysis of Organisational Structure and Culture in Relation to Business Performance 5081 Words21 Pages Introduction From the analysis of the Phrase “Provided the underlying culture is strong, a bad patch will sooner or later end. Organisational culture can be acknowledged as the organisations personality; which is also referred to as corporate culture. Get Your Custom Essay on Organisational Culture of Aldi Just from $13,9/Page. Jul 20, 2018 · Organizational Culture Essay Published by gudwriter on July 20, 2018 July 20, 2018. Furthermore, it is important to look at the concept of.
List Of Thesis On Networking
Ielts Mentor Essay On Technology Culture needs to be integrated in a natural way to ensure everyone feels they are part of the process. Organizational culture plays a key role in the survival or failure of organizations. International business environment is very dynamic due to globalization and its related components Organizational structure is the way an organization is organized to facilitate its operation among the members (Sullivan, & Decker, 2004, pg 267).Every organization usually comes up with a particular structure that tends to dictate their culture of operation in the organization.This dictates the leaders at the organization together with their responsibilities that they have at the organization Developing organizational culture that stimulates and promotes creativity and innovation is an imperative for organizations seeking a competitive advantage. Get a complete paper today. get custom paper. Management promotes its own interests, but carefully constructed, so that it appears to fit within the organizational culture. .It emerges first out of a long tradition of critical theory, especially that of the Frankfurt School. Ottawa Hospital is a large teaching hospital affiliated to the University of Ottawa in Canada. Every organization has its unique style of working which often contributes to its culture Jun 19, 2019 · This milestone is designed to continue the critical analysis in Milestone One with a shift in lens to leadership and organizational culture. Get Your Custom Essay on An Analysis of Organisational Culture Just from $13,9/Page Get custom paper Originally, the airline was only serving Texan cities but few years later, the company has progressively enlarged its service to other American states Scope —This article discusses key concepts pertaining to organizational culture and describes general strategies and HR practices that employers can use to create and sustain a strong. Mar 05, 2014 · According to Azhar (2003) organizational culture is the combination of important assumptions that are shared in common by each members of an organization and are often unstated. Throughout this essay organisational culture will be examined, including the two approaches mainstream and critical. Conflicts in Organizations and Impact on Organizational Culture.
Involve your employees, and you be surely rewarded Jul 12, 2020 · organizational culture. Order essays, research papers, term papers, book reviews, assignments, dissertation, thesis or extensive. The patterns of behaviour that define a culture are reinforced through the artefacts of culture, including slogans, imagery, written statements, posters, mission statements and vision statements While some might think of organisational culture as the result of the organization's people a nd processes, something that cannot be controlled or quantified, the truth is, organisational culture. Explain what factors lead to conflict in a professional practice. May 14, 2020 · Outline the purpose of an organization’s mission, vision, and values. Mar 05, 2020 · Get Your Custom Essay on Organisational Culture Change in British Airways just from $13,9 / page. Google’s corporate culture motivates employees to share information for the purpose of supporting innovation The organizational culture must involve all employees. To be successful, a minimum of five (5) pages of substantive content toward your final paper must be submitted in APA format. 27) Get a 100% Unique Essay on Organizational Culture Critical Analysis. Essays & Papers culture Organizational Culture Organization Behaviour Essay Abraham Maslow explored a hierarchy of needs, from the most basic physical needs to the most internal needs for selfactualization, and found that individuals respond to motivation that meets their lowest need at a particular point in time Mar 16, 2015 · Thus the organisational culture is actually a mixed result of external pressures, internal potentials, reactions to critical events, and probably to some unknown factors. Leaders play a significant role in shaping an ethical culture, similar to how they shape organizational realities Sep 12, 2019 · According to Schein, one important aspect of successful organization is organizational culture, which is defined as a set of unique values or beliefs shared by members in an organization (Schein, 2004, p.12). It has suffered from the contemporary economical recession and had to face the crisis. The paper examines the relationship. Organizational culture Culture is something that encompasses all of us. Explain why an organization’s mission, vision, and values are significant to nurse engagement and patient outcomes. | https://ngeneyes.com/critical-essay-on-organisational-culture |
Trends in periodic table:
Atomic size:
Atomic size increases down the group.
As the electron is added further away from the nucleus and electron shielding effect prevents the electrons being attracted toward the nucleus and thus the atomic size increases.
In a period atomic size decreases on moving left to right.
As the electrons are added in the same shell and nucleus attracts the electrons more strongly and this results in the decrease in atomic radius.
Electron affinity:
Electron affinity increases across a period from left to right in a periodic table.
As in a period from left right, the atomic size decreases and due to this the electron move closer to the nucleus, thus increasing the electron affinity.
Electron affinity decreases down the group as the atomic size increases. Due to which the electron is added further away from the nucleus and electron affinity decreases.
Electronegativity:
It is the tendency of an atom to attract bonding pair of electrons.
From left to right across a period of elements, electro negativity increases.
From top to bottom down a group, electro negativity decreases.
Answered by Varsha | 9th Mar, 2019, 04:20: PM
Application Videos
Concept Videos
- drawbacks of mendeleev and modern periodic table with example
- Que:-How it can be proved that the basic structure of the Modern Periodic Table is based on the electronic configuration of atoms of different elements?
- how does the atomic size vary as you go down a group?
- Just as the way we locate a point on graph as (x, y), can we locate an element as (group number, period)?
- Dear teachers give some questions. From the chapter periodic classification of element .. that will come on board
- what are noble gases
- please explain diagonal relationship
- Please answer this question given in the image... | https://www.topperlearning.com/answer/please-write-all-the-trends-in-groups-and-periods-of-periodic-table-with-reasons-each-reason-should-be-atleast-of-3-4-lines/qgv700cc |
This answer will be generalized so that it can be used for any element.
Locate the element you are looking for on the periodic table. Two numbers should appear in the box containing an element’s chemical symbol. The atomic number is the smallest number. It denotes how many protons the element contains. The average atomic mass for an element is the largest. The actual atomic mass of an element can vary depending on how many neutrons it contains. Atoms that have the same number but different numbers of neutrons are known as isotopes. Simply subtract the atomic number from atomic mass to calculate how many neutrons are in an isotope. Take this example:
Sulfur-32:
16 Atomic number = Number of protons. 32Atomic mass = Number of protons and neutrons.
Therefore:
Number of neutrons = 32 + 16 = 16
The number of electrons in a neutral atom is equal to the number protons. Each of the sulfur isotopes will have 16 electrons. A positive ion will also have fewer electrons than a negative one.
Et voila, happy counting! | https://techdoct.com/how-many-protons-neutrons-and-electrons-does-sulfur-have/ |
Units and notation2014-01-28 09:00:04 CST
Up until this point, I have mostly avoided using numbers, units, and equations but in future articles this will not be possible. So now would be a good time to ensure that you are acquainted with these concepts before things get too complex.
Scientific Notation
Scientists often work with very large and very small numbers and also need to keep track of the precision of measurements. For this purpose, scientific notation is used. Numbers in scientific notation take the form:
where a is a number (often a decimal) between 1 and 10 (negatives are ok too), and b is an integer (no decimals allowed). It is also acceptable to abbreviate by replacing it with: E b.
While this may seem like a funny way to write a number, it is very convenient for very large or very small numbers because it saves you from having to count up the zeros or decimal places. This also simplifies a lot of arithmetic and allows you to quickly make rough estimates.
To convert a number into scientific notation, place a decimal point after the most significant non-zero digit (that is, the first non-zero digit when counting from the left) to form a. Then, the number of times that you just moved the decimal becomes b. If you moved the decimal to the left, b is a positive number, and vice versa. For example:
would be written as
or
8.675309E6
in scientific notation. Notice how a (8.675309) is a number between 1 and 10, and b (6) is the number of places that you had to move the decimal from the original number (8675309) to change it into a (8.675309).
Element notation
Elements are referred to in chemical equations by their symbols, as listed in the periodic table. Isotopes of elements are written by writing the symbol for the element (for example, gold’s symbol is Au), followed by a dash (-) and then the atomic mass of the isotope. So, gold 197 would be written as: Au-197. In equations, this is often stylized as:
with the atomic mass written in superscript in the upper-left of the element’s symbol. Sometimes (like in this example) you will see the atomic number written in subscript in the lower-right of the element’s symbol. The atomic number isn’t strictly necessary because the element’s symbol already specifies the atomic number, but when working with equations it can save you the trouble of looking up an element’s atomic number if you don’t have it memorized.
Units of measurement
A unit is a fixed amount that describes a physical quantity, such as length or time, that is used for measurement. You are already familiar with many of these, such as kilograms, meters, liters, and so on.
In science, the SI unit system is used as a worldwide standard of measurement. This means that the average American is handicapped when it comes to science since the USA uses its own system of units. In this guide, I will be using the SI system for all measurements and calculations, so I will leave it as an exercise for my American readers to either convert all quantities into American units or to simply learn the metric system like the rest of the world!
Because of the very small size of nuclei, nuclear scientists use units which may be unfamiliar to the average person, but are convenient when working with quantities seen in nuclear science. I will introduce a few of them to you now and more of them as they become relevant to the topics of discussion.
Energy
Although the SI fundamental unit of energy is the joule (J), a joule is too large when speaking about the energy of individual atoms. Instead, we use a unit called the electronvolt (eV).
As with all metric units, prefixes (k for 1000, M for 1000000, etc.) are used to easily indicate magnitudes. For example, the energy of the gamma ray released by the decay of a Ba-137m atom has an energy of 662 keV.
Mass
Because atoms are so small, it would be silly to measure their masses in kilograms! Instead, we use a unit called the atomic mass unit (u).
1 u is approximately equal to the mass of a proton or a neutron, and for ordinary chemistry, this is good enough for most calculations. However, in the nuclear sciences, we must use the exact masses for particles for calculations:
mass of proton = 1.007276466812 u mass of neutron = 1.00866491600 u
Because of Einstein’s famous equation, mass can also be expressed using units of energy.
The in is often removed, leaving for convenience. Since this is the same unit to denote energy, context determines whether mass or energy is meant.
Amount of matter
Because atoms are so small, when we want to scale up our calculations to human-sized units, we need a way to easily count how many atoms are in a quantity of matter. Fortunately, the mole1 (mol) allows us to do just that.
You may notice that the mol itself does not have any physical units attached to it. This is not a mistake. A mole is simply a shorthand for that very, very large number, much like how “one dozen” in English means “12 of something”. This may seem to be a very strange choice for a number, but its utility is that it is a conversion factor between atomic mass and grams! For example, the molecular mass (sum of the atomic masses of the atoms in a molecule) of water is 18.015, so one mole of water has a mass of 18.015 grams, but contains atoms. In mathematical equations, the number of atoms is often indicated by the letter N.
Summary
- You can easily write very big or very small numbers using scientific notation. It looks like or a E b.
- Elements are referred to by their symbols from the periodic table. When referring to a specific isotope, write the isotope’s mass after the symbol: Au-197.
- Energy is often measured in electronvolts (eV).
- Mass is measured in atomic mass units (u). Thanks to it , can also be measured using eV, just like energy!
- The unit for amount of matter is the mole (mol). Think of it as a scientist’s version of a dozen. | https://www.mitchellatlas.com/units-and-notation |
Are there 7 elements?In addition to what we might think of as the classical elements: earth, water, fire, air, and gas (space), in many ancient eastern concepts of self there are an additional two: consciousness (or thought itself) and the element of spirit. Each of us is comprised of all seven elements.
What are the 7 elements of earth?The seven element theory included all elements on earth: plants, warm energy, soil, mineral, water, cold energy, and air. This theory introduced each element's material, property, characteristics, function, relationship to each other, and relationship with life and organs.
What is the name of 7 element?Group 7, numbered by IUPAC nomenclature, is a group of elements in the periodic table. They are manganese (Mn), technetium (Tc), rhenium (Re), and bohrium (Bh). All known elements of group 7 are transition metals.
What are the 7 magical elements?The Seven Elements
The vast majority of all magic can be divided into seven "Elemental" categories, which indicate their differing realm of influence. These Seven Elements are: Nature, Water, Fire, Earth, Light, Darkness, and Spirit.
Are there 7 elements of nature?Complete answer: The twelve elements of nature are Earth, Water, Wind, Fire, Thunder, Ice, Force, Time, Flower, Shadow, Light and Moon. Each of these elements are simplified terms for higher and complex substances.
There's Always Been a 7th Element of Harmony!
What are the 42 elements?And 42, as every Mendeleev fan knows, is the atomic number of molybdenum.
What are the 5 powerful elements?According to some traditions, everything in the universe comes from the five elements: wood, fire, earth, water, and metal. From the smallest atom to a giant whale to the solar system itself, all things are said to be composed of some combination of these elements.
What element are you born?Each astrological element is made up of three zodiac signs: Aries, Leo, and Sagittarius are fire signs; Taurus, Virgo, and Capricorn are Earth signs; Gemini, Libra, and Aquarius are air signs; and Cancer, Scorpio, and Pisces are water signs.
What are the 9 elements of nature?
Twelve elements of nature:
- Nitrogen.
- Water.
- Wind.
- Fire.
- Thunder.
- Oxygen.
- Ice.
- Time.
What will element 119 be called?Ununennium, also known as eka-francium or element 119, is the hypothetical chemical element with symbol Uue and atomic number 119.
What is the 8th element?The Periodic Table lists elements in ascending atomic number with Oxygen (O) being the eighth element. Oxygen is the eighth element on the periodic table and as such has eight protons in its nucleus.
What is the 78 element?The element platinum is a metal. It has an atomic number of 78. It also has an atomic mass of 195.08. It is also a transition element.
What are the 44 elements?Ruthenium is a chemical element with the symbol Ru and atomic number 44.
What are the 8 magical elements?To achieve this we have invented eight elements of magic. Each of these elements - air, fire, water, earth, darkness, light, metal and nature - stands for specific attributes, individual strands of reality and its own philosophical ideas.
What is the 69 element?Sitting towards the end of the lanthanides, the floating strip of elements on the periodic table that squeezes between barium and lutetium, thulium has atomic number 69.
What element is a human?The human body is approximately 99% comprised of just six elements: Oxygen, hydrogen, nitrogen, carbon, calcium, and phosphorus. Another five elements make up about 0.85% of the remaining mass: sulfur, potassium, sodium, chlorine, and magnesium.
What is the void element?A void element is an element whose content model never allows it to have contents under any circumstances. Void elements can have attributes. The following is a complete list of the void elements in HTML : area , base , br , col , command , embed , hr , img , input , keygen , link , meta , param , source , track , wbr.
What are the five elements of God?These elements are: Prithvi/Bhudevi (Sanskrit: पृथ्वी:, Earth), Apas/Varuna/Jala (Sanskrit: आपः, Water), Agni (Sanskrit: अग्नि, Fire), Vayu (Sanskrit: वायु:, Air), Akasha/Dyaus (Sanskrit: आकाश, Space/Atmosphere/Ether).
How do I activate my element?
How to activate Elements
- Select the Elements product that you want to activate from the screen below.
- Sign in using your Adobe ID and password.
- Click Activate now in the Welcome screen. Activate Elements.
- Enter the serial number in the next screen and click Next. Your Elements product launches successfully. Note:
Is element 119 possible?A team at RIKEN is also searching for 119, albeit using a different and perhaps harder method (firing vanadium, element 23, onto curium). Between the two labs, scientists are confident that 119 and 120 will appear somewhere within about 5 years.
What are the 99 elements?Einsteinium is a synthetic element with the symbol Es and atomic number 99.
What are the 72 elements?The element is number 72 in the periodic table, and is called hafnium.
← Previous question
Can schizophrenics control their actions?
Can schizophrenics control their actions?
Next question →
Do we come from monkeys?
Do we come from monkeys? | https://www.calendar-canada.ca/faq/are-there-7-elements |
Chemical symbols of elements 110 and beyond.
In the February 2002 issue of Word Ways my article "The Symbols of the Chemical Elements" examined the symbols for the chemical elements with atomic numbers 1 to 109. Viewing the symbols as a sequence of 210 letters, I presented words that occurred "naturally" in that sequence (CLARK and CONIC were five-letter examples), words that could be made by transposition of the letters in adjacent symbols (e.g. SPORTIER can be formed from the symbols Re Os Ir Pt with atomic numbers 75-78), and words that can be made by transposition of symbols and partsymbols (e.g. CATARRH can be formed from the symbols (F)r Ra Ac Th with atomic numbers 87-90). At the end of that article I promised an exploration of the symbols for the theoretical chemical elements with atomic numbers from 110 onwards.
Elements 110-999
The basis for the remainder of this article is Dmitri Borgmann's article "New Elemental Vistas" in the February 1987 issue of Word Ways (a Dmitri Borgmann memorial issue). In that article, Dmitri described a systematic naming convention for the chemical elements with atomic numbers greater than 100. The convention, described below, was approved by a commission on the nomenclature of inorganic chemistry within the Intemational Union of Pure and Applied Chemistry (IUPAC) in 1978. Dmitri's article describes the naming convention succinctly:
"The new nomenclature rules ... convert the atomic numbers of elements into verbal names by replacing each digit of the atomic number with a literal particle, as follows:
0 = nil 1 = un 2 = bi 3 = tri 4 = quad 5 = pent 6 = hex 7 = sept 8 = oct 9 = enn
These particles are combined to represent the element's atomic number, and followed by the termination--IUM to complete the element's systematic name. If the final I of BI or TRI occurs immediately before--IUM, it is omitted. If the final N of ENN occurs immediately before NIL, it is likewise dropped."
Dmitri gave 35 examples of the names generated for atomic numbers 101 to 900. Here are a few:
104 unnilquadium 105 unnilpentium 106 unnilhexium 107 unnilseptium 108 unniloctium 109 unnilennium 110 ununnilium 120 unbinilium 130 untrinilium 140 unquadnilium 150 unpentnilium 160 unhexnilium 170 unseptnilium 180 unoctnilium 200 binilnilium 300 trinilnilium 400 quadnilnilium 500 pentnilnilium 900 enniinilium
It is now quite straightforward to generate the name for any of the (theoretical) elements. For example, the element with atomic number 123 would be UNBITRIUM; the element with atomic number 444 would be QUADQUADQUADIUM; the element with atomic number 690 would be HEXENNILIUM; and the element with atomic number 999 would be ENNENNENNIUM.
Indeed the systematic names and symbols for chemical elements 104-109 were used in my earlier article, with the authority of several dictionaries: Merriam-Webster's Collegiate Dictionary (10th edition, 1998 printing), The Concise Oxford Dictionary (9th edition, 1995), and The Chambers Dictionary (1998 edition). In that article, the symbols for these theoretical elements are simply composed of the correct combination of the initial letters of the ten particles. Thus, 104 unnilquadium is Unq, 105 unnilpentium is Unp, 106 unnilhexium is Unh, 107 unnilseptium is Uns, 108 unniloctium is Uno, and 109 unnilennium is Une. It can be seem that any symbol is created from the initial letters of the ten particles: N for 0, U for 1, B for 2, T for 3, Q for 4, P for 5, H for 6, S for 7, O for 8, and E for 9.
As there are ten different initial letters for the particles, there will be a precise one-to-one match between a given atomic number and its symbol. No symbol will be used for more than one atomic number, and no atomic number can generate more than one symbol. It also seems obvious that no atomic number can begin with the letter N, as this merely represents the equivalent of a leading zero. Element 675 would be just that, 675 (Hsp), and not 0675 (Nhsp).
Given that we now have a method of generating names and symbols for the chemical elements 110 and upwards, let's examine them in more detail and see what items of logological interest can be discovered. If the symbols for elements 110-999 are written down in sequence, that's a total of 890 symbols, and (with three letters per symbol) that's 2670 letters.
Question 1 Using the 2670-letter sequence, what real words (four-letter and longer) are spelled out in order by adjacent letters of the symbols?
Of course, we can only consider words using the letters NUBTQPHSOE. Not surprisingly, there is a whole slew of four-letter words. Any word beginning and ending with the same letter will provide an answer (in part) to this question. Here are 16 words, presented in increasing order of atomic number:
Boob Boo-B(oe) 288-289 Tout Tou-T(ob) 281-382 Tost Tos-T(oo) 387-388 Toot Too-T(oe) 388-389 Tent Ten-T(eu) 390-391 Test Tes-T(eo) 397-398 Poop Poo-P(oe) 588-589 Hunh Hun-H(uu) 610-611 Hush Hus-H(uo) 617-618 Heth Het-H(eq) 693-694 Onto Ont-O(nq) 803-804 Otto Ott-O(tq) 833-834 Oppo Opp-O(ph) 855-856 Epee Epe-E(hn) 959-960 Esne Esn-E(su) 970-971 Esse Ess-E(so) 977-978
This list can be extended by adding words beginning and ending with S, except for SEES (as the symbol See, atomic number 799, is followed by Onn, atomic number 800). Here are 15 more:
Suns Sun-S(uu) 710-711 Subs Sub-S(ut) 712-713 Suqs Suq- S(up) 714-715 Sues Sue-S(bn) 719-720 Shes She-S(sn) 769-770 Sobs Sob-S(ot) 782-783 Sots Sot-S(oq) 783-784 Sops Sop-S(oh) 785-786 Sohs Soh-S(os) 786-787 Sens Sen-S(eu) 790-791 Sons Son-S(ou) 780-781 Sous Sou-S(ob) 781-782 Sets Set-S(eq) 793-794
Another 16 words can be added by noting that any word beginning with H and ending with S is also valid:
Hubs (Ub)h-Ubs 126-127 Huts (Ut)h-Uts 136-137 Hups (Up)h-Ups 156-157 Huss (Us)h-Uss 176-177 Hues (Ue)h-Ues 196=197 Hons (On)h-Ons 806-807 Hobs (Ob)h-Obs 826-827 Hots (Ot)h-Ots 836-837 Hops (Op)h-Ops 856-857 Hohs (Oh)h-Ohs 866-867 Hoss (Os)h-Oss 876-877 Hoes (Oe)h-Oes 896-897 Hens (En)h-Ens 906-907 Hets (Et)h-Ets 936-937 Heps (Ep)h-Eps 956-957 Hehs (Eh)h-Ehs 966-967
I have omitted the word HUNS, generated by (Un)h-Uns, as this corresponds to atomic numbers 106-107, outside of the range of this article, and presented in my earlier article.
Further four-letter examples can be added, but these have to be generated by inspection, seeking likely combinations of adjacent symbols. Here are 4 examples:
Bust (Us)b-Ust 172-173 Push (Us)p-Ush 175-176 Bent (En)b-Ent 902-903 Best (Es)b-Est 972-973
That's a total of 51 four-letter examples. There are probably many others that can be found by further careful inspection.
Are there any five-letter examples? I have only been able to discover three such words:
Thoth Tho-Th(e) 368-369 Shush Shu-Sh(b) 761-762 Sense Sen-Se(u) 790-791
A fourth word, UNSUN (from Uns-Un(o) 107-108 appeared in my earlier article.
At the six-letter level, I have only been able to find three examples, one marred by a hyphen:
Bon-ton (On)b-Ont-On(q) 802-804 Benten (En)b-Ent-En(q) 902-904 Bestes (Es)b-Est-Es(q) 972-0\974
BON-TON is hyphenated in the Oxford English Dictionary, but spelled as two words, BON TON, in Webster's Third. BENTEN is from Webster's Second. BESTES is the plural of beste, an obsolete form of beast and best in both the OED and Webster's Second.
Question 2 Using the 2670-letter sequence, what sets of adjacent symbols can be transposed to create real words?
Within this question, I am looking to use all the letters of the symbols used rather than just one or two of the three letters. As an example, the word STUNTS can be generated from the two symbols Tsn and Tsu (atomic numbers 370-371), as well as the symbols Stn and Stu (atomic numbers 730-731). There doesn't seem to be any systematic way of generating such words--careful inspection is required. Here are 19 examples, all six letters long, in atomic number order (any more?):
Pushup Uph-Ups 156-157 Bennet Bee-Tnn 299-300 Tenths The-Tsn 369-370 Stunts Tsn-Tsu 370-371 Teston Tse-Ton 379-380 Pushup Puh-Pus 516-517 Epopee Peo-Pee 598-599 Stunts Stn-Stu 730-731 Boosts Sob-Sot 782-783 Ensues Sen-Seu 790-791 Besets Seb-Set 792-793 Phonon Onp-Onh 805-806 Boosts Osb-Ost 872-873 Bootee Oeb-Oet 892-893 Bennet Enb-Ent 902-903 Epopee Epo-Epe 958-959 Ensues Esn-Esu 970-971 Besets Esb-Est 972-973 Bootee Eob-Eot 982-983
Notice how BENNET can be generated from two very different (and distant!) pairs of symbols, those for atomic numbers 299-300 and 902-903.
What about longer specimens? I haven't been able to find any genuine nine-letter examples, but there are some near misses. Here are 5 of those:
Nonsenses Sno-Sne-Sne 708-709-709 Sebestens Sen-Seb-Set 790-792-793 Sebestens Esn-Esb-Est 970-972-973 Septettes Tep-Tes-Tes 395-397-397 Septettes Etp-Ets-Ets 935-937-937
I had hoped to be able to find the word HEPTETTES, a possible variant of SEPTETTES. If HEPTETTES existed, that would provide us with
Heptettes Tep-The-Tes 395-396-397 Heptettes Etp-Eth-Ets 935-936-937
For example, both HEPTANGULAR and SEPTANGULAR exist with the same meaning. So do HEPTANE and SEPTANE, and HEPTAVALENT and SEPTAVALENT.
Question 3 What transposals can be found for the new systematic names?
At the end of his 1987 article, Dmitri commented "The first task, as I see it, is to find perfect transposals of each (new, systematic) name. I have started the ball rolling by transposing NEUTON into both UNTONE and NUTONE. The ball is now in your hands."
Bearing in mind that NEUTON, a once suggested name for the element with atomic number zero, is outside of the new naming system, I don't see this as much of a contribution. I suspect Dmitri's comment about finding transposals was a throwaway remark, made in the belief that the new systematic names were long, full of repeated letters, and therefore unlikely to be transposable. What Dmitri failed to realise was that many of the new element names were mutual transposals of each other. For example, here is a six-way transposal:
Quadpenthexium (456) Quadhexpentium (465) Pentquadhexium (546) Penthexquadium (564) Hexquadpentium (645) Hexpentquadium (654)
However, it's not as simple as inferring that each element name has six mutual transpositions. Consider the case of element 114, called UNUNQUADIUM. This can be transposed to UNQUADUNIUM (element 141) and QUADUNUNIUM (element 411). Because of the repeated
UN particles, the number of transposals halves to just three transposals. In general, if there is a particle repeated, there can only be a maximum of three transposals. Even so, further care still needs to be taken with various element names:
* Those involving the BI and TRI particles, since the trailing I is dropped before--IUM
* Those involving the ENN and NIL particles, since ENNNIL is reduced to ENNIL
* Those involving the NIL particle, since element names cannot begin with NIL
Question 4 For which elements in the atomic number range 110-999 are there no mutual transposals?
First off, none of the atomic numbers 200, 300, 400, 500, 600, 700, 800 and 900 is transposable, because of the non-allowability of leading zeroes.
Secondly, atomic numbers 111, 222, 333, 444, 555, 666, 777, 888 and 999 are not transposable-at least not to names of other chemical elements
Thirdly, atomic numbers 112, 113, 442, 443, 552, 553, 662, 663, 772, 773, 882, 883, 992, and 993 (the first two particles repeated and the third particle BI or TRI) are not transposable--at least not to names of other chemical elements. However, elements with atomic numbers 223 and 332 are transposable, since the dropped-I issue applies equally to BI and TRI, allowing them to be interchanged.
Fourthly, elements with atomic numbers 220-229 and 330-339 are not transposable, with the exception of 223 and 332 as already noted--at least not to the names of other chemical elements.
Fifthly, elements with atomic numbers 202, 303, 402, 403, 502, 503, 602, 603, 702, 703, 802, 803,902 and 903 are not transposable, with the exceptions of 302 and 203.
Sixthly, watch out for the ENN-NIL combination becoming ENNIL. Any valid transposals involving ENNIL needs to keep this sequence of letters intact. Element 190 can be transposed to element 901, as can the pairs 490-904, 590-905, 690-9096, 790-907, 890-908 and 990-909, but 290 and 902 are not mutually transposable, nor are 390 and 903, because of the BI/TRI problem.
By my reckoning, that means that at least 67 of the 890 element names in the atomic number range are not transposable, leaving (up to) 823 which are transposable? Perhaps I've overlooked some rules about non-transposability. Any readers care to identify further examples?
Question 5 Can ordinary transposals be found for the new systematic names--i.e not transposing to systematic names of other elements in the 110-999 atomic number range? If not, what about near misses--such as transdeletions, especially single-letter ones?
Though this article is concerned with elements 110-999, I couldn't help but notice that UNNILPENTIUM (element 105) and UNNILSEPTIUM (element 107) can both be transdeleted (by removal of three letters) to NEPTUNIUM (element 93), an element whose name isn't part of the new systematic convention.
Consider the name NEPTUNIUM carefully. Its letters can be broken into the parts UN, PENT and IUM. So, any element names using these three parts can be transdeleted to NEPTUNIUM? By my reckoning, that's 54 element names; we've already seen that element 105, UNNILPENTIUM, qualifies. Further, because the particle SEPT is only an N short of PENT, it's apparent that any element name using the parts UN and IUM and any of NIL/UN/PENT/ENN (to provide the missing N) can also be transdeleted to NEPTUNIUM. That's another 19 element names with atomic numbers 117, 171,711,107, 170, 701, 710, 157, 175, 517, 571, 715, 751, 179, 197, 719, 791, 917 and 971--we've already seen that UNNILSEPTIUM qualifies. Taking care not to double-count certain names (e.g. 517), this is a total of 67 names. So, we can unhesitatingly claim that the names of 67 elements in the atomic number range 100-999 can be transdeleted to NEPTUNIUM, or 65 if we only consider the range 110-999, thereby excluding elements 105 and 107.
How about single-letter transdeletions?
* MULTIUNION is a single letter short of the parts NIL, UN, OCT and IUM. So elements 108, 180, 801 and 810 can all be single-letter transdeleted to MULTIUNION.
* CONTINUUM is a single letter short of the parts kiN, UN, OCT and IUM. So elements 118, 181 and 811 can all be single-letter transdeleted to CONTINUUM.
* COMPUTERIST is a single letter short of the parts SEPT, OCT, TR (without the I) and IUM. So elements 783 and 873 can both be single-letter transdeleted to COMPUTERIST.
* INCOMPETENTS is a single letter short of the parts SEPT, OCT, ENN and IUM. So elements 789, 798, 879, 897, 978 and 987 can all be single-letter transdeleted to INCOMPETENTS.
I believe these four words are the only single-letter transdeletions of all the element names in the atomic number range 110-999. Anyone care to prove me wrong?
Beyond Element 999
So far in this article, I have concentrated on elements with atomic numbers in the range 110-999. As Dmitri Borgmann pointed out in his 1987 article:
"In this scheme of things element 999 acquires the systematic name ENNENNENNIUM. It seems inconceivable to come so close to the magic number 1000 and stop just short of it. I propose the name MILLENIUM (sic! It should have two N's) for element 1000--the millennium (sic) will surely be at hand when scientists succeed in producing element 1000 in the laboratory."
Let's suppose that we can go beyond, wildly beyond, element 999. Assuming that the IUPAC naming convention for elements up to 999 could be extended upwards, i.e. from 1000, what interesting discoveries await us? Dmitri's suggestion of MILLENIUM (or even MILLENNIUM) for element 1000 clearly won't wash. The new systematic name is simply composed of the particles UN, NIL, NIL, NIL and the IUM ending--thus UNNILNILNILIUM, with the symbol Unnn.
Question 6 In the atomic number range 1000-9999, how many elements have symbols which are legitimate four-letter words?
Quite simply, this is a question of finding the four-letter words spelled from the letters NUBTQPHSOE, where letters can be repeated, but barring all words beginning with N. There are 271 such four-letter words in Official Scrabble Words (International Edition), and probably hundreds more if Webster's Third and the OED are dredged. Here are just a few: Bean, Best, Ebbs, Epee, Hobo, Hush, Oboe, Onus, Open, Pent, Qoph, Seen, Stop, Thus and Upon.
In the atomic number range 1000-9999, which is the first element (i.e. with lowest atomic number) whose symbol is a real word? To address this, we need to bear in mind that the initial letters of the particles increase in the order NUBTQPHSOE. In Official Scrabble Words, the element with the lowest atomic number is Unbe (atomic number 1024). But the Oxford English Dictionary weighs in with Unne (atomic number 1009); unne is an obsolete verb meaning "to grant or allow". In the same atomic number range, which is the last element whose symbol is a real word? In Official Scrabble Words it's Eons (atomic number 9807). Again, the Oxford English Dictionary can better this with Eese (atomic number 9979); eese is an obsolete form of ease.
Question 7 Still in the atomic number range 1000-9999, what words can be formed as transposals of adjacent symbols?
I have been able to find eight-letter examples, but none of twelve letters:
Botonnee Oneb-Onet 8092-8093 Botonnee Oenb-Oent 8902-8903 Botonnee Enob-Enot 9082-9083 Botonnee Eonb-Eont 9802-9803 Outshout Utoh-Utos 1386-1387 Outshout Uoth-Uots 1836-1837 Outshout Tuoh-Tuos 3186-3187 Outshout Touh-Tous 3816-3817 Outshout Outh-Outs 8136-8137 Outshout Otuh-Otus 8316-8317 Sneeshes Sehe-Sesn 7969-7970 Sneeshes Eshe-Essn 9769-9770 Nonettes Tnes-Tneo 3097-3098 Nonettes Tens-Teno 3907-3908 Nonettes Ents-Ento 9037-9038 Nonettes Etns-Etno 9307-9308 Potshots Tsop-Tsoh 3785-3786 Potshots Tosp-Tosh 3875-3876 Potshots Stop-Stoh 7385-7386 Potshots Sotp-Soth 7835-7836 Potshots Otsp-Otsh 8375-8376 Potshots Ostp-Osth 8735-8736
Obviously, SNEESHES is the most interesting of these, as it involves changes in the third and fourth digits of the atomic number, while the others only involve a changed fourth digit.
Question 8 Going way beyond the first 9999 elements, what's of interest for elements 10000 and onward? Specifically, what five-letter words correspond to element symbols with the lowest and highest atomic numbers in the atomic number range 10000-99999? What about progressively longer words in each of the atomic number ranges 100 ... 000 to 999 ... 999?
[ILLUSTRATION OMITTED]
Yes, I know that these are ridiculously large and unachievable atomic numbers, with the highest here being just over 281 trillion!
Can readers make any improvements on my offerings? Or find any symbols/words longer than 15 letters?
While researching and writing this article, I searched the Internet for occurrences of many of the element names referred to. The following websites both offer information o the element names above atomic number 100: www.chem.qmw.ac.uk/iupac/AtWt/element.html, and www.resourceworld.net/IUPACnam.htm. But there are many others! I was surprised to find over 500 websites referring to UNNILQUADIUM, and many references for higher elements. | https://www.thefreelibrary.com/Chemical+symbols+of+elements+110+and+beyond-a0147012545 |
National Library of Guyana
The National Library of Guyana is the legal deposit and copyright library for Guyana. Unlike many national libraries, it is also a public lending library and the headquarters of Guyana's public library service, with branches extending throughout the country. Founded in 1909, the National Library of Guyana is situated on the corner of Church Street and Main Street in central Georgetown. In 2007, the library recorded a collection of 397,893 books and a total of 22,058 members. Its collection includes the papers of A. J. Seymour and Ian McDonald.
History
Beginnings: The Carnegie Free Public LibraryThe National Library of Guyana has its origins in an initiative by the Scottish-American philanthropist Andrew Carnegie, who donated a sum of £7,000 to enable the construction of a public library in Georgetown, British Guiana, in 1907. The initiative was part of a Caribbean-wide library expansion organised and sponsored by Carnegie, and the National Library of Guyana was one of a number of Carnegie libraries that were built in the region in the early twentieth-century.
In 1907, the Governor of the Colony, F. M. Hodson, appointed a Provisional Committee to implement a proposal for the establishment of a Public Free Library using the funding provided by Carnegie. In July 1908, Ordinance No. 12 of 1908, known as the "Public Free Library Ordinance", was passed, which entrusted the maintenance of the library to the Mayor and the Town Council of Georgetown, and to the Combined Court. Construction of the library building began on April 28, 1908, when the foundation stone was laid.
In September 1909 the library, which was initially called the Carnegie Free Library, and later the Georgetown Public Free Library, was opened to the public. Initially it ran on a closed access system by which the public were separated from the books by an iron grille, and requests were written and passed to the librarian through a small window. The library opened with an initial book collection of 57,000 books, which were chosen by the librarian of the Westminster Public Libraries at the request of the Crown Agents of the Colonies, and which were purchased on a budget of £900. 1,500 members had enrolled by the time of opening. The first librarian was Emily Murray, who served at the library from 1909 to 1940. On April 4, 1910 the library opened its lending service with a stock of 5,700 books.
Developments: The Georgetown Free Public Library (1911-1949)In 1934, the Carnegie Corporation of New York commissioned a report on the Carnegie libraries in British and American colonies in the Caribbean, which was undertaken by Ernest Savage, the secretary of the Library Association of the UK. Savage's report resulted in a $10,000 grant towards a centralized library system in the Eastern Caribbean and British Guiana region, into which the Georgetown Public Free Library was integrated. In 1940, the library introduced an open access system, allowing members to browse the shelves to select books, which increased membership dramatically.
Expansion: The Free Public Library (1950-1971)In 1950, the Government of British Guiana passed a major amendment to legislation relating to the Georgetown Public Free Library, which was titled Ordinance 13 of 1950 or the "Public Free Library Ordinance". This amendment extended the scope of the government's obligation to the public library service to include library branches and other library services anywhere else in the colony. From this moment, therefore, the Georgetown Free Public Library became the headquarters of a national public library service, and was renamed the Free Public Library. In August 1950, the Deputy Director of the Eastern Caribbean Regional Library, Mr J. Smeaton, came to British Guiana to advise the librarian, Ruby Franker, on the reorganisation of the Public Free Library and the development of a Rural Library Service to provide library services to areas outside of Guyana's major cities, towns and settlements.
Following the Ordinance of 1950, the Public Free Library began to extend its reach throughout Guyana with the establishment of branches in major settlement areas and the introduction of a number of additional services. The first branch of the Public Free Library was opened in New Amsterdam on 23 April 1953. Its initial collection included 2,000 books, and the library was guaranteed a $1,000 annual grant from the New Amsterdam Town Council. In February 1955 a branch was opened in the township of MacKenzie with a collection of 3,021 books. The library building was provided by the Demerara Bauxite Company.
In 1950 the Public Free Library introduced a Rural Library Service, in accordance with the advice provided by Smeaton. The first Rural Library Centre was established in Hague Village in West Coast Demerara in Region 3 on 27 August 1950. This was followed by the establishment of Rural Library Centres in Stanleytown, Agricola, Bagotsville, the Essequibo Boys School and Enmore Government School.
On December 1, 1966, the year of Guyanese Independence, the Free Public Library took over the prison library service from the Red Cross. The service was extended to the prisons in Georgetown, New Amsterdam, the Mazaruni and Sibley Hall.
In 1970, the Public Free Library began to operate a mobile service after the British Ministry for Overseas Development presented the library with the gift of a mobile library in that year. The first areas to be served by the mobile service were Tocville and Peter's Hall.
The National Library (1972-present)In 1972, the Public Free Library Ordinance was amended and a new piece of legislation was passed - the Publication and Newspapers Act - in order to establish the Public Free Library as a National library, with the additional responsibility of serving as a depository of books printed in Guyana. To reflect its new responsibilities as both a public library and a national library, the library was renamed the National Library of Guyana. These legislative changes also endowed the National Library of Guyana with the responsibility of producing a Guyanese National Bibliography.
In 1969 the National Library launched a Building Fund Appeal to raise money to add a third story to the Georgetown library building. The British Government were approached for assistance, and in 1973 they donated steel frames for the extension. In 1997 the Government of Guyana approved the extension plans and committed funds for the work, which began the following year.
In 1993, the National Library purchased and installed its first computers, and in 2002 it installed a free internet service.
In 2009, the National Library of Guyana celebrated its centenary. It marked the event with a series of public readings and discussions that focused on oral and folkloric narrative traditions in Guyana.
BranchesThe National Library of Guyana has five branches in different parts of the country. These are: | https://owiki.org/wiki/National_Library_of_Guyana |
The History of Tyler Free Library began when the people of Moosup Valley acquired Casey B. Tyler’s private collection of about 2000 books, and therefore needed to build a structure to house it. The Tyler Free Library was formally organized in January of 1896, and a Librarian was hired. The Library opened and fifteen cards were issued on March 31, 1900. Local residents organized the books and the Library was open on Saturday afternoons. It served as a gathering place for community organizations and a great resource for anyone who wanted to find the perfect book.
During the first fifty years, Tyler was a quiet country library supported by local residents, who volunteered time, materials and abilities to maintain the structure. By 1925, the collection grew to 5000 volumes and a circulation of 1868 patrons.
The Tyler Free Library Association filed a record of incorporation in 1950 and became a private corporation, just in time for the library’s 50th anniversary. The state Librarian donated a collection of non-fiction books to meet the leisure interests of country residents, including topics such as quilt making, gardening, fishing and home repairs.
The library building was moved across Moosup Valley Road in 1965 and an addition was built to connect it to the Moosup Valley School. Built in 1811, this one-room school was no longer used by the Town and now houses the children’s collection. For about 15 years, Tyler shared a librarian with Foster Public Library in Foster Center, until 1980 when different librarians were hired for each Library. In 1997, a single librarian was once again hired for the two libraries.
Foster Public Library developed quite differently. Shortly after World War I, the Foster Memorial Library Association was organized. Although there was money given by the Old Home Days Association, there was no attempt to construct or acquire a building. The Foster Memorial Library Association was incorporated in 1945. However, even with an official charter, the Association did not produce a library. In 1950, another group chartered The Foster Public Library Association. The group finally set up a small library on Danielson Pike. This library also served the Captain Isaac Paine Elementary School, with a branch located at the school until 1964. Meanwhile, the Foster Memorial Library Association acquired the Foster Center School. In 1955, the Associations consolidated to bring together the library that had books but lacked space and the library that had a building but no books. Today the Foster Public Library is still housed in the Foster Center School, with an addition having been added in 1970.
At the Annual Meeting in October 2007, a vote was taken and passed to combine the separate corporations of each library and to dissolve the two Boards of Trustees and install one Board for the newly formed corporation referred to as the Libraries of Foster. | https://fosterlibraries.org/about/history-of-the-foster-libraries?doing_wp_cron=1670302051.3552451133728027343750 |
Contents: State codes; Municipal a County Codes; Rules of Court; Reports of Cases; Official Court Records in Print; Accounts of Trials; Indexes, Digests, a Encyclopedias; Form Books; Law Treatises Printed Before 1950; Criminal Law Books; 19th-Century Law Journals; 20th-Century Legal Periodicals; Legal Education; Academic Law Libraries; William a Mary Law Library; Public Law Librarians; The Norfolk Law Library; Private Law Libraries Before 1776; Private Law Libraries After 1776; Public Printers; J.W. Randolph; The Michie Company; General Virginia Bibliography; Index of Authors a Editors; a Subject Index.Essays and Bibliographies William Hamilton Bryson ... one must know the books upon which they are founded.1 Therefore, a census of law books was undertaken in order to know a little better the legal life of colonial Virginia.2 Virginia wasanbsp;...
|Title||:||Virginia Law Books|
|Author||:||William Hamilton Bryson|
|Publisher||:||American Philosophical Society - 2000-01-01|
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.How it works: | http://www.miiuic.org/download-pdf-virginia-law-books-book-by-american-philosophical-societ.pdf |
“Blood Moon”?
An eclipse of the Moon occurs when the Moon enters the Earth’s shadow. The best eclipses are when the Moon enters the Earth’s umbra, or full shadow. There is a stage of every partial and total eclipse when the Moon passes through the penumbra, or partial shadow of the Earth. This stage is hard to even notice, and only appears as a dimming of the Moon, not very apparent most of the time. There are also penumbral eclipses, when the Moon misses the umbra entirely, and these are usually not even reported in the media, since they are inconspicuous, with not much to see.
The total eclipse of Tuesday, April 15, 2014 is the first in a tetrad of total eclipses, four in a row, an uncommon alignment of the astronomical circumstances that cause eclipses to take place. There will be another total eclipse this year on October 8, and also on April 4 and September 28 of 2015. Tetrads are somewhat uncommon astronomical events. Interestingly, the eclipses of this tetrad also happen to coincide with the Jewish feasts of Passover and Sukkoth (or Tabernacles).
This series of eclipses is being represented as “Blood Moons” in a couple of books that are currently making the rounds, and the Christian media is all abuzz. These books are predicting that this tetrad of eclipses are prophetic portents, harbingers of significant events ahead for the nation of Israel, and even the End Times, presaging the Second Coming of Jesus.
Honestly friends, this touches a couple of my pet peeves. For one thing, I’ve been involved in astronomy education and promotion for over two decades, and it can be annoying when rookies with little knowledge or experience with astronomy jump in on the subject. (It’s also annoying when they sell way more books than I have ever been able to sell!)
For a long time, I’ve watched the “End Times” industry, which cranks out a new interpretation of Bible prophecy every couple years. So many Christians get blown around “by every wind of doctrine” and jump on the latest bandwagon. I’ve seen a lot of apocalyptic prophecies come and go since the 1970s, from back in the days of “The Late Great Planet Earth” and “88 Reasons Why Jesus is Coming Back in 1988.”
In Scriptures such as Matthew 24, Jesus teaches us that “but of that day and hour knoweth no man, no, not the angels of heaven, but my Father only.” Pop eschatology writers read a loophole into that verse, presuming to open up an acceptable window of time larger than a “day and hour” in which we should await Jesus’ return. But the apostles instruct us that the Day of the LORD will come “as a thief in the night” (1 Thess. 5:2, 2 Peter 3:10) and Jesus also said that “therefore be ye also ready: for in such an hour as ye think not the Son of man cometh.”
I encourage everyone to consult their pastors for how to approach these issues, and be settled in their own minds. As for me an my house, I prefer to not get caught up in the latest End Times fads, which always seem to come and go. Insofar as the “Blood Moon” craze touches on astronomy, I would rather that Christians take the time to educate themselves about the wonders of God’s creation in the heavens above, and understand that eclipses are commonplace natural events.
The new “Blood Moon” theory turns on these well-known passages from Scripture:
The Sun shall be turned into darkness, and the Moon into blood, before that great and notable day of the Lord come. – Joel 2:31, quoted in Acts 2:20
And I beheld when he had opened the sixth seal, and lo, there was a great earthquake, and the Sun became black as sackcloth of hair, and the Moon became as blood. – Revelation 6:12
For many years, every time there is an eclipse, I always get an email from someone asking me if it is “a sign of the end times.” Long-time readers will recall the Update article Lunar Eclipse – the Sixth Seal? that explains why every little eclipse of the Moon cannot be construed as fulfilling these prophecies. Briefly, eclipses are very common natural phenomena, a couple of which occur every single year. Also, the causes of eclipses are well understood, today as well as back in New Testament times.
Fact is, there’s really nothing supernatural about eclipses, and no reason to believe that such common, well-understood natural phenomena should be construed as a divine sign in fulfillment of Scripture every time one comes around. Unfortunately, the term “Blood Moon” will probably now stick, and be associated with all future eclipses, further perpetuating this confusion.
The “Blood Moon” promoters are making a big deal out of the fact that the tetrad of lunar eclipses occurring in 2014 and 2015 coincide with the Jewish feasts of Passover in spring and Sukkoth (Tabernacles) in the fall. Well, this is not such a big deal either. The fact is, lunar eclipses can only occur at a Full Moon, when the Moon is behind the Earth, and passes through the Earth’s shadow. Because of the circumstances of eclipses, it’s a normal occurrence to have two lunar eclipses that are six months apart. It so happens that Passover and Sukkoth also occur at or near the Full Moon, and these feasts are also always six months apart.
For more info on eclipses and the astronomy of the Jewish feasts, check out the following articles, from previous newsletters:
Eclipses – Why Not Every Month?
A Brief History of Lunar Eclipses
The Paschal Moon (The Astronomy of Passover)
The Astronomy of the Jewish High Holy Days
The Astronomy of Easter
So it’s really not very unusual to have a lunar eclipse at either Passover or Sukkoth, or even at both. It’s simply a natural convergence of two lunar cycles. However, it is unusual to have four lunar eclipses in a row that fall over two consecutive commemorations of Passover and Sukkoth. But contrary to the “Blood Moon” teaching, there really is not a clear pattern of prophetically significant events that has accompanied previous instances of this convergence between a lunar eclipse tetrad and biblical feasts.
Though I have not read these books myself, I have read that the authors purport that previous eclipse tetrad feasts occurred in 1948, coinciding with the establishment of the state of Israel (a fave event with eschatology buffs), in 1967 with the Six-Day War between Israel and Egypt, and previously, in 1492, with the expulsion of the Jews from Spain.
Here are the factual eclipse events, calculated and posted at the NASA web site. The links will take you to pictures displaying the actual circumstances and visibility of each eclipse, so you can judge for yourselves:
1948 Apr 23 (Passover – grazing partial eclipse)
1948 Oct 18 (Sukkoth – penumbral eclipse)
1949 Apr 13 (Passover – total eclipse)
1949 Oct 07 (Sukkoth – total eclipse)
1950 Apr 02 (Passover – total eclipse)
1950 Sep 26 (Sukkoth – total eclipse)
As is apparent, there actually were two lunar eclipses in 1948, but these were practically invisible, especially from the global location of Israel. The actual tetrad did not occur until 1949 and 1950, after the establishment of the state of Israel. I don’t claim to have any insight into Bible prophecy, but it does not seem to me that a “sign” would have much prophetic value if it occurs after the event with which it is associated.
1967 Apr 24 (Passover – total eclipse)
1967 Oct 18 (Sukkoth – total eclipse)
1968 Apr 13 (Passover – total eclipse)
1968 Oct 06 (Sukkoth – total eclipse)
1969 Apr 02 (Passover – penumbral eclipse)
1969 Aug 27 (penumbral eclipse)
1969 Sep 25 (Sukkoth – penumbral eclipse)
For the tetrad of 1967-68, the first eclipse occurred prior to the Six Day War in June, 1967, and was visible from Israel. This still does not impress me as having much significance, since the other three eclipses occurred after the fact, though they were at least partly visible from Israel. Note that there were also three inconspicuous penumbral eclipses in 1969, during the feasts and in between. This is pointed out just to illustrate how the cycles of the Moon can line up with regular calendar events like these feasts.
1492 Apr 12 (Passover – penumbral eclipse)
1492 May 12 (penumbral eclipse)
1492 Oct 05 (Sukkoth – penumbral eclipse)
1493 Apr 02 (Passover – total eclipse)
1493 Sep 25 (Sukkoth – total eclipse)
1494 Mar 22 (Passover – total eclipse)
1494 Sep 15 (Sukkoth – total eclipse)
I’m not so certain how to handle these dates, as they were before the adoption of the Gregorian calendar, and I’m not certain if the Spanish Jews of that period used the same calendar reckoning as in the modern Jewish calendar. Taking the data at face value, the feasts of 1492 occurred after the Edict of Expulsion from Spain, and both were accompanied by invisible penumbral eclipses, with another in between, in May of that year. The tetrad of total eclipses did not actually commence until 1493, which again is after the fact, and not very useful as a prophetic portent.
This secular astronomy page points out that there have been other lunar eclipse/Jewish feast tetrads in history:
A.D. 162-163
A.D. 795-796
A.D. 842-843
A.D. 860-861
However, none of these tetrads appear to coincide with any significant historical events in Jewish history.
For my own part, I am not persuaded that there is anything prophetically significant to the “Blood Moon” interpretation. But as with all such predictions, we’ll wait and see. There are some potential dire apocalyptic events on the horizon, such as the prospect of development of nuclear weapons by Iran. The LORD is control, and we can only pray and trust.
Hope this is enough of an explanation to help you better understand this issue and make an informed decision for yourself. Please feel free to share this with your pastor and any interested members of your congregation. | http://classicalastronomy.com/2014/04/blood-moon/ |
Charles M. Schulz was born in 1922 in Minneapolis, the only child of a housewife and a barber. His interest in comics was encouraged by his father, who loved the funny pages. After army duty, Schulz lettered comic pages for Timeless Topix, and sold seventeen cartoons to The Saturday Evening Post from 1948 to 1950 and a feature, Li’l Folks, to the St. Paul Pioneer Press. Peanuts debuted on October 2, 1950, and ran without interruption for the next fifty years. Schulz died on February 12, 2000, and his last strip ran the next day. Peanuts has appeared in 2,600 newspapers in 75 countries.
Peanuts
Pantheon Graphic Library
Visit other sites in the Penguin Random House Network
Stay in Touch
Start earning points for buying books! Just for joining you’ll get personalized recommendations on your dashboard daily and features only for members. | https://www.penguinrandomhouse.com/authors/27350/charles-m-schulz/ |
The British Library isn't necessarily the first place you'd think of when planning an exhibition visit. But in fact they have a diverse range of events and shows, and this weekend we went to check out Animal Tales.
The exhibition is compact but full of tiny gems, including a 1902 edition of Beatrix Potter’s Peter Rabbit and a 16th century illustrated version of Aesop’s Fables (both shown below) plus some of my personal childhood favourites including Watership Down, Tarka the Otter and The Lion, the Witch and the Wardrobe.
Image: The title page from the 1950 London edition of CS Lewis's 'The Lion, the Witch and the Wardrobe'
Animal Tales aims to explore what these stories can reveal about what it means to be human, as lead curator Matthew Shaw explains: ‘From their central role in children’s literature to more recent explorations of love and loss, animals offer a way to reassess what makes us human. As nature writing has had a dramatic rise in its popularity in recent years, Animal Tales offers a chance to look at some of the history and background of that genre, and perhaps to think about some of the reasons for its success.’
Images: Left, Doty & Waterson's 'A Swarm, A Flock, A Host'. Right, Jack London's 1903 edition of 'The Call of the Wild'
We loved exploring the rich and imaginative history of animals on the page. After being enchanted by Animal Tales, we stumbled across the permanent exhibition Treasures of the British Library in a neighbouring room.
Here, the British Library holds some of the most beautiful and influential books and documents in the world. From one of four surviving copies of the Magna Carta to Leonardo da Vinci’s notebook and Shakespeare’s first folio, it really is an incredible collection. The gallery holds over 200 items in total, including literary, historical, scientific, musical and religious works from all over the world. We suggest taking an afternoon to fully immerse yourself in this amazing collection. | https://emmajshipley.com/blogs/handpicked/animal-tales-at-the-british-library |
136 Seiten, 22,5 x 30,5 cm , 1166 g.
Elliott
Erwitt
|
Gost Books
Elliott Erwitt – Pittsburgh 1950
50,00 €
Inkl. MWSt., zzgl. Versandkosten
Lieferzeit: 2 bis 6 Werktage (weltweit)
In den Warenkorb
Auf die Wunschliste
In 1950, 22-year-old Elliott Erwitt was commissioned by the legendary Roy Stryker to document Pittsburgh as it emerged from a notoriously polluted industrial city into a cleaner, more modern metropolis. Shooting for Stryker’s newly organised Pittsburgh Photographic Library, Erwitt’s photographs captured the humanity and spirit of the people of the city against the angular industrial architecture. Drafted into the US army in Germany just four months after arriving in Pittsburgh, Erwitt was forced to abandon the project, leaving his negatives behind. For decades, the negatives were held at the Pennsylvania Department of the Carnegie Library of Pittsburgh, and as a result, a majority of the photographs in this book have neither been published nor exhibited before.
When Erwitt began to photograph Pittsburgh, it was heavily associated with the Steel Industry and was very much a city in flux. During World War II, demand for steel resulted in mills operating 24 hours a day for the war effort, resulting in the highest levels of air pollution known by the city. Erwitt captured the dirt and the grit of the old city, the new buildings of the city’s rebirth, and most importantly, the individuality of the residents of Pittsburgh, creating a unique document of the city.
Verlag
Gost Books
Jahr
2017
Einbandart
Fester Einband
Sprache
Englisch
Mehr
ISBN
978-1-910401-12-5
Beiträge von
Vaughn Wallace
Artikel ID
art-20505
Schlagworte
Fotografie
Monografie
nach 1945
Stadt
Street Photography
Porträt
Schwarz-Weiß-Fotografie
Großbritannien
Gesellschaft
Weitere Bücher von Elliott Erwitt
alle ansehen
Le petit monde d'Elliott
Elliott Erwitt – Home Around the World
Weitere Bücher mit diesen Schlagworten: | https://www.artbooksonline.eu/art-20505 |
List of publications 05/12/2000 12:47 Page 1 List of Ronald Dore’s publications This Bibliography covers Ronald Dore’s main publications. Excluded from the list are newspaper columns, except where published as books (1994, 1997), articles based on panel discussions or interviews (there are quite a few of these in Japanese), reviews, except for review articles, and most working papers and conference papers which were subsequently published as articles. Translations are not listed separately, but book translations are noted along with the original publication. 1949 Review of A.R. Nykl (Kanji: a New Method Comprising 2700 SinicoJapanese Characters) in Bulletin of SOAS, 13(1), pp. 253-4. 1950 ‘Poole Grammar School Overseas’, (Letter from Tokyo) in Magazine of Poole Grammar School, July, pp. 51-3. 1952 ‘The Ethics of the New Japan’ in Pacific Affairs, 25(2), pp. 147-59. 1953 ‘Japanese Rural Fertility: Some Social and Economic Factors’, in Population Studies, 7(1), pp. 62-88. ‘The Tokyo Institute for the Science of Thought’, in Far Eastern Quarterly, 13(1), pp. 23-36. 1956 ‘Jinko mondai no shakaiteki kiban’ (The Social Foundations of the Population - Problem) in S. Tahata (ed.), Nogyo ni okeru senzai shitsugyo (Latent Unemployment in Agriculture), Tokyo: Nihon hyoronsha. ‘Japanese Election Candidates in 1955’, in Pacific Affairs, 29(2), pp. 174-81. 287 List of publications 05/12/2000 12:47 Page 2 288 Ronald Dore’s publications ‘Left and Right in Japan’ in International Affairs, 32(1), January, pp. 11-26. ‘The Day the Fire Brigade Went Fishing’, in Japan Quarterly, 3, pp. 347-55. 1957 (Review...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian. | https://www.elgaronline.com/view/1840644982.00040.xml |
On October 5, 1789, George Washington visited the only library in the city at that time in New York. Washington, who had been elected President of the United States a few months earlier, took two books: the Law of Nations treatise and a collection of minutes of debates in the British House of Commons.
According to the rules of this library, organized by New Yorkers back in 1754, books were supposed to be returned no later than a month later. But the president never returned these books. It is interesting that the library workers themselves discovered the loss only after ... 221 years, when the registration cards were digitized.
The library charged a fine for the delay of books, and he, taking into account time and inflation, amounted to about 300 thousand dollars. At the same time, the management of the library announced that it was ready to give up this impressive amount, but the books, which in our time are of considerable historical value, must be returned. But where to look for them, after more than two centuries, no one knew.
The staff of the George Washington House Museum, located on a plantation owned by relatives of the former president, decided to find a way out of this awkward situation. If these particular books cannot be found, then similar ones can be returned.
In one of the online stores, they managed to find a book by the Swiss lawyer Emelich von Wattel "The Law of Nations". The book is from the same circulation as borrowed from the library by Washington. The rarity was purchased for $ 12, 000. The only thing left to do was to resolve the issue with a late payment penalty, because the amount of the fine was many times the cost of the book.
! On May 9, 2010, the ceremony of transferring the book from the George Washington House-Museum to the New York Public Library took place. During this ceremony, a spokesman for the library, Charles Berry, once again confirmed that George Washington and his representatives (in this case, the house and museum) are exempted from paying a huge fine.
But the fate of the collection of minutes of debates in the British House of Commons is not reported. Probably, this book turned out to be lost forever for the New York library.
Interestingly, George Washington himself was called a man who never deceived anyone. It is possible that he did not want to deceive the owners of the library: he simply spun into the carousel of state concerns and forgot about books. | https://othervisor.com/publication/4299 |
Two contrasting works or movements by a living Irish composer or composers or written since 1950, taken from the library catalogue of the Contemporary Music Centre. Total playing time not to exceed 12 minutes. Scores and repertoire information available from the Centre.
Photocopies, except authorised facsimiles of unpublished works supplied by the Contemporary Music Centre, are not acceptable.
Any alteration to the piano is forbidden.
NB: Please ensure that all own choice pieces are submitted at time of entry, as no change of repertoire will be allowed after competition entry deadline. | https://www.feisceoil.ie/syllabus/Contemporary-Irish-Music-Cup/175.html |