question
stringlengths
1
296
answers
sequence
ctxs
sequence
Running sprinklers at night time
[ "_URL_0_ (4 am - 9am)\n\nRead #3, in Texas the water loss to evaporation is rediculous" ]
[ "suppression system. Most automatic suppression systems would be found in large commercial kitchens or other high-risk areas. Sprinkler systems Fire sprinkler systems are installed in all types of buildings, commercial and residential. They are usually located at ceiling level and are connected to a reliable water source, most commonly city water. A typical sprinkler system operates when heat at the site of a fire causes a glass component in the sprinkler head to fail, thereby releasing the water from the sprinkler head. This means that only the sprinkler head at the fire location operates – not all the sprinklers on", "only for irrigation, but also for industrial applications such as dust suppression and logging.\nSprinklers can also be mounted on moving platforms connected to the water source by a hose. Automatically moving wheeled systems known as traveling sprinklers may irrigate areas such as small farms, sports fields, parks, pastures, and cemeteries unattended. Most of these use a length of polyethylene tubing wound on a steel drum. As the tubing is wound on the drum powered by the irrigation water or a small gas engine, the sprinkler is pulled across the field. When the sprinkler arrives back at the reel the system", "automatic fire sprinklers operate individually in a fire. Contrary to motion picture representation, the entire sprinkler system does not activate, unless the system is a special deluge type.\nOpen orifice sprinklers are only used in water spray systems or deluge sprinklers systems. They are identical to the automatic sprinkler on which they are based, with the heat-sensitive operating element removed.\nAutomatic fire sprinklers utilizing frangible bulbs follow a standardized color-coding convention indicating their operating temperature. Activation temperatures correspond to the type of hazard against which the sprinkler system protects. Residential occupancies are provided with a special type of fast response sprinkler with", "still rely on oil-fired switch heaters, long tubs of fuel with a wick, that fits between the ties and keeps snow and ice from fouling the points of a switch. This is generally only used in yard applications. Mainline switches are usually heated by natural gas heaters.\nThe smudge pot was also used at construction sites and other cold places to take the chill out of buildings so workers would be comfortable, and for several decades (1920's–1970's) they were used as emergency night landing illumination at remote airfields without electric runway lights, acting as a series of small bonfires. Use in", "shuts off. This type of system is known to most people as a \"waterreel\" traveling irrigation sprinkler and they are used extensively for dust suppression, irrigation, and land application of waste water.\nOther travelers use a flat rubber hose that is dragged along behind while the sprinkler platform is pulled by a cable. Center pivot Center pivot irrigation is a form of sprinkler irrigation utilising several segments of pipe (usually galvanized steel or aluminium) joined together and supported by trusses, mounted on wheeled towers with sprinklers positioned along its length.\nThe system moves in a circular pattern and is fed with water", "reducing damage during lawn mowing. These types of systems usually can be programmed to automatically start on a set time and day each week.\nSmall portable sprinklers can be temporarily placed on lawns if additional watering is needed or if no permanent system is in place. These are often attached to an outdoor water faucet and are placed for a short period of time. Other systems may be professionally installed permanently in the ground and are attached permanently to a home's plumbing system. \nAn antique sprinkler developed by Nomad called a 'set-and-forget tractor sprinkler' was used in Australia in the 1950s.", "latest fast-response fire sprinkler technology to provide fire suppression of specific high-challenge fire hazards. Prior to the introduction of these sprinklers, protection systems were designed to control fires until the arrival of the fire department.", "logging.\nMany irrigation sprinklers are buried in the ground along with their supporting plumbing, although above ground and moving sprinklers are also common. Most irrigation sprinklers operate through electric and hydraulic technology and are grouped together in zones that can be collectively turned on and off by actuating a solenoid-controlled valve. Residential Home lawn sprinklers vary widely in their size, cost, and complexity. They include impact sprinklers, oscillating sprinklers, drip sprinklers, underground sprinkler systems, and portable sprinklers. Permanently installed systems may often operate on timers or other automated processes. They are occasionally installed with retractable heads for aesthetic and practical reasons,", "walk several kilometers to turn on the irrigation pumps that water their fields. With the electrical supply often erratic, they sometimes find that there is no electricity when they reach the pump. Nano Ganesh allows them to remotely check the availability of electricity, and to remotely turn the pump on and off, all through a mobile phone. It helps the farmers to easily access the remote water pumps avoiding exhaustive long travel over difficult terrain, bad weather, and hazardous locations. It also means growers don't have to wake up in the middle of the night, which is often the time", "Water pressure ensured that the sprinkler slowly moved across a lawn. Agricultural science The first use of sprinklers by farmers was some form of home and golf course type sprinklers. These ad hoc systems, while doing the job of the buried pipes and fixed sprinkler heads, interfered with cultivation and were expensive to maintain. \nCenter-pivot irrigation was invented in 1940 by farmer Frank Zybach, who lived in Strasburg, Colorado.\nIn the 1950s a firm based in Portland, Oregon Stout-Wyss Irrigation System, developed a rolling pipe type irrigation system for farms that has become the most popular type for farmers irrigating", "be pumped from the fire engine pump to the fire hose attachments on each floor. A dry pipe fire sprinkler system is a network of pipes connected to fixed sprinklers inside a building, which is full of air until one of the sprinklers is triggered.", "Trap primer Types There are many types of trap primers. The simplest, typically for a floor drain's trap, is simply a connection from a nearby sink's drain so that when the sink is used, some of the water flow is diverted into one or more traps. More common is a primer that is connected to the potable water supply and activates when pressure fluctuations are sensed, such as the flushing of a nearby water closet. Others depend on occupancy sensors or timers. Several manufacturers (e.g., Moen) produce laundry faucets with a built-in trap seal primer outlet.", "fixture from the water heater and closes once hot water contacts the valve to control crossover flow between the hot and cold lines. A second type of system uses a thermostatically controlled pump which gets installed at the farthest fixture from the water heater. These thermostatically controlled pumps often have a built-in \"normally closed\" check-valve which prevents water in the cold water line from entering into the hot water line. Compared to a dedicated return line, using the cold water line as a return has the disadvantage of heating the cold water pipe (and the contained water).", "end-outlet tee, it typically connects waste lines before they enter the trap and has a baffle to keep water from one waste pipe from entering the other at the connection. Double sanitary tee (sanitary cross) This fitting differs from a standard cross in that two of the ports have curved inlets. Although it has been used in the past for connecting the drains of back-to-back fixtures (such as back-to-back sinks), some current codes—including the 2006 Uniform Plumbing Code in the United States—prohibit the use of this fitting for that purpose and require a double-fixture fitting (double combination wye) to minimize", "Irrigation sprinkler Industrial Higher pressure sprinklers that themselves move in a circle are driven by a ball drive, gear drive, or impact mechanism (impact sprinklers). These can be designed to rotate in a full or partial circle.\nRainguns are similar to impact sprinkler, except that they generally operate at very high pressures of 40 to 130 lbf/in² (275 to 900 kPa) and flows of 50 to 1200 US gal/min (3 to 76 L/s), usually with nozzle diameters in the range of 0.5 to 1.9 inches (10 to 50 mm). In addition to irrigation, guns are used for industrial applications such as dust suppression and", "water used by a standard household. Other benefits of automatic faucets are found in inhibiting the spread of germs which are known to thrive on faucet handles, as well as help prevent or mitigate scalding incidents caused by hot water flowing out of the faucet. Advantages Automatic faucets have the advantage of shutting off automatically after hand washing, thereby reducing water waste. When installed in a home, sensor faucets alleviate the need for parents to ensure that children have turned off the faucet. They can also benefit the elderly and those suffering from arthritis or other mobility limiting conditions since", "the same. This allows easy balancing of the system. Disadvantages The installer or repair person cannot trust that every system is self-balancing without properly testing it. Water loops Modern systems almost always use heated water rather than steam. This opens the system to the possibility of also using chilled water to provide air conditioning.\nIn homes, the water loop may be as simple as a single pipe that \"loops\" the flow through every radiator in a zone. In such a system, flow to the individual radiators cannot be modulated as all of the water is flowing through every radiator in the", "be used and installed flush as in a lawn area. Hose-end sprinklers There are many types of hose-end sprinklers. Many of them are smaller versions of larger agricultural and landscape sprinklers, sized to work with a typical garden hose. Some have a spiked base allowing them to be temporarily stuck in the ground, while others have a sled base designed to be dragged while attached to the hose. Subirrigation Subirrigation has been used for many years in field crops in areas with high water tables. It is a method of artificially raising the water table to allow the soil to", "advent of the vacuum cleaner, March was often the best time for dusting because it was getting warm enough to open windows and doors (but not warm enough for insects to be a problem), and the high winds could carry the dust out of the house. This time of year is also when coal furnaces wouldn't run and you could wash all the soot from the walls and furniture left by the furnace. For the same reason, modern rural households often use the month of March for cleaning projects involving the use of chemical products which generate fumes. Winter", "back to the pool. The water may need chlorination or anti-algal treatment, or may use biological methods to filter and clean water.\nThe pumps, filter, electrical switch box and plumbing controls are often housed in a \"plant room\".\nLow-voltage lighting, typically 12 volt direct current, is used to minimise electrical hazards. Lighting is often submerged and must be suitably designed. High wattage lighting (incandescent and halogen) either as submerged lighting or accent lighting on waterwall fountains have been implicated in every documented Legionnaires' disease outbreak associated with fountains. This is detailed in the \"Guidelines for Control of Legionella in Ornamental Features\".\nFloating fountains", "Fire sprinkler A fire sprinkler or sprinkler head is the component of a fire sprinkler system that discharges water when the effects of a fire have been detected, such as when a predetermined temperature has been exceeded. Fire sprinklers are extensively used worldwide, with over 40 million sprinkler heads fitted each year. In buildings protected by properly designed and maintained fire sprinklers, over 99% of fires were controlled by fire sprinklers alone. History In 1812, British inventor Sir William Congreve patented a manual sprinkler system using perforated pipes along the ceiling. When someone noticed a fire, a valve", "the unique goal of life safety. ESFR ESFR (early suppression fast response) refers to both a concept and a type of sprinkler. \"The concept is that fast response of sprinklers can produce an advantage in a fire if the response is accompanied by an effective discharge density — that is, a sprinkler spray capable of fighting its way down through the fire plume in sufficient quantities to suppress the burning fuel package.\" The sprinkler that was developed for this concept was created for use in high rack storage.\nESFR sprinkler heads were developed in the 1980s to take advantage of the", "A trap primer, a specialized valve, is usually connected to a clean-water supply in addition to a DWV system. Because of the dual connection, it must be designed to resist the accidental backflow of contaminated water. Combo tee A combination tee (combo tee, combo wye, tee wye, long-sweep wye, or combi) is a tee with a gradually curving central connecting joint: a wye plus an additional 1/8 bend (45°), combined in one 90° unit. It is used in drains for a smooth, gradually curving path to reduce the likelihood of clogs, to ease the pushing of a plumber's snake through", "Faucet aerator A faucet aerator (or tap aerator) is often found at the tip of modern indoor water faucets. Aerators can be simply screwed onto the faucet head, creating a non-splashing stream and often delivering a mixture of water and air. Prevents splashing When a single stream of water hits a surface the water must go somewhere, and because the stream is uniform the water will tend to go mostly in the same direction. If a single stream hits a surface which is curved, then the stream will conform to the shape and be easily redirected with the force", "day of week, and the season. However, because of the expense, spacing (a lower density of loop detectors diminishes data accuracy), and relatively low reliability of loop detectors (often 30% or more are out of service at any given time), tach runs remain a common practice. In trains and light rail vehicles Speed sensing devices, termed variously \"wheel impulse generators\" (WIG), speed probes, or tachometers are used extensively in rail vehicles. Common types include opto-isolator slotted disk sensors and Hall effect sensors.\nHall effect sensors typically use a rotating target attached to a wheel, gearbox or motor. This target may contain", "conjunction with control mode fire sprinklers, but are not permitted to be installed in conjunction with suppression mode, e.g., ESFR, fire sprinklers unless the vents are manually operated or have an operating mechanism with a thermal rating of not less than 360 °F. due to fear of overwhelming the sprinkler system and destroying the building.", "roof and the other side hangs vertically. A fluorescent light hangs vertically from the corner of the sheet to attract pests. A water-filled basin containing a few drops of gasoline/kerosene hangs underneath the light to kill insects that alight. Soap water and hot pepper water Soap water (SoWa) and hot-pepper water (HPW) are used for controlling aphids and mites. When soap water is applied as a foliar spray, sunlight evaporates the water. Evaporation, heat loss and condensation kill the pests.\nSoWa is chopped lye soap, boiled in water to make a thick soup and then diluted.\nHPW is chopped hot peppers, boiled", "sprinkler is combined with a valve and called a 'valve in head'. When used in a turf area, the sprinklers are installed with the top of the head flush with the ground surface. When the system is pressurized, the head will pop up out of the ground and water the desired area until the valve closes and shuts off that zone. Once there is no more pressure in the lateral line, the sprinkler head will retract back into the ground. In flower beds or shrub areas, sprinklers may be mounted on above ground risers or even taller pop-up sprinklers may", "water valve connected to the room's light switch. When the building is in active use during the day and the lights are on, the timed flush operates normally. At night when the building is closed, the lights are turned off and the flushing action stops. Door-regulated flush This is an older method of water-saving automatic flushing, which only operates when the public toilet has been used. A push-button switch is mounted in the door frame, and triggers the flush valve for all urinals every time the door is opened. While it cannot detect the use of individual urinals, it provides", "the last fixture on the loop instead of wasting energy heating the piping from the last fixture to the water heater. Installing a circulation pump at the farthest fixture on a hot water circulation loop is often not feasible due to limited available space, cosmetics, noise restrictions or lack of available power. Recent advancements in hot water circulation technology allow for benefiting from temperature controlled pumping without having to install the pump at the last fixture on the hot water loop. These advanced hot water circulation systems utilize a water contacting temperature probe strategically installed at the" ]
How odds work if everything is random?
[ "Odds basically tell you that if the exact same situation were to occur an infinite number of times, what portion of those times would lead to that specific result.\n\ne.g. If you have the Ace of Hearts, King of Hearts, Queen of Hearts and Jack of Hearts in your hand and 48 shuffled cards in front of you, there is a 1 in 48 chance you will end up with a 10 of hearts for a Royal Flush. There is no way of guessing which card will come up next, but if you shuffled that deck drew a card (made note of which card it was, replaced it and repeat) millions of times, you would get the Royal Flush 1/48 of the time.\n\nA pro would make that bet if it pays better than 48 times their money. They will only win 1/48 of the time, but if they get the chance to make that bet many many times in their lives, the rare win will make up for the cost of the losses.", "If you roll a dice there is a 1/6 chance it will land on any of the given faces even though the act of rolling will produce a \"random\" result you can still predict that statistically being that it has 6 faces it should have an equal chance of dropping on the 1 vs the rest.\n\nThe same goes for poker in that there are only so many possible card combos that you can calculate the chances of you getting a royal flush vs a Pair." ]
[ "to the total number of possible outcomes. Odds against When the probability that the event will not happen is greater than the probability that it will, then the odds are \"against\" that event happening. Odds of 6 to 1, for example, are therefore sometimes said to be \"6 to 1 against\". To a gambler, \"odds against\" means that the amount he or she will win is greater than the amount staked. Odds on \"Odds on\" is the opposite of \"odds against\". It means that the event is more likely to happen than not. This is sometimes expressed with the smaller", "an event occurring, which is exactly the opposite of the meaning of the expression when used in a gaming context. Statistical usage In statistics, odds are an expression of relative probabilities, generally quoted as the odds in favor. The odds (in favor) of an event or a proposition is the ratio of the probability that the event will happen to the probability that the event will not happen. Mathematically, this is a Bernoulli trial, as it has exactly two outcomes. In case of a finite sample space of equally likely outcomes, this is the ratio of the number of outcomes", "probability assume that the various outcomes of an experiment are always defined so as to be equally likely. However, there are experiments that are not easily described by a set of equally likely outcomes— for example, if one were to toss a thumb tack many times and observe whether it landed with its point upward or downward, there is no symmetry to suggest that the two outcomes should be equally likely.", "simple system of betting on heads every 3rd, 7th, or 21st toss, etc., does not change the odds of winning in the long run. As a mathematical consequence of computability theory, more complicated betting strategies (such as a martingale) also cannot alter the odds in the long run.\nVon Mises' mathematical demonstration defines an infinite sequence of zeros and ones as a random sequence if it is not biased by having the frequency stability property. With this property, the frequency of zeroes in the sequence stabilizes at 1/2, and every possible subsequence selected by any systematic method is likewise", "short segment than would be predicted by chance, a phenomenon known as insensitivity to sample size. Kahneman and Tversky interpret this to mean that people believe short sequences of random events should be representative of longer ones. The representativeness heuristic is also cited behind the related phenomenon of the clustering illusion, according to which people see streaks of random events as being non-random when such streaks are actually much more likely to occur in small samples than people expect.\nThe gambler's fallacy can also be attributed to the mistaken belief that gambling, or even chance itself, is a fair process that", "where the event occurs to the number of outcomes where the event does not occur; these can be represented as W and L (for Wins and Losses) or S and F (for Success and Failure). For example, the odds that a randomly chosen day of the week is a weekend are two to five (2:5), as days of the week form a sample space of seven outcomes, and the event occurs for two of the outcomes (Saturday and Sunday), and not for the other five. Conversely, given odds as a ratio of integers, this can be represented by a probability", "outcome is due after a long streak of another outcome. Type two gambler's fallacy, as defined by Gideon Keren and Charles Lewis, occurs when a gambler underestimates how many observations are needed to detect a favorable outcome, such as watching a roulette wheel for a length of time and then betting on the numbers that appear most often. For events with a high degree of randomness, detecting a bias that will lead to a favorable outcome takes an impractically large amount of time and is very difficult, if not impossible, to do. The two types differ in that type one wrongly assumes", "space of a finite number of equally likely outcomes. These definitions are equivalent, since dividing both terms in the ratio by the number of outcomes yields the probabilities: Conversely, the odds against is the opposite ratio. For example, the odds against a random day of the week being a weekend are 5:2.\nOdds and probability can be expressed in prose via the prepositions to and in: \"odds of so many to so many on (or against) [some event]\" refers to odds – the ratio of numbers of (equally likely) outcomes in favor and against (or vice versa); \"chances of so", "many [outcomes], in so many [outcomes]\" refers to probability – the number of (equally like) outcomes in favour relative to the number for and against combined. For example, \"odds of a weekend are 2 to 5\", while \"chances of a weekend are 2 in 7\". In casual use, the words odds and chances (or chance) are often used interchangeably to vaguely indicate some measure of odds or probability, though the intended meaning can be deduced by noting whether the preposition between the two numbers is to or in. Gambling usage The use of odds in gambling facilitates betting on events", "order of their random numbers. This will generate a random permutation, unless any of the random numbers generated are the same as any others (i.e. pairs, triplets etc.). This can be eliminated either by adjusting one of the pair's values randomly up or down by a small amount, or reduced to an arbitrarily low probability by choosing a sufficiently wide range of random number choices. If using efficient sorting such as mergesort or heapsort this is an O(n log n) average and worst-case algorithm. In online gambling These issues are of considerable commercial importance in online gambling, where the randomness", "but not identical, results for each series: the average, the standard deviation and other distributional characteristics will be around the same for each series of trials.\nThe notion is used in games of chance, demographic statistics, quality control of a manufacturing process, and in many other parts of our lives.\nObservations of this phenomenon provided the initial motivation for the concept of what is now known as frequency probability.\nThis phenomenon should not be confused with the gambler's fallacy, because regularity only refers to the (possibly very) long run. The gambler's fallacy does not apply to statistical regularity because the latter considers the", "Impossibility of a gambling system The principle of the impossibility of a gambling system is a concept in probability. It states that in a random sequence, the methodical selection of subsequences does not change the probability of specific elements. The first mathematical demonstration is attributed to Richard von Mises (who used the term collective rather than sequence).\nThe principle states that no method for forming a subsequence of a random sequence (the gambling system) improves the odds for a specific event. For instance, a sequence of fair coin tosses produces equal and independent 50/50 chances for heads and tails. A", "above, but using the probabilities instead. Therefore, the relative risk is 1.28. Since rather large probabilities of passing were used, there is a large difference between relative risk and odds ratio. Had failure (a smaller probability) been used as the event (rather than passing), the difference between the two measures of effect size would not be so great.\nWhile both measures are useful, they have different statistical uses. In medical research, the odds ratio is commonly used for case-control studies, as odds, but not probabilities, are usually estimated. Relative risk is commonly used in randomized controlled trials", ", could tell whether they were uniformly random or from . If we need to distinguish uniformly random samples from , where is chosen uniformly at random from , we could simply try different values sampled uniformly at random from , calculate and feed these samples to . Since comprises a large fraction of , with high probability, if we choose a polynomial number of values for , we will find one such that , and will successfully distinguish the samples.\nThus, no such can exist, meaning LWE and DLWE are (up to", "one possible outcome of a process.\nMethods for obtaining random numbers have existed for a long time and are used in many different fields (such as gaming). However, these numbers suffer from a certain bias. Currently the best methods expected to produce truly random sequences are natural methods that take advantage of the random nature of quantum phenomena.", "generally, we can calculate the probability of any event: e.g. (1 and 2) or (3 and 3) or (5 and 6). \nThe alternative statistical assumption is this: for each of the dice, the probability of the face 5 coming up is (because the dice are weighted). From that assumption, we can calculate the probability of both dice coming up 5:  ×  = .  We cannot, however, calculate the probability of any other nontrivial event, as the probabilities of the other faces are unknown.\nThe first statistical assumption constitutes a statistical model: because with the assumption alone, we can calculate the", "to a probability of 1 / 5.00, that is 0.20 or 20%.\nDecimal odds are also known as European odds, digital odds or continental odds. Wholesale odds Wholesale odds are the \"real odds\" or 100% probability of an event occurring. This 100% book is displayed without any bookmaker's profit margin, often referred to as a bookmaker's \"overround\" built in.\nA \"wholesale odds\" index is an index of all the prices in a probabilistic market operating at 100% competitiveness and displayed without any profit margin factored for market participants. Gambling odds versus probabilities In gambling, the odds on display do not represent the", "greater than zero. Therefore, the probability of any event is the sum of probabilities of the outcomes of the event. This makes it easy to calculate quantities of interest from information theory. For example, the information content of any event is easy to calculate, by the formula \nIn particular, the information content of outcome of discrete random variable is\nFor example, winning in the example § Choosing 6 from 49 above is a Bernoulli-distributed random variable with a chance of winning (\"success\") We write with and . The information content of winning is", "become true. Binary betting Binary betting displays odds as an index from 0 to 100 where the bet settles at 100 if the event happens and 0 if it does not. An amount is wagered per point on the index. The event can be bought or sold, making it possible to profit both from the event occurring or not occurring. Features A central feature of financial betting is the fixed risk nature which allows market participants to limit the risk to a known amount. When one opens a bet (long or short) they know beforehand what risk they are taking.", "consist of only the two dice. There are probabilities of various results, e.g. two fives, two twos, a one and a six etc. Throwing the pair of dice 100 times, would result in an ensemble of 100 trials. Classical statistics would then be able predict what typically would be the number of times that certain results would occur. However, classical statistics would not be able to predict what definite single result would occur with a single throw of the pair of dice. That is, probabilities applied to single one off events are, essentially, meaningless, except in the case of a", "number first (1 to 2) but more often using the word \"on\" (\"2 to 1 on\"), meaning that the event is twice as likely to happen as not. Note that the gambler who bets at \"odds on\" and wins will still be in profit, as his stake will be returned. For example, on a $2 bet, the gambler will be given $1 plus the returned stake of $2, yielding a $1 profit. Even odds \"Even odds\" occur when the probability of an event happening is exactly the same as it not happening. In common parlance, this is a \"50-50 chance\".", "than linearly. See random walk for more.\nHowever, this rule distorts the distribution by increasing the probability of evens relative to odds. Typically this is less important than the biases that are eliminated by this method. Round half to odd A similar tie-breaking rule is round half to odd. In this approach, if the fraction of x is 0.5, then y is the odd integer nearest to x. Thus, for example, +23.5 becomes +23, as does +22.5; while −23.5 becomes −23, as does −22.5.\nThis method is also free from positive/negative bias and bias toward/away from zero.\nThis variant is almost never used", "rule relates the odds of event to event , before (prior to) and after (posterior to) conditioning on another event . The odds on to event is simply the ratio of the probabilities of the two events. When arbitrarily many events are of interest, not just two, the rule can be rephrased as posterior is proportional to prior times likelihood, where the proportionality symbol means that the left hand side is proportional to (i.e., equals a constant times) the right hand side as varies, for fixed or given (Lee, 2012; Bertsch McGrayne,", "randomized rounding), and information theory. Introduction If every object in a collection of objects fails to have a certain property, then the probability that a random object chosen from the collection has that property is zero.\nSimilarly, showing that the probability is (strictly) less than 1 can be used to prove the existence of an object that does not satisfy the prescribed properties.\nAnother way to use the probabilistic method is by calculating the expected value of some random variable. If it can be shown that the random variable can take on a value less than the expected value, this proves that", "odds multiplied by the Bayes factor or likelihood, which is, by definition, the probability of the new piece of information (host opens door 3) under each of the hypotheses considered (location of the car). Now, since the player initially chose door 1, the chance that the host opens door 3 is 50% if the car is behind door 1, 100% if the car is behind door 2, 0% if the car is behind door 3. Thus the Bayes factor consists of the ratios  : 1 : 0 or equivalently 1 : 2 : 0, while the prior odds were 1 : 1 : 1. Thus,", "chances. Frequentists are unable to take this approach, since relative frequencies do not exist for single tosses of a coin, but only for large ensembles or collectives (see \"single case possible\" in the table above). In contrast, a propensitist is able to use the law of large numbers to explain the behaviour of long-run frequencies. This law, which is a consequence of the axioms of probability, says that if (for example) a coin is tossed repeatedly many times, in such a way that its probability of landing heads is the same on each toss, and the outcomes are probabilistically", "Odds History The language of odds, such as the use of phrases like \"ten to one\" for intuitively estimated risks, is found in the sixteenth century, well before the development of probability theory. Shakespeare wrote:\nKnew that we ventured on such dangerous seas\n\nThat if we wrought out life 'twas ten to one\n— William Shakespeare, Henry IV, Part II, Act I, Scene 1 lines 181–2.\nThe sixteenth-century polymath Cardano demonstrated the efficacy of defining odds as the ratio of favourable to unfavourable outcomes. Implied by this definition is the fact that the probability of an event is given by the ratio of favourable outcomes", "the optimal win probability at the same time. Also, the number of operations of the odds-algorithm is (sub)linear in n. Hence no quicker algorithm can possibly\nexist for all sequences, so that the odds-algorithm is, at the same time, optimal as an algorithm. Applications Applications reach from medical questions in clinical trials over sales problems, secretary problems, portfolio selection, (one-way) search strategies, trajectory problems and the parking problem to problems in on-line maintenance and others.\nThere exists, in the same spirit, an Odds-Theorem for continuous-time arrival processes with independent increments such as the Poisson process (Bruss (2000)). In some cases, the odds", "or assume that all outcomes in the space are equally likely (that they occur with equal probability). For example, when tossing an ordinary coin, one typically assumes that the outcomes \"head\" and \"tail\" are equally likely to occur. An implicit assumption that all outcomes are equally likely underpins most randomization tools used in common games of chance (e.g. rolling dice, shuffling cards, spinning tops or wheels, drawing lots, etc.). Of course, players in such games can try to cheat by subtly introducing systematic deviations from equal likelihood (e.g. with marked cards, loaded or shaved dice, and other methods).\nSome treatments of", "for some people. Strategies which take into account the changing odds that exist in some games (e.g. card counting and handicapping), can alter long-term results.\nThis is formally stated by game theorist Richard Arnold Epstein in The Theory of Gambling and Statistical Logic as:\nTheorem 1: If a gambler risks a finite capital over many plays in a game with constant single-trial probability of winning, losing, and tying, then any and all betting systems lead ultimately to the same value of mathematical expectation of gain per unit amount wagered." ]
How do Jeopardy contestant's study?
[ "Okay, so no Ken Jennings. How about Arthur Chu?\n\nFrom [this](_URL_0_) article:\n\n > Literally the first thing I did when I got the call was to ask myself, “Do I feel ready?” And the answer is, “Hell no, I don’t feel ready.” Thankfully, we live in the electronic age. So without having to use too much ingenuity or creativity, I just typed “Jeopardy! strategy” and “Jeopardy! studying” into Google, and lo and behold…\n\n > Jeopardy! has been around for 30 years. All of the advice about how to study for Jeopardy! and how to play Jeopardy! has already been written. There’s a community online, called the J-board, of past Jeopardy! contestants and fans who just talk about this all the time. So I absorbed a lot of strategies from the greats. One of them was Roger Craig, who won a couple years ago and who broke the one-day total winnings record. He’s brilliant. He is a computer scientist, and he actually combed through an archive of past Jeopardy! games using an algorithm that scrapes all the clues out and figured out what the most common categories were, what the most common high-value categories were. Then he compared it to his own performance using flashcards to tell him where his most important weak spots were. \n\n > Jeopardy! feels like it can be anything, but most of the really random clues come in the first round. The higher-value clues in Double Jeopardy are much more limited. They’re much more about traditional academic knowledge, things that a gentleman and a scholar is supposed to know, like history, geography, literature. And Final Jeopardy is often really focused on Americana. They love state capitals, state nicknames, U.S. presidential facts. \n\n > You can’t possibly learn everything you need to know to get a perfect score, but to greatly increase your chance of winning, there are a few finite sets of knowledge that you actually can memorize. You can memorize what all the state capitals and all the world capitals are. You can find a list of all the official state nicknames and memorize those. And once you’ve done that, because those things come up over and over again, you’ve given yourself a big advantage. \n\n > There’s a program that Roger Craig recommended, that I ended up using as well, called Anki. It’s a free program, and it uses what they call space repetition, which is an algorithm that keeps track of how well you do on flashcards and focuses on giving you the flashcards that give you the most trouble at regular intervals. So you boost your knowledge where you need help the most. I’m not a computer scientist, so unlike Roger Craig, I didn’t have a super scientific way of judging what I needed to know. I just looked at his comments. “Oh, you need to know about Nobel Prize-winning literature writers. You need to know about U.S. presidential facts.” And then I just put together a little study guide and committed to it. I started doing that every night instead of going out with friends or acknowledging my wife." ]
[ "have a maximum of eight questions to answer, being forced to bet at least half of what they had at that particular point in the game. The catch was that each question came from one of ten different categories, and the contestant never knew where they would come from. However, the contestant was shown the category before the question was asked, so they would know and could bet accordingly.\nAlong the way, each contestant had two \"Second Chances\", which were used to help the contestant. One \"Second Chance\" allowed the contestant to switch the question for one in a category", "Game show contestants Quiz bowl has received media coverage due to the number of highly successful game show contestants with backgrounds in the activity. NAQT maintains a list of current and former quiz bowl players at any level who have appeared on TV game shows. Several of the top dollar winners in the history of Jeopardy! include former players such as Ken Jennings,Matt Jackson, David Madden, and Brad Rutter. Such is the correlation between success on Jeopardy! and quiz bowl experience that Jennings described the competition as a \"minor league\" for the show and other televised quiz show competitions.", "from lowest to highest. Players who are tied after Double Jeopardy! have their responses revealed from right to left from the viewer's perspective. As soon as the first correct response is revealed the host confirms it to be so, usually including some brief context, otherwise the host only reveals the correct response with context after all responses are revealed to be incorrect. A correct response adds the amount of the contestant's wager to his/her score, while a miss, failure to respond, or failure to phrase the response as a question (even if correct) deducts it.\nThe contestant with the highest score", "place contestant's score, the leader can guarantee victory by making a sufficiently small wager. Otherwise, according to Jeopardy! College Champion Keith Williams, the leader will usually wager such that he or she will have a dollar more than twice the second place contestant's score, guaranteeing a win with a correct response. Writing about Jeopardy! wagering in the 1990s, Gilbert and Hatcher said that \"most players wager aggressively\". Winnings The top scorer(s) in each game retain the value of their winnings in cash, and return to play in the next match. Non-winners receive consolation prizes. Since May 16, 2002, consolation", "answer (or reasonably similar as determined by the judges) up to a maximum of six points for matching everyone.\nAfter play is completed on the contestant's question, the host reads the statement on the other card for the challenger and play is identical.\nThe challenger again begins Round 2, with two new questions, unless they matched everyone in the first round. Only celebrities that a contestant failed to match could play this round.\nIf the players have the same score at the end of the show, a tiebreaker is used that reverses the game play. The contestants write their answers first on a", "contestants are left in jeopardy, then announces the wrong answer. The contestant who chose it is immediately eliminated from the game.\nOnce per episode, a buzzer sounds off between rounds to indicate that an \"Emergency Exit\" round must be played. Jones asks a question to one contestant at a time in random order, and the first to miss a question is eliminated.\nOnce three contestants remain, the fifth and final round begins, following the same format as the previous four except that the question has only one right answer. The contestant who chooses it wins £10,000, while the other two are dismissed", "Jeopardy! category, and a commercial break follows. During the break, barriers are placed between the contestant lecterns, and each contestant makes a final wager; they may wager any amount of their earnings, but may not wager certain numbers with connotations that are deemed inappropriate (69, 666, and 1488 are among the forbidden wagers, though 13, 420, and 911 are allowed). Contestants write their wagers using a light pen on an electronic display on their lectern. After the break, the Final Jeopardy! clue is revealed and read by the host. The contestants have 30 seconds to write their responses on the", "Three on a Match (game show) Game play Three contestants competed to determine who could answer the most true-or-false questions in one of three categories. After Cullen announced the categories, each contestant bid a number between one and four based on how many questions he or she desired to answer on that turn.\nA player could win the bidding in two ways: either by having the highest bid or by having his or her opponents bid the same number, which canceled out their bids. If all three players chose the same number, another round of bidding was conducted to break the", "matched the answer on Kay's card (as gleaned from an earlier general poll) then the team scored a point. The team which scored the most points in the Quiz would be the team represented in the Main Game.\nThe Main Game would see three members of the winning team take part in a final challenge, game or stunt. The three contestants selected to play in the Main Game would be the contestant voted top performer at the pre-show party by the opposite sex, the contestant voted in first place in the Babe or Minger vote, and one other contestant selected randomly", "competed in another round of questions, which began with the first player to win a spot in that round choosing one of two possible categories to answer a question in, then giving the remaining category to his/her opponents for them to buzz in and answer. The player that answered correctly would then be given a choice of two categories to play, with the other two players trying their luck at the remaining category, and so on for the remainder of the round. Correct answers were worth 10 points each, and when time expired, the lowest-scoring contestant was eliminated. Round 3", "contestant a number of multiple-choice questions. Of the four options only one is correct. Players answer correctly to win an amount of money. They are then shown the next question and four answers. Successive questions are worth a greater sum of money. In most cases this is double the previous sum. Players who answer question numbers five and ten correctly find themselves in a situation where their winnings are \"safe\". This means they will not lose their winnings under any circumstances. This allows the players to hazard a guess for question six and question eleven. Players answering a question incorrectly", "from that game, and an additional wild card contestant advances instead. This occurred in the quarter-finals of the 1991 Seniors Tournament and the semi-finals of the 2013 Teen Tournament.\nIn the finals, contestants who finish Double Jeopardy! with a $0 or negative score on either day do not play Final Jeopardy! that day; their score for that leg is recorded as $0. Conception and development In a 1964 Associated Press profile released shortly before the original Jeopardy! series premiered, Merv Griffin offered the following account of how he created the quiz show:\nMy wife Julann just came up with the idea one", "Jeopardy! (British game show) Gameplay notes Unlike in the U.S. version, contestants have points (instead of money) added or subtracted for responses (or lack of) to questions selected, a concession made because of severe restrictions on game show prizes in the UK at the time. The original point values were 5 to 25 in the Jeopardy! Round and 10 to 50 in Double Jeopardy! There were three Daily Doubles in each round.\nIn the Hobson, Donat, and Jones runs, the contestants only saw their own scores, although, at the end of each round, they were told their relative positions, i.e., who", "round, known as Final Jeopardy!, the day's champion played a bonus game called Super Jeopardy! to try to win an additional cash prize. The round consisted of five categories (instead of six in the main game), each with five clues of no determined value. The object of the round was to answer five questions to create a horizontal, vertical, or diagonal line on the board. Contestants had to create the line before accumulating three strikes, which were given if a contestant either failed to respond (passing was not allowed without penalty) or gave an incorrect answer. If the contestant struck", "a \"No Match\" sign.\nThe contestant used his/her money to spend on the boxes in an effort to reveal three matching prizes, one in each column. A contestant selected a box using a phrasing specific to the program, such as \"I'll take $20 on the blue\", and continued until revealing three identical prize cards (winning the game), or until running out of money and free boxes before matching a prize. If a contestant did not match a prize, the prizes would be moved to different positions and the game continued with more question rounds. Additionally, when selecting boxes, contestants could only", "the next question. Round 2: (Round of Team Play) Each contestant, starting with the highest scorer, is allowed to choose a partner of their choice to work together in building a sizeable score, Each player take turns at answering questions, each time a player answers correctly, both teammates pick up 10 points. However, if a player answers incorrectly, then they must answer a further question correctly before passing onto their colleague. Round 3: (Round of Point Steal) Plays exactly as Round 1, except that a contestant who answers correctly nominates an opposing player to take 10 points from to", "$50–$250. The current series' first round originally ranged from $100 to $500 (doubled again from the second pilot), and was doubled to $200 to $1,000 on November 26, 2001.\nThe Jeopardy! round begins when the returning champion selects any position on the game board. The underlying clue is revealed and read aloud by the host, after which any contestant may ring in using a hand-held signaling device. The first contestant to ring in successfully is prompted to provide a response to the clue. If the contestant responds correctly, the clue's dollar value is added to the contestant's score, and they may", "writes questions and edits the literature and mythology categories for NAQT. Due to the success of these players, adults trying out must now declare any affiliation to NAQT or quizbowl on their information sheet. (See Jeopardy! audition process for further discussion.)\nIn 2006, competitors in the High School National Championship Tournament were given the opportunity to audition for the Jeopardy! Teen Tournament and the Jeopardy! College Championship. Ben Schenkel of Moravian Academy (Allentown, Pennsylvania) qualified for the Teen Tournament at this tryout, and finished as the tournament's first runner-up. Meryl Federman of Livingston High School (Livingston, New Jersey) qualified for", "140 games in the Round of 64, with the following results: Bracketology and pools There are pools or private gambling-related contests as to who can predict the tournament most correctly. The filling out of a tournament bracket has been referred to as a \"national pastime.\" Filling out a tournament bracket with predictions is called the practice of \"bracketology\" and sports programming during the tournament is rife with commentators comparing the accuracy of their predictions. On The Dan Patrick Show, a wide variety of celebrities from various fields (such as Darius Rucker, Charlie Sheen, Neil Patrick Harris, Ellen DeGeneres, Dave Grohl,", "on a single question, the entire pool is brought back into play. After the fifth question, the high scorer advances to the second half; in the event of a tie, the contestant who locked in their answers in the shortest total time advances.\nFor the second half, the high scorer chooses one of four categories and is shown nine answers – one correct, three wrong, five impossible. After hearing the first half of a question, they choose five answers they believe to be impossible; each successful choice adds £100 to the daily prize pot and is removed from the board.", "submissions, judges may ask questions, though in some competitions questions are reserved to the end of submissions. In larger competitions, teams have to participate in up to ten rounds; the knockout/elimination stages are usually preceded by a number of preliminary rounds to determine seeding (power seeding is often used). Teams almost always must switch sides (applicant/appellant/claimant on one side, and respondent on the other) throughout a competition, and, depending on the format of the moot, the moot problem usually remains the same throughout. The scores of the written submissions are taken into consideration for most competitions to determine qualification (whether", "the round, he/she chose one of the three questions and wagered a portion of his/her score. A correct answer paid off the wager at the appropriate odds, and the player could then stop or continue with a different question. Play continued in this fashion until the player either chose to stop, answered all three questions, or gave an incorrect answer to any question.\nThe player in the lead after this round won the game and returned as champion the next day, although all contestants kept what they had earned. Each contestant had a Citibank Visa account (later, they could choose a", "at the end of the round is that day's winner. If there is a tie for second place, consolation prizes are awarded based on the scores going into the Final Jeopardy! round. If all three contestants finish with $0, no one returns as champion for the next show, and based on scores going into the Final Jeopardy! round, the two contestants who were first and second will receive the second-place prize, and the contestant in third will receive the third-place prize.\nThe strategy for wagering in Final Jeopardy! has been studied. If the leader's score is more than twice the second", "participants gave an answer listed for the question and a contestant gives it, the team scores zero points for providing a \"pointless\" answer. If the answer is incorrect, the team scores the maximum of 100 points. \nThe format of the show consists of an elimination round in which teams must achieve as low a score as possible, with those who achieve the highest score being eliminated from the game. Following this round, the two surviving teams compete against each other in a \"head to head\" round to find the lowest scoring answer in a series of questions, with the winning", "who performed the best on all questions asked during the game (based on most correct answers and fastest time). The contestant and the expert are asked five questions, again with three multiple-choice options. Whoever answers more questions correctly wins the round; if this is the contestant, their winnings are increased to $10,000. If either of the two participants is unable to catch up, the round ends immediately.\nIf the scores are tied after five questions, then the contestant is asked the \"Ultimate Trivia Question,\" a question chosen by all 3 experts off stage before the show. The contestant also wins the", "gave opposing player a chance to answer the same question. Later shows took a ball off the board. Each correct answer also revealed a number for the home viewers playing at home. A leaderboard was used and updated to keep track of progress. Round 1 In the first round, the contestants tried to cover all four corners of their cards. The first player to do that won £250. Round 2 In the second round, contestants race to complete the entire center line. The first player to do that won £500. Round 3 In the third & final round, all three", "challenge, and the team who rang in got to answer, and if correct, won the game, but otherwise, the opponents had a chance to answer.\nThe team with the higher score kept their money and played the bonus round, where the three contestants picked a category from three and alternated turns and identified subjects based on revealing one letter at a time, with the team having to get seven right answers in 45 seconds. If a teammate gave a wrong answer, he or she was knocked out, though the other teammates could continue to answer. The jackpot started at $1,000 and", " The kids were asked individual questions from categories randomly selected. Correct answers still earned a point. The first two challengers to reach three points advanced to the semifinals. The others left with a big screen television in addition to the digital camera and the computer.\nIn the semifinal round, the four semifinalists (two in each hour) competed for the right to play in the finals. The kids were asked different questions from seven categories, each one randomly selected. A correct answer still earned a point. An incorrect answer or no answer meant the opponent", "from the game, a contestant had to sit down and his or her spotlight went out.\nA separate lectern for each contestant was moved in place for the third and final round, with the semicircle behind it no longer lit.\nTwelve of the contestants were eliminated over the course of the first two rounds, leaving three to compete in the final. Round 1 Each of the 15 numbered contestants began the quiz with three 'lives'. The host made two passes through the field in numerical order, asking one question to each contestant per pass; typically, the category for each question was announced", "is the same for all participants. Contest format A team consists of, at most, three people and has five hours to solve a set of six to ten problems. During the contest, each team is only allowed to use a single computer. The problems are algorithmic in nature and of varying degree of difficulty. Judging Solutions to a problem, in the form of computer programs, can be submitted more than once. The BAPC jury checks whether a submission satisfies certain criteria and replies with a simple verdict. In case the submitted program gives the correct answer to all predefined tests" ]
how can i press my stomach out?
[ "The mechanism for inhaling is using your diaphragm to basically pull down, creating negative pressure in your lungs. When you inhale deeply to cause your abdomen to protrude, you relax your abdominal muscles and your diaphragm pushes down slightly on your abdominal organs, mostly your intestines, causing your abdomen to stick out.\nEdit: accuracy" ]
[ "never really moves. The stomach twistes with the feet therefore, the \"stomach rubs the hand\". If truckin is being done around a circle the outside hand is always up.\nPose and Peck: Put hands on hips, and do pecking with head.\nScarecrow: First 4 counts are Charleston basic. Second 4 counts, put upper arms straight out to side, and let forearms dangle loosely, and tilt head to side. Often the feet are slightly apart, with the knees drooping together.\nShorty George: Named for George Snowden. Walk a straight line using very small steps. Keep upper body upright while dramatically bending knees. With each", "drop An elevated gutbuster in which an attacking wrestler would lift an opponent up, stomach-first, across one of their shoulders before dropping down to their knees forcing the opponent's stomach to impact on the wrestler's shoulder. Rib breaker A rib breaker is a version of a gutbuster that involves the wrestler scooping the opponent up by reaching between the legs of the opponent with one arm and reaching around their back from the same side with his/her other arm. The wrestler then lifts his/her opponent up so they are horizontal across the wrestler's body. From here the wrestler drops down", "push-up primarily targets the muscles of the chest, arms, and shoulders, support required from other muscles results in a wider range of muscles integrated into the exercise. Abdominals The rectus abdominis and transversus abdominis contract continually while performing push-ups to hold the body off the floor and keep the legs and torso aligned. The rectus abdominis spans the front of the abdomen and is the most prominent of the abdominal muscles. The transversus abdominis lies deep within the abdomen, wrapping around the entire abdominal area. Both muscles compress the abdomen, and the rectus abdominis also flexes the spine forward, although", "Knee-on-stomach Use Knee-on-stomach is an advantageous position, where the top combatant can effectively strike similarly to in the mounted position, and also transition into various holds or other positions, and also easily disengage and escape if needed. It is not however considered as stable as the mount, which on the other hand complements the knee-on-stomach well, since it is possible to easily transition from one to another in response to escape or sweep attempts by the opponent. A common submission hold applied from this position is the juji-gatame armbar, which can be performed if the opponent extends his or her", "using his right knee to push him forward and off-balance. He then grabs his right wrist with the right hand and pulls it outward. His belly is now down on the mat, legs flat. The aggressor is above the opponent with his chest several inches above his back. The aggressor's left knee holds up most of his own body weight. The aggressor's right leg is extended between his legs with the ball of the foot on the floor. The aggressor curls his wrist, then encloses the opponent's left arm inside the aggressor's left elbow joint. With the aggressor's chest is", "a belly to belly suplex and pinned her with a handful of tights for leverage.", "recommends chest thrusts instead of abdominal thrusts.\nPerforming abdominal thrusts involves a rescuer standing behind an upright patient and using his or her hands to exert pressure on the bottom of the diaphragm. This compresses the lungs and exerts pressure on any object lodged in the trachea, hopefully expelling it. This amounts to an artificially induced cough. For example, WebMD recommends the rescuer placing his or her fist just above the person's bellybutton and grasping it with the other hand. To assist a larger person, more force may be needed. The Mayo Clinic recommends the same placement of fist", "incision that isn't placed around the belly button. Through this smaller incision, excess skin is removed and the belly button is temporarily detached, floating above the muscles during this process. The muscles are tightened and reshaped from sternum to pubic area. The skin is then tightened and the belly button is reattached, or moved down one or two cm if desired. Liposuction may also be performed to achieve desirable results. Circumferential abdominoplasty A circumferential abdominoplasty is an extended abdominoplasty plus a buttock lift. The resulting scar runs all the way around the body, and the operation is also called a", "Having the person lean forward reduces the chances of the foreign body going back down the airway when coming up.\nPerforming abdominal thrusts on someone else involves standing behind them, and providing and inward and upward force in the upper abdomen. Abdominal thrusts can also be performed on oneself with the help of certain objects, such as by leaning over a chair. In adults, there is limited evidence that the head down position can be used for self-treatment of suffocation and appears to be an option only if other maneuvers do not work. In contrast, in children under 1 it is", "to push quickly and with enough force to raise his or her hands several centimeters off the ground, with the body completely suspended on the feet for a moment, a variation of the drop push. This is necessary for performing 'clap push ups' - i.e. clapping the hands while in the air.\nAztec push-ups\nThe Aztec push-up is one of the most difficult plyometric push-ups. A person performs an Aztec push-up by beginning in the normal push-up starting position and exploding upward with both the hands and feet, driving the entire body into the air. While in the air, the", "the head lower than the chest (i.e., bend the person over when you slap them hard between the shoulder blades with the heel of the palm); otherwise, the blow may drive the object deeper into the person's throat. Abdominal Thrusts (Heimlich Maneuver) Abdominal thrusts are performed with the rescuer standing behind the person choking and exerting inward and upward pressure with their hands on the choking person's abdomen. This method of dislodging an airway obstruction was discovered by Dr. Henry Heimlich in 1974 and, when used alone (without back blows) to assist a choking victim, is referred to as \"The", "of the opponent with his arms and securing a \"handshake\" grip close to the abdomen of the opponent. He then heaves the opponent back and up, using the muscles of his legs and his back, so that the opponent's feet rise in the air and he ends up inverted, perpendicular to the ground, and facing away from the athlete. The throw finishes with a \"pile driver\" or, alternatively, with a simple release of the opponent so that he falls to the ground. Heave from a waist lock from behind The athlete passes to the back of his opponent, secures a", "and squeeze your lower abdomen tight so that the core becomes compact, unifying the torso, this actively engages more of the muscle fibers to generate more force.", "the action may also be enough to cause movement of the article sufficient to allow clearance of the airway. Abdominal thrusts Performing abdominal thrusts involves a rescuer standing behind a patient and using his or her hands to exert pressure on the bottom of the diaphragm. This compresses the lungs and exerts pressure on any object lodged in the trachea, hopefully expelling it.\nThe European Resuscitation Council and the Mayo Clinic recommend alternating between 5 back slaps and 5 abdominal thrusts in severe airway obstructions.\nIn some areas, such as Australia, authorities believe that there is not enough scientific evidence to support", "legs with one arm and reaches around that opponent's back from the same side with his other arm before lifting their opponent upside down into a belly-to-belly position. The attacker then grabs the opponent's legs by the knees, jumps up, then drops to a sitting position with the opponent's head between their thighs. \nAja Kong Innovated the move. This move was popularized by Kevin Owens during his time on the independent circuit. Pulling piledriver Also known as a stump piledriver, this is a variation of piledriver where, instead of wrapping their arms around the opponent's waist, a wrestler grabs onto", "exercise. Form The pulldown usually uses a weight machine with a seat and brace for the thighs. The starting position involves sitting at the machine with the thighs braced, back straight and feet flat on the floor. The arms are held overhead at full extension, grasping a bar connected to the weight stack. The movement is initiated by pulling the elbows down and back, lowering the bar to the neck, and completed by returning to the initial position. Variations Variations can include touching the bar to the chest (sternum) versus the back of the neck, or varying hand spacing", "bumped as hard as the rules allowed, and maybe a little harder, when nobody was looking. ... Every time Schultz started anywhere he would find a couple of Penn men digging headfirst into his stomach. They would elbow him, jam him with the straight arm, and if he went to the ground in a scrimmage there generally would be a knee grinding him in the wind. Pretty soon Schultz began to show it. ... He limped along pitifully. He couldn't run. His strength was almost gone. When he did tackle, his groan of pain could almost be", "Brainbuster Cradle brainbuster Also known as a belly-to-belly brainbuster, the wrestler stands facing a standing opponent and then wraps both arms around the opponent's torso, lifting them off the ground. The wrestler then shifts their grip so they are holding the opponent by their legs, gripping the opponent behind the knee. The wrestler then removes one arm from the opponent’s leg and quickly applies a front facelock with that arm, lifts the opponent as if they were using a vertical suplex and lands the opponent on the back of their head. Double underhook brainbuster Also known as the Michinoku Driver", "back. The attacking wrestler may repeatedly press the opponent overhead to show his or her strength, prior to dropping them. This move is also called the military press slam. Gorilla press spinebuster A gorilla press in which the user drops the opponent and turns them 90 degrees, dropping then onto his/her shoulder facing the opposite direction to the attacker, before being driven to the ground in a spinebuster maneuver. Goldberg used the move as a signature. Gutbuster A gutbuster is any move in which the wrestler lifts his/her opponent up and jumps or drops him/her so that the opponent's stomach", "he quickly grabs the opponent's head or neck with both hands and falls on his stomach to complete the rear mat slam. Sitout rear mat slam The wrestler takes hold of their opponent from behind, holding them by either their hair or the top of their head. The wrestler then jumps backwards and falls to a sitting position, driving the back of the opponent's head into the ground between their legs. A variation sees the wrestler run up the corner turnbuckles, perform a backflip over a chasing opponent, and at the same time grab hold of the opponents head and", "hands as the wrestler pulls them backwards, lifting them off the mat. At this point the opponent releases their grip on the rope and is brought down to the mat. Corner sitout powerbomb The opponent begins sitting in the corner of the ring and facing outwards, while holding on to the ring ropes. The wrestler takes hold of the opponent by the legs and pulls them upwards and backwards with a twist, falling into a sitting position as they do so. The move ends with the opponent's back on the ground and their legs over the shoulders of the wrestler,", "reaches under one of the opponent's arms with his/her corresponding arm and places the palm of his/her hand on the neck of the opponent, thereby forcing the arm of the opponent up into the air (the half nelson). The wrestler then uses his/her other arm to pull the opponent's other arm behind the opponent's head, so both opponent's arms are pinned. The wrestler then hooks the opponent's near leg and throws themselves backwards, driving the opponent back-first to the ground. Ranhei The wrestler faces the opponent, ducks under the opponent's arm closest to them, wraps their closest arm around the", "the opponent and grabs his/her arms, applying a double chicken wing to the opponent. The applying wrestler then squats back, lifting the opponent's torso into the air. The move was used by Bull Nakano and formerly used by the former SmackDown general manager Paige.", "set up table, Tony climbed to the top rope and dove toward him, spinning 360° before landing stomach first across Pain, breaking him through the table. Tony gained the pinfall after he hit The Meteorite, a move in which Tony poured alcohol on his right glove, lit it on fire with a lighter, and punched Pain in the face.\nIn the following tag team match, Justin Credible and 2 Cold Scorpio took on Nosawa and The Great Muta. When Nosawa attempted to deliver a running knee to Scorpio's head, Scorpio blocked the move and hit Nosawa with a spinning kick to", "Over-the-shoulder back-to-belly piledriver This move begins with the wrestler facing his opponent. From there, the wrestler will pick up the opponent and place them over their shoulder so that the opponent's head is dangling over the wrestler's back by the waist of the wrestler. The wrestler then holds the opponent in place by holding their leg with one arm and applies a headlock to the opponent with their other arm, bending the opponent across the attackers back. The wrestler then drops to a seated position, driving the head and upper back of the opponent into the ground. This move was", "the stomach or ribs such as a roundhouse kick. Parries Parries are executed against the attacker by quickly pushing their arm or leg away to the right or left side(as it is considered as a block) and counterattacking when the procedure is done. Other types of blocks and alternatives More complex blocks include the circular block, X block, high X block, twin forearm guarding block, hooking block, and pole block.\nOffensive techniques can also be used to block. For example, a kick or palm strike can be used to neutralize an incoming blow. It is also common to use the knee", "bellybutton inward, toward the spine. Some perform a vacuum in conjunction with bending over, reaching overhead, or when lifting heavy weights, although the benefit and healthiness of this is disputed (some advocated just tensing the midsection, with primary focus more so on the lower back). Increasing the range of motion (how far it is drawn in), the intensity (very little can be done, other than resisting gravity) or the duration are the methods of making the muscles stronger. Performing flutters or Tabata intervals of high intensity and rest similar to kegel exercises is also common. It may also be possible", "gutwrench hold to lift the opponent up off the ground. At this point another wrestler, who is situated on the top turnbuckle would then jump down to hit the opponent with a top-rope leg drop to the back of his exposed head, forcefully driving the opponent's face and body back down to the mat. Battering ram One wrestler stands behind his partner and leans forward, placing his head underneath his partner's arm, in a headlock. The two then charge forward, ramming the head of the rear wrestler into the opponent. There is also a one man version of the move", "work in tandem.\nWhile it is true that the TVA is vital to back and core health, the muscle also has the effect of pulling in what would otherwise be a protruding abdomen (hence its nickname, the “corset muscle”). Training the rectus abdominis muscles alone will not and can not give one a \"flat\" belly; this effect is achieved only through training the TVA. Thus to the extent that traditional abdominal exercises (e.g. crunches) or more advanced abdominal exercises tend to \"flatten\" the belly, this is owed to the tangential training of the TVA inherent in such exercises.", "that the leg moves over the back of the opponent and entangles the opponent's arm. By controlling the opponent's body and pushing the arm perpendicularly away from the opponent's back, pressure can be put on the opponent's shoulder. It is also possible to put pressure on the elbow joint by bending the leg entangling the arm, and twisting it in a specific manner. In order to secure the opponent and prevent him from rolling out of the lock, the inner arm can be thrown over the opponent's waist as a \"seatbelt\" securing the opponent. Though an effective lock, it" ]
How do phones and iPods and such know when they are turned sideways?
[ "_URL_0_ \nIt's called an accelerometer. This guy breaks it dowwn." ]
[ "immediately and is correctly aligned. For a drive without the sensor, the mechanism attempts to move the head the maximum possible number of positions needed to reach track zero, knowing that once this motion is complete, the head will be positioned over track zero.\nSome drive mechanisms such as the Apple II ​5 ¹⁄₄-inch drive without a track zero sensor, produce characteristic mechanical noises when trying to move the heads past the reference surface. This physical striking is responsible for the ​5 ¹⁄₄-inch drive clicking during the boot of an Apple II, and the loud rattles of its DOS and ProDOS when disk", "IPod click wheel The iPod click wheel is the navigation component of several iPod models. It uses a combination of touch technology and traditional buttons, involving the technology of capacitive sensing, which senses the capacitance of the user's fingers. The wheel allows a user to find music, videos, photos and play games on the device. The wheel is flush on the face of the iPod and is located below the screen.\nThe design was first released with the iPod Mini, and was last used with the iPod Classic. It is credited to Apple's Vice President of worldwide marketing, Phil Schiller. Details", "Pointing device A pointing device is an input interface (specifically a human interface device) that allows a user to input spatial (i.e., continuous and multi-dimensional) data to a computer. CAD systems and graphical user interfaces (GUI) allow the user to control and provide data to the computer using physical gestures by moving a hand-held mouse or similar device across the surface of the physical desktop and activating switches on the mouse. Movements of the pointing device are echoed on the screen by movements of the pointer (or cursor) and other visual changes. Common gestures are point and click and", "Turn indicator stalk Innovations Many other functions have been added to the turn signal stalk. Frequently headlamps and high beam controls are integrated into the turn signal control, the former requiring either a twisting motion or the use of a small switch, and the latter requiring movement of the control fore and aft.\nMany modern cars have a \"one-touch\" feature on their stalks. This is primarily based on (motorway) lane-switching, where a single flick of the indicator will cause it to flash between two and six times.\nSome cars have forgone the traditional stalk-mounted indicators for either a switch (as used on", "the wheel, the more concentrated the stream of signals it sends out. The moment the finger leaves the wheel, however, is when the controller stops detecting change in capacitance, therefore stopping the current process. Similar technologies The Creative Zen Touch from 2004 has a vertical scroll wheel similar to the iPod's click wheel. That same year the luxury Nokia 7280 mobile phone also featured a scroll wheel. The Samsung SGH-i300 from 2005, as well as Motorola ROKR E8 from 2007, also have it. In 2007 Nokia created the 'Navi wheel' which debuted on the Nokia N81. LG also implemented such", "the driver holds the lever partway towards the left or right turn signal detent. Some recent vehicles have an automatic lane-change indication feature; tapping the lever partway towards the left or right signal position and immediately releasing it causes the applicable turn indicators to flash three to five times.\nSome transit buses, such as those in New York, have had, since at least the 1950s, turn signals activated by floor-mounted momentary-contact footswitches on the floor near the driver's left foot (on left-hand drive buses). The foot-activated signals allow bus drivers to keep both hands on the steering wheel while watching the", "a 3-axis accelerometer to sense iPad orientation and switch between portrait and landscape modes. Unlike the iPhone and iPod Touch's built-in applications, which work in three orientations (portrait, landscape-left and landscape-right), the iPad's built-in applications support screen rotation in all four orientations, including upside-down. Consequently, the device has no intrinsic \"native\" orientation; only the relative position of the home button changes.\nThere are four physical switches on the iPad, including a home button near the display that returns the user to the main menu, and three plastic physical switches on the sides: wake/sleep and volume up/down, plus a software-controlled switch whose", "and three plastic switches on the sides: wake/sleep and volume up/down, plus a software-controlled switch whose function varies with software update. The display responds to other sensors: an ambient light sensor to adjust screen brightness and a 3-axis accelerometer to sense orientation and to switch between portrait and landscape modes. Unlike the iPhone and iPod Touch's built-in applications, which work in three orientations (portrait, landscape-left and landscape-right), the iPad's built-in applications support screen rotation in all four orientations, including upside-down. Consequently, the device has no intrinsic \"native\" orientation; only the relative position of the home button changes.\nThe tablet is manufactured", "The click wheel detects a user's input via its touch sensitive ring. Because of four mechanical buttons that lie beneath it, the ring is able to perform multiple commands. For example, browsing through music, after selecting a particular song, the click-wheel is used to adjust the volume. Pressing the select button can be used to skip to a specific part in the song.\nThe primary technology that the click-wheel demonstrates is that of capacitive sensing. This technology actually dates back to 1919, where it was first utilized in a musical instrument called a theremin. It allowed the pitch and volume of", "Pointing device gesture In computing, a pointing device gesture or mouse gesture (or, simply, gesture) is a way of combining pointing device or finger movements and clicks that the software recognizes as a specific computer event and responds in a manner particular to that software. They can be useful for people who have difficulties typing on a keyboard. For example, in a web browser, a user can navigate to the previously viewed page by pressing the right pointing device button, moving the pointing device briefly to the left, then releasing the button. History The first pointing device gesture, the \"drag,\"", "computers. These devices had a 3D sensor, and moving the device caused the contents to move as if the contents were fixed in place. This interaction could be referred to as “moving to scroll.” Also, if the user moved the device away from their body, they would zoom in; conversely, the device would zoom out if the user pulled the device closer to them. Smartphone cameras and “optical flow” image analysis utilize this technique nowadays.\nA 1996 research paper by Jun Rekimoto analyzed tilting operations as scrolling techniques on small screen interfaces. Users could not only tilt to scroll, but also", "side-on. Turning Drivers often seek to turn onto another road or onto private property. The vehicle's blinking turn signals (commonly known as \"blinkers\" or \"indicators\") are often used as a way to announce one's intention to turn, thus alerting other drivers. The actual usage of directional signals varies greatly amongst countries, although its purpose is to indicate a driver's intention to depart from the current (and natural) flow of traffic well before the departure is executed (typically 3 seconds as a guideline).\nThis will usually mean that turning traffic must stop and wait for a breach to turn, and", "case activated by a horizontal lever (or \"stalk\") protruding from the side of the steering column, though on some vehicles it protrudes from the dashboard. The outboard end of the stalk is pushed clockwise to activate the right turn signals, or anticlockwise for the left turn signals. In most cases, the signal stalk is on the outboard, usually left hand side of the column, in both left and right hand drive cars. Regulations do not specify a mandatory location for the turn signal control, only that it be visible and operable by the driver, and—at least in North America—that it", "to flash with the turn signals, but this is not mandatory. Mercedes-Benz introduced the side turn signal repeaters integrated into the side view mirror in 1998, starting with its facelifted E-Class (W210). Since then, many automakers have been incorporating side turn signal devices into the mirror housings rather than mounting them on the vehicle's fenders. Some evidence suggests these mirror-mounted turn signals may be more effective than fender-mounted items. Electrical connection and switching Turn signals are required to blink on and off, or \"flash\", at a steady rate of between 60 and 120 blinks per minute (1–2 Hz). International UN Regulations", "touchpad instead of a physical button. To drag, instead of performing the \"click-and-a-half\" technique, the user presses down while on the object, drags without releasing pressure, and lets go when done. Touchpad drivers can also allow the use of multiple fingers to emulate the other mouse buttons (commonly two-finger tapping for the center button).\nTouchpads are called clickpads if it does not have physical buttons, but instead relies on \"software buttons\". Physically the whole clickpad formed a button, logically the driver interpret a click as left or right button click depending on the placement of fingers.\nSome touchpads have \"hotspots\", locations", "car respectively, while left and right turns its direction. The A button fires the currently selected weapon and changing between other weapons is executed by holding down Option 1 and pressing the direction where said weapon was located on the car, but holding down the button on its own toggles between weapons as well. The B button shows the map radar that displays the location of rivals on the current area and holding it down changes between multiple views by pressing the desired direction, while pressing up when holding down the button informs players how much damage the vehicle has", "information to the ears, and so binaural cues to a stationary ear do not suffice to identify a sound's location in the median plane. Monaural cues that depend on the shape of the head and the structure of the external ear help with vertical localization, but binaural cues also play a part if the head is not stationary.\nWallach's research showed that when the human head moves (either by tilting or by rotating around a vertical axis), it creates a dynamic pattern of binaural cues that can, when paired with information about the direction and extent of the head movement, enable", "allowing the driver to operate them without taking their eyes off the road. For example, the switches to the power windows and power locks were designed with one half of the switch raised up, with the other half recessed, in order for its function to be identified by touch (akin to the concept of Braille writing). To further enhance this \"user friendliness\", the dashboard was designed to have all of the controls in the central area, within reach of the driver. The left side of the dash also curved slightly around the driver, to make controls easily accessible as well", "require that all turn signals flash in simultaneous phase; US regulations permit side marker lights wired for side turn signal functionality to flash in opposite-phase. An audio and/or visual tell-tale indicator is required, to advise the driver when the turn signals are activated and operating. This usually takes the form of one or two green indicator lights on the vehicle's instrument cluster, and a cyclical \"tick-tock\" noise generated electromechanically or electronically. It is also required that the vehicle operator be alerted by much faster- or slower-than-normal flashing in the event a turn signal light fails.\nTurn signals are in almost every", " button, blue button, and yellow button. The lower right houses the right analog stick, in lower left is a digital D-pad and on the left face is the left analog stick. Both analog sticks can also be \"clicked in\" to activate a digital button beneath. In the center of the controller face are digital \"Start\", \"Back\" and \"Guide\" buttons. The \"Guide\" button is labelled with the Xbox logo, and is used to turn on the console/controller and to access the guide menu. It is also surrounded by the \"ring of light\", which indicates the controller number, as", "have a built-in feature called \"Do Not Disturb While Driving.\" This feature is part of the operating system and does not need to be added or downloaded separately. It uses parameters such as motion detection and network connections to detect driving and can be activated in the iPhone's \"Do Not Disturb\" settings. To find this feature, tap the “Settings” icon, and then scroll down to “Do Not Disturb.” Next, scroll down to “Do Not Disturb While Driving.” Once turned on, it will block incoming text messages while the car is being driven. It will also auto-respond to those texts with", "cursor movement. When a finger bends quickly, the movement is interpreted as a \"click\". Combined with the PC Eye-Trek, a user can select an icon by just moving and tapping a finger in the air. In 2000, IBM launched the \"Park Bench\" TV commercial, which featured its vision for voice-activated wearable PCs.\nAt CEATEC 2010, NTT DoCoMo demonstrated the AR Walker, an augmented reality glasses which were developed by Olympus in 2008.\nOn 5 July 2012 Olympus announced the MEG4.0, a Monocular eyewear display that contains a QVGA (320 x 240) resolution display and can connect to devices through Bluetooth 2.1. No", "are placed on the surface of the trackpad and moved accordingly. If the user has their trackpad scrolling direction set to “natural,” moving their two fingers toward the top of the trackpad will cause the page to scroll up towards the top of the page; conversely, moving their fingers toward the bottom of the trackpad will cause the page to scroll down towards the bottom. If the user “flicks” their fingers by moving their two fingers very quickly across the trackpad and then releasing their fingers, the page will continue to scroll in the direction in which they flicked until", "side mirrors of a vehicle, activated by the driver on one side of the vehicle at a time to advertise intent to turn or change lanes towards that side.\nElectric turn-signal lights date from as early as 1907. The modern flashing turn signal was patented in 1938 and later most major automobile manufacturers offered this feature. As of 2013 most countries require turn signals on all new vehicles that are driven on public roadways. Alternative systems of hand signals were used earlier, and remain common for bicycles. Hand signals are also sometimes used when regular vehicle lights are malfunctioning or for", "fast as possible in the desired direction, and then brake the wheel with their hands to go straight again.\nDriving controllers were implemented on Atari consoles with a device that worked in the same fashion as the joysticks, pressing each directional switch in turn as it spun. Programs had to watch the sequence of bits in the shadow registers in order to tell if the controller was being spun to the right or left, the OS itself did not attempt to interpret this to provide \"right\" and \"left\" instructions for the programmer. Paddles Paddles are analog devices normally used to", "glass touchpad. Conversely when tracking is set to slow, larger movements of the thumb on the touchpad will tune down the distance that is traversed on the screen. This can help people with disabilities.\nApple's Remote app on iOS devices allows control of the Apple TV from an iPhone, iPad or iPod Touch. The iOS remote app increases the accessibility of the Apple TV by enabling Switch Control. Switch Control is a unique Apple technology that enables navigation sequentially through onscreen items and perform specific actions such as selecting, tapping, dragging, typing using third party Bluetooth-enabled switch hardware made for those", "finger is when pressing the button. This works well unless the user is wearing gloves or anything that the touch surface cannot \"read\". The user cannot adjust the sensitivity and scroll speed, but can choose to turn it off and use the button as a standard directional pad instead.", "Unlike the iPhone and iPod Touch's built-in applications, which work in three orientations (portrait, landscape-left and landscape-right), the iPad's built-in applications support screen rotation in all four orientations, including upside-down. Consequently, the device has no intrinsic \"native\" orientation; only the relative position of the home button changes.\nThe iPad Air was available with 16, 32, 64 or 128 GB of internal flash memory, with no expansion option. Apple also sells a \"camera connection kit\" with an SD card reader, but it can only be used to transfer photos and videos. As of the announcement of the iPad Pro 9.7-Inch on March 21,", "the cursor on the output to the display on the operating system, analogous to the handling of a mouse that is lifted and put back on a surface. Hardware buttons equivalent to a standard mouse's left and right buttons are positioned adjacent to the touchpad.\nSome touchpads and associated device driver software may interpret tapping the pad as a mouse click, and a tap followed by a continuous pointing motion (a \"click-and-a-half\") can indicate dragging. Tactile touchpads allow for clicking and dragging by incorporating button functionality into the surface of the touchpad itself. To select, one presses down on the", "the stick arrives at one's eye in a crooked pattern, but this appearance is not necessarily a sense-datum in the mind. Similar things can be said about the coin which appears circular from one vantage point and oval-shaped from another. Pressing on your eyeball with a finger creates double vision but assuming the existence of two sense-data is unnecessary: the direct realist can say that they have two eyes, each giving them a different view of the world. Usually the eyes are focused in the same direction; but sometimes they are not.\nHowever, this response is presumably based on previously observed" ]
What would be the simplest way to "unplug" the internet, causing total shut down by means of disabling hardware?
[ "Like, in your house? Or the whole thing?\n\nIn your house, just unplug the cable between the router and the modem. \n\nThe Internet as a whole is so resilient (it was intended to survive nuclear strikes) that it would be extraordinarily difficult. Global thermonuclear war might do it." ]
[ "Stop Procrastinating Features The software allows users to set a time from one minute to 24 hours and then chose one of three options to block the internet for the time period they have selected. One option allows users to block the internet connection completely but reconnect to the internet by restarting the computer before the time is completed, while a second option prevents users getting back online until the time is up, even if they restart. The software offers a third option called a blacklist, where users can list websites they wish to block, thus still having access to", "option to stop the worm from shutting down a computer is to change the time and/or date on its clock to earlier; the shutdown time will move as far into the future as the clock was set back.", "Apple Menu or by pressing the power key to bring up the power management dialog box and selecting button \"Shut down\". An administrator may also use the Unix shutdown command as well. It can also be shut down by pressing [Alt]+[Command]+[Eject optical disc on optical drive] but this will not prompt the user anything at all. Unix and Linux In Unix and Linux, the shutdown command can be used to turn off or reboot a computer. Only the superuser can shut the system down.\nOne commonly issued form of this command is shutdown -h now, which will shut down a system", "giving them a \"shutdown\" order in which the systems turn off one by one. It is also used to send false messages to hostiles, in order to place the tide of battle in the favor of America. The technology is later reverse-engineered by the Russian Federation to shut down American anti-ballistic missile satellites from a tracking station at Socotra Island, Yemen.\nCyberwarfare has moved from a theoretical idea to something that is now seriously considered as a threat by modern states.\nIn a similar but unrelated series of incidents involved various groups of hackers from India and Pakistan that hacked and defaced", "destroyed. It is the kernel's responsibility to destroy the socket internally. Sometimes, a socket may enter a TIME_WAIT state, on the server side, for up to 4 minutes.\nOn SVR4 systems use of close() may discard data. The use of shutdown() or SO_LINGER may be required on these systems to guarantee delivery of all data. Client-server example using TCP The Transmission Control Protocol (TCP) is a connection-oriented protocol that provides a variety of error correction and performance features for transmission of byte streams. A process creates a TCP socket by calling the socket() function with the parameters for the protocol family", "to classify as critical communications infrastructure and what to leave out.\nPolicy makers have to take into account the cost of shutting down the Internet, if it is even possible. The loss of the network for even a day could cost billions of dollars in lost revenue. The National Cybersecurity Center was set up to deal with these questions, to research threats and design and recommend prophylactic methods.\nIn many ways, the integration of networked computer-mediated communication systems into our business and personal lives means that the potential threat is increasing along with the potential problem of protecting a wide class of", "may cause a process to run which is waiting to read or write. A power-off interrupt predicts imminent loss of power, allowing the computer to perform an orderly shut-down while there still remains enough power to do so. Keyboard interrupts typically cause keystrokes to be buffered so as to implement typeahead.\nInterrupts are sometimes used to emulate instructions which are unimplemented on some computers in a product family. For example floating point instructions may be implemented in hardware on some systems and emulated on lower-cost systems. In the latter case, execution of an unimplemented floating point instruction will cause an \"illegal", "blocked host within a certain period, so as to not \"lock out\" any genuine connections that may have been temporarily misconfigured. However, an unban time of several minutes is usually enough to stop a network connection being flooded by malicious connections, as well as reducing the likelihood of a successful dictionary attack.\nFail2Ban can perform multiple actions whenever an abusive IP address is detected: update Netfilter/iptables or PF firewall rules, TCP Wrapper's hosts.deny table, to reject an abuser's IP address; email notifications; or any user-defined action that can be carried out by a Python script.\nThe standard configuration ships with filters for", "will halt when started before the network connection is made, displaying an error message and requiring a keypress), loss of control of the machine due to software problems (machine hang, termination of remote control or networking software, etc.), and virus infection or hard disk corruption. Therefore, the use of a reliable server-class machine with RAID drives, redundant power supplies, etc., will help to maximize availability. Additionally, a device which can switch the machine off and on again, controlled perhaps by a remote signal, can force a reboot which will clear problems due to misbehaving software.\nFor a machine not in constant", "on the laptops is impervious and no student will be able to break through the system. \"Our internet filtering is unbreakable. We have a huge proxy array that does all the filtering. We've just brought that in-house and the reason we have done that is we want much tighter control over it, every internet site that's known is actually categorised. If it isn't known, it's blocked. If you go to a site and it's not categorised you can't get to it,\" said Wilson.\nWith the termination of federal government funding commitments, the New South Wales Department of Education and Communities has", "manipulate the microcode state of a C-series or D-series machine, anywhere on earth, and then restart the machine.\nAlso, there was a remote debug protocol for the world-swap debugger. This protocol could, via the debugger \"nub\", freeze a workstation and then peek and poke various parts of memory, change variables, and continue execution. If debugging symbols were available, a crashed machine could be remote debugged from anywhere on earth. Origins in Ethernet and Pup In his final year at Harvard University, Bob Metcalf began interviewing at a number of companies and was given a warm welcome by Jerry Elkind", "Shutdown (computing) To shut down or power off a computer is to remove power from a computer's main components in a controlled way. After a computer is shut down, main components such as CPUs, RAM modules and hard disk drives are powered down, although some internal components, such as an internal clock, may retain power. Implementations The shutdown feature and command is available in Microsoft Windows, ReactOS, HP MPE/iX, and in a number of Unix and Unix-like operating systems such as Apple macOS. Apple macOS In Apple macOS the computer can be shut down by choosing \"Shut Down…\" from the", "LAND A LAND (local area network denial) attack is a DoS (denial of service) attack that consists of sending a special poison spoofed packet to a computer, causing it to lock up. The security flaw was first discovered in 1997 by someone using the alias \"m3lt\", and has resurfaced many years later in operating systems such as Windows Server 2003 and Windows XP SP2. Mechanism The attack involves sending a spoofed TCP SYN packet (connection initiation) with the target host's IP address to an open port as both source and destination. This causes the machine to reply to itself continuously.", "but also restores the router to all original settings. If the router has remote management enabled, a factory reset will often disable this (the default setting of many routers). Remote management is thought to be one possible vector for the initial attack.\nBefore connecting the factory-reset router to the internet again, the device's default passwords should be changed to prevent reinfection. Epidemiology VPNFilter is described by Cisco Talos as having infected as many as 500,000 devices worldwide, in perhaps 54 different countries, though proportionately the focus has been on Ukraine. FBI investigation The FBI has taken a high-profile role", "not a \"particular machine.\" The Internet is an intangible abstraction. Second, the limitation to a particular technological environment is a mere field-of-use limitation, which does not suffice under sec. 101. Third, the use of the Internet does not impose meaningful limits on the preemptive scope of the claims. The same court held that a \"Beauregard\" claim directed to the instructions for performing a method that does not pass the machine-or-transformation test will also fail to pass that test. The court pointed out that the PTO appellate board had similarly interpreted Bilski. The subsequent Alice decision appears to have substantially resolved", "standard (robots.txt) in determining if a website would be crawled or not; or if already crawled, if its archives would be publicly viewable. Website owners had the option to opt-out of Wayback Machine through the use of robots.txt. It applied robots.txt rules retroactively; if a site blocked the Internet Archive, any previously archived pages from the domain were immediately rendered unavailable as well. In addition, the Internet Archive stated that \"Sometimes a website owner will contact us directly and ask us to stop crawling or archiving a site. We comply with these requests.\" In addition, the website says: \"The Internet", "It is claimed the proposal would allow government restriction or blocking of information disseminated via the internet and create a global regime of monitoring internet communications, including the demand that those who send and receive information identify themselves. It would also allow governments to shut down the internet if there is the belief that it may interfere in the internal affairs of other states or that information of a sensitive nature might be shared.\nTelecommunications ministers from 193 countries attended the conference in Dubai. Changes to international telecommunication regulations The current regulatory structure was based on voice telecommunications, when the Internet", "Communication Shutdown Communication Shutdown is a global fundraiser on behalf of autism-related organizations in more than 40 countries. Beginning in 2010, the day is commemorated by individuals voluntarily refraining from using social media such as Facebook or Twitter for one day on 1 November.\nThe concept of the event is based on the idea that social communication is difficult for autistic people. Going without social networks for one day is therefore a perspective-taking exercise for people not on the spectrum. Aim and participation The aim of the event is to raise awareness about autism and also drive donations for autism services", "operation. To be able to do it, it would require an “Internetwork” scope, which is now missing. As ironic as it may sound, the current Internet is not really an internetwork, but a concatenation of IP networks with an end-to-end transport layer on top of them. The consequences of this flaw are several: both inter-domain and intra-domain routing have to happen within the network layer, and its scope had to be artificially isolated through the introduction of the concept of Autonomous System (Internet) and an Exterior Gateway Protocol; Network Address Translation (NATs) appeared as middleboxes in order to have a", "are controlled via IP networks; thus, for a switch to be controllable from a remote location, it must be open to receive connections from the Internet. In January 2013, it was revealed that the Wemo had a security flaw in its UPnP implementation that allowed an unauthorized user to take control of a switch. This could allow malicious attacks, such as flipping the switch at a very fast rate, which could damage certain devices and even cause electrical fires.\nThis vulnerability has been addressed by updated firmware releases.", "system is shut down to mitigate against a cold boot attack.\nA secure erase feature that if power is interrupted wipes the RAM in the less than 300 ms before power is lost in conjunction with a secure BIOS and hard drive/SSD controller that encrypts data on the M-2 and SATAx ports would also be effective. If the RAM itself contained no serial presence or other data and the timings were stored in the BIOS with some form of failsafe requiring a hardware key to change them it would be nearly impossible to recover any data and would also be immune to", "data on a network connected to the infected device, and gather credentials, supervisory control and data. The data are then encrypted and exfiltrated via the Tor network.\nIt can also serve as a relay point to hide the origin of subsequent attacks. Mitigation Both Cisco and Symantec suggest that people who own affected devices do a factory reset. That is typically accomplished by using a small, pointed object, such as a straightened out paperclip, to push the small reset button on the back on the unit for 10 to 30 seconds (time varies by model). This will remove the malware,", "individuals may create digital imprimaturs.\nCryptographer Ross Anderson, University of Cambridge, has great concerns that:\nTC can support remote censorship [...] In general, digital objects created using TC systems remain under the control of their creators, rather than under the control of the person who owns the machine on which they happen to be stored [...] So someone who writes a paper that a court decides is defamatory can be compelled to censor it — and the software company that wrote the word processor could be ordered to do the deletion if she refuses. Given such possibilities, we can expect TC to", "Halt and Catch Fire In computer engineering, Halt and Catch Fire, known by the assembly mnemonic HCF, is an idiom referring to a computer machine code instruction that causes the computer's central processing unit (CPU) to cease meaningful operation, typically requiring a restart of the computer. It originally referred to a fictitious instruction in IBM System/360 computers, making a joke about its numerous non-obvious instruction mnemonics.\nWith the advent of the MC6800, a design flaw was discovered by the programmers. Due to incomplete opcode decoding, two illegal opcodes, 0x9D and 0xDD, will cause the program counter on the processor to increment", "from compelled disclosure by the Fifth Amendment.\nThe usual technique for authorities, either public entities such as law enforcement or private organizations like companies, seizing a computer (usually a laptop) that they believe is being used improperly is to first physically separate the suspect user from the computer enough that he or she cannot touch it, to prevent them from closing its lid, unplugging it or typing a command. Once they have done so, they often install a device in the USB port that spoofs minor actions of a mouse, touchpad or keyboard, preventing the computer from going into sleep mode,", "Internet outage An Internet outage or Internet blackout can occur due to censorship, cyberattacks, disasters or errors.\nDisruptions of submarine communications cables may cause blackouts or slowdowns to large areas. Countries with a less developed Internet infrastructure are more vulnerable due to small numbers of high-capacity links.\nA line of research finds that the Internet with it having a \"hub-like\" core structure that makes it robust to random losses of nodes but also fragile to targeted attacks on key components − the highly connected nodes or \"hubs\". Prevention Internet outages can be prevented by a more resilient, decentralized Internet architecture.", "shutting down the container. The process is known as checkpointing: a container is frozen and its whole state is saved to a file on disk. This file can then be transferred to another machine and a container can be unfrozen (restored) there; the delay is roughly a few seconds. Because state is usually preserved completely, this pause may appear to be an ordinary computational delay. Limitations By default, OpenVZ restricts container access to real physical devices (thus making a container hardware-independent). An OpenVZ administrator can enable container access to various real devices, such as disk drives, USB ports, PCI", "Shutdown Day Founders Denis Bystrov and Nikolay Kudrevatykh were the co-founders of Shutdown Day; Bystrov originally conceived the idea of Shutdown Day, and the co-founders developed the concept in 2007, while living in Canada. Michael Taylor, an original partner in the idea of shutting down one's computer down for a day, said:\nI certainly could not and would not want to live without my computer. However, I am often drawn into spending hours chatting on MSN, simply because my friends are online instead of socialising face to face. I am often too busy to cook a proper dinner, because I", "decipher their code. Some browsers have found a way to get around that problem by emulating other browsers. With remote attestation, a website could check the internet browser being used and refuse to display on any browser other than the specified one (like Internet Explorer), so even emulating the browser would not work. Users unable to exercise legal rights The law in many countries allows users certain rights over data whose copyright they do not own (including text, images, and other media), often under headings such as fair use or public interest. Depending on jurisdiction, these may cover issues such", "removed.\nThe idea of removing Internet Explorer was proposed during the United States v. Microsoft Corp. case. One of Microsoft's arguments during the trial, however, was that removing Internet Explorer from Windows may result in system instability. Definition It is unclear what it means to \"remove IE\" because such a removal depends on being able to determine which files or functions on an installed Windows system are part of IE — that is, to draw a line between IE and the rest of Windows. Microsoft has held that this is not meaningful; that in Windows 98 and newer versions, \"Internet Explorer\"" ]
The whole Wiki leaks and assange debacle.
[ "Assange made a website that exposed private and sensitive information about important people and events, in particular the government, and they got angry.", "Well it all started with Wikileaks. Wikileaks is simply a site where classified information is uploaded. Of course, this is not really anything new, News papers have done this for a long time (well, share it, not upload). But Wikileaks manage to do this in a way big way. They have communication between diplomats, secret deals, and some disturbing shots of USA soldiers attacking civilians.\n\nThe USA didn't like this on bit. They thought it was helping terrorists, and breaking the law (in some mysterious way. I believe the logic is that some of the documents they published put the lives of American soldiers at risk, and they are therefor a terrorist organization). So they started thinking of ways of shutting it down.\n\nSo the went to VISA, Mastercard and most other payment providers and said: don't give them any more money. So they closed all their accounts, and stopped all new donations. Wikileaks is fighting back, and have recently won a few court cases so they might soon get some money again.\n\nThe other things is that the USA want Assange, as he started the whole thing. The problem is that he is in England. And England won't send anyone anywhere where they might risk life in jail or a death sentence. Which he might very well get in the USA.\n\nAround this time two ex-girlfriends of Assange surfaces in Sweden. They start talking about how Assange raped them, while they were in a relationship. Now, Sweden want Assange to try him for rape. Rape won't give him life in prison in Sweden, so England can send him there. \n\nAssange fears that he will be sent from Sweden to the USA. Which would be bad for him. One of the documents Wikileaks published was conversations between Sweden and USA, where USA basically ordered Sweden to shut down the piratebay." ]
[ "accidentally discovered Assange dyeing it that colour.\nAs the film ends, it is revealed that WikiLeaks is continuing to leak information (with Assange implied to have either regained the site or rebuilt it), and the Manning documents were released with no redactions. Daniel has written a book on his involvement with the organization on which this film was based, and Assange has threatened to sue in retaliation. Assange is shown to be living in the Ecuadorian embassy in London to avoid arrest on an outstanding warrant for alleged sex crimes. In an interview, he denounces the two upcoming WikiLeaks films, stating", "decrypted portions of these documents started appearing across the Internet, Assange decided that the most responsible course of action was to simply make them available through WikiLeaks. Source of the leak WikiLeaks originally said it did not know the source of the leaked data. Julian Assange stated, \"Our whole system is designed such that we don't have to keep that secret\". The Pentagon launched an inquiry; Colonel Dave Lapan, a spokesperson for the Pentagon, said that investigators were trying to determine who leaked the material and said that Chelsea Manning, a 22-year-old U.S. Army intelligence analyst, was someone they were", "leaks in 2014, amounting to less than half of the data that was allegedly made available to WikiLeaks in the summer of 2016.\nIn September 2017, WikiLeaks released the \"Spy Files Russia,\" which detailed Russian government surveillance of internet and cellphone users in the country. Allegations of anti-semitism WikiLeaks has been accused of anti-semitism both in its Twitter activity and hiring decisions. According to Ian Hislop, Assange claimed that a \"Jewish conspiracy\" was attempting to discredit the organization. Assange denied making this remark, stating \"'Jewish conspiracy' is completely false, in spirit and in word. It is serious and upsetting.\"\nIn the wake", "of WikiLeaks is complex. Assange considers WikiLeaks a protection intermediary. Rather than leaking directly to the press, and fearing exposure and retribution, whistleblowers can leak to WikiLeaks, which then leaks to the press for them. Its servers are located throughout Europe and are accessible from any uncensored web connection. The group located its headquarters in Sweden because it has one of the world's strongest laws to protect confidential source-journalist relationships. WikiLeaks has stated it does not solicit any information. However, Assange used his speech during the Hack in the Box conference in Malaysia to ask the crowd of hackers and", "the WikiLeaks Twitter account played a key role in publicising the leaks through the hashtag #MacronLeaks just some three-and-a-half hours after the first tweet with the hashtag appeared. The campaign stated that false documents were mixed in with real ones, and that \"the ambition of the authors of this leak is obviously to harm the movement En Marche! in the final hours before the second round of the French presidential election.\" France's Electoral Commission described the action as a \"massive and coordinated piracy action.\" France's Electoral Commission urged journalists not to report on the contents of the leaks, but to", "misleading leaks \"are already well-placed in the mainstream media. WikiLeaks is of no additional assistance.\" The FAQ states that: \"The simplest and most effective countermeasure is a worldwide community of informed users and editors who can scrutinise and discuss leaked documents.\" According to statements by Assange in 2010, submitted documents are vetted by a group of five reviewers, with expertise in different topics such as language or programming, who also investigate the background of the leaker if his or her identity is known. In that group, Assange has the final decision about the assessment of a document.\nColumnist Eric Zorn wrote", "the Guardian's WikiLeaks book has compromised security in any way\". According to The Guardian, WikiLeaks had indicated that the password was temporary and that WikiLeaks had seven months to take action to protect the files it had subsequently decided to post online. \nThe book was made into a 2014 Hollywood movie, \"The Fifth Estate\". Assange's supporters complained that he and Wikileaks were not given any money for it.\nIn 2011, after Private Eye magazine criticised an allegedly antisemitic Wikileaks associate Israel Shamir, editor Ian Hislop reported that Assange telephoned and complained of a campaign led by The Guardian to", "exchange for Assange supplying information on the theft of emails from the Democratic National Committee, which were published by WikiLeaks before the 2016 presidential election. In October 2017, Rohrabacher and Johnson met with Senator Rand Paul (R-Kentucky) to discuss Assange supplying information about the source of leaked emails. However, Assange responded to news accounts of the meeting, tweeting, \"WikiLeaks never has and never will reveal a source. Offers have been made to me–not the other way around. I do not speak to the public through third parties.\" Other foreign policy In March 2005, Rohrabacher introduced HR 1061, the American Property", "leaked originally to WikiLeaks. It also released 570,000 intercepts of pager messages sent on the day of the 11 September attacks. During 2008 and 2009, WikiLeaks published the alleged lists of forbidden or illegal web addresses for Australia, Denmark and Thailand. These were originally created to prevent access to child pornography and terrorism, but the leaks revealed that other sites featuring unrelated subjects were also listed. 2010 In mid-February 2010, WikiLeaks received a leaked diplomatic cable from the United States Embassy in Reykjavik relating to the Icesave scandal, which they published on 18 February. The cable, known as Reykjavik 13,", "it judged WikiLeaks to be \"supremely well equipped to handle a disclosure of this magnitude\". Anonymous stated that as long as Bashar al-Assad remains in power, it will continue \"to assist the courageous freedom fighters and activists in Syria\".\nIn 2016, an interview between a member of the hacktivist group RevoluSec and Al Jazeera English and 500 pages of United States sealed court records viewed by The Daily Dot gave credit to RevoluSec, whose membership overlaps with Anonymous, for the data retrieval and for its transmission to WikiLeaks. RevoluSec claimed to have had complete access to all Syrian internet routers and", "first Wikileaks release of hacked DNC emails in July 2016, \"a senior Trump Campaign official was directed to contact STONE about any additional releases and what other damaging information [WikiLeaks] had regarding the Clinton Campaign. STONE thereafter told the Trump Campaign about potential future releases of damaging material by [WikiLeaks].\" The indictment also alleged that Stone had discussed Wikileaks releases with multiple senior Trump campaign officials. By the time of those contacts, it had been publicly reported that the DNC emails had been hacked by Russians and provided to Wikileaks. Report sent to Attorney General On March 22, 2019, the", "International Studies, called WikiLeaks \"a non-state hostile intelligence service often abetted by state actors like Russia\". Pompeo's accusation followed a series of \"damaging leaks\" of confidential documents, codenamed Vault 7, that included details on the CIA's hacking capabilities. Assange accused the CIA of trying to \"subvert\" his First Amendment rights, saying that \"History shows the danger of allowing the CIA or any intelligence agency, whose very modus operandi includes misdirection and lying, to be the sole arbiter of what is true or what is prudent. Otherwise, every day might see a repeat of the many foolish CIA actions which have", "Satter. The WikiLeaks Twitter account went on call the journalist \"a rat\", adding \"but he's Jewish\" and encouraged others to troll him. Exaggerated and misleading descriptions of the contents of leaks WikiLeaks has been criticised for making misleading claims about the contents of its leaks. Media outlets have also been criticised for reporting on WikiLeaks' claims about the CIA leak, which were later retracted.\nAccording to University of North Carolina Professor Zeynep Tufekci, this is part of a pattern of behaviour. After the 2016 Turkish coup d'état attempt, WikiLeaks announced that it would release e-mails belonging to Turkey's ruling conservative Justice", "defend WikiLeaks and its informant Chelsea Manning.\nIn June 2011, members of the group claimed responsibility for an attack against Sony Pictures that took data that included \"names, passwords, e-mail addresses, home addresses and dates of birth for thousands of people.\" In early June, LulzSec hacked into and stole user information from the pornography website www.pron.com. They obtained and published around 26,000 e-mail addresses and passwords.\nOn June 14, 2011, LulzSec took down four websites by request of fans as part of their \"Titanic Take-down Tuesday\". These websites were Minecraft, League of Legends, The Escapist, and IT security company FinFisher. They also", "of wikileaks.org. The California judge had the service provider of WikiLeaks block the site's domain (wikileaks.org) on 18 February 2008, although the bank only wanted the documents to be removed but WikiLeaks had failed to name a contact. The website was instantly mirrored by supporters, and later that month the judge overturned his previous decision citing First Amendment concerns and questions about legal jurisdiction. In March 2008, WikiLeaks published what they referred to as \"the collected secret 'bibles' of Scientology\", and three days later received letters threatening to sue them for breach of copyright. In September 2008, during the 2008", "that WikiLeaks \"did not participate in any wrongdoing in obtaining the materials in the first place\" and was therefore within the law in publishing the information. He also said that the DNC case was \"entirely divorced\" from the facts. The suit could not be refiled due to its \"substantive legal defect\". The federal judge also wrote “The DNC’s interest in keeping ‘donor lists’ and ‘fundraising strategies’ secret is dwarfed by the newsworthiness of the documents as a whole”...“If WikiLeaks could be held liable for publishing documents concerning the DNC’s political financial and voter-engagement strategies simply because the DNC labels them", "people-including journalists, whistleblowers, and those directly affected-were not. WikiLeaks took the view that sources could better protect themselves if the information were equally available. The archive includes 34,687 files on Iraq, 8,003 on Kuwait, 9,755 on Australia, and 12,606 on Egypt. According to The Guardian, it includes more than 1,000 cables containing the names of individual activists, and around 150 identifying whistleblowers.\nLeigh disclaimed responsibility for the release, saying Assange had assured him the password would expire hours after it was disclosed to him. The Guardian wrote that the decision to publish the cables was made by Assange alone, a decision", "in the DNC offices, and had not been hacked from outside. WikiLeaks statements Julian Assange, the founder of WikiLeaks, fueled the speculation in an interview with Nieuwsuur published on August 9, 2016, which touched on the topic of risks faced by WikiLeaks' sources. Unbidden, Assange brought up the case of Seth Rich. When asked directly whether Rich was a source, Assange nodded, then said \"we don't comment on who our sources are\". Subsequent statements by WikiLeaks emphasized that the organization was not naming Rich as a source, as they do with other leaks. It subsequently came to light that WikiLeaks", "Daniel Domscheit-Berg WikiLeaks Domscheit-Berg began working with WikiLeaks after meeting Assange at the Chaos Computer Club's annual conference (24C3) in 2007. On 25 September 2010, after reportedly being suspended by Assange for questioning him too much, Domscheit-Berg told Der Spiegel that he was resigning, saying \"WikiLeaks has a structural problem. I no longer want to take responsibility for it, and that's why I am leaving the project.\"\nDomscheit-Berg was highlighted in the Sveriges Television programme WikiRebels – The Documentary, released in the second week of December 2010.\nA book about his experience with and separation from WikiLeaks was released in Germany", "Lehel had successfully hacked the e-mail account of Sidney Blumenthal, a former aide to former president Bill Clinton. He distributed private memos from Blumenthal to Secretary of State Hillary Clinton involving recent events in Libya, including the September 11, 2012 Benghazi attack. Before distributing the memos, he copied and pasted the text into his own new documents, then reformatted them with pink backgrounds and Comic Sans font. The hacker's IP address was traced to Russia, however there was no certainty as to whether this was his actual location or whether he had used a proxy to hide his true location.\nIn", "reveal the fate of wanted terrorist Mustafa Mohammed Fadhil, who had been quietly removed from the FBI's most wanted terrorists list in 2005. Source of the leak The New York Times said it received the documents from an anonymous source other than WikiLeaks, and it shared them with other news outlets such as NPR and The Guardian. WikiLeaks suggested on Twitter that the source might be Daniel Domscheit-Berg, a former associate. WikiLeaks noted that \"our first partner, The Telegraph, published the documents at 1:00 AM GMT, long before NYT or Guardian.\" Reuters speculated that the original source of the leak", "it had temporarily severed Assange's internet connection because of WikiLeaks' release of documents \"impacting on the U.S. election campaign\", although it also stated this was not meant to prevent WikiLeaks from operating. WikiLeaks continued releasing installments of the Podesta emails during this time. Contents Some of the emails provide some insight into the inner workings of the Clinton campaign. For example, the emails show a discussion among campaign manager Robby Mook and top aides about possible campaign themes and slogans. Other emails revealed insights about the internal conflicts of the Clinton Foundation. The BBC published an article detailing 18 \"revelations\"", "ever been posted on WikiLeaks, but the initial tranche served as the site's foundation, and Assange was able to say, \"[w]e have received over one million documents from thirteen countries.\"\n— Raffi Khatchadourian, The New Yorker\nAssange responded to the suggestion that eavesdropping on Chinese hackers played a crucial part in the early days of WikiLeaks by saying \"the imputation is incorrect. The facts concern a 2006 investigation into Chinese espionage one of our contacts was involved in. Somewhere between none and handful of those documents were ever released on WikiLeaks. Non-government targets of the Chinese espionage, such as Tibetan associations were informed", "result, the GRU obtained hundreds of thousands of hacked documents, and the GRU proceeded by arranging releases of damaging hacked material via the WikiLeaks organization and also GRU's personas \"DCLeaks\" and \"Guccifer 2.0.\" Conspiracy or coordination To establish whether a crime was committed by members of the Trump campaign with regard to Russian interference, investigators \"applied the framework of conspiracy law\", and not the concept of \"collusion\", because collusion \"is not a specific offense or theory of liability found in the United States Code, nor is it a term of art in federal criminal law\". They also investigated if members", "to seize control of the fire alarms at the Ecuadorean embassy in London, which would force WikiLeaks founder Julian Assange to set foot on UK soil and face potential extradition to Sweden to face sexual assault charges.\nOn October 21, 2016, the Jester took responsibility for \"defacing\" the official website of the Russian Ministry of Foreign Affairs. The \"hack\" was later shown to be fake, actually being a POST based XSS on the website, not a deface or hack. SANS report: \"The Jester: A Lesson in Asymmetric Warfare\" In December 2011, T. J. O'Connor, a research analyst in the Information Technology", "websites. His first target was alemarah.info, which was the Taliban's website at the time.\nThe Jester posted several tweets claiming to be responsible for the downtime WikiLeaks was experiencing. He justified his alleged attacks by claiming that WikiLeaks was \"attempting to endanger the lives of our [US] troops, 'other assets' & foreign relations.\" In retaliation to The Jester's reported efforts, hacktivists including a group named Anonymous in support of WikiLeaks were reported as temporarily disrupting the website of MasterCard as well as attacking websites of Amazon and PayPal.\nOn November 29, 2010, someone claiming to be The Jester stated that he had", "by the Special Counsel to plead guilty to one count of perjury; he stated that he rejected it because he did not wilfully mislead anyone.\nDraft court documents, released in November, showed that two months before WikiLeaks released emails stolen from the Clinton campaign, Corsi sent emails to Trump campaign adviser Roger Stone informing him that WikiLeaks was going to publish the emails in two \"dumps\", giving dates of the planned releases and that the \"impact planned\" would be \"very damaging.\" Stone also sent Corsi an email directing him to contact Julian Assange \"and get the pending (WikiLeaks) emails.\" Corsi told", "urged their allies to open criminal investigations into the editor-in-chief of WikiLeaks. In the same documents there was a proposal by the National Security Agency (NSA) to designate WikiLeaks as a \"malicious foreign actor\", thus increasing the surveillance against it.\nIn January 2015, WikiLeaks issued a statement saying that three members of the organisation had received notice from Google that Google had complied with a federal warrant by a US District Court to turn over their emails and metadata on 5 April 2012. In July 2015 he called himself a \"wanted journalist\" in Le Monde, in an open letter to the French", "Inform Napalm Surkov leaks On 23 October 2016, Ukrainian hacker group CyberHunta published correspondence that it alleged was from the office email account of Vladislav Surkov, a political adviser to Vladimir Putin. Volunteers from Inform Napalm requested additional evidence from an alliance of hacker groups that includes CyberHunta, RUH8, FalconsFlame, and TRINITY. They secured the release of a 1GB Microsoft Outlook data file. Inform Napalm reported that the hackers also were in possession of documents from 2015 and 2016 that were being analysed by intelligence agencies and were not released due to their operational value.\nThe document leak included 2,337 emails", "Stone. Corsi also turned over computer, phone, and email records. The Office of the Special Counsel reportedly has information suggesting Corsi possessed advance knowledge that WikiLeaks had hacked the emails of John Podesta. Corsi has denied that he had any advance knowledge of the hack, or that he has had any communication with anyone involved in the hack. Corsi announced on November 12, 2018, that he expected to be indicted for perjury within days. Eleven days later he confirmed he had entered plea negotiations with Mueller prosecutors. On November 26, 2018, Corsi stated that he rejected the plea deal brought" ]
What is homeopathy?
[ "It's basically a magic potion with nothing in it. The idea is that you take a bit of something that causes the symptoms you want (say, some caffeine to make a sleeping pill, because caffeine causes you to stay awake), add it to water, do a magical ritual involving shaking the thing in certain directions a specific number of times. Then you take a tiny bit of the solution you've made, and put that into another container of water, and repeat the ritual. Now you have a tenth or a hundredth the caffeine you had the last time around. Do this a bunch of times until the solution has diluted all the stuff out of it completely, and you have nothing but shaken water remaining. Now you have a homeopathic medication.\n\nThe reason that people make fun of it is that it's so utterly absurd. A lot of people seem to be under the mistaken impression that it's some form of herbal medicine or something. It isn't. It's a form of ritual magic that in the end gives you a potion consisting of no medicinal ingredients whatsoever.", "A lot of confusion about homeopathy comes from the difference between its actual definition and its assumed, informal definition.\n\nThe actual definition of homeopathy is, as others said here, the idea that you can super-dilute a disease into water to create a cure. It's completely absurd, and is mocked because... well, it should be.\n\nThere's a colloquial misunderstanding, though, that \"homeopathy\" is a catch-all term for any \"natural\" or \"alternative\" remedy. This is where the confusion comes in. Some natural remedies are effective. The better ones are eventually adapted into actual remedies (\"Alternative medicine that has been proven to work is called medicine\"). But those are not homeopathy.", "Homeopathy started several hundred years ago, when medicine was pretty awful. At the time, it often produced better results than traditional medicine, because it did no harm, unlike things like leeches and mercury. However, medicine has gotten better since then, while homeopathy just appeals to the sort of people who believe that water has memory." ]
[ "persuade homeopathic physicians of their self-delusion and challenge them to design a methodologically sound trial, which if negative would finally persuade them to shut up shop... Homeopathy is based on an absurd concept that denies progress in physics and chemistry. Some 160 years after Homeopathy and Its Kindred Delusions, an essay by Oliver Wendell Holmes, we are still debating whether homeopathy is a placebo or not... Homeopathic principles are bold conjectures. There has been no spectacular corroboration of any of its founding principles... After more than 200 years, we are still waiting for homeopathy \"heretics\" to be proved right, during", "of conventional medicine. In the Australian context this is stated to include acupuncture; aromatherapy; chiropractic; homeopathy; massage; meditation and relaxation therapies; naturopathy; osteopathy; reflexology, traditional Chinese medicine; and the use of vitamin supplements. Allopathic medicine Allopathic medicine or allopathy is a pejorative term used by proponents of alternative medicine to refer to modern scientific systems of medicine, such as the use of pharmacologically active agents or physical interventions to treat or suppress symptoms or pathophysiologic processes of diseases or conditions. The expression was coined in 1810 by the creator of homeopathy, Samuel Hahnemann (1755–1843). Among homeopaths and other alternative", "Psychotherapy Definitions The term psychotherapy is derived from Ancient Greek psyche (ψυχή meaning \"breath; spirit; soul\") and therapeia (θεραπεία \"healing; medical treatment\"). The Oxford English Dictionary defines it now as \"The treatment of disorders of the mind or personality by psychological methods...\", however, in earlier use it denoted the treatment of disease through hypnotic suggestion.\nThe American Psychological Association adopted a resolution on the effectiveness of psychotherapy in 2012 based on a definition developed by John C. Norcross: \"Psychotherapy is the informed and intentional application of clinical methods and interpersonal stances derived from established psychological principles for the purpose of assisting", "\nDHA is found throughout the body and is critical for healthy brain and eye development and function and has been shown to support heart health through adulthood. Just as calcium is essential for building strong bones, DHA ensures that the cells in the brain, retina, heart, and other parts of the nervous system develop and function properly. DSM Nutritional Products and the National Institutes of Health continue to study the potential health benefits of DHA for all stages of life.\nToday, products containing DHA for children and adults are found around the world through fortified foods, beverages and dietary supplements.", "Geriatric psychology Geriatric psychology is a subfield of psychology that specializes in the mental and physical health of individuals in the later stages of life. These specialized psychologists study a variety of psychological abilities that deplete as aging occurs such as memory, learning capabilities, and coordination. Geriatric psychologists work with elderly clients to conduct the diagnosis, study, and treatment of certain mental illnesses in a variety of workplace settings. Common areas of practice include loneliness in old age, depression, dementia, Alzheimer's disease, vascular dementia, and Parkinson's disease. Geriatric Psychology vs. Geriatric Psychiatry Geriatric psychology is based upon the study of", "Primary care psychologist A Primary care psychologist (PCP) is a psychologist with specialist training in psychological knowledge and principles of common physical diseases and mental disorders experienced by patients and families throughout the lifespan, and which tend to present in primary care clinics.\nClinical associates in applied psychology are a related \"New Ways of Working\" initiative in Scotland.\nMost recently, the UK Improving Access to Psychological Therapies (IAPT) initiative, which focuses on primary care psychological therapies provision, has benchmarked professionals at all career levels, from closely supervised psychological wellbeing practitioners (many of which have a psychology undergraduate degree and a post-graduate one", "geriatric medicine is the treatment and prevention of delirium. This is a condition in which hospitalized elderly patients become confused and disoriented when confronted with the uncertainty and confusion of a hospital stay. The health of the patient will decline as a result of delirium and can increase the length of hospitalization and lead to other health complications. The treatment of delirium involves keeping the patient mentally stimulated and oriented to reality, as well as providing specialized care in order to ensure that her/his needs are being met.\nThe Hospital Elder Life Program (HELP) is an model of hospital care developed", "had described homeopathy as \"rubbish\", it was reported in May 2014 that health secretary Jeremy Hunt, at Tredinnick's urging, had requested a review of three studies by the French company, Boiron. These were found not to demonstrate the effectiveness of homeopathy, and the quality of the research in them was later questioned by Edzard Ernst. Tredinnick told The Independent in June 2015 that homeopathy's common rejection was the result of \"vested interests trying to protect their own turf\".\nIn October 2019 Tredinnick again advocated alternative medicine in the House of Commons. He recommended that Ayurveda, yoga, naturopathy, homeopathy, osteopathy and chiropractic", "returning home. Cognitive Behavioral Therapy (CBT) The Vets Prevail℠ intervention is based on the principles of Cognitive Behavioral Therapy (CBT), a psychotherapeutic approach that aims to influence dysfunctional emotions, behaviors and cognitions through a goal-oriented, systematic procedure.\nCBT takes a hands-on, practical approach to problem-solving. Its goal is to change the patterns of thinking or behavior that are behind people’s difficulties, and so change the way they feel. It is used to treat a wide range of issues from sleeping difficulties to drug and alcohol abuse to anxiety and depression.\nCBT is currently considered the standard of care for Post Traumatic Stress", "are not only out of line with scientific facts but also directly opposed to them. If homeopathy is correct, much of physics, chemistry, and pharmacology must be incorrect.... To have an open mind about homeopathy or similarly implausible forms of alternative medicine (e.g., Bach flower remedies, spiritual healing, crystal therapy) is therefore not an option. We think that a belief in homeopathy exceeds the tolerance of an open mind. We should start from the premise that homeopathy cannot work and that positive evidence reflects publication bias or design flaws until proved otherwise... We wonder whether any kind of evidence would", "Outline of parapsychology Parapsychology is a field of research that studies a number of ostensible paranormal phenomena, including telepathy, precognition, clairvoyance, psychokinesis, near-death experiences, reincarnation, and apparitional experiences.", "no such thing as alternative medicine. There is either medicine that is effective or not, medicine that is safe or not. So-called alternative therapies need to be assessed and then classified as good medicines or bogus medicines. Hopefully, in the future, the good medicines will be embraced within conventional medicine and the bogus medicines will be abandoned.\n\nIn an article entitled \"Should We Maintain an Open Mind about Homeopathy?\" published in the American Journal of Medicine, Michael Baum and Edzard Ernst—writing to other physicians—wrote some strong criticisms of homeopathy:\nHomeopathy is among the worst examples of faith-based medicine... These axioms [of homeopathy]", "Biological psychiatry Biological psychiatry or biopsychiatry is an approach to psychiatry that aims to understand mental disorder in terms of the biological function of the nervous system. It is interdisciplinary in its approach and draws on sciences such as neuroscience, psychopharmacology, biochemistry, genetics, epigenetics and physiology to investigate the biological bases of behavior and psychopathology. Biopsychiatry is that branch / speciality of medicine which deals with the study of biological function of the nervous system in mental disorders.\nWhile there is some overlap between biological psychiatry and neurology, the latter generally focuses on disorders where gross or visible pathology of the", "for an approach to medicine which he gave the name homeopathy. He first used the term homeopathy in his essay Indications of the Homeopathic Employment of Medicines in Ordinary Practice, published in Hufeland's Journal in 1807. Development of homeopathy Following up the work of the Viennese physician Anton von Störck, Hahnemann tested substances for the effects they produced on a healthy individual, presupposing (as von Störck had claimed) that they may heal the same ills that they caused. His researches led him to agree with von Störck that the toxic effects of ingested substances are often broadly parallel to certain", "and neither of which teach homeopathy): Allopathic (granting the MD title) and Osteopathic (granting the DO title).\nUse of the term remains common among homeopaths and has spread to other alternative medicine practices. The meaning implied by the label has never been accepted by conventional medicine and is still considered pejorative by some. William Jarvis, an expert on alternative medicine and public health, states that \"although many modern therapies can be construed to conform to an allopathic rationale (e.g., using a laxative to relieve constipation), standard medicine has never paid allegiance to an allopathic principle\" and that the label \"allopath\" was", "and sociotherapy to the use of a person's social environment to effect therapeutic change. Psychotherapy may address spirituality as a significant part of someone's mental / psychological life, and some forms are derived from spiritual philosophies, but practices based on treating the spiritual as a separate dimension are not necessarily considered as traditional or 'legitimate' forms of psychotherapy.\nHistorically, psychotherapy has sometimes meant \"interpretative\" (i.e. Freudian) methods, namely psychoanalysis, in contrast with other methods to treat psychiatric disorders such as behavior modification.\nPsychotherapy is often dubbed as a \"talking therapy\", particularly for a general audience, though not all forms of psychotherapy rely", "Spiritual self-schema therapy Spiritual self-schema therapy, sometimes referred to as 3-S Therapy, was developed at Yale University School of Medicine by S. Kelly Avants, Ph.D., and Arthur Margolin, Ph.D. It is a therapy for addicted individuals who have contracted HIV or are at risk for contracting HIV, whose goals are to reduce illicit drug use as well as drug- and sex-related risk behaviors. In general, it aims to promote living a spiritual life aiding in their recovery . Spiritual self-schema therapy has a non-theistic foundation based on Buddhist practices, which are very similar to contemporary cognitive-behavioral techniques, and incorporates", "mental functions with aging. The psychologist's purpose is to observe how the neurological and physiological process of an elderly adults brain affects their behaviors in daily life. When a psychologist is specialized in geriatrics they provide care for declining brain functions to make life better. \nGeriatric Psychiatry\nGeriatric psychiatry is a subspecialty of psychiatry dealing with the research, diagnosis and treatment of mental disorders in the later stages of life. The field composes of the diagnosis, treatment, and management of areas such as depression, dementia, and Alzheimer's disease. A geriatric psychiatrist is also a licensed doctor that can prescribe medications for", "Bioethics Bioethics is the study of the ethical issues emerging from advances in biology and medicine. It is also moral discernment as it relates to medical policy and practice. Bioethics are concerned with the ethical questions that arise in the relationships among life sciences, biotechnology, medicine and medical ethics, politics, law, theology and philosophy. It includes the study of values relating to primary care and other branches of medicine (\"the ethics of the ordinary\"). Ethics also relates to many other sciences outside the realm of biological sciences. Etymology The term Bioethics (Greek bios, life; ethos, behavior) was coined in", "alternative medicine. The novel was inspired by Bohjalian's real-life visit to a homeopath in an attempt to cure frequent colds he was catching from his daughter's day care center. Bohjalian said of the visit, \"I don't think I imagined there was a novel in homeopathy, however, until I met the homeopath and she explained to me the protocols of healing. There was a poetry to the language that a patient doesn't hear when visiting a conventional doctor.\" The protagonist, a father, is based in part on Bohjalian himself, and his four-year-old daughter is based largely on Bohjalian's daughter, who was", "homeopathy works, a claim that has been criticized as \"patent nonsense\" by Chad Orzel. He has criticized those who criticize homeopathy as \"new fundamentalists\" and accused them of \"demean[ing] science\".", "be considered and, if present and if it may help the child, the parent should be treated in parallel with the child. Psychotherapy There are a number of different psychotherapies for depression which are provided to individuals or groups by psychotherapists, psychiatrists, psychologists, clinical social workers, counselors or psychiatric nurses. With more chronic forms of depression, the most effective treatment is often considered to be a combination of medication and psychotherapy. Psychotherapy is the treatment of choice in people under 18.\nAs the most studied form of psychotherapy for depression, cognitive behavioral therapy (CBT) is thought to work by teaching clients", "some spiritual or incorporeal component (soul) exists and that it is preserved after death is described by the term \"afterlife\". Parapsychology Parapsychology is a study of certain types of paranormal phenomena, or of phenomena which appear to be paranormal but it does not have any scientific basis for instance precognition, telekinesis and telepathy.\nThe term is based on the Greek para (beside/beyond), psyche (soul/mind), and logos (account/explanation) and was coined by psychologist Max Dessoir in or before 1889. J.B. Rhine tried to popularize \"parapsychology\" using fraudulent techniques as a replacement for the earlier term \"psychical research\", during a shift in", "and in schizophrenia, the systems of family treatment hold esteem. A portion of the thoughts emerging from therapy are presently pervasive and some are a piece of the tool set of ordinary clinical practice. They are not just medications, they additionally help to understand complex conduct.\nTherapy may address specific forms of diagnosable mental illness, or everyday problems in managing or maintaining interpersonal relationships or meeting personal goals. A course of therapy may happen before, during or after pharmacotherapy (e.g. taking psychiatric medication).\nPsychotherapies are categorized in several different ways. A distinction can be made between those based on a medical model", "Psychodermatology Concept The disorders that proponents classify as psychodermatologic fall into three general categories: psychophysiologic disorders, primary psychiatric disorders and secondary psychiatric disorders. Proponents frequently claim treatment for: psoriasis, eczema, hives, genital and oral herpes, acne, warts, skin allergies, pain, burning sensations, and hair loss. Psychodermatological treatment techniques include psychotherapy, meditation, relaxation, hypnosis, acupuncture, yoga, tai chi, and anti-anxiety drugs.\nPsychophysiologic disorders are conditions that are precipitated by or worsened by experiencing stressful emotions. These conditions are not always related to stress and in many cases respond to medication but stress can be a contributing factor in some cases.", "therapy is a form of therapy where the patient discusses their life issues with a therapist and the therapist can ask specific questions while using their expertise to find underlying issues. This method of therapy can cause spontaneous recovery that is cued from the therapists questioning. Psychoanalytic therapy has been known to treat many behavioural problems, unconscious feelings and thoughts that effect the present moment. Through recalling specific events and gaining a new perspective, a patient can alleviate the issue they are concerned with. Group therapy Group therapy is similar to psychoanalytic therapy but it involves other people with a", "be traced to its original usage during a heated 19th-century debate between practitioners of homeopathy and those they derisively referred to as \"allopaths.\"\nHahnemann used \"allopathy\" to refer to what he saw as a system of medicine that combats disease by using remedies that produce effects in a healthy subject that are different (hence Greek root allo- \"different\") from the effects produced by the disease to be treated. The distinction comes from the use in homeopathy of substances that are meant to cause similar effects as the symptoms of a disease to treat patients (homeo - meaning similar).\nAs used by homeopaths,", "homeopathy do not show that homeopathic medicines have effects beyond placebo.\"\nCommenting in an article in The Guardian on a National Health and Medical Research Council (NHMRC) study (draft) debunking homeopathy, FSM co-founder John Dwyer stressed an area that was not investigated; the use of homeopathy for protection. Dwyer told The Guardian, \"the most serious issue was the spreading of the concept that homeopathic vaccinations were harmless and just as good as orthodox vaccinations. People who believe that are not protecting themselves and their children.\" La Trobe University/Swisse Wellness Partnership Controversy In January 2014, La Trobe University formed a A$15M partnership", "Metapsychiatry Metapsychiatry is a spiritual teaching and form of psychotherapy developed by psychiatrist Thomas Hora in the second half of the 20th century. Hora described it as \"a scientific method of healing and education based on metaphysical concepts of man and the universe.\" Metapsychiatry was inspired by Hora's dissatisfaction with what he believed was psychoanalysis's failure to account for human spirituality, and his observation that psychiatric healing was often temporary. It is characterized by a hermeneutic approach, with precise definitions of psychological terms and conditions, and what it calls “spiritual reality.”\nMetapsychiatry borrows from Judeo-Christian, Zen Buddhist and Taoist religious traditions,", "Orthomolecular psychiatry Orthomolecular psychiatry is the use of orthomolecular medicine for mental illness. The approach uses unorthodox forms of individualized testing and diagnosis to attempt to establish an etiology for each patient's specific symptoms, and claims to tailor the treatment accordingly, using a combination of nutrients, dietary changes and medications that are claimed to enhance quality of life and functionality as well as to reduce or eliminate symptoms and the use of xenobiotic drugs. Orthomolecular psychiatry has been rejected by the mainstream medical community. History Orthomolecular psychiatry began with Abram Hoffer and Humphry Osmond in the 1950s and was continued" ]
How my wife and kids would go about inheriting things that are only in my name like bank accounts, house, ect..
[ "By default, after you die, everything will go to your legal next of kin. That person (or persons) is defined in this order, and if you don't have a living member of each group, it passes to the next one down:\n\nSpouse\nChildren\nParents\nSiblings\n\nI believe that next comes grandkids, then grandparents, but don't quote me on that.\n\nSo if you don't have a spouse, but you have 3 kids and 2 parents living, your property would be split between your kids by default. And they'd inherit debts and things as well.\n\nA will exists to change these defaults. Say you have a spouse, but you still want to make sure that certain things go to your kids, your will would enumerate \"Hey, my kids get this, this and this, and my spouse gets whatever I didn't list.\"" ]
[ "only ancestors of the owner, but (so far as known) every male-line descendant of those ancestors, thus including many people in the ranks of the \"Landed Gentry\" families who had never owned an acre in their lives but who might share in the status of their eponymous kin as connected, however remotely to the landed gentry or to a county family.", "a descendant of John Smith's sibling when all of John Smith's descendants die out.\nThus property settled upon someone and the heirs of their body—whether male, female, or generally—will pass to children, grandchildren and so on, but not to nephews of the grantee, his or her sisters, uncles and their descendants. Nor will a limitation in a grant to someone's \"heirs\" carry the property to collateral heirs in England, since the law presumes that \"heirs of the body\" are meant though a grant to the grantee and his heirs male will.\nThere are other kinds of formulae for inheritance than heirs of", "give the name of the mother to the eldest daughter. Her personal fortune inherited from her father amounted to £4,000 (with an additional Interest of £200 per annum from this £4,000 inheritance (which she squanders)), which is a lot of money for someone of her condition (\"and their mother's fortune, though ample for her situation in life, could but ill supply the deficiency of his. Her father had been an attorney in Meryton, and had left her four thousand pounds\").\nHaving married above her station, raising her social class, it has given her an unrealistic estimation of her own", "have a child, for you is one fourth of what they leave, after any bequest they [may have] made or debt. And for the wives is one fourth if you leave no child. But if you leave a child, then for them is an eighth of what you leave, after any bequest you [may have] made or debt. And if a man or woman leaves neither ascendants nor descendants but has a brother or a sister, then for each one of them is a sixth. But if they are more than two, they share a third, after any bequest which", "around 1900 considered property such as the house, agricultural implements, livestock and produce as belonging collectively to all family members. When the father died, his role as head of the family (known as Khozain, or Bolshak ) was passed to the oldest person in the house. In some areas this was the oldest son. In others it was the oldest brother of the deceased so long as he lived in the same house. There were some areas were a new head would be elected by the family members. If all surviving members of the family were under age, a relation", "acquire personal assets, and can prove that they came by these assets through their independent work, then these working women can accumulate these assets as their own, unable to be touched by husbands.\nSons and daughters have equal inheritance rights to moveable and immovable property from their parents. Unmarried men and women have equal ownership rights to moveable and immoveable property.\nIn rural Chile, inheritance is the principle way in which land is acquired by both men and women, whether the land has titles or not. Sometimes women cannot claim their inheritance to land without titles because the cost of legal documents", "\"In Boston they ask how much does he know. In New York, how much is he worth. In Philadelphia, who were his parents.\" A person could not enter Philadelphia society by acquisition of wealth, but their offspring, if they grew up well and married into the right family, could create a new lineage if the family stayed respectable.\nIn the 18th century the wealth had been built on shipping, trade, and real estate. Despite the later generations' inheritance they were expected to pursue a career. The acceptable careers in Philadelphia were medicine and law, with insurance, banking, and brokerage next in", "would become a co-proprietor. If property was divided after a death, each adult male in the house got an equal share. Sons who had left home did not have a right of succession. Females remained within the family and received a share of the inheritance when they married. In the north of Russia, the oldest son inherited the house. In the south the eldest son would have set up a separate house while the father was still alive, therefore the youngest inherited the fathers house upon his death. Systems of inheritance among various peoples Throughout history, creative inheritance systems have", "Be Your Age Plot A man desperately need $10,000 to send home to his family. There is a woman who is a widow, and has just inherited two million dollars from her husband. She wants to re-marry as soon as possible. The woman's lawyer is a conniving man who happens to have a solution for both of them.", "own assets once they were married and husbands received all of the wealth, but that law has since changed and women can now administer their own assets. A couple can also sign a legal agreement before marriage so that all assets continue to be owned by the one who brought them into the marriage.\nThe Chilean Civil Code previously mandated that wives had to live with and be faithful and obedient to their husbands, but it is no longer in the law. A married woman cannot be head of the household or head of the family in the same way as", "elders, each of whom is the elected head of a lineage — which itself may include multiple extended-family households. Public offices are thus vested in the lineage, as are land tenure and other lineage property. In other words, lineage property is inherited only by matrilineal kin.\n\"The principles governing inheritance stress sex, generation and age — that is to say, men come before women and seniors before juniors.\" When a woman’s brothers are available, a consideration of generational seniority stipulates that the line of brothers be exhausted before the right to inherit lineage property passes down to the next", "site. Men can join an estate by having their patrilineal name selected from a pool of ancestral names. Women can belong to the estate they were born on, or they can belong to the estate of their husband. Land is generally passed down from father to son or from older brother to younger brother. If a family does not have any sons, the oldest daughter can inherit the land. This land is separated by matrilineal kinship. Individuals and groups who have to rely on other people's lands are part of the serf caste. Politics A patriclan is a political and", "a small sum of money from her father, but the family soon spent most of the inheritance. When Edward was six years of age, his father inherited a large sum of money from one of his wealthy cousins. The family soon used the inheritance to move to London, where they lived in a large house. As a condition of receiving the inheritance, his father was required to adopt the last name \"Brereton\". His cousin, Owen Brereton, wished to have his last name continued along with his wealth. They lived in Cheshire while Edward was a young man.\nAt some point in", "family might acquire joint land during the married life of the couple. Each spouse was free to dispose of his or her land as he or she chose. A will was usually oral, although a written one was preferred.\nAs the married couple moves through life they have children, nurture and train them, educate them, and marry them off. When they become too old to support themselves, they may invite the youngest child's family to move in and to take over running the household. At this stage in their lives, they enjoy a position of high status, they help care for", "all the property and she is the caretaker of aged parents and any unmarried siblings. In some cases, such as when there is no daughter in the family or other reasons, the parents may nominate another girl such as a daughter in law as the heir of the house and all other property they may own.\nThe Khasi and Jaintia tribesmen follow the traditional matrilineal norm, wherein the Khun Khatduh (or the youngest daughter) inherits all the property and responsibilities for the family. However, the male line, particularly the mother's brother, may indirectly control the ancestral property since he may be", "been the oldest person with a living parent.", "The inheritance included some unfinished houses in the city. Meanwhile, the older brother and his wife lived in poverty. One day he begged his younger brother to give him the unfinished houses, and the brother agreed.\nThe younger brother married a woman who was wealthy but greedy. One day she went to the city and saw the houses. She made her husband go to law again and again to get them back. Finally, they appeared before to the highest court. They stopped by a farm, where the resident farmer fed the rich brother and, grudgingly, permitted the poor brother to stay.", "one half of the estate when there are no other heirs, and in certain cases, when the marriage is in articulo mortis, he or she gets one third. The surviving spouse also gets one third of the estate when concurring with illegitimate children, who also get the same share. However, the surviving spouse gets one fourth when concurring with illegitimate parents, who also get one fourth of the estate.\nThe illegitimate children, in default of everyone, gets one half of the estate. The illegitimate parents, who are excluded by everyone except the surviving spouse, also get one half in default of", "is commonly but not always the surviving spouse or eldest child of the deceased. In this case, the assets are distributed according to the Intestate Succession Act.", "cover it with a piece of cloth. Then they throw the burnt bones into a river. Inheritance The male children of a deceased Tanchangya father divide the property equally among themselves. The daughters cannot claim any share of the property except when they have no brothers. If the deceased father has no children, an adopted son inherits all the property. If a wife is separated when she is pregnant and if she gives birth to a male child, he will inherit her ex-husband's property. If someone dies as a bachelor or without any children, his property will go to his", "parent survives; deceased parent leaves descendants In this case, the surviving parent will inherit half of the estate, and the descendants of the deceased parent will inherit the residue per stirpes by representation.\nIn this case, the surviving parent is the sole heir. No spouse, no descendants, no parents; both parents leave descendants Where the deceased is not survived by a spouse or descendant or parent, but is survived by descendants of his parents (by a brother or sister, for example, whether of the full or half blood), the intestate estate is divided into halves, one half going to the descendants", "They did not inherit property and were excluded from decision-making meetings within the family. Today, girls are allowed to inherit property, in accordance with Kenyan law.\nChildren are named after the clan's ancestors, after their grandparents, after events, or the weather. The paternal grandparents take precedence, so that the first-born son will usually be named after his paternal grandfather (Kuka or 'Guga' in Maragoli) while the first-born daughter will be named after her paternal grandmother ('Kukhu' or 'Guku' in Maragoli.)\nSubsequent children may be named after maternal grandparents, after significant events, such as weather, seasons, etc. The name Wafula, for example, is", "had known how small her fortune was (this was the cause of a bitter family quarrel). They had numerous children: Cox himself mentions twenty-one, though only fifteen can be identified with certainty, some of whom died in infancy. Of those who reached adulthood, the eldest son, also Richard, predeceased his father. A younger son, Michael, was Archbishop of Cashel from 1754 to 1779, and built a magnificent mansion, Castletown Cox, which still exists. The eldest daughter Amy married Sir William Mansel, the seventh of the Mansel baronets in 1700, and", "the business he conducted with his brothers and other villagers. Agnes, though all contact with her family did not cease, her social network expanded to her husband's family of origin and his new connections. Widowhood and remarriage Upon the death of a spouse, widows could gain power in inheriting their husbands' property as opposed to adult sons. Male-preference primogeniture stipulated that the male heir was to inherit their deceased father's land; and in cases of no sons, the eldest daughter would inherit property. However, widows could inherit property when they had minor sons, or if provisions were made for them", "population) who were living alone in a private dwelling. There were 759 (or 20.0%) persons who were part of a couple (married or otherwise committed) without children, and 2,453 (or 64.6%) who were part of a couple with children. There were 203 (or 5.3%) people who lived in single parent home, while there are 25 persons who were adult children living with one or both parents, 10 persons who lived in a household made up of relatives, 14 who lived in a household made up of unrelated persons, and 44 who are either institutionalized or live in another type of", "children, if any. Single women and orphans were represented by their guardians; their names were entered in separate lists, and they were not included in the sum total of heads.\nAfter a citizen had stated his name, age, family, etc., he then had to give an account of all his property, so far as it was subject to the census. Only such things were liable to the census (censui censendo) as were property according to the Quiritarian law. At first, each citizen appears to have merely given the value of his whole property in general without entering into details; but it", "share of the family property. Unlike the practice in later dynasties, the father usually sent his adult married sons away with their portions of the family fortune. Daughters received a portion of the family fortune through their marriage dowries, though this was usually much less than the shares of sons. A different distribution of the remainder could be specified in a will, but it is unclear how common this was.\nWomen were expected to obey the will of their father, then their husband, and then their adult son in old age. However, it is known from contemporary sources that there were", "one person and there were 11 adults who lived with their parents. Of the rest of the households, there are 304 married couples without children, 401 married couples with children There were 47 single parents with a child or children. There were 11 households that were made up of unrelated people and 7 households that were made up of some sort of institution or another collective housing.\nIn 2000 there were 465 single family homes (or 72.3% of the total) out of a total of 643 inhabited buildings. There were 99 multi-family buildings (15.4%), along with 59", "the master of a household and that it declares three daughters to be the rightful heirs. It is dated to the 5th century and is, consequently, the oldest legal document from Scandinavia that addresses a female's right to inheritance.", "their inheritance within the family. The couples are considered married, though the terms used for them are mother-in-law and daughter-in-law. The female \"husband\" (the \"mother-in-law\") carries on the family name and property, while the female \"wife\" (the \"daughter-in-law\") bears children, with the intention of having a son. The female \"husband\" may be widowed, but may also have a living male husband, but he will not be the father of the female \"wife's\" children, and the identity of the biological father, though often kin, is kept secret. Such marriages may be polygamous; in 2010 a woman was interviewed who had taken" ]
What is my all carbs/protein diet doing for me?
[ "Weight gain is dependent on calories in and calories burned. It doesn't matter where you're getting those calories from, if you burn them all through activity and lifestyle, then you're not going to put on weight. Olympic Swimmer Michael Phelps ate somewhere around 2000 Calories for breakfast (remember watching a documentary - his breakfast had eggs, bacon, sausages, waffles with syrup, etc).\n\nMy only concern about your diet would be that your lack of fruits and vegetables could mean you're risking various vitamin deficiencies such as Vitamin C, A, B12, K, etc. Not to mention you might not be getting that much fibre and depending on what exactly it is you eat, your cholesterol level could suffer.", "If your caloric intake is below or matches your expenditure, you will not gain weight, regardless of the quality of the food you eat. You could be having problems like hypertension or high cholesterol and you wouldn't see any symptoms for decades. And nutritionally, the younger you are, the more your body can adapt to a less-than-ideal diet. I ate like that when I was in my 20s with very little visible effect. As I got older, I noticed that my energy levels and concentration were slowly diminishing, but improved vastly with improved eating habits. \n\nOr you might be one of those people who can eat whatever you want and not gain weight.", "You need your fibers, vitamins and minerals. I think you are ingesting those without your knowledge. For example bread is packed with fibers and minerals, but most people just consider them as carbs. Maybe you could give some more detailed info on your diet.\n\nEdit: Weight is only a matter of caloric intake vs calories burnt. Fats, carbs or protein, doesn't matter. Your body has to obey the laws of physics.", "Fats are essential to body function. Cholesterol, for example, helps keep cellular membranes intact and not falling apart. You dont need alot, as your body creates most of it, but you still need a small amount. So eating zero fats is not really good for you.", "Sounds like you answered your own question: it's working fine. Diet is so individual-specific that it's hard to give specific advice. The multivitamin is good." ]
[ "Protein (nutrient) Proteins are essential nutrients for the human body. They are one of the building blocks of body tissue and can also serve as a fuel source. As a fuel, proteins provide as much energy density as carbohydrates: 4 kcal (17 kJ) per gram; in contrast, lipids provide 9 kcal (37 kJ) per gram. The most important aspect and defining characteristic of protein from a nutritional standpoint is its amino acid composition.\nProteins are polymer chains made of amino acids linked together by peptide bonds. During human digestion, proteins are broken down in the stomach to smaller polypeptide chains", "A 2006 survey found that this number had risen to 30%. Protein The protein requirement for each individual differs, as do opinions about whether and to what extent physically active people require more protein. The 2005 Recommended Dietary Allowances (RDA), aimed at the general healthy adult population, provide for an intake of 0.8 grams of protein per kilogram of body weight. A review panel stating that \"no additional dietary protein is suggested for healthy adults undertaking resistance or endurance exercise.\" Carbohydrates The main fuel used by the body during exercise is carbohydrates, which is stored in muscle as glycogen –", "and arabinoxylans. These carbohydrate types can be metabolized by some bacteria and protists. Ruminants and termites, for example, use microorganisms to process cellulose. Even though these complex carbohydrates are not very digestible, they represent an important dietary element for humans, called dietary fiber. Fiber enhances digestion, among other benefits.\nThe Institute of Medicine recommends that American and Canadian adults get between 45–65% of dietary energy from whole-grain carbohydrates. The Food and Agriculture Organization and World Health Organization jointly recommend that national dietary guidelines set a goal of 55–75% of total energy from carbohydrates, but only 10% directly from sugars (their term", "(corn) and rice are high in starch. Most low-carbohydrate diet plans accommodate vegetables such as broccoli, spinach, kale, lettuce, cucumbers, cauliflower, peppers and most green-leafy vegetables. Adoption and advocacy The National Academy of Medicine recommends a minimum intake of 130 g of carbohydrate per day. The FAO and WHO similarly recommend that the majority of dietary energy come from carbohydrates. Low-carbohydrate diets are not an option recommended in the 2015-2020 edition of Dietary Guidelines for Americans, which instead recommends a low fat diet.\nCarbohydrate has been wrongly accused of being a uniquely \"fattening\" macronutrient, misleading many dieters into compromising the nutritiousness of", "Low-carbohydrate diet Low-carbohydrate diets or carbohydrate-restricted diets (CRDs) are diets that restrict carbohydrate consumption relative to the average diet. Foods high in carbohydrates (e.g., sugar, bread, pasta) are limited, and replaced with foods containing a higher percentage of fat and protein (e.g., meat, poultry, fish, shellfish, eggs, cheese, nuts, and seeds), as well as low carbohydrate foods (e.g. spinach, kale, chard, collards, and other fibrous vegetables).\nThere is a lack of standardization of how much carbohydrate low-carbohydrate diets must have, and this has complicated research. One definition, from the American Academy of Family Physicians, specifies low-carbohydrate diets as having less than", "for protein biosynthesis, while others are converted to glucose through gluconeogenesis, or fed into the citric acid cycle. This use of protein as a fuel is particularly important under starvation conditions as it allows the body's own proteins to be used to support life, particularly those found in muscle.\nIn animals such as dogs and cats, protein maintains the health and quality of the skin by promoting hair follicle growth and keratinization, and thus reducing the likelihood of skin problems producing malodours. Poor-quality proteins also have a role regarding gastrointestinal health, increasing the potential for flatulence and odorous compounds in dogs", "existing protein, some glucose can be produced internally; the remaining amino acids are discarded, primarily as urea in urine. This occurs naturally when atrophy takes place, or during periods of starvation. Carbohydrates Carbohydrates may be classified as monosaccharides, disaccharides or polysaccharides depending on the number of monomer (sugar) units they contain. They are a diverse group of substances, with a range of chemical, physical and physiological properties. They make up a large part of foods such as rice, noodles, bread, and other grain-based products, but they are not an essential nutrient, meaning a human does not need to eat carbohydrates.", "The 4-Hour Body Book Ferriss said that he spent three years interviewing over 200 people, from doctors to athletes to black-market drug salesmen, in preparing the book.\nThe book advocates the 'Slow-carb Diet', which is characterised around three main points: eat a very simple set of meals repeatedly, focus on 'slow carbs', and allow one 'cheat day' a week when all foods are allowed. The diet involves the elimination of starches and anything sweet (including fruit and all artificial sweeteners) and a strong preference for lean protein and a few specific vegetables.\nThe Dietary Guidelines for Americans do not specifically address", "mechanical and biochemical reasons, though the exact reasons remain unclear.\nMolecules of carbohydrates and fats consist of carbon, hydrogen, and oxygen atoms. Carbohydrates range from simple monosaccharides (glucose, fructose, galactose) to complex polysaccharides (starch). Fats are triglycerides, made of assorted fatty acid monomers bound to glycerol backbone. Some fatty acids, but not all, are essential in the diet: they cannot be synthesized in the body. Protein molecules contain nitrogen atoms in addition to carbon, oxygen, and hydrogen. The fundamental components of protein are nitrogen-containing amino acids. Essential amino acids cannot be made by the animal. Some of the amino acids are", "Specific carbohydrate diet The specific carbohydrate diet (SCD) is a restrictive diet originally created to manage celiac disease, which limits the use of complex carbohydrates (disaccharides and polysaccharides). Monosaccharides are allowed, and various foods including fish, aged cheese and honey are included. Prohibited foods include cereal grains, potatoes and lactose-containing dairy products. It is a gluten-free diet since no grains are permitted. Origins In 1924, Sidney V. Haas (1870–1964) described the first SCD for the treatment of children with celiac disease; this was the banana diet. Haas described a trial with 10 children, and all 8 children treated with bananas", "in the complex carbohydrate starch (such as cereals, bread and pasta) or simple carbohydrates, such as sugar (found in candy, jams, and desserts).\nOften in lists of nutritional information, such as the USDA National Nutrient Database, the term \"carbohydrate\" (or \"carbohydrate by difference\") is used for everything other than water, protein, fat, ash, and ethanol. This includes chemical compounds such as acetic or lactic acid, which are not normally considered carbohydrates. It also includes dietary fiber which is a carbohydrate but which does not contribute much in the way of food energy (kilocalories), even though it is often included in the", "a diet for health is thought to be 50-55%. Foodstuffs There is evidence that the quality, rather than the quantity, of carbohydrate in a diet is important for health, and that high-fiber slow-digesting carbohydrate-rich foods are healthful while highly-refined and sugary foods are less so. People choosing diet for health conditions should have their diet tailored to their individual requirements. For people with metabolic conditions, a diet with approximately 40-50% carbohydrate is recommended.\nMost vegetables are low- or moderate-carbohydrate foods (in some low-carbohydrate diets, fiber is excluded because it is not a nutritive carbohydrate). Some vegetables, such as potatoes, carrots, maize", "for simple carbohydrates). A 2017 Cochrane Systematic Review concluded that there was insufficient evidence to support the claim that whole grain diets can affect cardiovascular disease. Classification Nutritionists often refer to carbohydrates as either simple or complex. However, the exact distinction between these groups can be ambiguous. The term complex carbohydrate was first used in the U.S. Senate Select Committee on Nutrition and Human Needs publication Dietary Goals for the United States (1977) where it was intended to distinguish sugars from other carbohydrates (which were perceived to be nutritionally superior). However, the report put \"fruit, vegetables and whole-grains\" in", "diets to avoid in 2018\". Macronutrient ratios The macronutrient ratios of low-carbohydrate diets are not standardized. As of 2018 the conflicting definitions of \"low-carbohydrate\" diets have complicated research into the subject.\nThe American Academy of Family Physicians defines low-carbohydrate diets as diets that restrict carbohydrate intake to 20 to 60 grams per day, typically less than 20% of caloric intake. A 2016 review of low-carbohydrate diets classified diets with 50g of carbohydrate per day (less than 10% of total calories) as \"very low\" and diets with 40% of calories from carbohydrates as \"mild\" low-carbohydrate diets. The optimal proportion of carbohydrate in", "healthy digestive system by easing defecation. Other polysaccharides contained in dietary fiber include resistant starch and inulin, which feed some bacteria in the microbiota of the large intestine, and are metabolized by these bacteria to yield short-chain fatty acids. Terminology In scientific literature, the term \"carbohydrate\" has many synonyms, like \"sugar\" (in the broad sense), \"saccharide\", \"ose\", \"glucide\", \"hydrate of carbon\" or \"polyhydroxy compounds with aldehyde or ketone\". Some of these terms, specially \"carbohydrate\" and \"sugar\", are also used with other meanings.\nIn food science and in many informal contexts, the term \"carbohydrate\" often means any food that is particularly rich", "nutritional quality of carbohydrates. Some simple carbohydrates (e.g. fructose) raise blood glucose slowly, while some complex carbohydrates (starches), especially if processed, raise blood sugar rapidly. The speed of digestion is determined by a variety of factors including which other nutrients are consumed with the carbohydrate, how the food is prepared, individual differences in metabolism, and the chemistry of the carbohydrate.\nThe USDA's Dietary Guidelines for Americans 2010 call for moderate- to high-carbohydrate consumption from a balanced diet that includes six one-ounce servings of grain foods each day, at least half from whole grain sources and the rest from enriched.\nThe glycemic index", "amino acids. For instance, studies have shown that sled dogs require a high protein, high fat diet, where 30 to 40% of energy comes from protein and 50% of energy comes from fat. Greyhounds were found to require a moderate protein (25% energy) and moderately high fat (30-50% energy) diet. At present there are conflicting opinions concerning whether protein from animal sources is of higher quality than protein from non animal sources. For instance, a study completed by Brown et al., concluded that \"In a 16-week controlled experiment, a meat-free diet maintained haematological characteristics in sprint-racing sled dogs (Siberian huskies)\".", "identifying protein as an essential dietary component. William Prout in 1827 was the first person to divide foods into carbohydrates, fat, and protein. During the 19th century, Jean-Baptiste Dumas and Justus von Liebig quarrelled over their shared belief that animals get their protein directly from plants (animal and plant protein are the same and that humans do not create organic compounds). With a reputation as the leading organic chemist of his day but with no credentials in animal physiology, Liebig grew rich making food extracts like beef bouillon and infant formula that were later found to be of questionable nutritious", "content of foods is listed on the Nutrition Facts panel as “total carbohydrate”. Some food labels will list specific types of carbohydrate, such as “fiber, sugar, or other carbohydrate”. With carbohydrate counting, the “total carbohydrate” is used as the carbohydrate amount. Carbohydrate counting can be done by either adding up grams of total carbohydrate or adding \"carbohydrate units\". A carbohydrate unit is simply 15 g of carbohydrate. How it is used Carbohydrate counting can be used with or without insulin therapy. Without insulin When carbohydrate counting is used without insulin, it can be used as a tool to manage blood", "espoused eating from all four food groups, totaling four servings each of high-quality grains and fruits, and two each of dairy and protein daily, all year-round.\nMentzer believed that carbohydrates should make up the bulk of the caloric intake, 50–60%, rather than protein as others preferred. Mentzer's reasoning was simple: to build 10 pounds of muscle in a year, a total of 6000 extra calories needed to be ingested throughout the year, because one pound of muscle contains 600 calories. That averages 16 extra calories per day, and only four of them needed to be from protein—because muscle is 22% protein,", "Vegetarian nutrition Protein Despite the long-standing, widespread belief that vegetarians must consume grains and beans within a short time to make a complete protein that contains all 9 essential amino acids that must be supplied through diet, this has never been substantiated by research. The protein-combining theory was brought to popular attention after being promoted in Frances Moore Lappé's 1971 bestselling book Diet for a Small Planet. In later editions of the book, starting in 1981, Lappé withdrew her contention that protein combining is necessary.\nPlant foods rich in protein include soy beans and soy products such as tofu, veggie", "carbohydrate in the food is still the strongest and most important indicator, and that everyone should make their own custom method that works best for them.\nThe International Life Sciences Institute concluded in 2011 that because there are many different ways of lowering glycemic response, not all of which have the same effects on health, \"It is becoming evident that modifying the glycemic response of the diet should not be seen as a stand-alone strategy but rather as an element of an overall balanced diet and lifestyle.\"\nA systematic review of few human trials examined the potential of low GI diet to", "Dukan Diet The Dukan Diet is a low-carbohydrate protein-based fad diet devised by Pierre Dukan. \nThe diet is not nutritionally sound and it carries risks to kidney and cardiovascular health. Description The Dukan diet is a high-protein, low-carbohydrate diet with four phases, each of which has specific rules. History In 1975, Pierre Dukan was a general practitioner in Paris when he was first confronted with a case of obesity. At the time, being overweight or obese was thought to be best treated by low calorie and small sized meals. Dukan thought of an alternative way to prevent patients from regaining", "epilepsy. Through celebrity endorsement during the early 21st century, it became a fad diet as a means of weight loss, but with risks of undesirable side effects, such as low energy levels and increased hunger, insomnia, nausea, and gastrointestinal discomfort. The British Dietetic Association named it one of the \"top 5 worst celeb diets to avoid in 2018\". Metabolism Carbohydrate metabolism denotes the various biochemical processes responsible for the formation, breakdown and interconversion of carbohydrates in living organisms.\nThe most important carbohydrate is glucose, a simple sugar (monosaccharide) that is metabolized by nearly all known organisms. Glucose and other carbohydrates are", "carbohydrate, denoting \"fruit, vegetables and whole-grains\".) The recommended way of accomplishing this was to eat more fruits, vegetables, and whole grains, and less high-fat meat, egg, and dairy products. While many public health officials had said all of this for some time, the committee's issuance of the guidelines gave it higher public profile. \nThe committee's \"eat less\" recommendations triggered strong negative reactions from the cattle, dairy, egg, and sugar industries, including from McGovern's home state. The American Medical Association protested as well, reflecting its long-espoused belief that people should see their doctor for individual advice rather than", "of energy per gram for simple sugars, and 3.57 to 4.12 kilocalories per gram for complex carbohydrate in most other foods. Relatively high levels of carbohydrate are associated with processed foods or refined foods made from plants, including sweets, cookies and candy, table sugar, honey, soft drinks, breads and crackers, jams and fruit products, pastas and breakfast cereals. Lower amounts of carbohydrate are usually associated with unrefined foods, including beans, tubers, rice, and unrefined fruit. Animal-based foods generally have the lowest carbohydrate levels, although milk does contain a high proportion of lactose.\nOrganisms typically cannot metabolize all types of carbohydrate", "but not all, are essential in the diet: they cannot be synthesized in the body. Protein molecules contain nitrogen atoms in addition to carbon, oxygen, and hydrogen. The fundamental components of protein are nitrogen-containing amino acids, some of which are essential in the sense that humans cannot make them internally. Some of the amino acids are convertible (with the expenditure of energy) to glucose and can be used for energy production, just as ordinary glucose, in a process known as gluconeogenesis. By breaking down existing protein, the carbon skeleton of the various amino acids can be metabolized to intermediates in", "such as savory crackers and chips can also have high levels of carbohydrates. It is important to check the nutritional information panel on packaged foods to determine which foods and drinks have high carbohydrate concentrations.\nTo prevent demineralisation in the mouth, it is important for an individual to ensure they have a well-balanced diet, including foods containing calcium and foods that are low in acids and sugars. The individual should have a diet high in fresh fruits and vegetables, wholegrain cereals, legumes, seeds and nuts. Sugary snacks including lollies, fruit bars, muesli bars, biscuits, dried fruit, cordials, juices and soft drinks", "with type 1 diabetes on the Hay diet should stop taking insulin. In 1935, Stewart Baxter showed that the pancreas secretes digestion enzymes simultaneously regardless of whether the food eaten is carbohydrates or protein, contrary to one of the central propositions of the diet.\nCurrently, the theory that carbohydrate and protein rich foods should be eaten separately is considered \"unfounded\" because it ignores the fact that carbohydrate rich foods contain significant amounts of protein. Eating protein separately from carbohydrates also tends to cause the body to burn the protein as an energy source rather than to build muscle. Nevertheless, despite continual", "closely related peer-reviewed findings from scientific research cast strong doubt over the purported benefits of this diet. When properly evaluated, the ideas and arguments of popular low carbohydrate diet books like the Zone rely on poorly controlled, non-peer-reviewed studies, anecdotes and non-science rhetoric.\"" ]
What ultimately stops you from jumping higher on a trampoline?
[ "Diminishing returns.\n\nThe first time you jump on a trampoline, the only real force pushing you upward is coming from your legs.\n\nOn the next bounce, the trampoline converts a bunch of your downward momentum into upward momentum and helps push you back up into the air. If you push off again with your legs as that's happening, you will go even higher than you did the first time.\n\nThat means on the next bounce, you have even more downward momentum that the trampoline will convert into upward momentum for you (because you're falling from a higher distance and picking up more speed on the way down).\n\nThis works the first few times, but eventually you hit a point where you're already being pushed up into the air so quickly each time, your legs can't really do anything significant to help." ]
[ "are highly trained, they are also attempting to perform complex manoeuvres which could lead to accidents and falls. Trampolines used in competitions have their springs covered in pads to reduce the chance of injury when landing off the bed. They also have padded end decks, which are the locations that athletes are most likely to fall off the trampoline. The rules for international competitions (updated by FIG in 2006) also require 200mm thick mats on the floor for 2 metres around each trampoline and for there to be four spotters whose task it is to attempt to catch or reduce", "Trampoline A trampoline is a device consisting of a piece of taut, strong fabric stretched between a steel frame using many coiled springs. People bounce on trampolines for recreational and competitive purposes.\nThe fabric that users bounce on (commonly known as the \"bounce mat\" or \"trampoline bed\") is not elastic itself; the elasticity is provided by the springs that connect it to the frame, which store potential energy. Early trampoline-like devices A game similar to trampolining was developed by the Inuit, who would toss blanket dancers into the air on a walrus skin one at a time (see Nalukataq) during a", "wall at the top of the bounce. Safety Using a trampoline can be dangerous. Organized clubs and gyms usually have large safety end-decks with foam pads at each end, and spotters are placed alongside the trampoline to try to break the fall of any athlete who loses control and falls. In 1999, the U.S. Consumer Product Safety Commission estimated there were 100,000 hospital emergency room visits for trampoline injuries.\nDue to the much larger numbers involved and lesser safety standards, the majority of injuries occur on privately owned home trampolines or in commercial trampoline facilities rather than organized gyms.\nCBC Television's", "that these improve safety. The nets do prevent jumpers falling off the trampoline onto the ground, but these falls are not the most common source of injury. Multiple users bouncing in a netted trampoline can still be injured. Safety net enclosures have a larger benefit for safeguarding solo trampolinists, so long as they avoid falling on their head or neck.\nHaving some training in a gym may be beneficial in alerting people to possible hazards and provide techniques to avoid bad falls.\nFamily-oriented commercial areas in North America, such as shopping centres, carnivals, and so on, often include closed inflatable trampolines (CITs)", "as a children's attraction. These have safety nets on the sides to prevent injuries. Mini-trampolines A mini-trampoline (also known as a rebounder, trampette, jogging trampoline, or exercise trampoline) is a type of trampoline less than 1 metre (3 ft 3 in) in diameter and about 30 centimetres (12 in) off the ground, often kept indoors and used as part of a physical fitness regime. So-called rebounding provides a form of exercise with a low impact on knees and joints. Mini-trampolines do not give a rebound as high as larger recreational or competitive trampolines. Most department and big-box stores sell mini-trampolines. Educational use Trampoline", "juggling, balancing a stick on the performer’s head, playing a musical instrument, etc.\nSome of the same skills can be seen in cloud swing or trapeze acts as well. Jumping rope on a slack wire Jumping rope has been performed on the tightrope and slackline, but is difficult on a slackwire because the wire moves when the performer jumps up, and there is no way to control the swing and position of the wire when landing. This makes such stunts as somersaults and acrobatic tumbling virtually impossible. Jumping rope on a slackwire was first accomplished in 1985. The only person to", "the late 1990s in a program called Urban Warrior '99. Their special purpose was \"for maneuvering inside buildings in order to detect tripwires and sniper fire\". Trampboarding Trampboarding is a variant of skateboarding that uses a board without the trucks and the wheels on a trampoline. Using the bounce of the trampoline gives height to perform tricks, whereas in skateboarding you need to make the height by performing an ollie. Trampboarding is seen on YouTube in numerous videos. Swing boarding Swing boarding is the activity where a skateboard deck is suspended from a pivot point above the rider which allows", "sensitive adhesive bonds each component to its substrate.\nThere is a silent version of touch fasteners, sometimes called Quiet Closures. Jumping Velcro jumping is a game where people wearing hook-covered suits take a running jump and hurl themselves as high as possible at a loop-covered wall. The wall is inflated, and looks similar to other inflatable structures. It is not necessarily completely covered in the material—often there will be vertical strips of hooks. Sometimes, instead of a running jump, people use a small trampoline.\nTelevision show host David Letterman immortalized this during the February 28, 1984 episode of Late Night with David", "loop jump in combination, with a quadruple toe loop and a triple toe loop, at the Cup of Russia in 2002. Yuzuru Hanyu from Japan was the first skater to complete the quadruple loop, at the Autumn Classic International in 2016. Execution The loop jump is an edge jump. The skater executes it by taking off from the back outside edge of the skating foot, turning one rotation in the air, and landing on the back outside edge of the same foot. Atlantic Monthly, in its description of all jumps, states, \"An easy way to remember", "trampoline.\nThe form and difficulty are judged in a similar manner as for trampolining but there are additional deductions for failing to land cleanly (without stepping) or landing outside a designated area on the mat. Tumbling Tumbling gymnastics is another separate discipline of gymnastics competed at national and international events alongside trampoline. Format The International Trampolining Federation became part of the Fédération Internationale de Gymnastique in 1999. FIG is now the international governing body for the sport which is paired with Tumbling as the skill sets overlap. International competitions are run under the rules of FIG. Individual national gymnastics organizations can", "the routine is determined in the same way as for individual trampoline routines and the points added to the score to determine the winner. Double mini-trampoline (DMT) A double mini-trampoline is smaller than a regulation competition trampoline. It has a sloped end and a flat bed. The gymnasts run up and jump onto the sloping end and then jump onto the flat part before dismounting onto a mat. Skills are performed during the jumps or as they dismount.\nA double mini-trampoline competition consists of two types of pass. In the one, which is known as a mounter pass, the athlete performs", "Walley jump A Walley jump is a full rotation jump in figure skating where the skater jumps off the backward inside edge, makes one full rotation in the air, and then lands on the backward outside edge of the same foot. For a counterclockwise jump, the takeoff and landing are on the right foot. The air position and landing of the Walley are similar to those for other figure skating jumps.\nWalley jumps are related to edge pulls, a technique for gaining power by means of changing edge while skating on one foot. For example, edge pulls are a normal entry", "participants jump over large gaps, sometimes without any form of safety device such as a securing rope to ensure they do not fall and injure themselves or worse. It can also refer to traveling up a boulder-filled stream or brook by jumping from rock to rock, while avoiding falling in.", "edge and landing on the back outside edge of the opposite foot\". Skaters tend to go into it with a long, diagonal take-off into one of the corners of the rink. It is a difficult jump because it is counter-rotational, which means that the skater sets it up by twisting in one way and jumping in the other. Many skaters \"cheat\" the jump because they are not strong enough to maintain the counter-rotational edge, resulting it an under-rotated jump; for this reason, an under-rotated lutz jump has called a \"flutz\". Many skaters also cheat the lutz", "jumping boards located on the sides of the screen serve to decrease the area where it is impossible to make contact.\nIf the player successfully gets the clown onto the seesaw, the clown on the other side shoots off into the air towards the three rows of balloons on the top of the screen. The clown may not have enough speed to reach the balloons if the first clown does not land squarely on the seesaw. Clowns bounce off of balloons, walls, and jumping boards, but will pass directly through multiple balloons if they are moving quickly enough. They will only", "Trampolining Origins In the early 1930s, George Nissen observed trapeze artistes performing tricks when bouncing off the safety net. He made the first modern trampoline in his garage to reproduce this on a smaller scale and used it to help with his diving and tumbling activities. He formed a company to build trampolines for sale and used a variant of the Spanish word trampolin (diving board) as a trademark. He used the trampoline to entertain audiences and also let them participate in his demonstrations as part of his marketing strategy. This was the beginnings of a new sport.\nIn the", "into it with a long, diagonal take-off into one of the corners of the rink. It is a difficult jump because it is counter-rotational, which means that the skater sets it up by twisting in one way and jumping in the other. Edge jumps Edge jumps are executed by taking off from any forward or backward edge from just one foot, without the other foot touching the ice. The edge of the blade should \"bite into the ice and push against it to produce the elevation of the jump\". Salchow jump The salchow jump, which was named after", "world champions was his daughter, Leigh Hennessy. Both Jeff and Leigh Hennessy are in the USA Gymnastics Hall of Fame.\nThe competitive gymnastic sport of trampolining has been part of the Olympic Games since 2000. On a modern competitive trampoline, a skilled athlete can bounce to a height of up to 10 metres (33 ft), performing multiple somersaults and twists. Trampolines also feature in the competitive sport of Slamball, a variant of basketball, and Bossaball, a variant of volleyball. Cross-training for other sports There are a number of other sports that use trampolines to help develop and hone acrobatic skills in", "this jump is that it's basically a toe loop without the assist of the toe pick\". The jump is usually approached directly from back crossovers, which allows the skater to establish his or her upper body position while gliding backwards on his or her right outside edge before springing into the air. The loop is more difficult than the toe loop and salchow because the free leg is already crossed at takeoff, so the rotation is begun from the edge of the skating foot and the upper body. The coordination and weight shift does not need to", "This position is considered a fault when jumping show jumping fences, because the horse is always encouraged to bascule over the fence to help prevent him from touching and knocking the rails, and keeping the weight on his back encourages him to drop it instead. However, a slightly defensive position is not only acceptable when riding over solid obstacles, but in most cases ideal.\nHorses will generally jump log fences quite well, as they look natural to the animal. It is best when designing and jumping such fences, however, to only ride over obstacles that have a larger log (rather than", "classified as either edge jumps or toe jumps. An edge jump takes off directly from the edge without assist from the other foot; while in a toe jump, the skater spikes the toe picks of the free foot into the ice at the same time he or she jumps off the edge of the skating foot, providing a kind of pole-vaulting action to convert the skater's horizontal speed over the ice into a vertical leap.\nMost jumps have a natural rotation; that is, the approach and landing curves both have the same rotational sense as the jump in the air. A", "Trampe bicycle lift Usage The use of Trampe is free.\nWhen using the lift, the right foot is placed on the starting point (the left foot stays on the bicycle pedal). After pushing the start button, the user is pushed forward and a footplate emerges. A common mistake among tourists and other first-time users is that they don't keep their right leg outstretched and their body tilted forward. This makes it hard to maintain balance on the footplate, and can result in falling off.\nIn the summer months, Trampe is used extensively by both commuting inhabitants of Trondheim and tourists.", "or landing on a brick. He also developed the ability to briefly touch down his feet before his actual landing, which made possible some of his more famous \"trick jumps\". For one such trick jump, a volunteer would lie on the ground in the path of the jump and Joseph Darby would appear to land on and jump off the person's face. Another such trick jump would involve jumping over a tank of water and briefly touching the surface of the water with his shoes.\nTo achieve jumps of greater distances or heights, Darby would sometimes employ dumb-bell shaped weights held", "in old school skateboarding, in which the rider grabs the board and lifts it while initiating a jumping motion. The most common technique of doing this is by placing the right hand (for goofy riders) or left hand (for regular riders) on the backside of the board between the legs, for this tends to be the technique that gives the body the least resistance when jumping/lifting. Although this has become semi-obsolete due to freeriding alternatives with kicktails which have the ability to ollie (ex. Loaded Chubby Unicorn, Omen Sugar, DK penguin), it is commonly practiced on decks that lack tails", "loop, and axel). The jumps in order of difficulty are: the salchow, toe loop, loop, flip, lutz, and axel. Jumps can be accomplished with half, single, double, triple, or quadruple rotations. Toe jumps Toe jumps are executed by taking off from the edge of one blade and the pick of the other blade. The leg of the blade that accomplishes the picking remains straight, much like a pole vaulting pole, and the skating leg bends and releases to produce the jump. Both legs should leave the ice simultaneously, but in reality the picking leg comes off", "next to the trampoline bed to do tricks. The basic movement is a backdrop on the trampoline and then the feet touching the wall at the top of the bounce. From there, there is no limit to the acrobatic movements that are possible, similar to regular trampolining. The advantage is that twists and turns can be initiated more forcefully from a solid wall and that the vertical speed can be transferred to rotation in addition to forces from the legs or arms. Additionally, energy can be gained both from the bed at the bottom of the bounce, and from the", "a useful connecting jump in such sequences; for example, a five-jump combination might be Axel, loop, double Mapes, Euler, double flip. The hardest part of a five jump combination is usually keeping up enough speed to complete the fifth jump, which can sometimes be the most technically difficult. the \"loop\" jump is also performed in roller skating, though ice skaters tend to \"take off\" with two feet, roller skaters do a one-foot take off.\nRoller skating also traditionally emphasizes spins that are uncommon on ice, especially the inverted camel in which the skater is on an outside edge standing on the", "including jumping) include judging at the walk, trot, and canter in both directions, and the competitors may be asked to ride without stirrups or perform assorted other tests or patterns. It is correct for the riders to have a light and steady contact with their horse's mouth the entire ride. Incorrect leads, break of pace, and wrong diagonals are penalized. Loss of a stirrup or dropping the reins are also faults, and may be cause for elimination.\nIn over fences classes (classes in which the horse and rider jump obstacles), the competitor rides over a course of at least six jumps", "High jump Rules The rules for the high jump are set internationally by the International Association of Athletics Federations (IAAF). Jumpers must take off on one foot. A jump is considered a failure if the bar is dislodged by the action of the jumper whilst jumping or the jumper touches the ground or breaks the plane of the near edge of the bar before clearance. The technique one uses for the jump must be almost flawless in order to have a chance of clearing a high bar.\nCompetitors may begin jumping at any height announced by the chief judge, or may", "Vertical jump A vertical jump or vertical leap is the act of jumping upwards into the air. It is an effective exercise for building both endurance and explosive power. It is also a standard test for measuring the power output of an athlete. It may also be referred to as a Sargent jump. Where vertical jump measurements are used Vertical jump measurements are used primarily in athletic circles to measure performance. The most common sports in which one's vertical jump is measured are high jump, netball, basketball, and volleyball, but many sports measure their players' vertical jumping ability during physical" ]
Are calories just calories? Is it the same if you get a calorie from a fizzy drink or a piece of fruit or a slice of potato or a bit of cheese?
[ "Yes, a calorie is a calorie, source is largely irrelevant, but that doesn't necessarily mean your body will react the same way. The input isn't different, but the output can be. \n\nA simplistic analogy might be to consider getting punched with a certain measure of force (say 5 newtons). If you got punched like this in a boxing match, or in a tense situation on the street, it might neither surprise you much, nor would it hurt. If however, your mother or significant other hit you with the same level of force, you might end up massively more shocked, noticing it far more etc. In the same way whilst the force (calories) of an input will always be the same, the way your body reacts to the input will vary depending on its local environment - is it currently undergoing severe starvation, do you have a metabolic disease, are you middle aged etc. The local environment your body finds itself in can influence how it reacts to a calorie. This can be influenced by, amongst other things, the food you eat. So calories from fizzy drinks, whilst theoretically the same as other calories, might be treated differently by the body than a calorie from a piece of fruit, because of knock on effects from consuming a fizzy drink. The calories themselves aren't different but the method of administration can alter the reaction your body has to it. There are probably additional effects (albeit not particularly large) depending on things such as whether you have just exercised, how easily digestible the food is, current energy/glucose levels etc, or even your own personal biological quirks that influence how your body operates. Most of this stuff is relatively small scale though, and not worth worrying about at an individual level.\n\n_URL_0_", "A calorie is a physical measure of energy - specifically, the amount of energy needed to heat one metric mililitre of water by one degree Celsius. Energy in food intake is also measured in this way, though the terms kilocalorie and calorie are often used interchangably, which can cause confusion. \n\nBut yes, no matter where it comes from, one calorie always represents the exact same amount of energy. However, a difference you *can* make is that some foods will allow the energy that is within them to be absorbed more efficiently or more quickly, which can lead to varying results.\n\n(Edit courtesy of Neo6874: One calorie heats one millilitre by one degree Celsius. One kilocalorie heats one litre by one degree Celsius.)", "Not really bit sort of.\n\nCalories are a measure of the potential energy in food. Humans can extract that energy much more efficiently from some foods than for others so there's also matter of the bioavailability of those calories. \n\nSimple sugars dissolved in water are the easiest to digest and you will extract almost all of that energy. \n\nUnprocessed foods with complex carbon molecules, ie complex carbohydrates, fats and proteins are harder to digest. It takes more energy to process them and in some cases we can't extract the energy at all, such as with cellulose.\n\nThere is a lab study showing that simply puffing up rat food with air increases weight gain in rats but I don't have the link right now. \n\nThat said, this is a second order effect. If your looking to gain or lose weight your first dietary priority should be calorie counting, next is macronutrient ratios and calorie availability is something you should only bother with once you have a handle on the other two.", "Yes. A calorie is just a way of measuring energy. 1 calorie= the amount of energy needed to raise water 1 degree Celsius. Edit: One metric millilitre of water, that is. \n\nA calorie has nothing to do with the nutritional content of the food at hand.", "A calorie is a calorie, *but* just because something has 100 calories doesn't mean your body absorbs/uses all those calories.", "Pretty much. For example if a male has a total daily expenditure of 2500 calories and he eats 2500 calories of sweets he will stay the same weight. But health comes into the equation because you want to ensure you are eating enough protein (for maintaining/growing muscle) and carbohydrates. If you are 2500 calories of sweets daily you would be deficient in a lot of vitamins etc and may lose muscle mass", "In terms of the amount of energy they give you, yes, but in other ways no. Plain sugar is digested very quickly, so you'll get hungry again more quickly than if you ate the same number of calories of protein. Also, you need to eat protein and fat to survive, but not carbohydrates.", "> ELI5: Are calories just calories? Is it the same if you get a calorie from a fizzy drink or a piece of fruit or a slice of potato or a bit of cheese?\n\nA calorie is a calorie, but calories are strictly about the amount of energy in food, not the nutritional content of the food.\n\nYou've probably heard of \"vitamins\" and micro-nutrients like vitamin A (which is found in many vegetables) and vitamin C (found commonly in citrus, e.g. oranges). Other micro-nutrients include things like iron, iodine, magnesium, and so on.\n\nIf you get 2000 calories from just drinking soda, then your body will ingest the same amount of \"energy\" as it would from 2000 calories of cheese or potatoes or meat or other foods. But if you drink nothing but soda, you'll likely develop numerous nutrient deficiencies, which can lead to other medical problems. For example, some people develop night blindness due to vitamin A deficiency, and many micro-nutrient deficiencies can lead to a weakened immune system, causing you to get sick more easily.\n\nBeyond that, all foods fit into several different macro-nutrient groups, which you've probably heard of: carbohydrates (aka \"carbs\"), protein, and fat. The body metabolizes these differently. For example, the body will use protein to repair tissue damage and build muscle. 500 calories worth of chicken and 500 calories worth of bread might be the same amount of \"energy,\" but your body is going to process and metabolize them in different ways.", "I don't usually eat a lot, and when I drink beer I can easily consume 2000 calories in beer alone but not be that hungry for any food. The problem along with nutrition if I were to do this on a daily basis, is the irregularity in which your shits come in. That's why old people are recommended high fiber, so they don't just poop out a string bean or popcorn poop and their digestive system is happy." ]
[ "in calories, sometimes having as few as 4 per 100ml diluted, and they are marketed towards families seeking low calorie alternatives. They tend to be very low in fruit juice, as fruit juice contains natural sugars, so they usually also contain natural or artificial flavourings (isoamyl acetate for pear or banana, or mixed with malic acid to make an apple-like flavour, ethyl methylphenylglycidate for strawberry, octyl acetate for orange, allyl hexanoate for pineapple etc.) to make up for the lack of fruit juice taste. Animal consumption The gorillas at London Zoo are given both squash and cold fruit tea to", "claimed to be negative in calories are mostly low-calorie fruits and vegetables such as celery, grapefruit, lemon, lime, apple, lettuce, broccoli, and cabbage. However, celery has a thermic effect of around 8%, much less than the 100% or more required for a food to have \"negative calories\".\nExamples : a 905 Gram pineapple would have 452 calories or 50 Calories per 100g An apple 52 Calories per 100g Celery 16 Calories per 100g Cabbage 25 Calories per 100g a lemon 29 Calories per 100g a Lime 30 Calories per 100g Grapefruit has 42 Calories per 100g and Broccoli has", "calories (78 calories per tablespoon) and is a moderate source of vitamin C and several B vitamins (table). It is composed of 76% carbohydrates, 23% water, 0.4% fat, and negligible protein.\nHaving fructose as its primary sugar, blue-agave syrup (56% fructose) is similar in fructose content to high-fructose corn syrup (55% fructose content), the most common sweetener used in US manufactured beverages. In a tablespoon amount (about 25 ml or grams), blue-agave syrup supplies 78 calories, an amount similar to the value per tablespoon for high-fructose corn syrup (70 calories). Glycemic index Blue-agave syrup has a relatively high sweetness factor", "higher than 10%. Based on a 2012 study on the use of caloric and noncaloric sweeteners in some 85,000 food and beverage products, 74% contain added sugar.", "over 1,600 calories, and desserts typically contained over 1,000 calories each.", "Thus, the low levels of satiety provided by sugar-sweetened soft drinks may explain their association with obesity. That is, people who consume calories in sugar-sweetened drinks may fail to adequately reduce their intake of calories from other sources. Indeed, people consume more total calories in meals and on days when they are given sugar-sweetened drinks than when they are given artificially sweetened drinks or water. However, these results are contradicted by a study by Adam Drewnowski published in 2004, in which \"32 subjects consumed a 300-calorie snack of fat-free raspberry cookies or regular cola on two occasions each – either", "but calorie-rich food and drinks.\nUntil 1985, most of the calories in soft drinks came from sugar or corn syrup. As of 2010, in the United States high-fructose corn syrup (HFCS) is used nearly exclusively as a sweetener because of its lower cost, while in Europe, sucrose dominates, because EU agricultural policies favor production of sugar beets in Europe proper and sugarcane in the former colonies over the production of corn. HFCS has been criticized as having a number of detrimental effects on human health, such as promoting diabetes, hyperactivity, hypertension, and a host of other problems. Although anecdotal evidence has", "ribose. Specific ingredients are added according to the flavor of the drink. Either 16 oz, 200 calories and 150 mg caffeine per can, or 2 oz, no calories. The vitaminenergy website does not show ingredients or amount of caffeine for the 'shot' product. fruitwater fruitwater was a less sweetened, sparkling version of VitaminWater drink that was sold from 2013-2015. It consisted of the same ingredients only with a light fruit flavor and less crystalline fructose. Aside from “natural flavor,” fruitwater does not contain any actual fruit juice. Ingredients include Guarana seed, which has twice as much caffeine as coffee. Coca-Cola", "& Mint. Nutrition facts All KIND snacks are gluten-free, made from whole ingredients and low in sodium. Currently, their KIND Healthy Grains and KIND Healthy Grains Clusters are certified by the NON-GMO Project. \nAll KIND bars range between 180-210 calories and have healthy fats and protein. The KIND Healthy Grains bars are 140-150 calories with 18 grams or more of whole grains per bar. STRONG & KIND bars are all 230 calories each with 10 grams of protein.\nThe FDA submitted a warning letter to the company in April 2015, which stated that four of its products did not meet the", "contains no calories, fat, or sugar.\nFruit2o Plus 10 ingredients also include ascorbic acid (vitamin C), niacinamide, vitamin B₆, vitamin B₁₂, calcium pantothenate (vitamin B₅) and biotin (B vitamins), vitamin E acetate, zinc gluconate, magnesium sulfate, sodium selenite, calcium disodium EDTA.", "sugar and high-fructose corn syrup that are added to food and beverages (particularly convenience food and soft drinks), and by the fructose in fruit juice and vegetable juice. His position is that sugars are not simply empty calories; he rejects the idea that \"a calorie is a calorie.\" \nLustig was a co-author in 2009 of the American Heart Association's guideline on sugar intake, which recommended that women consume no more than 100 calories daily from added sugars and men no more than 150. That year, a 90-minute lecture by Lustig, \"Sugar: The Bitter Truth,\" recorded in May 2009 for University", "(table). In a 100 gram serving, it supplies 281 kilocalories, while in one tablespoon of 19 grams, it supplies 53 calories (table link). Obesity and metabolic disorders In the 1980s and 1990s some publications cautioned consumption of sucrose and of HFCS. In subsequent interviews, two of the study's authors stated the article was distorted to place emphasis solely on HFCS when the actual issue was the overconsumption of any type of sugar. While fructose absorption and modification by the intestines and liver does differ from glucose initially, the majority of the fructose molecules are converted to glucose or metabolized into", "In the US, sweetened beverages such as most sodas are the most widely consumed type of foods containing added sugar, and they account for about a third of all consumption of added sugars (about half if counted together with fruit juice; about twice the amount that is gained from the categories of \"desserts\" and \"sweets\"). They represent about 7% of total energy intake, where they can account for up to 15% in children, and have been described as the \"largest single food source of calories in the US diet\". The consumption of sweetened beverages has increased in the US", "Sorbitol Sweetener Sorbitol is a sugar substitute, and when used in food it has the INS number and E number 420. Sorbitol is about 60% as sweet as sucrose (table sugar).\nSorbitol is referred to as a nutritive sweetener because it provides dietary energy: 2.6 kilocalories (11 kilojoules) per gram versus the average 4 kilocalories (17 kilojoules) for carbohydrates. It is often used in diet foods (including diet drinks and ice cream), mints, cough syrups, and sugar-free chewing gum. Most bacteria cannot use sorbitol for energy, but it can be slowly fermented in the mouth by Streptococcus mutans, a bacterium that", "providing 900 calories (initially, and subsequently 225 calories). Marketed under the taglines \"See the pounds go with Sego\" and \"Sego, it's great for your ego,\" Pet advertised the drinks being \"thicker\" and as having 10% more protein and 2 more ounces than other 900 calorie foods—e.g., Metrecal, its predecessor in the market and the market leader—asserting that protein \"helps control hunger.\" In 1966, milk chocolate, caramel fudge and butter pecan flavors became available, and Pet Milk subsequently offered Sego branded pudding and soup—and, later still, diet bars.\nBy 1961, there were more than 100 meal replacement products on the U.S.", "the differences were unreliable: the differences between men who consumed sugar-sweetened drinks or no drinks was not statistically significant.\nOther research suggests that soft drinks could play a special role in weight gain. One four-week experiment compared a 450 calorie/day supplement of sugar-sweetened soft drinks to a 450 calorie/day supplement of jelly beans. The jelly bean supplement did not lead to weight gain, but the soft drink supplement did. The likely reason for the difference in weight gain is that people who consumed the jelly beans lowered their caloric intake at subsequent meals, while people who consumed soft drinks did not.", "energy or energy density figures are often quoted as \"calories per serving\" or \"kilocalories per 100 g\". A nutritional requirement or consumption is often expressed in calories per day. One gram of fat in food contains nine calories, while a gram of either a carbohydrate or a protein contains approximately four calories. Alcohol in a food contains seven calories per gram. Chemistry In other scientific contexts, the term calorie almost always refers to the small calorie. Even though it is not an SI unit, it is still used in chemistry. For example, the energy released in a chemical reaction per mole", "energy consumption from salty snacks, soft drinks, and pizza; and increased portion sizes\". Other sources note that the consumption of soft drinks and other sweetened beverages now accounts for almost 25 percent of daily calories in young adults in America. As these estimates are based on a person's recall, they may underestimate the amount of calories actually consumed. Fast food As societies become increasingly reliant on energy-dense fast-food meals, the association between fast food consumption and obesity becomes more concerning. In the United States consumption of fast food meal has tripled and calorie intake from fast food", "Glucerna Mini Snack Bars and Glucerna Crispy Delights Nutrition Bars. Composition and properties Glucerna products are formulated with fat, protein, vitamins, minerals, and carbohydrates including CarbSteady, proprietary carbohydrate blend containing sucromalt that is characterized by a reduced glycemic index of approximately 53. Some Glucerna products contain chromium picolinate, and phytosterols. There is evidence that phytosterols may help lower cholesterol, but the efficacy of chromium supplementation has not been fully agreed among experts.\nThe glycemic index of Glucerna shakes is approximately 31 relative to a value of 100 for pure glucose, while the snack bar has been found to produce less", "for beverages or yogurts. Juice from the ripe berries is astringent, sweet (with high sugar content), sour (low pH), and contains vitamin C. In addition to juice, the fruit can be baked into soft breads. In the U.S., Aronia berries are also marketed for their antioxidant properties.", "are defined in US law as a food of minimal nutritional value.\nEven in a culture that eats sweets frequently, candy is not a significant source of nutrition or food energy for most people. The average American eats about 1.1 kg (2.5 pounds) of sugar or similar sweeteners each week, but almost 95% of that sugar—all but about 70 grams (2.5 ounces)—comes from non-candy sources, especially soft drinks and processed foods. Meal replacements Candy is considered a source of empty calories, because it provides little or no nutritional value beyond food energy. At the start of the 20th century, when", "contains around 700 kilocalories (2,900 kJ) per 100 grams, or 94 kilocalories (Cal) per tablespoon. This makes mayonnaise a calorically dense food.\nThe nutrient content of mayonnaise (> 50% edible oil, 9–11% salt, 7–10% sugar in the aqueous phase) makes it suitable as a food source for many spoilage organisms. A set of conditions such as pH between 3.6 and 4.0, and low water activity aw of 0.925, restricts the growth of yeasts, a few bacteria and molds. Yeasts of the genus Saccharomyces, Lactobacillus fructivorans, and Zygosaccharomyces bailii are the species responsible for the spoilage of mayonnaise. The characteristics of spoilage caused by", "less than 20% juice, and some as little as 5-10%. The latter are typically low in nutritional value, and the high juice versions are reasonably higher in nutrients, although one downside is that it is high in sugar and does not contain fibre or minor nutrients. That goes with almost all squashes. A low juice squash may state \"with real fruit juice\" on the label. Low-sugar squashes Squashes labelled \"no added sugar\" are artificially sweetened, usually with aspartame, acesulfame K, saccharin or sucralose, which is much cheaper for the manufacturers than both HFCS and natural sugar. They are very low", "HFCS, invert sugar, honey, and many fruits and juices deliver the same sugars in the same ratios to the same tissues within the same time frame to the same metabolic pathways\". While scientific authorities agree that dietary sugars are a source of empty calories associated with certain health problems, the belief that glucose-fructose syrups such as HFCS are especially unhealthy is not supported by scientific evidence. Health authorities and the FDA recommend limiting the overall consumption of sugar-based sweeteners. Cane Since the 6th century BC, cane sugar producers have crushed the harvested vegetable material from sugarcane in order to collect", "the alcohol company Daesun Jujo (대선주조).\nFruit soju contains large amounts of sugar, with each bottle containing 32.4 grams (1.14 oz). The calorie content of each bottle of fruit soju totals 400 kcal; more calories than one bowl of rice and 5 g (0.18 oz) more sugar than a serving of Coke, contributors to obesity and an increase of visceral fat.\nA 2016 article identified the most popular fruit soju for university students as Dew on Grapefruit (자몽에 이슬), with students indicating they preferred this less-sweet version of the beverage. The second-most popular fruit soju in this demographic was Bokbadeun Brother (복받은 부라더).", "Passiflora maliformis Nutrition Passiflora maliformis arils contain 85.44% water, 7.17% net carbohydrates, 3.63% fibre, 2.2% protein, and 0.45% fat (see table). A 100-gram amount provides 42 kilocalories and is an excellent source of magnesium and phosphorus as well as a significant source of other minerals (see table). The fruit also contains various organic acids and phenolic compounds which are responsible for the aroma and flavour. It is commonly eaten raw or made into a drink, it is said to have a flavor similar to grape.", "beverage contains 140% of the recommended daily intake of vitamin C. Five Alive contains 110 calories and 27 grams of sugar per 240 mL. U.S. Five Alive labels list 41% fruit juice, with high fructose corn syrup as an ingredient after filtered water. In the United Kingdom, quantitative ingredient labeling is mandatory; U.K. labels show that Five Alive contains 42% fruit juice, as well as 22% sugar and several artificial sweeteners. References in popular culture Canadian alternative rock band Barenaked Ladies recorded a song for their 1989 demo tape Buck Naked called \"Couldn't Care Less\" in which there was a", "offered as a complimentary digestif with fruits and sweets after the meal.\nIt can be flavored using lemon rind, rosemary, or honey (rakomelo).", "sales today; it uses a combination of sucralose and acesulfame potassium.\nAdvocates say drinks employing these sweeteners have a more natural sugar-like taste than those made just with aspartame, and do not have a strong aftertaste. The newer aspartame-free drinks can also be safely consumed by phenylketonurics, because they do not contain phenylalanine. Critics say the taste is not better, merely different, or note that the long-term health risks of all or certain artificial sweeteners is unclear.\nThe widespread, though not universal, agreement that the newest formulations taste much more \"normal\" (sugar-like) than the older diet soft drinks have prompted", "sucrose alone or sucrose in combination with fructose appear to lead to weight gain due to increase energy intake. Fructose might also be preferentially metabolized into fat as feedback inhibition as with glucose is missing. In fact, about half of total added sugar consumed in the United States is in liquid form. Teenage boys showed the greatest consumption of sugar-sweetened beverages, upwards of 357 calories per day. In addition to the evidence that humans have a natural propensity towards sugar, there exists additional biological plausibility that explains the correlation of sugar-sweetened beverage consumption and obesity.\nA study by the National Center" ]
What can I do as a single individual to get Gary Johnson in the debates?
[ "You could phone bank, donate to his campaign, that sort of thing.\n\nThe question you should be asking yourself is why you want Gary Johnson in the debates. His economic policies are frankly terrible. He thinks that socialized medicine is a bad thing, when it's been proven to be the superior system in every measure except 5 year cancer survival rate. He's courted anti-vaxxers, a movement I would like to point out quite literally kills children.\n\nSure, it would be nice to have alternate voices on the campaign trail. But I would prefer to have sane ones rather than crazy ones.", "If you are polled on who you would vote for in the presidential election, say \"Gary Johnson.\"\n\nOnce he has 15% or more of polled people giving his name, he can be included in the debates." ]
[ "of five, that took place that day. Johnson was criticised by his competitor Jeremy Hunt for failing to appear alongside him and the other candidates in a debate on 16 June. During the debate, which was broadcast by Channel 4, Hunt asked: \"If his team won’t allow him out with five fairly friendly colleagues, how is he going to deal with 27 European countries?\" On 16 June, the second ballot took place, and Johnson gained the backing of 12 more MPs, taking his number of votes to 126. He achieved 143 votes in the third ballot and 157 in the", "and Trump.\nIn late 2015, Johnson and Green Party candidate Jill Stein, both represented by attorney Bruce Fein, filed a lawsuit in the U.S. District Court for the District of Columbia, seeking to compel their inclusion in the debates. The case was dismissed in August 2016, with Judge Rosemary Collyer finding that the plaintiffs had no viable legal claim.\nOn August 5, the editorial board of the Chicago Tribune called on polling organizations to \"acknowledge\" Johnson, giving him an opportunity to garner the necessary level of support to participate in the presidential debates. The Boston Herald followed on September 7. Former", "hosting organizations have used to determine which candidates are allowed in the debates.\nDavid Weigel of Slate magazine coined the term the \"Gary Johnson Rule\" (or the \"Anti-Gary Johnson Rule\") to refer to the deliberate construction of rules by 2012 presidential debate organizers to include eight specific, pre-determined candidates while excluding others. The phrase refers specifically to the various rules created to outline who will be allowed to participate in the 2012 GOP presidential debates. Variations of these rules have been used to exclude Johnson from all but two debates during the 2012 presidential cycle and to completely exclude other candidates.\nOn", "law applies to presidential elections as well, Gary Johnson was three minutes late to withdraw from the 2012 Republican Primary and was therefore on the ballot. As a result, he was denied ballot access as a Libertarian.\nThe Libertarian Party stated that since petitioning in Michigan is by party, not by person, a Texas businessman who is also named Gary E. Johnson would stand in and run for president as a Libertarian in Michigan, but a U.S. District judge denied their motion.\nGary Johnson was certified as a write-in candidate and received 7,774 votes in Michigan in the general election that year.", "vote of 419 votes to 152 votes for second-place candidate R. Lee Wrights. In his acceptance speech, Johnson asked the convention's delegates to nominate as his running mate Judge Jim Gray of California. Gray subsequently received the party's vice-presidential nomination on the first ballot.\nJohnson spent the early months of his campaign making media appearances on television programs such as The Daily Show with Jon Stewart and Red Eye w/Greg Gutfeld. Starting in September 2012, Johnson embarked on a three-week tour of college campuses throughout the US. On October 23, 2012, Gary Johnson participated in a third-party debate that was aired", "to \"keep an eye out\" for a Johnson presidential campaign in 2012, reporting that Johnson had told him that \"he was keeping his options open for 2012\" and that \"he may take a shot at the Republican presidential nomination in 2012 as an antiwar, anti-Fed, pro-personal liberties, slash-government-spending candidate—in other words, a Ron Paul libertarian\". During a June 24, 2009 appearance on Fox News's Freedom Watch, host Judge Andrew Napolitano asked Johnson if he would run for president in 2012, to which Johnson responded that he thought it would be inappropriate to openly express his desires before President Obama", "Gary Johnson 2012 presidential campaign Announcement On April 21, 2011 Johnson officially announced via Twitter that he was running for president. He followed this announcement with a speech at the New Hampshire State House in Concord, New Hampshire.\nJohnson focused the majority of his Republican campaign activities on the New Hampshire primary. Campaign staff Johnson chose Ron Nielson of NSON Opinion Strategy, the director of both of his two New Mexico gubernatorial campaigns, as his presidential campaign manager and senior advisor. His campaign was run from Salt Lake City, Utah, where Nielson's offices are located. Johnson's economics advisor was Harvard economics", "presidential campaign In an April 2014 \"Ask Me Anything\" session on Reddit, Johnson stated that he hoped to run for president again in 2016. On whether he would run as a Libertarian or a Republican, he stated: \"I would love running as a Libertarian because I would have the least amount of explaining to do.\"\nIn November 2014, Johnson affirmed his intention to run for the 2016 Libertarian nomination. In July 2015, Johnson reiterated his intentions for a presidential campaign but stated he was not announcing anything imminently: \"I just think there are more downsides than upsides to announcing at this", "November 15, Gary Johnson's campaign filed an official complaint with the FEC and FCC over exclusion from the November 12th CBS Debate, claiming that his exclusion shows media favoritism. According to the complaint, free publicity provided by a media outlet on public airwaves may be considered a political donation if not equally distributed between candidates running for office. On December 28, Gary Johnson announced that he was ending his quest for the Republican nomination and would instead seek the Libertarian nomination, citing his exclusion from the debates as one reason for doing so.\nAfter the CBS/National Journal debate in Spartanburg,", "debate while Johnson was not.\nThen, on September 21, Fox News decided that because Johnson polled at least 2% in five recent polls, he could participate in a September 23 debate in Florida, which it co-hosted with the Florida Republican Party (the party objected to Johnson's inclusion). Johnson participated, appearing on stage with Michele Bachmann, Herman Cain, Newt Gingrich, Jon Huntsman, Ron Paul, Rick Perry, Mitt Romney, and Rick Santorum. During the debate, Johnson delivered what many media outlets, including the Los Angeles Times, and Time, called the best line of the night: \"My next-door neighbor's two dogs have created more", "Political positions of Gary Johnson Economic issues According to a survey of National Association for Business Economics (NABE) members, 15% of business economists feel that Johnson would do the best job as president of managing the U.S. economy (with 55% choosing Clinton, 14% choosing Trump, and 15% saying that they did not know or did not have an opinion). Budget, deficits Gary Johnson has said that the United States is heading toward an economic crisis similar to the 1998 Russian financial crisis, and that it can be stopped only by balancing the federal budget. As such, he promised to", "Gary Johnson 2016 presidential campaign Background Johnson ran as the Libertarian presidential nominee in the 2012 election. In that race, he finished with the third highest popular vote total, nearly 1.3 million votes, and garnered nearly 1% of the popular vote. Johnson's vote total was the highest received by any LP candidate—for any office—in the party's history. Shortly after the election, Johnson began to express interest in running for the Libertarian nomination again in the 2016 election. Campaign Johnson formally announced his candidacy for the 2016 Libertarian presidential nomination, in an interview with Neil Cavuto on the Fox Business Network", "on C-SPAN, RT America, and Al Jazeera English. A post-debate online election allowed people to choose two candidates from the debate they thought had won to face each other head to head in a run-off debate. Gary Johnson and Jill Stein won the poll. They debated in Washington, D.C., on November 5, 2012.\nJohnson stated that his goal was to win at least 5 percent of the vote, as winning 5 percent would allow Libertarian Party candidates equal ballot access and federal funding during the next election cycle. In a national Gallup poll of likely registered voters conducted June 7 through", "the presidential debates sponsored by the Commission on Presidential Debates. De La Fuente, however, was invited to and participated in the 2016 Free & Equal Elections debate.\nAfter coming in fourth and winning no delegates in the 2016 Democratic Party presidential primaries and after founding the American Delta Party as a vehicle to run for president of the United States with his running mate Michael Steinberg and as he lacked ballot access to the larger states, on October 25, 2016 he participated in a debate hosted by the Free & Equal Elections Foundation and debated against the Constitution Party candidate Darrell", "to participate in the presidential debates because he did not meet the criterion of 15% support in five polls set by the Commission on Presidential Debates. In 2015, Johnson and Green Party nominee Jill Stein filed a lawsuit against the commission, arguing that the commission and its rules violated antitrust law and the First Amendment. In August 2016, the lawsuit was dismissed. Johnson's poll numbers had been averaging between 7 and 9 percent. Johnson's campaign manager Ron Nielson argued for Johnson's inclusion, citing Ross Perot's admission to the debates in the 1992 debates, when Perot was polling at 8 percent.\nA", "2006, Johnson was the Mountain nominee for U.S. Senate. He campaigned against corporate influence of the elections. Johnson neither took nor spent money, focusing on the need for campaign finance reform. He received 1.9% of the vote.\nIn 2008, Johnson sought the Green Party nomination for president and won his home state of West Virginia in the Green primaries. He received the endorsement of former United States Senator and former 2008 presidential candidate Mike Gravel, among others. At the 2008 Green National Convention, Johnson lost the nomination to former Congresswoman Cynthia McKinney.\nIn 2008, he again ran for governor. His campaign", "2012, CNN poll includes Johnson. 4% of registered voters say that they would vote for him.\nNovember 1, 2012 CNN poll includes Johnson. 5.1% of 796 likely voters indicated that they would vote for Gary Johnson. Results On Election Day, Johnson received 1,275,951 votes nationally (0.99% of the popular vote), setting a record for the most votes won by a Libertarian Party presidential nominee. Johnson's best showing was in his home state of New Mexico, where he received 3.55% of the popular vote. Debates On September 21, 2012 Johnson filed an antitrust lawsuit in the US District Court for the Central", "Debates The first of three scheduled debates between O'Rourke and Ted Cruz took place on September 21, 2018. The candidates disagreed on gun rights, immigration, marijuana, the \"take a knee\" controversy, and the confirmation of Supreme Court nominee Brett Kavanaugh. At the end of the debate, the moderator asked the candidates to \"say something nice about each other\". O'Rourke praised Cruz's parenting. Cruz compared O'Rourke to Bernie Sanders, saying he \"admired [his] willingness to stand up for socialist beliefs and high taxes.\" O'Rourke replied, \"True to form.\" Analysts described Cruz as more experienced and aggressive, but said O'Rourke won over", "Governors Mitt Romney, Arnold Schwarzenegger, and Mitch Daniels, without endorsing Johnson, called for him to be in the debates, as did commentator Joseph Steinberg.\nOn September 16, the commission announced the official invitation of both Clinton and Trump to participate in the first debate to be held on September 26 at Hofstra University, but Johnson did not meet the established criteria, and would not be a participant in the debate. It was also announced that Mike Pence and Tim Kaine would be participating in the only scheduled vice presidential debate, to take place at Longwood University on October 4, and Weld", "shovel ready jobs than this current administration.\" Entertainment Weekly opined that Johnson had won the debate. Nomination On May 5, 2012, at the Libertarian National Convention, Johnson received the Libertarian Party's official nomination for President of the United States by a vote of 419 votes to 152 votes for second-place candidate Lee Wrights.\nFollowing his nomination, Johnson asked the convention's delegates to nominate as his vice-presidential running-mate Judge Jim Gray of California. Gray won the vice-presidential nomination on the first ballot. Ballot access Although there were numerous challenges to Johnson's ballot access, the Libertarian Party confirmed that Johnson received ballot access", "from July 16, 2016, found Johnson with a personal best 13% of the vote. To be included in any of the three main presidential debates, a candidate must be polling at least 15% in national polls.\nFollowing Trump's win in the Indiana Republican primary, making him the presumptive Republican nominee, the Libertarian Party received a rise in attention. Between 7 pm on May 3 and 12 pm on May 4, the Libertarian Party received 99 new memberships and an increase in donors as well as a rise in Google searches of \"Libertarian Party\" and \"Gary Johnson\". On May 5, Mary Matalin,", "remove Johnson from the ballot; the suit said that a reason for fighting Johnson’s appearance on the ballot was that Johnson would cause \"irreparable harm to other candidates and political parties who must compete against him,\" and that his appearance would cause \"irreparable injury to the voting public because it could improperly impact the election.\"\nWhen speaking of Johnson’s chances of making the ballot in the three states that had not up to that point agreed to include Johnson, Richard Winger, editor of Ballot Access News, said that \"Pennsylvania is likely, Michigan a maybe, Oklahoma almost impossible.\" On October 10, the", "Johnson supporters really want to help Trump win?\":\nDid Mr. Johnson learn much from his two terms as governor of New Mexico, or from his previous national presidential campaign? Does he prepare for major interviews — let alone for being president? ... Do ideological libertarians really want this man to represent their movement? Does his loopy campaign bring credibility to their political philosophy? ... Does Mr. Johnson's running mate, former Massachusetts governor William Weld, who is much sharper, really want to help Donald Trump win — and be remembered as the Ralph Nader of 2016? Mr. Johnson takes more support from", "While running as a Republican, Johnson stated that he \"supports the right of Israel to exist as a sovereign country and believes that the United States should protect that right militarily if needed.\" He also said that Israel is an important ally, and that America's military alliance with Israel should be maintained, but that he opposes financial aid to Israel, as he does to all countries, although he has since stated he favors the continuation of \"strategic aid\" to Israel. He has said he would not follow Israel or any other ally into a war that it had initiated. Iran", "walks off the stage.\nPrior to the release of the video, people could \"bet\" on either Samberg or Johnson winning the fight by clicking a Facebook \"like\" button designated for the person of choice.", "President Trump announced his intent to nominate Johnson to serve as a United States District Judge for the United States District Court for the Southern District of California.", "designed to train candidates for grassroots-level campaigning.\nJohnson has accepted several keynote speaking engagements and most notably the Pigskin Preview, organized by Virginia Governor Bob McDonnell, and is a published writer, having co-authored an article for Worth and independently for Overtime Magazines, respectively. Mr. Johnson possesses a keen interest in business development and has a wide variety of business experience, including a partnership in the sports social media networking website RawTeams.com, and as a consultant with FishDuck.com. Johnson has consulted in the private equity, oil and gas, mining, gaming, nutraceutical, entertainment, internet, and real estate industries.\nOn February 16, 2018, three Johnson-controlled", "qualified for matching funds. Hirsh Singh filed a lawsuit to enter the debates, claiming to have raised over $900,000 despite missing a deadline to file. His challenge was rejected by the state courts.\nThe Democratic debates included four of the six candidates: Jim Johnson, John Wisniewski (who both qualified for matching funds), Phil Murphy (who opted out of the matching funds program and spent enough to qualify for the debates), and Raymond Lesniak (who did not raise enough to qualify for matching funds but loaned his campaign enough money to qualify for the debates). General election Seven candidates were on the", "Our America Initiative Suit Against Presidential Debate Commission In 2016, Our America Initiative funded a lawsuit filed by the Libertarian Party and the Green Party (as well as Gary Johnson and Jill Stein, the eventual presidential nominees for the respective parties) against the Commission on Presidential Debates; the lawsuit advanced the position that \"the exclusion of qualified candidates from the general election presidential debates by the commission violates federal antitrust laws.\" \nJudge Rosemary M. Collyer of the U.S. District Court for Washington, D.C. the legal challenge, ruling that \"Johnson and Stein have no standing to make antitrust and First Amendment", "He won the back and forth fight by split decision (28–29, 30–27, and 29–28).\nJohnson faced promotional newcomer Júnior Albini on July 22, 2017, at UFC on Fox 25. He lost the fight via TKO in the first round.\nJohnson faced Marcelo Golm on February 3, 2018, at UFC Fight Night 125. He won the fight via unanimous decision. Bellator MMA On April 13, 2018, it was revealed that Johnson had signed a multi-fight contract with Bellator MMA.\nJohnson made his debut against Cheick Kongo on October 13, 2018, at Bellator 208. He lost the fight via knockout in the first round.\nJohnson was" ]
(or 18): Indefinite Detention Act
[ "The portion everyone's worried about basically states that if someone is accused or suspected of being a terrorist the US government can detain (lock up) them indefinitely regardless of whether or not they are an American citizen. This is a big deal because, in addition to reminding everyone of the Red Scare in the 50s, it is a direct violation of the bill of rights, specifically the fourth amendment. \n\n > Fourth Amendment – Protection from unreasonable search and seizure.\nThe right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. --Wikipedia\n\nBasically without a warrant, they cannot arrest you unless they see you committing the crime. This would remove that protection without modifying the constitution. In any sane environment it would immediately be thrown out by the Supreme Court as a violation of the constitution, but that its gotten this far to being passed is extremely worrying in and of itself.\n\nTL;DR: If the government doesn't like what you are saying/doing (OWS) they can 'suspect' you of terrorism, or of planning terrorism, or having vague ties to terrorism, and detain you indefinitely behind bars.\n\nOr at least that's my understanding.\n\nEdit: Personally the distinction in the past few years that the constitution only protects American citizens and that for anyone else we can even ignore the Geneva convention if we feel like it is just as, if not more worrisome. Who the hell thinks like that. I don't care if he's British he's still human.", "There are two bits of it people object to. IANAL, but here's what they say:\n\nSection 1031 is the main problem. It does not appear to cover US citizens- it says:\n > (e) AUTHORITIES\n\n > .—Nothing in this section shall be construed to affect existing law or authorities, relating to the detention of United States citizens, lawful resident aliens of the United States or any other persons who are captured or arrested in the United States. \n\n\nThe bill addresses two specific groups of people\n > (1) A person who planned, authorized, com-\nmitted, or aided the terrorist attacks that occurred on \nSeptember 11, 2001, or harbored those responsible for \nthose attacks. \n\n > (2) A person who was a part of or substantially \nsupported al-Qaeda, the Taliban, or associated forces \nthat are engaged in hostilities against the United \nStates or its coalition partners, including any person \nwho has committed a belligerent act or has directly \nsupported such hostilities in aid of such enemy forces. \n\n\nAnd nobody else.\n\nSection 1032 talks more about the specifics of implementing the NDAA. It has a disclaimer like 1031, saying\n\n > (1) UNITED STATES CITIZENS\n\n > .—The requirement \nto detain a person in military custody under this sec-\ntion does not extend to citizens of the United States. \n\n > (2) L\nAWFUL RESIDENT ALIENS\n\n > .—The require-\nment to detain a person in military custody under \nthis section does not extend to a lawful resident alien \nof the United States on the basis of conduct taking \n422 \nplace within the United States, except to the extent \npermitted by the Constitution of the United States. \n\n*However*, it also says \n\n > (4) WAIVER FOR NATIONAL SECURITY\n\n > .—The Sec-\nretary of Defense may, in consultation with the Sec-\nretary of State and the Director of National Intel-\nligence, waive the requirement of paragraph (1) if the \nSecretary submits to Congress a certification in writ-\ning that such a waiver is in the national security in-\nterests of the United States. \n\nWhich would appear to mean that the secretary of defence can ignore the explicit exclusion of US citizens if they choose to do so. That means that it's now legally possible for the US government to arrest and detain without trial anyone for the crimes mentioned.", "I'm sorry that this isn't answering the question but I need some help as well. I've heard that the indefinite detention does AND does not apply to U.S. citizens. Can someone just give a clear cut answer to this? Yes or no, with supporting sources, please?" ]
[ "or essential services therein\". The period of detention may be renewed by the President indefinitely for periods not exceeding two years at a time as long as the grounds for detention continue to exist.\nThe ISA has its constitutional basis in Article 149 of the Constitution, which sanctions preventive detention and allows for laws passed by the legislature against subversion to override the Articles protecting the personal liberties of the individual. Specifically, Article 149(1) declares such legislation to be valid notwithstanding any inconsistency with five of the fundamental liberty provisions in the Constitution, including Article 9. Thus, detentions under the ISA", "detention for the stated purpose of fighting terrorism in the United States and abroad. Under the Act, any person (citizen or alien) suspected of terrorist connections may be administratively detained for up to seven days without the benefit of an habeas corpus proceeding. The Attorney General of the United States, at his discretion, may extend this seven-day period to six months, and this extension itself may be renewed indefinitely – legally creating the possibility of lifetime imprisonment without ever facing charges. One of the criticisms of the PATRIOT Act is that the Attorney General's decision is not subject to any", "of substance,\" said Raha Wala, a lawyer in the law and national security program of Human Rights First. \"It doesn't ban indefinite detention within the United States or change anything about existing law.\" Chris Anders from the American Civil Liberties Union called the language on indefinite detention of Americans \"completely meaningless\" and added there's no doubt that habeas rights are available to anyone who's detained in the U.S.\nHJ Adams, a lawyer for the group of journalists and activists suing the U.S. government over the 2012 NDAA, explained that the above quoted provision gives U.S. citizens a right to go to", "allowed under the Terrorism Act 2000. The amendment was proposed by David Winnick MP. This power to detain for 28 days was formally brought into force on 25 July 2006. The 90-day limit was publicly advocated by Gordon Brown on 10 October 2006. Criticism of 90-day detention Opponents of 90-day detention broadly argue that everyone has a right to liberty unless charged with a crime. Detention for 90 days without charge is seen as a retreat from habeas corpus. Many argue that the denial of such a fundamental right can never be justified, regardless of the threat posed by terrorism.\nCritics,", "the most recent incarnation being the Prevention of Terrorism Act 2005 which introduced the concept of the control order, itself a more politically palatable means of limiting the freedom of a suspect without the need to provide a court of law with prima facie evidence of any wrongdoing. United States The United States currently uses indefinite detention without trial – known under various names as internment, civil commitment, preventive detention or administrative detention – to hold people who fall within a few narrow categories, including the mentally ill (involuntary commitment), and \"sexually violent predators\", though the right of habeas", "and Fifth Amendments of the U.S. Constitution and issued a preliminary injunction preventing the U.S. government from enforcing it.\nIn 2013, the House of Representatives and the Senate reauthorized the National Defense Authorization Act. The amendments to effectively ban indefinite detention of US Citizens were defeated in both chambers. Moreover, on July 17, 2013, the U.S. Court of Appeals for the Second Circuit struck down an injunction against indefinite detention of U.S. citizens by the president under the National Defense Authorization Act of 2012. The appellate court ruled that \"plaintiffs lack standing to seek pre-enforcement review of Section 1021 and vacate", "prisoners of war, unlawful combatants, and civilian internees; the latter two practices have been controversial, especially with regard to the indefinite detention implied by uncertainty as to when the \"War on Terror\" might be declared to have ended. Administrative detention, a term applied to many of these categories, is also used to imprison illegal immigrants. United States The Eighth Amendment to the United States Constitution prohibits excessive bail. Under the US Code, pretrial detention of federal suspects is allowed only under certain circumstances, such as when the defendant is a danger to witnesses or jurors. Impact Two 2018 studies in", "1950 was enacted and it continued to be on the statute book until the Maintenance of Internal Security Act (MISA) was enacted in 1971. The MISA was repealed in 1977. And the only period in the Indian \"republic without any preventive detention law was the three year period, beginning with the repeal of MISA in 1977 to the promulgation of the NSA in 1980. Detention The maximum period of detention is 12 months. The order can also be made by the District Magistrate or a Commissioner of Police under their respective jurisdictions, but the detention should be reported to the", "administrative detention occurred for reasons other than security (mainly for common crimes or the exercise of freedom of expression). Overall supervisory authority on the application of the relevant law rests with the Minister of Justice.\nWithin the West Bank and Gaza Strip, any Israeli district army commander can issue an administrative detention order, and the order can be appealed at the Israeli district military court, or, if denied there, at the Supreme Court. Here too, an administrative detention order is valid for at most six months, but can be renewed by the appropriate authority. Israel refers its use of administrative detention", "NDAA Amendment to the NDAA 2013, which added in Section 1033 which states: \"An authorization to use military force, a declaration of war, or any similar authority shall not authorize the detention without charge or trial of a citizen or lawful permanent resident of the United States apprehended in the United States, unless an Act of Congress expressly authorizes such detention.\" Civil liberties groups, such as the ACLU, were concerned with this amendment because they think anyone on American soil should be given a trial if accused of a crime, given that the U.S. Constitution protects \"persons,\" rather than \"citizens.\"", "is limited to determining the legality, and must not deal with the substantive merits, of a decision. Orders for review of detention The unlawful detention of a person is a breach of his or her right to personal liberty guaranteed by Article 9(1) of the Constitution. An order for review of detention (formerly known as habeas corpus) can be sought to direct the party responsible for detaining the person to produce the detainee before the High Court so that the legality of the detention can be established. In Re Onkar Shrian (1969), the High Court held:\n[T]he writ [of habeas corpus]", "from acting in any manner prejudicial to the security of Singapore ... or to the maintenance of public order or essential services therein\". The period of detention may be renewed by the President indefinitely for periods not exceeding two years at a time as long as the grounds for detention continue to exist.\nThe ISA has its constitutional basis in Article 149 of the Constitution, which sanctions preventive detention and allows for laws passed by the legislature against subversion to override the Articles protecting the personal liberties of the individual. Specifically, Article 149(1) declares such legislation to be valid notwithstanding any", "informed of the grounds of arrest, the right to counsel, and the right to be produced before a magistrate within 48 hours of arrest. These rights do not apply to enemy aliens or to persons arrested for contempt of Parliament. The Constitution also specifically exempts the Criminal Law (Temporary Provisions) Act (Cap. 67, 2000 Rev. Ed.), the Internal Security Act (Cap. 143, 1985 Rev. Ed.), and Part IV of the Misuse of Drugs Act (Cap. 185, 2008 Rev. Ed.) from having to comply with Article 9. Meaning of life In Yong Vui Kong v. Public Prosecutor (2010), the Court of Appeal of Singapore called the right", "Criminal Procedure Code (Law 5271 as of 1 June 2005) regulates the length of custody in Article 91. Again the maximum length of detention is determined to be 24 hours. Article 90 of Law 5271 maintains the maximum length of detention in cases of commonly committed offences as four days. However, the period can be extended for one day at a time (for a maximum of three times). The order for extension of the time in custody again is given by a prosecutor (not a judge).\nFor offences that had to be dealt with by State Security Courts (under the new", "Immigration detention Immigration detention is the policy of holding individuals suspected of visa violations, illegal entry or unauthorised arrival, and those subject to deportation and removal in detention until a decision is made by immigration authorities to grant a visa and release them into the community, or to repatriate them to their country of departure. Mandatory detention is the practice of compulsorily detaining or imprisoning people seeking political asylum, or who are considered to be illegal immigrants or unauthorised arrivals into a country. Some countries have set a maximum period of detention, while others permit indefinite detention. United", "government's motion to stay the injunction throughout its appeal. First the plaintiffs stated their opposition to the U.S. government's stay motion on September 27, 2012 and the U.S. government replied to it on September 28, 2012. On October 2, 2012, the Second Circuit Court of Appeals ruled that the ban on indefinite detention will not go into effect until a decision on the Obama Administration's appeal is rendered. The appeals court ruled that, since the U.S. government has promised that citizens, journalists, and activists were not in danger of being detained as a result of the NDAA, it was unnecessary", "the Patriot Act, the possibility of indefinite detentions for immigrants became possible. The Patriot Act was enacted seven weeks after the September 11 attacks and allowed for the deportation of immigrants that were suspected of terrorist activity. Under the Patriot Act, immigrants that were considered threats to national security could also be indefinitely detained without the possibility of bond. Detention would also become indefinite if the immigrant's country did not want to receive the immigrant in question. As a result of this, multiple civil liberties organizations such as the American Civil Liberties Union (ACLU) began to file lawsuits against federal", "must be clear, unambiguous and must not be vague so that the detenu might be able to submit an effective representation against his detention. If the grounds of detention are indefinite and vague, the detention, as a whole, becomes illegal. Lastly, the court held that an illegal detention cannot be continued by a later valid order. The court stated that the basis for detention had to be objective, as quoted in the following.\nThe Special Powers Act standing by itself emphasises that the opinion of the detaining authority to act is purely subjectively, but the Constitution has given a mandate to", "strictly construed in favour of the detainees' liberty, the court could not imply a power of arrest and detention into section 10 when Parliament had not provided for it. The Court of Appeal took the view that once a suspension direction under section 10 is revoked, the original detention order becomes operative again. The power to arrest and detain is conferred by the detention order itself. Conditions of detention Teo's counsel submitted that the nature and conditions of her detention rendered the detention unlawful. The Court of Appeal accepted that detention that was prima facie lawful can become unlawful if", "this set, the criteria and circumstances necessary differ by state, and most states limit the detention periods in jails to one to three days. One distinguishing factor of this practice is that it is often initiated by a non-medical professional such as a police officer. In many states, especially those in which a non-public official such as a medical health professional or concerned citizen can initiate the detention, a judge or magistrate is required to approve it before or soon after the initiation.\nWhen emergency detention in jails has been brought to court, judges have generally agreed that the practice itself", "interest.\nAny person may be detained by the police for up to 60 days without trial for an act which allegedly threatens the security of the country or any part thereof. After 60 days, one may be further detained for a period of two years each, to be approved by the Minister of Home Affairs, thus permitting indefinite detention without trial. In 1989, the powers of the Minister under the legislation was made immune to judicial review by virtue of amendments to the Act, only allowing the courts to examine and review technical matters pertaining to the ISA arrest. The Reid", "imply that indefinite military detention of any other persons apprehended within the United States was authorized in 2001 and was lawful,\" the ACLU wrote, referring to the Authorization for Use of Military Force, the founding document of the \"war on terror\" that was passed the week after the 9/11 attacks. \"In addition, the clause 'unless an Act of Congress expressly authorizes such detention' could be read to imply that there are no constitutional obstacles to Congress enacting a statute that would authorize the domestic military detention of any person in the United States,\" the ACLU wrote.\nA Congressional conference committee tasked", "2011, and President Barack Obama signed it December 31, 2011. The new indefinite detention provision of the law was decried as a \"historic assault on American liberty.\" The ACLU stated that \"President Obama's action today is a blight on his legacy because he will forever be known as the president who signed indefinite detention without charge or trial into law.\"\nOn May 16, 2012, in response to a lawsuit filed by journalist Chris Hedges, Noam Chomsky, Naomi Wolf and others, United States District Judge Katherine B. Forrest ruled that the indefinite detention section of the law (1021) likely violates the First", "was amended several times during \"The Emergency\" (1975–1977), leading to human rights violations. It was subsequently repealed after Indira Gandhi lost the election in 1977, and the new government took over. Japan In Japan, pre-trial detention of a suspect can be for up to 23 days without charge. The length of detention, up to the maximum period, is at the discretion of the public prosecutor and subject to the approval of local courts. It can also be further extended. Malaysia In Malaysia the Internal Security Act 1960 (ISA) was a preventive detention law that was enacted after Malaysia gained independence", "the only form of detention that would be within the federal parliament's aliens power, rather \"it may be the case that detention for the purpose of preventing aliens from entering the general community, working, or otherwise enjoying the benefits that Australian citizens enjoy is constitutionally acceptable.\" Non-judicial detention The second issue was whether indefinite detention for migration purposes infringed on Chapter III of the Australian Constitution. While every judge discussed this issue, only three judges, Justices McHugh, Hayne and Heydon, found it necessary to make a final decision on the issue. They all reached the same conclusion, that the detention", "have explicitly excluded U.S. citizens from the detention authority created by the Authorization for the Use of Military Force passed just after the September 11 attacks in 2001. The amendment failed 45-55.\nThough her amendment was defeated, the compromised amendment, passed 99-1, affirmed that nothing in the NDAA is intended to alter the government's current legal authority to detain prisoners captured in the war on terror. Victims' rights In the 1990s, Feinstein was one of the original sponsors, along with Republican Senator Jon Kyl, of an effort to amend the United States Constitution to protect victims' rights in trial. Though the", "recent forms were a series of Acts intended to introduce a form of administrative detention to Northern Ireland under the auspices of the Prevention of Terrorism (Temporary Provisions) Act 1974. This Act allowed the security forces to apprehend and detain persons suspected of terrorist activities without trial for an unlimited period. The introduction of the Act led directly to the creation of internment camps (particularly Long Kesh (the Maze) and the prison ship HMS Maidstone where suspects were detained, some for protracted periods.\nThe Act of 1974 was amended a number of times during the late 20th and early 21st century,", "detain citizens. Section 1021 and 1022 of the legislation enacted policies described by The Guardian as allowing indefinite detention \"without trial [of] American terrorism suspects arrested on U.S. soil who could then be shipped to Guantánamo Bay\".\nConvicted persons can be held indefinitely as a \"dangerous offender\".", "of government. Detention generally is considered to be a judicial function, which can be exercised only by courts, pursuant to Chapter III of the Australian Constitution. However, there are certain exceptions which allow non-judicial detention, such as detention in order to effect an arrest, or detention for quarantine purposes. Courts in Australia have also held that, generally, detention of non-citizens for immigration purposes is also valid.\nIn this situation, the court had decided in previous cases that immigration detention, for the purposes of processing and removal, did not infringe on Chapter III. Al-Kateb argued that if indeed the provisions of the", "they will be detained indefinitely by the military in the immediate future so they should not be able to bring their case. But the plaintiff's lawyers rejected this. They argued plaintiffs had legal standing to challenge Section 1021(b)(2) of the National Defense Authorization Act of 2012 because it interfered with their right to free speech by creating a basis to fear that they might be placed in military detention on the basis of their activities.\nA critical issue in the lawsuit has been what the words \"substantially supported\" mean in the provision because the government claims it can detain people who" ]
Why do computer telephone response systems always ask me to type a bunch of info, then transfer me to a human who asks for the exact same info?
[ "I used to work for costumer service and we do this to make it an unpleasant experience for the costumer so that they never call again.\nIt's the same concept as those In-mail rebates that tend to be annoying to complete.\nThat's why I ended up quitting. I didn't like the whole idea of treating the customers bad.", "the initial information your provide to the automatic service (IVR) is generally used to direct you to the correct department. then the agent asks for your details to satisfy the requirements of data protection regulations\n\nhowever, many companies just use the first automatic part to delay things a bit so they can manipulate stats. average waiting time, for example, may be calculated from after when the automatic part is done. \n\nso, you may spend say 5 mins doing the auto shit, then another 5 mins in a queue, but the company will claim all calls are answered within 5 minutes when, in reality, it's 10 mins before you speak with someone\n\nalso, when the call is charged per minute, it's an easy way for the company to increase their revenues by increasing call length \n\nfinally, it's worth bearing in mind that when you call a company, you probably are not even speaking with someone who works for that company, but rather and agent who works for an outsourcer. outsourcers pay minimum wage with vague promises of bonuses that they will generally go out of their way to not pay.", "Former call center rep here. I can't speak for all call center systems, but in my particular case I was working at an outsourced call center. Our client, a cell phone service provider, used both outsourced call centers and in-house call centers. If the customer got an in-house center, their information that they had entered popped up on the rep's screen automatically. If they got us instead, that information wasn't delivered to us and we had to ask the customer for it all over again.", "Currently working in a call center (for a Canadian ISP). As a customer, please remember that customer service agent have no power whatsoever in changing that system which make you wait on the phone or ask you to choose between tons of options. If a customer call and ask why he always have to go through all kinds of options before talking to an human, all I can answer is that it's the way the system is done. As a simple agent, I can't do anything about it so, even if you are angry, it won't change anything. The real people who could make a real change to that system aren't the agents on the phone, you won't be able to contact them directly. The best phone system I've seen (meaning it was a bit less annoying) is with my bank account support system. You simply have to say, in a few words, what you want and the speech recognition system do the rest of the job, transferring you to the right place.\n\nAlso, doing technical support, we may have to ask you simple question like \"can you check to see if there's visible damage on the phone cable?\", you may be tempted to answer \"yeah I already know there's no damage, no need to ask that stupid question\". Problem is, you may already know your cables are perfectly good but, for us on the other end, we don't know yet, we have to check it no matters how convinced you seem to be. Also, your computer is not owned by the ISP so we don't officially have to support it, just be gentle and we may give you a few advises. If you are angry and are yelling at us because your computer is not working or is filled with malwares, we'll just ask you if there's our company logo on it and then we'll end the call.\n\nSame goes for pricing, I do technical support because it's where I'm good at and I'd hate to work as a sale representative, if you ask me why your bill is so high, I'll just transfer you to billing department.", "This might just get buried but I train customer service agents, and based on experience, here's why:\n\nThe first set asked by the IVR can do two things: either 1) send you to the right department depending on your account number of social security, and 2) pull up your account automatically once an agent answers your call, making it more efficient without the agent needing to search for your information again.\n\nThe second set asked by the agent is to make sure that you are indeed the person who owns the account (asking you stuff about yourself, personal information, and getting your voice over the recording). Similar experiences, a wife can just type in the husband's account number and social security in the IVR, but when the agent picks up her call, she is not given authority to access the account as she is not the account owner. An IVR cannot detect this, thus the need for an agent.\n\nPeople get annoyed because most of the time because it's usually the account owner calling in to get information or to ask for help, and they don't see why it's important to ask for his information twice. But what they don't see is that sometimes 3rd party people do try and access their accounts, checking for information or trying to withdraw money without their consent, and this method prevents it.\n\nEDIT: Added more detail" ]
[ "choose not to answer by screening calls with answering machines or caller ID. The fact that only a small percent of the population is willing to participate can lead to biased or unreliable results. As they are conducted over the phone, they are also disadvantaged a lack of body language or visual observations.\n2.Time control\nThe key of high respondent rate is to control the time of survey. The interview may disrupt the personal time of respondents because they may be involved in other activities, such as eating dinner or watching television. It is necessary to create closed-end questions.\n3.The source of numbers\n", "to a special rate structure.\nThe argument was made that since telephone numbers are needed to connect your calls that this information cannot be considered private as telephone companies would have access to this information in order to connect your call.\nTelephone users, in sum, typically know that they must convey numerical information to the phone company; that the phone company has facilities for recording this information; and that the phone company does in fact record this information for a variety of legitimate business purposes. Although subjective expectations cannot be scientifically gauged, it is too much to believe that telephone subscribers, under", "TeleZapper Background Telemarketing companies typically use predictive dialers to place many calls simultaneously. When the equipment detects that someone has answered one of the many calls it has made, it quickly transfers that call to an available agent. Unanswered calls, or numbers that are disconnected, are not transferred to agents and the call is terminated automatically.\nIn this way, the agent is spared the time of dialing a call and waiting for an answer, and can simply speak to waiting calls that have been already set up. Additionally, if a number is determined to be disconnected, the equipment will usually mark", "found in offices that handle large volumes of incoming phone calls from callers who have no need to talk to a specific person, but require assistance from any of multiple persons (e.g., customer service representatives or emergency services dispatch centers) at the earliest opportunity. \nThere are several contact routing strategies that can be set up within an algorithm based on a company's needs. Skills-based routing is determined by an operator's knowledge to handle a caller's inquiry. Virtual contact centers can also be used to aggregate the skill sets of agents to help multiple vendors, where all real-time and statistical information", "on computer credit scores and do not meet with a customer to discuss his or her individual needs, instead basing a decision upon information stored in computers. Some organisations attempt to offset this attitude by moving away from reliance on electronic information and using a human approach towards requests.\n\"Computer says no\" happens in a more literal sense when computer systems employ filters that prevent messages being passed along, as when these messages are perceived to include obscenities. When information is not passed through to the person operating the computer, decisions may be made without seeing the whole picture.", "response software collects the results, and the aggregate data is graphically displayed within the presentation for all to see. Some clickers also have additional keys, allowing the presenter to ask (and audience members to answer) True/False questions or even questions calling for particular numerical answers.\nDepending on the presenter's requirements, the data can either be collected anonymously (e.g., in the case of voting) or it can be traced to individual participants in circumstances where tracking is required (e.g., classroom quizzes, homework, or questions that ultimately count towards a student's course grade). Incoming data may also be stored in a database", "Predictive dialer A predictive dialer dials a list of telephone numbers and connects answered dials to people making calls, often referred to as agents. Predictive dialers use statistical algorithms to minimize the time that agents spend waiting between conversations, while minimizing the occurrence of someone answering when no agent is available.\nWhen dialing numbers one at a time, there are two sources of delay. First, only some fraction of dials are answered; for example, if 1 out of 3 dials are answered, a predictive dialer might dial 3 lines every time an agent becomes available. Second, even dials that are answered", "Therefore, the respondents' personal information may be disclosed. The Process of Create a Automated Telephone Survey 1.Set the questions and design the survey via the website.\n2.Record questions in your own or somebody else’s voice in good manner.\n3.Upload your respondent phone list and dial the number automatically.\n4.Get response in time.", "who has answered the other phone. From that point, the two strangers become a team.\nThe team must complete a series of tasks in order to gain four memory cards, which are used later. They learn of their tasks by following instructions the Cluemaster gives them via phone calls or SMS. Once the tasks have been completed the team is told to insert all the cards they have collected into a computer with each card revealing an image on screen showing their final destination. Therefore, the more memory cards the team has, the more pictures they receive and the easier it", "interactive teletext, the user calls a special telephone number with a push-button telephone. A computer then instructs them to go to a teletext page which is assigned to them for that session.\nUsually the page initially contains a menu of options, from which the user chooses using the telephone keypad. When a choice has been made, the selected page is immediately broadcastfo viewing. This is in contrast with usual teletext where the user has to wait for the selected page to be broadcast.\nThis technology enables teletext to be used for games, chat, access to databases etc. It overcomes the limitations on", "coded-call indicator working would have made them dialable points from other exchanges, despite the absence of local dial.\nIf a manual exchange did not have call indicator equipment but did have a published numeric exchange prefix, incoming calls from automatic exchanges would be prompted manually with \"Number, please?\" after the first few digits (or, in fixed-length store-and-forward systems like the UK director exchanges, the entire number) had already been dialed. In adjacent communities, a dial subscriber would often need to call the neighboring community. The directory would often instruct him to dial a single digit, such as seven, which", "refers to analogue sites, which support voice, fax and data transmission via landlines by adhering to specific protocols established by the ITU-T. Any incoming call is not identifiable with respect to these properties in advance of going \"off hook\" by the terminal equipment. So after going off hook the calls must be switched to appropriate devices and only the voice-type is immediately accessible to a human, but perhaps, nevertheless should be routed to a TAD (e.g. after the caller has identified itself, or has been identified by a recognized caller ID).\nStarting with the integration of faxing devices into computers via", "Voice activity detection Use in telemarketing One controversial application of VAD is in conjunction with predictive dialers used by telemarketing firms. In order to maximize agent productivity, telemarketing firms set up predictive dialers to call more numbers than they have agents available, knowing most calls will end up in either “Ring – No Answer” or answering machines. When a person answers, they typically speak briefly (“Hello”, “Good evening”, etc.) and then there is a brief period of silence. Answering machine messages usually contain 3–15 seconds of continuous speech. By setting VAD parameters correctly, dialers can determine whether a person or", "delays, contained little content other than the caller's name and number, and were often inaccurate, with misspelled names and wrong phone numbers.\nTape-based telephone answering machines had come into the residential telephone market, but they weren't used much in the corporate environment due to physical limitations of the technology. One answering machine was needed for each telephone; messages couldn't be recorded if the user was using the phone; messages had to be retrieved in sequential order; and messages couldn't be retrieved remotely, selectively discarded, saved, or forwarded to others. Further, the manufacturers of PBXs (private branch exchanges—the name for corporate phone", "Proceed-to-select In telecommunications, proceed-to-select is a signal or event in the call-access phase of a data call, which signal or event confirms the reception of a call-request signal and advises the calling data terminal equipment to proceed with the transmission of the selection signals.\nExamples of proceed-to-select pertain to a dial tone in a telephone system.", "to locate persons with specific titles or job functions inside specific organizations. It is considered \"primary\" research and as such is not to be confused with the practice of finding information elsewhere (on the Internet) and then using the telephone to \"check\" it for verification (is the person \"still there\"; has the person's title changed?). True phone sourcing is practiced by a minority in the personnel sourcing community and requires a mastery of verbal communication techniques.\nTelephone sourcing brings forth the majority of the existing workforce that are not locatable on the Internet. \"Not locatable\" means that a potential candidate cannot", "Answering machine The answering machine, answerphone or message machine, also known as telephone answering machine (or TAM) in the UK and some Commonwealth countries, ansaphone or ansafone (from a trade name), or telephone answering device (TAD), is used for answering telephones and recording callers' messages.\nUnlike voicemail, which can be a centralized or networked system that covers, and mostly extends, similar functions, an answering machine is set up in the user's premises alongside—or incorporated within—the user's land-line telephone. Unlike operator messaging the caller does not talk to a human.\nAs landlines become less important, due to the shift to cell phone technology,", "their activities.\nFor example, most current phone systems transmit caller ID information by default to the called party (although this can be disabled either for a single call or for all calls). If a person calls to make an inquiry about a product or the time of a movie, the party called has a record of the calling phone number, and may be able to obtain the name, address and other information about the caller. This information is not available about someone who walks into a store and makes a similar inquiry. Effects of surveillance on lawful activity Online surveillance, such", "call to the right department at a business you're calling. It's also sometimes used for the ability to use your personal computer to initiate and manage phone calls (in which case you can think of your computer as your personal call center). CTI is not a new concept and has been used in the past in large telephone networks, but only dedicated call centers could justify the costs of the required equipment installation. Primary telephone service providers are offering information services such as automatic number identification, which is a telephone service architecture that separates CTI services from call", "senders, which registered and stored the digits that the customer dialed, and then translated the received digits into numbers appropriate to drive the selectors to their desired position: District Brush, District Group, Office Brush, Office Group, Incoming Brush, Incoming Group, Final Brush, Final Tens, Final Units. The use of senders provided advantages over the previous direct control systems, because they allowed the office code of the telephone number to be decoupled from the actual location on the switching fabric. Thus, an office code (for example, \"722\") had no direct relationship to the physical layout of the trunks on the district", "Random digit dialing Random digit dialing (RDD) is a method for selecting people for involvement in telephone statistical surveys by generating telephone numbers at random. Random digit dialing has the advantage that it includes unlisted numbers that would be missed if the numbers were selected from a phone book. In populations where there is a high telephone-ownership rate, it can be a cost efficient way to get complete coverage of a geographic area.\nRDD is widely used for statistical surveys, including election opinion polling and selection of experimental control groups.\nAn important consideration in random digit dialing surveys is bias introduced", "data from the remote telephone's microphone to the local telephone's speaker. The allocated time slot on the wiring out of the concentrator (with the same time slot number) carries data from the local microphone to the remote speaker.\nTo arrange a connection, the switch just completes the circle between the user's phone and the remote phone. It interchanges the data from one to the other. In this limited sense, telephone \"exchange\" is exactly correct terminology. Technology implications Having a concentrator near a subscriber's telephone results in very low signal degradation before the analog signal is digitized. This provides reliably good voice", "and knew one another. Killworth proposed applying the 'Baltimore traffic problem algorithm' to the research challenges this presented. Over the next few years, the partnership would work extensively on the so-called \"small world\", examining differences in the answers to questions such as \"how many people does the average person think they know?\" and \"how many people does the average person really know?\"\nKillworth's interest in social networks increasingly focused on answering challenging questions about issues on which responses from individuals in questionnaires could not be trusted or were unlikely to be reliable, and where direct empirical data was lacking – \"apparently", "possible no matter where the phone is located.\nCaller ID, or Caller Identification is a phone feature that is able to display the phone number of the subscriber originating the voice call from the PSTN to the digital phone network such that the recipient is able to determine who is originating the call.", "Not Call Register on behalf of the Australian Communications and Media Authority. Function The Telemarketing and Research Calls Industry Standard 2007 sets out rules about when and how telemarketing calls can be made and applies regardless of whether numbers called are on the Do Not Call Register or not. Some exemptions apply. The Fax Marketing Industry Standard 2011 sets out rules about when and how marketing faxes can be sent.\nIndividuals can place home, fax or mobile numbers on the Register, provided that the number is used primarily for domestic purposes. After it has been added, telemarketers have 30 days", "with a range of call types had to be manually reassigned to different queue at different times of the day to make the best use of their skills, or face being exposed to a wide variety of calls for which they were not trained. With skills-based routing, the skills needed for a particular call are often assessed by the dialled telephone number and the calling number or caller's identity, as well as choices made in any associated IVR system. Given this assessment, a skills-based routing system then attempts to match the call to a suitably trained agent—the thinking being that", "pass their telephones to message services after hours.\nUniquely in the UK and Ireland the motoring organisations and the recovery operators have worked together to form a common standard for the communication of job details. The system is called Turbo Dispatch and was introduced in 1995. It uses a combination of Mobitex data radios and the Internet to communicate. Its main advantage is that it does away with the need for the information to be re-keyed into all the different computers in use and eliminates most of the delays associated with 'job taking'. If the information is put in correctly at", "a non-electronic central office switch. Previous to this, the calling number could not be identified electronically. Caller ID is made up of two separate pieces of information: the calling number and the billing (or subscriber) name where available. When a call is made from a given name, this name can be passed on through a number of different methods. For example, the caller's name may be datafilled in the originating switch, in which case it is sent along with the number. More commonly, a database is accessed by the receiving switch, in order to match the number to", "one of a number of shared digit receivers (termed originating registers) and connect it to a subscriber who wished to make a telephone call. The digit receiver collected the digits as the customer dialed, and made them available to the Completing Marker, which used them for routing purposes. In this case the Completing Marker would mark a proper path of idle links for the call to make through the mechanical voice switching matrix. Telephone switches that employed markers almost always had several of each type required by the machine. During normal operation, traffic load was balanced evenly among the", "telephone conversation between the advertiser and the interested party.\nAt the same time, a cookie saves information on which online advertising medium led to the telephone call. As a web-based service, this procedure is limited to advertising measures on the internet.\nCallback is often automated through the use of web callback or mobile phone applications. Call number tracking Unlike the call-back procedure, call number tracking does not include any web-based functions but is based on a telephone server solution. As a rule, advertisers are provided a multitude of service numbers for customer feedback, where landline numbers can also be used. This enables" ]
Why is it that lakes/ponds around the world have fairly similar fish, instead of them each having their own unique species of fish like land ecosystems do for animals?
[ "The water in the lake came from somewhere. Most lakes are fed by rivers and streams, or were originally parts of a river network as is the case with [oxbow lakes.](_URL_0_)\n\nA lake that was completely isolated from any other sources of water would eventually see evolutionary divergence if it had unique stressors, but there aren't many, if any, lakes like that, at least aboveground.\n\nAlso a lot of lake and river fisheries are stocked by humans. Like, you'll find largemouth bass in a lot of fisheries around the world, it's especially popular in Japan, but largemouth bass are only native to North America. They were artificially introduced to fisheries elsewhere.", "there are also lots of similar niches that are filled within a lake, I would suggest reading about the cichlids in the lakes in Africa. many of these lakes were populated by a single type of fish and similar natural pressures allowed species to develop in each lake to fill the niches. they are genetically diverse from lake to lake but phenotypically really similar. \n\nalso, land ecosystems don't necessarily have entirely different species. we often see animals with similar \"tools\" to fill environmental niches. natural selection is not able to create generic diversity, rather it works with the diversity that is already present in a population. however, it often causes traits to appear in animals that, although they appear different, give an animal the same ability in a certain environment. cacti are found in deserts all over the world even though they haven't necessarily descended from the same original species.", "1. People introduce fish that they want to catch into the lake, so that they can go fishing. This is how you get \"classic\" species in vastly different locations.\n\n2. In many places, lakes form and disappear relatively quickly on a geological timescale -- it happens quickly enough that you don't see obvious divergence.\n\n3. Fish are sufficiently foreign that they pretty much look the same. There isn't the same \"obvious\" variety like there is in land animals.", "- [Lake Baikal](_URL_3_)\n- [Lake Tanganyika](_URL_3_) (contains cichlids mentioned in /u/meerkatmanor897 reply)\n- [New River](_URL_3_\n\nAll these have endemic species.", "ELI5: This happens, but evolution is really slow and lakes change (relatively) quickly, therefore usually there is access to other large bodies of water on an evolutionary time scale even if there isn't now.", "Aquatic Biologist here:\n\nThere is actually loads of variation in fish between different bodies of water. There are several reasons this isn't apparent to people, though.\n\nFirst, to the untrained eye most fish look like just fish. And fish that you don't fish for are rarely seen by the public. So differences may not be noticed. This is do For example there are hundreds of fish in the southeastern USA that are not found out west. There are about a hundred species of [darters](_URL_5_) in the Eastern USA (many confined to a handful of streams), and maybe 1 or 2 found in Utah. And that's leaving aside differences between continents (Eg: darters in North America, Loaches in Asia, Mormyrids in Africa, Cichlids in the south, Salmonids up north). \n\n\nSecond, the fish we go fishing for in freshwater are widespread due to human intervention. There are carp, trout, largemouth bass and bluegill all over the damn place because people introduce them into every last body of water they come across. In Utah you'd find Rainbow Trout (introduced by people from the Pacific Coast), Bluegill and Bass (Introduced from the East) and Carp (from Asia).\n\n\nThird, there's a bit more connectivity between lakes and rivers than is commonly believed, when you look across long timespans. For example, many fish species are widespread across the entire eastern USA, because over geologic time rivers wander and floods disperse species from watershed to watershed. Take Utah for example. You think all those rivers and lakes should be distinct because they are isolated in a dry environment. But during the last Ice Age [lake Bonneville](_URL_4_) covered the entire northwestern portion of the state and was connected via river outflow to Washington through Idaho.", "??? It is the case.\n\nMost fish that are found freshwater around the world are farmed fish that were introduced there for farming or they are invasive species.\n\n_URL_7_\n\nThe Distribution and Habitat of Cichlids is a good example of how fish spread to fresh water places naturally. There is a large isolated lake in Africa that is all cichlids, just like there is a lake that is all jellyfish.\n\n_URL_6_", "I have a pond on my property that is spring fed. It has no other source in or out. It has never been stocked but it is teeming with fish. I don't know this to be a fact but it's my understanding that birds flying overhead and landing in it have brought eggs with them on their feet or mouths from a meal. Over the years more and more fish spawn but the species of fish are determined by the birds who eat fish and land on the pond. Like I said I have no idea if this is right it's just how it was explained to me. Would be cool if a biologist could chime in and tell me if I'm dead wrong or not." ]
[ "bodies of water. They can be found in nearly all aquatic environments, from high mountain streams (e.g., char and gudgeon) to the abyssal and even hadal depths of the deepest oceans (e.g., cusk-eel and snailfish). At 32,000 species, fish exhibit greater species diversity than any other group of vertebrates.", "different animal species using the wide array of food sources. They, therefore, provide an important source of biological diversity in landscapes.\nVernal ponds are ponds which dry up for part of the year. Naturally occurring vernal ponds do not usually have fish. They are called vernal ponds because they are typically at their peak depth in the spring (the meaning of \"vernal\" has to do with the spring). The absence of fish is a very important characteristic since it provides amphibians with breeding locations free from predation by fish. Hence, introducing fish to a pond can have seriously detrimental consequences. In", "Diversity of fish Fish are very diverse animals and can be categorised in many ways. This article is an overview of some of ways in which fish are categorised. Although most fish species have probably been discovered and described, about 250 new ones are still discovered every year. According to FishBase, 33,100 species of fish had been described by April 2015. That is more than the combined total of all other vertebrate species: mammals, amphibians, reptiles and birds.\nFish species diversity is roughly divided equally between marine (oceanic) and freshwater ecosystems. Coral reefs in the Indo-Pacific constitute the centre of diversity", "aquariums due to their often bright coloration, which typically derives from both pigmented cells and iridescent cells. Tropical fish may include wild-caught specimens, individuals born in captivity including lines selectively bred for special physical features, such as long fins, or particular colorations, such as albino. Some fish may be hybrids of more than one species. Freshwater tropical fish Most fish that are sold as tropical fish are freshwater species. Most species available are generally bred from fish farms in the far east and Florida where tropical temperatures make the commercial production more viable. Mass production of tropical fish from farms", "and to include other native fish which usually live together in nature and as such, represent a particular real-world biotope. An example of one South American biotope type might be lots of bog-wood, a few native plants, dark substrata and subdued lighting with floating plants, along with marbled hatchets, angels, cardinals, otos, corys and plecostomus.", "fished and farmed across Eurasia. In land-locked countries in particular, cyprinids are often the major species of fish eaten because they make the largest part of biomass in most water types except for fast-flowing rivers. In Eastern Europe, they are often prepared with traditional methods such as drying and salting. The prevalence of inexpensive frozen fish products made this less important now than it was in earlier times. Nonetheless, in certain places, they remain popular for food, as well as recreational fishing, and have been deliberately stocked in ponds and lakes for centuries for this reason.\nCyprinids are popular for angling", "not a lot of diversity among the fish; there is a lot of the same kind. Antarctic silverfish and lanternfish are some examples of fish that live in Antarctica.\nSeals are also found in polar regions and number around 2.5 million. They are known to breed on land in the polar regions. Whales are also in the polar regions and can be found near the surfaces of water where they pray.\nThere are also birds that breed in the polar regions. In the Arctic, 95% of the birds breeding here consists of only four different species. These include the northern fulmar, kittiwake,", "However, some fish show a tremendous ability to effectively osmoregulate across a broad range of salinities; fish with this ability are known as euryhaline species, e.g., salmon. Salmon has been observed to inhabit two utterly disparate environments — marine and fresh water — and it is inherent to adapt to both by bringing in behavioral and physiological modifications.\nIn contrast to bony fish, with the exception of the coelacanth, the blood and other tissue of sharks and Chondrichthyes is generally isotonic to their marine environments because of the high concentration of urea and trimethylamine N-oxide (TMAO), allowing them to be in", "differences in the fish fauna that inhabits the two lakes, but also many shared species. Initial surveys were performed by George Albert Boulenger more than a century ago and there have been relatively few later studies of the fish fauna in the lake. For example, the first study of its northern part was only conducted in 2002. More than 30 fish species are known, but the actual figure is presumed to be considerably higher. There are five known endemics: the catfish Amphilius opisthophthalmus and the cichlid Hemichromis cerasogaster were scientifically described by Boulenger. The remaining are relatively recent discoveries", "of factors, such as their optimal acidity, a great richness of nutrients, or even, among other things, the zones of rapids alternating with calmer zones. These waters permit the park have not only a great number of species, but also a great number of individual fish and certain fish of enormous size. Among the species present, one can name several species of cyprinids (the family of carp, minnows, barbs, barbels, and others), of which in particular the asp, rare in Sweden. The waters abound also with northern pike, with specimens weighing sometimes 20 kg (44 lb), with European perch, with zander, and", "include doel, salik, crow and duck. Fish In the river, canal, beels, and ponds there are various kinds of fish, but because of water pollution, it is very hard to see fish in the river.", "Composite fish culture The composite fish culture system is a technology developed in India by the Indian Council of Agricultural Research in the 1970s. In this system, of both local and imported fish, a combination of five or six fish species is used in a single fish pond. These species are selected so that they do not compete for food among them by having different types of food habitats. As a result, the food available in all the parts of the pond is used. Fish used in this system include catla and silver carp which are surface feeders, rohu, a", "but there are also many species from other groups such as the cyprinodontiforms and cichlids. While the majority of Brazil's fish species are native to the Amazon, the Paraná–Paraguay and the São Francisco river basins, the country also has an unusually high number of troglobitic fish, with 25 species (15% of the total in the world) known so far. The most well-known fish in Brazil is the piranha.\nOther aquatic and amphibian animals found in Brazil include the pink dolphin (the world's largest river dolphin), the caimans (such as the black caiman), and the pirarucu (one of the world's largest river", "Poecilia sphenops Biology Contrary to popular belief, this species of fish is actually a freshwater species, spending little time in brackish water before swimming back to their freshwater biotope. However, fish of the same species have been found in coastal sea waters, brackish swamps and freshwater streams, living and breeding. Mollies appear to be a hardy and highly adaptable species (this has been diluted over years of interbreeding in tank-bred specimens).\nMollies are similar in appearance to their livebearer cousins, the platy, swordtail and guppies; the molly tends to be slightly larger and more energetic. Many aquarists note the stronger individuality", "in their natural habitat. They are a mostly peaceful fish if kept in a school of at least five fish, but their large size makes them unsuited to a community of small fish.", "species of reptiles, 24 species of fish, 14 species of shrimp, 15 species of crab, and 16 species of manta rays, sharks, and game fish. Most fishes are typical of coral reefs, such as butterflyfish. Other common inhabitants are blue crab, swimming crab, mudskipper, humpback shrimp, mud lobster, pomfret, sole, anchovy, scad, rock cod, rainbow cuttlefish, soft cuttlefish, musk crab, mackerel, moray eel, puffer fish, rabbitfish, groupers, black sea cucumber, brain coral, staghorn coral and flowerlike soft coral. Amphibians include Fejervarya raja, cricket frog (Fejervarya limnocharis) and the common tree frog. Aquatic plants are represented by red algae, Halimeda, seagrass,", "only a few fish species are able to live in either lake (brown trout, rainbow trout, largemouth bass, bluegill, crappie, yellow perch, catfish and sturgeon). The government classifies the lake as eutrophic.\nThere have been considerations of using a special aerator for lakes called a \"Speece Cone\", some parts of the world that have eutrophic lakes use biological means such as Dyes, Enzymes, \nand Barley Hay to remedy algae issues in eutrophic lakes. \"Dead Zone\" One of the reasons the lake cannot support many fish is because of severe pollution from phosphorus, nitrogen, ammonia, As well as lack of circulation to", "depending on where they are found; those found in American waters tend to be larger due to the longer summers, which allow them to eat and grow for a longer period of time.\nTheir habitat plays a significant role in their color, weight, and shape. River water smallmouth that live in dark water tend to be rather torpedo-shaped and very dark brown to be more efficient for feeding. Lakeside smallmouth bass, however, that live in sandy areas, tend to be a light yellow-brown and are more oval-shaped.\nThey have been seen eating tadpoles, fish, aquatic insects, and crayfish. There are two recognized", "which are rich in sedges, rushes and cottongrass and moss communities.\nThe fish population is primarily influenced by the angling clubs that lease fishing rights and stock the ponds with fish. Only native species of fish are desired, although eel and catfish are excluded due to their incompatibility with the crayfish populations.", "overlapping scales. Bony fish have a swim bladder which helps them maintain a constant depth in the water column, but not a cloaca. They mostly spawn a large number of small eggs with little yolk which they broadcast into the water column. Body In many respects fish anatomy is different from humans and mammals, yet it shares the same basic vertebrate body plan from which all vertebrates have evolved: a notochord, rudimentary vertebrae, and a well-defined head and tail.\nFish have a variety of different body plans. At the broadest level their body is divided into head, trunk, and tail,", "those fish species that are usually consumed by the average American. Their size is of particular note, because the fish respond to vibrations from motors as boats move through water by jumping out of the water, potentially hitting and injuring boaters. History Silver carp were among several species imported to the United States, notably to Arkansas, in the 1970s as a way to reduce algae in commercial fishing ponds. Flooding events along the Mississippi River and its tributaries during the 1980s are commonly considered to have been what allowed the fish to escape those commercial ponds and make their way", "very different compared to other fish. The size and shape of the mouth are distinct because of its ventral mouth and these fish usually are triangular or cylindrical when looking at it from the side. Not much is known about the reproduction in these fish. It has been determined that July to October is when they spawn and that they swim in pairs during this spawning time. Species of Synodontis have been noted to reproduce with the flooding period of the rainy season. Relationship to humans Many Synodontis species are prized ornamental fish in the fishkeeping hobby. While some", "to such shoals, the fish reorganize themselves so that each individual ends up being closer to members of its own species.\nFish tend to prefer shoals made up of individuals that match their own size. This makes sense as predators have an easier time catching individuals that stand out in a shoal. Some fish may even prefer shoals of another species if this means a better match in current body size. As for shoal size however, hunger can affect the preference for similarly-sized fish; large fish, for example, might prefer to associate with smaller ones because of the competitive advantage they", "Outline of fish The following outline is provided as an overview of and topical guide to fish:\nFish – any member of a paraphyletic group of organisms that consist of all gill-bearing aquatic craniate animals that lack limbs with digits. Included in this definition are the living hagfish, lampreys, and cartilaginous and bony fish, as well as various extinct related groups. Most fish are ectothermic (\"cold-blooded\"), allowing their body temperatures to vary as ambient temperatures change, though some of the large active swimmers like white shark and tuna can hold a higher core temperature. Fish are abundant in most", "4 mm long and transparent except for the eyes which have some pigmentation. Ecology Herring-like fish are the most important fish group on the planet. They are also the most populous fish. They are the dominant converter of zooplankton into fish, consuming copepods, arrow worms chaetognatha, pelagic amphipods hyperiidae, mysids and krill in the pelagic zone. Conversely, they are a central prey item or forage fish for higher trophic levels. The reasons for this success is still enigmatic; one speculation attributes their dominance to the huge, extremely fast cruising schools they inhabit.\nOrca, cod, dolphins, porpoises, sharks, rockfish, seabirds, whales, squid, sea", "Richardson later proved the fish was different by pointing out the difference in coloration. When the names were published as separate species, it was unknown if they were really different species. Kuep gave the species name as Sidera pantherina. Blecker later changed it to its current name. The reason why the name is still the same is because of all three people's work. Habitat The peppered moray can commonly be found in tropical marine waters of the Indo-Pacific and from islands of the tropical Eastern Pacific. They can also be found in very shallow water on reef flats. Places where", "fish can be distinguished from the green/bronze corydoras catfish by its usually larger size, stouter body, and more pointed snout.\nThe fish inhabits sluggish waters with dense vegetation along the banks. It occurs in shallow muddy waters and will grow in length up to 7.5 centimetres (3 in). It lives in a tropical climate in water with a 5.8–8.0 pH, a water hardness of 2–30 dGH, and a temperature range of 22–28 °C (72–82 °F). It feeds on worms, benthic crustaceans, and insect larvae. It lays eggs in dense vegetation and adults do not guard the eggs. In the aquarium The emerald catfish is a", "has several lakes, estuaries small streams. The variety of fishes offered by these rivers is good, because it has several species of different sizes. Among the most prized species are the Surubí that, for anglers, is one of the coveted specimens. This is due to the size it can reach. Round about 50 kg, was also recorded unique pieces up to 100 kg, which can measure up to 2 m long. Also highlights the Dorado who is famous for its acrobatic jumps, making it the biggest haul when fishing.\nOne of the richest cities in the production of fish is Villa Florida, whose", "Coldwater fish Wild fish The term is also used to refer to fish species in the wild (such as lake trout, Arctic char, and Arctic grayling), that prefer colder waters.", "Fish The country's fresh water basins and the Caspian Sea account for 97 species of fish of which eight are introduced and seven of these have become widespread. There are also over 15 thousand species of invertebrates in Azerbaijan. Most can be found in the Kur River, surrounding lakes, as well as in the Mingechevir reservoir. Most of fish are anadromous or semi-anadromous (the young grow up in salt water and migrate to fresh water to breed after they reach maturity). The most valuable of anadromous fish are salmon, sturgeon, stellate sturgeon and beluga. Aspius, Chalcalburnus and eel are also" ]
How bars or clubs charge huge crowds of people randomly ordering drinks.
[ "people either start a tab or they pay up front. it's part of a bartender's job to make sure they get paid for their goods/services. i'm sure some bars and bartenders will allow regulars to get away without paying upfront in certain scenarios, but that really depends on the business and employees.", "When you order a drink, you either open a tab (usually they keep your card) and give them your name each time you order, or you pay with each drink. If you opened a tab, you have to come back to the bar before leaving if you want your card back, or if they don't keep your card they just charge you at the end of the night if you don't close out and add a tip, but that's less common.", "Typically, likes others have said, you open a tab with your credit card. Then when ordering, you tell them your last name and they charge it to that account and then you close it out before you leave. There's no way a bartender could remember names like that in a packed place.", "Typically these clubs are only hiring the cream of the crop bartenders who can keep track of this many customers. Your local barkeep can't but these are the Top Guns of the bartender world." ]
[ "events when the bar staff show particular skill, hard-work or good-humour. But again, this is rare. In addition, unless there are waiters, patrons must order their drinks at the bar, pay the bartender and bring drinks to their seats. It is traditional that, when with a group, patrons take turns buying rounds of drinks for the group as a whole. It is considered bad manners to leave before buying your round of drinks. The traditional Irish toast is \"Sláinte\" (SLAWN-chuh) which is the Gaelic equivalent of \"cheers\". Traditional Irish music Traditional Irish music cannot be found in every Irish pub", "Ruth's Chris, which has a large contingent of out-of-town businesspeople who are used to ordering alcoholic drinks after work, have to inform their patrons of laws requiring that no more than 1.5 oz. of alcohol be poured into any drink and that an order of a food item is also required. Out-of-state restaurants that rely heavily on brunch revenue would suffer due to the ban on bloody marys and mimosas before 12 p.m.\nMany chains fear they would face unfair competition and costs when going head-to-head with restaurants that are grandfathered in and not required to have the zion curtain installed.", "young adult male (typically a tourist) being approached by a beautiful woman (typically either a local or claiming to be) who recommends a \"favorite local\" bar or club. The man is usually seated at a table and joined by a \"hostess\", who may or may not order drinks. Whether or not any \"services\" are performed or drinks are ordered has little bearing on the outlandish bill received at the end of the night. Bills are commonly hundreds of - if not over a thousand - dollars, listing items like a \"hostess fee\" or \"service charge\" that were not originally mentioned", "Many of the bars only welcome regular customers, who initially should be introduced by an existing patron, although many others welcome non-regulars, some even making efforts to attract overseas tourists by displaying signs and price lists in English. Some bartenders are foreign.\nMany of the bars have a particular theme, such as jazz, R&B, karaoke, punk rock, or flamenco, and their ramshackle walls are sometimes liberally plastered with movie, film and concert posters. Others cater to customers with a particular interest, such as go, exploitation films, or horse racing. Most of the bars don't open until 9 or 10pm, so the", "Pub token Usage In both the UK and the US, during the 17th to 20th centuries, public houses sometimes issued tokens which could be used in payment for future drinks. These tokens were sometimes used in small, family bars where patrons knew each other. They were also used in saloons and hotel bars. When buying a round of drinks for friends, the bartender would give a token to those patrons already having a drink, and collect the full sum from the round-buyer. The owner would collect immediately, and the drinkers would have a token for later use. As the token", "Therefore, Spaniards often go \"bar hopping\" (Spanish: Ir de tapas) and eat tapas in the time between finishing work and having dinner. Since lunch is usually served between 1 and 4 p.m., another common time for tapas is weekend days around noon as a means of socializing before proper lunch at home.\nIn origin, a tapa was a free portion of food, generally small, served with any drink ordered. In Spain, tapas are traditional in Andalusia, Murcia, León, Extremadura, and Ciudad Real.\nIt is very common for a bar or a small local restaurant to have eight to 12 different kinds", "usually well-trained in mixology, and may also be the manager or mamasan. Hostess clubs are distinguished from strip clubs in that there is no dancing, prostitution, or nudity. \nHostesses often drink with customers each night, and alcohol problems are fairly common. These problems are derived from mass consumption of alcohol by which many consequences may arise. Most bars use a commission system by which hostesses receive a percentage of sales. For example, a patron purchases a $20 drink for the hostess, these are usually non-alcoholic concoctions like orange juice and ginger ale, and the patron has purchased the hostess's attention", "Afterhours club An afterhours club (aka after hours club and afterhour club) is a nightclub that is open past the designated curfew closing time for clubs that serve alcohol (which is often an hour long). Such clubs may cease serving alcohol at the designated time, but have special permission to remain open to customers and to sell non-alcoholic sodas and (typically) high-caffeine drinks.\nMore recently (since 2000), in Western Europe - specifically in Germany, Spain and the United Kingdom, 24 Hour \"music and dance\" licences have been granted and which do not necessarily have alcohol restrictions.\nIn North America, after hours clubs", "type of Japanese drinking establishment which also serves food to accompany the drinks. A speakeasy is an establishment that illegally sells alcoholic beverages. Bar Types of bars range from seedy bars or nightclubs, sometimes termed \"dive bars\", to elegant places of entertainment for the elite. Many bars have a happy hour to encourage off-peak patronage. Bars that fill to capacity sometimes implement a cover charge during their peak hours. Such bars often feature entertainment, which may be a live band or a popular disc jockey. Bars provide stools or chairs that are placed at tables or counters for their patrons.", "often drinking far past a healthy limit, usually while trying to hide their drunkenness. Because the base hourly wage is usually extremely low, almost any man can become a host regardless of looks or charisma (depending on the bar). However, hosts who cannot increase their sales usually drop out very soon, because of the minimal wage. The environment in a host bar is usually very competitive, with tens of thousands of dollars sometimes offered to the host who can achieve the highest sales. Drinks Many of the clientele who visit host bars are hostesses who finish work at around 1:00", "in a booklet. The shows take place on the upper floors of bars and strip clubs in locations such as Bangkok's entertainment district Patpong, while bikini-clad women dance in the ground floor bars. An entry fee is usually charged, often equivalent to around US$10, though typically nearer US$20 in Bangkok. In some cases, instead of a cover charge, the drinks are priced 3–4 times higher than usual and a purchase is required. Other possible charges can include show fees and exit charges. In addition, performers often go around asking for tips after they have finished their acts. In Laos The", "Cocktail waitress A cocktail waitress is a female server who brings drinks to patrons of drinking establishments such as bars, cocktail lounges, casinos, comedy clubs, jazz clubs, cabarets, and other live music venues. Casinos traditionally dress their cocktail waitresses in fancy outfits with very short skirts and pantyhose or fishnet stockings, while less flashy establishments may require waitstaff attire. Playboy Bunnies are a famous example of the profession. In the United States, cocktail waitresses are common in casino towns like Atlantic City, Las Vegas, and Reno.", "customers or celebrities may be put to the front of the line. In restaurants, customers may also be able to jump the line by giving a large gratuity or bribe to the maitre d'hotel or head waiter. Some restaurants which are co-located with or combined with a retail store or gift shop ask customers who are waiting for a table to browse in the merchandise section until their table's availability is announced on a PA system or via a pager; this strategy can lead to increased purchases in the retail part of the establishment. One combination restaurant/store is the US", "paths. Customers take the food that they desire as they walk along, placing it on a tray. In addition, there are often stations where customers order food, particularly items such as hamburgers or tacos which must be served hot and can be immediately prepared with little waiting. Alternatively, the patron is given a number and the item is brought to their table. For some food items and drinks, such as sodas, water, or the like, customers collect an empty container, pay at the check-out, and fill the container after the check-out. Free unlimited second servings are often allowed under", "at mid- to high-priced restaurants, customers sit at tables, their orders are taken by a waiter, who brings the food when it is ready. After eating, the customers then pay the bill. In some restaurants, such as workplace cafeterias, there are no waiters; the customers use trays, on which they place cold items that they select from a refrigerated container and hot items which they request from cooks, and then they pay a cashier before they sit down. Another restaurant approach which uses few waiters is the buffet restaurant. Customers serve food onto their own plates and then pay at", "The male groups are assigned a waiter who for tips will try and bring female patrons to their table, if they see a specific girl on the dance floor that they are interested in they may ask their waiter to try and bring her to their table. Although to outsiders, these clubs have been mistaken for hostess clubs, the women are not employees nor are they prostitutes but fellow clubbers, they are free to leave at any time, and male patrons should not make the mistake that their payment to the waiter, however much it may be, entitles them to", "is considered the proper way to treat a host. It is possible to go on day trips or travel with a host, but a host can only go with their own customer. A host interacting with another host's customer is liable to be fined or fired from the club. Drinks can be purchased on tab, but contact information is taken and the customer must pay later. If the customer does not pay, the host must. It is considered rude to leave a customer alone, called \"only\" (オンリー onrī). A customer who is abusive and troublesome is called a \"painful customer\"", "hall. Dance hall owners paid employees to stage nasty dancing, fake fights, and scuffles on the dance floor for their gaping viewers' entertainment. The owners purposely geared their fake floor shows to shock, but not to repulse. High prices were charged to those in the slummers' balcony and there were differing prices for alcohol, depending on whether a customer was on the dance floor, in the slummers' gallery, or in a private booth. The Hippodrome, Olympia, Midway, and Thalia dance halls all had slummers' balconies.\nThe large dance floors became a main attraction for those in the slummers' balconies. A principal", "hired to dance with patrons. These clubs no longer use the ticket-a-dance system, but have time-clocks and punch-cards that allow the patron to pay for the dancer's time by the minute. The clock used by the cashier to determine the cost of time spent with a hostess is often set a few minutes later than the clock used to print the checkout time on the ticket, thus fraudulently increasing revenues for the establishment and hostess alike. Particularly accommodating hostesses often expect tips equivalent to the amount charged for their time. Some of these modern dance clubs exist in the", "\"hosts\" at the bar have the job of entertaining female customers by flirting with them in hopes that they spend more money on alcohol. Each host came from a different background, including a street performer and a banker.\nThe drama in the film begins when they discover the bar's manager has stolen several of their deposits. Not wanting to see the men fail, the bar's owner gives up the bar to the men, so they are able to open their own \"host club.\" The bar owner's granddaughter, played by Riko Narumi, help the men get started and teaches them how to", "from offering both full nudity and alcohol sales. Establishments that possess a retail license and serve alcohol can only offer partially clothed services such as go-go dancing (typically in bikinis or lingerie). Clubs that are not licensed to serve alcohol will work around the restriction by implementing a bring your own bottle (BYOB) policy and operating as a \"juice bar\". Juice bars have the appointments of full bars but only serve non-alcoholic beverages such as water, fruit juice, and flavored carbonated beverages. Such a bar could double as a service counter for the storage of BYOB material and offer ice", "and the dishes as they are served abroad. Mexico In Mexico, there are not many tapas bars. However, the \"cantinas botaneras\" come close to the Mexican version of a tapas bar, but they operate on a very different business model. The appetizers (\"botanas\") keep coming as long as the patron keeps ordering beer, liquor or mixed drinks. The more the patron drinks, the more they eat. These establishments, some over a hundred years old, such as La Opera, are particularly popular around the Centro Histórico in Mexico City, but there are similar cantinas farther out in other regions of the", "the 'bar' may constitute the very center of social life, and it is customary that, after social events, people go to bars, including seniors and children alike. United Kingdom In the UK, bars are either areas that serve alcoholic drinks within establishments such as hotels, restaurants, universities, or are a particular type of establishment which serves alcoholic drinks such as wine bars, \"style bars\", private membership only bars. However, the main type of establishment selling alcohol for consumption on the premises is the public house or pub. Some bars are similar to nightclubs in that they feature loud music, subdued", "by a bartender is called \"the bar\". This term is applied, as a synecdoche, to drinking establishments called \"bars\". This counter typically stores a variety of beers, wines, liquors, and non-alcoholic ingredients, and is organized to facilitate the bartender's work.\nCounters for serving other types of food and drink may also be called bars. Examples of this usage of the word include snack bars, sushi bars, juice bars, salad bars, dairy bars, and ice cream sundae bars. Australia In Australia, the major form of licensed commercial alcohol outlet from the colonial period to the present was the pub, a local variant", "loss or increase in appetite, insomnia and lack of energy the following day. Measures against botellón Since botellón is usually a nighttime activity, Spain passed a law that prohibits stores to sell alcohol to the public after 10:00 p.m, hoping to persuade people to attend clubs or bars where alcohol must remain on site. However, the measure is a controversial one because people can still buy alcohol before the selling limit hour and consume it in public. Furthermore, the enforcement of the law is strongest in the most populated botellón areas and has caused some stores away from these enforcement", "drinks as well as other beverages and simple snacks such as crisps, peanuts or pretzel sticks. Most establishments feature loud music and some have frequent live performances. While Polish word bar can be also applied to this kind of establishment, it is often used to describe any kind of inexpensive restaurant, and therefore can be translated as diner or cafeteria. Both in bary and in puby, the counter at which one orders is called bar, itself being another obvious loanword from English.\nBar mleczny (literally 'milk bar') is a kind of inexpensive self-service restaurant serving wide range of dishes, with simple", "Host program. Dance hostesses (male and female) are also available for hire in Vienna, Austria, where dozens of formal balls are held each year.\nVolunteer dance hostesses (experienced male and female dancers) are often used in dance styles such as Ceroc to help beginners. United States There remain a handful of nightclubs in the United States, particularly in the cities of New York and Los Angeles, where an individual can pay to dance with a female dance hostess. Usually these modern clubs forgo the use of the ticket-a-dance system, and instead have time-clocks and punch-cards that allow a patron to pay", "Taco stand A taco stand or taqueria is a food stall, food cart or restaurant that specializes in tacos and other Mexican dishes. The food is typically prepared quickly and tends to be inexpensive. Many various ingredients may be used, and various taco styles may be served. Taco stands are an integral part of Mexican street food. Tacos became a part of traditional Mexican cuisine in the early 20th century, beginning in Mexico City, as what had been a miner's snack began to be sold on street corners in the city. Shops selling tacos have since proliferated throughout Mexico and", "is able to drink from his mug and members are required to verify their ownership with a recognized form of identification. Mug club members at Dark Horse have a punched-card system where every sixth mug is 50 cents.\nThe taproom also offers a variety of food, with the cuisine centered around typical barfood items which can be produced in their pizza ovens. Menu items besides pizza include : pretzels and beer mustard, nachos, bruschetta, cheese bread, salads, soups, and sandwiches.\nThe Dark Horse taproom also will not play music by AC/DC or Def Leppard under any circumstances . Awards The craft beer-rating website", "holder or back into their paper slip. Good manners dictate that one respects the selections of the host. However, this can be set aside for a diner with allergies such as a peanut allergy, or a religious prohibition against certain foods like pork. Drinking Even in informal situations, drinking alcohol starts with a toast (kanpai, 乾杯) when everyone is ready. Do not start drinking until everybody is served and has finished the toast. It is not customary to pour oneself a drink; rather, people are expected to keep each other's drinks topped up. When someone moves to pour one's drink," ]
What is Operator Overloading
[ "In programming operator overloading is when you take a simple mathematical or logical operator like + or ! and define what that means. It's generally only applied to user-defined types/classes/objects, as the definition of these operators tends to be predefined for numbers etc.\n\nImagine you have an object X, only you the programmer can define what it means to add two X objects together. X might represent a list of objects in which case the result would be an X representing the concatenation of both lists. X might represent a mathematical vector, so the result would be an X representing a vector that's the result of adding the two argument vectors together. \n\nThe best example for this is C++'s [std::string](_URL_1_) which has an operator+ that takes two strings and returns the string representing the concatenation of the two arguments. \n\nSome languages (again using C++ as an example) have conversion operators as well, such as [operator bool on std::shared_ptr](_URL_0_) which defines how to convert a shared_ptr to a boolean for use with (for example) `if(!myptr){}` or `if(myptr){}` expressions, but otherwise works in a similar way.\n\nDifferent operators take different numbers of arguments, e.g. ! is a unary operator, takes 1 argument, + / - * are all binary operators and take two, and so on.\n\nEdit: ! is a unary operator not a binary. I knew what I meant ;-)", "I take it you mean in programming?\n\nYou can override the operator such as +, ||, == etc to perform differently. For example if you wanted to add two objects together that have multiple properties, say a Vector which has an x and y property, overriding the + operator will allow you to add x and y to the x and y of another object without having to manually access x and y and perform the operation over multiple statements." ]
[ "Operator overloading Motive Operator overloading is syntactic sugar, and is used because it allows programming using notation nearer to the target domain and allows user-defined types a similar level of syntactic support as types built into a language. It is common, for example, in scientific computing, where it allows computing representations of mathematical objects to be manipulated with the same syntax as on paper.\nOperator overloading does not change the expressive power of a language (with functions), as it can be emulated using function calls. For example, consider variables a, b, c of some user-defined type, such as matrices:\na + b", "Destructor (computer programming) In object-oriented programming, a destructor (sometimes abbreviated dtor) is a method which is automatically invoked when the object is destroyed. It can happen when its lifetime is bound to scope and the execution leaves the scope, when it is embedded in another object whose lifetime ends, or when it was allocated dynamically and is released explicitly. Its main purpose is to free the resources (memory allocations, open files or sockets, database connections, resource locks, etc.) which were acquired by the object during its life and/or deregister from other entities which may keep references to it. Use of", " delete user;\n\n // Compiler calls automatic's destructor when automatic goes out of scope\n }}; Operator overloading Operator overloading works analogously to standard C++. Every * becomes a ^, every & becomes an %, but the rest of the syntax is unchanged, except for an important addition: for .NET classes, operator overloading is possible not only for classes themselves, but also for references to those classes. This feature is necessary to give a ref class the semantics for operator overloading expected from .NET ref classes. (In reverse, this also", "implementation of the AD tool itself is more difficult. Operator overloading (OO) Operator overloading is a possibility for source code written in a language supporting it. Objects for real numbers and elementary mathematical operations must be overloaded to cater for the augmented arithmetic depicted above. This requires no change in the form or sequence of operations in the original source code for the function to be differentiated, but often requires changes in basic data types for numbers and vectors to support overloading and often also involves the insertion of special flagging operations.\nOperator overloading for forward accumulation is easy to implement,", "overload an operator, and the programmer is free to create new operators. 1980s Ada supports overloading of operators from its inception, with the publication of the Ada 83 language standard. However, the language designers chose to preclude the definition of new operators. Only extant operators in the language may be overloaded, by defining new functions with identifiers such as \"+\", \"*\", \"&\" etc. Subsequent revisions of the language (in 1995 and 2005) maintain the restriction to overloading of extant operators.\nIn C++, operator overloading is more refined than in ALGOL 68. 1990s Java language designers at Sun Microsystems chose to omit", "can be stepped over, i.e., run one line (of source code) at a time. It can either step into functions to debug inside it, or step over it, i.e., the execution of the function body isn't available for manual inspection. The debugger supports Edit and Continue, i.e., it allows code to be edited as it is being debugged. When debugging, if the mouse pointer hovers over any variable, its current value is displayed in a tooltip (\"data tooltips\"), where it can also be modified if desired. During coding, the Visual Studio debugger lets certain functions be invoked manually from the", "MIPI Debug Architecture The term \"debug\" The term \"debug\" encompasses the various methods used to detect, triage, trace, and potentially eliminate mistakes, or bugs, in hardware and software. Debug includes control/configure methods, stop/step mode debugging, and various forms of tracing. Control/configure methods Debug can be used to control and configure components, including embedded systems, of a given target system. Standard functions include setting up hardware breakpoints, preparing and configuring the trace system, and examining system states. Stop/step mode debugging In stop/step mode debugging, the core/microcontroller is stopped through the use of breakpoints and then \"single-stepped\" through the code by executing", "example, operator overloading is done within the class which is the same as the previous examples. In C++, after overloading the less-than operator (<), standard sorting functions can be used to sort some classes. Criticisms Operator overloading has often been criticized because it allows programmers to reassign the semantics of operators depending on the types of their operands. For example, the use of the << in C++'s:\na << 1\nshifts the bits in the variable a left by 1 bit if a is of an integer type, but if a is an output stream then the above code will attempt to", "to debug user programs, to be used to debug MTS. $PEEK is a privileged MTS command that uses Program Event Recording (PER) and other facilities to facilitate debugging one job program from another. Components that cannot be debugged in this way can be debugged by running in an MTS virtual machine (a user program). Job programs All job programs run in S/360 problem state, may run with virtual addressing enabled or disabled, and may or may not be reentrant (more than one instance of the job program may or may not be allowed to execute). With multiprocessor configurations a", "class; including using results in an overload in the derived class and thus matching the function in the base class. Caveats If a method is designed with an excessive number of overloads, it may be difficult for developers to discern which overload is being called simply by reading the code. This is particularly true if some of the overloaded parameters are of types that are inherited types of other possible parameters (for example \"object\"). An IDE can perform the overload resolution and display (or navigate to) the correct overload.\nType based overloading can also hamper code maintenance, where code updates can", "operator delete[] (void *, void *) throw();\nIn all of the overloads, the first parameter to the operator delete function is of type void *, which is the address of the storage to deallocate.\nFor both the new and the delete functions, the functions are global, are not in any namespace, and do not have static linkage. Use Placement syntax has four main uses: default placement, preventing exceptions, custom allocators, and debugging. Preventing exceptions Normally, the (non-placement) new functions throw an exception, of type std::bad_alloc, if they encounter an error, such as exhaustion of all available memory. This was not how the", "rundown is specifically designed to detect \"evil purposes or evil intentions.\" The False Purpose Rundown, often referred as the FPRD, is available as a service in most Scientology organizations. It is also in use by the so-called Rehabilitation Project Force (RPF), where Sea Org staff may be sent as an opportunity to correct themselves, although it is considered by some a means of punishment. In some cases a person sometimes is audited for over a year, until the person considers, himself, \"free of evil intentions\". Introspection Rundown This is a procedure that is intended to handle a psychotic", "Exploit (computer security) An exploit (from the English verb to exploit, meaning \"to use something to one’s own advantage\") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service (DoS or related DDoS) attack. Classification There are several methods of classifying exploits. The most common is by how the exploit communicates to the", "or with inline code. Some built-in operators supported by a language have a direct mapping to a small number of instructions commonly found on central processing units, though others (e.g. '+' used to express string concatenation) may have complicated implementations. Operator overloading In some programming languages an operator may be ad-hoc polymorphic, that is, have definitions for more than one kind of data, (such as in Java where the + operator is used both for the addition of numbers and for the concatenation of strings). Such an operator is said to be overloaded. In languages that support operator overloading by", "Debug (command) Syntax debug [[drive:][path] filename [parameters]]\nWhen Debug is started without any parameters the Debug prompt, a \"-\" appears. The user can then enter one of several one or two-letter subcommands, including \"a\" to enter the assembler mode, \"d\" to perform a hexadecimal dump, \"t\" to trace and \"u\" to unassemble (disassemble) a program in memory. \nDebug can also be used as a \"debug script\" interpreter using the following syntax.\ndebug < filename\nA script file may contain Debug subcommands and assembly language instructions. This method can be used to create or edit binary files from batch files. Using for non-debugging purposes", "the public Debugging Tools for Windows package.\nThe extension model is documented in the help file included with the Debugging Tools for Windows. Ext.dll Ext is a standard Windows Debugger extension that ships with WinDBG and is loaded by default. !analyze command The most commonly used command is !analyze -v, which analyzes the current state of the program being debugged and the machine/process state at the moment of crash or hang. This command is often able to debug the current problem in a completely automated fashion.\nWhen used without any switches, !analyze simply returns the results of its analysis. The -v", "the programmer (such as C++) but have a limited set of operators, operator overloading is often used to define customized uses for operators.\nIn the example IF ORDER_DATE > \"12/31/2011\" AND ORDER_DATE < \"01/01/2013\" THEN CONTINUE ELSE STOP, the operators are: \">\" (greater than), \"AND\" and \"<\" (less than). Operand coercion Some languages also allow for the operands of an operator to be implicitly converted, or coerced, to suitable data types for the operation to occur. For example, in Perl coercion rules lead into 12 + \"3.14\" producing the result of 15.14. The text \"3.14\" is converted to the number 3.14", "integration, tools that help automate testing during system integration are used. An example of such tool is Tinderbox. Tinderbox enables participants in an OSS project to detect errors during system integration. Tinderbox runs a continuous build process and informs users about the parts of source code that have issues and on which platform(s) these issues arise.\nA debugger is a computer program that is used to debug (and sometimes test or optimize) other programs. GNU Debugger (GDB) is an example of a debugger used in open-source software development. This debugger offers remote debugging, what makes it especially applicable to open-source software", "Debugger Features Typically, debuggers offer a query processor, a symbol resolver, an expression interpreter, and a debug support interface at its top level. Debuggers also offer more sophisticated functions such as running a program step by step (single-stepping or program animation), stopping (breaking) (pausing the program to examine the current state) at some event or specified instruction by means of a breakpoint, and tracking the values of variables. Some debuggers have the ability to modify program state while it is running. It may also be possible to continue execution at a different location in the program to bypass a crash", "term lockdown event refers to a continuous improvement initiative in which manufacturing in a specific area (typically a cell or specific piece of machinery) is halted in order to contain, and determine, what are the issues that are preventing the manufacture of goods from meeting the quality specifications. During the lockdown event a multi disciplinary team reviews the specific area manufacturing processes, tooling and machine condition, to find the root cause(s) of the problem(s). Once changes to the process, or machine repairs that may include adjustments and/or replacement are effected, a sample run is initiated and evaluated. If the", "minimize resource consumption. Developers typically consider debugging via a graphical user interface (GUI) easier and more productive. This is the reason for visual front-ends, that allow users to monitor and control subservient CLI-only debuggers via graphical user interface. Some GUI debugger front-ends are designed to be compatible with a variety of CLI-only debuggers, while others are targeted at one specific debugger.", "Notice and take down Notice and take down is a process operated by online hosts in response to court orders or allegations that content is illegal. Content is removed by the host following notice. Notice and take down is widely operated in relation to copyright infringement, as well as for libel and other illegal content. In United States and European Union law, notice and takedown is mandated as part of limited liability, or safe harbour, provisions for online hosts (see the Digital Millennium Copyright Act 1998 and the Electronic Commerce Directive 2000). As a condition for limited liability online hosts", "Algorithmic program debugging Algorithmic debugging (also called declarative debugging) is a debugging technique that compares the results of sub-computations with what the programmer intended. The technique constructs an internal representation of all computations and sub-computations performed during the execution of a buggy program and then asks the programmer about the correctness of such computations. By asking the programmer questions or using a formal specification, the system can identify precisely where in a program a bug is located. Debugging techniques can dramatically reduce the time and effort spent on debugging. Overview Program debugging is an extremely common part of software development.", "or logical error.\nThe same functionality which makes a debugger useful for eliminating bugs allows it to be used as a software cracking tool to evade copy protection, digital rights management, and other software protection features. It often also makes it useful as a general verification tool, fault coverage, and performance analyzer, especially if instruction path lengths are shown.\nMost mainstream debugging engines, such as gdb and dbx, provide console-based command line interfaces. Debugger front-ends are popular extensions to debugger engines that provide IDE integration, program animation, and visualization features. Record and replay debugging \"Record and replay debugging\", also known as \"software", "having a disastrous effect on the system as outlined\nbelow. Overloading Overloading means, that different functions still can be defined and used with the same name. Most programming languages at least provide overloading with the built-in arithmetic operations (+,<,etc.), to allow the programmer to write arithmetic expressions in the same form, even for different numerical types like int or real. Because a mixture of these different types within the same expression also demands for implicit conversion, overloading especially for these operations is often built into the programming language itself. In some languages, this feature is generalized and made available to the", "1980s, systematic and principled approaches to program debugging were developed. In general, a bug occurs when a programmer has a specific intention regarding what the program should do, yet the program actually written exhibits a different behavior than intended in a particular case. \nOne way of organizing the debugging process is to automate it (at least partially) via an algorithmic debugging technique. The idea of algorithmic debugging is to have a tool that guides the programmer along the debugging process interactively: It does so by asking the programmer about possible bug sources. \nAlgorithmic debugging was first developed by Ehud Shapiro", "Debugging data format A debugging data format is a means of storing information about a compiled computer program for use by high-level debuggers. Modern debugging data formats store enough information to allow source-level debugging.\nHigh-level debuggers need information about variables, types, constants, subroutines and so on, so they can translate between machine-level storage and source language constructs. Such information can also be used by other software tools. The information must be generated by the compiler and stored in the executable file or dynamic library by the linker.\nSome object file formats include debugging information, but others can use generic debugging data formats", "Iteratee In functional programming, an iteratee is a composable abstraction for incrementally processing sequentially presented chunks of input data in a purely functional fashion. With iteratees, it is possible to lazily transform how a resource will emit data, for example, by converting each chunk of the input to uppercase as they are retrieved or by limiting the data to only the five first chunks without loading the whole input data into memory. Iteratees are also responsible for opening and closing resources, providing predictable resource management.\nOn each step, an iteratee is presented with one of three possible types of values: the", "debugging registers are available, watchpoints can be set which trigger breakpoints when specified memory addresses are executed or accessed. KGDB requires an additional machine which is connected to the machine to be debugged using a serial cable or Ethernet. On FreeBSD, it is also possible to debug using Firewire direct memory access (DMA). Graphical user interface The debugger does not contain its own graphical user interface, and defaults to a command-line interface. Several front-ends have been built for it, such as UltraGDB, Xxgdb, Data Display Debugger (DDD), Nemiver, KDbg, the Xcode debugger, GDBtk/Insight, and HP Wildebeest Debugger GUI (WDB GUI).", "debugger, really a monitor, is entered with the BUG command. The X command returns to EDIT mode. The debugger allows the viewing and changing of registers and memory locations, code tracing, single-step and disassembly. Example code The following is 6502 code for Hello World! written for the Assembler Editor:\n10 ; HELLO.ASM20 ; ---------30 ;40 ; THIS ATARI ASSEMBLY PROGRAM50 ; WILL PRINT THE \"HELLO WORLD\"60 ; MESSAGE TO THE SCREEN70 ;0100 ; CIO EQUATES0110 ; ===========0120 *= $0340 ;START OF IOCB0130 IOCB0140 ;0150 ICHID *= *+1 ;DEVICE HANDLER0160 ICDNO *=" ]
What is vanity sizing in clothing?
[ "In fashion, womens' fashions in particular, people want to believe they are thinner than they actually are, and if you get north of a size 6, which is still quit thin, you are often looked down upon for being too fat. Some designers don't even make their clothes in the higher sizes.\n\nTo make consumers feel better and buy more, some brands cheat a little bit on the size, so what is labelled as a size 6 is closer to a size 8. Other brands, to maintain more exclusivity and to ensure only the thinnest people wear their clothes, cheat the other direction, so a size 6 is more of a size 4.\n\n > How do I properly size clothes online that aren't in vanity sizing?\n\n* measure yourself and go by inches rather than size\n* check the return policy...a retailer with more friendly online return policy is going to be more confident in their sizing\n* be honest with yourself...vanity sizing works because people want to insist they are a smaller size than the actually are\n* shop brands with a strong online presence, and be extra careful going through a reseller or a department store that is just carrying the brand\n* read reviews...sizing is one of the first topics people will mention" ]
[ "Whitewashing (beauty) Advertising A clear example of beauty whitewashing is a L'Oreal advertising campaign featuring Beyoncé Knowles in which her skin was digitally retouched to appear lighter. This brought the corporation under fire for a significant period. Other examples include celebrities Halle Berry, Brandy, Mariah Carey, Rihanna, Freida Pinto, Jennifer Lopez, Tyra Banks, Leona Lewis, Jennifer Hudson, Gabourey Sidibe and Queen Latifah, in which these figures were subjected to skin lightening during the editing stage of promotional photoshoots.\nThe photo and video-sharing app, Snapchat, also attracted public criticism in 2016 for potential whitewashing in its photo filters. A particular target of", "out beauty—and at times creating it—really is like a puzzle. Often in my work, the approach to beauty is to seek perfection, yet sometimes beauty is imperfect or quite raw.\"\nOn 01/04/2019, a small business owner by the name of Carrie Gray filed a lawsuit against Pat McGrath and Sephora over the award-winning products bearing the name Skin Fetish. Gray, who is a Social Worker and U.S. Veteran, trademarked \"Skin Fetish\" and started selling Skin Fetish facial masks in September, 2015 while Pat McGrath launched 2 products around the same time named Gold 001, October, 2015 and Phantom 002, December, 2015.", "inches (81 cm). In 1967, the same bust size was a size 8. In 2011, it was a size 0. Some argue that vanity sizing is designed to satisfy wearers' wishes to appear thin and feel better about themselves. This works by adhering to the theory of compensatory self-enhancement, as vanity sizing promotes a more positive self-image of one upon seeing a smaller label. Designer Nicole Miller introduced size 0 because of its strong California presence and to satisfy the request of many Asian customers. It introduced subzero sizes for naturally petite women. However, the increasing size of clothing with the", "Western art, vanity was often symbolized by a peacock, and in Biblical terms, by the Whore of Babylon. During the Renaissance, vanity was invariably represented as a naked woman, sometimes seated or reclining on a couch. She attends to her hair with comb and mirror. The mirror is sometimes held by a demon or a putto. Other symbols of vanity include jewels, gold coins, a purse, and often by the figure of death himself.\nOften we find an inscription on a scroll that reads Omnia Vanitas (\"All is Vanity\"), a quote from the Latin translation of the Book of Ecclesiastes.", "that they should not display their beauty and ornaments except what (must ordinarily) appear thereof; that they should draw their khimār over their breasts and not display their beauty except to their husband, their fathers, their husband's fathers, their sons, their husbands' sons, their brothers or their brothers' sons, or their sisters' sons, or their women, or the slaves whom their right hands possess, or male servants free of physical needs, or small children who have no sense of the shame of sex; and that they should not strike their feet in order to draw attention to their hidden ornaments.", "Beauty mark A beauty mark or beauty spot is a euphemism for a type of dark facial mole, so named because such birthmarks are sometimes considered an attractive feature. Medically, such \"beauty marks\" are generally melanocytic nevus, more specifically the compound variant. Moles of this type may also be located elsewhere on the body, and may also be considered beauty marks if located on the face, shoulder, neck or breast. Artificial beauty marks have been fashionable in some periods. Artificial beauty mark Artificial beauty marks became fashionable in sixteenth-century France, and the fashion persisted into the eighteenth century, applied to", "with digitally lightened skin and hair – or may already have features that are considered \"white\").\nThe fashion industry believes that by advertising unattainable standards of beauty, they fuel a customer demand by \"creating a craving that can't be satisfied\". Body size and shape misperception As well as being dissatisfied with their body size, exposure to idealized images of thin bodies is associated with overestimation of one's own body size. Recent research suggests that this exposure to images of thin bodies may cause a recalibration of the visual perceptual mechanisms that represent body size in the brain, such that the observer", "covering her hair) when in mixed company.\nOthers are concerned that stretchy or clinging fabric reveals the outline of the body. More restrictive Muslims may also advocate that the head covering be long enough to cover the breasts, or that a skirt cover the hips. For similar reasons, pants are sometimes considered overly revealing. Hanafi scholars such as those at Al-Azhar University in Cairo, Egypt, reject full-body swimsuits as allowable wear in mixed company.\nAn even stricter standard requires covering of the face except for the eyes (niqab). The most restrictive standard of dress involves covering the entire body with a burqa", "invites debate on issues related to the representation of women. Arguably, advertising and cover images can help perpetuate an unattainable ideal of beauty, sometimes aided through methods of retouching to remove skin blemishes and shadows under the eyes, smooth out skin texture, widen pupils, or suggest an hourglass figure.\nA contrary viewpoint has been put forward by some in the trade, saying that a retouched photograph is actually more representative of the subject. The theory is that when one is in the presence of the person, one does not notice the blemishes. Retouching, therefore, restores the “energy” of the subject.", "(Vanity of vanities, saith the Preacher, vanity of vanities; all is vanity.) It refers to the vanity and pride of humans. In art, vanity has long been represented as a woman preoccupied with her beauty. And art that contains a human skull as a focal point is called a memento mori (Latin for \"remember you will die\"), a work that reminds people of their mortality.\nIt is less widely known that Gilbert was an early contributor to animation, and a camouflage artist (or camoufleur) for the U.S. Shipping Board during World War I. Background Born in Hartford, Connecticut, Gilbert was the", "Vanity (Régnier) Vanity or Young Woman at her Toilette is a c.1630-1635 oil on canvas painting by the French artist Nicolas Régnier. It has been in the collection of the Museum of Fine Arts of Lyon since 1976.", "pollution. Pinkwashing a campaign is a way for businesses to appear moral while earning more money from consumers who believe they are contributing to a just cause, as the campaigns increasingly focus on gendered images of beauty, breasts, and pink imagery.", "Badge of shame A badge of shame, also a symbol of shame, mark of shame or stigma, is typically a distinctive symbol required to be worn by a specific group or an individual for the purpose of public humiliation, ostracism or persecution.\nThe term is also used metaphorically, especially in a pejorative sense, to characterize something associated with a person or group as shameful.\nIn England, under the Poor Act 1697, paupers in receipt of parish relief were required to wear a badge of blue or red cloth on the shoulder of the right sleeve in an open and visible manner, in", "forms of harmful relationships with food and self.\nA similar analysis of heteropatriarchy in fashion advertisements reveal the ways in which media perpetuates heteronormative notions of femininity. The media often creates impossible-to-achieve standards of feminine beauty, meaning people may begin to self-police their own behavior as well as monitor other people’s behaviors. According to Sandra Lee Bartsky, because fashion operates on a thin ideal, the media becomes an outlet through which gender performance is strictly limited and may influence who is allowed to take up space and how much. She argues that as such, performing hegemonic femininity is tied to body", "take tucks in my dresses whenever I'm naughty, as Maria Parks's mother does. My dear, it's really dreadful, for sometimes she is so bad her frock is up to her knees, and she can't come to school.\n— Chapter 4: Burdens\nTucks, made easy with the invention of the sewing machine, were very popular as ornamentation in the latter half of the 19th century, especially in fine linen or cotton fabric for chemisettes, engageantes, blouses, lingerie, summer dresses, and children's garments. Tucks were also used to decorate heavier fabrics: a travelling suit of \"rough cheviot\" (sturdy wool) is described as having its", "Clothing scam companies Clothing scam companies are companies or gangs that purport to be collecting second-hand clothes for charities or to be working for charitable causes, when they are in fact working for themselves, giving little if anything to charitable causes. They are a particular problem in the UK, where they rely on people's awareness of proper charities established practise of collecting used clothes for good causes. These companies cause major problems for established charities in terms of lost donations and making the public distrustful of all clothes collectors. Advertising A popular tactic of clothing scam companies is to leaflet", "the company of altering her complexion. However, some believe that the Vanity Fair images are simply a product of bright set lighting, rather than deliberate skin lightening. Nyong'o was pleased with the work and saw no harm done to herself; she did not hold Vanity Fair or the photographer liable. Shortly before the Nyong'o case, Vogue magazine, a partner and buyer of Vanity Fair in 1936, was accused of altering actress Lena Dunham's photos. Dunham considered the modified photos to be offensive.\nVanity Fair launched The Hive in June 2016, its online business, politics and technology news vertical. In January 2017,", "Foundation (cosmetics) Foundation is a liquid or powder makeup applied to the face to create an even, uniform color to the complexion, cover flaws and, sometimes, to change the natural skin tone. Some foundations also function as a moisturizer, sunscreen, astringent or base layer for more complex cosmetics. Foundation applied to the body is generally referred to as \"body painting\" or \"body makeup.\" History The use of cosmetics to enhance complexion reaches back into antiquity. “Face painting” is mentioned in the Old Testament (Ezekiel 23:40). Ancient Egyptians used foundation. In 200 B.C., ancient Greek women applied white lead powder and", "Tressy Description \"Tressy\" was trademarked in 1963 as a doll with \"hair that grows\" by the American Character Toy Company of New York. It was first sold as an 11½\" fashion doll similar to Mattel's Barbie and by the late 60s as a larger preteen doll by the Ideal Toy Company. Tressy featured a long swatch of hair that could be pulled out of the top of the doll's head by pushing a button on the doll's midriff; that mechanism allowed children the ability to comb the hair in a variety of styles. American Character clearly intended that Tressy's \"growing\"", "its weight, its draping qualities, the handle; I see it in colours...The essence of the whole exercise is to place the cloth, in my imagination, into the situation in which it will be used.\" Awards Straub was made a Royal Designer for Industry in 1972. In 1993, she received the Sir Misha Black Medal. She was also a Fellow of the Society of Industrial Artists and Designers (SIAD) and was appointed an OBE for services to textile weaving.", "articles of clothing work together to make a beautiful look. Most stylists acquire these professional skills and knowledge by assisting other glamorous, established stylists, in a system similar to apprenticeship. Connections and experience are important. For example, after studying at the Rhode Island School of Design, celebrity stylist Elizabeth Sulcer apprenticed with British fashion designer Alexander McQueen for several years; later, she worked as fashion editor for BlackBook magazine where she hired intern LaQuan Smith, who soon established himself in New York as a leading clothing designer; later, as an established freelancer, she hires interns regularly. Stylist assistants are typically", "Brattishing In architecture, brattishing or brandishing is a decorative cresting which is found at the top of a cornice or screen, panel or parapet. The design often includes leaves or flowers, and the term is particularly associated with Tudor architecture.", "any shame [in showing them], but if you want to hide them, that’s okay, too, as long as the choice is yours.\"\nIn June, 2017, Sarah Starks organized a protest in Charleston, West Virginia in response to the social expectation that women and girls must wear bras and shirts to avoid offending or arousing others. \"It's sexual because people say it is,\" she added. A West Virginia University professor of social work commented that \"if other people are made uncomfortable by it, that's cultural and that's social...\" Starks commented that breasts are \"like this separate, sexual part of us, and if", "aphorisms is \"Vanity well fed is benevolent. Vanity hungry is spiteful.\" Symbolism In Western art, vanity was often symbolized by a peacock, and in Biblical terms, by the Whore of Babylon. During the Renaissance, vanity was invariably represented as a naked woman, sometimes seated or reclining on a couch. She attends to her hair with comb and mirror. The mirror is sometimes held by a demon or a putto. Symbols of vanity include jewels, gold coins, a purse, and the figure of death.\nSome depictions of vanity include scrolls that read Omnia Vanitas (\"All is Vanity\"), a quotation from the Latin", "Slyce has described Wearing's method of representation as \"frame[ing] herself as she frames the other\". Her work in photography and video at first appear like most other journalistic methods of documentation seen in television and documentaries, but after further examination it becomes apparent that they do not conform to mass-media conventions. Wearing’s work reveals that the camera does not take a neutral stance towards its object, but is rather a powerful mass-media organ that breaks down the divide between public and private. \nIn the early 1990's, Wearing began putting together photography exhibitions where she worked with strangers. There is a", "mask conceals that which they do not want others to see, thus deceiving others and distorting their concept of self. The concept of masking is seen as a form of ‘Othering’, and also place oneself as other or as masked is already to position oneself in a resistive position, whereby difference is threatening to the logical explanations, habitual practices and unquestioned assumptions of the established order and its defined categories.\nIn 2013 she started working with the female form as abject and grotesque to subvert fetishized representations of women in fashion photography. This interest progressed in her Masters research when she", "Charles Allan Gilbert Charles Allan Gilbert (September 3, 1873 – April 20, 1929), better known as C. Allan Gilbert, was a prominent American illustrator. He is especially remembered for a widely published drawing (a memento mori or vanitas) titled All Is Vanity. The drawing employs a double image (or visual pun) in which the scene of a woman admiring herself in a mirror, when viewed from a distance, appears to be a human skull. The title is also a pun, as this type of dressing-table is also known as a vanity. The phrase \"All is vanity\" comes from Ecclesiastes 1:2", "is a carefully assembled and richly layered individual who sees herself as a sculpture through her tasks of dressing, sewing, cooking, and other daily activities which she considers to be art forms in their own rights.\n \nBeginning in the 1980s Booker created wearable sculptures which she could place herself inside and utilize as clothing. \"The wearable garment sculpture was about getting energy and feeling from a desired design.\"\nBooker continues to create a wearable sculpture in response to the materials which she uses in her current work. From her creations of wearable sculptures in the 1980s, Booker began to create work", "tarnishment Dilution is sometimes divided into two related concepts: blurring, or essentially basic dilution, which \"blurs\" a mark from association with only one product to signify other products in other markets (such as \"Kodak shoes\"); and tarnishment, which is the weakening of a mark through unsavory or unflattering associations. Not all dilution protection laws recognize tarnishment as an included concept. Application of Section 22 by Canadian Courts In the Clairol case, the court stated that goodwill can be depreciated through \"reduction of the esteem in which the mark itself is held or through the direct persuasion and enticing of", "demonstrations in Gillette's advertising were \"greatly exaggerated\" and \"literally false\". While advertising in the United States had to be rewritten, the court's ruling does not apply in other countries.\nProcter & Gamble (P&G) shaving products have been under investigation by the UK Office of Fair Trading as part of an inquiry into alleged collusion between manufacturers and retailers in setting prices. \nGillette was fined by Autorité de la concurrence in France in 2016 for price fixing on personal hygiene products. \"Toxic masculinity\" advertisement In January 2019, Gillette began a new marketing campaign, \"The Best Men Can Be\", to mark the 30th" ]
Why group mentality is so powerful
[ "Human nature to belong and conform to social groups, empathy, and natural fear of exclusion.\n\nIt's kind of instinctual, that's why the weak minded are susceptible to group mentality. Case in point: Reddit." ]
[ "mental conflict. In order to override this dissonance, the person must either change the behavior, or change their beliefs. As seen with groupthink, individuals adapt their behavior in order to maintain status-quo with the group. In a political setting, this could be incredibly dangerous.\nIn their 2013 literature review, Lodge and Taber looked at the components of a rationalizing voter. Their review touched on the psychological constructs of automaticity, affect, long-term memory, and cognitive bias. They argue that voters utilize their beliefs and attitudes to construct heuristics to make judgments about political decisions. When creating", "PPR. Contributing theories Groupthink refers to a state of mind when a group of people overlook their personal decisions and motivations in order to maintain the relationship of the in-group. Using groupthink, individuals are at risk of influence from others. This could result in the individual agreeing with unfounded ideas or credibility because many members of a particular group adhere to it in a desire to maintain cohesion. Janis also found that intelligence did not factor into the likelihood for groupthink; however, agreeableness and self-identification were strong factors. An example of groupthink exists within sociopolitical research across academia.", "groups because they can be very powerful, can effect greater change, and yet the group as a whole may not have a strong conscience (see Diffusion of responsibility). He says we sometimes fail to hold groups (e.g. corporations) responsible because of the difficulties described above. Collective responsibility is important to sort out, and Petitt insists that groups should have limited rights, and various obligations and checks on their power.\nThe discursive dilemma (which concerns general proposition sets) can be seen as a generalization of the Condorcet paradox (which concerns preference sets, a kind of proposition set). Furthermore, the Condorcet paradox can", "finds that even the interactional disadvantages suffered by possessing a mental illness are attenuated when such people are also highly skilled on whatever task faces a group of people. Although for disadvantaged groups, status disadvantage is not completely negated by positively valued information, their social status does not depend predominantly on any particular group membership. As such, research in this program has yet to identify a social characteristic that operates like a robust trans-situational master status.\nResearchers in social network analysis have shown that one's affiliations can also be a source of status. Several studies document that being popular or", "Another hypothesis is that it is actually intelligence that causes social relationships to become more complex, because intelligent individuals are more difficult to learn to know.\nThere are also studies that show that Dunbar's number is not the upper limit of the number of social relationships in humans either.\nThe hypothesis that it is brain capacity that sets the upper limit for the number of social relationships is also contradicted by computer simulations that show simple unintelligent reactions to be sufficient to emulate \"ape politics\" and by the fact that some social insects such as the paper wasp do have hierarchies in", "other groups can lead to intergroup bias, Henri Tajfel approached the same phenomena in the seventies and eighties, so as to create social identity theory, which argues that people's motivation to obtain positive self-esteem from their group memberships is one driving-force behind in-group bias. The term \"collective narcissism\" was highlighted anew by researcher Agnieszka Golec de Zavala who created the Collective Narcissism Scale and developed research on intergroup and political consequences of collective narcissism. People who score high on the Collective Narcissists Scale agree that their group's importance and worth are not sufficiently recognised by others and that their group", "neuroticism/emotional stability (OCEAN).\nPhipps also proposed that all the Big Five dimensions would be positively related to transformational leadership. Openness to experience allows the leader to be more accepting of novel ideas and thus more likely to stimulate the follower intellectually. Conscientious leaders are achievement oriented and thus more likely to motivate their followers to achieve organizational goals. Extraverted and agreeable individuals are more outgoing and pleasant, respectively, and more likely to have successful interpersonal relationships. Thus, they are more likely to influence their followers and to be considerate towards them. Emotionally stable leaders would be better able to influence their", "in maintaining self-affirmation, in spite of being oppressed. Finally, Jenkins argues that mechanism inaccurately portrays individual mentality as Lockean \"blank slates,\" such that human development is contingent on the external stimuli shaping it. Rather, he believes that the Kantian view of an active mentality that constructs meaning from the environment is more accurate of how humans actually develop.\nJenkins goes on to suggest how humanism can improve education and psychotherapy for African Americans. He argues that intelligence tests poorly capture students' true abilities, much less their potential for future achievement. From a humanist lens, all groups have equal potential for achievement,", "claim that group brainstorming could generate more ideas than individuals working alone. For example, in a review of 22 studies of group brainstorming, Michael Diehl and Wolfgang Stroebe found that, overwhelmingly, groups brainstorming together produce fewer ideas than individuals working separately. However, this conclusion is brought into question by a subsequent review of 50 studies by Scott G. Isaksen showed that a misunderstanding of the tool, and weak application of the methods (including lack of facilitation), and the artificiality of the problems and groups undermined most such studies, and the validity of their conclusions.\nSeveral factors can contribute to a loss", "epistemic motivation. Other research has found that people with high epistemic motivation may be less inclined to disengage from creative, idea-generation tasks, when faced with interfering expressions of anger, than their less epistemically motivated counterparts. System justification The epistemic motivation of the need for cognitive closure has been linked with uncertainty motivation and the personal need for structure. Evidence suggests that those who are generally tolerant of ambiguity and uncertainty are less likely to use stereotypes as a manner in which to rationalize inequality and preserve the status quo. Evidence has been presented that connects epistemic motivation to authoritarianism, dogmatism,", "affiliation may drive a person to join social organization. Needs are often influenced by environmental stimulus or 'presses', another component of Murray's theory.\nIndividual differences in levels of needs lead to the uniqueness of a person's personality; in other words, specific needs may be more important to some than to others. According to Murray, human needs are psychogenic in origin, function on an unconscious level, and can play a major role in defining personality. Frustration of these psychogenic needs plays a central role in the origin of psychological pain. He also believed that these needs could be measured by projective tests,", "weak\". He theorized that a loss of personal responsibility in crowds leads to an inclination to behave primitively and hedonistically by the entire group. This resulting mentality, according to Le Bon, belongs more to the collective than any individual, so that individual traits are submerged. The idea of a \"group mind\" is comparable to the shared autism theory, which holds that individuals within a group may develop shared beliefs that have no basis in reality (\"delusions\"). Already, Le Bon was tending toward the conception of deindividuation as a state brought on by a lowering of accountability, resulting from", "a group-minded train of thinking called groupthink. In a political context, groupthink can lead to people believing their viewpoints or political beliefs are rational and normal, when really these viewpoints are isolated to the group.\nIn theory, a political actor using PPR could exploit the phenomenon of groupthink if the group idea has unfounded credibility due to many members of a adhering to the idea in a desire to maintain cohesion.to rationalize a particular political position. A common example is social media. If one's social media network consists of people with only similar opinions, then one will believe that", "of groupism in a formal or informal system. Extreme forms of groupism well known in the past and present includes racism, bigotry, terrorism, genocide, dictatorship and war. Social psychology Social Psychology brings the concept of how individual psyche is shaped by the sociological constructs. In summary, social constructs formed by prejudice, discrimination, racism and nationalism can be ascribed to groupism which an individual can obtain throughout life based on their socio-cultural and historical context that leads to psychological development as a child. Social loafing is the phenomenon when the presence of other members in a group causes some to avoid", "influential leaders can influence the opposing majority to the minority's way of thinking.\nIn the end, having a more supportive and active minority group could lead to innovative and better decision-making. Size of minority Moscovici and Nemeth (1974) argue that a minority of one is more influential than a minority of more than one, as one person is more likely to be consistent over long periods of time and will not divide the majority’s attention. They explain that a person may question themself: \"How can they be so wrong and yet so sure of themselves?\", resulting in a tendency to reevaluate", "human mental states, increasing support for treating targets like animals, and increasing willingness to endorse harsh interrogation tactics. This is surprising because social connection has documented benefits for personal health and well-being but appears to impair intergroup relations.\nNeuroimaging studies have discovered that the medial prefrontal cortex—a brain region distinctively involved in attributing mental states to others—shows diminished activation to extremely dehumanized targets (i.e., those rated, according to the stereotype content model, as low-warmth and low-competence, such as drug addicts or homeless people). Race and ethnicity Dehumanization often occurs as a result of conflict in an intergroup context. Ethnic and racial", "instance, someone with high general mental ability may perform better in a cognitively demanding situation, such as a job interview, which requires quick thinking and responding. Similarly, someone with strong social skills may perform better in a job interview, as well as other social situations, because they understand how to act correctly. Thus, when an applicant performs well in an interview due to higher general mental abilities or better social skills, it is not necessarily undesirable, because they may also perform better when they are faced with situations on the job in which those skills would be valuable.\nOn the other", "Herd mentality Herd mentality, mob mentality and pack mentality, also lesser known as gang mentality, describes how people can be influenced by their peers to adopt certain behaviors on a largely emotional, rather than rational, basis. When individuals are affected by mob mentality, they may make different decisions than they would have individually.\nSocial psychologists study the related topics of group intelligence, crowd wisdom, groupthink, deindividuation, and decentralized decision making. History The idea of a \"group mind\" or \"mob behavior\" was first put forward by 19th-century French social psychologists Gabriel Tarde and Gustave Le Bon. Herd behavior in human societies has", "the social groups that they belong in more positively than other groups, outgroup favoritism is when people tend to regard groups to which they do not belong more positively than the groups to which they are members. System justification theorists argue that this is an example or manifestation of how some people have unconsciously absorbed, processed, and attempted to cope with existing inequalities—more specifically, one's own disadvantaged position in the social hierarchy. Because people have a tendency to justify the status quo (which usually consists of inequality among groups) and believe that it is fair and legitimate, certain people from", "aggregating and pooling their intelligence. This is because the elites fear that the collective intelligence would convince the people to rebel. If there is no such capacity and relations, there would be no infrastructure on which collective intelligence is built (Brown & Lauder 2000, p. 230). This reflects how powerful collective intelligence can be if left to develop. Artificial intelligence views Skeptics, especially those critical of artificial intelligence and more inclined to believe that risk of bodily harm and bodily action are the basis of all unity between people, are more likely to emphasize the capacity of a group to take", "can justify our belief that people have minds much like our own and predict others' mind-states and behavior, as our experience shows we often can. Contemporary philosophical theories of intersubjectivity need to address the problem of other minds.\nIn the debate between cognitive individualism and cognitive universalism, some aspects of thinking are neither solely personal nor fully universal. Cognitive sociology proponents argue for intersubjectivity—an intermediate perspective of social cognition that provides a balanced view between personal and universal views of our social cognition. This approach suggests that, instead of being individual or universal thinkers, human beings subscribe to \"thought communities\"—communities of", "groups by their very nature. However, he also maintained that humans had an innate tendency to favor their own group over others, proclaiming how \"each group nourishes its own pride and vanity, boasts itself superior, exists in its own divinities, and looks with contempt on outsiders\" (p. 13). This is seen on the group level with ingroup–outgroup bias. When experienced in larger groups such as tribes, ethnic groups, or nations, it is referred to as ethnocentrism. Competition Realistic conflict theory (or realistic group conflict) posits that competition between groups for resources is the cause of in-group bias and the corresponding negative", "for everyone, while those with the scarcity mindset believe that there is a limited number of resources and that one's gain must entail another's loss, leading to competition for resources. Productive and defensive According to Chris Argyris (2004), there are two dominant mindsets in organizations: the productive mindset and the defensive mindset. \nThe productive mindset seeks out valid knowledge that is testable. The productive reasoning mindset creates informed choices and makes reasoning transparent.\nThe defensive mindset, on the other hand, is self-protective and self-deceptive. When this mindset is active, people or organizations only seek out information that will protect them. Truth", "levels.\nGroup polarization (Janis, 1972) suggests that group decision-making is often more extreme whether is it more risky or cautious. \"Groupthink\" refers to \"a mode of thinking that people engage in when they are deeply involved in a cohesive in-group, when the members' striving for unanimity override their motivation to realistically appraise alternative courses of action.\"\nTechniques to establish more effective decision making skills in political dimensions have been suggested. Hirt and Markman (1995) claim that implementing an individual in a group to find faults and to critique will enable the members to establish alternative view points. George (1980) suggested \"multiple advocacy\"", "group has is influenced by whether a collection of individuals experience the same fate, display similarities, and are close in proximity. If individuals believe that a group is high in entitativity, then they are likely to believe that the group has unchanging characteristics that are essential to the group, known as essentialism. Examples of categories are New Yorkers, gamblers, and women. Group membership and social identity The social group is a critical source of information about individual identity. An individual's identity (or self-concept) has two components: personal identity and social identity (or collective self). One's personal identity is defined by", "neocortex size to brain size ratio hence smaller number of relationships. Groupism has been explained in terms of a biological need to form social bonds according to the need to belong theory whereby deprivation of this need has been shown to have Bio-psycho-social consequences. From the perspective of evolution, social influences on the individual based on natural selection has led to better adaptation and survival in various environments.", "(as opposed to intuitive) thinking style, which has been shown to undermine religious beliefs. Third, Intelligent people may have less need for religious beliefs and practices, as some of the functions of religiosity can be given by intelligence instead. Such functions include the presentation of a sense that the world is orderly and predictable, a sense of personal control and self-regulation and a sense of enhancing self-esteem and belongingness.\nHowever, a 2016 re-analysis of the Zuckerman et al study, found that the negative intelligence-religiosity associations were weaker and less generalizable across time, space, samples, measures, and levels of analysis, but still", "decision has been made). Thus the \"ingroup\" significantly overrates its own abilities in decision-making and significantly underrates the abilities of its opponents (the \"outgroup\"). Furthermore, groupthink can produce dehumanizing actions against the \"outgroup\".\nAntecedent factors such as group cohesiveness, faulty group structure, and situational context (e.g., community panic) play into the likelihood of whether or not groupthink will impact the decision-making process.\nGroupthink is a construct of social psychology, but has an extensive reach and influences literature in the fields of communication studies, political science, management, and organizational theory, as well as important aspects of deviant religious cult behaviour.\nGroupthink is sometimes stated", "personal goals and have more creative solutions. Decisions will also be more effective in groups were members activate their personal identities. In groups were members activate social identities decisions will less effective since the different ideas of members are not used to their full extent and participation is unequal. This leads to the assumption that the more equal members in their groups are and the more committed individuals are to their group and to the decision the more effective the outcome will be. Therefore decisions reached by consensus are more effective than those made by majority for example. Finally the", "Analogously, collective intelligence research aims to explore reasons why certain groups perform more intelligent than other groups given that c is just moderately correlated with the intelligence of individual group members. According to Woolley et al.'s results, neither team cohesion nor motivation or satisfaction is correlated with c. However, they claim that three factors were found as significant correlates: the variance in the number of speaking turns, group members' average social sensitivity and the proportion of females. All three had similar predictive power for c, but only social sensitivity was statistically significant (b=0.33, P=0.05).\nThe number speaking turns indicates that \"groups" ]
Why can't horses get rid of flies on their eyes?
[ "They blink, the fly flies off, goes about two feet, pulls a u-turn and goes back to the eye. \nThey can get rid of them, but they can't keep them away. \n \nReally, the ancestor to the domestic horse wouldn't have had this problem because they didn't live in stables. \nIt's the domestic horse's enclosure that attracts the flies, gives them a breeding ground, and traps the horse so it can't get away. \n \nIt wouldn't be a problem if they didn't live in the environment we put them in." ]
[ "the use of gauze face masks for humans and even for animals. Furthermore, the flies are so small that the gauze must be very fine to offer effective protection.\nApart from the irritation however, the flies frequently move from host to host and from anus to face or to open lesions; accordingly they can be dangerous vehicles for many infectious organisms. Bacterial examples, in particular in the Caribbean and parts of South America, include the transmission of Treponema pallidum pertenue, the spirochaete that causes yaws. Less specifically, any of a range of bacterial species can cause human acute conjunctivitis (pinkeye), and", "and tabanids are known to transmit anthrax among cattle and sheep, and tularemia between rabbits and humans.\nBlood loss is a common problem in some animals when large flies are abundant. Some animals have been known to lose up to 300 ml (11 imp fl oz; 10 US fl oz) of blood in a single day to tabanid flies, a loss which can weaken or even kill them. Anecdotal reports of horse-fly bites leading to fatal anaphylaxis in humans have been made, an extremely rare occurrence. Management Controlling horse-flies is difficult. Malaise traps are most often used to capture them, and these can be modified with the use", "lower lid. Unlike humans, horses also have a third eyelid (nictitating membrane) to protect the cornea. It lies on the inside corner of the eye, and closes diagonally over it.\nThe lacrimal apparatus produces tears, providing nutrition and moisture to the eye, as well as helping to remove any debris that may have entered. The apparatus includes the lacrimal gland and the accessory lacrimal gland, which produce the tears. Blinking spreads the fluid over the eye, before it drains via the nasolacrimal duct, which carries the lacrimal fluid into the nostril of the horse.\nThe ocular muscles allow the eye to move", "rodents. With the exception of pigeons and a few other species, the eyelids of birds are not used in blinking. Instead the eye is lubricated by the nictitating membrane, a third eyelid that moves horizontally. The nictitating membrane also covers the eye and acts as a contact lens in many aquatic birds. The bird retina has a fan shaped blood supply system called the pecten.\nMost birds cannot move their eyes, although there are exceptions, such as the great cormorant. Birds with eyes on the sides of their heads have a wide visual field, while birds with eyes on the front", "dioxide exhaled by the mule deer, the blood-feeding female horse fly often lands on the head or face to feed. The horse fly uses its scissor-like mouthparts to cut the surface of the skin, creating a pool of blood which it takes in through its sucking mouthparts. The microfilariae, which were just under the surface of the skin, are small enough to be ingested whole by the horse fly. Once inside the horse fly, the microfilariae bore through the stomach wall, and mature into infective larvae about two weeks later. These larvae migrate to the head", "severe muscle spasms that compromise the bird’s ability to hold up its head. The birds exhibited a loss of balance due to the rigidity of their legs.\nCats showed signs of difficulty breathing due to excessive swelling of the nose. There were also lesions found throughout the body, including the brain. Common lesions include ulcerated cutaneous nodules of the digits, pinnae, nasal planum, and nasal/paranasal tissues.\nIn extreme cases dogs exhibited vision impairment and had deep infections in the nasal cavity, kidneys, and the cerebellum. In dogs, brain infections were found similar to infections that were found in humans. Other clinical signs", "cats are known for coughing before spitting up a hairball.\nIn other domestic animals, horses can cough because of infections, or due to poor ventilation and dust in enclosed spaces.", "the soil is suitable, creating large and sometimes very dense nesting aggregations. Nearly all the prey are biting female horse-flies; exceptionally, other flies such as Odontomyia and the screw-worm fly Cochliomyia are taken.\nHorses and cattle are not disturbed by the presence of the horse guard wasp, despite its rapid flight and loud buzzing; the same animals may however respond strongly to horse-flies or bot flies. Nonetheless, these beneficial wasps are sometimes eliminated by horse owners unfamiliar with them, thus exacerbating their problems with horse-flies.\nThe horse guard wasp acts as a natural biological control, helping to keep horse fly populations down.", "as louse-flies because some species either shed their wings when as adults they find a host after active flying (in genus Lipoptena). Alternatively flies of genus Melophagus are so adapted to parasitism that the adults never develop wings. Louse-flies without wings may appear like ticks, but the only stage of tick seen with three pairs of legs will be larvae these are much smaller than louse-flies. Morphology, life-cycle, hosts and feeding. Adults of the genus Hippobosca are large, robust flies that retain their wings to fly for repeated blood meals, between hosts such as cattle, camels or horses in a", "conditions.\nThe veterinary concern is the same as the medical. The flies cause the same kind of myiasis in animals as it does in humans. It mainly only affects domesticated companion animals who are paralyzed or helpless. Forensic Importance F. scalaris is usually found on cadavers in exposed gut content or excrement. They are often found on urine-soaked babies’ napkins and wet blankets. This species is also found on highly decomposed bodies that are in containers that do not allow drainage, which can form semi-liquid media. They usually arrive at bodies after the blow flies and flesh flies, when the body", "species land on it. Valuable horses in areas infested with Culicoides midges or Simulium black-flies can be protected with commercially available shields made of cloth that fit over head, neck and back. Flies such as the Musca, Stomoxys, and Haematobia species have larval habitats amongst livestock dung and soiled bedding found around livestock farms. There is scope for reducing fly infestation by clearing these wastes to composting containers or areas. However, for many types of dipteran flies, the larvae inhabit areas such as bogs (Culicoides), swamps (mosquitoes), or rivers (Simulium) that are impractical to treat under typical commercial constraints within", "Others are attempting to help bats out of concern for them due to the effects of white-nose syndrome. Bat houses are also installed in an attempt to control the bats' insect prey such as mosquitoes or taxa that harm crops.\nLittle brown bats are vulnerable near moving vehicles on roads, either foraging or crossing. Bats can easily be pulled into the slipstreams of faster moving vehicles. When little brown bats cross roads, they approach the road using canopy tree cover and avoid crossing where there is no cover. When the cover is lower, bats cross roads lower.", "fly resulting in a swollen abdomen. This swollen abdomen makes the wings and legs spread apart, ultimately causing the fly to have trouble flying. After some time with this disease, a P. rudis adult will lose the ability to fly. Without flight, this fly has no way of protecting itself from predators. The main predator of P. rudis larvae is the sphecid wasps. These wasps will sting the fly and inject some poison. Once the fly has died, the wasp will feed the fly to their young. There are also other generalist predators of this fly, such as ants, birds,", "more or less distinctly golden-yellow pubescent on posterior margins. Biology Males of these horse flies feed on plant juices, while female are bloodsuckers, feeding mainly on mammalian blood, as they require a blood meal before they are able to reproduce. They may be very annoying for cattle, but usually they do not bite people.", "among biologists for over a century, but 2014 evidence supports the theory that they are a form of protection from biting flies. These insects appear to be less attracted to striped coats, and compared to other wild equines, zebras live in areas with the highest fly activity. With the exception of the domestic horses, which have long manes that lay over the neck and long tail hair growing from the top of the tailhead or dock, most equines have erect manes and long tails ending in a tuft of hair. The coats of some equine species undergo shedding in certain", "around the eyes. In general, hens are more heavily marked on the wings than cocks.\nThe eye itself is solid, lacking the white iris ring, and in certain lights a dark reddish plum coloured tint can sometimes be seen, although this is not very obvious. Usually one or several spots are missing, and the cheek patch is usually part violet and part silvery-grey giving it a shimmering appearance. The mask is unaffected, but may appear to be extended downwards if it runs into a clear patch on the body.\nIn addition to inhibiting the production of melanin pigment in random areas the", "out to military dogs on 30 July 2005.\nThe British newspaper Metro reported in March 2007 the story of a dog suffering from a rare autoimmune disorder which means its eyes cannot produce tears. The owner, Diana Stephens, has the dog wear Doggles in order to prevent its eyes from drying out.\nUses of Doggles for other eye conditions have also been reported. Veterinarian Pete Wedderburn reported in his Daily Telegraph blog in 2009 the case of a terrier that suffered from an ophthalmological condition in which tiny specks of debris were floating around inside its eyes. When exposed to bright sunshine,", "eyes, it causes extreme pain and mechanical damage to the eyeball. If not properly flushed out, it can result in permanent blindness due to its tissue destroying properties.\nAntivenin for the Samar cobra is produced in the Philippines, but is not widely available due to this species' restricted distribution and thus, relatively low numbers of individuals.", "attracted; the zebra's legs have particularly fine striping, and this is the shaded part of the body that is most likely to be bitten in other, unstriped equids.\nThis does not preclude the possible use of stripes for other purposes such as signaling or camouflage. Predators and parasites The eggs of horse-flies are often attacked by tiny parasitic wasps, and the larvae are consumed by birds, as well as being paratised by tachinid flies, fungi, and nematodes. Adult horse-flies are eaten by generalized predators such as birds, and some specialist predators, such as the horse guard wasp (a bembicinid wasp), also", "to prevent mats because drying is ineffective to some dogs.\n\nMaltese dogs can exhibit signs of tear staining underneath the eyes. Dark staining in the hair around the eyes (\"tear staining\") can be a problem in this breed, and is mostly a function of how much the individual dog's eyes water and the size of the tear ducts. In some dogs the staining is due to yeast in the diet. Before giving drugs, try eliminating sources of yeast. To get rid of tear staining, a solution or powder can be specially made for tear stains, which can often be found in", "an insect-eater, the flies would appear to be under constant threat of being eaten by their \"hosts.\" The vibrations of these elderly males appears to be the mechanism by which the fly prevents itself from becoming prey.\nTo travel to other colonies, bat flies need to ride on their hosts; up to 10 flies can be found on the fur of a single bat when it leaves its roost. Taxonomy and naming Holloway named and described the bat fly as the sole member of its family (Mystacinobiidae) and genus (Mystacinobia), making both of these monotypic. Subsequent DNA analysis suggests that", "and deer, but few are species-specific. They have also been observed feeding on smaller mammals, birds, lizards, and turtles, and even on animals that have recently died. Unlike many biting insects such as mosquitoes, whose biting mechanism and saliva allow a bite not noticed by the host at the time, horse-fly bites are immediately irritating to the victim, so that they are often brushed off, and may have to visit multiple hosts to obtain sufficient blood. This behaviour means that they may carry disease-causing organisms from one host to another. The large animals and livestock mostly bitten by horse-flies are", "Bat bugs feed on blood from bats, but when they wander away from the bat roost area, they will feed on other warm-blooded animals, including people. This feeding is an annoyance but is not dangerous. Bat bugs have not been found to transmit any diseases.", "have suggested that adult flies prefer to live on fresh mushrooms, while larvae prefer to occupy decaying fungi. In addition, flies use the bracket fungus to camouflage themselves. When a lek is observed from the side, it is more difficult to detect. The flies therefore are less visible to predators, particularly terrestrial predators like spiders and lizards. Home range and territoriality Once a male H. mycetophaga comes to a lek, he typically remains in the same location throughout the day. Male patrolling displays include bobbing and holding wings apart. Males tend to occupy a particular region of a bracket fungus,", "can cause 2% herd loss per year. Many have tried to control the fly numbers by establishing traps, but they seem to have little effect on C. stygia flies.\nOne animal that does affect C. stygia flies is a tree frog, Litoria caerulea. This frog secretes a toxic substance that alters C. stygia behavior, either making then spastic or non-motile. Upon picking up the secretion the fly will increase grooming, which may lead to ingestion, the motor, sensory, and respiratory functions may be impaired. Long exposures or ingestion of these toxins will be fatal to a fly, and prevent the frog", "can alert mature animals who may attempt to run away, walk with their noses near the ground or have been recorded forming a circle with their noses in the middle and near the ground. If the fly successfully places eggs in the nostril of sheep the animal may feel the larvae after a few days and attempt to remove them by tapping their muzzles on the ground. They will also snort and stamp their front feet in annoyance. Once the larvae have infested the nasal passage and sinuses, usually up to 15 larvae but can be up to 80, they", "other animals, and the lack of eye pigment in albinos make the effects easier to visualize. The numbers of rabbits used for this purpose has fallen substantially over the past two decades. In 1996, there were 3,693 procedures on rabbits for eye irritation in the UK, and in 2017 this number was just 63. Rabbits are also frequently used for the production of polyclonal antibodies. Cats Cats are most commonly used in neurological research. 18,898 cats were used in the U.S. in 2016, around a third of which were used in experiments which have the potential to cause \"pain and/or", "another. This may help and animal survive an attack, or help a predators to appear innocuous. Examples include many moth, butterfly, and fish species that have \"eye-spots\". These are large dark markings that help prey escape by causing predators to attack a false target. For example, the gray hairstreak (Strymon melinus) shows the false head at its rear; it has a better chance of surviving an attack to that part than an attack to the head. Another example is the \"two-headed\" snake of Central Africa which has a tail that resembles a head. The snake even moves its", "Flies process visual information around seven times more quickly than humans, enabling them to identify and avoid attempts to catch or swat them, since they effectively see the human's movements in slow motion with their higher flicker fusion rate.\nThe mouthparts are specially adapted for a liquid diet; the mandibles and maxillae are reduced and not functional, and the other mouthparts form a retractable, flexible proboscis with an enlarged, fleshy tip, the labellum. This is a sponge-like structure that is characterised by many grooves, called pseudotracheae, which suck up fluids by capillary action. It is also used to distribute saliva to", "can move them from side-to-side to enlarge the wound. Saliva containing anticoagulant is injected into the wound to prevent clotting. The blood that flows from the wound is lapped up by another mouthpart which functions as a sponge. Horse-fly bites can be painful for a day or more; fly saliva may provoke allergic reactions such as hives and difficulty with breathing. Tabanid bites can make life outdoors unpleasant for humans, and can reduce milk output in cattle. They are attracted by reflections from water which are polarized, making them a particular nuisance near swimming pools. Since tabanids prefer to be" ]
If each pixel is merely a combination of a red, blue, or green light, why don't colorblind people who can, for example, not see red or green colors, only see blue on computer monitors?
[ "It's not that colour-blind people can't see red or green. They can see them both fine; they just can't tell them apart." ]
[ "coding is generally based on similarity: Hazel and green eyes might be lumped with blue because they are more similar to that color (being light), and the character could be then recoded as \"eye color: light; dark.\" Alternatively, there can be multi-state characters, such as \"eye color: brown; hazel, blue; green.\"\nAmbiguities in character state delineation and scoring can be a major source of confusion, dispute, and error in phylogenetic analysis using character data. Note that, in the above example, \"eyes: present; absent\" is also a possible character, which creates issues because \"eye color\" is not applicable if eyes are not", "the human color space and thus produce a large part of human color experiences. This is why color television sets or color computer monitors need only produce mixtures of red, green and blue light. See Additive color.\nOther primary colors could in principle be used, but with red, green and blue the largest portion of the human color space can be captured. Unfortunately there is no exact consensus as to what loci in the chromaticity diagram the red, green, and blue colors should have, so the same RGB values can give rise to slightly different colors on different screens. CMYK color", "Subpixel rendering Background A single pixel on a color subpixelated display is made of several color primaries, typically three colored elements—ordered (on various displays) either as blue, green, and red (BGR), or as red, green, and blue (RGB). Some displays have more than three primaries, often called MultiPrimary, such as the combination of red, green, blue, and yellow (RGBY), or red, green, blue and white (RGBW), or even red, green, blue, yellow, and cyan (RGBYC).\nThese pixel components, sometimes called subpixels, appear as a single color to the human eye because of blurring by the optics and spatial integration by nerve", "green (the human eye is more sensitive to green than either red or blue). The result of this is that luminance information is collected at every pixel, but the color resolution is lower than the luminance resolution.\nBetter color separation can be reached by three-CCD devices (3CCD) and a dichroic beam splitter prism, that splits the image into red, green and blue components. Each of the three CCDs is arranged to respond to a particular color. Many professional video camcorders, and some semi-professional camcorders, use this technique, although developments in competing CMOS technology have made CMOS sensors, both with beam-splitters and", "eye cannot distinguish them from single-wavelength sources. For example, most computer displays reproduce the spectral color orange as a combination of red and green light; it appears orange because the red and green are mixed in the right proportions to allow the eye's cones to respond the way they do to the spectral color orange.\nA useful concept in understanding the perceived color of a non-monochromatic light source is the dominant wavelength, which identifies the single wavelength of light that produces a sensation most similar to the light source. Dominant wavelength is roughly akin to hue.\nThere are many color perceptions that", "(bits, pixel positions) but only 140 available pixels. So considering each pixel as being a column pair, with an even and odd column, from left to right starting at column 0, if even is set and odd is not set, the pixel is blue or violet. If even is not set and odd is set, the pixel is orange or green. Any two adjacent columns that are set will be white. This means that white pixels (and black pixels) can be positioned at more places than the other colors, but does not alter the fact that the effective resolution", "the absence of light of any color, the result is black. If all three primary colors of light are mixed in equal proportions, the result is neutral (gray or white). When the red and green lights mix, the result is yellow. When green and blue lights mix, the result is a cyan. When the blue and red lights mix, the result is magenta. \ngreen–red–blue additive mixing is used in television and computer monitors, including smartphone displays, to produce a wide range of colors. A screen pixel uses a juxtaposition of these three primary colors. Projection televisions sometimes have three projectors,", "the digitization of color, either in a camera detector or on a screen, necessarily limits the available color space. Consequently there are many colors that may be impossible to reproduce, regardless of how many bits are used to represent the color. For example, it is impossible in typical RGB color spaces (common on computer monitors) to reproduce the full range of green colors that the human eye is capable of perceiving.\nWith the few colors available on early computers, different quantization algorithms produced very different-looking output images. As a result, a lot of time was spent on writing sophisticated algorithms to", "in the 20th century, uses combinations of red, green, and blue light against a black background to make the colors seen on a computer monitor or television screen. In the RGB model, the primary colors are red, green, and blue. The complementary primary–secondary combinations are red–cyan, green–magenta, and blue–yellow. In the RGB color model, the light of two complementary colors, such as red and cyan, combined at full intensity, will make white light, since two complementary colors contain light with the full range of the spectrum. If the light is not fully intense, the resulting light will be gray.\nIn some", "cyan, or blue-green, by mixing green and blue. He also found that it was possible to create virtually any other color by modifying the intensity of these colors. This discovery led to the system used today to create colors on a computer or television display. Young was also the first to propose that the retina of the eye contained nerve fibers which were sensitive to three different colors. This foreshadowed the modern understanding of color vision, in particular the finding that the eye does indeed have three color receptors which are sensitive to different wavelength ranges.\nAt about the same time", "instead of real colors outside your computer screen's gamut triangle, the nearest color which is inside the gamut triangle. See page Gamut for more information about the color range available on display devices. Imaginary colors One type of imaginary color (also referred to as non-physical or unrealizable color) is a point in a color space that corresponds to combinations of cone cell responses in one eye that cannot be produced by the eye in normal circumstances seeing any possible light spectrum. Thus no physical object can have an imaginary color. But such imaginary colors are useful as mathematical abstractions for", "while the shades of red should be difficult to see, and the shades of blue are likely indistinguishable. More rarely, some systems support having the extra bit of colour depth on the red or blue channel, usually in applications where that colour is more prevalent (photographing of skin tones or skies, for example). Other notes There is generally no need for a color look up table (CLUT, or palette) when in high color mode, because there are enough available colors per pixel to represent graphics and photos reasonably satisfactorily. However, the lack of precision decreases image fidelity; as a", "corresponds to the adding of vectors in this space. This makes it easy to, for example, describe the possible colors (gamut) that can be constructed from the red, green, and blue primaries in a computer display. RGB color model Media that transmit light (such as television) use additive color mixing with primary colors of red, green, and blue, each of which stimulates one of the three types of the eye's color receptors with as little stimulation as possible of the other two. This is called \"RGB\" color space. Mixtures of light of these primary colors cover a large part of", "RGB color space Intuition An RGB color can be understood by thinking of it as all possible colors that can be made from three colored lights for red, green, and blue. Imagine, for example, shining three lights together onto a white wall in a dark room: one red light, one green light, and one blue light, each with dimmers. If only the red light is on, the wall will be red. If only the green light is on, the wall will look green. If the red and green lights are on together, the wall will look yellow. Dim the red", "the set of all colors that can be produced with the three lights will be changed.\nA computer LCD display can be thought of as a grid of millions of little red, green, and blue lamps, each with their own dimmers. The gamut of the display will depend on the three colors used for the red, green, and blue lights. A wide-gamut display will have very saturated, \"pure\" light colors, and thus be able to display very saturated, deep colors. Applications RGB is a convenient color model for computer graphics because the human visual system works in a way that is", "color-blind by nature: they can only record shades of grey. To get color into the picture, they are covered with different color filters: red, green and blue (RGB) according to the pattern designated by the Bayer filter - named after its inventor. As each photodiode records the color information for exactly one pixel of the image, without an image processor there would be a green pixel next to each red and blue pixel. (Actually, with most sensors there are two green for each blue and red diodes.)\nThis process, however, is quite complex and involves a number of different operations. Its", "Spectral color In color spaces In color spaces which include all, or most spectral colors, they form a part of boundary of the set of all real colors. If luminance is counted, then spectral colors form a surface, otherwise their locus is a curve in a two-dimensional chromaticity space.\nTheoretically, only RGB-implemented colors which might be really spectral are its primaries: red, green, and blue, whereas any other (mixed) color is inherently non-spectral. But due to different chromaticity properties of different spectral segments, and also due to practical limitations of light sources, the actual distance between RGB pure color wheel colors", "For example, a red X can be quickly found among any number of black Xs and Os because the red X has the discriminative feature of colour and will \"pop out.\" In contrast, this theory also suggests that in order to integrate two or more visual features belonging to the same object, a later process involving integration of information from different brain areas is needed and is coded serially using focal attention. For example, when locating an orange square among blue squares and orange triangles, neither the colour feature \"orange\" nor the shape feature \"square\" is sufficient to locate", "colours to have much lower brightness when compared to a trichromat. The dimming of these colours can result in confusion in many cases, such as when attempting to identify red traffic lights, which appear to be clear. Other colour perception issues include having trouble distinguishing yellows from reds and violet, lavender and purple from blue. In other cases, objects that reflect both red and blue light may appear to just be blue to these individuals.\nDeuteranopes, who are missing medium wavelength sensitive cones, are similar to protanopes in that they cannot distinguish between colours in the green-yellow-red part of the electromagnetic", "Color depth Direct color If pixels contain more than 12 bits, an indexed palette takes more memory than the pixels (for typical screen sizes and palette depths), so such systems tend to specify the color directly in the pixel. 8-bit color A very limited but true direct color system, there are 3 bits (8 possible levels) for each of the R and G components, and the two remaining bits in the byte pixel to the B component (four levels), enabling 256 (8 × 8 × 4) different colors. The normal human eye is less sensitive to the blue component than", "that many red dyes also reflect ultraviolet light, coincidentally transmitted by Sutton's red filter, and surmised that the three images were probably due to ultra-violet, blue-green and blue wavelengths, rather than to red, green and blue. Additive color Creating colors by mixing colored lights (usually red, green and blue) in various proportions is the additive method of color reproduction. LCD, LED, plasma and CRT (picture tube) color video displays all use this method. If one of these displays is examined with a sufficiently strong magnifier, it will be seen that each pixel is actually composed of red, green and blue", "varying intensities—the so-called RGB additive primary colors. However, the relationship between the constituent amounts of red, green, and blue light and the resulting color is unintuitive, especially for inexperienced users, and for users familiar with subtractive color mixing of paints or traditional artists’ models based on tints and shades.\nIn an attempt to accommodate more traditional and intuitive color mixing models, computer graphics pioneers at PARC and NYIT developed the HSV model in the mid-1970s, formally described by Alvy Ray Smith in the August 1978 issue of Computer Graphics. In the same issue, Joblove and Greenberg described the HSL model—whose dimensions", "RGB additive primary colors. The resulting mixtures in RGB color space can reproduce a wide variety of colors (called a gamut); however, the relationship between the constituent amounts of red, green, and blue light and the resulting color is unintuitive, especially for inexperienced users, and for users familiar with subtractive color mixing of paints or traditional artists' models based on tints and shades (fig. 4). Furthermore, neither additive nor subtractive color models define color relationships the same way the human eye does.\nFor example, imagine we have an RGB display whose color is controlled by three sliders ranging from 0–255, one", "and blue parts of visible light to have negative power, which is impossible. Such a \"hyper-green\" color would be in the CIE 1931 color space chromaticity diagram (left image to the right) in the blank area above the colored area and between the y-axis and the line x+y=1. Claimed evidence for ability to see colors not in the color space Under normal circumstances, there is no hue that could be described as a mixture of opponent hues; that is, as a hue looking \"redgreen\" or \"yellowblue\".\nIn 1983, Hewitt D. Crane and Thomas P. Piantanida performed tests using an eye-tracker device", "the colors on computer and television screens, it is made by mixing red and green light.\nIn terms of the visible spectrum, \"brown\" refers to high wavelength (low frequency) hues, yellow, orange, or red, in combination with low luminance or saturation.\nSince brown may cover a wide range of the visible spectrum, composite adjectives are used such as red brown, yellowish brown, dark brown or light brown.\nAs a color of low intensity, brown is a tertiary color: a mix of the three subtractive primary colors is brown if the cyan content is low. Brown exists as a color perception only in the", "by definition cannot be pure spectral colors due to desaturation or because they are purples (mixtures of red and violet light, from opposite ends of the spectrum). Some examples of necessarily non-spectral colors are the achromatic colors (black, gray, and white) and colors such as pink, tan, and magenta.\nTwo different light spectra that have the same effect on the three color receptors in the human eye will be perceived as the same color. They are metamers of that color. This is exemplified by the white light emitted by fluorescent lamps, which typically has a spectrum of a few narrow bands,", "to the red or green (two thirds of the eye's receptors process the longer wavelengths), so it is assigned one bit less than the others. Used, amongst others, in the MSX2 system series of computers in the early to mid 1990s.\nDo not confuse with an indexed color depth of 8bpp (although it can be simulated in such systems by selecting the adequate table). High color (15/16-bit) Using two bytes to store each pixel allows 16 bits to be used. Most often these are used for 5 bits of each color plus one unused bit (or used for a mask channel", "these three colors, combined in different mixtures, can produce nearly any other color. This is the principle that is used to make all of the colors on your computer screen and your television. For example, magenta on a computer screen is made by a similar formula to that used by Cennino Cennini in the Renaissance to make violet, but using additive colors and light instead of pigment: it is created by combining red and blue light at equal intensity on a black screen. Violet is made on a computer screen in a similar way, but with a greater", "The Sharp Aquos line of televisions has introduced Quattron technology, which augments the usual RGB pixel components with a yellow subpixel. However, formats and media supporting these extended color primaries are extremely uncommon.\nFor storing and working on images, it is possible to use \"imaginary\" primary colors that are not physically possible so that the triangle does enclose a much larger gamut, so whether more than three primaries results in a difference to the human eye is not yet proven, since humans are primarily trichromats, though tetrachromats exist.", "red (long-wavelength) light, or by not very intense yellowish-green light. But very bright red light would produce a stronger response from L cones than from M cones, while not very intense yellowish light would produce a stronger response from M cones than from other cones. Thus trichromatic color vision is accomplished by using combinations of cell responses.\nIt is estimated that the average human can distinguish up to seven million different colors." ]
What is happening after a workout in our body?
[ "As I understand it\nIn a workout with decent intensity(a lot of weight being moved/force being generated) your body releases testosterone and a pulse of growth hormone. After about an hour this pulse gives way to stress hormones like cortisol. During this time you deplete nutrients from the muscles, stress your bones, and usually slightly damage the muscle fibers. All these stimuli lead to your body adapting those systems to tolerate the strain you put on them. So in the days following the workout, your bones would get denser, muscles would be replenished(for most people, about 48-60 hours after a session is a period of supercompensation in terms of stored muscle energy, the optimal time to lift again) and if you are eating in caloric excess OR you are a beginner, the muscles would grow slightly. I say caloric excess or beginner because at those times your body adapts very quickly to stresses. You will be incredibly sore, but as a novice you might be able to add 30 pounds to your maximum squat in 3 sessions. When just starting out, your body is panicking trying to adjust, so it pulls energy from your fat stores to supply the important tissues, the muscles Also soreness/physical pain is not a sign of an effective workout." ]
[ "this will lead to overtraining, and suggest training to failure only on the last set of an exercise. Some practitioners recommend finishing a set of repetitions just before reaching a personal maximum at a given time. Adrenaline and other hormones may promote additional intensity by stimulating the body to lift additional weight (as well as the neuro-muscular stimulations that happen when in \"fight-or-flight\" mode, as the body activates more muscle fibres), so getting \"psyched up\" before a workout can increase the maximum weight lifted.\nWeight training can be a very effective form of strength training because exercises can be chosen, and", "other muscles or body tissues as a source of energy, or transported to the liver where it is converted back to pyruvate. In addition to increasing the level of lactic acid, strenuous exercise causes the loss of potassium ions in muscle and causing an increase in potassium ion concentrations close to the muscle fibres, in the interstitium. Acidification by lactic acid may allow recovery of force so that acidosis may protect against fatigue rather than being a cause of fatigue.\nDelayed onset muscle soreness is pain or discomfort that may be felt one to three days after exercising and generally subsides", "will often be no delayed onset muscle soreness following the workout. Part of the process of strength training is increasing the nerve's ability to generate sustained, high frequency signals which allow a muscle to contract with their greatest force. It is this \"neural training\" that causes several weeks worth of rapid gains in strength, which level off once the nerve is generating maximum contractions and the muscle reaches its physiological limit. Past this point, training effects increase muscular strength through myofibrillar or sarcoplasmic hypertrophy and metabolic fatigue becomes the factor limiting contractile force. Central fatigue Central fatigue is", "that occurs in the CNS which leads to the release of these chemicals. Exercise-induced hypoalgesia There has been a great deal of research examining the link between exercise and hypoalgesia. Many studies have shown the direct link between the two by subjecting patients to exercise and rating their pain responses, but despite the great deal of research, the mechanism of action is still poorly understood. It has been shown that the triggering mechanism for the hypoalgesic effects is caused by the increase in blood pressure that accompanies a good workout. The body senses the increased blood pressure, and it is", "sessions is a required time for the muscles to recover depending on intensity of exercise or training load. A change in hormone levels occurs in case of drastic dietary changes, like leptin - a satiety hormone, made by fat cells showed declination in levels, its function is to regulate energy balance by inhibiting hunger and at the same time, there is also a rise in levels of ghrelin – a hormone secreted in the gastrointestinal tract when a person's stomach is empty and informs one they are hungry. Changes in production of these hormones along with other satiating hormones in", "of the body, and nutrient timing whereby protein and carbohydrates are consumed prior to and after workout has a beneficial impact on muscle growth. Water is consumed throughout the course of the workout to prevent poor performance due to dehydration. A protein shake is often consumed immediately following the workout, because both protein uptake and protein usage are increased at this time. Glucose (or another simple sugar) is often consumed as well since this quickly replenishes any glycogen lost during the exercise period.\nTo maximise muscle protein anabolism, recovery drink should contain glucose (dextrose), protein (usually whey) hydrolysate containing mainly dipeptides", "and build muscles. Some bodybuilders add a massage at the end of each workout to their routine as a method of recovering. Overtraining Overtraining occurs when a bodybuilder has trained to the point where their workload exceeds their recovery capacity. There are many reasons why overtraining occurs, including lack of adequate nutrition, lack of recovery time between workouts, insufficient sleep, and training at a high intensity for too long (a lack of splitting apart workouts). Training at a high intensity too frequently also stimulates the central nervous system (CNS) and can result in a hyperadrenergic state that interferes with sleep", "after exercise does not prevent soreness. Treatment The soreness usually disappears within about 72 hours after appearing. If treatment is desired, any measure that increases blood flow to the muscle, such as low-intensity activity, massage, nerve mobilization, hot baths, or a sauna visit may help somewhat.\nImmersion in cool or icy water, an occasionally recommended remedy, was found to be ineffective in alleviating DOMS in one 2011 study, but effective in another. There is also insufficient evidence to determine whether whole-body cryotherapy – compared with passive rest or no whole-body cryotherapy – reduces DOMS, or improves subjective recovery, after exercise.\nCounterintuitively, continued", "the primary muscles responsible for movement), high-intensity physical activity will lead to an insufficient amount of energy being produced during this anaerobic phase. This in turn will cause the muscle tissue to weaken and eventually break down, a condition known as rhabdomyolysis. The process of rhabdomyolysis also releases myoglobin into the blood, which will eventually end up in the urine and cause it to become red or brown: another condition known as myoglobinuria. Some other common symptoms are exercise intolerance, which consists of fatigue, muscle pain, and cramps during exercise, and skin rashes. In severe cases, myoglobinuria can damage the", "Graded exercise therapy Graded exercise therapy (GET) is physical activity that starts very slowly and gradually increases over time. This approach is used as part of a treatment plan for chronic fatigue syndrome (CFS) and certain other conditions. This method avoids the extremes of the \"push-crash\" cycle of over-exercising during remittance or not exercising at all due to concern of relapse.\nTypically the GET begins with active stretching, followed by range-of-motion contractions and extensions, done for five minutes per day for a completely inactive individual. Avoiding extremes is key, and activity must be balanced with rest. Exercise sessions", "pain and swelling. Type of treatment can include, ice and electrical stimulation, massage, or other hand on treatment to help ease the pain and muscle spasm. After about four weeks range of motion exercises can be started. Passive exercises are done which the shoulder joint is moved but the muscles stay relaxed. After about six to eight weeks active therapy is started. Such exercises can include isometric strengthening which works the muscles without straining the healing of the joint. After about three months, more active strengthening will be incorporated which focus on improving the strength and control of the rotator", "individuals.\nIn novice strength trainers, the muscle's ability to generate force is most strongly limited by nerve’s ability to sustain a high-frequency signal. After a period of maximum contraction, the nerve’s signal reduces in frequency and the force generated by the contraction diminishes. There is no sensation of pain or discomfort, the muscle appears to simply ‘stop listening’ and gradually cease to move, often going backwards. As there is insufficient stress on the muscles and tendons, there will often be no delayed onset muscle soreness following the workout.\nPart of the process of strength training is increasing the nerve's", "example would be that wrinkles, spots, or even skin cancer develop. The goal in sports periodization is to reduce the stress at the point where the resistance stage ends so the body has time to recover. In this way the exhaustion stage does not reduce the gains achieved, the body can recover and remain above the original equilibrium point. The next cycle of increased stimulus now improves the response further and the equilibrium point continues to rise after each cycle.\nSelye (1957) labeled beneficial stresses as \"eustress\" and detrimental stresses as \"distress\". In athletics, when physical stress is at a healthy", "person's reaction to a specific drug is progressively reduced, requiring an increase in the amount of the drug they receive. Over the counter medications, in particular, have a maximum possible effect, regardless of dose. Health and fitness In fitness, the Exercise Plateau Effect refers to when a body becomes accustomed to a certain stimulus and thus ceases to respond to it. Overcoming the plateau usually involves a change in the person's workout, including adding periods of rest, changing volume of exercises, or increasing/decreasing the weight used in strength exercises. Television ratings According to industry consultant Gary Kahan, a television show's", "Fatigue Physical fatigue Physical fatigue, or muscle fatigue, is the temporary physical inability of muscles to perform optimally. The onset of muscle fatigue during physical activity is gradual, and depends upon an individual's level of physical fitness – other factors include sleep deprivation and overall health. Fatigue can be reversed by rest. Physical fatigue can be caused by a lack of energy in the muscle, by a decrease of the efficiency of the neuromuscular junction or by a reduction of the drive originating from the central nervous system. The central component of fatigue is triggered by an increase of the", "of other enzymes causing their activation, or by phosphorylation of certain channels leading to the increase or decrease of electrolyte transfer in or out of the cell. Activity during exercise During exercise, α₁-adrenergic receptors in active muscles are attenuated in an exercise intensity-dependent manner, allowing the β₂-adrenergic receptors which mediate vasodilation to dominate. In contrast to α₂-adrenergic receptors, α₁-adrenergic-receptors in the arterial vasculature of skeletal muscle are more resistant to inhibition, and attenuation of α1-adrenergic-receptor-mediated vasoconstriction only occurs during heavy exercise.\nNote that only active muscle α₁-adrenergic receptors will be blocked. Resting muscle will not have its α₁-adrenergic receptors blocked, and", "energy. Muscle fatigue itself causes increased excitatory afferent activity within the muscle spindles and decreased inhibitory afferent activity within the Golgi tendon. The coupling of these events leads to altered neuromuscular control from the spinal cord. A cascade of events follow the altered neuromuscular control; this includes increased alpha-motor neuron activity in the spinal cord, which overloads the lower motor neurons, and increased muscle cell membrane activity. Thus, the resultant of this cascade is a muscle cramp. Treatment and prevention Medication has not been found to help reduce or prevent muscle cramping. To prevent or treat, athletes are", "were performed each session, and rest was emphasized, calling for 4–7 days of recovery before the next workout. According to Mentzer, biologists and physiologists since the nineteenth century have known that hypertrophy is directly related to intensity, not duration, of effort (Mentzer 2003;39). Most bodybuilding and weightlifting authorities do not take into account the severe nature of the stress imposed by heavy, strenuous resistance exercise carried to the point of positive muscular failure.\nMentzer's training courses (books and audio tapes), sold through bodybuilding magazines, were extremely popular, beginning after Mentzer won the 1978 IFBB Mr. Universe contest. This contest gathered a", "joint movement to release muscle tension. Other methods to relax muscles include heat packs, ice packs, and \"electrical stimulation\". Therapists also teach chronic headache sufferers at-home exercises to strengthen and stretch muscles that may be triggering headaches. In physical therapy, the patient must take an active role to practice exercises and make changes to his or her lifestyle for there to be improvement. Acupuncture Another non-medicinal treatment, which does not require at-home exercises, is acupuncture. Acupuncture involves a certified acupuncturist picking particular points on the body to insert acupuncture needles; these points may differ on an individual basis. With chronic", "be sustained for as long a period as aerobic exercise. Many exercises are partially aerobic and partially anaerobic; for example, soccer and rock climbing involve a combination of both.\nThe presence of lactic acid has an inhibitory effect on ATP generation within the muscle; though not producing fatigue, it can inhibit or even stop performance if the intracellular concentration becomes too high. However, long-term training causes neovascularization within the muscle, increasing the ability to move waste products out of the muscles and maintain contraction. Once moved out of muscles with high concentrations within the sarcomere, lactic acid can be used by", "for eating disorders. Treatment The underlying cause of the female athlete triad is an imbalance between energy taken into the body (through nutrition) and energy used by the body (through exercise). The treatment includes correcting this imbalance by either increasing calories in a diet or by decreasing calories burned by exercise for 12 months or longer. Persons with female athlete triad should get treatment from a multi-disciplinary team that includes a physician, dietitian, and mental health counselor, and seek support from family, friends, and their coach.\nBecause a symptom of the female athlete triad is menstrual dysfunction, some physicians may recommend", "New research from scientists at Columbia University suggests that muscle fatigue is caused by calcium leaking out of the muscle cell. This causes there to be less calcium available for the muscle cell. In addition an enzyme is proposed to be activated by this released calcium which eats away at muscle fibers.\nSubstrates within the muscle generally serve to power muscular contractions. They include molecules such as adenosine triphosphate (ATP), glycogen and creatine phosphate. ATP binds to the myosin head and causes the ‘ratchetting’ that results in contraction according to the sliding filament model. Creatine phosphate stores energy", "workout music using brainwave entrainment that claims to boost performance.\nTo further this idea, a study from the New York Times shows how music helps boost workouts. This experiment was done by testing a control group of people working out in a normal workout setting and the same group of people working out with machines that incorporated beats and rhythms into each rep. To do this, they installed the kits into three different workout machines, one a stair-stepper, the other two weight machines with bars that could be raised or pulled down to stimulate various muscles. Thomas Hans Fritz, a researcher", "micro-traumas that results in muscle growth. Normally, this soreness becomes most apparent a day or two after a workout. However, as muscles become adapted to the exercises, soreness tends to decrease.\nWeight training aims to build muscle by prompting two different types of hypertrophy: sarcoplasmic and myofibrillar. Sarcoplasmic hypertrophy leads to larger muscles and so is favored by bodybuilders more than myofibrillar hypertrophy, which builds athletic strength. Sarcoplasmic hypertrophy is triggered by increasing repetitions, whereas myofibrillar hypertrophy is triggered by lifting heavier weight. In either case, there is an increase in both size and strength of the muscles (compared to what", "require surgical intervention to avoid further damage to the muscle and/or to prevent loss of life.\nSesame oil is often used in such mixtures, which can cause allergic reactions such as vasculitis.\nAs the injected muscle is not actually well-developed, it might droop under gravity. Rest Although muscle stimulation occurs in the gym (or home gym) when lifting weights, muscle growth occurs afterward during rest periods. Without adequate rest and sleep (6 to 8 hours), muscles do not have an opportunity to recover and grow. Additionally, many athletes find that a daytime nap further increases their body's ability to recover from training", "cycle.\nSubstrates produce metabolic fatigue by being depleted during exercise, resulting in a lack of intracellular energy sources to fuel contractions. In essence, the muscle stops contracting because it lacks the energy to do so. Proximal and distal Muscle weakness can also be classified as either \"proximal\" or \"distal\" based on the location of the muscles that it affects. Proximal muscle weakness affects muscles closest to the body's midline, while distal muscle weakness affects muscles further out on the limbs.\nProximal muscle weakness can be seen in Cushing's syndrome and hyperthyroidism.", "soreness, the muscle rapidly adapts to reduce further damage from the same exercise. This is called the \"repeated-bout effect\".\nAs a result of this effect, not only is the soreness reduced, but other indicators of muscle damage, such as swelling, reduced strength and reduced range of motion, are also more quickly recovered from. The effect is mostly, but not wholly, specific to the exercised muscle: experiments have shown that some of the protective effect is also conferred on other muscles.\nThe magnitude of the effect is subject to many variations, depending for instance on the time between bouts, the number and length", "gradually returning to activity. Rest and ice work to allow the tibia to recover from sudden, high levels of stress and reduce inflammation and pain levels. It is important to significantly reduce any pain or swelling before returning to activity. Strengthening exercises should be performed after pain has subsided, on calves, quadriceps and gluteals. Cross training is recommended in order to maintain aerobic fitness e.g. cycling, swimming, boxing etc. Individuals should gradually return to activity, beginning with a short and low intensity level. Over multiple weeks, they can slowly work up to normal activity level. It is important to decrease", "same as that of the particular sport. For the pleasure of the activity One side effect of intense exercise is increased levels of dopamine, serotonin, and norepinephrine, which can help to improve mood and counter feelings of depression (dopamine and serotonin were not found to be increased by resistance training).\nDeveloping research has demonstrated that many of the benefits of exercise are mediated through the role of skeletal muscle as an endocrine organ. That is, contracting muscles release multiple substances known as myokines which promote the growth of new tissue, tissue repair, and various anti-inflammatory functions, which in turn reduce the", " Warm-ups also increase body and blood temperature, which allows more oxygen to reach the muscles, improves muscle elasticity, and reduces the risk of strains and pulls. Other forms of prevention include strengthening muscles, increasing flexibility, taking breaks, weight training, and playing safe. Mental preparation is also important before practice or games. Clearing the mind and visualizing skills and strategy can relax the athlete's muscles and build concentration. Along with mental preparation, drinking plenty of water before games is very important. Staying hydrated is how to prevent injuries like heat illness. Sports-related death Sometimes sports injuries can be" ]
What is it like playing intense sport (or exercise) in freezing weather?
[ "Down to -5 no major differences, except you can loose heat rapidly if you stop moving, layering your clothing is important to manage your heat/sweat.\n\n-5 to -20 your get an iron taste in your throat/mouth when breathing heavily, otherwise same as above.\n\nBelow -20 breathing becomes painful, your nose can freeze, your sweat freezes before evaporating. Layering changes from important to critical as these are the templates where sweating can lead to death." ]
[ "cold when a Sim has been playing in the snow for too long. However, this does present disadvantages. An example is a Sim getting a cold or getting too hot after too many showers.\nFor example, heat in summer may cause a Sim to experience heatstroke or receive a sunburn. Sims who are outside during the winter may feel cold, though they can be warmed in various ways. Sims can die due to heatstroke and they can also freeze to death. Other Sims have the option of a \"thaw\" interaction, provided their relationship is high enough. Children who are allowed to", "outdoor sports can be played all year, and indeed more vigorous sports are more comfortably played in winter. Australian rules football and rugby league, the two most popular spectator sports in Australia, are played primarily in winter. See Sport in Australia\nIce sports in Australia began with the opening of the first ice skating rink in Australia, the Adelaide Glaciarium, designed by a refrigeration technician by the name of Henry Newman Reid.\nOn Wednesday 1 June 1904, the prospectus for the acquisition of the Cyclorama building on 89 Hindley Street, Adelaide was issued. The remodeled Cyclorama building opened as the", "Myllyoja Things to do In the summertime, people spend much time at Tervaranta-beach, swimming in the river and getting tanned. Because the beach is steep, children may go snow sliding there in winter if the river is frozen. \nLocal sport field attracts people to play football or pesäpallo.\nCycle- and footpaths are good, and thus, some people like to go cycling or jogging.", "soccer, golf, field hockey, and cheerleading. Winter sports include boys basketball, girls basketball, swimming, indoor track and field, ice hockey, wrestling, and cheerleading. Spring sports include lacrosse, softball, baseball, track and field, and tennis.", "offers basketball, ice hockey, and wrestling. Students may choose to participate in the winter musical in order to fill their sports requirement. The ice hockey team is a club team that is not sponsored by the school or state. However, according to a rule change starting in the 2009–2010 school year, it now fulfills the sports requirement for the winter term. In the spring, the school offers golf, track and field, tennis, rugby, baseball, lacrosse, and ultimate frisbee. Although the school has racquetball and squash facilities, it does not field teams in these sports, nor does it have a swimming", "speed and the chines creating carving control as well as drag for slowing down when necessary. Athletes use wax or Rain-X on the bottom of their boat allowing them to maximize their speed. Equipment Athletes should choose a kayak that they feel most comfortable with, along with a two bladed paddle to help them control their balance, turns, curves, and swerves. When snow boating it is important to wear equipment that protects an individual from the cold winds and possible water spray. Windproof, waterproof clothes are recommended, most designs are often made of neoprene jersey mix which allows freedom for", "that is inherent in nearly all outdoor sports activities. Getting out of the wind and rain while changing just makes good sense, and will preserve energy to be used via chosen activity.\"\nThe popularity of the product within athlete circles led to it featuring in the 2016 Olympics in Rio, predominantly worn by Team GB. It was also used during the Paraolympics in the same year. Design The design was based on a number of common Australian item of clothing used by surfers in the country. The unique hybrid design was based on a combination of existing products, used from both", "movement but still keeps a snug fit. Helmets are very important in case the athlete loses control of the boat and spins off course, or flips. Eye gear to shield the eyes from snow, wind, and water is optional. Competitions The first race was held in Lienz, Austria by a local group of kayakers. Snow boating is considered an extreme sport, so most Ski Resorts do not allow it. If an athlete wants to practice snow boating they typically do it in the backcountry with the exception of a few ski resorts and ski areas, otherwise there are snow races", "ice skating, skiing and snow-boarding events. Australia's generally flat geography and usually mild winter climate otherwise provide ideal conditions for international non-snow/ice winter sports and team games like Rugby Union Football, Rugby league Football and Association Football (Soccer), which are all popular sports during the Australian winter and in which Australia has enjoyed considerable international success. Australian rules football is a home-grown winter football code with a wide following throughout Australia. Many other sports are also played or watched in Australia through the winter season. Sports played in winter Australia's mild winters mean that in most parts of Australia, regular", "outside of Europe. Among young people and within schools nationwide, various forms of handball or downball games have been among the most prevalent sports games for some decades.\nSnow sports are enjoyed in the Australian Alps and in Tasmania. Skiing in Australia was first introduced by Norwegian miners in the gold mining town of Kiandra in the Snowy Mountains of New South Wales around 1859. The sport remains a popular winter activity in the south-eastern states and territories. Major alpine skiing resorts include Thredbo, Perisher and Charlotte Pass in New South Wales; Mount Hotham, Falls Creek and Mount Buller in Victoria", "and precautions Like some other winter sports, snowboarding comes with a certain level of risk.\nThe injury rate for snowboarding is about four to six per thousand persons per day, which is around double the injury rate for alpine skiing. Injuries are more likely amongst beginners, especially those who do not take lessons with professional instructors. A quarter of all injuries occur to first-time riders and half of all injuries occur to those with less than a year of experience. Experienced riders are less likely to suffer injury, but the injuries that do occur tend to be more severe.\nTwo thirds of", "popular in places where the weather permits outdoor play such as New York, Florida, New Jersey, Connecticut, California and Puerto Rico, although indoor courts, although rare, exist. Tournaments are ruled by the American Paddleball Association. History The history of the game is somehow undocumented, but it obviously originates from American handball which consists of hitting the ball with the bare hand or a gloved palm. However, due to the cold weather in northern American states, the players carved wooden paddles to hit with to relieve the pain from the cold. Other governing bodies There have been many attempts to package", "Outing Club, and Yearbook. Winter Sports include Basketball, Snowboarding (competitive and not), Alpine Skiing (competitive and not), Freestyle Skiing, Nordic Skiing, Learning to Ski, Rugrats, and the Outing Club. Spring sports are Baseball, Equestrian, Lacrosse, Road Cycling, Skateboarding, Softball, Tennis and the Outing Club. On-Snow Competition Program The On-Snow Competition Program includes Alpine, Snowboard, Freestyle, and Nordic Skiing. The program is designed to prepare athletes to compete at the highest levels in every age group. A winter term is available for 8th grade students, from Thanksgiving through March.\nSpecial class schedules and flexibility are available for students competing in the program,", "the section below. Approach to riding Tom Babin, a writer from Calgary who penned Frostbike: The Joy, Pain and Numbness of Winter Cycling states that \"[a]bout 30 to 40 per cent of cyclists bike year-round\". Babin states that people who have not tried cold-weather cycling tend to be afraid of it, but once cyclists try winter biking, they find \"it's a lot easier than they thought it would be.\" He also states that winter cycling has enabled him \"to rediscover the joy of winter\" because it can offer riders \"beautiful moments\" of quiet in the snow and a way to", "hockey preferences:\nIt is a steeper and more intimate bowl than you see in the U.S. In Canada they are more about the game than the surrounding events and experiences. They were very adamant they wanted it as steep and tight as it could possibly get. . . . You feel like you are on top of the ice. It is about going into the arena and sitting in a seat and not getting up until the game is over.\nThe angle of the upper seating bowl is so steep that rails had to be installed at every row to satisfy local", "\nActivities categorized by media as extreme sports differ from traditional sports due to the higher number of inherently uncontrollable variables. These environmental variables are frequently weather and terrain related, including wind, snow, water and mountains. Because these natural phenomena cannot be controlled, they inevitably affect the outcome of the given activity or event.\nIn a traditional sporting event, athletes compete against each other under controlled circumstances. While it is possible to create a controlled sporting event such as X Games, there are environmental variables that cannot be held constant for all athletes. Examples include changing snow conditions for snowboarders, rock and", "their shoes and used them to travel on frozen rivers, canals and lakes. In contrast to what people think, ice skating has always been an activity of joy and sports and not a matter of transport. For example, winters in the Netherlands have never been stable and cold enough to make ice skating a way of travelling or a mode of transport.\nThis has already been described in 1194 by William Fitzstephen, who described a sport in London.\nLater, in Norway, King Eystein Magnusson, later King Eystein I of Norway, boasts of his skills racing on ice legs.\nHowever, skating and speed skating", "sports There are also grown winter games as curling, ice hockey and figure skating.", "foot hockey produced fewer catastrophic injuries than other winter sports in studies from 1986 to 1995.\nThe game is mostly played in grade schools, and is popular in Canada and parts of the United States. The usual age of foot hockey players can range from 6 to 13 years old. Because it has few requirements regarding equipment and can be played on most hard surfaces, it is more accessible than ice hockey. The game is listed amongst those to keep children interested in playground activities in the 1915 issue of The Playground published by the Playground Association of America. In his", "the 1998 Games to ensure track thickness was 2–3 cm (1–1 in) of ice. Sun shades are used in an effort to maintain the operating temperatures of −10 to −15 °C (14 to 5 °F). Track competitions were also moved to the afternoon during the games to avoid the sunniest hours. There are a total of 56 sensors located throughout the track to maintain constant ice temperature and thickness.", "short summers are amazing. Australia is easy living, but so far away from everything ... It's pretty hard for anyone to deal with long cold winters, but being a skateboarder and dealing with it is way harder. I used to play a lot of video games and skate the local indoor park. But you get bored of skating the same old park every day for like nine months. I tried snowboarding a couple of time; it was pretty fun. My homie's dad owned a house in the hills and I would get to go kick it there sometimes and snowboard.", "a gymnasium, seven playing fields and three all-weather tennis courts to accommodate IMS athletes during the fall and spring seasons. A paddle tennis court is used for recreational purposes throughout all seasons. During the winter, athletes make use of the gymnasium, swimming pool, the basketball and squash courts, and the ice hockey rinks at The Hotchkiss School. Additionally, ski teams train and compete at Catamount Ski Area.", "Ashern Activities During the winter months, there are various sports to partake in: hockey, curling, figure skating, ringette, snowmobiling, ice-fishing and cross country skiing. Different levels of most team sports exist to accommodate the wide range of ages that play on them. Ashern has an indoor skating rink and a curling rink, both with artificial ice. Summer sports include: baseball, water sports, swimming, and other games such as horseshoes. Ashern has a nine-hole golf course with grass greens, watered fairways and a licensed clubhouse.\nAshern has a community hall, an Elk's Hall and a Royal Canadian Legion Hall that cater to", "the conditions of the summer game to a high degree. It also caters to events such as the Aalto University competition organized in 2011 Recurring events The annual World Ice Golf Championship has been held on the world's northernmost golf course on the shelf ice near Uummannaq, Greenland since 1997. The course is reformed by the moving ice every year and play is highly dependent on weather conditions and thus, has been canceled several years running. Competitors are allowed a maximum handicap of 36. Clubs with graphite shafts are not recommended, as they can shatter in the extreme temperatures.\nA Snow", "Dryworld History The Company was started in 2010 by two former rugby players Matt Weingart and Brian McKenzie. After retiring, the two put together an idea to create a product which would allow athletes to keep their feet warm, dry and comfortable at all times during the games and developed an exterior shoe product called dryfeet that is rolled over soccer, football or rugby boots and significantly reduces the weight of the shoes during wet and cold conditions during games and training. The Company has since produced several lines of clothing, such as HauteD, Aggression, BioSkyn Apparel and Barefuta. In", "Winter Sports Federation of Portugal Other sports The federation also supports the competitive skiing and snowboarding in Portugal.", "Ice Hockey, Diving, Volleyball, Soccer, Swimming, Cross Country, Winter Track, Spring Track, Dance, Cheerleading, Basketball, Skiing, Wrestling, Lacrosse, Ultimate Frisbee, Softball, Baseball, Golf and Tennis.", "Snow rugby Snow rugby refers to forms of rugby union that are especially adapted to be played in winter conditions, particularly deep snow. It is played in Canada, the Kashmir region in India, the Baltic states, Russia, the northern United States, and Finland. Specific locations of play include the Argentinian Ski Resort of Las Leñas and the Boitsfort Rugby Club in Brussels.\nBecause of the cold, and often subzero, temperatures at which snow rugby is played, players must dress warmly. History Rugby union is predominantly played during the winter months and it has been played in extremely cold conditions. In 1939", "very unappetising and boring.\nThe Goodies are unsure how they would go in competition in the slippery and cold icy conditions, so they capture a butterfly and strap a sunlamp to it to give themselves a better chance. With the butterfly fluttering away, the steady beam of the sunlamp causes the ice and snow to melt. In the resultant extremely hot conditions, the competitors from other countries flounder, while the Goodies win many medals.\nAfter the Goodies' triumphant return home, they find that extreme climatic changes have suddenly occurred, with unexpected results.", "to the other teams. Environment Capture is filmed in an area of wilderness just northeast of Shaver Lake, in eastern California (37°08′26″N 119°15′47″W). The terrain is mostly dry, wooded, and hilly and located around 6,000 ft above sea level, making breathing difficult. Environmental conditions play a factor in gameplay, as players must tolerate near-freezing temperatures at night while sleeping in basic bunks, blankets, and tarps; the occasional rain or hailstorm; and other elements of wilderness survival. Movement injuries (such as sprained joints) are common as a result of fast movement over the varied (and occasionally rugged) terrain. Final hunt Once only" ]
what ever happened to Dane Cook?
[ "Credit to /u/noposters for this answer: What people don't realize about Dane Cook is that he was on a mega run before Harmful if Swallowed blew up. Even before his comedy central half hour, he was the highest paid comedian touring colleges at that time (not the highest paid in general, but he swooped in when Sandler stopped doing colleges and took those gigs at Sandler's rate). Once his albums blew up, he played MSG, etc. he tried to make the transition into film. His films flopped, and simultaneously both his parents died and it was discovered that his brother/business manager had stolen 50million dollars from him (never recovered). With all those things coming together, he took a bunch of time off. When he came back, tastes had changed and he no longer had the traction he'd had years earlier. He tried to make some comeback appearances but wound up generating controversy by trashing the audience at one of his shows at the Laugh Factory (TJ Miller and others brutalized him on twitter for his behavior). Since then he's appeared here and there in LA and done some voiceover work, but for the most part he keeps a low profile. He's also alienated a lot of people in the NY comedy community for playing up his relationship with Patrice O'Neal in interviews when the two were, in fact, not close" ]
[ "Cook's Greatest Hits, in which Cook revisited and updated a number of his more memorable stories. Cook revealed in 2007 that he had received death threats as a result of the series.\nThe programme and its production team won eleven national and international awards, culminating in a British Academy of Film & Television Arts (BAFTA) special award for its presenter in 1997 'for 25 years of outstanding quality investigative reporting'. Other activities Cook has published several books including an autobiography, Dangerous Ground, and was interviewed about his book, Roger Cook's Ten Greatest Con-Men (co-written with Tim Tate) on Radio 5 Live", "Antonio, and, at the time of his death, three grandchildren. Death Cook died on the night of July 3, 2008, after a long illness.", "Matt Golinski Matt Golinski (born c. 1972) is an Australian celebrity chef best known for his regular appearances on the television show Ready Steady Cook. Personal life On 26 December 2011, Golinski's wife Rachel and his three daughters died when his Tewantin home was engulfed by fire in the early morning. Golinski suffered severe burns, and as of March 2012 was still recuperating in Royal Brisbane and Women's Hospital where his condition was listed as \"stable\". In April 2013, Golinski returned to the public eye, cooking on the stage at the Jan Power Farmer's Market in the Brisbane CBD.", "“Who’s Cooking Dinner?” to raise money for Leukaemia and blood cancer research, since he successfully donated bone marrow to his sister. He has raised over £7 million since starting this event. He is also a patron of RAFT (Restoration of Appearance and Function Trust), in part due to injuries suffered at the age of 7 when a pan of hot fat fell on him. \nHe currently resides in London Fields (East London) with his partner, Alastair Carruthers, co-chair of the Te Papa Foundation of the Museum of New Zealand and chairman of Allpress Espresso. They have been in", "the murder of his father in order to speed up the trial process.\nAt just after midnight on July 11, 1959, Cook escaped from the Ponoka Mental Institution he was detained in, for a psychiatric assessment, after he had been denied permission to attend the funerals of the family members he had killed, and was found several days later hiding at a pig farm near Bashaw, Alberta. It took two trials and just under 16 months for Cook to be convicted of murder, where he maintained his innocence up until his execution. Cook was sent to the gallows at Fort", "critics choose to see Cook's life as tragic, insofar as the brilliance of his youth had not been sustained in his later years. However, Cook himself always maintained he had no ambitions at all for sustained success. He assessed happiness by his friendships and his enjoyment of life. Eric Idle said Cook had not wasted his talent, but rather that the newspapers had tried to waste him.\nSeveral friends honoured him with a dedication in the closing credits of Fierce Creatures (1997), a comedy film written by John Cleese about a zoo in peril of being closed. It starred Cleese alongside", "at Lake Hopatcong but is not open to the public. Later life and death Cook was diagnosed with Parkinson's disease in 1941. This forced his retirement from show business. He sold the lake house the same year and moved to a more modest residence in New York State, where he resided until his death in 1959. Had Cook stayed healthy until the advent of television, his playful and physical style of comedy might well have made him one of the new medium's biggest stars, as was the case with his contemporary, Milton Berle.", "know, she’s never made me the same meal twice since we met.” Death Cook was diagnosed with lung cancer in early 2011 and died, aged 76, at North Tees Hospital, Stockton on 10 January 2012.", "returned to his home in Fullerton, California from a speaking engagement in Houston, Texas when he suffered a massive heart attack. He had a history of heart problems and nearly died from an earlier heart attack at age 49. After a private funeral, more than 2,000 people attended a memorial service at First Evangelical Free Church of Fullerton, where Cook was a long-time member, on April 19. Noted evangelical author and Cook friend, Dr. Charles Swindoll, presented the message. On April 21, Biola held Cook's final memorial service, where over 3,000 students and faculty attended.\nThe Cook School of Intercultural Studies", "Radke was involved in an altercation in Las Vegas that resulted in the fatal shooting of 18-year-old Michael Cook. While Radke did not shoot Cook, he was indicted on battery charges, while the man who shot Cook claimed self-defense. These charges against Radke, combined with Ronnie's past troubles with narcotics and rehab, led to a sentence of five years probation.\nRadke failed to report to his probation officer and was arrested in June 2008, where he was sentenced to two years in prison. Radke was officially fired from Escape the Fate in mid-2008. Arrival of Craig Mabbitt and This War Is", "As a radio presenter, Cook has been nominated for 2 Ameripolitan Music Awards. Personal life Following the release of Welder in 2010, a series of personal tragedies meant that Cook did not produce another studio album until 2016 including a divorce from her husband Tim Carroll, the destruction of her family farm by a fire, and the deaths of her father, brother, mother-in-law and brother-in-law, which resulted in her friends and manager forcing her to cancel an upcoming tour to go to rehab for drug addiction and an eating disorder.\nOn being sent to rehab, Cook said \"I needed some help.", "Cook described the incident – as well as how dejected he felt and his resulting determination to someday return to the Boston Garden and perform successfully someday – as part of a web series for The Tonight Show entitled \"Worst I Ever Bombed\". 1990s In 1994, Cook moved to New York City and began performing. Two years later, he moved to Los Angeles, where he still lives today. His big break came in 1998 when he appeared on Comedy Central's Premium Blend. In 2000, Cook did a half-hour special on Comedy Central Presents. Since then his special has won the", "roast beef, dropped a flour bucket on the dog (to which the narrator remarks, \"Gosh, it ain't a fit night for man nor beast.\"), and ultimately turned the kitchen into a complete disaster. Pete Smith, as narrator, asks sobbing Chloe the whereabouts of a telephone. He decides to make a personal call to Prudence Penny, advice columnist for the Los Angeles Examiner. With 35 minutes before the husband and company arrives, Penny shows doubtful Chloe how to prepare a full course, mouth-watering meal with what is left in the icebox as well as applying unusual housewife remedies to salvage some", "BBC2 performing links for Arena's \"Radio Night\". He also appeared in the 1993 Christmas special of One Foot in the Grave (\"One Foot in the Algarve\"), playing a muckraking tabloid photographer. Before the end of the next year, his mother died, and a grief-stricken Cook returned to heavy drinking. He made his last television appearance on the show Pebble Mill at One in November 1994. Personal life and death Cook was married three times. He was first married to Wendy Snowden, whom he met at university, in 1963; they had two daughters, Lucy and Daisy, but divorced in 1971. Cook", "guilty. According to court documents, the Cooks operated a fraudulent charity, ostensibly to benefit the LDS Church, but instead bought show horses, his and her Cadillacs, a 40-acre (160,000 m²) estate, and the majority share of an oil rig which gave Cook the right to name it. He named it after himself. The trial began on January 17, 2007.\nOn February 20, 2007, Cook was found guilty by a federal jury of seven charges for failing to pay taxes on $8.9 million that the government says he should have reported as personal income from 1998 to 2000. His sentencing was", "appetizer round over private chef Larry Monaco, she was eliminated in the entrée round after serving undercooked beef to judges Scott Conant, Chris Santos, and guest judge Greg Koch, as well as not using enough beer cheese in her dish. Death Le died on December 19, 2017 in Los Angeles from stomach cancer at the age of 46. Despite having a fairly short resume, she was acknowledged in the In Memoriam segment at the 90th Academy Awards.", "own.\nOne of his last shows was Swing Along (1929), written with Will Vodery.\nIn 1944, Cook was diagnosed with pancreatic cancer and was admitted in June to Harlem Hospital in New York City. He died 29 days later in the hospital, on July 19, 1944, from cancer and a heart ailment. Cook is buried in Washington, D.C's Woodlawn Cemetery.", "years in prison. In 1951, a California jury sentenced him to death for killing the salesman from Seattle, Robert Dewey. On December 12, 1952, Cook was executed in the gas chamber at San Quentin Prison. \"I hate everybody's guts,\" he said at the time of his arrest, \"and everybody hates mine.\"\nCook's body was returned to Joplin, Missouri, to be buried in Peace Church Cemetery.", "She later disappeared in the third episode.\nOn 23 November 2016, she released her cookbook entitled Kuchnia dla całej rodziny (Kitchen for the whole family), which was published by Edipresse Books. Private life On 13 June 2009, she got married. She has two children, son Julek and daughter Kalina.", "retired in 1989 after 45 years abroad, and moved back to his hometown, Philadelphia, where he died at home in 1995. He was a member of the Century Club in New York City, and the Garrick and Lansdowne Clubs in London.\nCook was married to Cherry Mitchell Cook, who died in 1983. They had seven children: Christopher Cook, Jennifer Thompson, Adrienne Garreau, Deborah Prosser, Caron Merrill, Danielle Cook, and Dominique Cook.", "eventually returned to film more episodes. While she was still in recovery, Cooking with Dog featured a close acquaintance of Chef's named Shin Kohama (小濱 晋), an actor in the theater troupe Jimo-Koyo.\nOccasional videos also showed Chef outside the kitchen playing with Francis or taking him to be groomed. When asked how she feels about fame, Chef stated that although she does not enjoy being famous, the reaction from fans enjoying the program makes her want to produce more content. The show's Twitter and Facebook feeds also showcase Chef and Kohama's love of food by way of pictures of their", "Boston-based WGBH-TV. She soon starred in her own show The French Chef, which was followed by other shows. At the time of her death she was credited by the media as having \"demystified the art of cuisine for the home cook and inspired many of today's celebrity chefs\". Such was her impact on American cuisine, her kitchen has been preserved on display at the Smithsonian Museum of American History.\nIn recent years, gaining a Michelin star has increased a chef's profile sufficiently for them to be featured on television and become a household name. Marco Pierre White became the youngest chef", "end of his life, Cook appeared as Streeb-Greebling, interviewed by Ludovic Kennedy in \"A Life In Pieces\". The series of twelve five-minute interviews saw Sir Arthur recounting snippets of his life loosely based on The Twelve Days of Christmas. Another set of more famous and successful interviews involving Cook as Streeb-Greebling with Chris Morris as the interviewer (basing his performance on his abrasive newsreader character from On the Hour and The Day Today) were broadcast on Why Bother? on BBC Radio 3 in 1994, less than a year before Cook's death. Reaction William Cook described the character as \"one of", "stuck in her subclavian artery and obstructed blood flow which led to her being transported to Maidstone Hospital. Cook consequently had her clavicle plate carefully removed but it took her time to get her strength back. It was announced in July 2016 that she had obtained the funding which allowed her to take part in the Rally Finland. Cook survived an intermittent engine misfire caused by a damaged crankshaft sensor and this prompted a mid-rally engine switch. She eventually finished 53rd overall.\nCook turned to crowdfunding and sold more of her trophies to enable her to pay for her entry fees", "time of his death, there were a number of benefit concerts planned, featuring many of his collaborators. Kitchen was survived by his wife, Germaine, and two daughters, Sev and Jasmine.\nIn an interview with City Press shortly before his death, Kitchen said: \"I've lived life, I'm proud of my credibility and what I've done – more than most my age. I've filled up three lifetimes in a way.\" Discography Waiting for the Heave (1987) Hairy Guava Records\nCity Child (1995) Tekweni Music Company\nAmakoologik (1999) Wildebeest Records\nAfrica's Not for Sissies (2001) No Budget Records\nAquarian Quartet Live (2002) (with Tony Cox, Steve Newman &", "the 2010 season finale, a huge fire started during a family dinner at Ankerseteren. Three people, Dagny, Ragnhild and Cecilie, were killed in the fire.", "and eventually overwhelming evidence of his innocence. What is perhaps most amazing is the grace with which he now lives his life as a free man, determined to prevent others from suffering the horrors he endured.\"\nCook is one of six people whose stories were dramatized in the play The Exonerated by Eric Jensen and Jessica Blank. This details how each individual was convicted of murder and sentenced to death, in addition to their exoneration after varying years of imprisonment. Cook often personally participates in the play. The Exonerated has been made into a film, which first aired on the", "relapse, Hugh Cook died on 8 November 2008, in the hospice in Auckland.", " In the mid-1970s Cook's fortunes changed for the better when she met and befriended composer and pianist Wally Harper. Harper convinced her to put together a concert and on January 26, 1975, accompanied by Harper, she made her debut in a legendary solo concert at Carnegie Hall that resulted in a highly successful live album. Continuing a collaboration with Harper that lasted until his death in 2004, Cook became a successful concert performer. Over the next three decades, the two performed together at not only many of the best cabaret spots and music halls like Michael's Pub and the", "he was involved for a time with the actress Alfre Woodard before marrying Cara Cook and having two children in 1984 and 1986.\nHe also made frequent appearances as a celebrity guest on the game shows Body Language, Super Password, and the $25,000 and $100,000 Pyramids, including helping a contestant win a $100,000 Pyramid Tournament of Champions in 1988. He also appeared as a celebrity in the 1987 game show pilot for Money in the Blank. Death Cook died on June 11, 1988, from a severe allergic reaction to penicillin. His body is interred at Forest Lawn Memorial Park (Hollywood Hills)" ]
The Hateful Eight in 70mm, is there no way to replicate so every theatre gets that "visual effect"?
[ "Gonna get a little technical: \n \nThe movie has a digital equivalence of around 8192x2968 (assuming a 4K equivalence for regular 4-perf 35mm). I don't know of any theater that has a projector above 4K, many are even at 2K (2048x1080, almost the same as regular 1920x1080, as most movies are 2K). \n \nSo, seeing it in a theater with 4K projection is the next best thing (at basically 50% the \"resolution\"). \n \nMovies like Interstellar, The Dark Knight, Star Wars Ep VII (only one scene though), etc. are even bigger because they are 70mm IMAX, which is around 11800x8192. I saw both Interstellar and Star Wars Ep VII in this format and it what great, Interstellar took the cake though in terms of how amazing it was visually/immersively.", "Are you asking how any theater can get the visual effect of a 70mm movie? The method is: show 70mm film on a 70mm projector.\n\nAre you asking how they can get the same image quality without using the necessary equipment? Why should that be possible?" ]
[ "violence. The suspense level is high as well, as is the performances from all the actors. The production value is a little low for a larger budgeted indie film. And believe it or not, Germ Z does have some funny points and one or two spine chilling moments.\" It also notes that \"There is absolutely nothing new brought to the zombie cinema world here.\"\nLea Lawrynowicz of HorrorNews.Net called it \"a really obvious, run of the mill, typical zombie flick\". She also noted that “Germ Z”, ain’t all bad. Production values are good, even if it's clear the budget", "theaters or on television have often laughed at the random mistakes viewed in the film, blaming it on Ed Wood's careless staging. These include visible microphones, ordinary chairs doubling for aircraft equipment, and plumbing hardware visible aboard the aliens' flying saucer. Wood, however, had framed his shots for theatrical widescreen viewing, expecting that the ephemera at the top and bottom of the frame would be cropped when projected. Only when the film is viewed in its original widescreen aspect ratio does it become apparent that Wood did compose his scenes correctly. The various objects intruding on the picture were never", "criticism, they felt that the film's action was substandard, the fight choreography weak, and certain scenes were \"ruined by pretentious visual manipulation\". They offered that Disturbance \"is a good-looking movie\", but that its visual prowess could not hide the fact of the film's low budget. They conceded that use of color and shadow \"are utilized strikingly\" and \"make for good eye candy, even if they are not overly endowed with thespian qualities\", and offered that Paul Sloan has \"a magnetic presence onscreen\" and Hayley DuMond delivers \"an impressive emotional scene toward the end,\" and summarize that \"As far as low-budget", "cascading unrelated scenarios, poor lighting and automatic dialogue replacement, cheap camera angles, and scratches; to make it look like an old film. But critics thought had Roden used 35mm instead of a digital camera, it could've been something else rather than making it look like a second rate copycat of Blairwitch, which failed to have extensive screenings and international distribution.\nHowever, Roden opined it was experimental. Showing a collection of scary scenes patterned from old school Filipino horror movies was the best of its intention. Audience focusing on the characters relation to the story in the movie itself was never recommended", "special effects are often so 1980s-bad, one wonders if it was a deliberate choice, to make the creepy visuals of sculptures dancing and paintings moving less frightening to young viewers. Time and again, terrific actors sink in the equivalent of cinematic quicksand, helpless against the sucking sound of this movie.\" Drew Hunt of Slant Magazine gave the film one out of four stars, saying \"None of the entries in the Night at the Museum series could ever pass for high art, but a wealth of comedic talent gave the first two installments a madcap energy that somewhat forgave their childish", "and Murat Emir Eren. It was shot using the POV technique. Reviews BZ Film gave the movie a three out of ten, saying that aside from some \"unintentional laughs, the film doesn't offer anything new to the zombie subgenre\". Todd Brown of Twitchfilm said that the film had many \"technical faults\" with sound and lighting but \"enough depth to keep the audience captivated\".", "it 2/5 stars and criticized the acting and dialogue. Peter Dendle wrote, \"Unconvincing actors try to make you think the world is coming to an end by running around abandoned buildings in this anemic offering from Hamilton, Ontario.\" Sequels A sequel was produced, Zombie Night 2: Awakening. There was also a mock documentary, following the film makers as they attempt to make Reel Zombies in a time of real zombies.", "see it – in a mid-1990s basic-cable nightmare of a film loaded with xenophobia, and threadbare action-thriller clichés.\" On Metacritic, the film has a score of 28 out of 100, based on reviews from 35 critics, indicating \"generally unfavorable reviews\". Audiences polled by CinemaScore gave the film an average grade of \"A–\" on an A+ to F scale, the same score as the first film.\nIgnatiy Vishnevetsky of The A.V. Club wrote: \"A murky, brain-dead stab-a-thon packed with so many inane chases, laughable special effects, and mismatched stock footage shots that it begs to be made into a drinking game, London", "Horrors anthology. Sopko calls the short \"psychedelic\" and \"beautiful\", while Howk calls the special effects \"gorgeous\". Fisher considers Entity one of the films that made the anthology worth watching, though he found the plot wanting, complimenting Hilsum's performance and the short's \"marvellous visuals ... mind-blowing imagery that puts many high profile releases to shame.\" Adelgaard agrees on the latter point: \"It's hard to believe you're 'just' watching a short film in a horror anthology when it looks like scenes from a Hollywood million dollar production.\"\nJavier Parra, reviewing the short at the Nocturna Madrid festival, was less impressed, suggesting it was", "big screen nearly as well as Rob Reiner did with Stand by Me (1986). Entertainment Weekly journalist Chris Nashawaty summarized \"It is essentially two movies. The better by far is the one that feels like a darker Stand by Me (1986) a nostalgic coming-of-age story about seven likable outcasts riding around on their bikes and facing their fears together.\" Tim Grierson of Screen International spoke highly of Claude Paré and Chung Chung-hoon's ability to \"drape the horror scenes in a clammy atmosphere\", without seeming too far removed from \"the otherwise realistic portrayal of racism, sexual humiliation and bullying\" of Muschetti's", "The review aggregation website Rotten Tomatoes gives the film a rating of 55%, based on 216 reviews, with an average rating of 5.74/10. The website's critical consensus reads, \"The Minions' brightly colored brand of gibberish-fueled insanity stretches to feature length in their self-titled Despicable Me spinoff, with uneven but often hilarious results\". On Metacritic, the film has a score of 56 out of 100, based on 35 critics, indicating \"mixed or average reviews\". In CinemaScore polls, cinema audiences gave Minions an average grade of \"A\" on an A+ to F scale.\nJesse Hassenger of The A.V. Club gave the film a", "production budget.\nThe film received negative reviews from critics. It has a rating of 22% on Rotten Tomatoes based on 82 reviews with an average rating of 4.21/10. The consensus states that \"its sadistic violence is unappealing and is lacking in suspense and mystery.\" The film also has a score of 19 out of 100 on Metacritic based on 20 reviews indicating \"overwhelming dislike.\" Derek Elley of Variety criticized the film, stating that \"8MM is a movie that keeps jumping the gate and finally unravels all over the floor.\"\nRoger Ebert was one of the film's admirers and gave the film three", "and a story, low-budget UN meeting consisting of a handful of delegates hurling pieces of paper at each other.\" \nFrom retrospective reviews, Glenn Kay (Zombie Movies: The Ultimate Guide) also noted the poor dialogue, as well as bad shot composition -- with scenes changing from day to night between cuts, slow pacing and overacting. AllMovie described the film as \"cluelessly bad\" with a script of \"dreadful characterizations and dialogue,\" noting that it would be enjoyed by fans of cult and trash cinema. John Kenneth Muir (Horror Films of the 1980s) stated the film was not enjoyable to watch and that", "artificially positioned out of dramatic and emotional frame, and out of synchronization with one another. Only when the three-print Cinerama process was projected upon a Cinerama screen did the positions and emotions of the actors synchronize—such as normal eye contact or emotional harmony between actors in a dramatic sequence. Because of the nature of Cinerama, if the film were shown in flat-screen projection, it would appear as if the actors made no eye contact, at all. One brief scene of Mexican soldiers was generously sourced by John Wayne from the 1960 version of The Alamo, in which he starred, produced,", "reverberates through the floor and the theater's speakers; tissue paper is large and stiff ...\", adding that these effects gives the audience \"a glimpse into their own world, but from a different perspective\". Mark Schilling of The Japan Times gave the film a rating of four out of five stars, and said that the film \"speaks straight to the heart and imagination of [everyone].\" Schilling also praised the film's animation, saying that [Studio Ghibli animators] are past masters at creating the illusion of presence and depth without [3-D effects]. However, he also said that some scenes in the film \"threatens to", "of Cinematic Arts. Reception Staci Layne Wilson, writing for Dread Central, praised the acting and the effects, but said that \"the lackluster plot and shaky-cam cinematography are bound to have more viewers diving for the fast-forward button early on, skipping to the end and not missing a thing in-between\".\nMartin Liebman, of Blu-ray.com, wrote, \" Zombie Killers: Elephant's Graveyard is a film that tries too hard and ends up lacking the tighter cohesion necessary to tell a better, richer story\". High-Def Digest's Bryan Kluger wrote, \"'Zombie Killers: Elephant's Graveyard' lacks any real sense of direction, horror, and gore. It also tries", "film, writing that \"unless a viewer is addicted to freakish ironies, the unlikely spectacle of Mr. Williams losing an inch of height each week, while his wife, Randy Stuart, looks on helplessly, will become tiresome before Universal has emptied its lab of science-fiction clichés.\" Brog of Variety wrote the \"film isn't a thoroughly satisfactory chiller, even thought there is enough on the good side to carry it.\" He pointed out that the \"unfoldment is inclined to slow down on occasion, resulting in flagging interest here and there.\" Brog's review noted the special effects and cinematography were \"visually effective\" but that", "good looking zombies and the appropriate amount of splatter.\" Daniel Benson of HorrorTalk rated it 3/5 stars and called it \"an odd film that suffers from pacing issues and finishes just as things get going\", though it brings new ideas to a tired genre. Writing in The Zombie Movie Encyclopedia, Volume 2, academic Peter Dendle said, \"A few strange twists and some decent acting keep this humble Californian apocalypse on its feet.\"", "448), marking the largest third-weekend theater drop in history, beating Live by Night's record of 2,659. Critical response On Rotten Tomatoes, the film holds an approval rating of 17% based on 132 reviews, with an average rating of 4.06/10. The website's critical consensus reads, \"The Darkest Minds does little to differentiate itself in a crowded field of YA adaptations, leaving all but the least demanding viewers feeling dystopian déjà vu.\" On Metacritic, the film has a weighted average score of 39 out of 100, based on reviews from 28 critics, indicating \"generally unfavorable reviews\". Audiences polled by CinemaScore gave the", "dull flick may have mustered is completely obscured by some of the murkiest cinematography on record; the fact that nearly every scene is shrouded in complete darkness may prove a blessing in disguise.\" Tim Brayton from Antagony & Ecstasy gave the film a negative review calling the film \"Junk\" and criticized the film's characterization as being \"of limited interest\" but complimented the film's unique villain and being better acted than most slasher films. Justin Kerswell from Hysteria Lives! awarded the film 2.5/5 stars, writing, \"HUMONGOUS seems to desperately want to be a hefty helping of true American Gothic, but in", "a principle in theatrical magic that \"the audience will often remember or describe an exaggerated effect\" – so the audience members may not notice the increased height caused by the \"faked second shot\" (if the additional height is not more than a few extra centimeters) when watching the combined footage later, believing that they are seeing a genuine recreation of the performance. This is even more likely if, during the original performance, cameras are positioned in the same place as those from which the \"faked\" footage was later shot. History Ed Balducci published the first known description of the illusion", "thick and identical to the actor's face; it would be applied first, then a second mask that was thin was stuck to the other along the edges with tubes used to blow air through them. Freda later stated that the producers ruined the scenes with this special effect. Freda stated the producers had them split the nightmare scene into several pieces, instead of having it done as one long take. Release The Horrible Dr. Hichcock was submitted to the board of censors in June 1962 where it was given the V.M.18 rating, becoming the first horror film to receive this", "and the special effects of the Axeman. Andrew Barker of Variety compared the film to the previous installment as \"equally moribund, and perhaps even more shamelessly derivative\". He compared Roberts' Wesker to Hugo Weaving's Agent Smith from The Matrix, calling it a \"slipshod impression\". A particularly scathing review came from Brian Orndorf of Dark Horizons, who commented: \"Perhaps the first 3D motion picture to simulate the experience of watching paint dry, Resident Evil: Afterlife is a dreadful bore that only occasionally comes to life.\"", "very basic presentation of this film itself looks like a village affected with plague as every character on the screen looks like dullards\".", "stars and wrote, \"If you like the genre check this out; it's a refreshing take on an old storyline that's surprisingly entertaining and smart.\" Gordon Sullivan of DVD Verdict wrote, \"Though it has some good ideas—having actors play themselves, tying the film into the real world, making zombies slightly less threatening, and making a zombie film with \"real\" zombies—these additions to the formula aren't utilized effectively.\"", "aggregator, reports that 53% of 16 surveyed critics gave the film a positive review; the average rating was 4.8/10. Metacritic rated it 48/100 based on 5 reviews. \nRob Staeger of The Village Voice wrote the film moves from moralizing to under-explored themes while remaining full of stereotypical characters. Fangoria compared Contracted to the similarly plotted Thanatomorphose, saying that while both had a similar premise, Contracted's \"visual palette is relatively conventional\" in comparison. In a mixed review, Andy Webster of The New York Times wrote that the \"ending to this fable misses the opportunity for broader metaphorical resonance, but getting there", "1964 original, but the same attributes make the character dull, according to the review. The production values of the film have been described as \"third rate\" and the direction \"haphazard\". In the same review it is mentioned that \"the cast is overacting shamelessly\" and that the film is not faithful enough to Poe's story to justify its title.\nThe Orlando Sentinel critic comments that to enhance the portrayal of Death in this film version, the rest of the actors play listlessly as if they were already dead for added effect. He then pokes fun at the special effects which he does", "ever made. However, it is definitely the worst one you can watch with your lights on, the volume up, and your door unlocked.\" \nReviewer Matt Caracappa was more lenient on the film, highlighting the uniqueness of the film's premise. However, he notes that the film is \"incredibly annoying... as in, painful and grating to see and hear,\" and that ultimately \"once the novelty of the insanity wears thin, you're left with an exceedingly boring movie that plods along worse than a one-legged duck who just barely survived a big fire.\" In popular culture A significant number of VHS copies are", "L. Miller of Ain't It Cool News called it \"a thinking man's zombie flick with some fun performances and decent effects.\" Writing in The Zombie Movie Encyclopedia, Volume 2, academic Peter Dendle called the film \"a patient meditation\" with a \"mournful, serious tone\" and \"rich aesthetic to many of the scenes.\"\nDavid Moody, the author of the source novel, said, \"Ultimately, although it has some redeeming qualities, and the main cast did a great job, I think it was a disappointment to a lot of people. The filmmakers were really stretched by having to work within a microscopic budget, and", "execution \"abysmal.\"\nConversely, Katie Walsh, reviewing for the Chicago Tribune, was more positive, saying \"despite [its] unfortunate shortcomings, Pixels has its funny and fresh moments, thanks in large part to the supporting comic actors and inventive special effects\". According to a B+ review by Lights Camera Jackson, \"Pixels is one of the most original and enjoyable movies of the year ... a smart and often very funny summer action comedy.\"" ]
Calvinism
[ "John Calvin was a theologian who was part of the reformation. His theology became known as Calvinism. \n\nBasically Calvinism is boiled down to the TULIP beliefs. \n\n* T - Total Depravity - All parts of man are affected by sin\n* U - Unconditional Election - We are saved by Christ without any conditions. We do not earn it, it is completely a gift.\n* L - Limited Atonement - Jesus died on the cross only for those who follow Him. His atonement for sins was not for everyone.\n* I - Irresistible Grace - If God wants you to follow Him you can't resist the call.\n* P - Perseverance of the Saints -Once saved always saved. You can't lose your salvation.\n\nNot every Calvinist agrees with all 5 points. In fact, some say Calvin didn't believe in all of them (the term TULIP was made up after he died) but these are the basic theological points.\n\n**tl;dr - There are two main camps of Christian theology. Men are in control and choose to follow God (Arminianism) and God is in control and chooses who follows Him (Calvinism).**" ]
[ "Calvinism Etymology Calvinism is named after John Calvin. It was first used by a Lutheran theologian in 1552. It was a common practice of the Roman Catholic Church to name what it viewed as heresy after its founder. Nevertheless, the term first came out of Lutheran circles. Calvin denounced the designation himself:\nThey could attach us no greater insult than this word, Calvinism. It is not hard to guess where such a deadly hatred comes from that they hold against me.\n— John Calvin, Leçons ou commentaires et expositions sur les Revelations du prophete Jeremie, 1565\nDespite its negative connotation, this designation became increasingly", "and incomplete. Calvinist Christian views Although Calvinists believe God and the truth of God cannot be plural, they also believe that those civil ordinances of man which restrain man from evil and encourage toward good, are ordinances of God (regardless of the religion, or lack of it, of those who wield that power). Christians are obligated to be at peace with all men, as far as it is up to them, and to submit to governments for the Lord's sake, and to pray for enemies.\nCalvinism is not pacifistic and Calvinists have been involved in religious wars, notably the French Wars", "Calvin's system of theology and Christian life forms the basis of the Reformed tradition, a term roughly equivalent to Calvinism.\nThe Reformed tradition was originally advanced by stalwarts such as Martin Bucer, Heinrich Bullinger and Peter Martyr Vermigli, and also influenced English reformers such as Thomas Cranmer and John Jewel. However, because of Calvin's great influence and role in the confessional and ecclesiastical debates throughout the 17th century, this Reformed movement generally became known as Calvinism. Today, this term also refers to the doctrines and practices of the Reformed churches, of which Calvin was an early leader, and the system is", "Calvinistic Methodists Calvinistic Methodists were born out of the 18th-century Welsh Methodist revival and survive as a body of Christians now forming the Presbyterian Church of Wales. Calvinistic Methodism became a major denomination in Wales, growing rapidly in the 19th century, and taking a leadership role in the Welsh Religious Revival of 1904-5.\nCalvinistic Methodism claims to be the only denomination in Wales to be of purely Welsh origin, owing no influence in its formation to Scottish Presbyterianism. It is also the only denomination to make use of the title Calvinistic (after John Calvin) in its name. In 18th-century England Calvinistic", "History of Calvinism Calvinism originated with the Reformation in Switzerland when Huldrych Zwingli began preaching what would become the first form of the Reformed doctrine in Zürich in 1519.\nZwingli and John Oecolampadius became embroiled in conflict over the real presence of Christ in the Eucharist with Martin Luther, leading to a division between Lutheran and Reformed Protestants. Several theologians succeeded Zwingli, the best known of which is John Calvin in Geneva, but other reformers like John Oecolampadius, Heinrich Bullinger, Peter Martyr Vermigli, and Wolfgang Musculus were also very influential in the development of Reformed theology.\nReformed faith spread throughout Europe in", "New Calvinism New Calvinism, also known as the Young, Restless, and Reformed Movement, is a movement within conservative evangelicalism that embraces the fundamentals of 16th-century Calvinism while seeking to engage these historical doctrines with present-day culture. History The origins of the movement are associated with a conference held in Louisville, Kentucky in 2006, Together for the Gospel by American pastors John Piper, Mark Driscoll, Matt Chandler, Al Mohler, Mark Dever and CJ Mahaney. In March 2009, Time magazine ranked it as one of the \"10 Ideas Changing the World Right Now.\" Criticism R. Scott Clark, professor of church", "and admirers of Calvin, his interpretation of scripture, and perspective on Christian life and theology. Calvin's system of theology and Christian life forms the basis of the reformed tradition, a term roughly equivalent to Calvinism.\nThe reformed tradition was originally advanced by stalwarts such as Martin Bucer, Heinrich Bullinger and Peter Martyr Vermigli, and also influenced English reformers such as Thomas Cranmer and John Jewel. However, because of Calvin's great influence and role in the confessional and ecclesiastical debates throughout the 17th century, this reformed movement generally became known as Calvinism. Today, this term also refers to the doctrines and practices", "Protestant work ethic The Protestant work ethic, the Calvinist work ethic, or the Puritan work ethic is a work ethic concept in theology, sociology, economics and history that emphasizes that hard work, discipline, and frugality are a result of a person's subscription to the values espoused by the Protestant faith, particularly Calvinism. \nThe phrase was initially coined in 1904–1905 by Max Weber in his book The Protestant Ethic and the Spirit of Capitalism. Weber asserted that Protestant ethics and values along with the Calvinist doctrine of asceticism and predestination gave birth to capitalism. It’s one of the most influential and", "and Huldrych Zwingli, but this branch of Christianity bears the name of the French reformer John Calvin because of his prominent influence on it and because of his role in the confessional and ecclesiastical debates throughout the 16th century.\nToday, this term also refers to the doctrines and practices of the Reformed churches of which Calvin was an early leader. Less commonly, it can refer to the individual teaching of Calvin himself. The particulars of Calvinist theology may be stated in a number of ways. Perhaps the best known summary is contained in the five points of Calvinism, though these points", "saying in a humorous tone: \"Calvinism came after Calvin ... I will argue that the Calvinists are not very Calvin. I will argue against Calvinism with Calvin ... What kind of Calvinist are you? I'm a Calvin, not a Calvinist, that came later\". Driscoll also believes that this position (or slight variations thereof) was held by men like Charles Spurgeon, John Bunyan, Martin Luther, and Richard Baxter.\nDriscoll distinguishes between double and single predestination, and says that unlike John Calvin, he believes only in single predestination. Emerging church Driscoll was associated with the emerging church movement. He described the movement as follows:\nThe emerging", "Extra calvinisticum Extra calvinisticum (Latin: The Calvinistic beyond/outside) is a theological terminus technicus given by Lutheran scholastic theologians around 1620 to the teaching that Christ's divine nature cannot be enclosed or imprisoned within a human nature, but remains infinite despite being in union with a finite body. The doctrine is named for and associated with John Calvin, but is commonly found in the church fathers and is prominent in Augustine's Christology. This theological distinction is in contrast to scholastic Lutheran Christology. In the theology of Martin Luther Jesus Christ is omnipresent, not only his divine nature but also", "excommunicated under the 1521 Edict of Worms and subsequent attempts to reiterate it, including the majority of German speakers (the only German speaking areas where the population remained mostly in the Catholic Church were those under the domain or influence of Catholic Austria and Bavaria or the electoral archbishops of Mainz, Cologne, and Trier). Calvinism Calvinism is a system of Christian theology and an approach to Christian life and thought within the Protestant tradition articulated by John Calvin and subsequently by successors, associates, followers and admirers of Calvin and his interpretation of Scripture, and perspective on Christian life and theology.", "Calvin Synod (United Church of Christ) The Calvin Synod is an acting conference of the United Church of Christ, composed entirely of Reformed, or Calvinist congregations of Hungarian descent. Unlike much of the UCC, the Synod is strongly conservative on doctrinal and social matters, and many members of the \"Faithful and Welcoming Movement,\" a renewal group acting to move the UCC in a more orthodox direction, belong to this body. Origin Hungarians began to emigrate to the United States toward the end of the 19th century. Like other immigrants of Protestant faith, they brought their Bibles, catechisms and hymnals with", "gospel is offered to the non-elect. Neo-Calvinism Neo-Calvinism, a form of Dutch Calvinism, is the movement initiated by the theologian and former Dutch prime minister Abraham Kuyper. James Bratt has identified a number of different types of Dutch Calvinism: The Seceders—split into the Reformed Church \"West\" and the Confessionalists; and the Neo-Calvinists—the Positives and the Antithetical Calvinists. The Seceders were largely infralapsarian and the Neo-Calvinists usually supralapsarian.\nKuyper wanted to awaken the church from what he viewed as its pietistic slumber. He declared:\nNo single piece of our mental world is to be sealed off from the rest and there is not", "is a form of Calvinism which later adherents called \"consistent Calvinism.\" The view evolved into a distinct theology which dominated theological thinking in New England, which was predominately Calvinist. The whole theological movement was important in the Second Great Awakening. It was opposed generally by the theologians of Princeton, including Charles Hodge. Hopkins is credited with originating the phrase \"disinterested benevolence\", though the concept is much older and can, for example, be seen in Jonathan Edwards ethical writings as well.\nOriginally a slaveholder, Hopkins was one of the first of the Congregationalist ministers to denounce slavery. The Congregationalist Church became", "Bible orders public worship. The substance of the doctrine regarding worship is that God institutes in the Scriptures everything he requires for worship in the Church and that everything else is prohibited. As the regulative principle is reflected in Calvin's own thought, it is driven by his evident antipathy toward the Roman Catholic Church and its worship practices, and it associates musical instruments with icons, which he considered violations of the Ten Commandments' prohibition of graven images.\nOn this basis, many early Calvinists also eschewed musical instruments and advocated a cappella exclusive psalmody in worship, though Calvin himself allowed other scriptural", "nothing is left to chance or human free will.\" \"The heart of Calvinism is not the doctrine of predestination, or, for that matter, any one of the other Five Points of Calvinism. The central truth proclaimed by Calvinism, Calvinism that is faithful to its heritage, is the absolute sovereignty of God.\"\nCalvin expressly taught that it is God's sovereign decision to determine whether an individual is saved or damned. He writes \"By predestination we mean the eternal decree of God, by which he determined with himself whatever he wished to happen with regard to every man. All are not created on", "now rare to call Arminians a part of the Reformed tradition. While the Reformed theological tradition addresses all of the traditional topics of Christian theology, the word Calvinism is sometimes used to refer to particular Calvinist views on soteriology and predestination, which are summarized in part by the Five Points of Calvinism. Some have also argued that Calvinism as a whole stresses the sovereignty or rule of God in all things including salvation. History First-generation Reformed theologians include Huldrych Zwingli (1484–1531), Martin Bucer (1491–1551), Wolfgang Capito (1478–1541), John Oecolampadius (1482–1531), and Guillaume Farel (1489–1565). These reformers came from diverse academic", "which are external and corporeal.\n [Cit needed] In Reformed theology Reformed (or radical) Two-Kingdoms (R2K) advocates have spent a good deal of time trying to portray Calvin as a keen disciple of Luther on this issue. But while Calvin deployed two-kingdoms language, he generally did so with somewhat different aims and his practical stance was more activistic. Calvin sought to protect the church from the encroachments of the state, and to emphasize that Christians have a spiritual obligation to the state, but the temporal realm does not have the independence that it has in Luther. Despite similarities in language, this", "abandoned observance of papal authority, including the majority of German speakers. Following the Counter-Reformation, Catholic Austria and Bavaria, together with the electoral archbishops of Mainz, Cologne, and Trier consolidated the Catholic position on the German-speaking section of the European continent. Because Luther sparked this mass movement, he is known as the father of the Protestant Reformation, and the father of Protestantism in general. Calvinism Calvinism is a system of Christian theology and an approach to Christian life and thought within the Protestant tradition articulated by John Calvin, a Protestant Reformer in the 16th century, and subsequently by successors, associates, followers", "history and historical theology from Westminster Seminary California, argues that New Calvinists like Driscoll should not be called Calvinists merely because they believe in the five points of Calvinism, but rather he suggests that adherence to the Three Forms of Unity and other Reformed confessions of faith is what qualifies one a Calvinist. Specifically, he suggests that many of the New Calvinists' positions on infant baptism, covenant theology, and continuation of the gifts of the Spirit are out of step with the Reformed tradition.\nJ. Todd Billings, professor of Reformed Theology at Western Theological Seminary argues that the New Calvinists \"tend", "from Germany, Flanders, and France and developed a Protestant character. Strict Calvinists converted a belt of land from the south west (the province of Zeeland), via the Veluwe, to the north of the Netherlands (to the city of Staphorst) during the 17th and even as late as the 18th centuries. This remains strict Calvinist until this day. During the Twelve Years' Truce (between 1609 and 1621) in the Eighty Years' War, the Netherlands saw a civil war along religious lines. The Synod of Dort tried to bring an end to an internal theological conflict within the Calvinist church between two", "sees itself as mediating between the total monergism of the non-traditional Calvinist view and the synergism of the Wesleyan, Arminian, and Roman Catholic views in which even unregenerate man can choose to cooperate with God in salvation.\nThe traditional Calvinist doctrine teaches that a person is secure in salvation because he or she was predestined by God, whereas in the Free Grace or non-traditional Calvinist views, a person is secure because at some point in time he or she has believed the Gospel message (Dave Hunt, What Love is This, p. 481). Evangelical criticism Both traditional Calvinism and traditional Arminianism have rejected", "found among various evangelical groups, such as Southern Baptists, the Evangelical Free Church of America, the dispensationalists in independent Bible Churches and independent Baptist churches. In Australia, many in the Anglican Diocese of Sydney hold to a modified \"four point\" Calvinism, while in England, one author, Dr Alan Clifford, pastor of the Norwich Reformed Church, tirelessly promotes Amyraldism in self-published pamphlets such as Amyraut Affirmed. Yet \"Five point\" Calvinism remains prevalent especially in more conservative groups among the Reformed and Presbyterian churches, Reformed Baptists, among evangelical Anglicans in England and in some non-denominational evangelical churches. Contrary views Amyraldism", "Calvinist doctrine, and its liturgical services are derived from those developed by Neufchâtel and Vallangin, from 1737 and 1772, respectively. The church is governed by a board of directors and board of elders.", "Calvin held that it is \"not the quality of its members, but the presence of the authorised means of grace, [that] constitutes a true church\" (McGrath). Concerns about fragmentation Calvin was concerned to avoid further fragmentation, i.e. splits among the Evangelical churches: \"I am saying that we should not desert a church on account of some minor disagreement, if it upholds sound doctrine over the essentials of piety, and maintains the use of the sacraments established by the Lord.\" Radical Reformation ecclesiology There is no single \"Radical Reformation Ecclesiology\". A variety of views is expressed among the various \"Radical Reformation\"", "Calvinism was introduced in February, 1560, by the pastor, Guillaume Mauget, was much troubled by the wars of religion. Under Henry III of France a sort of Calvinistic republic was installed there. The city was reconquered by Louis XIII (October, 1622).\nAmong the 54 bishops of Maguelone, and the 18 bishops of Montpellier, may be mentioned: Blessed Louis Aleman (1418–1423), later Bishop of Arles; Guillaume Pellicier (1527–68), whom king Francis I of France sent as an ambassador to Venice, and whose leaning as a humanist and naturalist made him after Scévole de Sainte-Marthe \"the most learned man of his century\"; the", "of the Reformed churches, of which Calvin was an early leader, and the system is perhaps best known for its doctrines of predestination and election. Anglicanism Anglican doctrine emerged from the interweaving of two main strands of Christian doctrine during the English reformation in the 16th and 17th centuries. The first strand is the Catholic doctrine taught by the established church in England in the early 16th century. The second strand is a range of Protestant reformed teachings brought to England from neighbouring countries in the same period, notably Calvinism and Lutheranism.\nThe Church of England was the national", "identify the Calvinist view on soteriology rather than summarizing the system as a whole. Broadly speaking, Calvinism stresses the sovereignty or rule of God in all things—in salvation but also in all of life. This concept is seen clearly in the doctrines of predestination and total depravity.\nThe biggest Reformed association is the World Communion of Reformed Churches with more than 80 million members in 211 member denominations around the world. There are more conservative Reformed federations like the World Reformed Fellowship and the International Conference of Reformed Churches, as well as independent churches. Lutheranism Lutheranism identifies with the theology of", "in the field. Protestantism The Heidelberg Catechism of the Reformed Churches founded by John Calvin, teaches that the moral law as contained in the Ten Commandments is binding for Christians and that it instructs Christians how to live in service to God in gratitude for His grace shown in redeeming mankind. The doctrine of the Christian Reformed Church in North America thus stipulates \"that Sunday must be so consecrated to worship that on that day we rest from all work except that which charity and necessity require and that we refrain from recreation that interferes with worship.\"\nLikewise, Martin Luther, in" ]
How does a watch know when a month has 30 or 31 days?
[ "I think you have to manually adjust it every time the month changes, but not sure, sure someone will correct me." ]
[ "fashion as an analog watch (having an hour, minute and second hand) without any moving parts and is added to display the time regardless of the selected mode. The watch has an automatic calendar up to the year 2099 (with no adjustments for leap year; February is always counted as a 28 day month) and amber coloured LED light illuminating the display in the dark.\nThe watch is powered by a CR2025 3 volt lithium button cell which is claimed by the company to last up to 10 years assuming normal operation (20 seconds of alarm usage and 1.5 seconds of", "feature to mark net and split time (lap). Other features include an hourly time beep (hourly chime) and a single daily alarm lasting 20 seconds and an automatic calendar, although auto-adjustment for leap years is not supported as the watch does not record the year. February is always counted as 28 days. The watch uses a faint, green LED backlight located to the left of the display for illumination (in earlier versions it was an amber microlight). According to manufacturer estimates, the watch is reported to be accurate to ±30 seconds per month.\nThe quartz movement is powered by a single CR2016 3-volt", "sundial may only have scale marks representing the hours of daylight; it would have a least count of one hour. A stopwatch used to time a race might resolve down to a hundredth of a second, its least count. The stopwatch is more precise at measuring time intervals than the sundial because it has more \"counts\" (scale intervals) in each hour of elapsed time.\nLeast count of an instrument is one of the very important tools in order to get accurate readings of instruments like vernier caliper and screw gauge used in various experiments.\nLeast count uncertainty is one of the sources", "when one of the prototypes came to market as a running watch in 2011. The owner, Omega collector Thomas Dick, tested the watch and concluded that the battery life of the twin (344) cells was approximately 5 weeks, however the accuracy when bench tested was 0.03 seconds per day, still equating to 12 second per year.\nThere were numerous other prototypes of the calibre 1510 watches, most of which were around case design, there are a number in private hands as well as a selection of prototype case designs and dial variations at the Omega museum in Bienne, Switzerland. These prototype", "TAG Heuer Monaco Design The watch typically features a pair of pushbuttons at the 2 and 4 o’clock position. The dials for the minute and hour counters are at 9 and 3 o'clock respectively. There is a hand-applied date window at 6 o’clock. The watch also features chamfered square and oblong hours markers (dials with \"waffle\" type cross-hatched markers are later reproductions). In the original version, the crown is located at the 9 o'clock position on a square casing. The shape was revolutionary at the time for a chronograph watch.\nEarly versions came with two different colour schemes. The first (represented", "a perpetual calendar. In addition, the watches included an indicator showing the internal temperature.", "Watchkeeping Watch systems A watch system, watch schedule, or watch bill is a method of assigning regular periods of watchkeeping duty aboard ships and some other areas of employment. A watch system allows the ship's crew to operate the ship 24 hours a day while also allowing individual personnel adequate time for rest and other duties.\nWatch durations vary between vessels due to a number of reasons and restrictions; some watch systems aim to ensure that each team takes turns to work late at night, while other systems ensure the same team consistently works at the same hours every day.\nMany watch systems", "for pocket watches used in railroading. These railroad-grade pocket watches, as they became colloquially known, had to meet the General Railroad Timepiece Standards adopted in 1893 by almost all railroads. These standards read, in part:\n...open faced, size 16 or 18, have a minimum of 17 jewels, adjusted to at least five positions, keep time accurately to within 30 seconds a week, adjusted to temps of 34 °F (1 °C) to 100 °F (38 °C), have a double roller, steel escape wheel, lever set, regulator, winding stem at 12 o'clock, and have bold black Arabic numerals on a white dial, with black hands. Types of", "of up to 14, a group they will remain assigned to for the duration of their course. Here watch is used in the nautical sense, \"a group of sailors and officers aboard a ship or shore station with a common period of duty\". Each watch is named for an iconic figure in New Zealand history; examples include Hillary, Kupe, Batten, and Cobham. Watches sleep together in a \"watch house\", eat together in the dining hall, and spend most of their time together. Courses Broadly, Outward Bound divides course offerings into five categories based on their intended participants: teens, young adults,", "interfering with the operation of the watch.\nThere are very few remaining examples of these clocks, other than those on display at the Omega museum in Bienne and Swiss Time Services in the UK, and there are less than 10 known examples in private collections. The pictured clock (owned by Omega collector Thomas Dick) is serviced and working correctly and is accurate to 12 seconds per year, which is within specification of +/- 1 second per month when kept at a constant temperature of between 10 °C and 30 °C. Summary Despite the significance of the beta 21 series of watches the speed", "the same time. The globe rotates once every 24 hours. The calendar dates This dial shows the exact date. The numbering goes to 31, the maximum number of days in a month. In months that have less days (28, 29 or 30), the hand automatically moves forward to the first day of the following month. The seasons The dial shows four drawings by Felix Timmermans, representing the four seasons. Spring is represented by a child with flowers (upper left). The duration of the season is indicated with Arabic numerals for the days and Roman numerals for the hours. Spring lasts", "timepiece needs to be worn for about 10–15 hours before it is fully wound. \nThe power reserve indicator displayed on the watch with automatic- winding movement shows how long a watch will function when not worn. On a manual winding watch, it shows the time left until the watch needs winding. Brief history There are numerous devices for recording the amount of mainspring power stored in the barrel. Power reserve indicators were employed very early on marine chronometers and later in the accurate Railroad grade pocket watches. Today they are used in wrist watches. The first wristwatch with the mechanism", "incorporate the concept of a dog watch, whereby one watch is split into two shorter watches so that there is an odd number each day. Doing so allows crew members to have a different watch schedule each day. Often, the dog watches are set at dinner time to allow the entire crew to be fed in short order. Ship's bell A ship's bell is used in concert with a watch system to indicate the time by means of bell strikes to mark the time and help sailors know when to change watches. Unlike civil clock bells, the strikes of a", "the watch movement. Watch specifications The watch has two dials and is made from pure 18K gold with a non-reflective glass of blue sapphire. It includes 834 parts and 16 horological complications, including tourbillon, minute repeater, moon phase, moon age and perpetual calendar, sky chart, sunrise, sunset and the equation of time. Price The Tour de l'lle wristwatch is one of the most complicated wristwatches in the world. In total, only seven pieces were manufactured, each of which had a price of more than US$1 million. On April 3, 2005, a Tour de I'lle wristwatch was auctioned by Antiquorum, reaching", "possible to determine the date of the year, or it may be required to know the date to find the correct time. In such cases, there may be multiple sets of hour lines for different months, or there may be mechanisms for setting/calculating the month. In addition to the hour lines, the dial face may offer other data—such as the horizon, the equator and the tropics—which are referred to collectively as the dial furniture.\nThe entire object that casts a shadow or light onto the dial face is known as the sundial's gnomon. However, it is usually only", "is placed upside down. At SIHH in 2017, a cushion-cased Type 1 Squared version of the watch was released. At 11.5mm it is the thinnest of all models yet and allows the time to be set using a retractable level. At the Basel watch fair later that year, a limited-edition (20 pcs) skeleton version of its \"regular\" Type 1 model was released in collaboration with NY-based watch website Hodinkee. Type 3 In 2013, Ressence revealed the 44mm Type 3. It features two separate sealed chambers, one filled with oil below the dial, and the other containing the base caliber filled", "approximately 5 mins and 52.05 s later in reaching noon. The other point to consider when telling the time is that as the Earth moves around the Sun in a slight ellipse, day length varies slightly giving a cumulative difference from the average, of up to 16 minutes in November and February, this, with another correction, is known as the equation of time and was really irrelevant until people started comparing sundials with mechanical clocks, which must either ignore the consequences or be re balanced each day to make them correspond with the natural cycle. They measure average time or local", "the smaller one indicating the date on the rete's calendar dial. The larger one circles the zodiac at one revolution per year and also rotates across the planisphere once per day. Its crossing of the horizon and dawn lines twice per day allows the timing of sunrise, dawn, dusk and sunset.\nThe painted frieze above the astronomical clock shows five deities from classical antiquity, each representing both a day of the week and a planet in their order according to Ptolemaic cosmology. From left to right, they are: Saturn with sickle and club for Saturday, Jupiter with thunderbolts for Thursday, Mars", "the Sun so that the shadow falls directly down the scale. Its end displays the time. Ring dials In a ring dial (also known as an Aquitaine or a perforated ring dial), the ring is hung vertically and oriented sideways towards the sun. A beam of light passes through a small hole in the ring and falls on hour-curves that are inscribed on the inside of the ring. To adjust for the equation of time, the hole is usually on a loose ring within the ring so that the hole can be adjusted to reflect the current month. Card", "slight variations of position. Even if a pocket watch was kept most of the time in a breast pocket, the exact position could still vary over 45°. Watchmakers can regulate a watch in up to eight positions: dial up, crown down, dial down, crown left, crown up, crown right, half-way position crown up, and half-way position crown down. A tourbillon quite neatly reduces this problem; it only needs to be regulated for three positions: the two horizontal positions, dial up & down, and one vertical position.\nEven with new materials and improved theories, it is impossible to regulate a mechanical", "all the watches, it was necessary to split one of the watches in half, to create an odd number of watches in a ship's day. This allowed the sailors to stand different watches instead of one team being forced to stand the mid-watch every night. The choice of time also allows both watches, if there are only two, to eat an evening meal at about the traditional time. Etymology The Oxford English Dictionary states that the word 'dogwatch' is a direct translation from either German or Dutch of a similar term. It originally referred to the night-watch on ships —", "the number \"60\" in place of the \"12\" at the top position of the dial, representing the 60 minutes of the hour.\nThe design of these watches is inspired by the cultural and art history from all over the world. The artistic standard gets clear by the slogan \"Art on the Wrist\".\nA lot of these watches are made in limited edition of only few. The brand has three collections. \n\nThe “Heritage\"- collection has been dedicated to the Russian cultural and art heritage of the 19th century. By creating the models “Dostoevsky“, “Alexander Pushkin“, “Tolstoi“ and “Tchaikovsky“ the Alexander Shorokhoff watch manufacturer", "year clock in 1851. Watches More recently, independent clockmaker Christiaan van der Klaauw created a wristwatch astrolabe, the \"Astrolabium\" in addition to the \"Planetarium 2000\", the \"Eclipse 2001\" and the \"Real Moon.\" Ulysse Nardin also sells several astronomical wristwatches, the \"Astrolabium,\" \"Planetarium\", and the \"Tellurium J. Kepler.\" Generic description Although each astronomical clock is different, they share some common features. Time of day Most astronomical clocks have a 24-hour analog dial around the outside edge, numbered from I to XII then from I to XII again. The current time is indicated by a golden ball or a picture of", "steel-tube housing that can be seen through the dial face. The watch is constructed in industrial-grade tungsten.\nAccording to an announcement by Jean-Christophe Babin, president of TAG Heuer, the watch is also named after the fact that it can withstand an impact of 24,000G, which is an equivalent to a 20 meter fall. Monaco Calibre 6 WW211x The Monaco Calibre 6 does not feature a chronograph movement, is listed as Automatic Watch on the Tag website. Running on a Calibre 6 automatic movement which it takes its name from, the watch features a small seconds counter that is seen at the", "and seconds of arc. An aperture indicates the name of the day of the week.\nThe rear planisphere, similar in size to the one in the front but strictly circular, displays the brightest stars of the main circumpolar constellations (Ursa Major, Ursa Minor, and Cassiopeia). It is centred on the north celestial pole and, with its encircling silvered ring of 24-hour intervals, rotates once a sidereal day relative to a fixed meridian-index.\nDamage to the clock's mechanism was sustained during the fire of 9 July 1984; after 10 years' reparation work, vergers ceased winding it owing to inaccuracies of time-keeping.", "displaying the position of a shadow on a (usually) flat surface, which has markings that correspond to the hours. Sundials can be horizontal, vertical, or in other orientations. Sundials were widely used in ancient times. With the knowledge of latitude, a well-constructed sundial can measure local solar time with reasonable accuracy, within a minute or two. Sundials continued to be used to monitor the performance of clocks until the modern era. Devices that measure duration, elapsed time and intervals Many devices can be used to mark passage of time without respect to reference time (time of day, minutes, etc.) and", "that the apparent solar time is behind (slow) of the mean solar time, with a maximum lag around February 12 and July 27.\nThe difference is zero four times a year; around April 16, June 15, September 1 and December 25. The zodiac Every year the sun describes an imaginary circle around the earth, called the zodiac. The zodiac is divided in twelve segments, each denoted by a sign associated with a constellation.\nThis dial shows the zodiac signs. The signs of spring; Ram, Bull and Twins. The signs of the summer; Crab, Lion and Virgin. The signs of the", "user was prompted to choose the relevant watch model number. \nThe menu choices were the same for all models. The only differences were the amount of available memory in the watches, and the quantity of phone numbers, appointments, lists etc. which could be downloaded to each model.\nAt the time of their introduction, these watches were known as \"PIM\" watches, i.e. personal information managers. Bill Gates was known as an owner of one, and had also shown the capabilities of the watch on television. The Datalink 150 was also offered as a mail-in gift upon purchase of Office 95.\nThe model number", "and Cortina d’ampezzo) and elsewhere. Timepieces Jacob & Co. is known for a number of signature watch styles, such as the \"Five Time Zone Watch,\" which it debuted in 2002. Inspired by the jet-set lifestyle of many of its clients, the timepiece features four fixed time zones—New York, LA, Tokyo and Paris—with the fifth dial set to the location of the wearer. Other notable watches include the \"Quenttin,\" the first-ever watch with a 31-day power reserve, seven mainspring barrels, and a vertical, side-mounted tourbillon (a regulating device in which the timekeeping element of the watch rotates inside a metal cage", "but at best they displayed minutes. As a result of industrial manufacturing in the second half of the 19th century, however, the pocket watch became an everyday item.\nSelected examples:" ]
Why does tiredness feel as though it comes in waves?
[ "Biorhythms. Your body has cycles: breathing, heartbeat, blinking, even which nostril you use. Your wakefulness/tiredness is also cyclic.", "As you get more tired you're body tries harder and harder to send you to sleep. You will then reach an 'optimal' state of tiredness where you will probably be able to sleep within 30 mins. \nHowever, if you stay awake past this point your body thinks there is something wrong for you to still be awake, e.g. You're in danger. \nAs a consequence and survival mechanism it gets rid of the drowsiness by releasing adrenaline to increase alertness as well as other mechanisms to make you alert.\nThis state of temporary alertness can't be maintained for long and you still need to sleep eventually so you become tired again.\nThe cycle can repeat but not for too long, maybe around a day or 2 at most.", "I don't feel it in waves when I get tired. Is this a thing?", "I'm also curios why is that when you're fighting drowsiness. It also comes in waves to a point when your head just fall and you lose control when you give in" ]
[ "Second wind (sleep) Second wind (or third wind, fourth wind, etc.), also occasionally referred to as the wake maintenance zone, is a sleep phenomenon in which a person, after a prolonged period of staying awake, temporarily ceases to feel drowsy, often making it difficult to fall asleep once it happens. They are the result of circadian rhythms cycling into a phase of wakefulness. For example, many people experience the effects of a second wind in the early morning even after an entire night without sleep because it is the time when they would normally wake up.\nWhile most \"winds\" coincide with", "Auditory fatigue Traveling wave theory Temporary threshold shifts related to auditory fatigue are related to the amplitude of a stimulus-driven traveling wave. This is believed to be true because the vibration propagated by the active process is not usually at the center of the maximum amplitude of this wave. Instead, it is located much further down and the differences associated between them explain the shift in threshold. The TTS that is experienced is the exhaustion of the active system located at the locus of the traveling wave driven by the cochlear amplifier described below. Auditory fatigue can be explained by", "out while asleep. This is called sleep-isolated trichotillomania. Causes Anxiety, depression and obsessive–compulsive disorder are more frequently encountered in people with trichotillomania. Trichotillomania has a high overlap with post traumatic stress disorder, and some cases of trichotillomania may be triggered by stress. Another school of thought emphasizes hair pulling as addictive or negatively reinforcing, as it is associated with rising tension beforehand and relief afterward. A neurocognitive model — the notion that the basal ganglia plays a role in habit formation and that the frontal lobes are critical for normally suppressing or inhibiting such habits — sees trichotillomania as a", "proper sleep hygiene.\nMany get a 'second wind' late in the evening, tackle some extra activities, and can't get to sleep until the early hours of the morning. This can be avoided by going to bed earlier in the evening, before the 'second wind' has time to kick in...\n— Archibald Hart \"Fifth day turning point\" Multiple studies have observed that individuals subjected to total sleep deprivation for extended periods spanning multiple days may feel \"helplessly sleepy\" up until the fifth day, upon which all observed individuals would feel what may be described as a second wind. This particular form of the experience", "circuits. Unlike in slow wave sleep, the fast frequency rhythms are synchronized over restricted areas in specific local circuits between thalamocortical and neocortical areas. These are said to be generated by cholinergic processes from brainstem structures. \n\nApart from this, the amygdala plays a role in REM sleep modulation, supporting the hypothesis that REM sleep allows internal information processing. The high amygdalar activity may also cause the emotional responses during dreams. Similarly, the bizarreness of dreams may be due to the decreased activity of prefrontal regions, which are involved in integrating information as well as episodic memory. Ponto-geniculo-occipital waves REM sleep", "may have unsteadiness and problems with gait and balance.\nET-related tremors do not occur during sleep, but people with ET sometimes complain of an especially coarse tremor upon awakening that becomes noticeably less coarse within the first few minutes of wakefulness. Tremor and disease activity/intensity can worsen in response to fatigue, strong emotions, low blood sugar, cold and heat, caffeine, lithium salts, some antidepressants, and other factors. Typically, the tremor worsens in \"performance\" situations, such as when writing a check for payment at a store or giving a presentation.\nParkinson's disease and parkinsonism can also occur simultaneously with ET. The degree of", "stages.\nDuring slow-wave sleep, there is a significant decline in cerebral metabolic rate and cerebral blood flow. The activity falls to about 75 percent of the normal wakefulness level. The regions of the brain that are most active when awake have the highest level of delta waves during slow-wave sleep. This indicates rest is geographical. The “shutting down” of the brain accounts for the grogginess and confusion if someone is awakened during deep sleep since it takes the cerebral cortex time to resume its normal functions.\nAccording to J. Siegel (2005), sleep deprivation results in the build-up of free radicals and superoxides", "a sharp decrease in the temperature of the extremities may independently reverse sleep inertia symptoms. Noise is thought to increase attentiveness upon awakening. A drop in temperature of the extremities may prevent heat loss, facilitating the return of core body temperature to homeostatic daytime levels.", "high rate. The principal characteristics during slow-wave sleep that contrast with REM sleep are moderate muscle tone, slow or absent eye movement, and lack of genital activity.\nSlow-wave sleep is considered important for memory consolidation. This is sometimes referred to as \"sleep-dependent memory processing\". Impaired memory consolidation has been seen in individuals with primary insomnia who thus do not perform as well as those who are healthy in memory tasks following a period of sleep. Furthermore, slow-wave sleep improves declarative memory (which includes semantic and episodic memory). A central model has been hypothesized that the long-term memory storage is facilitated by", "movement (REM) sleep—the stage in which dreaming occurs—may be quick to arrive and intense in depressed people. REM sleep depends on decreased serotonin levels in the brain stem, and is impaired by compounds, such as antidepressants, that increase serotonergic tone in brain stem structures. Overall, the serotonergic system is least active during sleep and most active during wakefulness. Prolonged wakefulness due to sleep deprivation activates serotonergic neurons, leading to processes similar to the therapeutic effect of antidepressants, such as the selective serotonin reuptake inhibitors (SSRIs). Depressed individuals can exhibit a significant lift in mood after a night of sleep deprivation.", "Wake low A wake low, or wake depression, is a mesoscale low-pressure area which trails the mesoscale high following a squall line. Due to the subsiding warm air associated with the systems formation, clearing skies are associated with the wake low. Once difficult to detect in surface weather observations due to their broad spacing, the formation of mesoscale weather station networks, or mesonets, has increased their detection. Severe weather, in the form of high winds, can be generated by the wake low when the pressure difference between the mesohigh preceding it and the wake low is intense enough. When the", "a state of relaxation that shifts an individual's internal clock towards the sleep cycle. This is said to have an effect on children and adults with various cases of sleep disorders. Music is most effective before bed once the brain has been conditioned to it, helping to achieve sleep much faster. Melatonin In addressing sleep disorders and possible solutions, there is often a lot of buzz surrounding melatonin. Research suggests that melatonin is useful in helping people to fall asleep faster (decreased sleep latency), to stay asleep longer, and to experience improved sleep quality. In order to test this, a", "doing physical tasks is experienced by some dyspraxics, and fatigue is common because so much energy is expended trying to execute physical movements correctly. Some dyspraxics suffer from hypotonia, low muscle tone, which like DCD can detrimentally affect balance. Sensory processing disorder Sensory Processing Disorder (SPD) concerns having oversensitivity or undersensitivity to physical stimuli, such as touch, light, sound, and smell. This may manifest itself as an inability to tolerate certain textures such as sandpaper or certain fabrics such as wool, oral intolerance of excessively textured food (commonly known as picky eating), being touched by another individual (in the case", "when the brain is unperturbed, such as during sleep, it is in essence rehearsing the perturbations of the day. Recent studies have confirmed that off wave states, such as slow-wave sleep, play a part in consolidation as well as REM sleep. There have even been studies done implying that sleep can lead to insight or creativity. Jan Born, from the University of Lubeck, showed subjects a number series with a hidden rule. She allowed one group to sleep for three hours, while the other group stayed awake. The awake group showed no progress, while most of the group that was", "mortality. There are no benefits to oversleeping and it can result in sleep inertia, which is the feeling of drowsiness for a period of time after waking. There are two phases of sleep: rapid eye movement (REM) and Non-REM sleep (NREM).\nREM sleep is the less restful stage in which you dream and experience muscle movements or twitches. Also during this stage in sleep, a person's heart rate and breathing are typically irregular. Non-REM sleep, also sometimes referred to as slow-wave sleep, is associated with deep sleep. The body's blood pressure, heart rate, and breathing are generally significantly decreased compared to", "in somnambulism (sleepwalking) or, conversely, sleep paralysis—where one remains partially or wholly paralysed for a short time after waking.\nAdditional to sleep paralysis is hypnagogia. In a near-dream state, it is common to experience auditory and visual hallucinations. Mostly these are forgotten upon fully waking or soon afterwards, in the same manner as dreams. However, most people remember the phenomenon of hearing music or seeing things in near-sleep states at some point in their lives. Typical examples include a feeling of being crushed or suffocated, electric \"tingles\" or \"vibrations\", imagined speech and other noises, the imagined presence of a visible or", "understand language. Hospital noise, at any volume level, is credited with being the primary cause of sleep deprivation, a contributing factor in delirium, and a risk factor for errors. The current pressure to reduce noise at night has been mistakenly understood to mean undue quiet at night when patients most need cues that people are around them and available if they need help. Just s lighting must be designed to serve both day and night, so much the auditory environment be designed to support activity,cognition, rest, and sleep.\nAdding to the above, patients need positive visual and auditory", "Mal de debarquement Symptoms Common symptoms most frequently reported include a persistent sensation of motion usually described as rocking, swaying, or bobbing, disequilibrium with difficulty maintaining balance; it is seldom accompanied by a true spinning vertigo. Chronically fatigued, sufferers can become fatigued quickly with minimal exertion and experience neck and back pain. Other symptoms include the feeling of pressure in the brain, mostly around the frontal lobe area, headaches and/or migraine headaches, ophthalmodynia periodica (ice pick stabbing headaches in the early stages of MdDs), ear pain, ear fullness and possibly tinnitus.\nFluctuations in weather also affect sufferers, in particular hot", "debt. However, some of the higher cognitive functions seem to remain unaffected albeit slower. Many of these effects vary from person to person i.e. while some individuals have high degrees of cognitive impairment with lack of sleep, in others, it has minimal effects. The exact mechanisms for the above are still unknown and the exact neural pathways and cellular mechanisms of sleep debt are still being researched. Sleep disorders A sleep disorder, or somnipathy, is a medical disorder of the sleep patterns of a person or animal. Polysomnography is a test commonly used for diagnosing some sleep disorders. Sleep disorders", "sporting events, car racing, woodworking, pubs, people's activities on the street, etc.\nSound propagation outdoors is subject to meteorological effects (e.g. wind, temperature) that affect the distance, speed, and direction with which environmental noise travels from a source to a listener. Environmental noise and health effects Noise and quality of life are correlated. The increase of environmental noise, especially for those living near railways and airports, has created conflict. Getting adequate and quality sleep is difficult for those who live in areas of high noise exposure. When the body is at rest, noise stimuli is continually being presented in the", "expressiveness in response to positive stimuli, as well as decreased vocal expression of positive emotion. Sleep deprivation slows the generation of facial reactions in response to emotional faces. One to two nights of sleep loss in healthy adults is associated with a decrease in the generated intensity of positive moods (i.e. happiness and activation), as well as an increase in the generated intensity of negative moods (i.e. anger, depression, fear, and fatigue). Long-term chronic exposure to insufficient sleep is associated with a decline in optimism and sociability, and an increase in subjective experiences of sleepiness and fatigue. Furthermore, sleep restricted", "Wake Wake effects caused by viscosity The wake is the region of disturbed flow (often turbulent) downstream of a solid body moving through a fluid, caused by the flow of the fluid around the body.\nFor a blunt body in subsonic external flow, for example the Apollo or Orion capsules during descent and landing, the wake is massively separated and behind the body is a reverse flow region where the flow is moving toward the body. This phenomenon is often observed in wind tunnel testing of aircraft, and is especially important when parachute systems are involved, because unless the parachute lines", "or bend. Chronic pain is common and worsens over time but sometimes acute pain occurs as well. Stress, cold weather, and infections lead to an increase in symptoms, and sleep decreases them.\nSPS patients suffer superimposed spasms and extreme sensitivity to touch and sound. These spasms primarily occur in the proximal limb and axial muscles. There are co-contractions of agonist and antagonist muscles. Spasms usually last for minutes and can recur over hours. Attacks of spasms are unpredictable and are often caused by fast movements, emotional distress, or sudden sounds or touches. In rare cases, facial muscles, hands, feet, and the", "stimulation. Chronic fatigue, on the other hand, is a symptom of a greater medical problem in most cases. It manifests in mental or physical weariness and inability to complete tasks at normal performance. Both are often used interchangeably and even categorized under the description of 'being tired.' Fatigue is often described as an uncomfortable tiredness, whereas sleepiness is comfortable and inviting. Measurement Fatigue can be quantitatively measured. Devices to measure medical fatigue have been developed by Japanese companies, among them Nintendo (cancelled). Nevertheless such devices are not in common use outside Japan.", "of sleep disturbance. It may include sleeping for prolonged periods at night or increased sleeping during the daytime. The sleep may not be restful, and the person may feel sluggish despite many hours of sleep, which may amplify their depressive symptoms and interfere with other aspects of their lives. Hypersomnia is often associated with an atypical depression, as well as seasonal affective disorder. Feelings of guilt or worthlessness Depressed people may have feelings of guilt that go beyond a normal level or are delusional. These feelings of guilt and/or worthlessness are excessive and inappropriate. Major depressive episodes are notable for", "(whose underlying neuronal substrate is strong enough to withstand such spontaneous, chaotic activation) are further strengthened, whilst weaker, transient, \"noise\" memory traces disintegrate. Memory consolidation during paradoxical sleep is specifically correlated with the periods of rapid eye movement, which do not occur continuously. One explanation for this correlation is that the PGO electrical waves, which precede the eye movements, also influence memory. REM sleep could provide a unique opportunity for “unlearning” to occur in the basic neural networks involved in homeostasis, which are protected from this “synaptic downscaling” effect during deep sleep. Neural ontogeny REM sleep prevails most after birth,", "deprived, homeostatic pressure accumulates to the point that waking functions will be degraded even at the highest circadian drive for wakefulness. Other effects In addition, as a result of continuous muscular activity without proper rest time, effects such as cramping are much more frequent in sleep-deprived individuals. Extreme cases of sleep deprivation have been reported to be associated with hernias, muscle fascia tears, and other such problems commonly associated with physical overexertion.\nA 2006 study has shown that while total sleep deprivation for one night caused many errors, the errors were not significant until after the second night of total sleep", "Sleep inversion Sleep inversion or sleep-wake inversion is a reversal of sleeping tendencies. Individuals experiencing sleep-wake inversion exchange diurnal habits for nocturnal habits, meaning they are active at night and sleep during the day. Sleep-wake inversion, when involuntary, can be a sign of a serious disorder. Symptoms Individuals with the delayed sleep phase type of the disorder exhibit habitually late sleep hours and an inability to change their sleeping schedule consistently. They often show sleepiness during the desired wake period of their days. Their actual phase of sleep is normal. Once they fall asleep, they stay asleep for a", "was even more pronounced on the second day of extended wakefulness. Duration The wake maintenance zone generally lasts 2 to 3 hours, during which one is less inclined to fall asleep. While potentially useful for completing urgent tasks, it may have a potentially unwanted side-effect of keeping one awake for several hours after the task has been completed. The hypervigilance and stimulation brought on by a second wind can cause fatigue, which, in the case of infants, can be literally painful. Thus, an infant may begin crying when sleep habits are disrupted.\n\nOne can avoid \"getting a second wind\" by practicing", "is referred to as Process S. The balance between sleeping and waking is regulated by a process called homeostasis. Induced or perceived lack of sleep is called sleep deprivation.\nProcess S is driven by the depletion of glycogen and accumulation of adenosine in the forebrain that disinhibits the ventrolateral preoptic nucleus, allowing for inhibition of the ascending reticular activating system.\nSleep deprivation tends to cause slower brain waves in the frontal cortex, shortened attention span, higher anxiety, impaired memory, and a grouchy mood. Conversely, a well-rested organism tends to have improved memory and mood. Neurophysiological and functional imaging studies have demonstrated that" ]
how does your brain produce a coloured image through staring at a negative?
[ "These are called afterimages and their existence is covered by something called Opponent Process Theory.\n\nBasically, you have 3 types of cells in your eye that detect color. They are called cones. One cone is sensitive to the wavelength of light we associate with \"red\", another to \"green\", and another to \"blue\" light. I put the color names in quotes because you must understand that COLOR DOES NOT EXIST IN THE OUTSIDE WORLD, YOUR BRAIN MAKES IT. This is itself is mindblowing but I promise it is true. \n\nAnyway, the cells get tired after looking at the same thing for too long (both the cones I mentioned and other cells further into your brain). They are a bit like a rubber band that gets stretched out the more it sees a certain color, and the more it stretches the more it really really wants to snap back. Stretching makes you see one color (say, red), while snapping back makes you see another color (green). \n\nThe deeper cells in your brain are arranged in 3 opponent pairs: red-green, blue-yellow, and black-white. So, the more of you see of red, the more the opposite wants to come out. Same with the other colors. \n\n(Neurologically, this occurs because one color is produced by the cells getting excited and building up a particular chemical that tells your brain to produce red. This is an anabolic, or constructive, process. The opposite color is produced by the cells getting inhibited and the chemical being destroyed, which is a catabolic or destructive process. Again, it all works because these chemicals instruct your brain to produce the color image - your brain makes the actual color experience not the world).", "Your eye sensors tire after a short while viewing a static image. In this example they're giving you a fixed point to focus on so that the image stays positioned in the same place on your retina. Notice how her lips are green in the negative. Staring at that wears our your green sensor there. Then, when you switch to look at white (which contains red, green and blue) your eye's red sensors work but the green, temporarily, do not. So you see red lips." ]
[ "scales with mutually exclusive boundaries. In the same way that there cannot exist a \"slightly negative\" positive number, a single eye cannot perceive a bluish-yellow or a reddish-green. Color in the human brain Color processing begins at a very early level in the visual system (even within the retina) through initial color opponent mechanisms. Both Helmholtz's trichromatic theory, and Hering's opponent process theory are therefore correct, but trichromacy arises at the level of the receptors, and opponent processes arise at the level of retinal ganglion cells and beyond. In Hering's theory opponent mechanisms refer to the opposing color effect", "when perceived in a binocular fashion. This means that color judgements, as they relate to spatial comparisons, must be completed at or prior to the V1 monocular neurons. If spatial comparisons occur later in the visual system such as in cortical area V4, the brain would be able to perceive both the color and void color as though they were seen in a binocular fashion. Retinex theory The \"Land effect\" refers to the capacity to see full color (if muted) images solely by looking at a photo with red and gray wavelengths. The effect was discovered by Edwin H. Land,", "in a characteristic way regardless of the method of stimulation. That is to say, the color red causes optical nerves to fire in a specific pattern that is processed by the brain as experiencing the color red. However, if that same nerve is electrically stimulated in an identical pattern, the brain could perceive the color red when no corresponding stimuli is present. Forward Models Forward models are a predictive internal model of motor control that takes the available perceptual information, combined with a particular motor program, and tries to predict the outcome of the planned motor movement. Forward models structure", "Volume 2, page 217. Psychology Press, Texas, 2000)\nEwald Hering explained how the brain sees afterimages, in terms of three pairs of primary colors. This opponent process theory states that the human visual system interprets color information by processing signals from cones and rods in an antagonistic manner. The opponent color theory suggests that there are three opponent channels: red versus green, blue versus yellow, and black versus white. Responses to one color of an opponent channel are antagonistic to those to the other color. Therefore, a green image will produce a magenta afterimage. The green color fatigues the green photoreceptors,", "constancy may be both attributed to localized changes in individual retinal cells or to higher level neural processes within the brain. Metamerism Metamerism, the perceiving of colors within two separate scenes, can help to inform research regarding color constancy. Research suggests that when competing chromatic stimuli are presented, spatial comparisons must be completed early in the visual system. For example, when subjects are presented stimuli in a dichoptic fashion, an array of colors and a void color, such as grey, and are told to focus on a specific color of the array, the void color appears different than", "\"white\", and the cyan within the anaglyph as \"black\". The eye viewing through the cyan filter perceives the opposite. Actual black or white in the anaglyph display, being void of color, are perceived the same by each eye. The brain blends together the red and cyan channeled images as in regular viewing but only green and blue are perceived. Red is not perceived because red equates with white through red gel and is black through cyan gel. However green and blue are perceived through cyan gel. Complementary color Complementary color anaglyphs employ one of a pair of complementary color filters", "appears to be in front. However, under monocular vision, this phenomenon is not observed.\nHowever, Bruecke objected to Einthoven's theory on grounds that not all people see red as closer than blue. Einthoven explained that this negative chromostereopsis is probably due to eccentrically positioned pupils because shifting the pupil can change the position of where light wavelengths focus in the eye. Negative chromostereopsis was further studied by Allen and Rubin who suggested that changing the angle between the pupillary center and visual axis can change the direction of chromostereopsis. If the pupillary center is located temporal to the visual axis, red", "lobe.\nA stimulus which elicits a positive image will usually trigger a negative afterimage quickly via the adaptation process. To experience this phenomenon, one can look at a bright source of light and then look away to a dark area, such as by closing the eyes. At first one should see a fading positive afterimage, likely followed by a negative afterimage that may last for much longer. It is also possible to see afterimages of random objects that are not bright, only these last for a split second and go unnoticed by most people.", "shape and color representations in the brain’s visual system, then imagining an apple activates some or all of these same representations using information stored in memory. Early evidence for this idea came from neuropsychology. Patients with brain damage that impairs perception in specific ways, for example by damaging shape or color representations, seem to generally to have impaired mental imagery in similar ways. Studies of brain function in normal human brains support this same conclusion, showing activity in the brain’s visual areas while subjects imagined visual objects and scenes.\nThe previously mentioned and numerous related studies have led to a relative", "that individuals with temporally eccentric pupils see red in front of blue, while with nasally eccentric pupils the relief is reversed.\" Einthoven first explained chromatic aberration in the eye, which means that the eyes will not focus all the colors at the same time. Depending on the wavelength, the focal point in the eyes varies. He concluded that the reason why people see red in front of blue is because light with different wavelengths project onto different parts of the retina. When the vision is binocular, a disparity is created, which causes depth perception. Since red is focused temporally, it", "subjects’ vision was subjected to the constant stimulus of a single color, neural adaptations occurred that made the subjects used to the color. Once this adaptation had occurred, TMS was used to disrupt the subjects’ visual cortex again, and the flashes of light viewed by the subject were the same color as the constant stimulus before the disruption. Drug induced Neural adaptation can occur for other than natural means. Antidepressant drugs, such as those that cause down regulation of β-adrenergic receptors, can cause rapid neural adaptations in the brain. By creating a quick adaptation in the regulation of these receptors,", "excitatory) response while green creates a negative (or inhibitory) response. These responses are controlled by opponent neurons, which are neurons that have an excitatory response to some wavelengths and an inhibitory response to wavelengths in the opponent part of the spectrum.\nAccording to this theory, color blindness is due to the lack of a particular chemical in the eye. The positive after-image occurs after we stare at a brightly illuminated image on a regularly lighted surface and the image varies with increases and decreases in the light intensity of the background.\nThe veracity of this theory, however, has recently been challenged. The", "focuses on the upper \"y-junction\" the lower left face will appear to be in front. The upper right face will appear to be in front if the eyes focus on the lower junction. Blinking while being on the second perception will probably cause you to switch to the first one.\nIt is possible to cause the switch to occur by focusing on different parts of the cube. If one sees the first interpretation on the right it is possible to cause a switch to the second by focusing on the base of the cube until the switch occurs to the second", "color red, such that output from these neurons is more likely to reach a downstream processing stage, and, as a consequence, to guide behaviour. According to Miller and Cohen, this selective attention mechanism is in fact just a special case of cognitive control – one in which the biasing occurs in the sensory domain. According to Miller and Cohen's model, the PFC can exert control over input (sensory) or output (response) neurons, as well as over assemblies involved in memory, or emotion. Cognitive control is mediated by reciprocal PFC connectivity with the sensory and motor cortices, and with", "brain concentrate on divergence instead of focusing is to hold the picture in front of the face, with the nose touching the picture. With the picture so close to their eyes, most people cannot focus on the picture. The brain may give up trying to move eye muscles in order to get a clear picture. If one slowly pulls back the picture away from the face, while refraining from focusing or rotating eyes, at some point the brain will lock onto a pair of patterns when the distance between them matches the current convergence degree of the two eyeballs.\nAnother way", "This effect often occurs when wearing a monocular HMD. In this setup, researchers also observed objects that completely vanish for several seconds from user's attention. Visual Interference Describes the phenomenon when both eyes perceive different images that are overlapping, but the brain is not able to distinguish between those. This phenomenon is also known as the inability for visual separation. Phoria Describes a muscle state of the eye, when the eyes are not focusing on a specific point. There are three different states, which can be distinguished: Esophoria, Exophoria, Orthophoria. While one eye is closed or being obstructed by", "The stimuli shown to the left eye goes to the right hemisphere and the visual material shown to the right eye will be projected to the left hemisphere. During the experiment, when the stimulus was shown to the left side of the screen, the patient indicated he did not see anything. Patients have shown the inability to describe in writing or in speech the stimuli that was shown briefly to left side. The speaking hemisphere, which in most people is the left hemisphere, would not have awareness of stimulus being shown to the right hemisphere (left visual field), except the", "brains are constantly making decisions about what object they are looking at, where they need to move their eyes next, and what they find to be the most salient aspects of the input stimulus. As these images hit the back of the retina, these stimuli are converted from varying wavelengths to a series of neural spikes called action potentials. These pattern of action potentials are different for different objects and different colors; we therefore say that the neurons are encoding objects and colors by varying their spike rates or temporal pattern. Now, if someone were to probe the brain by", "actual eyes. Random-dot stereograms highlighted a problem for stereopsis, the correspondence problem. This is that any dot in one half image can realistically be paired with many same-coloured dots in the other half image. Our visual systems clearly solve the correspondence problem, in that we see the intended depth instead of a fog of false matches. Research began to understand how.\nAlso in the 1960s, Horace Barlow, Colin Blakemore, and Jack Pettigrew found neurons in the cat visual cortex that had their receptive fields in different horizontal positions in the two eyes. This established the neural basis for stereopsis. Their findings", "hold that there is a \"picture\" in the brain since this is impossible according to this theory since actual pictures in the external world are not coloured. It is plain that Ryle unthinkingly carried over what the eyes do to the nature of sensation; A. J. Ayer at the time described Ryle's position as \"very weak\". So there is no \"screen\" in front of cortical \"eyes\", no mental objects before one. As Thomas Hobbes put it: \"How do we take notice of sense?—by sense itself\". Moreland Perkins has characterized it thus: that sensing is not like kicking a ball, but", "at positive photographs. Similarly, participants registered more eye blinks when studying negative words than positive words (blinking rate has been positively linked to cognitive activity). Also, people were found to show greater orienting responses following negative than positive outcomes, including larger increases in pupil diameter, heart rate, and peripheral arterial tone \nImportantly, this preferential attendance to negative information is evident even when the affective nature of the stimuli is irrelevant to the task itself. The automatic vigilance hypothesis has been investigated using a modified Stroop task. Participants were presented with a series of positive and negative personality traits in", "opposing colors, is worn to view an anaglyphic photo image. A red filter lens over the left eye allows graduations of red to cyan from within the anaglyph to be perceived as graduations of bright to dark. The cyan (blue/green) filter over the right eye conversely allows graduations of cyan to red from within the anaglyph to be perceived as graduations of bright to dark. Red and cyan color fringes in the anaglyph display represent the red and cyan color channels of the parallax-displaced left and right images. The viewing filters each cancel out opposing colored areas, including graduations of", "When an object on the screen moves, the eye follows the object with a constant motion, but the projector displays each alternating color of the frame at the same location for the duration of the whole frame. So, while the eye is moving, it sees a frame of a specific color (red, for example). Then, when the next color is displayed (green, for example), although it gets displayed at the same location overlapping the previous color, the eye has moved toward the object's next frame target. Thus, the eye sees that specific frame color slightly shifted. ", "the optical nor the perceptual factors can be taken in insolation to explain chromostereopsis. This multifactorial component of chromostereopsis offers one explanation of the reversal of the effect in different people given the same visual cues.\nAnother interesting reversal effect was observed in 1928 by Verhoeff in which the red bars were perceived as farther away and the blue bars as protruding when the bars are paired on a white background instead of a black background. Verhoeff proposed that this paradoxical reversal can be understood in terms of the pupil's luminance contours (see: Illusory Contours). The pupil has lines of constant", "series of experiments on figural after-effects. If, for example, an observer stares for about a minute at a fixation point in the center of a visual field that is white except for a large black rectangle on the left side, and then (with the rectangle removed) looks at the center of an array of four evenly-spaced squares, symmetrically arranged around the fixation point, the two squares on the left side will appear farther apart than the ones on the right. Many similar observations are discussed in the Köhler and Wallach paper.\nKöhler considered that this phenomenon supported his theory of psychophysical", "right hemisphere in the location identified by the fMRI scan as pertaining to color processing. It was found the electrical activity of the area increased when the subject was presented with blue stimuli. The next, and most significant finding of the study, was that when the electrode was used to present an electrical stimulus in the subject’s brain, the subject reported the perception of the color blue. Such a result is consistent with other reports of electrical stimulation in visual field maps eliciting perception of phosphines in subjects’ visual field.\nThe color stimulus presented is not the only factor in determining", "perception of visual scenes in terms of competition among multiple representations – such as colors, individuals, or objects. Selective visual attention acts to 'bias' this competition in favour of certain selected features or representations. For example, imagine that you are waiting at a busy train station for a friend who is wearing a red coat. You are able to selectively narrow the focus of your attention to search for red objects, in the hope of identifying your friend. Desimone and Duncan argue that the brain achieves this by selectively increasing the gain of neurons responsive to the", "only two primaries.  Depending on the deficiency they will confuse either red and green or blue and yellow. The opponent-process theory explains color vision as a result of the way in which photoreceptors are interconnected neutrally. The opponent-process theory applies to different levels of the nervous system. Once the neutral system passes beyond the retina to the brain, the nature of the cell changes and the cell responds in an opponent fashion. For example, the green and red photoreceptor might each send a signal to the blue-red opponent cell farther along with the system. Responses to one color of an", "focus. For example, after staring at a computer screen and looking away, a vague afterimage of the screen remains in the visual field. A stimulus consistently produces the same afterimage, which is dependent on the stimulus intensity and contrast, the time of fixation, and the retinal adaptation state. Physiological afterimages are usually the complementary color of the original stimulus (negative afterimage), while palinoptic afterimages are usually the same color as the original stimulus (positive afterimage). There is some ambiguity between illusory palinopsia and physiological afterimages since there are not concrete symptomatic criteria which determines if an afterimage is pathological. Illusory", "so they produce a weaker signal. Anything resulting in less green, is interpreted as its paired primary color, which is magenta, i.e. an equal mixture of red and blue.\nPlay media\nExample movie which produces distortion illusion after one watches it and looks away. See Motion aftereffect. Positive afterimages Positive afterimages, by contrast, appear the same color as the original image. They are often very brief, lasting less than half a second. The cause of positive afterimages is not well known, but possibly reflects persisting activity in the brain when the retinal photoreceptor cells continue to send neural impulses to the occipital" ]
Why are most passwords hidden on-screen by default when you type them, but WIFI passwords are not?
[ "Most on screen passwords are hidden in-case you have any shoulder surfers(people watching you type over your shoulder). WiFi passwords give you the option to either hide or show, in my opinion as WiFi passwords are normally longer than other account passwords they can be hard to make sure your typing correctly without seeing it", "With WiFi, the typical case is that everyone in the room/floor/building/campus has the password, and people in the next room/floor/building/campus don't. If someone is able to see the password on the screen, they're obviously in the same room/floor/building/campus, and therefore they were supposed to have the password anyway.\n\nOf course, that's not always true - and for the times when it's no true, there's usually an option to hide the password on-screen.", "When I enter a WPA passphrase, usually I'm looking at a printed version of it, or someone has just told it to me aloud. So anyone who could shoulder-surf it off my screen could have just read it as well or overheard it." ]
[ "of the system, certainly from a security viewpoint. This is partly because users are more willing to tell another person (who may not be authorized) a shared password than one exclusively for their use. Single passwords are also much less convenient to change because many people need to be told at the same time, and they make removal of a particular user's access more difficult, as for instance on graduation or resignation. Separate logins are also often used for accountability, for example to know who changed a piece of data. Password reuse It is common practice amongst computer users", "from deterring shoulder surfing to more sophisticated physical threats such as video cameras and keyboard sniffers. Passwords should be chosen so that they are hard for an attacker to guess and hard for an attacker to discover using any of the available automatic attack schemes. See password strength and computer security for more information.\nNowadays, it is a common practice for computer systems to hide passwords as they are typed. The purpose of this measure is to prevent bystanders from reading the password; however, some argue that this practice may lead to mistakes and stress, encouraging users to choose", "a Google Account which they use, choosing a strong password for that account is important to prevent hackers gaining access to confidential data. It is even important when the user has disabled it, because a hacker could unpause collection of Web History data without the user necessarily noticing.)\nLikewise, if a user has not cleared their web browser history and has confidential sites listed there, they may want to use a strong password or other authentication solution for their user account on their computer, password-protect the computer when not in use, or encrypt the storage medium on which the web browser", "storage of passwords, some operating systems (e.g. Unix-type) store a hash of the password rather than storing the password itself. During authentication, the system need only verify that the hash of the password entered matches the hash stored in the password database. This makes it more difficult for an intruder to get the passwords, since the password itself is not stored, and it is very difficult to determine a password that matches a given hash. However, this presents a problem for many (but not all) challenge-response algorithms, which require both the client and the server to have a shared secret.", "Munged password Rationale Passwords are used to gain access to computer resources, and computer users generally choose passwords that are easy to remember, but therefore insecure. Simple passwords are easily hacked by dictionary attacking software.\nIf a network administrator supplies a password that is too difficult to remember, or requires that passwords be changed frequently, users tend to write their passwords down to help them remember. Many times passwords can be found on sticky notes under keyboards, behind pictures, or hidden among other desktop items—another security risk.\nMungeing helps to create a strong password that the user can remember easily. The", "is debatable. Systems that implement such policies sometimes prevent users from picking a password too close to a previous selection.\nThis policy can often backfire. Some users find it hard to devise \"good\" passwords that are also easy to remember, so if people are required to choose many passwords because they have to change them often, they end up using much weaker passwords; the policy also encourages users to write passwords down. Also, if the policy prevents a user from repeating a recent password, this requires that there is a database in existence of everyone's recent passwords (or their hashes) instead", "question based. But many of these options are more expensive, time consuming or still require some form of memorization. Thus most businesses and individuals still use the common format of single word and text based passwords, as security protection.", "password must be repeatedly changed, mnemonics are useless because the user would not remember which mnemonic to use. Furthermore, the use of mnemonics (leading to passwords such as \"2BOrNot2B\") makes the password easier to guess.\nAdministration factors can also be an issue. Users sometimes have older devices that require a password that was used before the password duration expired. In order to manage these older devices, users may have to resort to writing down all old passwords in case they need to log into an older device.\nRequiring a very strong password and not requiring it be changed is often better. However,", "for accounts on different systems, those will be compromised as well.\nMore secure systems store each password in a cryptographically protected form, so access to the actual password will still be difficult for a snooper who gains internal access to the system, while validation of user access attempts remains possible. The most secure don't store passwords at all, but a one-way derivation, such as a polynomial, modulus, or an advanced hash function.Roger Needham invented the now common approach of storing only a \"hashed\" form of the plaintext password. When a user types in a password on such a system, the password", "is implementing the cryptographic algorithm, and so human readability etc. is not required. In fact, most users will, in most cases, be unaware of even the existence of the keys being used on their behalf by the security components of their everyday software applications.\nIf a password is used as an encryption key, then in a well-designed crypto system it would not be used as such on its own. This is because passwords tend to be human-readable and, hence, may not be particularly strong. To compensate, a good crypto system will use the password-acting-as-key not to perform the primary encryption task", "routers. Leaving such a password on devices available to the public is a huge security risk.\nSome devices (such as wireless routers) will come with unique default router username and passwords printed on a sticker, which is more secure option than a common default password. Some vendors will however derive the password from the device's MAC address using a known algorithm, in which case the password can be also easily reproduced by attackers. Default access To access internet connected devices on a network, a user must know its default IP address. Manufacturers typically use 192.168.1.1, and also 10.0.0.1 default router's IP", "that is used, and if source code is not provided to allow claims to be checked. Furthermore, and probably most importantly, transmitting candidate passwords over the Internet raises obvious security concerns, particularly if the connection to the password generation site's program is not properly secured or if the site is compromised in some way. Without a secure channel, it is not possible to prevent eavesdropping, especially over public networks such as the Internet. A possible solution to this issue is to generate the password using a client-side programming language such as JavaScript. The advantage of this approach is that the", "change a password. Passwords may also be reflective of personality. Those who are more uptight or security-oriented may choose longer or more complicated passwords. Those who are lax or who feel more secure in their everyday lives may never change their password. The most common password is Password1, which may point to convenience over security as the main concern for internet users. History The use and memorization of both nonsense and meaningful alphanumeric material has had a long history in psychology beginning with Hermann Ebbinghaus. Since then, numerous studies have established that not only are both meaningful and nonsense “words”", "a password NOT to contain any word in an online dictionary, or list of names, or any license plate pattern from any state (in the US) or country (as in the EU). If patterned choices are required, humans are likely to use them in predictable ways, such a capitalizing a letter, adding one or two numbers, and a special character. This predictability means that the increase in password strength is minor when compared to random passwords. Usability and implementation considerations Because national keyboard implementations vary, not all 94 ASCII printable characters can be used everywhere. This can present a problem", "to an international traveler who wished to log into remote system using a keyboard on a local computer. See keyboard layout. Many hand held devices, such as tablet computers and smart phones, require complex shift sequences to enter special characters.\nAuthentication programs vary in which characters they allow in passwords. Some do not recognize case differences (e.g., the upper-case \"E\" is considered equivalent to the lower-case \"e\"), others prohibit some of the other symbols. In the past few decades, systems have permitted more characters in passwords, but limitations still exist. Systems also vary in the maximum length of passwords allowed.\nAs a", "user accounts as well. LinkedIn said that the users whose passwords are compromised would be unable to access their LinkedIn accounts using their old passwords. Controversy Internet security experts said that the passwords were easy to unscramble because of LinkedIn's failure to use a salt when hashing them, which is considered an insecure practice because it allows attackers to quickly reverse the scrambling process using existing standard rainbow tables, pre-made lists of matching scrambled and unscrambled passwords. Another issue that sparked controversy was the iOS app provided by LinkedIn, which grabs personal names, emails, and notes from a mobile calendar", "Unix operating system, hashed passwords were originally stored in a publicly accessible file /etc/passwd. On modern Unix (and similar) systems, on the other hand, they are stored in the shadow password file /etc/shadow, which is accessible only to programs running with enhanced privileges (i.e., \"system\" privileges). This makes it harder for a malicious user to obtain the hashed passwords in the first instance, however many collections of password hashes have been stolen despite such protection. Another strong approach is to combine a site-specific secret key with the password hash, which prevents plaintext password recovery even if the hashed values", "an ideal password should be at least 14 characters in length and have letters, punctuation, symbols, and numbers, where complexity is added by the inclusion of uppercase letters. Managing Personal Information Using Privacy Options Social networking sites offer greater security risks to personal electronic information because sensitive, private or confidential information such as personal identifiers are routinely used to create public profiles. Many websites give options to suppress the amount of personal information revealed through the customisation of privacy settings. However privacy settings can reset if changes to the website occur.", "and discover those passwords, potentially using them for nefarious means.\"\nOn May 2, Sony clarified the \"unencrypted\" status of users' passwords, stating that:\nWhile the passwords that were stored were not “encrypted,” they were transformed using a cryptographic hash function. There is a difference between these two types of security measures which is why we said the passwords had not been encrypted. But I want to be very clear that the passwords were not stored in our database in cleartext form. British Information Commissioners Office Following a formal investigation of Sony for breaches of the UK's Data Protection Act 1998, the Information", "accounts, deliberately choose easy-to-remember passwords that are too vulnerable to cracking, or rely on written records of their passwords.\nMany sites, in an attempt to prevent users from choosing easy-to-guess passwords, add restrictions on password length or composition which contribute to password fatigue. In many cases, the restrictions placed on passwords actually serve to decrease the security of the account (either by preventing good passwords or by making the password so complex the user ends up storing it insecurely, such as on a post-it note). Some sites also block non-ASCII or non-alphanumeric characters.\nPassword fatigue will typically affect users, but can also", "passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines (ATMs), etc. A typical computer user has passwords for many purposes: logging into accounts, retrieving e-mail, accessing applications, databases, networks, web sites, and even reading the morning newspaper online. Factors in the security of a password system The security of a password-protected system depends on several factors. The overall system must be designed for sound security, with protection against computer viruses, man-in-the-middle attacks and the like. Physical security issues are also a concern,", "Password policy Aspects Typical components of a password policy include: Password blacklists Password blacklists are lists of passwords that are always blocked from use. Blacklists contain passwords constructed of character combinations that otherwise meet company policy, but should no longer be used because they have been deemed insecure for one or more reasons, such as being easily guessed, following a common pattern, or public disclosure from previous data breaches. Common examples are Password1, Qwerty123, or Qaz123wsx. Password duration Some policies require users to change passwords periodically, often every 90 or 180 days. The benefit of password expiration, however,", "person will type their secret in the second box, if the password is successfully changed then the secret is shared. However the computer is still a third party and must be trusted not to have a key logger.\nA more involved protocol that does not involve any reliance on a third party, human or machine, involves n cups, each with a label of the name of a person that could be the secret. Each individual will then place a slip of paper under each cup, one slip of paper will say 'yes' on it and will go under the cup with", "Rainbow table Background Any computer system that requires password authentication must contain a database of passwords, either hashed or in plaintext, and various methods of password storage exist. Because the tables are vulnerable to theft, storing the plaintext password is dangerous. Most databases, therefore, store a cryptographic hash of a user's password in the database. In such a system, no one – including the authentication system – can determine what a user's password is by merely looking at the value stored in the database. Instead, when a user enters a password for authentication, the system computes the hash value for", "the days before the Internet, when the user could be sure that the system asking for the password was really the system they were trying to access, and that nobody was likely to be eavesdropping on the communication channel to observe the password being entered. To address the insecure channel problem, a more sophisticated approach is necessary. Many cryptographic solutions involve two-way authentication, where both the user and the system must each convince the other that they know the shared secret (the password), without this secret ever being transmitted in the clear over the communication channel, where eavesdroppers might", "variation patterns on a consistent theme to keep their passwords memorable. Because of these issues, there is some debate as to whether password aging is effective. Changing a password will not prevent abuse in most cases, since the abuse would often be immediately noticeable. However, if someone may have had access to the password through some means, such as sharing a computer or breaching a different site, changing the password limits the window for abuse. Number of users per password Allotting separate passwords to each user of a system is preferable to having a single password shared by legitimate users", "numeric, the corresponding secret is sometimes called a personal identification number (PIN).\nDespite its name, a password need not be an actual word; indeed a non-word (in the dictionary sense) may be harder to guess, which is a desirable property of passwords. A memorized secret consisting of a sequence of words or other text separated by spaces is sometimes called a passphrase. A passphrase is similar to a password in usage but the former is generally longer for added security. History Passwords have been used since ancient times. Sentries would challenge those wishing to enter an area to supply a password", "are purloined. A third approach is to use key derivation functions that reduce the rate at which passwords can be guessed.\nUnfortunately, many common Network Protocols transmit passwords in cleartext or use weak challenge/response schemes.\nModern Unix Systems have replaced traditional DES-based password hashing function crypt() with stronger methods such as bcrypt and scrypt. Other systems have also begun to adopt these methods. For instance, the Cisco IOS originally used a reversible Vigenère cipher to encrypt passwords, but now uses md5-crypt with a 24-bit salt when the \"enable secret\" command is used. These newer methods use large salt values which prevent", "blacklists. Password blacklists are applied to prevent users from choosing passwords that are easily guessed or are well known and could lead to unauthorized access by malicious parties. Password blacklists are deployed as an additional layer of security, usually in addition to a password policy, which sets the requirements of the password length and/or character complexity. This is because there are a significant number of password combinations that fulfill many password policies but are still easily guessed (i.e., Password123, Qwerty123). Distribution methods Blacklists are distributed in a variety of ways. Some use simple mailing lists. A DNSBL is a", "network is restricted by NIST. In particular, the out-of-band transmission of one-time passwords (OTPs) via recorded voice messages or SMS messages is restricted. Moreover, if an agency chooses to use voice- or SMS-based OTPs, that agency must verify that the OTP is being transmitted to a phone and not an IP address since Voice over IP (VoIP) accounts are not routinely protected with multi-factor authentication. Comparison It is convenient to use passwords as a basis for comparison since everyone understands how to use a password. On computer systems, passwords have been used since at least the early 1960s. More generally," ]
Why does time use the number 60?
[ "60 is easy to divide cleanly in multiple ways, and a number based on 60, such as the number of degrees in a circle, can be divided yet more ways. 60 can be divided by 1,2,3,4,5,6,10,12,15,20,30 and itself. This provides many easy-to-reckon, useful fractions. In the days before pocket calculators, slide rules, Napier's Bones, etc. this made life simpler." ]
[ "also sometimes used informally to denote minutes of time. History One of the earliest known uses of the minute (and the second) is found in John of Sacrobosco's Computus (ca. 1235), where he used them when discussing the length of the tropical year. No earlier records for the origin of the minute as ​¹⁄₆₀ of the hour and the second ​¹⁄₆₀ of the minute have ever been found. Another motivation that has been suggested for the emergence of these fine divisions of time was the construction of \"precision\" timepieces (mechanical and water clocks). \nHistorically, the word \"minute\" comes from", "nights\". The modern concept of zero as a number was introduced by Indian scholars only in the fifth century AD, so that for example the Gregorian calendar never had a year \"AD 0\" and instead begins with the year AD 1 which is immediately preceded by 1 BC. Applied to the reckoning of days, in the absence of a day \"zero\", that is, using inclusive counting, many modern languages (e.g. Greek, Italian, Spanish, French, Portuguese, Welsh) continue referring to two weeks as \"fifteen days\", whereas in English, which does observe zero and thus uses exclusive counting, this space of time", "13:30 would be regarded as odd.\nIn spoken language, most often time is expressed in the 12-hour clock. However, \"a.m.\" and \"p.m.\" are never used. Instead, an apposition is added, for instance 21:00 is said as \"9 uur 's avonds\" (9 o'clock in the evening). Half hours are relative to the next hour – for example, 5:30 is said as \"half 6\". Quarter hours are expressed relative to the nearest whole hour – for example, 6:15, \"kwart over 6\" (quarter past six) and 6:45, \"kwart voor zeven\" (quarter to seven). Minutes are usually rounded off to the nearest five minutes and", "because clock time \"wraps around\" every 12 hours. Because the hour number starts over after it reaches 12, this is arithmetic modulo 12. According to the definition below, 12 is congruent not only to 12 itself, but also to 0, so the time called \"12:00\" could also be called \"0:00\", since 12 is congruent to 0 modulo 12. Congruence classes Like any congruence relation, congruence modulo n is an equivalence relation, and the equivalence class of the integer a, denoted by aₙ, is the set {… , a − 2n, a − n, a, a + n, a + 2n,", "time zones because they were not within its purview. The conference did adopt a universal day of 24 hours beginning at Greenwich midnight, but specified that it \"shall not interfere with the use of local or standard time where desirable\".\nBy about 1900, almost all time on Earth was in the form of standard time zones, only some of which used an hourly offset from GMT. Many applied the time at a local astronomical observatory to an entire country, without any reference to GMT. It took many decades before all time on Earth was in the form of time zones referred", "needed standard units of time alongside the units of length and mass. He chose the second (rather than the minute or the hour) as his unit of time, thereby implicitly making the second a base unit of the metric system. The hour and minute have however been \"accepted for use within SI\".\nDuring the 20th century it became apparent that the Earth's rotation was slowing down. This results in days becoming 1.4 milliseconds longer each century. It was verified by comparing the calculated locations of eclipses of the Sun with those observed in antiquity going back to Chinese records of 763 BC", "Time code ambiguity In telecommunication, time code ambiguity is the shortest interval between successive repetitions of the same time code value.\nFor example, in a time code in which year-of-century (the '72' in 10/04/72) is the most slowly changing field, the time code ambiguity would be 100 years; it is ambiguous whether this value refers to a date in 1872, 1972 or some other century. For a digital clock in which hours and minutes up to a maximum of 11:59 are displayed, the time code ambiguity would be 12 hours.\nThe Year 2000 problem is an example of the pitfalls of time", "into 24 hours of 60 minutes, with each minute composed of 60 seconds. Decimal and metric time In the 19th century, an idea circulated to make a decimal fraction (​¹⁄₁₀ ₀₀₀ or ​¹⁄₁₀₀ ₀₀₀) of an astronomical day the base unit of time. This was an afterglow of the short-lived movement toward a decimalisation of timekeeping and the calendar, which had been given up already due to its difficulty in transitioning from traditional, more familiar units. The most successful alternative is the centiday, equal to 14.4 minutes (864 seconds), being not only a shorter multiple of an hour (0.24 vs", "Roman numerals, so \"21st century\" should be written as \"Siglo XXI\".\nThe Romans solidified the modern concept of the hour as one-24th part of a day and night. The English measurement system also retains features of the Ancient Roman foot (11.65 modern inches), which was used in England prior to the Anglo-Saxon settlement of Britain. The inch itself derives from the Roman uncia, meaning one-twelfth part. Religion While classical Roman and Hellenistic religion were ultimately superseded by Christianity, many key theological ideas and questions that are characteristic of Western religions originated with pre-Christian theology. The first cause argument for", "hour—for example, 8 o' clock is written as 8 diǎn (八点; 八點). \nFēn is also used for minutes. To avoid confusion, sometimes the word fēnzhōng (分钟; 分鐘, literally \"clock minute\") is used to clarify that one is talking about modern minutes. The time 09:45 can thus be written as \"9 shí, 45 fēn\" (九时四十五分; 九時四十五分) or \"9 diǎn, 45 fēn\" (九点四十五分; 九點四十五分).\nKè has been defined as ​¹⁄₉₆ of a day since 1628, so the modern kè equals 15 minutes and each double hour contains exactly 8 kè. Since then, kè has been used as shorthand to talk about time in", "Date and time notation in the Netherlands Time In written language, time is expressed in the 24-hour notation, with or without leading zero, using a full stop or colon as a separator, sometimes followed by the word uur (hour) or its abbreviation u. – for example, 22.51 uur, 9.12 u., or 09:12. In technical and scientific texts the use of the abbreviations h, min and s is common – for example, 17 h 03 min 16 s. The use of the 12-hour clock in numeric writing is not standard practice, not even in informal writing, and writing e.g., \"1.30\" for", "measured, increasingly accurate, and integrated into the social order; people \"ruled themselves by the clock\". Dympna Callaghan in the essay, \"Confounded by Winter, Speeding Time in Shakespeare's Sonnets\", states that Sonnet 60 is one of two sonnets (also 12) which are \"keenly concerned with time\" and are given the \"significantly symbolic numbers\". Sonnet 12 concerns the 12 hours on the face of a clock and Sonnet 60 concerns \"our minutes\". These two sonnets, therefore, Callaghan says, \"bespeak mechanical time\" and their number signifies the importance of the modern measurement of time.\nThis \"measured\" and \"mechanical\" time-keeping changed the way persons", "60. The way of writing a number like 70 would be the sign for 60 and the sign for 10 right after. This way of counting is still used today for measuring time as 60 seconds per minute and 60 minutes per hour. Usage Cuneiform script was used in many ways in ancient Mesopotamia. It was used to record laws, like the Code of Hammurabi. It was also used for recording maps, compiling medical manuals, and documenting religious stories and beliefs, among other uses. Studies by Assyriologists like Claus Wilcke and Dominique Charpin suggest that cuneiform literacy was not reserved", "making it ​¹⁄₂₄ of the mean solar day. Since this unit was not constant due to long term variations in the Earth's rotation, the hour was finally separated from the Earth's rotation and defined in terms of the atomic or physical second.\nIn the modern metric system, hours are an accepted unit of time defined as 3,600 atomic seconds. However, on rare occasions an hour may incorporate a positive or negative leap second, making it last 3,599 or 3,601 seconds, in order to keep it within 0.9 seconds of UT1, which is based on measurements of the mean solar day. Name", "Hour An hour (symbol: h; also abbreviated hr.) is a unit of time conventionally reckoned as ​¹⁄₂₄ of a day and scientifically reckoned as 3,599–3,601 seconds, depending on conditions.\nThe hour was initially established in the ancient Near East as a variable measure of ​¹⁄₁₂ of the night or daytime. Such seasonal, temporal, or unequal hours varied by season and latitude. The hour was subsequently divided into 60 minutes, each of 60 seconds. Equal or equinoctial hours were taken as ​¹⁄₂₄ of the day as measured from noon to noon; the minor seasonal variations of this unit were eventually smoothed by", "conserves the 12-hour system, and so does everyday speech. In English, in fact, the term \"13 o'clock\" is not used; when referring to something like a timetable that uses the 24-hour clock, or in a military context, one would say \"Thirteen hundred hours\". In other European languages, the terms equivalent to \"13 o'clock\" are used, e.g. in French one can refer to 1pm as \"treize heures\", though many people would also say \"une heure de l'après-midi\", the equivalent of \"1pm\".", "current definition of the second, coupled with the current definition of the meter, is based on the special theory of relativity, which affirms our spacetime to be a Minkowski space. The definition of the second in mean solar time, however, is unchanged. World time While in theory, the concept of a single worldwide universal time-scale may have been conceived of many centuries ago, in practicality the technical ability to create and maintain such a time-scale did not become possible until the mid-19th century. The timescale adopted was Greenwich Mean Time, created in 1847. A few countries have replaced it with", "since the most to least significant digit order provides a simple method to order and sort time readings. Date The little-endian format (day, month, year; 1 June 2006) is the most popular format worldwide, followed by the big-endian format (year, month, day; 2006 June 1). Dates may be written partly in Roman numerals (i.e. the month) or written out partly or completely in words in the local language. Time The 24-hour clock enjoys broad everyday usage in most non-English speaking countries, at least when time is written or displayed. In some regions, for example where German, French, and Romanian are", "zero is multiplied by 1. This notation leads to the modern signs for degrees, minutes, and seconds. The same minute and second nomenclature is also used for units of time, and the modern notation for time with hours, minutes, and seconds written in decimal and separated from each other by colons may be interpreted as a form of sexagesimal notation.\nIn some usage systems, each position past the sexagesimal point was numbered, using Latin or French roots: prime or primus, seconde or secundus, tierce, quatre, quinte, etc. To this day we call the second-order part of an hour", "Z—a reference to the equivalent nautical time zone (GMT), which has been denoted by a Z since about 1950. Time zones were identified by successive letters of the alphabet and the Greenwich time zone was marked by a Z as it was the point of origin. The letter also refers to the \"zone description\" of zero hours, which has been used since 1920 (see time zone history). Since the NATO phonetic alphabet word for Z is \"Zulu\", UTC is sometimes known as \"Zulu time\". This is especially true in aviation, where \"Zulu\" is the universal standard.", "sundials, and astronomical clocks sometimes show the hour length and count using some of these older definitions and counting methods. Counting from dawn In ancient and medieval cultures, the counting of hours generally started with sunrise. Before the widespread use of artificial light, societies were more concerned with the division between night and day, and daily routines often began when light was sufficient.\n\"Babylonian hours\" divide the day and night into 24 equal hours, reckoned from the time of sunrise. They are so named from the false belief of ancient authors that the Babylonians divided the day into 24 parts,", "Time in the United Kingdom History Until the advent of the railways, the United Kingdom used Local Mean Time. Greenwich Mean Time was adopted first by the Great Western Railway in 1840 and a few others followed suit in the following years. In 1847 it was adopted by the Railway Clearing House, and by almost all railway companies by the following year. It was from this initiative that the term \"railway time\" was derived. \nIt was gradually adopted for other purposes, but a legal case in 1858 held \"local mean time\" to be the official time. On 14 May 1880,", "begin the day at midnight, some starting at dawn instead, others at dusk (both being more obvious).\nSince a sundial has only one \"hand,\" a minute probably only meant \"a short time.\" It took centuries for technology to make measurements precise enough for minutes (and later seconds) to become fixed meaningful units—longer still for milliseconds, nanoseconds, and further subdivisions.\nWhen the water clock was invented, time could also be measured at night—though there was significant variation in flow rate and less accuracy and precision. With water clocks, and also candle clocks, modifications were made to have them make sounds on", "o'clock\") refers to noon and midnight is expressed as dwunasta w nocy (\"twelve o'clock at night\") or similar.\nIn speech hours are usually divided in quarters, and when read out often rounded to the nearest 15-minutes, so that 12:43 becomes za piętnaście pierwsza (\"fifteen to one\") or za kwadrans pierwsza (\"quarter to one\"), and similarly 18:14 becomes piętnaście po szóstej (\"fifteen past six\") or kwadrans po szóstej (\"quarter past six\"). Half hours are given as wpół do, i.e. half to, rather than half past as is common in English, and similar to many non-English languages. Half hours can themselves be used", "24-hour clock in spoken language when referring to an exact point in time (\"The train leaves at fourteen forty-five ...\"), while using some variant of the 12-hour notation to refer vaguely to a time (\"... so I will be back tonight some time after five.\"). However, encountering a p.m. time written in the 12-hour notation (e.g. 6:30 meaning 18:30) is likely to cause confusion with people used to the 24-hour written notation.\nIn certain languages such as Spanish, Portuguese, Dutch, and English the hour is divided into quarters and halves, spoken of relative to the closest hour.\nIn Czech language quarters and halves always", "Time in physics The unit of measurement of time: the second In the International System of Units (SI), the unit of time is the second (symbol: ). It is a SI base unit, and it has been defined since 1967 as \"the duration of 9, 192, 631, 770 [cycles] of the radiation corresponding to the transition between the two hyperfine levels of the ground state of the caesium 133 atom\". This definition is based on the operation of a caesium atomic clock. These clocks became practical for use as primary reference standards after about 1955 and have been in", "time for every degree of longitude. For example, Bristol is about 2.5 degrees west of Greenwich (East London), so when it is solar noon in Bristol, it is about 10 minutes past solar noon in London. The use of time zones accumulates these differences into longer units, usually hours, so that nearby places can share a common standard for timekeeping.\nThe first adoption of a standard time was on December 1, 1847, in Great Britain by railway companies using GMT kept by portable chronometers. The first of these companies to adopt standard time was the Great Western Railway (GWR) in November", "are expressed relative to the closest half-hour. For instance 05:35 is \"5 over half 6\" (literally \"5 past half to 6\") and 05:20 is \"tien voor half 6\" (literally \"10 to half to 6\").\nWhen the 24-hour clock is used in spoken language, usually the written form is pronounced with the hours as a number, the word \"uur\" (hour) and the minutes as a number. For example, 17:21 might be pronounced as \"zeventien uur eenentwintig\" (seventeen hours twenty-one). Hours over 12 are not usually combined with phrasings using \"half\", \"quarter\", \"to\", or \"past\".", "time at Greenwich became a standard, later named Universal Time (UT). But in the later 19th and early 20th centuries, with the increasing precision of astronomical measurements, it began to be suspected, and was eventually established, that the rotation of the Earth (i.e. the length of the day) showed irregularities on short time scales, and was slowing down on longer time scales. Ephemeris time was consequently developed as a standard that was free from the irregularities of Earth rotation, by defining the time \"as the independent variable of the equations of celestial mechanics\", and it was at first measured astronomically,", "using the Sun's movement along the celestial equator rather than along the ecliptic. The irregularities of this time system were so minor that most clocks reckoning such hours did not need adjustment. However, scientific measurements eventually became precise enough to note the effect of tidal deceleration of the Earth by the Moon, which gradually lengthens the Earth's days. \nDuring the French Revolution, a general decimalization of measures was enacted, including decimal time between 1793 and 1795. Under its provisions, the French hour (French: heure) was ​¹⁄₁₀ of the day and divided formally into 100 decimal minutes (minute décimale) and informally" ]
- the Monsanto controversy
[ "Worries about engineered foods aside, a lot of people have a huge problem with Monsanto's business model...\n\nThey use patent law to force farmers to buy seed from them every year. The farmers do not own the seeds that are created by the plants they are growing - Monsanto has the *patent* on the seed DNA. So they can't just buy seed one time and then create their own seeds from then on, as you might believe would be common sense. They even go so far as to sue farmers that *accidentally* grow Monsanto plants; from seeds blown over from a neighbor's field, for example. Monsanto charges a lot for the seed. They are definitely pushing the extremes of patent law to make as much money as possible.\n\nNow, having said that, Monsanto invented some pretty cool seed. It creates its own pesticide, for example. So, by using it, you save money on spraying your crops. That's certainly worth something. People just disagree on how Monsanto should be compensated for what they've done. Obviously, a large corporation like Monsanto would like to squeeze as much money as possible from whoever they can. They aren't trying to work out a \"fair deal\" for what they've accomplished - they're just trying to maximize profit.\n\nIt's easy for people to envision a future (maybe not so distant) where corporations own the rights to everything we grow (through DNA patents) and charge a lot to farmers (and ultimately consumers) for licenses to grow crops.", "I don't think this has much to do with genetically modified seeds. It has to do with their business model. For example, they sued one farmer because he was in the business of \"recycling\" Monsanto seeds. For a fee, he would go to your farm and collect all of the seeds from previous years that haven't sprouted. He would then hand the seeds to you so you can use them again. He wasn't trying to copy or reverse engineer them. \n\nMonsanto has enough money to rule the world, and yet, they put this little guy in crippling debt. It's these business practices that Monsanto is infamous for. \n\nMonsanto knows that some of their seeds will be \"duds,\" and they love it. They WANT some of your seeds to fail. As soon as you pay them for their seeds, they wouldn't care if you died.\n\nMaybe it's a little biased of me, but that's the way that I see it." ]
[ "products over the course of a £1 million advertising campaign. The ASA ruled that Monsanto had presented its opinions \"as accepted fact\" and had published \"wrong\" and \"unproven\" scientific claims. Monsanto responded with an apology and claimed it was not intending to deceive and instead \"did not take sufficiently into account the difference in culture between the UK and the USA in the way some of this information was presented.\"\nIn 2001, French environmental and consumer rights campaigners brought a case against Monsanto for misleading the public about the environmental impact of its herbicide Roundup, on the basis that glyphosate, Roundup's", "is.\nBelief that Monsanto is particularly problematic has inspired such actions as the March Against Monsanto and the singling out of Monsanto over other agribusinesses such as DuPont, Syngenta, Dow, BASF and Bayer, and has been identified as a salient feature of anti-GMO activism.\nAn example of Monsanto-based conspiracy theorizing were the claims by some anti-GMO activists that Monsanto banned GMOs from their cafeterias while promoting them for sale and consumption by the public. Anti-GMO/chemtrail blogger Barbara H. Peterson, a retired correctional officer and rancher, complained that Monsanto \"has painted those of us attempting to shed light on the dangers of genetically", "is a case where Monsanto was not a party, but was alleged to have been involved in the events under dispute. In 1997, the news division of WTVT (Channel 13), a Fox–owned station in Tampa, Florida, planned to air an investigative report by Steve Wilson and Jane Akre on the health risks allegedly associated with Monsanto's bovine growth hormone product, Posilac. Just before the story was to air, Fox received a threatening letter from Monsanto, saying the reporters were biased and that the story would damage the company. Fox tried to work with the reporters to address Monsanto's concerns, and", "Monsanto's Roundup product. \nOn 10 August 2018, Dewayne Johnson, who has non-Hodgkin's lymphoma, was awarded $289 million in damages (later cut to $78 million on appeal) after a jury in San Francisco found that Monsanto had failed to adequately warn consumers of cancer risks posed by the herbicide. Johnson had routinely used two different glyphosate formulations in his work as a groundskeeper, RoundUp and another Monsanto product called Ranger Pro. The jury's verdict addressed the question of whether Monsanto knowingly failed to warn consumers that RoundUp could be harmful, but not whether RoundUp causes cancer. Court documents from the case", "court upheld the verdict; Monsanto appealed again to the French Supreme Court, and in 2009 it also upheld the verdict.\nIn August 2012, a Brazilian Regional Federal Court ordered Monsanto to pay a $250,000 fine for false advertising. In 2004, advertising that related to the use of GM soya seed, and the herbicide glyphosate used in its cultivation, claimed it was beneficial to the conservation of the environment. The federal prosecutor maintained that Monsanto misrepresented the amount of herbicide required and stated that \"there is no scientific certainty that soybeans marketed by Monsanto use less herbicide.\" The presiding judge condemned Monsanto", "standing\" to challenge Monsanto's patents.\nThe usual Monsanto claim involves patent infringement by intentionally replanting patented seed. Such activity was found by the United States Supreme Court to constitute patent infringement in Bowman v. Monsanto Co. (2013). The case began in 2007, when Monsanto sued Indiana farmer Vernon Hugh Bowman who in 1999 bought seed for his second planting from a grain elevator – the same elevator to which he and others sold their transgenic crops. The elevator sold the soybeans as commodities, not as seeds for planting. Bowman tested the new seeds, and found that ,as he had expected, some", "that Monsanto was more concerned with tamping down safety inquiries and manipulating public opinion than it was with ensuring its product is safe.\" Chhabria stated that there is evidence is on both sides concerning whether glyphosate causes cancer and that the behavior of Monsanto showed \"a lack of concern about the risk that its product might be carcinogenic.\"\nOn 13 May 2019 a jury in California ordered Bayer to pay a couple $2 billion in damages after finding that the company had failed to adequately inform consumers of the possible carcinogenicity of Roundup. On July 26, 2019, an Alameda", "They believe that the legislation has drawn what they call \"a blurry line between industry and government\".\nThey also believe that there has been a conflict of interest between former employees of Monsanto who work for the U.S. Food and Drug Administration, and that Monsanto has used their patent rights to create a monopoly of the food supply which has resulted in economic losses by small farmers. Activist and journalist Emilie Rensink, who helped organize the march, said that in her view the appointment of ex-Monsanto executives to head the FDA has resulted in political favoritism, including Monsanto subsidies", "Monsanto in federal court in San Francisco, on behalf of plaintiffs seeking to recover damages for non-Hodgkins lymphoma, that, the plaintiffs allege, were a result of exposure to Monsanto's glyphosate-based herbicide, Roundup. Kennedy and his team also filed a class action lawsuit against Monsanto for failing to warn consumers about the dangers allegedly posed by exposure to Roundup. In September 2018, Kennedy and his partners filed a class-action lawsuit against Columbia Gas of Massachusetts alleging negligence following gas explosions in three towns north of Boston. Of Columbia Gas, Kennedy said “as they build new miles of pipe, the same company", "were based on \"junk science\" and sought a summary judgment dismissing the cases. On June 7, 2018, Monsanto was acquired by the German company Bayer. In July 2018, the federal court judge overseeing the cases ruled that the plaintiffs could proceed with their lawsuits, finding that a reasonable jury could conclude that glyphosate can cause cancer in humans. Monsanto's motion for summary judgment was denied. \nIn March 2017, 40 plaintiffs filed a lawsuit in the Alameda County Superior Court, a branch of the California Superior Court, against Monsanto alleging damages related to certain forms of cancer caused by", "million. Chhabria stated that a punitive award was appropriate because the evidence \"easily supported a conclusion that Monsanto was more concerned with tamping down safety inquiries and manipulating public opinion than it was with ensuring its product is safe.\" Chhabria stated that there is evidence is on both sides concerning whether glyphosate causes cancer and that the behavior of Monsanto showed \"a lack of concern about the risk that its product might be carcinogenic.\"\nOn 13 May 2019 a jury in California ordered Bayer to pay a couple $2 billion in damages after finding that the company had failed to", "WTVT Whistleblower lawsuit In 1997, Wilson and Akre began work on a story regarding the agricultural biotechnology company Monsanto and recombinant bovine growth hormone (rBGH), a milk additive that had been approved for use by the Food and Drug Administration but also blamed for a number of health issues. Wilson and Akre planned a four-part investigative report on Monsanto's use of rBGH, which prompted Monsanto to write to Roger Ailes, president of Fox News Channel, in an attempt to have the report reviewed for bias and because of the \"enormous damage that can be done\" as a result of", "official at the Environmental Protection Agency had worked to quash a review of Roundup’s main ingredient, glyphosate, that was to have been conducted by the United States Department of Health and Human Services.\" The records show that Monsanto was able to prepare \"a public relations assault\" on the finding after they were alerted to the determination by Jess Rowland, the head of the EPA's cancer assessment review committee at that time, months in advance. Emails also showed that Rowland \"had promised to beat back an effort by the Department of Health and Human Services to conduct its", "2002 related to the agency's assessment on its genetically modified cotton. Monsanto told the company to disguise an invoice for the bribe as \"consulting fees\". Monsanto also has admitted to paying bribes to a number of other high-ranking Indonesian officials between 1997 and 2002. On March 5, 2008, the deferred prosecution agreement against Monsanto was dismissed with prejudice (unopposed by the Department of Justice) by the U.S. District Court for the District of Columbia, thereby indicating that Monsanto had complied fully with the terms of the agreement.\nIn 2014, Monsanto reached a settlement with soft wheat farmers over the 2013 discovery", "2001 Monsanto Incident Some activities by activists attending the WSF have also been criticised, such as at the WSF 2001, where activists invaded and destroyed an experimental genetically modified plantation of the Monsanto Company.\nOn January 26, 2001 a number of activists with Brazil's Movimento dos Sem-Terra (MST) reacted in protest to the growing role of Monsanto in global agribusiness, which was considered by the group to be unethically using their seed patents to harm the rights of rural peoples, tore up an experimental plot of transgenic crops in Não-me-Toque, 300 km from Porto Alegre, where the World Social Forum was taking", "kids.\" Out of her anger, frustration, and concerns for the health of her children, Canal developed the idea for a \"March Against Monsanto\" social media campaign. Social media campaign Canal started a Facebook social media campaign on February 28, 2013. She stated: \"For too long, Monsanto has been the benefactor of corporate subsidies and political favoritism ... Organic and small farmers suffer losses while Monsanto continues to forge its monopoly over the world's food supply, including exclusive patenting rights over seeds and genetic makeup.\" She argued that Monsanto benefited from corporate subsidies and political favoritism and that", "Monsanto filed a lawsuit against its former computer programmer Jiunn-Ren Chen, alleging that he stole files from its systems. As defendant The Public Patent Foundation has unsuccessfully attempted to invalidate several Monsanto patents. In 2006, the foundation filed for ex parte reexamination of four patents, which the United States Patent and Trademark Office (PTO) granted. However, by 2008 the PTO had confirmed the validity of all four patents, with minor amendments to two patents, and allowing new patent claims to issue for the other two patents. In 2011 the Public Patent Foundation filed claims in the Southern District of New", "stating on her web page that Specter was \"ill informed\" in regard to the shipment after Orissa. She also said that \"for the record, ever since I sued Monsanto in 1999 for its illegal Bt cotton trials in India, I have received death threats\" \"concerted PR assault on me for the last two years from Lynas, Specter and an equally vocal Twitter group is a sign that the global outrage against the control over our seed and food, by Monsanto through GMOs, is making the biotech industry panic.\" David Remnick, the editor of the New Yorker, responded by publishing a", "The jury's verdict addressed the question of whether Monsanto knowingly failed to warn consumers that RoundUp could be harmful, but not whether RoundUp causes cancer. Court documents from the case show the company's efforts to influence scientific research via ghostwriting. After the IARC classified glyphosate as a \"probably carcinogenic to humans\" in 2015, over 300 federal lawsuits have been filed that were consolidated into a multidistrict litigation called In re: RoundUp Products Liability.\nIn March 2019, a man was awarded $80 million in a lawsuit claiming Roundup was a substantial factor in his cancer, resulting in Costco stores discontinuing sales.", "virtues of a “natural” lifestyle.\" MIT Technology Review reported in February 2018 that Russian-backed disinformation campaigns were sowing public confusion about GMOs by promoting conspiracy theories. Monsanto A major aspect of many conspiracy theories is the fear that large agribusinesses, especially Monsanto are working to undermine the health and safety of the general public by introducing and promoting GMOs in the food supply. One claim is that Monsanto is deliberately hiding scientific evidence that GMOs are harmful. Some anti-GMO activists claimed that Monsanto infiltrated both the American Food and Drug Administration and the American Association for the Advancement of", " Others depicted the case as a contest between a large biotechnology company and an equally large and well funded anti-biotechnology industry and raised concerns that the facts and context of the case was being misrepresented by Schmeiser, environmental groups and anti-genetic engineering activists.\nMonsanto v. Schmeiser was portrayed as being part of the process of legally defining the bounds of new biotechnologies, including genetic engineering and ownership of higher lifeforms. The case was frequently connected with that of the so-called Harvard mouse, where in 2002 the Canadian Supreme Court had rejected a patent for a special breed of mouse developed", "Monsanto. While noting the film's beginning awkwardly with Koons-Garcia's pointing the finger of shame at the political motivation of Monsanto, they concluded it \"gets slightly more hopeful as it goes along\".\nSan Francisco Chronicle wrote the filmmaker \"has taken a complex subject and made it digestible for anyone who cares about what they put into their stomachs,\" but also noted that \"Monsanto will attack Garcia's documentary as a piece of unbalanced journalism\".\nVictoria Gilman of Chemical & Engineering News criticized the lack of balance in the film, noting that Garcia defended farmers being deprived of the ability to raise non-GMO canola oil", "comparison to the IARC assessment, was published in September 2016. Using emails released in August 2017 by plaintiffs' lawyers who are suing Monsanto, Bloomberg Business Week reported that \"Monsanto scientists were heavily involved in organizing, reviewing, and editing drafts submitted by the outside experts.\" A Monsanto spokesperson responded that Monsanto had provided only non-substantive cosmetic copyediting. United States Monsanto regularly lobbied the US government with expenses reaching $8.8 million in 2008 and $6.3 million in 2011. $2 million was spent on matters concerning \"Foreign Agriculture Biotechnology Laws, Regulations, and Trade\". Some US diplomats in Europe at other times worked", "have to pay Monsanto their technology-use fee, damages or costs. The court ruled that Schmeiser did not receive any benefit from Monsanto's technology, but still ruled in a 5–4 decision that Monsanto had a valid patent, and that unintentional possession didn't matter, thus Schmeiser infringed on the patent. Schmeiser v. Monsanto On August 11, 1999, Schmeiser filed a separate lawsuit against Monsanto for ten million dollars for \"libel, trespass, and contamination of his fields with Roundup Ready Canola\". As of 2007, Schmeiser had not started to prosecute that lawsuit.\nIn 2002 Schmeiser's wife filed suit against Monsanto for $140 plus costs", "seed as he wished because it was his physical property. Monsanto then sued Schmeiser for patent infringement, filing its case in Canadian federal court on August 6, 1998. Negotiations to settle the matter collapsed on August 10, 1999, leading Schmeiser to file a countersuit against Monsanto for $10 million for libel, trespass, and contaminating his fields. Patent rights versus property rights Regarding the question of patent rights and the farmer's right to use seed taken from his fields, Monsanto said that because they hold a patent on the gene, and on canola cells containing the gene, they have", "the report.\nWTVT chose not to run the report, and they would later argue in court that the report was not \"breakthrough journalism\". Wilson and Akre then claimed that Monsanto's actions constituted the news broadcast telling lies, while WTVT countered looking only for fairness. According to Wilson and Akre, the two rewrote the report over 83 times over the course of 1997, and WTVT decided to exercise \"its option to terminate their employment contracts without cause,\" and did not renew their contracts in 1998. WTVT would later run a report about Monsanto and rBGH in 1998, and the report", " which have given them an unfair advantage over small farmers. Organizer Canal points to Michael Taylor, a lawyer who has spent the last few decades moving between Monsanto and the FDA and USDA, saying that she believes that US food regulatory agencies are so deeply embedded with Monsanto that it's useless to attempt to affect change through governmental channels. Media coverage The protests were reported on by news outlets including ABC News, the Associated Press, The Washington Post, The Los Angeles Times, USA Today, and CNN (in the United States), and Russia Today and The Guardian (outside", "Schmeiser appealed and lost again. Schmeiser appealed to the Supreme Court which took the case and held for Monsanto by a 5‑4 vote in late May 2004. Schmeiser won a partial victory, as the Supreme Court reversed on damages, finding that because Schmeiser did not gain any profit from the infringement, he did not owe Monsanto any damages nor did he have to pay Monsanto's substantial legal bills. The case caused Monsanto's enforcement tactics to be highlighted in the media over the years it took to play out. The case is widely cited or referenced by the anti-GM community in", "modified/engineered organisms (GMOs) as 'conspiracy theorists'....\" She went on to attack Monsanto's suggestion that sabotage could be a possible explanation for the discovery of a few plants of experimental genetically modified wheat found inexplicably growing on a farm in Oregon as being a conspiracy theory itself. GMO cannabis hoax A 2015 internet hoax purporting to show that Monsanto was creating genetically modified cannabis to supply to the cannabis industry. The hoax was created by satirical fake news website World News Daily Report on April 9, 2015. Monsanto created a \"standing denial\" of the hoax on their \"Myths About Monsanto\" webpage,", "confident that the jury will conclude, as two other juries have found in similar cases, that the former Monsanto Company is not responsible for the alleged injuries,” a Monsanto statement said.\nIn May 2016, A Missouri state jury ordered Monsanto to pay $46.5 million in a case where 3 plaintiffs claimed PCB exposure caused non-Hodgkin lymphoma.\nIn December 2016, the state of Washington filed suit in King County. The state sought damages and clean up costs related to PCBs. In March 2018 Ohio Attorney General Mike DeWine also filed a lawsuit against Monsanto over health issues posed by PCBs. Alachlor Alachlor is" ]
The true difference between i5 and i7 processors
[ "The biggest difference between i5 and i7 processors is the number of concurrent threads they can handle. i7 processors are equipped with hyperthreading, which is a technology that allows a single processor core to do almost as much work as two separate cores.\n\nImagine a single processor core is like a chef. Both the current generation i5 and i7 processors have 6 chefs. The chef receives a set of ingredients and a recipe, and lays it all out on the table. This table is like a processor's cache - it's the memory that the processor has to work with.\n\nThe chef then prepares the meals, and puts them back on the table. Now, the chef has to wait for the waiters to clean up the table and bring new ingredients. The chef busts out his phone and takes a break while this happens.\n\nHyperthreading is like giving the chef 2 tables. Now, while the chef is cooking one set of meals from table A, the staff can clear table B and bring new ingredients. Once table A is complete, table B is ready for cooking. The chef can now switch back and forth between the two tables and have almost no down time.\n\nOne of the other big differences is the size of the table - that is, the size of the cache. i7's generally have larger cache sizes than i5's do, which can help them do more work in the same amount of time.\n\nEdit: Just realized that I didn't really help you make a decision. :)\n\nHaving more cores is only useful in certain situations. When the work can be 'parallelized,' - that is, divided up such that the result from one chunk of work doesn't depend on the result of the previous chunk of work - then being able to handle more concurrent threads is a very good thing. \n\nFor example, if you're building a house, you need to pour the foundation before you can set up framing, and you need to set up framing before you can run electrical and plumbing lines, and you need to set up electrical and plumbing before you can put up drywall, etc. It's not possible to split a task like that up into several chunks and do them all simultaneously.\n\nIf you're building 20 houses, you can pour all 20 foundations at once, set up all 20 frames at once, etc. The result of building part of one house doesn't depend on the construction of other houses.\n\nTo a CPU, gaming is often like building a house. The calculations for one moment in the game will influence subsequent moments in the game, so it's not possible to divide the work up among several processor cores.\n\nVideo editing, on the other hand is highly parallelizable. Rendering frame #25 doesn't usually depend on the results of rendering frame #20, so software can divide that work up and distribute it across the processing cores.\n\nTL:DR; Gaming doesn't usually benefit as much from multiple processing cores. Results will definitely vary from game to game though. Video editing often does benefit from more processing cores, so you can reduce rendering time significantly by using an i7 instead of an i5.", "Quick shout out to /r/PCMasterRace and /r/buildapc. The daily simple questions thread in the former might be a big help to you going forward.\n\nNow, onto your question.\n\nGenerally speaking, the difference between i5s and i7s (in the desktop realm, laptops are different) is the number of threads. This basically means how many tasks the processor can do at one time.\n\nYou can picture it like pieces of paper. In the i5 scenario, each piece of paper can only be used for one thing at a time. So, if you want to doodle, an entire piece of paper has to be dedicated to doodling. In the i7 scenario, each piece of paper can be used for two things at a time. So, if you want to doodle *and* take notes, your piece of paper can handle that.\n\nThe slight catch here is that software has to be programmed in a certain way to take advantage of multi-thread technology. Most modern programs do this, but some still don't which could lead to a situation where you have a piece of paper that can handle both doodling and note taking, but the program (person) using the paper is like \"no, this paper is for note taking only.\"\n\nPS for CPUs: AMD also makes processors that you may wish to look into. They generally have lower single core speed (smaller paper), but more cores and threads (more papers overall). Their current line is called \"Ryzen.\"\n\nBonus: GPUs (graphics cards) are basically processors (and RAM) specifically designed for visual calculations and outputs. Feel free to ask more. :)", "ELI5 is not really the right place to get the help you are looking for, u/bendvis gave a great answer to i5/i7 but that does not answer the questions you don't know to ask yet. To add some answers about the rest of the system, you really want to educate yourself before rushing out to buy that shiny i7 and 1080ti, you should check out r/buildapc. \n \nYou say you want to build for gaming and video production. What kind of gaming? Is it match 3 clickers or you trying to play ArmA? The hardware you choose depends on the task. What sort of videos are you producing? Gaming youtube stuff or you rendering output from a high end camera? You will want different hardware if you are streaming vs local recording. What sort of budget are you working with? All these questions are asked and answered all the time at r/buildapc. Welcome to PC, it is not supposed to be easy because that is no fun.", "You want to do video production? You need the i7. The hyperthreading is going to be incredibly helpful.\n\nAlso, shit tons of RAM. No lie, go for 32 gigs of ram.\n\nGaming on the other hand......\n\nhere is the low down on gaming. First off, the graphics card does most of the work... like say, 8/10's of the work. As a result the CPU isn't nearly as important. i5's are perfect for game machines.\n\nWhere you get in trouble with a gaming machine, and where an i7 comes in handy is if you decide to game while you are doing something else like rendering. 'oh it is gonna take me an hour to do the mkv. Lets fire up Doom!'.\n\nUntil you get like me... 'lets decrypt 2 blu rays, render a MKV, play something from PLEX AND play Doom at the same time!'. i7 and ram makes that doable." ]
[ "Intel 5 Series Intel 5 Series is a computing architecture introduced in 2008 that improves the efficiency and balances the use of communication channels in the motherboard. The architecture consists primarily of a central processing unit (CPU) (connected to the graphics card and memory) and a single chipset (connected to motherboard components). All motherboard communications and activities circle around these two devices.\nThe architecture is a product of adjustments made to the Intel 4 Series to deliver higher performance motherboards while maintaining efficiency and low power. The changes revolve around chipset and processor design, in conjunction with a rearrangement of functions", "an Apple A8 system-on-chip, and an M8 motion co-processor—an update of the M7 chip from the iPhone 5s. The primary difference between the M8 and the original M7 coprocessor is that the M8 also includes a barometer to measure altitude changes. Phil Schiller touted that the A8 chip would provide, in comparison to the 5s, a 25% increase in CPU performance, a 50% increase in graphics performance, and less heat output. Early hands-on reports suggested that the A8's GPU performance might indeed break away from previous generations doubling of performance at each yearly release, scoring 21204.26 in Base mark X", "CPU was released in late 2011. The new T4 CPU will drop from 16 cores (on the T3) back to 8 cores (as used on the T1, T2, and T2+). The new T4 core design (named \"S3\") feature improved per-thread performance, due to introduction of out-of-order execution, as well as having additional improved performance for single-threaded programs.\nIn 2010, Larry Ellison announced that Oracle will offer Oracle Linux on the UltraSPARC platform, and the port was scheduled to be available in the T4 and T5 timeframe.\nJohn Fowler, Executive Vice President Systems Oracle, in Openworld 2014 said Linux will be able", "Socket AM3 Compatibility Socket AM3 breaks compatibility with AM2/AM2+ processors due to a subtle change in key placement. The AM3 socket has 941 pin contacts in a different layout while AM2+ processors have 940 pins. Tom's Hardware removed the two obstructing key pins from an AM2+ Phenom processor in order to fit it into an AM3 socket. The processor did not work in the AM3 socket, but still worked in an AM2+ socket, suggesting that compatibility issues run deeper than merely the key pins. It is likely because the built-in memory controller in AM2/AM2+ processors only supports DDR2 (unlike AM3", "per the IEEE 754-1985 standard. By default, the x87 processors all use 80-bit double-extended precision internally (to allow sustained precision over many calculations, see IEEE 754 design rationale). A given sequence of arithmetic operations may thus behave slightly differently compared to a strict single-precision or double-precision IEEE 754 FPU. As this may sometimes be problematic for some semi-numerical calculations written to assume double precision for correct operation, to avoid such problems, the x87 can be configured using a special configuration/status register to automatically round to single or double precision after each operation. Since the introduction of SSE2, the x87", "as in its Core i3, Core i5 and Core i7 Mobile lineup), as well as offering up to four threads per core in high-end Xeon Phi processors. Multi-core Multi-core CPUs are typically multiple CPU cores on the same die, connected to each other via a shared L2 or L3 cache, an on-die bus, or an on-die crossbar switch. All the CPU cores on the die share interconnect components with which to interface to other processors and the rest of the system. These components may include a front side bus interface, a memory controller to interface with dynamic random access memory", "to run Windows on Mac hardware.\nOn July 27, 2010, Apple updated its line of iMacs to feature the new Intel Core \"i-series\" processors across the line. The 21.5\" models now feature the Core i3 processor, but these are upgradable to the Core i5. The high end 27\" features a Quad-Core i5 processor, which is upgradable to a Quad-Core i7. On this date Apple also announced its new \"Apple Magic Trackpad\" peripheral, a trackpad similar to that of MacBook Pro for use with iMac or any other Apple computer. Apple also introduced a AA NiMH battery charger intended to simplify the", "8086 and 8088 (in addition to interface registers for the peripherals).\nThe 8086, 8088, 80186, and 80188 can use an optional floating-point coprocessor, the 8087. The 8087 appears to the programmer as part of the CPU and adds eight 80-bit wide registers, st(0) to st(7), each of which can hold numeric data in one of seven formats: 32-, 64-, or 80-bit floating point, 16-, 32-, or 64-bit (binary) integer, and 80-bit packed decimal integer.\nIn the Intel 80286, to support protected mode, three special registers hold descriptor table addresses (GDTR, LDTR, IDTR), and a fourth task register (TR) is used for", "task switching. The 80287 is the floating-point coprocessor for the 80286 and has the same registers as the 8087 with the same data formats. 32-bit With the advent of the 32-bit 80386 processor, the 16-bit general-purpose registers, base registers, index registers, instruction pointer, and FLAGS register, but not the segment registers, were expanded to 32 bits. The nomenclature represented this by prefixing an \"E\" (for \"extended\") to the register names in x86 assembly language. Thus, the AX register corresponds to the lowest 16 bits of the new 32-bit EAX register, SI corresponds to the lowest 16 bits of ESI, and so on.", "the CPU. Through the use of controller integrated channel circuitry, the northbridge can directly link signals from the I/O units to the CPU for data control and access. Current status Due to the push for system-on-chip (SoC) processors, modern devices increasingly have the northbridge integrated into the CPU die itself; examples are Intel's Sandy Bridge and AMD's Fusion processors, both released in 2011. The southbridge became redundant and it was replaced by the Platform Controller Hub (PCH) architecture introduced with the Intel 5 Series chipset in 2008. All southbridge features and remaining I/O functions are managed by the PCH", "principle, the second X58 might be daisy-chained on the board). \nWhen used with the \"Gainestown\" DP processor, which will have two QPIs, the X58 and the two processors may be connected in a triangle or ring. For MP processors such as \"Beckton\" with more than two QPIs, the X58 is either connected to two processors, which in turn are connected in a \"mesh\" of QPIs to other processors or attached \"in pairs\" to two different processors. I/O for \"remote\" processors is relayed via the inter-processors QPI.\nX58 board manufacturers can build SLI-compatible Intel chipset boards by submitting their designs to nVidia", "series provide higher core counts, higher per-core performance and improved reliability features, compared to the previous Xeon E7 v2 generation. Following the usual SKU nomenclature, Xeon E7-48xx v3 and E7-88xx v3 series allow multi-socket operation, supporting up to quad- and eight-socket configurations, respectively. These processors use the LGA 2011 (R1) socket.\nXeon E7-48xx v3 and E7-88xx v3 series contain a quad-channel integrated memory controller (IMC), supporting both DDR3 and DDR4 LRDIMM or RDIMM memory modules through the use of Jordan Creek (DDR3) or Jordan Creek 2 (DDR4) memory buffer chips. Both versions of the memory buffer chip connect to the processor using version 2.0 of", "system-on-chip with a heterogeneous CPU. The octa-core CPU comprises a 1.6 GHz quad-core Cortex-A15 cluster and a 1.2 GHz quad-core Cortex-A7 cluster. The chip can dynamically switch between the two clusters of cores based on CPU usage; the chip switches to the A15 cores when more processing power is needed, and stays on the A7 cores to conserve energy on lighter loads. Only one of the clusters is used at any particular moment, and software sees the processor as a single quad-core CPU. The SoC also contains an IT tri-core PowerVR SGX 544 graphics processing unit (GPU). Regional models of the S4", "(FMA3) requires that d be the same register as a, b or c. The three-operand form makes the code shorter and the hardware implementation slightly simpler, while the four-operand form provides more programming flexibility.\nSee XOP instruction set for more discussion of compatibility issues between Intel and AMD.", "Apple A5X Design The A5X features a dual-core ARM Cortex-A9 CPU at 1 GHz and a quad-core PowerVR SGX543MP4 GPU clocked at 250 MHz. Apple doubled the size of the A5X's memory interface in comparison to the A5, including a memory interface subsystem with four 32-bit wide LP-DDR2 memory controllers. This was done to provide sufficient bandwidth for the very high pixel count on the third generation iPad's Retina Display.\nUnlike the A4 and A5, the A5X is covered with a metal heat spreader and is not a package-on-package (PoP) assembly. In those earlier chips the RAM sat on top", "overestimate the number of cores and logical processors because the old detection method assumes there are no gaps in the APIC id space, and this assumption is violated by some newer processors (starting with the Core i3 5x0 series), but these newer processors also come with an x2APIC, so their topology can be correctly determined using the EAX=Bh leaf method. EAX=7, ECX=0: Extended Features This returns extended feature flags in EBX, ECX, and EDX. EAX=80000000h: Get Highest Extended Function Implemented The highest calling parameter is returned in EAX. EAX=80000002h,80000003h,80000004h: Processor Brand String These return the processor brand string in EAX,", "make this optional or do not support it at all, the OS may choose to use a tree-based page table exclusively. IA-32 / x86 The x86 architecture has evolved over a very long time while maintaining full software compatibility, even for OS code. Thus, the MMU is extremely complex, with many different possible operating modes. Normal operation of the traditional 80386 CPU and its successors (IA-32) is described here.\nThe CPU primarily divides memory into 4 KB pages. Segment registers, fundamental to the older 8088 and 80286 MMU designs, are not used in modern OSes, with one major exception:", "CISC does not even need to have complex addressing modes; 32 or 64-bit RISC processors may well have more complex addressing modes than small 8-bit CISC processors.\nA PDP-10, a PDP-8, an Intel 80386, an Intel 4004, a Motorola 68000, a System z mainframe, a Burroughs B5000, a VAX, a Zilog Z80000, and a MOS Technology 6502 all vary wildly in the number, sizes, and formats of instructions, the number, types, and sizes of registers, and the available data types. Some have hardware support for operations like scanning for a substring, arbitrary-precision BCD arithmetic, or transcendental functions, while others have only", "consumer platforms.\nIn May 2007, AMD officially codenamed the eight core setup with two Phenom FX processors to be the FASN8 (pronounced as \"fascinate\", /ˈfæsɪneɪt/, in short for First AMD Silicon Next-gen 8-core Platform) from the previous codename \"4x4+\" used in Analyst Day presentations. Configuration In each socket resides an AMD Athlon 64 FX CPU. Each socket is connected using AMD's Direct Chip Module, this dual-processor architecture was dubbed by AMD as the \"Dual Socket Direct Connect Architecture\" (DSDC Architecture), providing a dedicated channel between the CPU cores and from each CPU out to the system memory. Due to the nature", "– because of the support for various sizes (and backward compatibility) in the instruction set, some instruction mnemonics carry \"d\" or \"q\" identifiers denoting \"double-\", \"quad-\" or \"double-quad-\", which are in terms of the architecture's original 16-bit word size.\nIn general, new processors must use the same data word lengths and virtual address widths as an older processor to have binary compatibility with that older processor.\nOften carefully written source code – written with source code compatibility and software portability in mind – can be recompiled to run on a variety of processors, even ones with different data word lengths or different", "Intel's mobile processors, initially the Pentium M and later the Intel Core and Intel Core 2 processors.\nEarlier Turion 64 processors are compatible with AMD's Socket 754. The newer \"Richmond\" models are designed for AMD's Socket S1. They are equipped with 512 or 1024 KB of L2 cache, a 64-bit single channel on-die memory controller, and an 800 MHz HyperTransport bus. Battery saving features, like PowerNow!, are central to the marketing and usefulness of these CPUs. Model naming methodology The model naming scheme does not make it obvious how to compare one Turion with another, or even an Athlon 64. The model name", "single GPU core version of the A5 processor. Unlike the other A5 variants, this version of the A5 is not a package-on-package (PoP), having no stacked RAM. The chip is very small, just 37.8 mm², but as the decrease in size is not due to a decrease in feature size (it is still on a 32 nm fabrication process), this indicates that this A5 revision is of a new design. Markings tell that it's named APL7498, and in software, the chip is called S5L8947.", "ATI graphics-processors (GPUs). The longer name indicates its intended use, namely as a component in current and future online distribution systems; as such it may be utilized in high-definition displays and recording equipment, as well as HDTV systems. Additionally the processor may be suited to digital imaging systems (medical, scientific, etc.) and physical simulation (e.g., scientific and structural engineering modeling).\nIn a simple analysis, the Cell processor can be split into four components: external input and output structures, the main processor called the Power Processing Element (PPE) (a two-way simultaneous-multithreaded PowerPC 2.02 core), eight fully functional co-processors called the Synergistic Processing", "same as in the six-core Gulftown/Westmere-EP processor, but it uses the LGA 1567 package like Beckton to support up to eight sockets.\nStarting with Westmere-EX, the naming scheme has changed once again, with \"E7-xxxx\" now signifying the high-end line of Xeon processors using a package that supports larger than two-CPU configurations, formerly the 7xxx series. Similarly, the 3xxx uniprocessor and 5xxx dual-processor series turned into E3-xxxx and E5-xxxx, respectively, for later processors. E3-12xx-series \"Sandy Bridge\" The Xeon E3-12xx line of processors, introduced in April 2011, uses the Sandy Bridge chips that are also the base for the Core i3/i5/i7-2xxx and Celeron/Pentium", "more markets some time ago. The triple-core processor still see the same specifications for quad-core variants, the naming of the processor lineup, according to the AMD branding scheme, will be named as Phenom triple-core 8000 series, the processor line will be focused on what AMD called the fourth market segment or the \"High-end Mainstream\" segment beside Value, Mainstream and Performance segments in an interview with BetaNews, which the targeted customers of the processors are \"those who are willing to pay more for more performance but not required for too much processing power as required by gamers and system builders\", while", "was not introduced until the MacPro3,1, earlier models can only operate as 32-bit despite having 64-bit Xeon processors, however this only applies to the EFI side of the System, as the Mac boots everything else in BIOS Compatibility mode, and operating systems can take advantage of full 64 bit support. The newer LGA 1366 sockets utilize Intel's QuickPath Interconnect (QPI) integrated into the CPU in lieu of an independent system bus; this means the \"bus\" frequency is relative to the CPU chipset, and upgrading a CPU is not bottlenecked by the computer's existing architecture. Memory The original Mac Pro's main", "mean a more significant performance gain per Hz.\nThe A8 also integrates a graphics processing unit (GPU) which is a 4-shader-cluster PowerVR Series 6XT. However the GPU features custom shader cores designed by Apple.\nOn October 16, 2014, Apple introduced a variant of the A8, the A8X, in the iPad Air 2. Compared with the A8, the A8X has an enhanced 8-shader-cluster GPU and improved CPU performance due to one extra core and higher frequency. Patent litigation The A8's branch predictor has been claimed to infringe on a 1998 patent. On October 14, 2015, a district judge found Apple guilty of infringing", "32-bit register, two 16-bit registers, or two 8-bit registers, with the H8S having an internal 32-bit configuration. Several companies provide compilers for the H8 family, and there is a complete GCC port, including a simulator. There are also various hardware emulators available.\nThe family is continued with the H8SX 32-bit controllers. Applications H8S may be found in digital cameras, some ThinkPad notebooks, printer controllers, smart cards, chess computers, music synthesizers and in various automotive subsystems. The LEGO Mindstorms RCX, an advanced robot toy/educational tool, uses the H8/300. Namco employed an H8/3002 as a sound processor for various games it made in", "5S is as good a starting point as any.\" Scott Lowe of IGN also spoke highly of its 64-bit processor, \"which has a substantial lead in processing power over the HTC One and Samsung Galaxy S4, accounting for a graphics boost of up to 32% and 38% in CPU benchmarks.\" The debut of Apple's 64-bit A7 processor took rival Android smartphone makers by surprise, particularly Qualcomm whose own 64-bit system-on-chip was not released until 2015.\nMost reviewers recommended the iPhone 5S over the iPhone 5C which was released at the same time. The 5C retained almost the same hardware as the", "system with an 8087 was capable of true parallel processing, performing one operation in the integer ALU of the main CPU while at the same time performing a floating-point operation in the 8087 coprocessor. Since the 8086 or 8088 exclusively controlled the instruction flow and timing and had no direct access to the internal status of the 8087, and because the 8087 could execute only one instruction at a time, programs for the combined 8086/8087 or 8088/8087 system had to ensure that the 8087 had time to complete the last instruction issued to it before it was issued another" ]
Why does water taste bitter after eating pineapples?
[ "When the water hits your taste buds, they are stimulated a little. The problem is they have been overloaded with sugar and acid, thus they are temporarily unable to *report* sugar and acid at that moment. Therefore they report the only thing left: alkaline (bitter) taste.\n\nAdd that to the fact that most water has dissolved minerals in it that make it ever-so-slightly alkaline." ]
[ "regarding water and fruit trees is very famous. It is generally said that a curse by a woman belonging to Ahl al-Bayt (Dhadhi) made it so that no sweet water is available below ground and generally no fruit trees available inside the town boundary. More recently, after Consciousness among the people, they investigated the area and found that the area was surrounded by brackish water.", "tropical and subtropical climates. It begins bearing fruit at 5 to 7 years old, with peak production at 10 to 20 years. It is propagated by seed. Flavor As the name sweet lime suggests, the flavor is sweet and mild, but retains the essence of lime. The lime's taste changes rapidly in contact with air, and will turn bitter in few minutes, but if juiced and drunk rapidly the taste is sweet. The flavor is a bit flatter than most citrus due to its lack of acidity. It can be compared to limeade and pomelo. Checking for ripeness Like most", "the lowest pH levels. The low acidity found in fruit juices cause higher risk of cavities with enamel exposure.\nFrequency of sugar sweetened beverages results in dental caries, which are caused by Streptococcus bacteria. Dental caries is an infectious oral disease and is the breakdown of the teeth due to the bacteria in the mouth. It occurs when bacteria within the plaque metabolize the sugar, releasing various acids as waste compounds. As the acids are released, they form holes in the teeth which dissolve the enamel. The sugars, therefore provide a passageway for the activities of the oral bacteria, lowering salivary", "fruits are fructose and glucose, with total sugar content of 2.7-5.3 g/100 ml of juice. Typical sourness of the fruits is due to high content of malic acid (0.8-3.2 g/100 ml of juice) while astringency is related to quinic acid (1.2-2.1 g/100 ml of juice). Major sugar alcohol in fruit is L-quebrachitol (0.15-0.24 g/100 ml of juice).\nThe fruit of the plant has a high vitamin C content – in a range of 114 to 1550 mg per 100 grams, with an average content (695 mg per 100 grams), placing sea buckthorn fruit among the most enriched plant sources of vitamin C. Additionally, fruits have", "made from fresh leaves, branches, and fruit has been shown to cause illness, including nausea, vomiting, abdominal cramps, diarrhea, and weakness. In August 1983, a group of twenty-five people in Monterey County, California became suddenly ill by ingesting elderberry juice pressed from fresh, uncooked Sambucus mexicana berries, leaves, and stems. The density of cyanogenic glycosides is higher in tea made from flowers (or leaves) than it is in berries. Distribution and habitat The genus occurs in temperate to subtropical regions of the world. More widespread in the Northern Hemisphere, its Southern Hemisphere occurrence is restricted to parts of Australasia and", "The fruit can float in sea water for many months and the numerous dark seeds within remain viable. Use Fruits can be eaten raw as pulp when fully ripe. The wood can be used for spoons and tool handles, poles and yokes, but also provides fire wood and can be made into charcoal. A potion to treat stomach-ache can be produced by boiling the roots.", "sweetness, giving food a bitter taste. In contrast, apples are known to taste more pleasant after using toothpaste. Distinguishing between the hypotheses that the bitter taste of orange juice results from stannous fluoride or from sodium lauryl sulfate is still an unresolved issue and it is thought that the menthol added for flavor may also take part in the alteration of taste perception when binding to lingual cold receptors. Whitening toothpastes Many toothpastes make whitening claims. Some of these toothpastes contain peroxide, the same ingredient found in tooth bleaching gels. The abrasive in these toothpastes, not the peroxide, removes the", "the fruit of the hawthorn tree, and resembles crab apples; they have a sweet-sour flavor and an orange to golden yellow color. Other ingredients in ponche are prunes, pears, dry hibiscus, star anise, and sugar cane pieces.\nAgua loca (\"crazy water\") is a very sweet punch usually made from fermented sugarcane, mezcal or tequila mixed with \"aguas frescas\" (usually agua de Jamaica or horchata). Due to its sweetness, the drinker may not taste the alcohol and become intoxicated more quickly than anticipated. South America Punch is a mix between white wine and different kind of fruits, such as diced canned peaches.", "bitter, and is possibly comparable to the taste of sweetened coffee. The First Nations peoples who prepare it believe that the dish has many healthful properties, but the saponin chemicals which create the foam may cause gastrointestinal irritation if large quantities are consumed. Native themed restaurants in British Columbia have occasionally offered sxusem on their menus in recent years.\nUnrelated plants in the genus Sapindus produce very toxic saponins and are also commonly denominated \"soapberry\" along with the edible Canada buffaloberry. Etymology of \"soopolallie\" The common name of the plant in British Columbia is \"soopolallie\", a word derived from the historic", "into the locules, which provide nourishment to the fruit as it develops.\nCitrus fruits are notable for their fragrance, partly due to flavonoids and limonoids (which in turn are terpenes) contained in the rind, and most are juice-laden. The juice contains a high quantity of citric acid giving them their characteristic sharp flavour. The genus is commercially important as many species are cultivated for their fruit, which is eaten fresh, pressed for juice, or preserved in marmalades and pickles.\nThey are also good sources of vitamin C and flavonoids. The content of vitamin C in the fruit depends on the species, variety,", "are often combined in various ways with olives, artichokes, seafood, veal, chicken, and rice..\nThe pickled pulp and liquid can be used in Bloody Marys and other beverages where lemon and salt are used. The flavor also combines well with horseradish, as in American-style cocktail sauce.\nIn Ayurvedic cuisine, lemon pickle is a home remedy for stomach disorders, and its value is said to increase as it matures. In East African folk medicine, lemon pickle is given for excessive growth of the spleen. Variations Lime and grapefruit also are pickled in this manner. History Historically, pickling was an affordable and", "Pineapple juice Pineapple juice is a liquid made from pressing the natural liquid from the pulp of the pineapple tropical plant. Numerous pineapple varieties may be used to manufacture commercial pineapple juice, the most common of which are Smooth Cayenne, Red Spanish, Queen, and Abacaxi. In manufacturing, pineapple juice is typically canned.\nIt is used as a single or mixed juice beverage, and for smoothies, cocktails, culinary flavor, and as a meat tenderizer. Pineapple juice is a main ingredient in the piña colada and tepache. History There is no record of how or when pineapples arrived in Hawaii, with some accounts", "citrus fruits is acidic mainly because it contains citric acid. Other carboxylic acids occur in many living systems. For example, lactic acid is produced by muscle activity. The state of protonation of phosphate derivatives, such as ATP, is pH-dependent. The functioning of the oxygen-transport enzyme hemoglobin is affected by pH in a process known as the Root effect. Strong acids and bases Strong acids and bases are compounds that, for practical purposes, are completely dissociated in water. Under normal circumstances this means that the concentration of hydrogen ions in acidic solution can be taken to be equal to the concentration", "The calamansi bears a small citrus fruit that is used to flavor foods and drinks. Despite its outer appearance and its aroma, the taste of the fruit itself is quite sour, although the peel is sweet. Calamansi marmalade can be made in the same way as orange marmalade. Like other citrus fruits, the calamansi is high in vitamin C.\nThe fruit can be frozen whole and used as ice cubes in beverages such as tea, soft drinks, water, and cocktails. The juice can be used in place of that of the common Persian lime (also called Bearss lime). The juice is", "but the mesocarp is fibrous or dry (termed a husk), so this type of fruit is classified as a simple dry, fibrous drupe. Unlike other drupes, the coconut seed is unlikely to be dispersed by being swallowed by fauna, due to its large size. It can, however, float extremely long distances across oceans.\nBramble fruits (such as the blackberry or the raspberry) are aggregates of drupelets. The fruit of blackberries and raspberries comes from a single flower whose pistil is made up of a number of free carpels. However, mulberries, which closely resemble blackberries, are not aggregate fruit, but are", "has been shown to tolerate pH levels as low as 4.1 (approximately that of tomato juice). It can withstand very low phosphorus levels and high salinity levels. The drought-tolerance of the tree is strong due to its ability to effectively store water in its root system. It is frequently found in areas where few trees can survive. The roots are also aggressive enough to cause damage to subterranean sewers and pipes. Along highways it often forms dense thickets in which few other tree species are present, largely due to the toxins it produces to prevent competition.\nAilanthus produces an allelopathic chemical", "in samalamig, calamansi juice by itself is a common drink in Filipino households. Unsweetened hot versions are a common home remedy for sore throat or colds. It can also be added to salabat (Filipino ginger tea). Fruit salad drink The fruit salad drink, also known as the \"buko salad drink\", is identical to the Filipino fruit salad, which is prepared with chunks of fruits, jellies, and coconut strips in condensed milk. The only difference is that the drink has more water and condensed milk added. Guinomis Guinomis is sometimes regarded as a variant of halo-halo since it is a shaved", "American mycologist David Arora reported that some enjoyed it while he felt it had a strong sour taste.\nThe fruit body of T. floccosus produces oxylipin (biologically active lipids generated from fatty acids) that have antifungal activity against the plant pathogens Colletotrichum fragariae, C. gloeosporioides, and C. acutatum. Extracts of the fungus have shown in standard laboratory tests to have antimicrobial activity against several human pathogenic strains. T. floccosus also contains the spermidine derivative pistillarin, a bioactive compound that inhibits DNA damage by hydroxyl radicals generated by the Fenton reaction. Pistillarin is responsible for the green color obtained when iron salts are applied to the", "fatty outer flesh of the fruit, or mesocarp, is palatable raw for only a brief time when ripe; prior to this the volatile aromatic oils are too strong, and afterwards the flesh quickly becomes bruised, like that of an overripe avocado. Native Americans dried the fruits in the sun and ate only the lower third of the dried mesocarp, which is less pungent.\nThe hard inner seed underneath the fleshy mesocarp, like the pit of an avocado, cleaves readily in two when its thin shell is cracked. The pit itself was traditionally roasted to a dark chocolate-brown color, removing much of", "eaten in small quantities due to acid content and because they are mucilaginous. Cranberry hibiscus leaves also contribute to the décor of various dishes since they retain their color after being cooked.\nFlowers are used to make teas or other drinks where they contribute color rather than taste. In Central America the flowers are combined with ice, sugar, lemon, or lime juice and water to make a purple lemonade.\nThe root is edible however thought of as fibrous and distasteful. Contrary to similar species such as the Hibiscus sabdariffa, the calyx or sepals of Hibiscus acetosella is non-fleshy and not eaten. In", "used in making traditional medicine. The bitter seeds can be pounded and mixed with water to make a deworming and ulcer medication. The bark is used to treat dysentery and malaria; the powdered bark can also be used to treat scorpion stings. The fruit's skin is used to treat diarrhea, and in the Philippines the dried skin is burned as a mosquito repellent. The skin, especially of the langsat variety, can be dried and burned as incense.\nThe greatest producers of Lansium parasiticum are Malaysia, Thailand, the Philippines and Indonesia. The production is mostly for internal consumption, although some is exported", "ion-exchange resin is being suggested as a way to remove the bitterness, and so make it possible to commercialize the juice. Nutritionally, the fruit is a good source of vitamin C, folic acid, potassium and fiber.\nSeveral populations of the trees were infested with Citrus tristeza virus which caused stunted growth and destroyed the harvest after 10–15 years.\nAn extraction from the young fruits have been used medically in skin care treatments for patients with atopic dermatitis. Others Hassa-kun is a local mascot character which represents Inno-shima in Hiroshima prefecture to enhance image and promote tourism.", "to a variety of diseases, the most serious of which is wilt disease vectored by mealybugs typically found on the surface of pineapples, but possibly in the closed blossom cups. Other diseases include citrus pink disease, bacterial heart rot, anthracnose, fungal heart rot, root rot, black rot, butt rot, fruitlet core rot, and yellow spot virus.\nPineapple pink disease (not citrus pink disease) is characterized by the fruit developing a brownish to black discoloration when heated during the canning process. The causal agents of pink disease are the bacteria Acetobacter aceti, Gluconobacter oxydans, Pantoea citrea. and Tatumella ptyseos.\nSome pests that commonly", "seeds. The flesh is very juicy and tends towards the sweet side of the tangerine rather than the bitter side of its grapefruit lineage, with a fragrant rind.\nThe taste is often described as sourer than an orange and less bitter than a grapefruit, however, and is more commonly guessed to be a lemon–tangerine hybrid. The fruit is seasonal from December to April. It is distributed in Europe and the United States between November and April, and is on occasion available from July to September.", "cross between nashi and bell pepper, with a very mild rose scent and a slightly bitter aftertaste.\" Distribution It has also been introduced widely on every continent except Antarctica, and it has become established and invasive in several regions. Concern has been expressed concerning the threat to several ecosystems, including those on several Hawaiian islands, Réunion, the Galápagos Islands, parts of Australia and the warmer regions of the Americas. However, in Hawaii, it has been almost wiped out by the introduced rust Puccinia psidii. Uses Rich in vitamin C, the fruit can be eaten raw or used in various", "this stage, it has a pineapple-mango flavor. The flesh is golden in color, very juicy, vaguely sweet, but with a hint of tart acidity.\" In Indonesia and Malaysia, it is eaten with shrimp paste, a thick, black, salty-sweet sauce called hayko in the Southern Min dialect of Chinese. It is an ingredient in rujak in Indonesia and rojak in Malaysia. The juice is called kedondong in Indonesia, amra in Malaysia, and balonglong in Singapore.\nThe fruit is made into preserves and flavorings for sauces, soups, and stews. In Fiji it is made into jam. In Samoa and Tonga it", "the titoki tree using a tourniquet-style hemp bag after that Maori will extract it into greenish oil.\nPeople now use the fruit for liquor production. The fruit attributes sweet and astringent taste factors to the alcohol. This product has been distilled and exported to Australia, Fiji, Japan, and the United Kingdom.", "Sea pineapple Culinary uses In Korea, sea pineapple is mostly eaten raw as hoe with vinegared gochujang, but it is also often pickled into jeotgal, or used to add flavor to kimchi.\nIn Japan, sea pineapple is most commonly eaten raw as sashimi, simply by slicing the animal vertically, removing the internal organs and serving them with vinegared soy sauce. It is also sometimes salted, smoked, grilled, deep-fried, or dried.", "sour. Marmalade, a condiment derived from cooked orange and lemon, can be especially bitter, but is usually sweetened to cut the bitterness and produce a jam-like result. Lemon or lime is commonly used as a garnish for water, soft drinks, or cocktails. Citrus juices, rinds, or slices are used in a variety of mixed drinks. The colourful outer skin of some citrus fruits, known as zest, is used as a flavouring in cooking; the white inner portion of the peel, the pith, is usually avoided due to its bitterness. The zest of a citrus fruit, typically lemon or an orange,", "the Pacific Islands including Hawaii, Guam, and American Samoa (Pacific Island Ecosystems at Risk 2001).\nIn Jamaica this berry is called susumba, or gully beans, and is usually cooked in a dish along with saltfish and ackee. It is believed to be full of iron (it does have a strong iron like taste when eaten) and is consumed when one is low in iron. Ecology In Puerto Rico, turkey berry grows in upland sites that receive from about 1000 to 4000 mm of annual precipitation. It also grows in riparian zones in drier areas. Turkey berry grows on all types of moist," ]
What does fuel stabilizer do to gasoline?
[ "Gasoline should keep indefinitely if stored properly.\n\nHowever, stabilisers can be useful if fuel is stored incorrectly, for example, in partially full tanks of small equipment. The larger tanks in modern cars are carefully designed to protect fuel from air and evaporation.\n\nGasoline molecules can evaporate if the tank is not securely closed - a stabiliser won't do anything for that.\n\nGasoline molecules can oxidise by exposure to oxygen - a fuel stabiliser can contain an anti-oxidant to absorb the oxygen, and neutralise the free radicals accelerate the oxidation reaction.\n\nGasoline may contain traces of metal from manufacture/processing or from metal storage tanks. Certain metals can act as catalysts and cause the gasoline molecules to polymerise into sludge. Metal deactivator additives can absorb and neutralise the catalytic effect of metal contamination.\n\nGasoline may contain large quantities of ethanol to meet biofuel targets by governments. If stored open to the air, the ethanol can absorb water from the air, and this can cause the water/ethanol mix to separate from the gasoline. By adding a different alcohol (methanol or isopropanol), the water/alcohol mix doesn't separate as easily.\n\nAll these problems can be avoided if gasoline is stored in a tightly sealed plastic tank with only the minimum amount of air for an expansion space, as high quality gasolines will come with metal deactivators already added to neutralised contamination at the refinery." ]
[ "of a fuel stabilizer to gasoline can extend the life of fuel that is not or cannot be stored properly, though removal of all fuel from a fuel system is the only real solution to the problem of long-term storage of an engine or a machine or vehicle. Typical fuel stabilizers are proprietary mixtures containing mineral spirits, isopropyl alcohol, 1,2,4-trimethylbenzene or other additives. Fuel stabilizers are commonly used for small engines, such as lawnmower and tractor engines, especially when their use is sporadic or seasonal (little to no use for one or more seasons of the year). Users have been", "of fuel delivery with fuel injection engines featuring closed loop lambda control. In some engines ethanol may degrade some compositions of plastic or rubber fuel delivery components designed for conventional petrol, and also be unable to lambda compensate the fuel properly.\n\"FlexFuel\" vehicles have upgraded fuel system and engine components which are designed for long life using E85 or M85, and the ECU can adapt to any fuel blend between gasoline and E85 or M85. Typical upgrades include modifications to: fuel tanks, fuel tank electrical wiring, fuel pumps, fuel filters, fuel lines, filler tubes, fuel level sensors, fuel injectors, seals,", "oil column and reaches hydrostatic balance sooner. Inert gas system An oil tanker's inert gas system is one of the most important parts of its design. Fuel oil itself is very difficult to ignite, but its hydrocarbon vapors are explosive when mixed with air in certain concentrations. The purpose of the system is to create an atmosphere inside tanks in which the hydrocarbon oil vapors cannot burn.\nAs inert gas is introduced into a mixture of hydrocarbon vapors and air, it increases the lower flammable limit or lowest concentration at which the vapors can be ignited. At the same time it", "misfiring or the lack of proper action of the fuel within a fuel injection system and from an onboard computer attempting to compensate (if applicable to the vehicle). Gasoline should ideally be stored in an airtight container (to prevent oxidation or water vapor mixing in with the gas) that can withstand the vapor pressure of the gasoline without venting (to prevent the loss of the more volatile fractions) at a stable cool temperature (to reduce the excess pressure from liquid expansion and to reduce the rate of any decomposition reactions). When gasoline is not stored correctly, gums and solids may", "Bivalent (engine) Alcohol and Petroleum Engines that can use either alcohol (often produced as a biofuel) or standard gasoline are variants of flex fuel vehicles. Such vehicles are in production and commonly available for sale in the United States and other countries. Compressed or Liquefied Natural Gas and Petroleum Compressed natural gas (CNG) is made by compressing methane to store it high pressures. Liquefied natural gas (LNG) is made and stored cryogenically, much like liquid hydrogen. The physical properties of natural gas require the compression ratio of the engine to be higher than in normal internal combustion engines, and the", "advised to keep gasoline containers more than half full and properly capped to reduce air exposure, to avoid storage at high temperatures, to run an engine for ten minutes to circulate the stabilizer through all components prior to storage, and to run the engine at intervals to purge stale fuel from the carburetor.\nGasoline stability requirements are set by the standard ASTM D4814. This standard describes the various characteristics and requirements of automotive fuels for use over a wide range of operating conditions in ground vehicles equipped with spark-ignition engines. Energy content A gasoline-fueled internal combustion engine obtains energy from the", "Diethyl ether Uses It is particularly important as a solvent in the production of cellulose plastics such as cellulose acetate. Fuel Diethyl ether has a high cetane number of 85–96 and is used as a starting fluid, in combination with petroleum distillates for gasoline and Diesel engines because of its high volatility and low flash point. Ether starting fluid is sold and used in countries with cold climates, as it can help with cold starting an engine at sub-zero temperatures. For the same reason it is also used as a component of the fuel mixture for carbureted compression ignition model", "without the need for additives to prevent valve problems. Its use in the United States has been restricted by regulations. Its use in the European Union is restricted by Article 8a of the Fuel Quality Directive following its testing under the Protocol for the evaluation of effects of metallic fuel-additives on the emissions performance of vehicles. Fuel stabilizers (antioxidants and metal deactivators) Gummy, sticky resin deposits result from oxidative degradation of gasoline during long-term storage. These harmful deposits arise from the oxidation of alkenes and other minor components in gasoline (see drying oils). Improvements in refinery techniques have generally reduced", "ethanol fuel (alcohol), and others. Multifuel engines, such as petrol-paraffin engines, can benefit from an initial vaporization of the fuel when they are running less volatile fuels. For this purpose, a vaporizer (or vaporiser) is placed in the intake system. The vaporizer uses heat from the exhaust manifold to vaporize the fuel. For example, the original Fordson tractor and various subsequent Fordson models had vaporizers. When Henry Ford & Son Inc designed the original Fordson (1916), the vaporizer was used to provide for kerosene operation. When TVO became common in various countries (including the United Kingdom and Australia) in the", "be recombined to meet specific octane requirements by processes such as alkylation, or more commonly, dimerization. The octane grade of gasoline can also be improved by catalytic reforming, which involves removing hydrogen from hydrocarbons producing compounds with higher octane ratings such as aromatics. Intermediate products such as gasoils can even be reprocessed to break a heavy, long-chained oil into a lighter short-chained one, by various forms of cracking such as fluid catalytic cracking, thermal cracking, and hydrocracking. The final step in gasoline production is the blending of fuels with different octane ratings, vapor pressures, and other properties to meet", "is best for spills of jet fuels, FFFP is better for cases where the burning fuel can form deeper pools, and AR-AFFF is suitable for burning alcohols. The most flexibility is achieved by AR-AFFF or AR-FFFP. AR-AFFF must be used in areas where gasolines are blended with oxygenates, since the alcohols prevent the formation of the film between the FFFP foam and the gasoline, breaking down the foam, rendering the FFFP foam virtually useless. Environmental and health concerns Studies have shown that PFOS is a persistent, bioaccumulative, and toxic pollutant. It was added to Annex B of the Stockholm Convention", "magnesium, aluminum, and rubber parts in the fuel system. Fuel injection control systems have a wider range of pulse widths to inject up to 34% more fuel (which in turn produces more power). Stainless steel fuel lines, sometimes lined with plastic, and stainless-steel fuel tanks in place of terne fuel tanks have been used. In some cases, FFVs use specific engine oil that neutralises acidity. For vehicles with in-tank-mounted fuel pumps, precautions to prevent arcing, as well as flame arrestors positioned in the tank's fill pipe, are sometimes used. Octane rating As more effort is put into maximizing an engine", "of the gasoline.\nGasolines are also treated with metal deactivators, which are compounds that sequester (deactivate) metal salts that otherwise accelerate the formation of gummy residues. The metal impurities might arise from the engine itself or as contaminants in the fuel. Detergents Gasoline, as delivered at the pump, also contains additives to reduce internal engine carbon buildups, improve combustion and allow easier starting in cold climates. High levels of detergent can be found in Top Tier Detergent Gasolines. The specification for Top Tier Detergent Gasolines was developed by four automakers: GM, Honda, Toyota, and BMW. According to the bulletin, the minimal", "many flexible-fuel vehicle designs in recent decades.\nA multifuel engine is constructed so that its compression ratio permits firing the lowest octane fuel of the various accepted alternative fuels. A strengthening of the engine is necessary in order to meet these higher demands. Multifuel engines sometimes have switch settings that are set manually to take different octanes, or types, of fuel. Military multifuel engines One common use of this technology is in military vehicles, so that they may run a wide range of alternative fuels such as gasoline or jet fuel. This is seen as desirable in a", "as the tank is full of fuel vapour/air mixture that is well above the flammability limits, and thus cannot burn even if an ignition source were present (which is rare).\nBunded oil tanks are used for safely storing domestic heating oil and other hazardous materials. Bunding is often required by insurance companies, rather than single skinned oil storage tanks.\nSeveral systems, such as BattleJacket and rubber bladders, have been developed and deployed for use in protecting (from explosion caused by enemy fire) the fuel tanks of military vehicles in conflict zones.", "of accidental release. Arguments against non-CO2 refrigerants Butane and propane are very flammable petroleum products; they are used as fuels for gas barbecue grills, disposable lighters, etc. Like gasoline, to which it chemically is closely related, propane has a tendency to explode if mixed with oxygen and ignited in an enclosed container.\nThe use of highly flammable hydrocarbon gases such as butane and propane as automotive refrigerants raises serious safety concerns. The EPA, in evaluating motor vehicle air conditioning substitutes for CFC-12 (Freon, or R-12) under its SNAP program, has classified as \"Unacceptable Substitutes\" other \"Flammable blend[s] of hydrocarbons\" by", "Inerting system Oil tankers Oil tankers fill the empty space above the oil cargo with inert gas to prevent fire or explosion of hydrocarbon vapors. Oil vapors cannot burn in air with less than 11% oxygen content. The inert gas may be supplied by cooling and scrubbing the flue gas produced by the ship's boilers. Where diesel engines are used, the exhaust gas may contain too much oxygen so fuel-burning inert gas generators may be installed. One-way valves are installed in process piping to the tanker spaces to prevent volatile hydrocarbon vapors or mist from entering other equipment. Inert", "oil in the fuel to lubricate the engine, while the motor in electrical chain-saws is normally lubricated for life. Most modern gas operated saws today require a fuel mix of 2% (1:50). Regular gas from most gas stations contain 5 to 10% ethanol which can result in problems of the equipment. Ethanol dissolves plastic, rubber and other material. This leads to problems especially on older equipment. A workaround of this problem is to run fresh fuel only and run the saw dry at the end of the work.\nSeparate chain oil or bar oil is used for the lubrication of the", "is forced closed and cannot be overfilled. Non-pressurized refueling systems do not require tank pressurization for automatic nozzle shut-off, thus allowing their use on thin-walled metallic and composite material fuel tanks.\nNon-pressurized refuel systems reduce fuel spills and provided more accurate filling when used with automatic refuelling nozzles. The system is also designed to prevent overfilling or manual override of the fueling system. David Juleff of Shaw Development, LLC was the design engineer that tailored an aerospace non-pressurized refuel system to be first introduced on the Caterpillar D11 track type tractor in 1998. A number of non pressure fueling", "Top Tier Detergent Gasoline Purpose of detergents in gasoline Detergent additives serve to prevent the buildup of engine \"gunk,\" which can cause a host of mechanical problems. Automotive journalist Craig Cole writes, \"Gasoline is an impure substance refined from a very impure base stock – crude oil. It’s an explosive hydrocarbon cocktail containing all kinds of different chemicals. In addition to its own molecular variability, refiners and retailers incorporate additional substances into the mix, from ethanol alcohol to octane enhancers.\"\nWhile General Motors' fuels engineer Andrew Buczynsky claims that no one has identified the exact molecule in gasoline that causes engine", "applications, gasoline direct injection enables a stratified fuel charge (ultra lean burn) combustion for improved fuel efficiency, and reduced emission levels at low load.\nGDI has seen rapid adoption by the automotive industry over the past years, from 2.3% of production for model year 2008 vehicles to just over 45% expected production for model year 2015. Companion technologies Direct injection may also be accompanied by other engine technologies such as turbocharging or supercharging, variable valve timing (VVT) or continuous variable cam phasing, and tuned/multi path or variable length intake manifolding (VLIM, or VIM). Water injection or (more commonly) exhaust gas recirculation", "the combustion at low temperature.\nThe effect of the additive varies with the fuel type, which itself depends on the quality of the crude oil and the way it is refined. Uses The crudes used by the refineries are more and more difficult to refine. This results in a Diesel fuel of lower ignition quality.\nThe use of Cetane Improver additives constitutes both a cost-effective and convenient way to reduce emissions and improve engine performance.\nRefiners also use Cetane Improver additives in their Premium Diesel fuel for enhanced performances.\nWhile gasoline needs a spark to be ignited, Diesel fuel requires only the combination of", "ensure that high quality inert gases is produced. Too much air would result in an oxygen content exceeding 5%, too much fuel oil would result in carryover of dangerous hydrocarbon gas. The flue gas is cleaned and cooled by the scrubber tower. Various safety devices prevent overpressure, return of hydrocarbon gas to the engine room, or supply of IG with too high oxygen content.\nGas tankers and product carriers cannot rely on flue gas systems (because they require IG with O₂ content of 1% or less) and so use inert gas generators instead. The inert gas generator consists of a combustion", "result, which can corrode system components and accumulate on wetted surfaces, resulting in a condition called \"stale fuel\". Gasoline containing ethanol is especially subject to absorbing atmospheric moisture, then forming gums, solids or two phases (a hydrocarbon phase floating on top of a water-alcohol phase).\nThe presence of these degradation products in the fuel tank or fuel lines plus a carburetor or fuel injection components makes it harder to start the engine or causes reduced engine performance. On resumption of regular engine use, the buildup may or may not be eventually cleaned out by the flow of fresh gasoline. The addition", "GWP of carbon dioxide) and can serve as a functional replacement for R-12, R-22, R-134a, and other chlorofluorocarbon or hydrofluorocarbon refrigerants in conventional stationary refrigeration and air conditioning systems.\nAs a refrigerant, isobutane poses an explosion risk in addition to the hazards associated with non-flammable CFC refrigerants. Substitution of this refrigerant for motor vehicle air conditioning systems not originally designed for isobutane is widely prohibited or discouraged.\nVendors and advocates of hydrocarbon refrigerants argue against such bans on the grounds that there have been very few such incidents relative to the number of vehicle air conditioning systems filled with hydrocarbons. Nomenclature The", "combustion of hydrocarbon fuel increases as the molecule chain length decreases, so gasoline fuels with higher ratios of the shorter chain alkanes such as heptane, hexane, pentane, etc. can be used under certain load conditions and combustion chamber geometries to increase engine output which can lead to lower fuel consumption, although these fuels will be more susceptible to predetonation ping in high compression ratio engines. Gasoline direct injection compression ignition engines make more efficient use of the higher combustion energy short chain hydrocarbons as the fuel is injected directly into the combustion chamber during high compression which auto-ignites the fuel,", "high-level blends of ethanol, such as E85. Natural gasoline has a lower octane content (RON roughly equal to 70) than conventional commercial distilled gasoline, so it cannot normally be used by itself for fuel for modern automobiles. However, when mixed with higher concentrations of ethanol (RON roughly equal to 113) to produce products such as E85, the octane level of the natural gasoline and ethanol mixture is now within the usable range for flex-fuel vehicles.", "as a by-product is typically used to make gasoline additives such as methyl tert-butyl ether (MTBE). Miscellaneous uses Isobutane is also used as a propellant for aerosol cans.\nIsobutane is used as part of blended fuels, especially common in fuel canisters used for camping. Refrigerant Isobutane is used as a refrigerant. The use in refrigerators started in 1993 when Greenpeace presented the Greenfreeze project with the German company Foron. In this regard, blends of pure, dry \"isobutane\" (R-600a) (that is, isobutane mixtures) have negligible ozone depletion potential and very low global warming potential (having a value of 3.3 times the", "Gasoline direct injection Gasoline direct injection (GDI) (also known as petrol direct injection, direct petrol injection, spark-ignited direct injection (SIDI) and fuel-stratified injection (FSI)), is a form of fuel injection employed in modern two-stroke and four-stroke gasoline engines. The gasoline is highly pressurized, and injected via a common rail fuel line directly into the combustion chamber of each cylinder, as opposed to conventional multipoint fuel injection that injects fuel into the intake tract or cylinder port. Directly injecting fuel into the combustion chamber requires high-pressure injection, whereas low pressure is used injecting into the intake tract or cylinder port.\nIn some", "Emulsified fuel Applications Water continuous (oil-in-water) emulsified fuels are exemplified by the Orimulsion system and bitumen emulsions. These are often described as a high internal phase emulsions (hipe) because the continuous phase is around 30% of the composition of the fuel it is more usual for the dispersed phase to be the minor component. Water continuous emulsions of very heavy crudes, bitumen are easier to pump than the original fuel, which would require considerable heating and / or dilution with a distilled product (kerosene or light crude) in order to make them easy to handle. Water continuous emulsions of residual" ]
Hey Reddit, so what the hell are those squiggly lines I see in my peripheral every once in a while? Don't know why I didn't wonder until now..
[ "They are called floaters. Mostly they are the shadows cast by bits of the inside of your eye that have broken off and are floating around in the vitreous humor, or eyeball fluid, in your eye.\n\n_URL_0_" ]
[ "by his fellow Fox sportscaster about how one doesn't want to cross Fasano, Lyons replied, \"Well, you know, Fasano is the type of guy 'who knows a guy that knows a guy'.\"\nLyons and fellow sportscaster Thom Brennaman made fun of a 64-year-old New York Mets fan wearing an unusual device over his eyes at a game during Game 2 of the 2006 National League Division Series between the Mets and Dodgers, with Lyons saying, \"He's got a digital camera stuck to his face.\" The man turned out to be nearly blind, except for limited peripheral vision in one eye, and", "a loud clicking noise many times per second in order to monitor her brain function.\nAt some point during the operation, she says she noticed a presence and was pulled towards a light. She says she began to discern figures in the light, including her grandmother, an uncle, other deceased relatives and people unknown to her. According to Reynolds, the longer she was there, the more she enjoyed it, but at some point she was reminded that she had to go back. She says her uncle brought her back to her body, but she didn't want to go, so he pushed", "Mr Hublot Plot Mr. Hublot is a man who lives in a tiny apartment located in a crowded steampunk city. He wears several layers of eyewear and has an odometer-like counter in his forehead which runs forward and backward. Mr. Hublot also displays several OCD symptoms, such as turning the lights on and off several times before leaving the living room and meticulously straightening the pictures on his wall.\nMr. Hublot sees a tiny puppy-like robot shivering in a box. When the box is taken away for garbage disposal, Mr. Hublot, concerned for the puppy's welfare, takes the", "from the receiver sometimes—but not always—indicates (sexual) interest in the winker. For example, in the Wodaabe tribe in the Niger area, someone who wants to engage in sexual activities can wink at a person. If the person continues to look at them, they will slightly move their lip corner, showing the way to the bush the person is expected to have sex with them in.\nIn particularly difficult or strenuous situations, Person A may wink at Person B to non-verbally communicate that Person B can trust Person C. An extreme example of this could be undercover cops when one does something", "El gusanito en persona For some time now\nthe little worm has been squirming around\nnot giving a damn\nabout drawing at his feet\nthat's slowly appearing in the grass\nthat looks just like the little worm\nyet inside down.\nThen one fine day he got so fed up\nwith the enigma drawn\nthat he started pulling at it\nand rolled up the lines into a ball\nthat he used to have a simple suit\nwoven on a loom.\nWhen he presents himself like that, dressed as \"himself\"\nand brimming with optimism,\nwe are obliged to ponder\nthat the little worm \"in person\" is different\nto almost everyone in real life.\nAnd this is what he has grasped", "on its static face. It walks around a city and finds that everybody has a colorful headset that renders them controlled and/or immobile. The people are seeing memories of their daily activities in a colorful landscape through the headset. When the figure passes a woman that notices it, it follows her to her apartment where it removes her headset. She gets terrified and tries to get away, but she's too shocked at reality and calms down. The figure shows her the objects in the sky and everybody immobilized by their headsets. It shows her a hologram of the earth being", "figures sit conversing in vast expanses of artificially enclosed greens, all alienated from the organic pulse of the city, insulated, modularised and upmarket. \nWriting for Dorall’s 2009 exhibition under the Bombay Saphire Arts Project, Simpang, Malaysia, curator Simon Soon remarks: Dorall's mazes makes us aware of the possible choices we make in life. Within the maze construction, one encounters by peering in from above, like God's eye view, the dramatic cycle of human existence and its emotional range: loneliness, joy, fear, serenity, are mapped out within a physical geography that sets the stage for the ensuing encounters.\nThe Inversion Theory\nDorall’s most", "does not disdain to visit the darkest shelter at the same time as the most majestic palace.\nWhen the interior of the square remains as resting from the mercantile struggle that has suffered, you will see several people of the strong sex glide under the arcades and gamble in certain places as if they were the geniuses in charge of silence. An infinite number of faint whistles shake the air in all directions and soon after you hear those whistles coming from the upper floor of the square, as if there were echoes echoed by the first. These whistles are one", "forced to tell the hospital to eliminate anything spiral-shaped so his mother may not encounter them (even going so far as to throwing away the cakes that Kirie had brought for her mother, since the frosting on the cakes were like whirls). Eventually, Shuichi's mother succumbs to her phobia and kills herself when a millipede tries to crawl into her ear to inhabit her cochlea and causes her to hallucinate about her husband, who tells her that \"there's another vortex in the deepest part of your ear\".\nMeanwhile, Kirie's high school is populated by a host of twitching teachers, preening pretty", "Soon, a repetitive pattern emerges: Céline or Julie enters the house, disappears for a time, and then is suddenly ejected by unseen hands back to present day Paris later that same day. Each time either Céline or Julie is exhausted, having forgotten everything that has happened during their time in the house. However, each time upon returning via a taxi the women discover a candy mysteriously lodged in their mouth. It seems to be important, so each makes sure to carefully save the candy. At one point, they realize that the candy is a key to the other place and", "eyes are like two holes in a blanket burnt throo,\n\nAn' her brows in a mornin wad spyen a yung coo;\n\nAn' when aw heer her shootin \"Will ye buy ony clay,\"\n\nLike a candy man's trumpet, it steels maw young hart away.\n\nKORUS—She's a big lass an' a bonny one, &c.\n\nYe'll oft see hor doon at Sandgate when the fresh herrin cums in;\n\nShe's like a bagfull o' sawdust tied roond wiv a string;\n\nShe weers big golashes, te, an' her stockins was wonce white,\n\nAn' her bedgoon is a laelock, an’ her hat's nivor strite,\n\nKORUS—She's a big lass an' a bonny one, &c.\n\nWhen aw axed", "look at the cards and then throw them away.\nThe Stranger sneaks into a projector room and sleeps there. A series of old pop culture films and news clips play. We see him slip out as soon as the projectionist comes back.\nWe find our protagonist in a restaurant. The waiter complains of bad economic conditions and we see a woman whose hands are covered in blood, standing by the window. She looks exactly like the beggar woman at the hospital.\nThe Stranger bumps into a laughing madman on an intersection. He goes home with him and has a few joints. He watches", "Nettie was waiting for him at her church but she felt something wrong. She looked at the sky and saw a blazing star and knew it meant trouble. Simultaneously in a run down N.Y. tenement building a legless wheelchair man with the face a mass of scar tissue rolled over to the window and noticed the gigantic star. Michael had already looked out the dusty train window and noticed the unfamiliar sky. He had to ask Nettie cause the whole world might be in trouble.\nWasting no time upon his arrival in New Orleans he ran to the Wild at Heart", "dealing with our stuff, and we don't look, and don't see, and so then we don't notice.\"", "lightly, waving a lamp. At the turn of the gallery he saw it was a woman. [...] He started running after her, but his faithful men weren't in any great hurry to follow. They were all shaking. Because they saw this was bad — it was she herself. [...] The bailiff saw a maid of amazing beauty standing before him, and here brows were drawn together in a line and her eyes blazed like burning coals.\nIn The Malachite Box, she serves as a \"magic helper\" to the characters. \"It's a chancy thing to meet her, it brings woe for", "anything at all. Forty pairs of eyes are looking expectantly at you. (…) I began thoughtfully; soon there were gnomes and elves in the picture, finding magic ways to transform the stars of the night into the Edelweiss. Carried by the astonished eyes of the children, my story must have gone on for about 20 minutes. When the Edelweiss had finally been created, a little boy stood up and proclaimed: “Tomorrow you must deal with the Gentian.” In this manner, from day to day, we found our way through the different flowers of the mountains. I was not able to", "It then steps two paces aside, and the most inquisitive glance that you ever saw, and more inquisitive than you would ever have thought of, is drawn out of those fixed and leaden eyes, as if one were drawing a sword from a scabbard. The visiting figure, which has the appearance of coming by accident and not by design, stops just a second or two, in the course of which looks are exchanged which, though you cannot translate, you feel must be of most important meaning. After this, the eyes are sheathed up again, and the figure resumes its stony", "were visiting him, he seemed perplexed and kept looking around the room. Shiban began to wonder if \"a dying person might be able to look through the cracks […] into the next world\", which he developed into a story about a \"haunted bowling alley\" because \"it just seemed right\".\nHarold Spuller was inspired by the 1975 film One Flew Over the Cuckoo's Nest starring Jack Nicholson as Randle McMurphy. Coincidentally, Spuller's friend in this episode, Chuck Forsch, is portrayed by actor Sydney Lassick, who had previously appeared in the movie as one of McMurphy's fellow patients. Steven M. Porter was friends", "The Enchanted Square Summary It is Halloween and Officer Patrick Flanagan finds a discarded Raggedy Ann and decides that it will make a good present for Billie, the blind daughter of the pretty Mrs. Davis whom Flanagan fancies. When Billie receives Raggedy Ann she is very thankful but she wishes she could see Ann. Raggedy Ann tells her that she can see her through her imagination. Billie imagines a fantastic voyage where she and Ann travel through a carnivalesque land based on the real world but run by Mr. Giuseppe the calliope player.", "milling around, but something occurred in this particular spot which was out of the ordinary, which attracted my eye for some reason, which I could not identify.\"\nBowers later purportedly said to his supervisor, Olan Degaugh, that he saw a man in the parking lot throw what appeared to be a rifle into a car.\nHowever, two years later when Bowers was interviewed by assassination researchers Mark Lane and Emile de Antonio for their documentary film Rush to Judgment, he clarified that these two men were standing in the opening between the pergola and the stockade fence, and that \"no one\" was", "somehow, the curious glow of his flesh illuminating him. I would not have been surprised if wings had opened up behind him…… he looked into the room at us. He looked first at Mam, then Da, then at Audrey, then me. When his eyes settled on mine I felt something inside me shake free, and go to him. I didn’t give it—he wanted it, and it went to him. Then he smiled, only slightly, but enough so we agreed, afterward, that we had seen it done. With that he turned and vanished…\" -Quote from the book, Thursday's Child.", "my eyes because I saw two eyes coming close to mine, and I felt like the eyes had pushed into my eyes\" (from his second hypnosis session) and \"All I see are these eyes... I'm not even afraid that they're not connected to a body. They're just there. They're just up close to me, pressing against my eyes.\"\nBarney related that he and Betty were taken onto the disc-shaped craft, where they were separated. He was escorted to a room by three of the men and told to lie on a small rectangular exam table. Unlike Betty, Barney's narrative of the", "the other, that is the way you are going to see it. I was in front, that's my only argument, I didn't know where he was. I sure as hell didn't know he was coming up the inside.\"", "did not look hungry or sleepy. She looked like she always looks. Strange.\" The first Emily the Strange design by Cosmic Debris says: \"Emily did not look tired or happy. She looked like she always looks. Strange.\"\nWhen Rosamond's creators, Marjorie Sharmat and Marc Simont, allegedly began contacting companies who had contracts related to Emily the Strange and urged them to drop their relationships with Cosmic Debris, Cosmic Debris sued Sharmat and Simont. Sharmat and Simont counter-sued. \"Emily the Strange, like Rosamond, is a young girl in a short dress, black tights, and Mary Jane shoes. Emily, like Rosamond, has long", "their spheres, thy knotted and combined locks to part, and each particular hair to stand on end, like quills upon the fretful porpentine\". In chapter 7, when Bertie is asked by Vanessa to hold Orlo's letters for her to pick up, Bertie states: \"The idea of her calling at the cottage daily, with Orlo Porter, already heated to boiling point, watching its every move, froze my young blood and made my two eyes, like stars, start from their spheres, as I have heard Jeeves put it\". Bertie then tells her Orlo is in the village, and describes her reaction: \"I", "looks in the mirror, her own hands are on her throat. Wren and Hallie later visit Chloe's house, and she her eyes appears sunken. She has gone mad because of Slender Man.\nWren goes to the library to try and find more information on Slender Man. The lights go out and she is alone. She turns on the flashlight on her phone and sees Slender Man lurking in the shadows. He goes near her and touches her, causing Wren's face to disappear. She runs until she stumbles into one of the library employees, and she appears normal once more. Hallie is", "Fly Me to Polaris Plot The plots focuses on the character Onion (Jen) who became blind and mute during his childhood. Onion works at a hospital and gets to know the nurse Autumn (Cheung). Onion asks Autumn out on a date and when she says yes, he becomes really happy. He trips over a rock running into the street and is hit by a car. The death of Onion made Autumn realize that she was really deeply in love with him.\nBecause he was the 6 billionth human to die and depart to Polaris, Onion is granted a wish. He", "appears as disembodied eyes which are guiding the viewers, including the narrator, on a tour of this strange world.\nThe narrator attempts to flee just as the hair-like cobwebs come to life and attempt to restrain him to his seat and the images on screen depict the ticket man from earlier, now naked and uttering a silent scream surrounded by a purple glow, as if he has been \"taken\" by the strange being who seems to control the theater. Soon after, the naked man appears to undergo some kind of surgery with his organs completely exposed while being operated on. The", "the public square, where the rift is located. Eck exits through the wall, Stone asks Elizabeth if she would like to go to the square to \"say goodbye to a friend,\" and the two exit as a couple, Stone's arm still around Elizabeth's waist. Closing narration \"Paradoxically, Man's endless search for knowledge has often plundered his courage and warped his vision, so that he has faced the unknown with terror rather than awe, and probed the darkness with a scream rather than a light. Yet there have always been men who have touched the texture of tomorrow with understanding and", "The Narrows (Malfi novel) Synopsis The novel begins in the week before Halloween in the fictional western Maryland town of Stillwater in the days after a terrible flood has washed up the body of a hairless boy along the shores of the local culvert known as the Narrows. When two young boys, Matthew Crawly and Dwight Dandridge, go down to the Narrows to inspect the body of a dead deer, Matthew sees a figure he believes to be his estranged father up on the hill outside the town's abandoned plastics factory. That evening, Matthew is alerted to a figure out" ]
how a drug goes from needing a prescription to being able to buy it without a prescription
[ "Like you're five? Because the grownups who make the drug (Sanofi) showed the grownups who regulate the drug (the Food and Drug Administration) that the drug is safe enough to take without needing the advice from a doctor. The drug itself does the same thing only now you don't need a prescription from the doctor. People get easier access the the medicine, the drug company gets to sell a lot more drugs, and pharmacies make more money because they're selling more OTC items.\n\nFor more see _URL_0_", "There are different phases of testing. First drugs are tested on bacteria or yeast, then on mice, then perhaps on humans, and if the drug is safe for many years and seems to not be able to be abused, then the company and FDA may want to market it without a prescription.", "Also, OTC does not equal safe for ALL groups of people. Certain medications (cold medicines, etc) are not good for those with various conditions like high blood pressure. Always check the drug facts on the box or bottle for information regarding individuals who should not take a given drug. When in doubt, ask the pharmacist if the drug is suitable. Pharmacists do a lot more than put pills in bottles.", "5 year olds don't have an attention span. In short:\n\n- Drug needs to be on the market for a long time (material time)\n- Drug needs to have wide access (material extent)\n- Drugs need to be well tolerated (low side effects)\n- Drug need to be self administered (Think of how stupid Uncle Joe is. He needs to be able to use this, too)\n- Drug needs to be able to be self-managed (When to start/stop taking a drug)\n\n\nOnce the above are met, a prescription drug that already has marketing approval can apply for what's called a Monograph, or what you see on almost any drug product (What the drug is, what it's used for, for the side effects are, and how it's used). \n\nIf a drug is found to be Safe and Effective, it can get OTC status.\n\nMore [here](_URL_1_)." ]
[ "create custom drugs for patients who may not be able to take the medication in its standard form, such as due to an allergy or difficulty swallowing. Compounding is necessary for these patients to still be able to properly get the prescriptions they need.\nOne area of compounding is preparing drugs in new dosage forms. For example, if a drug manufacturer only provides a drug as a tablet, a compounding pharmacist might make a medicated lollipop that contains the drug. Patients who have difficulty swallowing the tablet may prefer to suck the medicated lollipop instead.\nAnother form of compounding is by mixing", "Consumer import of prescription drugs Consumer import of prescription drugs refers to an individual person, typically a patient, getting prescription drugs from a foreign country for their own personal use in their own country. Import mechanisms People might have drugs shipped to them from online pharmacies. They may travel internationally for the purpose of medical tourism, and purchase drugs there to be used back home. Causes Individual consumers will only consider seeking drugs from other countries if they have some barrier to access in their own country. One barrier to access is high local prices compared to other markets. Another", "drugs only with a prescription, some do not require a pre-written prescription. In some countries, this is because prescriptions are not required. Some customers order drugs from such pharmacies to avoid the cost and inconvenience of visiting a doctor or to obtain medications their doctors were unwilling to prescribe. People living in the United States and other countries where prescription medications are very expensive may turn to online pharmacies to save money. Many of the reputable websites employ their own in-house physicians to review the medication request and write a prescription accordingly. Some websites offer medications without a prescription", "and saving money in the health care system. Advanced models can be linked via the Internet to a medical facility, to aid in monitoring and reminding a patient to take his/her medications. Legality In some jurisdictions in the United States possession of prescription drugs in a pill organizer is a crime, and people have been prosecuted for it . The legal theory is that since the drug is not in the package it was dispensed in by the pharmacy, and since it is not \"in use\" (e.g., swallowed), it is unlawfully possessed. The affirmative defense, which is that", "Prescription drug A prescription drug (also prescription medication or prescription medicine) is a pharmaceutical drug that legally requires a medical prescription to be dispensed. In contrast, over-the-counter drugs can be obtained without a prescription. The reason for this difference in substance control is the potential scope of misuse, from drug abuse to practicing medicine without a license and without sufficient education. Different jurisdictions have different definitions of what constitutes a prescription drug.\n\"Rx\" (℞) is often used as a short form for prescription drug in North America - a contraction of the Latin word \"recipe\" (an imperative form of \"recipere\") meaning", "drugs, they are typically stored behind the counter and are sold only in stores that are registered with their state. They may be unavailable in convenience and grocery stores that stock other non-restricted OTC medications.\nFor example, many drugstores have moved products containing pseudoephedrine, an OTC product, into locations where customers must ask a pharmacist for them. A prescription is not required; the change has been made in an effort to reduce methamphetamine production. Since the passage of the Illinois Methamphetamine Precursor Control Act and the subsequent federal Combat Methamphetamine Epidemic Act of 2005, the purchase of pseudoephedrine is restricted. Sellers", "you do in fact have a valid prescription for the drug in question, is not always accepted by the court.", "procurement. Olsen explained: \"No one has solved the problem of drug addiction, so is it not better that people find the money to buy their drugs this way than through crime and prostitution?\" Needle exchange programmes The use of some illicit drugs can involve hypodermic needles. In some areas (notably in many parts of the US), these are available solely by prescription. Where availability is limited, users of heroin and other drugs frequently share the syringes and use them more than once. As a result, infections such as HIV or hepatitis C can spread from user to user through the", "for government reform Consumers may feel that prescription drugs which are available to multiple countries to be of equivalent quality, and feel comfortable buying and using drugs by choosing to purchase from the country which offers the drugs at the lowest price. Legal status Governments typically oversee the import of prescription drugs so bringing a prescription drug from a foreign country could be Illegal drug trade.", "drugs, which can only be obtained through prescription. There are also specific rules for labelling and barcoding.\nIt appears that electronic prescriptions should be valid especially in the light of the Pharmacy Practice Regulations of 2015 declared by the Pharmacy Council of India in January 2015. In these regulations, “prescription,” as defined by regulation 2, (j)[3] ‘means a written or electronic direction from a Registered Medical Practitioner.’ On the basis of existing regulations, it appears that a scanned copy of a prescription would be considered as a valid prescription. However, whether such electronic prescriptions can be used to buy medicine from", "needing a doctor's prescription, and prescription only medicines, which must be prescribed by a licensed medical professional, usually a physician.\nIn the United Kingdom, behind-the-counter medicines are called pharmacy medicines which can only be sold in registered pharmacies, by or under the supervision of a pharmacist. These medications are designated by the letter P on the label. The range of medicines available without a prescription varies from country to country. Medications are typically produced by pharmaceutical companies and are often patented to give the developer exclusive rights to produce them. Those that are not patented (or with expired patents) are called", "dollar for each prescription the buyers brought to the drug stores. Normally a prescription is effective on the day it is issued, but it can be effective within three days of prescription under certain conditions. Hospitals Physicians used to be hired as full-time employees at a government controlled hospital. But with the reforming of the medical service sector, both physicians and hospitals have more freedom in choosing each other.\nYoung physicians usually have an employment contract with the hospital they work with, and a person can quit at will. The hospital can also lay off the individual if it’s not satisfied", "may obtain the medication without a prescription after providing proof of age to the pharmacy staff or when receiving any necessary patient education. Plan B One-Step brand emergency contraception is available without a prescription at any age from a drugstore, Planned Parenthood Center, or family planning clinic. A prescription is required for emergency contraception under any other brand name from a licensed provider if patient is at or under the age of 16. \nFurthermore, some Schedule V controlled substances may be classified as OTC products in certain states. Such drugs are sold without a prescription but are subject to record-keeping", "the Prescription Drug Marketing Act of 1988 banned the traffic or counterfeiting of redeemable drug coupons. For instance, it is against the law to buy or sell coupons for prescription drugs on E-Bay. Types Most drug coupons are printed by consumers using their personal computer and printer. Drug coupons reduce out-of-pocket costs for consumers in a variety of ways such as instant savings offers, free trial offers (also known as try-before-you-buy offers), copay reduction or rebates.\nGeneric drug companies rarely offer coupons, though insurance companies occasionally offer discounts on generic drugs.\nIn addition PBMs (Pharmacy Benefit Managers) offer discount cards that act", "the jurisdiction, drugs may be divided into over-the-counter drugs (OTC) which may be available without special restrictions, and prescription drugs, which must be prescribed by a licensed medical practitioner in accordance with medical guidelines due to the risk of adverse effects and contraindications. The precise distinction between OTC and prescription depends on the legal jurisdiction. A third category, \"behind-the-counter\" drugs, is implemented in some jurisdictions. These do not require a prescription, but must be kept in the dispensary, not visible to the public, and only be sold by a pharmacist or pharmacy technician. Doctors may also prescribe prescription drugs for", "prescriptions to gain access to prescription medications. A somewhat rarer type is a citizen posing as a doctor to, among other things, gain access to the free samples of drugs that some drug manufacturers give out. The samples may also be sold to desperate patients at an exorbitant rate. Actual physicians may do this also. Others may prescribe drugs without sufficient cause. Legal status Illegal drug fraud is rarely addressed in court, as victims rarely involve police, but legal drug fraud is on the rise. Its upswing has increased calls for accountability as well as a bill being passed", "However, all abbreviations carry an increased risk for confusion and misinterpretation and should be used cautiously. Non-prescription drug prescriptions Prescriptions are also used for things that are not strictly regulated as a prescription drug. Prescribers will often give non-prescription drugs out as prescriptions because drug benefit plans may reimburse the patient only if the over-the-counter medication is taken under the direction of a medical practitioner. Conversely, if a medication is available over-the-counter, prescribers may ask patients if they want it as a prescription or purchase it themselves. Pharmacists may or may not be able to price the medication competitively with", "there is no patient exploitation and patients have the right to a written prescription that can be filled elsewhere. 7 to 10 percent of American physicians practices reportedly dispense drugs on their own.\nIn some rural areas in the United Kingdom, there are dispensing physicians who are allowed to both prescribe and dispense prescription-only medicines to their patients from within their practices. The law requires that the GP practice be located in a designated rural area and that there is also a specified, minimum distance (currently 1 mile; 1.6 kilometres) between a patient's home and the nearest retail pharmacy. See", "or a doctor review. This practice has been criticized as potentially dangerous, especially by those who feel that only doctors can reliably assess contraindications, risk/benefit ratios, and the suitability of a medication for a specific individual. Pharmacies offering medication without requiring a prescription and doctor review or supervision are sometimes fraudulent and may supply counterfeit—and ineffective and possibly dangerous—medicines. International consumers International consumers sometimes purchase drugs online from online pharmacies in their own countries, or those located in other countries. Some of these pharmacies require prescriptions, while others do not. Of those that do not require prescriptions, some", "people, youth in particular, can obtain controlled substances (e.g., Vicodin, generically known as hydrocodone) via the Internet without a prescription issued by a doctor/practitioner who has an established doctor-patient relationship. There are many instances where a practitioner issues a prescription, brokered by an Internet server, for a controlled substance to a \"patient\" s/he has never met. In the United States, in order for a prescription for a controlled substance to be valid, it must be issued for a legitimate medical purpose by a licensed practitioner acting in the course of legitimate doctor-patient relationship. The filling pharmacy has", "prescription medicines and drugs ( i.e. over the counter drugs) qualify as medical expenses if purchased by the employee, their spouse, or their dependant, as prescribed by a medical practitioner and as recorded by a licensed pharmacist.\nIn the case of insulin, oxygen and liver extract injectable or vitamin B12 for pernicious anemia, no prescription is required.\nIf vitamins are prescribed by a medical practitioner, but not purchased from a pharmacist who has recorded the prescription in a prescription record, then the expense is not an eligible medical expense. However, in recent court cases, they can allow the eligibility of prescribed", "Doctor shopping Doctor shopping is the practice of visiting multiple physicians to obtain multiple prescriptions for otherwise illegal drugs, or the medical opinion that one wants to hear. It is a common practice of drug addicts, suppliers of drug addicts, hypochondriacs or patients of factitious disorder and factitious disorder imposed on another. A doctor who, for a price, will write prescriptions without the formality of a medical exam or diagnosis is known as a \"writer\" or \"writing doctor\". For prescription drugs Frequently involved in prescription fraud are narcotics, stimulants, barbiturates, benzodiazepines, tranquilizers and other psychoactive substances manufactured for use in", "lawyer in Costa Rica, Le Roux abandoned his online gambling activities and launched several web sites and call centers for the online sale of prescription drugs.\nTo place an order on these sites, customers would fill out questionnaires about their medical history and symptoms, order their chosen medication and pay by credit card. The questionnaires would get forwarded to doctors in the US, who would in turn write prescriptions for the drugs ordered, despite never having examined the patient in person. The prescription, along with the customer's order, would go to a pharmacy in the US, which would then ship the", "well understood. Pharmaceutical marketing / reps assert a me-too drug may work better than another, but they \"don’t test their me-too drugs in people who have not done well with an earlier drug of the same class.\" Laws In 1990, the Food and Drug Administration (FDA) passed laws banning \"gifts of substantial value\" of drug companies to doctors, however this has changed the gifts from objects to meals and travel.\nIn 2006, New Hampshire forbid the sale of prescription data to commercial entities.\nEncountering ill-informed reps at his practice Dr. Dan Foster, a West Virginia surgeon and lawmaker, introduced a bill to", "where drugs may be sold, who is authorized to dispense them, and whether a prescription is required vary considerably from country to country. Usage As of 2011, around a third of older adults in the U.S. reportedly used OTC drugs. By 2018, the prevalence of use by adults in the U.S. as first-line treatment for minor illnesses had reached 81%. India In November 2016, India's Drug Consultative Committee announced it was embarking on establishing a definition of drugs which could be dispensed without a prescription. Prior to this, the general assumption was that any drug which did not fall into", "copays.\nAs of 2008, the U.S. Food and Drug Administration (FDA) was planning a study to see if coupons make patients overlook drug risks and side effects in their effort to save money. All medicines come with a certain level of risk. This is why all prescription drugs include information reviewed and approved by the U.S. Food and Drug Administration (FDA) about how the medication works in the body, its uses and when it should not be used, possible side effects, the recommended dosage, and other facts about the appropriate use of the drug. Most Americans have never heard of “Risk", "instructions.\nSome prescribers further inform the patient and pharmacist by providing the indication for the medication; i.e. what is being treated. This assists the pharmacist in checking for errors as many common medications can be used for multiple medical conditions.\nSome prescriptions will specify whether and how many \"repeats\" or \"refills\" are allowed; that is whether the patient may obtain more of the same medication without getting a new prescription from the medical practitioner. Regulations may restrict some types of drugs from being refilled.\nIn group practices, the preprinted portion of the prescription may contain multiple prescribers' names. Prescribers typically circle themselves to", "use of drugs and will begin to develop symptoms of withdrawal. This is sign that the addiction is beginning to take hold of the individual. In the addiction stage, individuals find it impossible to stop using drugs even if they do not enjoy it or if their behavior has caused problems within an individual's life.\nWith the increasing number of adults that suffer with an addiction, only a few will receive treatment due to the complexity of health care systems. Most health care systems do not have insurance coverage for addiction recovery and many health care providers have little to", "subject to the full controlled drug requirements; e.g. Cannabis, diamorphine (heroin), pethidine, cocaine, methadone, methylphenidate, dextroamphetamine, fentanyl and oxycodone. Under the Act, a prescription for these drugs need to show full details including the form and strength of the preparation, with the total quantity written out in both words and figures. It is an offence for a doctor to issue an incomplete prescription or for a pharmacist to dispense a controlled drug unless all the required details are given.\nIt is the prescriber's responsibility to minimize the risk of dependence or misuse by ensuring that such drugs are not started", "easier access to a pharmacist. Being timely includes both processing the request quickly and having drug stock available to fill the prescription. Some consumers need drugs delivered to their home, perhaps by mail, and may select a pharmacy which offers that service. Different pharmacies may charge different prices for the same drugs, so shopping for lower prices may identify a pharmacy offering better value. In addition to fulfilling prescriptions, a pharmacy might offer preventive healthcare services like vaccinations. Up-to-date technology at a pharmacy can assist a patient with prescription reminders and alerts about potential negative drug interactions, thereby reducing medical" ]
How do cars calculate speed and preview it on the speedometer?
[ "**NOT ELI5**\n\nThe car's driveshaft also powers a *speedometer cable*, which spins a magnet around at the same speed inside the *speed cup*. This magnet rotates continually in an equal direction. This spinning creates a fluctuating magnetic field. The laws of electromagnetism dictate that a current must therefore flow inside this cup. This current causes the speed cup to also rotate. It attempts to catch up with the speed of the magnet. a *hairspring* stops this, so it only rotates a little. This small motion moves the dial on the speedometer a little. The stronger the current, the faster the cup rotates, the further the speedometer's dial moves.\n\n & nbsp;\n\n**ELI5**\n\nThe driveshaft powers a speedometer cable, which leads to a magnet rotating inside a cup. A current is generated, and the cup tries to rotate also. A spring limits this, moving the dial. More current = more speed = dial moves further.", "Old style speedometers, speed was registered inside of the transmission with a gear that was sized based upon the gearing of the vehicle, this gets related by a small spinning cable to the back of the speedometer where a small magnet rotates creating a current that causes the needle to be moved up and down based upon the speed of the magnet.\n\nModern speedometers use a electronic sensor in the transmission that transfers and electrical signal to the speedometer which causes the needle to move up and down.\n\nOne important note that over time, the sensor in the new system and the gear and magnet in the old can go wrong and slowly cause the wrong speed to be displayed\n\nAs well I believe the faster you are going with a mechanical speedometer the less accurate it becomes.\n\n\nThis can explain it in more detail. \n_URL_0_", "They calculate it based on how fast the wheels are turning - at their hub, not at the pavement. All of that data comes back and is calculated as some number of revolutions per (duration, second, probably) and it calculates it then to mph or kph.\n\nThis is why when you get a larger/smaller diameter wheel, you need to recalibrate the system or it will give an inaccurate reading. A 30\" diameter tire has a very different circumference than a 35\" tire." ]
[ "use the equipment effectively, with trainees being required to consistently visually estimate vehicle speed within +/-2 mph of actual target speed, for example if the target's actual speed is 30 mph than the operator must be able to consistently visually estimate the target speed as falling between 28 and 32 mph. Stationary traffic enforcement radar must occupy a location above or to the side of the road, so the user must understand trigonometry to accurately estimate vehicle speed as the direction changes while a single vehicle moves within the field of view. Actual vehicle speed and radar measurement thus are rarely the", "In practice, most U.S.-market vehicles have mile odometers and dual-labeled speedometers with miles-per-hour as the primary calibration. Some 2000s era Buicks have a single speed gauge with a button on the instrument panel to switch the scale between MPH and km/h. Other vehicles have digital speedometers which can be set to read out speeds in either MPH or km/h.\nAnother common unit of speed is meters per second (m/s), used especially for lifts and cable cars. Odometers are permitted to record miles or kilometers, but must be clearly labeled as to which unit they record.\nTire inflation for passenger cars is typically", "time elapsed (with the trace moving vertically if the train was stationary), the second being a speed curve. and the third recording the driver's attentiveness to signals (\"Vigilance\") by marking one tick above a line when the driver depressed a button, and another below the line when the engine went over the signal ramp. Data recorded Read together, it was possible to determine exactly what speed the locomotive had been travelling at any point in time or distance. As well as allowing study of locomotive performance, it also allowed greater scrutiny of the observance of the driver of speed restrictions", "Speedometer A speedometer or a speed meter is a gauge that measures and displays the instantaneous speed of a vehicle. Now universally fitted to motor vehicles, they started to be available as options in the 1900s, and as standard equipment from about 1910 onwards. Speedometers for other vehicles have specific names and use other means of sensing speed. For a boat, this is a pit log. For an aircraft, this is an airspeed indicator.\nCharles Babbage is credited with creating an early type of a speedometer, which was usually fitted to locomotives.\nThe electric speedometer was invented by the Croatian Josip Belušić", "by Directive 97/39) or UNECE Regulation 39.\nThe Motor Vehicles (Approval) Regulations 2001 permits single vehicles to be approved. As with the UNECE regulation and the EC Directives, the speedometer must never show an indicated speed less than the actual speed. However it differs slightly from them in specifying that for all actual speeds between 25 mph and 70 mph (or the vehicles' maximum speed if it is lower than this), the indicated speed must not exceed 110% of the actual speed, plus 6.25 mph.\nFor example, if the vehicle is actually travelling at 50 mph, the speedometer must not show more than 61.25 mph or less", "start and finish time for each car is recorded against a GPS clock, and the average speed is calculated from the elapsed time. In each speed class, the winners are driver and navigator to achieve the speed closest to their target speed. Speed classes are chosen by the driver, with constraints according to their racing experience, the performance potential of their car, and the safety requirements set by the organizers.\nAs an example, in the Silver State Classic Challenge there are currently four main classes, in which cars can achieve target speeds between 95 and 180 mph. The classes", "speedometer on 1992 stock is of the horizontal strip design showing two speeds: the Current Speed in green, indicating the speed at which the train is actually travelling, and the Target Speed indicating the speed at which the train should be travelling. Although the target speed is always active whilst running in Automatic or Coded Manual mode, in the latter mode a change in the target speed is indicated with an upwards or downwards tone depending on whether the target speed is increasing or decreasing. Should the driver exceed the target speed, an alarm sounds and the emergency brakes are", "aircraft. Instrumentation Instruments, either the turn and slip indicator or the turn coordinator, have the standard rate or half standard rate turn clearly marked. Slower aircraft are equipped with 2-minute turn indicators while faster aircraft are often equipped with 4-minute turn indicators. Angle of bank formula The formula for calculating the angle of bank for a specific true airspeed (TAS) in meters per second is:\nwhere is the radius of the turn in meters, and is the acceleration due to gravity in m⋅s⁻².\nFor a rate one turn and velocity in knots (nautical miles per hour), this comes to\n.\nA convenient", "compute the approach speed of the aircraft to aid the pilot in attaining proper speeds for landing. In the past, with the standard type indicator, pilots have had to determine the approach speed of the aircraft through a mental process of totaling the weight of the fuel load and the operating weight of the aircraft to arrive at the gross weight. This was then applied to a chart to determine the proper approach speed of the aircraft. This method, using the standard indicator, left room for error. With the high speed aircraft of today, pilots must be accurate in determining", "Operating speed The operating speed of a road is the speed at which motor vehicles generally operate on that road.\nThe precise definition of \"operating speed\", however, is open to debate. Some sources, such as the AASHTO, have changed their definitions recently to match the common use of the word. In 1994, the AASHTO Green Book defined the operating speed as \"the highest overall speed at which a driver can travel on a given highway\nunder favorable weather conditions and under prevailing traffic conditions without at any time exceeding the safe speed as determined by the design speed on a section-by-section", "197, 198, 200 and 201 km/h). The speed recorded by instruments in the dynamometer car, marks were made every half second on a paper roll moving 24 inches for every mile travelled. Speeds could be calculated by measuring the distance between the timing marks. Immediately after the run staff in the dynamometer car calculated the speed over five second intervals, finding a maximum of 125 mph. 126 mph was seen for a single second but Gresley would not accept this as a reliable measurement and 125 miles an hour was the figure published. Ten years later, at the time of the 1948 Locomotive Exchanges,", "few centimeters when a speeding vehicle approaches. Any vehicle approaching at or under the speed limit will pass on a level road. The system measures the speed of an oncoming vehicle by using radar.\nIn another design, a rubber housing is fitted with a pressure relief valve that determines the speed of a vehicle. If the vehicle is traveling below the set speed, the valve opens allowing the bump to deflate as the vehicle drives over it, but it remains closed if the vehicle is traveling too fast. The valve can also be set to allow heavy vehicles, such as fire", "modern speedometers are electronic. In designs derived from earlier eddy-current models, a rotation sensor mounted in the transmission delivers a series of electronic pulses whose frequency corresponds to the (average) rotational speed of the driveshaft, and therefore the vehicle's speed, assuming the wheels have full traction. The sensor is typically a set of one or more magnets mounted on the output shaft or (in transaxles) differential crownwheel, or a toothed metal disk positioned between a magnet and a magnetic field sensor. As the part in question turns, the magnets or teeth pass beneath the sensor, each time producing a pulse", "a machmeter as a decimal fraction. Vertical speed indicator The variometer, also known as the vertical speed indicator (VSI) or the vertical velocity indicator (VVI), is the pitot-static instrument used to determine whether or not an aircraft is flying in level flight. The vertical speed specifically shows the rate of climb or the rate of descent, which is measured in feet per minute or meters per second. The vertical speed is measured through a mechanical linkage to a diaphragm located within the instrument. The area surrounding the diaphragm is vented to the static port through a calibrated", "amended for use in California)\nVehicle Speed Feedback Signs\nOption:\nA Vehicle Speed Feedback sign that displays to approaching drivers the speed at which they are traveling may be installed in conjunction with a Speed Limit (R2-1) sign.\nStandard:\nIf a Vehicle Speed Feedback sign displaying approach speeds is installed, the legend shall be YOUR SPEED XX.\nThe numerals displaying the speed shall be white, yellow, yellow-green or amber color on black background.\nWhen activated, lights shall be steady-burn conforming to the provisions of CVC Sections 21466 and 21466.5.\nVehicle Speed Feedback signs shall not alternatively be operated as variable speed limit signs.\nGuidance:\nTo the degree practical, numerals for", "80 mph speed limit during caution periods. Drivers were instructed to hold their position under yellow, and each message board around the track would display a number from 1 to 9, illustrating the gap between themselves and the car in front of him. The goal and the requirement was to keep the numbers consistent at all of the boards around the entire circuit. For instance, if a driver saw a \"7\" on the first board he encountered, he was to drive at such a speed that would display a \"7\" at all of the boards around the circuit for the remainder", "road.\nIn a closed-loop control system, data from a sensor monitoring the car's speed (the system output) enters a controller which continuously compares the quantity representing the speed with the reference quantity representing the desired speed. The difference, called the error, determines the throttle position (the control). The result is to match the car's speed to the reference speed (maintain the desired system output). Now, when the car goes uphill, the difference between the input (the sensed speed) and the reference continuously determines the throttle position. As the sensed speed drops below the reference, the difference increases, the throttle opens, and", "less independent of what speed the profilometer vehicle had during the measurements, with the assumption that the vehicle does not make large speed variations and the speed is kept above 25 km/h or 15 mph. The profilometer system collects data at normal highway speeds, sampling the surface elevations at intervals of 2–15 cm (1–6 in), and requires a high speed data acquisition system capable of obtaining measurements in the kilohertz range.\nThe data collected by a profilometer is used to calculate the International Roughness Index (IRI) which is expressed in units of inches/mile or mm/m. IRI values range from 0 (equivalent to driving on a", "1 July 2007, and all models of vehicle introduced on or after 1 July 2006, must conform to UNECE Regulation 39.\nThe speedometers in vehicles manufactured before these dates but after 1 July 1995 (or 1 January 1995 for forward control passenger vehicles and off-road passenger vehicles) must conform to the previous Australian design rule. This specifies that they need only display the speed to an accuracy of +/- 10% at speeds above 40 km/h, and there is no specified accuracy at all for speeds below 40 km/h.\nAll vehicles manufactured in Australia or imported for supply to the Australian market must comply with", "and airspeeds for the autopilot, and so on.\nThe vertical speed indicator, usually next to the altitude indicator, indicates to the pilot how fast the aircraft is ascending or descending, or the rate at which the altitude changes. This is usually represented with numbers in \"thousands of feet per minute.\" For example, a measurement of \"+2\" indicates an ascent of 2000 feet per minute, while a measurement of \"-1.5\" indicates a descent of 1500 feet per minute. There may also be a simulated needle showing the general direction and magnitude of vertical movement.\nAt the bottom of the PFD is the", "major advantage over the RADAR and LIDAR systems also used for determining speed, in that it is not necessary to be in (or close to) the line of travel of the target vehicle. RADAR and LIDAR clock speed using the Doppler effect, so a vehicle traveling at an angle in relation to the unit will have a lower speed reading than actual speed. VASCAR, however, can provide an accurate speed clock under any conditions in which both a start and a stop point can be identified. It is not even necessary to see the entire course over", "the driver when they exceed the speed limit. If the list of speed limits is updated, it can also track school and work zone speed limit changes that would otherwise go unnoticed by the driver. When a driver exceeds the speed limit, any of the following can occur: a small ding will sound, the speed reading will turn red if the odometer is digital, an icon will light up and a ding will sound, or the vehicle will give a verbal response alerting the driver of their speed and to slow down. One speed monitoring technology which is undergoing testing", "GM claimed the car to be capable of accelerating from 0 to 60 mph (97 km/h) in 4.7 seconds and a 13.0 second quarter mile time at 105 mph (169 km/h) (automatic transmission). Car and Driver magazine tested the car and measured the 0–60 mph acceleration time of 4.8 seconds and a quarter mile time of 13.3 seconds at 107 mph (172 km/h) with its BFGoodrich g-Force T/A KDWS, 245/45ZR-17 95W M+S front and rear tires and a manual transmission. The 0–100 mph and 0–130 mph times were 11.7 and 19.6 respectively. 2006 For 2006, two additional colors were added, Spice Red Metallic and Brazen Orange Metallic, while Midnight Blue", "Flaman Speed Indicator and Recorder The Flaman Speed Indicator and Recorder was a device patented in 1901 by Nicolas Charles Eugène Flaman of France for indicating the current speed of a vehicle (for example a railway locomotive) and recording it on a paper tape that could be unrolled and examined at the end of a run to provide evidence of the speeds attained on the journey. Design features The paper tape recording was driven directly by the wheels of the locomotive, with the paper spool moving at a fixed rate per kilometre travelled. Three graphs were recorded, the first being", "Wheel speed sensor Purpose The wheel speed sensor was initially used to replace the mechanical linkage from the road wheels to the speedometer, eliminating cable breakage and simplifying the gauge construction (elimination all moving parts except for the needle/spring assembly). With the advent of automated driving aid, such as electronic ABS, the sensor also provided wheel speed data to the controllers to assist the operator in maintaining control of the vehicle. The vehicle Speed sensor is also used for the proper shifting up of gears for the vehicle maintenance. Construction The most common wheel speed sensor system consists of a", "ECU or full-vehicle control system, e.g. triggering ABS or traction control, calculating average trip speed, or to increment the odometer in place of it being turned directly by the speedometer cable.\nAnother early form of electronic speedometer relies upon the interaction between a precision watch mechanism and a mechanical pulsator driven by the car's wheel or transmission. The watch mechanism endeavors to push the speedometer pointer toward zero, while the vehicle-driven pulsator tries to push it toward infinity. The position of the speedometer pointer reflects the relative magnitudes of the outputs of the two mechanisms. Bicycle speedometers Typical bicycle speedometers measure", "speed to be calculated, and the photo enabled identification of the driver.\nThe Dutch company Gatsometer BV, which was founded in 1958 by rally driver Maurice Gatsonides, produced the 'Gatsometer'. Gatsonides wished to better monitor his average speed on a race track and invented the device in order to improve his lap times. The company later started supplying these devices as police speed enforcement tools. The first systems introduced in the late 1960s used film cameras to take their pictures. Gatsometer introduced the first red light camera in 1965, the first radar for use with road traffic in 1971", "track-side signals at high speed. Speed Indication Signals Speed Indication Signals, or Speed Signs, are wayside signs that are usually white with black text that indicate the current maximum speed. If a speed sign indicates a different speed than a current fixed signal, then the lower speed should be adhered to. For example, if a train is inside a block of track whose signal indicates caution (40-55 km/h) and there is a speed sign which indicates a higher speed, the lower speed that the signal requires should be adhered to. Likewise, if a train is in a block whose signal", "displaying approach speeds should be similar font and size as numerals on the corresponding Speed Limit (R2-1) sign.\nOption:\nWhen used, the Vehicle Speed Feedback sign may be mounted on either a separate support or on the same support as the Speed Limit (R2-1) sign.\nIn lieu of lights, legend may be retro-reflective film for flip-disk systems.\nThe legend YOUR SPEED may be white on black plaque located above the changeable speed display.\nSupport:\nDriver comprehension may improve when the Vehicle Speed Feedback Sign is mounted on the same support below the Speed Limit (R2-1) sign.\nVehicle Speed Feedback Signs are appropriate for use with advisory speed", "automatically between mph and km/h depending on the route being traversed. The speedometer would display \"mph\" when the speedometer was displaying \"miles per hour\", otherwise would display nothing. Its graduations would be chosen such that the angle of the needle would not change when the system switched from one scale to the other. The conversion between metric and imperial units would be a function of the speedometer, not of any other on-board equipment. In 2012 a technical specification matching this proposal was published.\nThe Cambrian Line, a low volume 215 km (134 mi) rail link between Shrewsbury in the east and Aberystwyth" ]
If Western governments are worried about their citizens fighting for Daesh (the Islamic State) and returning to participate in terrorist activities, why do they have to "monitor" them when they come back rather than arrest them?
[ "In most western democracies you can't arrest someone just because the government doesn't like their political views (there are some exceptions to this rule but in general it holds). You have to be able to prove that they have committed some kind of crime in order to arrest them. \n\nAlmost by definition someone who has joined up with Da'esh/IS will have \"fallen\"off the radar\" of western security forces. They'll know they joined up but it will be much harder to prove that they actually fought against western interests, which would be necessary to instigate a charge of treason or similar.\n\nSo the best we can do is have the security services \"watch\" them very closely, and if they look like they're about to commit any kind of crime then they can be pulled in." ]
[ "that terrorists are masterminding attacks against assets belonging to the Government of Kuwait, hotels, restaurants and Western interests. The United States Department of State reported terrorists in the past attacked hotel chains which they believed belonged to westerners. Western housing complexes were also targeted by terrorist organizations. Terrorism in Kuwait may include bombing, hijacking, hostage taking, kidnapping and assassination. Both military and civilians are the potential targets of terrorist groups. According to the US State Department, terrorists can target oil infrastructure, public transportation, schools, places of worship, clubs, shopping complexes, etc., due to increased security measures in official US facilities.", "was also banned after investigators found that its members were preparing to travel to the conflict zone in Syria to fight for the Islamic State. According to the Federal Agency for Civic Education, these examples show that Salafist mosques not only concern themselves with religious matters, but also prepare serious crimes and terrorist activities.", "killings of “disclosing state secrets” and “threatening national security”. According to Amnesty International, there has been an ongoing campaign by the Islamic Republic to demonize victims, distort facts, and repress family survivors and human rights defenders.", "Islamic Sharee'ah (legislation) does not sanction\" such actions. A Salafi \"Committee of Major Scholars\" in Saudi Arabia has declared that \"Islamic\" terrorism, such as the May 2003 bombing in Riyadh, are in violation of Sharia law and aiding the enemies of Islam.\nTimothy Winter wrote that the proclamations of bin Laden and Ayman al-Zawahiri \"ignore 14 centuries of Muslim scholarship\", and that if they \"followed the norms of their religion, they would have had to acknowledge that no school of mainstream Islam allows the targeting of civilians.\"\nFethullah Gülen, a prominent Turkish Islamic scholar, has claimed that \"a real Muslim\", who understood", "advise and assist tactics, and influence operations. Iran In April 2019, the U.S. made the unprecedented decision to designate the Islamic Revolutionary Guard Corps (IRGC) as a foreign terrorist organization under the U.S. State Department's maximum pressure campaign. This designation and the decision to withdrawal from the Joint Comprehensive Plan of Action were done over the opposition of the DoD. Mulroy stated that this designation did not grant any additional authorities to the DoD and that they were not seeking any. The DoD also does not believe the Authorization for Use of Military Force Against Terrorists can be", "due to the continued presence of terrorist groups, some affiliated with al Qaida, who may target Western interests, housing compounds, and other facilities where Westerners congregate\". Terrorist attacks in the country targeted both native people and foreigners. DFAT further stated \"Terrorist attacks could occur at any time, anywhere in Saudi Arabia, including in Riyadh, Khobar, and other major cities\".\nThe kingdom has taken successful efforts to rehabilitate terrorists. Saudi Arabia has the best terrorist rehabilitation program in the world. Their terrorist recidivism rate is about 3 to 4%. In order to have such a low terrorist recidivism rate, the Saudi", "possible and allowed to carry out the mandates dictated by the post-Gulf War UN resolutions.\nZinni also warned about terrorism:\nExtremists like Osama bin Laden and his World Islamic Front network benefit from the global nature of communications that permits recruitment, fund raising, and direct connections to sub-elements worldwide ... Terrorists are seeking more lethal weaponry to include: chemical, biological, radiological, and even nuclear components with which to perpetrate more sensational attacks ... Three [Iraq, Iran, & Sudan ] of the seven recognized state-sponsors of terrorism are within this potentially volatile area, and the Taliban regime in Afghanistan has been sanctioned by", "a terrorist group to conceal and use against civilian aircraft\"; Obama declined to make a decision on the matter, raising the prospect \"that tens of thousands of CIA-backed fighters will search for more-reliable allies, and that the United States will lose leverage over regional partners that until now have refrained from delivering more-dangerous arms to Assad's opponents.\" Following Russia's intervention, top U.S. officials began emphasizing \"the fight against the Islamic State [ISIL], rather than against the Assad government,\" but supporters of the CIA program \"disagree with this rationale, saying that the Islamic State can't be eradicated until a new government", "country, the non-religious tend to be more discreet, and often pretend to be pious Muslims to avoid violence and lynching.\nThe majority of cases of harassment and security threats against non-Muslims come from the now nearly destroyed Armed Islamic Group, an organization fighting the government who are determined to rid the country of those who do not share their extremist interpretation of Islam. However, a majority of the population subscribes to Islamic precepts of tolerance in religious beliefs. Moderate Islamist religious and political leaders have criticized publicly acts of violence committed in the name of Islam.\nThe \"blasphemy\" law is stringent and", "of militant activity in June 2017.\nOn behalf of the Islamic Republic of Iran, the security forces involved in fighting include the Revolutionary Guards units, the Basij and the Islamic Republic of Iran Border Guard Command. Foreign involvement Amidst of Iran–Saudi Arabia proxy conflict, Iranian authorities blame Saudi intelligence agency for supporting the unrest however Saudi officials deny involvement.\nAccording to a Stratfor analysis, PAK and KDPI have appealed directly to Riyadh in their calls for funding and \"countries with a vested interest in exacerbating Iran's domestic problems—such as Saudi Arabia and Israel—may agree to help the Kurds\". Saudi Arabia may have", "the arrests were in response to the assassination attempt on Saddam Hussein, which was carried out by the Shiite Dawa Party. \"If the head of state comes under attack, the state is required by law to take action. If the suspects are caught with weapons, it's only natural they should be arrested and put on trial\".\nHe further testified that the Dujail attack was \"part of a series of attacks and assassination attempts by this group, including against me.\" He said that in 1980, Dawa Party insurgents threw a grenade at him as he visited a Baghdad university, killing civilians around", "Human Rights Watch at least in part because of their \"readiness to accept and even seek out Muslim converts\" as well as their Western origins. In the 1990s, two Muslim converts to Christianity who had become ministers were sentenced to death for apostasy and other charges.\nLate November, 2018 prison warden Qarchak women prison in Varamin, near the capital Tehran attacked and bit three Dervish religious minority prisoners when they demanded their confiscated belongings back. Political freedom In a 2008 report, the organization Human Rights Watch complained that \"broadly worded `security laws`\" in Iran are used \"to arbitrarily suppress and punish", "embargo on North Korea, denouncing the regime as \"threatening\" and \"belligerent\", but believes that war is not necessary at present. War against Islamic terrorism Brook argues that Islamic terrorists initiated a war against the West because they hate its culture, wealth, love of life, and global influence, and that they attack Israel because of the influence Western culture has had on it. He explicitly rejects the idea that Islamic terrorists attack Western nations because they support Israel or because of any other reason, such as poverty or retaliation.\nBrook claims that the West is not at war with terrorism but the", "due to retaliation back and forth between Shias and Sunnis. No group claimed initial responsibility, though such widespread and coordinated attacks have mostly been claimed by the Islamic State of Iraq in the past. Domestic Talal al-Zobaie, a Sunni member of the Iraqi Parliament, called on his colleagues to unite and face the enemies of Iraq together. \"The government should admit that it has failed to secure the country and the people, and all security commanders should be replaced by efficient people who can really confront terrorism. Sectarianism that has bred armies of widows and orphans in the past is", "said: \"Animosity against a state cannot be declared by individuals or groups; no Islamic government is in a state of war with the UK; they all have diplomatic relations and therefore, any attack against UK citizens or interests would be deemed as un-Islamic and illegal in the Shari’a, regardless of whether we approve of UK policies or not, or its government\".\nIn the April 2016 issue of Dabiq Magazine, The Islamic State of Iraq and the Levant declared him a murtadd (or apostate). Recognition In 2012, al-Yaqoubi was listed in The 500 Most Influential Muslims by Georgetown University's Prince Alwaleed Center", "&A.\" Saudi Arabia Saudi Interior Ministry issued a set of anti-terrorist laws in 2014. According to Article 1 and 2:\n“Calling for atheist thought in any form, or calling into question the fundamentals of the Islamic religion on which this country is based” and anyone who questions the King or the government or supports any group, party, organization other than that of the ruling elite inside or outside the Kingdom is a terrorist. Syria After the United States attack on Abu Kamal, the Syrian Foreign Minister Walid Muallem defined terrorism as \"Killing civilians in international law means a terrorist aggression.\" Turkey", "or children unless they are fighting against the Muslims. The Hanafi, Hanbali, and Maliki schools forbid killing of those who are not able to fight, including monks, farmers, and serfs, as well as mentally and physically disabled.\nHarming civilian areas and pillaging residential areas is also forbidden, as is the destruction of trees, crops, livestock and farmlands. The Muslim forces may not loot travelers, as doing so is contrary to the spirit of jihad. Nor do they have the right to use the local facilities of the native people without their consent. If such a consent is obtained, the Muslim army", "hesitate to volunteer. The fighters are also paid a relatively high salary, and some have told journalists, that \"the Islamic State is a common enemy of Iran and Afghanistan ... this is a holy war,\" and that they wish to protect the Shia pilgrimage site of Sayyida Zaynab, from Sunni jihadis. Russia On 30 September 2015, Russia's Federation Council unanimously granted the request by President of Russia Vladimir Putin to permit the use of the Russian Armed Forces in Syria. On the same day, the Russian general Sergey Kurylenko, who represents Russia at the joint information center in Baghdad set", "and the judge considered the jury may be prejudiced. A new trial for Azari will begin in November 2017. Motivations The cancellation of passports of those wanting to fight overseas for extremists causes as well as resentment towards Australia's role in the recent wars in Afghanistan and Iraq have been raised as possible motivations behind the alleged terrorist planning. After the raids, Imraan Husain, an Imam from the Gold Coast, warned that sending troops to the Middle East could marginalise local Muslim youth, especially those who follow jihadists on social media. Protest Between 200 and 400 Muslims in", "initiative to officially add Ahrar ash-Sham and Jaysh al-Islam to the list of terrorist organizations was not supported by the UN Security Council due to the fact that five Western countries have disagreed.\" He further said \"[We] must take the appropriate measures in Riyadh and within the framework of the High Negotiation Committee in Vienna to ensure the immediate liberation of civilians who were taken hostage.\"", "up of unbelievers who seek to destroy Islam, justifying attacks against other Muslims and non-Muslims alike.\" Global Jihadist Australian National Security informs that \"The Islamic State is an Iraq and Syria-based Sunni extremist group and former al‑Qa'ida affiliate that adheres to the global jihadist ideology.\" Khawarij Sunni critics, including Salafi and jihadist muftis such as Adnan al-Aroor and Abu Basir al-Tartusi, say that ISIL and related terrorist groups are not Sunnis, but modern-day Khawarij—Muslims who have stepped outside the mainstream of Islam—serving an imperial anti-Islamic agenda. Demands of the Caliphate Having declared itself to be a new Caliphate, and al-Baghdadi", "but by the belief that U.S. foreign policy has oppressed, killed, or otherwise harmed Muslims in the Middle East, condensed in the phrase \"They hate us for what we do, not who we are.\" U.S. foreign policy actions Scheuer believes are fueling Islamic terror include: the US–led intervention in Afghanistan and invasion of Iraq; Israel–United States relations, namely, financial, military, and political support for Israel; U.S. support for \"apostate\" police states in Muslim nations such as Egypt, Algeria, Morocco, and Kuwait; U.S. support for the creation of an independent East Timor from territory previously held by Muslim Indonesia; perceived U.S.", "not merely as un-Islamic but actively anti-Islamic.\nHassan Hassan, an analyst at the Delma Institute, wrote in The Guardian that because the Islamic State \"bases its teachings on religious texts that mainstream Muslim clerics do not want to deal with head on, new recruits leave the camp feeling that they have stumbled on the true message of Islam\". Yusuf al-Qaradawi, an Egyptian Islamic theologian based in Qatar, said in his official website that the \"United Arab Emirates (UAE) and the leaders of Daesh (ISIS/ISIL) terrorist group are from one species and they are two sides of the same coin\". Other commentaries", "of the Ministry of Internal Affairs stated that the police officers who neutralized attackers will be presented to the state award. \nIslamic State of Iraq and Levant released a statement claiming that the attackers were \"fighters from the Islamic State\" and calling it revenge for Russia's aerial bombing campaign in Syria.", "the Commissioner is from the same religion of Islam as them, but still he is ready to die for his country and countrymen because he feels he belongs to his country first.. and they have a change of heart and realize that it's not about which community or caste or religion or even country one belongs to..the ones who die in any terror attack are humans first, they decide to give up their Mission to bomb the Parliament House and surrender themselves to the Indian Police Service.", "legally\". The committee, which included former U.S. attorney general and chief judge of the Southern District of New York Michael Mukasey and representatives Mike McCaul and Peter T. King, decided to drop the religious basis and instead focus on regions where, as Giuliani put it, there is \"substantial evidence that people are sending terrorists\" to the United States. Nongovernment research does indicate foreign nationals from the affected countries in the travel ban have been arrested and implicated in terrorist plots since 9/11; it also indicates there have been no deaths in the United States caused by extremists with family backgrounds", "Arabia - Saudi Arabia defended the decision following a meeting between Trump and Deputy Crown Prince Mohammad bin Salman, issuing a statement saying: \"Saudi Arabia does not believe that this measure is targeting Muslim countries or the religion of Islam. This measure is a sovereign decision aimed at preventing terrorists from entering the United States of America.\"\n Turkey - Turkey criticized the decision, with Deputy Prime Minister Mehmet Simsek tweeting that refugees not permitted in the United States were welcome in Turkey. Christians of the Middle East Christian leaders in the Middle East have denounced the executive order. Louis Raphaël I", "of those at-risk of being recruited to terrorism\", the Australian government has said that it is critical for Islamic leaders, including Omran, to use their influence to stem terrorism.\nHarun Mehicevic the leader of Melbourne's Al-Furqan Islamic Information Centre was a student of Sheik Abu Ayman. ASWJ installed Mehicevic as the leader and provided the funds to set up the centre. There has been a subsequent falling-out between the groups.\nIn March 2016 it was reported that Omran's son Ayman Omran had been killed in Syria while allegedly performing \"humanitarian aid\".", "training to terrorists supporting the Palestinian resistance. They are also accused of aiding the Iraqi insurgency in southern Iraq. United States designates IRGC as foreign terrorist organization On April 15, 2019, the United States officially designated Iran’s elite Islamic Revolutionary Guard Corps as a foreign terrorist organization. This followed the earlier declaration by the U.S. President Donald Trump on April 8 that he would name Iran’s elite IRGC a terrorist organization. Albania On 19 December 2018 Albania expelled Iran’s ambassador to the country, Gholamhossein Mohammadnia, and another Iranian diplomat for \"involvement in activities that harm the country's security\", for \"violating", "Government negotiation with terrorists No negotiation with terrorists refers to a policy followed by mostly Western countries not to negotiate with terrorists. This policy is often applied during hostage crises. Often the policy is limited to not paying ransom demands, and doesn't apply to other forms of negotiation. This policy is intended to remove the incentive for taking hostages. For as long as a country applies this policy on a no-exceptions basis, terrorists can anticipate that there will be no reward for trading hostages. Background On June 18, 2013, G8 leaders signed an agreement against paying ransoms to terrorists." ]
What would happen if we could drill a hole to the core of the Earth?
[ "The Earth is molten beyond the crust, so we wouldn't get any further than that.", "It is pretty hot in there, but I will observe your hypothetical. \n\nFirst off, the opposite side of the Earth is awesome, they have awesome food and some really nice people! \n\nBut back to the original question. Did you ever see a picture of the moon? Or even Mars? Does that look pleasant? \n\nThe Earth is an awesome machine. It is an electromagnetic field generator. Do you have a small electric motor? Take it out and look at it. \n_URL_2_\n\nOk! So just like the electric motor there is the conversion of an electric field into physical motion. We have an iron core, just like a motor. We also have a layer of liquid in between the iron core and the outside. Now we need metal on the outside. The buttloads of iron will do fine. \n\nNow if you spin a motor without a charge it produces a current. It will burn out your diodes but the Earth doesn't have fancy circuitry. So the Earth looks just like a generator. \n\n_URL_0_\n\nCoincidentally the materials are all in the right place. heavy metals in the center spinning at a constant rate. Some pissed off liquid in between. And semiconductors on the outside, with trees and mountains to slow it all down. \n\nThus creating a different speed of rotation between the Earth's core and the outer crust. Making it a giant generator. \n\nElectrons, those little jerks go from one side of the planet to the other. From one pole to the other pole. Constantly! Think I'm wrong? Ask any compass. \n\nSo the Earth is a massive generator that is actually creating a force field around our planet. This foce field allows us to have nice things like comfortable temperatures and to keep oxygen around. We even get protected from some pretty big asteroids on a regular basis. It's pretty cool. Just look at the poor moon, it doesn't have the three layers and magnetic field, so it get's pelted with all sorts of asteroids. No trees up there.\n\nHere is what your super space shield looks like.\n\n_URL_1_\n\nSo if you find a way to drill to the center of the Earth it means you will not only expose us to unlimited amount of stuff in space, but the entire atmosphere might just decide to get up and leave. Not to mention, any force exerted on the Earth's core changes the Earth's rotational inertia, and so we either freeze to death or get lit up by the sun. So do not do it." ]
[ "to sink a bore-hole through 15,000 ft of the Earth's crust into the Mohorovičić discontinuity or \"Moho\". The project came to be called the \"No Hole\", and was discontinued by the US Congress in 1966 due to ever-rising costs and the fact that they had only managed to drill to a depth of 601 ft.", "Crack in the World Plot An international consortium of scientists, operating as Project Inner Space in Tanganyika, Africa, is trying to tap into the Earth's geothermal energy by drilling a very deep hole down to the Earth's core. The scientists are foiled by an extremely dense layer of material. To penetrate the barrier and reach the magma below, they intend to detonate an atomic device at the bottom of the hole.\nThe leader of the project, Dr. Stephen Sorenson (Dana Andrews), who is secretly dying of cancer, believes that the atomic device will burn its way through the barrier, but", "failure of a mine roof from the extraction of resources, weak overburden or geological discontinuities. The overburden at the mine site can develop cavities in the subsoil or rock, which can infill with sand and soil from the overlying strata. These cavities in the overburden have the potential to eventually cave in, forming a sinkhole at the surface. The sudden failure of earth creates a large depression at the surface without warning, this can be seriously hazardous to life and property. Sinkholes at a mine site can be mitigated with the proper design of infrastructure such as mining supports and", "to make solid shaft all the way down to the centre of the Earth (due to the Omnisolve creating a super-strong and dense lining on the sides of the shaft wall.)\nAfter Huey, Dewey and Louie explain the potentially catastrophic impact of this act - it would eventually lead to the Earth's destruction by destroying the planet's electromagnetic field and causing the Earth to be bombarded with radioactive solar winds - Scrooge, Donald and the boys go on a quest down the shaft to retrieve the solvent.\nThey first start slowly going down with an descent platform created by Gyro. In order", "the project's chief geologist, Dr. Ted Rampion (Kieron Moore), is convinced that the lower layers of the crust have been weakened by decades of underground nuclear tests, and that the detonation could produce a massive crack that would threaten the very existence of Earth.\nThe atomic device is used and Rampion's fears prove justified, as the crust of the Earth develops an enormous crack that progresses rapidly. Sorenson discovers that there was a huge reservoir of hydrogen underground, which turned the small conventional atomic explosion into a huge thermonuclear one that was millions of times more powerful. Another atomic device, lowered", "The Core Plot Geophysicist Dr. Josh Keyes (Aaron Eckhart) and scientists Dr. Serge Leveque (Tchéky Karyo) and Dr. Conrad Zimsky (Stanley Tucci) become aware of an instability of Earth's magnetic field after a series of bizarre incidents across the globe. They determine that the Earth's molten core, which generates this field, has stopped rotating and that, within a year, the field will collapse, exposing the planet's surface directly to devastating solar radiation. Backed by the U.S. government, Keyes, Leveque, and Zimsky create a plan to bore down to the core and set off several nuclear explosions to restart the rotation.", "Core, loosely based on the novel Core, tells the story of a team that has to drill to the center of the Earth and detonate a series of nuclear explosions in order to restart the rotation of Earth's core. The drilling equipment, dubbed Virgil, includes a powerful, snake-like laser drill, a small nuclear reactor for power, a shell (of \"unobtainium\", a fictional material) to protect against intense heat and pressure (and generate energy to drive the engine), a powerful x-ray camera for viewing outside, and a system of impellers for movement and control. The only part of the Earth that", "labor camp, was built near the work site, over the mine. Several sinkholes, some huge, have opened within the city. The situation requires round-the-clock monitoring. The problem is believed to be limited to a small part of the mine which was not filled properly and to be limited in its future impact, but relocation of the city is under consideration. The largest sinkhole, locally dubbed, \"The Grandfather\" by 2012, was 340 yards (~310 metres) wide, 430 yards (~390 metres) long, and 780 feet (~240 metres) deep. When it opened in 2007 the hole was initially 80 m long, 40 m", "David J. Stevenson Sending a probe into the Earth Stevenson's tongue-in-cheek idea about sending a probe into the earth includes the use of nuclear weapons to crack the Earth's crust, simultaneously melting and filling the crack with molten iron containing a probe. The iron, by the action of its weight, will propagate a crack into the mantle and would subsequently sink and reach the Earth's core in weeks. Communication with the probe would be achieved with modulated acoustic waves. This idea was used in the book Artemis Fowl: The Opal Deception.", "up in the atmosphere and itself could impact Earth. Tracking the thousands of buckshot-like fragments that could result from such an explosion would be a very daunting task, although fragmentation would be preferable to doing nothing and allowing the originally larger rubble body, which is analogous to a shot and wax slug, to impact the Earth.\nIn Cielo simulations conducted in 2011–2012, in which the rate and quantity of energy delivery were sufficiently high and matched to the size of the rubble pile, such as following a tailored nuclear explosion, results indicated that any asteroid fragments, created after the pulse of", "get through the layers of gravel. At 16 feet (5 m) the sides of the hole began to collapse. Those helping him began to despair, but not Drake. It was at this point that he devised the idea of a drive pipe. This cast iron pipe consisted of 10-foot-long (3.0 m) joints. The pipe was driven down into the ground. At 32 feet (10 m) they struck bedrock. The drilling tools were now lowered through the pipe and steam was used to drill through the bedrock. The drilling, however, was slow. Progress was made at the rate of just three feet", "prevent major ground failure. Holes are drilled into the back (ceiling) and walls and a long steel rod (or rock bolt) is installed to hold the ground together. There are three categories of rock bolt, differentiated by how they engage the host rock. They are: Stope and retreat Using this method, mining is planned to extract rock from the stopes without filling the voids; this allows the wall rocks to cave in to the extracted stope after all the ore has been removed. The stope is then sealed to prevent access. Stope and fill Where large bulk ore bodies", "terrains.\nAs the rock dissolves, spaces and caverns develop underground. These sinkholes can be dramatic, because the surface land usually stays intact until there is not enough support. Then, a sudden collapse of the land surface can occur.\nOn 2 July 2015, scientists reported that active pits, related to sinkhole collapses and possibly associated with outbursts, were found on the comet 67P/Churyumov-Gerasimenko by the Rosetta space probe. Artificial processes Collapses, commonly incorrectly labeled as sinkholes also occur due to human activity, such as the collapse of abandoned mines and salt cavern storage in salt domes in places like Louisiana, Mississippi and Texas.", "formations) may cause the pillars (coal left in place to support the galleries) to suddenly and catastrophically disintegrate, so that the galleries themselves collapse.\nNo. 2 colliery was one of the deepest coal mines in the world. Sloping shafts 14,200 feet (4,300 m) in length led to a vast labyrinth of galleries more than 4,000 feet (1,200 m) below the surface. Mining techniques there had been changed 20 years before the 1958 bump, from \"room and pillar\" to \"long wall retreating\" after reports had shown the increased danger of \"bump\" phenomena resulting from the former technique.\nOn October 23 a small bump occurred at", "(20,000 ft) borehole drilled 25 to 50 metres (82 to 164 ft) away from the original (rapidly leaking) well. A nuclear explosive was deemed necessary because conventional explosive both lacked the necessary power and would also require a great deal more space underground. When the bomb was set off, it crushed the original pipe that was carrying the gas from the deep reservoir to the surface and glassified all the surrounding rock. This caused the leak and fire at the surface to cease within approximately one minute of the explosion, and proved over the years to have been a", "pile, a solution is to detonate one or a series of nuclear explosive devices alongside the asteroid, at a 20-meter (66 ft) or greater stand-off height above its surface, so as not to fracture the potentially loosely-held-together object. Providing that this stand-off strategy was done far enough in advance, the force from a sufficient number of nuclear blasts would alter the object's trajectory enough to avoid an impact, according to computer simulations and experimental evidence from meteorites exposed to the thermal X-ray pulses of the Z-machine.\nIn 1967, graduate students under Professor Paul Sandorff at the Massachusetts Institute of Technology were tasked", "considerably from depths as great as 400 kilometres (250 mi). As the kimberlite magmas approach a depth of at least 2 kilometres (1.2 mi), the magma explodes violently through the Earth's crust, carrying fragments of rock that it has collected along the way and, in the right conditions, possibly diamonds, to the surface. The Eocene (ca. 55–50 Ma) age diatremes of the Lac de Gras kimberlite field in the central Slave craton of the Northwest Territories support two world-class diamond mines, called Ekati and Diavik. Ekati, Canada's first diamond mine, has produced 40,000,000 carats (8,000 kg) of diamonds out of six open pits", "cavity. The process continues until the formation of a sinkhole. It is possible for a cavity to not collapse; this will lead to backward erosion occurring.\nSoil contact erosion can occur between any granular layer and a finer soil such as in silt-gravel, and often results in a loss of stability, increases in pore pressure and clogging of the permeable layer. \nExperimental results show that close to the geometrical limit, the point at which the fine particles can just pass between the coarse particles(the filter criterion), erosion initiation and failure are much more likely.", "drills to begin boring an escape shaft. If the pilot hole had been completed, further drilling would have caused rock debris to fall down the hole, requiring the miners to remove several tons of debris. Drilling results At 08:05 CLDT on 9 October 2010, Plan B's Schramm T130XD was the first to reach the trapped miners. By 8 October, the Plan A Strata 950's pilot hole had reached only 85% of the required depth (598 meters (1,962 ft)), and had not yet started widening its shaft. Plan C's RIG-421, the only machine at the site able to drill a wide enough", "a.m. on 26 August 1990 a methane gas explosion 1,800 feet below the surface caused a cave-in which buried the entire third shift who were near the site of the explosion. All 180 miners working in the shaft were killed. One miner, who operated the machinery which brought the lignite to the surface was the sole survivor.", "1967. Soviet scientists at the Kola Institute pursued the goal simultaneously; after 15 years they reached a depth of 12,260 metres (40,220 ft), the world's deepest hole, before abandoning their attempt in 1989.\nReaching the discontinuity remains an important scientific objective. One proposal considers a rock-melting radionuclide-powered capsule with a heavy tungsten needle that can propel itself down to the Moho discontinuity and explore Earth's interior near it and in the upper mantle. The Japanese project Chikyu Hakken (\"Earth Discovery\") also aims to explore in this general area with the drilling ship, Chikyū, built for the Integrated Ocean Drilling Program (IODP).\nPlans called", "a hole 20 feet (6.1 m) deep into the earth. A hose would be inserted into the hole, and water pumped from the earth until the water table dropped and the driving of the piles could be accomplished. The building's foundation was more than three feet thick in places in order to withstand the hydraulic pressure put on it by the submerged Tiber Creek. Water from the Tiber was utilized as an air conditioning system to cool the building.\nAyres submitted his design for the Commerce building to the Public Buildings Commission, which gave its approval on November 1, 1927. The previous", "doubt concerning the future productivity of the pit. He believed that the reserves of usable coal were limited, but that there was potential value in Southeastern explorations, in the direction of the mine shaft of l'Espérance. According to him, to deepen the shaft another fifty meters and dig another gallery in that direction could prolong the life of the mine by another ten years .\nThe 1st of September 1880, a 10-meter chunk of the mine wall detached, crumbled, and crushed the receiving level, trapping two miners below. These miners were trapped in the mine for a week, but emerged alive.", "Crack in the Ground Crack in the Ground is a volcanic fissure about 2 miles (3.2 km) long\n with depths measuring nearly 30 feet (9 m) below ground level in Central Oregon, United States. The formation of the fissure occurred approximately between 700,000 to 12,000 years ago.\nThe eruptions from the Four Craters Lava Field were accompanied by a slight sinking of the older rock surface, forming a shallow, graben-like structure about 2 miles (3.2 km) wide and extending to the south into an old lake basin. Crack in the Ground marks the western edge of this small, volcano-tectonic depression. The crack is the", "designer Ted Taylor) bare pits are required.\nOn firing the weapon, small to moderate amounts of high explosive collapse and slightly reshape the nuclear material into a supercritical mass which then begins a chain reaction, goes critical, and explodes in a small nuclear blast. Three methods are known to compress and reshape the nuclear material: collapsing hollow spaces inside the nuclear material; using plutonium-gallium alloy which is stabilized in the low density delta phase at a density of 16.4 g/cm³ (9.5 oz/cu in) (and which collapses to denser alpha-phase under moderate explosive compression); and shaping an explosive around the nuclear material so that the", "and cut down into the mountain 1,600 feet above sea level. Each explosive blast dislodges about 70,000 tons of granite, which is transported by dump truck to the primary crusher, which reduces it to lumps no bigger than nine inches in diameter. It is then transferred by conveyor belt to a heap that covers the \"glory hole\", a 1,000 ft vertical shaft 10 ft in diameter, which is permanently full of rocks. At the base of the glory hole, deep inside the mountain, rocks are transferred to a horizontal conveyor and moved through a mile-long tunnel to the second crusher on the", "into the hole above the powder in order to contain the blast's energy and direct it into surrounding rock.\nAs Gage was doing this around 4:30 p.m., his attention was attracted by his men working behind him.\nLooking over his right shoulder, and inad­vert­ent­ly bringing his head into line with the blast hole, Gage opened his mouth to speak; in that same instant the tamping iron sparked against the rock and (possibly because the sand had been omitted) the powder exploded. Rocketed from the hole, the tamping iron‍—‌1 ¹⁄₄ inches (3.2 cm) in diameter, three feet seven inches (1.1 m) long, and weighing 13 ¹⁄₄ pounds (6.0 kg)‍—‌entered the left", "ejected and smashed rock from within the old summit crater, excavating a new crater 250 feet (75 m) wide, and sending an ash column about 7,000 feet (2.1 km) into the air. By this date a 16,000-foot-long (3.0 mi; 4.9 km) eastward-trending fracture system had also developed across the summit area. This was followed by more earthquake swarms and a series of steam explosions that sent ash 10,000 to 11,000 feet (3,000 to 3,400 m) above their vent. Most of this ash fell between three and twelve miles (5 and 19 km) from its vent, but some was carried 150 miles (240 km) south to Bend, Oregon,", "South.\nIn September 2015, concerns were expressed over the possible collapse of the abandoned tunnels that formed part of the Bell Island mine. A retired miner, Peter Young, told CBC Radio's On The Go that tunnels under the abandoned mines, going down as far as two kilometres, hold the potential for a large-scale disaster. He felt that a collapse would initiate a local earthquake giving rise to the secondary effect of the water level in Conception Bay around the mine dropping which in turn could force a tsunami from the surrounding ocean. Bell Island boom On April 2, 1978, there", "Descent (2005 film) Synopsis Oil drilling causes the Earth's crust to sink, pushing the magma up at the West Coast, triggering earthquakes and volcanic eruptions that devastate Seattle, Tacoma, and other cities, killing thousands, if not millions of people in the process. A crew must detonate nuclear fusion weapons underground and push the crust back into its proper position. Meanwhile, on the surface, there is a debate as to whether to inform the public about the impending crisis." ]
Is there a psychological term for when you finish a game/book/series and feel empty inside?
[ "\"Ennui\" (pronounced \"on-we\") is a pretty close fit. Also, it's French and they're very good at feeling empty and dissatisfied inside. \n\n\nennui: 1. a feeling of utter weariness and discontent resulting from satiety or lack of interest; boredom:" ]
[ "around the house, and events in the room occur and respond to the environment described in the computer game; the game eventually struggles to distinguish the player sitting and playing, and the player walking around the house.\nThe protagonist becomes aware of another person in the house. They come upstairs, full of anger, disturbed thoughts, and suggestions of vague but horrible past events. They open the bedroom door and eventually enter, standing behind the player-character: the protagonist himself. The episode ends when the computer game forces the seated player-character to repeatedly admit, \"It was all my fault\". It then slowly responds:", "is now empty. He explores through the planet only to get flashbacks of life on earth. As he seemingly sinks deeper into madness he finds out he is not alone and the only other survivor is a Russian girl who supposedly is the cure. Gameplay The game contains platforming adventure and puzzles to solve. Levels in the game are linear. The gameplay difficulty increases as the game progresses to match up with the player's skills learned from playing the game. Development and release The game was originally planned to be an action platformer, but as development of the story expanded,", "The Room (video game) Gameplay The Room is a three-dimensional puzzle game. The game has a minimal story, in which the player is told by letters of a mysterious box in a room in a house; as the player solves the puzzles around the box, more notes from the same author - one who previously had solved the mystery of the box - are found, describing the box's use of an ethereal material called \"Null\", as well as showing the author slowly descending into madness.\nOn starting the game, the player is presented with the first of four puzzle boxes. The", "titled Emptiness is an event, trying to explain her work and saying that the \"basic quality of an urban area is reaction of the human senses\" and that it is important \"whether some area is pleasant or desirable to spend time in it\". Preachy and philosophical text only provoked the public opinion even more, and she got a harsh public response from composer Ivana Stefanović titled Great white emptiness replying that the \"event\" actually makes you feel negative and unpleasant spending time in it and that the spirit of Cvetni trg, that of the small city garden, was killed and", "continue to lead their lives both before and after the events in the game. It feels unlike any other text adventure, as if Sherwin has developed the game while remaining totally isolated from the modern \"interactive fiction\" community. This means that, for once, you are not a lonely NPC, wandering around an empty unpopulated world, finding scraps of \"diaries\" to uncover the backstory (because of your amnesia, natch). From the outset, you are meeting PCs, having long conversations (through a somewhat clumsy keyword-based conversation system), and many of these guys will actually join you, accompanying you for long swathes of", "unable to interact with each other and are relatively mundane. Characters arrive in the city during sleep, and thus logging out is referred to and roleplayed as waking.\nMost story events in the game are entirely player driven, and structured around the existence of up to eight houses that open and close as events in the game transpire, and as factions rise and fall. Each house has its own ideology and conflict between the houses often plays a major role in the plots and motivations of individual characters.\nThe game world itself is spread across multiple planes, with each house controlling one", "the expansive environment with multiple obstacles may induce the feeling of being lost. After some time exploring the player's house, the player is taken to a dreamlike location with a gingerbread house-like hut that serves as a sort of hub level. The house contains a circular door that leads to a new level, surrounded by four containers where \"memories\" obtained from each level are stored. After the player finds a memory and heads to a tube at the end of the level, they will be returned to this hut. Once four memories are stored, the player can insert Teddy's right", "gameplay mostly involves wondering around the empty halls. The horror aspect of the game comes from what the player can't see and the eerie sound design that makes atmosphere frightening.\nThe main draw of the game is the player finding their way through the ship by solving various puzzles to let them progress the game. The puzzles are environmental and memory based in which the player has to travel to many different locations and memorize different information in order to get through blocked areas.\nThere is also a lot of lore to find throughout the game in the form of sticky notes,", "own room. No longer afraid of the dark, Sam quickly falls asleep. Multiple puzzles The game is notable for its multiple game scenarios; when the player starts a new game, each of the three items that need to be collected are in one of either two locations (for example, sometimes the lunch box is next to a wishing well, and sometimes it is at the bottom of a river). In addition to this, the player needs to carry out different actions in order to retrieve these items (for example, to get the lunch box, the player must search the area", "point made is the difficulty in entering a person's house as a living person, whereas as a ghost he can both interact and observe other characters. When asked of the creation of the game's characters, Takumi explains that he made them \"weird and quirky\" because he is curious, him giving examples of him wondering what a certain character he is writing will turn out like. He also used the ghost gimmick to allow him to go deeper into the characters, as opposed to his original plan to write back stories for every one of them. Takumi designed the writing to", "Where Is My Heart? Story Where is my Heart? tells the story of a family of three monsters who find themselves lost in the forest after setting out to find their home (a tree) after it mysteriously floats away one day. Elements of familial struggle and working together are sprinkled throughout. Gameplay The game starts out as any platformer might, but soon the image breaks into frames of varying sizes, often shuffling them. The player must then try to navigate their way through the level, by piecing together where their character appears to be in any given frame, as well", "in the level.\nRooms are populated with a variety of monsters, which become more and more dangerous as the player progresses through the game. The player is able to shoot or avoid the various monsters, as well as squash them with a \"boulder\" that the player is able to push around with them as they travel. Colliding with a monster will cause the player to lose health, often leading to the player's death.\nDifferent types of fruit are scattered throughout the labyrinth, which will increase the player's health when eaten. The player slowly, but consistently, loses health at all times while", "working within one of the rooms, the player discovers the body of A.S., who has been trapped with the rooms for many years due to the strange passage of time within Null. The player, on completing the final room, finds the exit leading back to the house where the first game started, but chased by tendrils of an evil entity using the Null. The player-character escapes the house in time as the tendrils cause parts of the house to implode, taking away the passage to Null with it. Development The Room Two was released on iTunes for iPad iOS 7", "\"really empty experience\", and decided to add tension through \"really dark, scary, big things\" to the game's story and opposing it with a \"carefree, happy response\" from The Bard. The game's non-intimidating tone and pace was informed by animated cartoons that incorporated music, such as Over the Garden Wall and Steven Universe. The cartoons also served as a reference for the game's animations. Audio The game's soundtrack was created by Lobanov and Gordon McGladdery, who is the director of A Shell in the Pit, a video game sound design and music production company known for their work on indie games", "as environmental storytelling. The game was built using the Unity3D game engine. In escape the room types of games, players are either: physically confined (due to doors being locked) or alternatively confined (because there is nothing else to do in the chapter). In contrast, Droste's design is more open ended and non-linear. There is much interactively with the game world beyond items required to progress in the story; clicking on items like walls and chairs reveal sound effects like taps and knocks, accompanied by a visual spurt of dust, thereby adding life and age to the space. In addition, players", "can reveal a player's personal perspective, and asks whether players are willing to \"kill these characters in the game in order to finish your entertainment\". This creates a sense of discomfort to players. Yohalem, when creating the story and the world, was inspired by Pulp Fiction, A History of Violence, Requiem For a Dream and Exit Through The Gift Shop. As opposed to Far Cry 2's oppressive world, the game was inspired by Alice in the Wonderland; Yohalem stated that the game asked why players would willingly trap themselves in a beautifully-crafted but virtual world instead of spending time with", "Dead Inside (game) Cosmology Dead Inside is chiefly divided into two realms – the stable, modern-day \"Real World\" and the dreamlike, mercurial \"Spirit World\".\nThe \"Real World\" is familiar and mostly devoid of the supernatural, at least on the surface (all supernatural powers and abilities in the game are weak and very difficult to use there). Its main denizens are \"Average People\" – those who own their original soul, who are incapable of visiting the Spirit World or perceiving the supernatural.\nThe \"Spirit World\" is an ever shifting dreamscape. Its geography is hard to pin down, but consists of five chief areas:", "emotional. The game itself was a real life-or-death kind of survival adventure game. I think there was a feeling somewhere deep in my heart that said, 'I wanna try making a horror game!' But soon after that, they came out with Biohazard, so I quickly got over that phase (laughs).\n...the comical sub-scenarios were written to be extremely comical beyond any measurement, so I think it sorta' balances out...But I can say that since this game wasn't expected to be widely sold on the market, and also since there wasn't any profit on our part, there was a feeling that I", "interesting conclusion. Tiscali said that the experience felt like \"walking through the game\" without anything challenging or interesting happening.", "is, he's not a cardboard cutout. He's also one of the few BioShock characters with the self-awareness to know when it's time to drop the philosophy textbooks and have a human response to what fate has in store. None of this makes him a 'good' guy, but they do make him more than just another ideology given flesh.\" \nWriting for Gameranx, Stephen Beirne was somewhat more critical of the way the game tried to make the player connect with Sinclair emotionally as it handles his death. He wrote \"If it happens that you actually feel morose at the death", "Warren Spector, the designer of Deus Ex, has argued that emergent narrative lacks the emotional impact of linear storytelling.\nLeft 4 Dead features a dynamic system for game dramatics, pacing, and difficulty called the Director. The way the Director works is called \"Procedural narrative\": instead of having a difficulty which increases to a constant level, the A.I. analyzes how the players fared in the game so far, and tries to add subsequent events that would give them a sense of narrative. Unintentional emergence Unintentional emergence occurs when creative uses of the video game were not intended by the game designers.", "Emptiness Emptiness as a human condition is a sense of generalized boredom, social alienation and apathy. Feelings of emptiness often accompany dysthymia, depression, loneliness, anhedonia,\ndespair, or other mental/emotional disorders, including schizoid personality disorder, post trauma, attention deficit hyperactivity disorder, schizotypal personality disorder and borderline personality disorder. A sense of emptiness is also part of a natural process of grief, as resulting death of a loved one, or other significant changes. However, the particular meanings of “emptiness” vary with the particular context and the religious or cultural tradition in which it is used.\nWhile Christianity and Western sociologists and psychologists view", "retreat to his room or, later in the game, getting kicked out of the hotel, leaving him unable to solve the mystery.\nThe game is filled with adventure-style puzzles, most of which involve using the touch screen to perform a simple task. Movement is made by leading an iconic representation of Kyle around a map of the hotel on the touch screen or d-pad while a first-person three-dimensional view is shown on the other screen.\nThere is also a journal to write in, which is used by several other characters as well, though all critical in-game story notes are copied automatically. ", "window. Once a building is completely empty, the player moves on to the next building. After everyone is scared out of town, the ghost is shown to be in a painting of what appears to be its family.\nBy scaring people, the player can raise the room's \"atmosphere\", which unlocks new actions for possessed objects. Some actions can be used to kill certain characters that can't be scared, and they will become a ghost that travels back to the clock tower home of the ghost. They will also appear in the painting at the tower.", "The Wonderful End of the World Gameplay In The Wonderful End of the World, the player takes control of a puppet that is able to grab small objects. The object of the game is to grab as many small objects as they can, growing bigger with each object consumed. The level ends once the player has consumed a predetermined number of objects. Once the level ends, the player receives a grade ranging from A+ to F. There is also an exploration mode, where there is no objective. Legacy The Wonderful End of the World was updated shortly before the release", "items are carried by the player, and can be combined with other items, when its possible. Unlike the previous version of the game, you can rotate an object inside your inventory. The items return to their original position when dropped. The game have interactive cutcenes which will show up after a player will be done with the location, and before moving to a next one. To complete the game, the player must explore real life locations, such as; Bronx, and Manhattan. The game is non-violent, however, you can die in it. Before you die, the game saves your progress automatically,", "environments such as forests, caves, mines, swamps, and castles. Some contain areas which affect the party by draining mana or causing them to fall asleep. Many contain features such as chests, which contain items when opened. Many levels also consist of multiple floors. The player will also come across shops, in which items can be purchased and sold, using silver crowns. Many levels also contain puzzles such as escaping from an area, or figuring out how to get to one. Plot King Richard, ruler of Gladstone Keep, has received word that Scotia, an old witch, has acquired a ring called", "game ends with a \"bad ending\", that is, the death of the chosen master and the resetting of everything that precedes passage. Plot Waking up in a strange virtual world with no recollection of the past, the main character (Hakuno Kishinami) finds themselves forced to fight for survival in a war they do not understand for a prize beyond value; the opportunity to have one's wish granted. With only an enigmatic \"Servant\" by their side, the protagonist will have to face both friends and foes in battles to the death in order to not only gain possession of a mysterious", "it’s easy to bounce out of a room unintentionally\". PC Gamer gave it 64/100, calling it \"[a]n often frustrating game built around a clever idea\", and argued that the darkening of unsolved rooms makes \"exploration [become] an exercise in feeling around in the dark, unsure if you're about to plunge down a hole into another room entirely, losing all your progress in the current room.\" On a positive note, it also said \"[t]he core idea of powering up your character progressively is a solid one, and there are moments of real beauty in the stark-but-cute art style\", though wrote the", "or disturbing content than either Lost Sphear or I Am Setsuna. The game's main motif was life and death, drawing inspiration from many Eastern philosophies that incorporated the concept of reincarnation. The team wanted players to see the story and revisit their own views on the subject. The team crafted the narrative so it would disturb people who experienced it. While the story was dark, the team wanted players to feel rather than see it, so there was no gore or graphic violence and many of the \"shocking\" moments are implied rather than shown. In the event, the team had" ]
Why is it, that even though I genuinely love Whiskey, I shudder nearly every time I drink some?
[ "Your conscious brain loves it, but your subconscious brain realizes that alcohol is inherently bad for the body, and causes you to shudder. It's a subconscious survival mechanism that you're overriding with your conscious brain." ]
[ "is how I feel about whiskey:\nIf when you say whiskey you mean the devil's brew, the poison scourge, the bloody monster, that defiles innocence, dethrones reason, destroys the home, creates misery and poverty, yea, literally takes the bread from the mouths of little children; if you mean the evil drink that topples the Christian man and woman from the pinnacle of righteous, gracious living into the bottomless pit of degradation, and despair, and shame and helplessness, and hopelessness, then certainly I am against it.\nBut, if when you say whiskey you mean the oil of conversation, the philosophic wine, the ale", "to see \"nothin' but a blur\". After drinking yet another pint of whiskey, he passed out on the tour bus. By morning he started hallucinating \"big spiders, and dinosaurs, huge, and they were gonna step on me\". The bus was parked on a beach at the ocean. He was tempted by yet another pint of whiskey that he had hidden. He took the bottle with him onto the beach and fell on his knees and said, \"Lord, ... I'm gonna throw this bottle. I'm gonna show You that I believe in you. I sailed it into the Pacific ... I got up,", "people have listened to my songs and thought, 'He must have a bottle of whiskey in one hand and a pistol in the other.' Well, I don't. I write my sadness.\"", "Whiskey Lullaby Content \"Whiskey Lullaby\" is a largely acoustic ballad in the key of B minor, accompanied mostly by acoustic guitar and Dobro. Its narrative centers on a couple that has an abruptly painful separation leading both to alcoholism and eventually drinking themselves to death: first the man, with a broken heart, and later the woman, feeling guilt for the man's death. While the video shows infidelity on the part of the woman, the lyrics don't mention anything about infidelity or state what the woman did to break the man's heart.\nPaisley sings the first verse and chorus, which focus on", "that came out like a more major chord style than we were used to it. It's melodic and poppy sounding. We're talking about drinking obviously because all of us sometimes drink too much. It's one of those basic every day things that people go through but they don't know how to voice it or others around them don't know to voice it. It's almost like you're looked down upon, but no one actually talks about it.\" \"Tendencies\", which is the closing track for the standard edition of the album, is a high tempo alternative metal song about murder. Johnny 3 Tears said,", "prefers drinking brandy and rum over peas, rice, coconut oil, whiskey or gin - \"because it makes her sin.\" She complains about \"a pain in her chest, because the food papa gives her won't digest.\" The song was first recorded in 1932 by Mart Britt and his Orchestra. Count Basie Jazz band leader Count Basie recorded the song on 6 June 1938 , with lyrics provided by Louis Wolfe Gilbert and L. Charles and a vocal performance by James Rushing. This is by far the most famous version. In popular culture Count Basie's version of the song was", "quiet moment to drink some whiskey, but gets his bottle destroyed by the Thompson twins playing golf. They all laugh over it.", "weed, and it made me do some stuff that I never had thought about doing – but of course it turned on me, like all drugs.\" Despite the album's slow gestation and Lanegan's notorious substance abuse problems, the songs on Whiskey for The Holy Ghost sound remarkably cohesive. Lyrically, Lanegan continues to delve into the darker side of the human experience on songs like \"Borracho\" and the Biblical \"Pendulum.\" (\"Jesus Christ been here and gone, what a painful price to pay.\") In his book I Am the Wolf, Lanegan states that Van Morrison and writer Cormac McCarthy sparked", "it as \"endearing\". Critical reception A writer for the website DJBooth praised \"Whiskey in a Bottle\", noting that it featured \"rhymes that go straight to your head\". Nicholas DG of HotNewHipHop.com was similarly positive, dubbing the track the point at which Yelawolf \"seems to truly plant his feet into the ground, establishing what exactly Love Story is as an album.\nComplex writer Chris Mench, however, slated \"Whiskey in a Bottle\", describing it as \"messy\" and \"uneven\".", "and Honey become increasingly unsettled, and Honey, who has had too much brandy, and has just been whirled violently around the room by George while chanting \"Who's afraid of Virginia Woolf?\" (to the tune of \"The Big Bad Wolf\"), runs to the bathroom to vomit.\nMartha goes to the kitchen to make coffee, and George and Nick go outside. The younger man confesses he was attracted to Honey more for her family's money than passion, and married her only because he mistakenly believed she was pregnant. George describes his own marriage as one of never-ending accommodation and adjustment, then admits he", "influenced by his self-awareness of the issue, and his belief that despite his control of his sobriety, he feels that just one drink of alcohol could lead him straight back into binge drinking and causing trouble.\nWhile critics saw much of the Attention Attention as an attempt to cater to the fans of modern pop bands like Imagine Dragons, \"Monsters\" was noted as sounding like more of the classic Shinedown sound.", "in motion, which is one of the main reasons an intoxicated person may vomit. The person has this feeling due to impairments in vision and equilibrioception. Diplopia (double vision) or polyplopia are common, as well as the symptoms of motion sickness and vertigo. Causes Ingesting a great deal of alcohol in a short amount of time causes alcohol to quickly enter the bloodstream.\nMixing alcohol with normal soft drinks, rather than diet drinks delays the dizzying effects of alcohol because the sugary mixture slows the emptying of the stomach, so that drunkenness occurs less rapidly.\nThe dizzying effects of alcohol upset the", "herself at fault for her husband's death, and can only feel at ease while drinking whiskey from her bottle.\nJust before the second chorus there is a shot of her at her husband's grave crying and drinking. When the chorus starts, it cuts to her funeral, which also took place in 1947. When the song finishes, a little girl looks back at the graves and sees their ghosts, hugging and kissing and falling in love again. The little girl in the video is played by Rick Schroder's daughter. The man's tombstone indicates that his name was Richard, born 1916, and the", "Bourbon in Kentucky Content The song is about a man who consumes bourbon whiskey when heartbroken, but claims that there \"ain't enough bourbon in Kentucky for me to forget you.\" It features a backing vocal from Kacey Musgraves.\nBentley told Great American Country, \"I’ve never heard anything like ‘Bourbon’ before…I really love the angst of it. I’ve been there before where you can’t drink your way through a heartache or a broken heart. There’s such an aggressive lonesomeness in this song.\" Critical reception Jon Freeman of Country Weekly gave the song an \"A\", comparing its production to both U2 and Bentley's", "who laugh all the time, because they never listen to what you're saying, they always — have another agenda and they generally have no sense of humour. The most untrustworthy body language I know is that of the person who laughs all the time. That terrifies me. People with no sense or a very limited sense of humour I am very wary of too, because it's not a sign of great intelligence to be without a sense of humour. If you've no sense of irony you haven't a great decision making capacity because you must see the possibilities of the", "The Chill of an Early Fall Content The narrator is a man who knows that his lover has been with a guy before or perhaps cheated in the past. He feels the chill of an early fall when he thinks about it and when her \"old friend\" comes around. The question of whether the other man is just a friend or more torments the narrator and drives him to drink.", "their breath at night when I went off. One night I had a fight in a bar and the next day they had to shoot only one side of my face because the other was so messed up. If you see the film, you can see the swelling in certain scenes.\" Anthony Hopkins, who had battled with alcoholism until becoming abstinent in 1975, was worried about Gibson's heavy drinking, saying, \"Mel is a wonderful, wonderful fellow with a marvellous future. He's already something of a superstar, but he's in danger of blowing it unless he takes hold of himself.\" Gibson,", "Whiskey Hangover Writing The writing process, according to Shannon Larkin, was collaborative, stating that all four members of the band wrote the song and Sully came up with the lyrics:\n\"All four of us were in the room and we wrote that song in like 3 hours. But it took Sully weeks to come up with the lyrics, and he wasn’t even happy with it ‘cause we had to rush it, ‘cause we needed something for this Motley Crue tour. The 3 of us loved it, but Sully was kind of irritated with it ‘cause he knows it could", "Sergeant Fred Colon postulates that this was because Vimes' body didn't produce any \"natural alcohol\", and he estimates that Vimes was about \"two drinks below par\". This meant that when he hadn't been drinking, he was beyond sober - he was \"knurd\". Thus he saw reality as it really was (\"first sight\"); stripped of all the mental illusions that most people construct in their minds to get to sleep at night (\"second sight\"). This horrifying state of mind caused Vimes to try to balance it out through drinking, but he would get the dosage wrong and would just end up", "addiction quite exhausting actually, because I grew a really thick beard and my hair was always really filthy. When I was shooting those scenes I met with a guy who was an addict, and he told me things that you go through, like you can’t relax when you’re trying to come off it. You can‘t sleep so you drink loads of alcohol to try and kill the pain. The clock barely seems to move. For me as an actor, they really let me go as far as I could on that. We had letters as well from people saying how", "which lacks in laugh-out-loud moments but builds up to them with a restraint and gentle tone that makes them more satisfying... there’s surprising substance here.\"", "I got a dose of the \"medicine\". The next day, the scene was repeated; because my father was of the opinion that I was lying in my bed maliciously or out of laziness.\"\n\"They disliked me, especially when Dad drank himself, which happened often. At the time, Paweł was no longer there, he was only \"dujcok\", \"piss\" and \"skunk\". For this reason, I did not get, for example, money for the cinema.\"\n\"Then I grew up, from time to time there was some kind of fun in the living room, it went, but it all went with me. You wanted to dance,", "Whiskey (Jana Kramer song) Writing and inspiration “Whiskey” was written by songwriters Catt Gravitt and Sam Mizell. Mizell said she came up with the title and concept of the song and then shared it with Gravitt. Mizell said of writing the song with Gravitt, \"Catt is one of the best writers out there these days,\" Mizell explains. \"It was her idea to have everybody call him 'cornbread' and all that stuff. I was like, 'Oh man. . .that's great!' I had a little bit of the chorus, but then she kind of took off with it. We kind of messed", "the slightest odor of liquor upon his breath or person\". Even so, some newspapers at the time reported Poe's death as \"congestion of the brain\" or \"cerebral inflammation\", euphemisms for deaths from disgraceful causes such as alcoholism. In a study of Poe, a psychologist suggested that Poe had dipsomania.\nPoe's characterization as an uncontrollable alcoholic is disputed. His drinking companion for a time, Thomas Mayne Reid, admitted that the two engaged in wild \"frolics\" but that Poe \"never went beyond the innocent mirth in which we all indulge... While acknowledging this as one of Poe's failings, I can speak truly of", "generates fear nor laughter. In fact it leaves you with no feelings at all. It has quite a few sub plots with characters entering, leaves you with a narration that is bland and juvenile at places.\"", "or even downright poisonous. When a guest at the opening party tells her she has had enough, she scoffs: \"The important drinking hasn't started yet.\" She camouflages emotional rejection with whiskey, at the opening party, the outdoor cafe in Rio, the apartment in Rio, then drinking becomes even more dangerous as the Sebastians administer their poison through Alicia's coffee. Even the MacGuffin comes packaged in a wine bottle. \"All the drinking is valueless and finally dangerous.\"\nComing as it did on the heels of World War II, the theme of patriotism—and the limits thereof—make it \"astonishing that the movie was produced", "my songs and thought, 'He must have a bottle of whiskey in one hand and a pistol in the opther.' Well, I don't. I write my sadness.\" \"Makes Me Wonder If I Ever Said Goodbye\" and \"Hand Me Another One of Those\" both address the classic country theme of getting plastered and drowning sorrows (\"Pour some whiskey on my flame and burn another memory\") while \"People Are Talking\" appears to reflect Newbury's growing disenchantment with the music business and play up to his reputation as a hermit.\nRather than throw his lot in with the outlaw movement, Rusty Tracks saw Newbury", "has said “I have friends who go on TV a lot and say, 'You ought to be on TV.' I don't do it partly because of performance anxiety. I'm pretty sure I'm going to screw it up. Second, it just makes me feel like a fraud. Popping off about issues of the day that I'm considered an expert on simply because I read the paper that morning doesn't feel right to me, which is surprising because I pop off a lot in real life. You take me out to lunch and put a few beers in me and I'll pop", "quiet drink' which has far-reaching consequences...", "is stronger than creed.\"\n\"Drink, however, is stronger than unionism,\" and, by the time the hearse passes by the pub, \"more than two-thirds of the funeral were unable to follow.\"\nThe narrator and his party respectfully follow the dwindling funeral procession, observing the conflict between the Bushfolks' respect for the dead, and their own personal comfort.\nThe burial itself is sombre, yet emotionless. Nobody actually knew the deceased, and so it is impossible to feel sad for him. It is heard that the young man's name is James Tyson, though this is \"simply the name he went by.\" The narrator does eventually hear" ]
Why do our eyes not see color on the edge of our peripheral vision?
[ "The cone cells that detect color aren't very good at low light or motion detection.\n\nSince motion detection is more important at the periphery than color (does it really matter what color that sabre toothed tiger is?) we evolved to pack mostly rods and few cones in the corners.\n\nYour brain remembers what colors things are and will attempt to color in the peripheral vision so you don't usually notice that it's basically grayscale.", "We have two kinds of light receptors in our eyes: rods and cones. Rods are more sensitive to black and white; cones are more sensitive to colors and have a higher ability to focus. \n\nCones are more concentrated in the centers of our eyes, while rods are more prevalent toward the edges of our eyes." ]
[ "albinism, there is no pigment on the back of the iris, and light from inside the eye can pass through the iris to the front. In these cases, the only color seen is the red from the hemoglobin of the blood in the capillaries of the iris. Such albinos have pink eyes, as do albino rabbits, mice, or any other animal with a total lack of melanin. Transillumination defects can almost always be observed during an eye examination due to lack of iridial pigmentation. The ocular albino also lacks normal amounts of melanin in the retina as well, which allows", "absorbing at 600 nm. The amount of red light emerging from the pupil depends on the amount of melanin in the layers behind the retina. This amount varies strongly between individuals. Light-skinned people with blue eyes have relatively low melanin in the fundus and thus show a much stronger red-eye effect than dark-skinned people with brown eyes. The same holds for animals. The color of the iris itself is of virtually no importance for the red-eye effect. This is obvious because the red-eye effect is most apparent when photographing dark-adapted subjects, hence with fully dilated pupils. Photographs taken with infrared light", "more light than normal to reflect off the retina and out of the eye. Because of this, the pupillary reflex is much more pronounced in albino individuals, and this can emphasize the red eye effect in photographs. Selection for rare iris colors A study compared the frequency of eye color in commercial advertising models in Brazil and the UK, these countries were chosen because they have inverted frequencies of eye-coloration, with Brazil having an excess of brown and the UK an excess of light-colored eyes. Models are chosen for their attractiveness, and it was found that, in Brazil, models with", "not just due to the white colour of the human sclera, which many other species share, but also to the fact that the human iris is relatively small and comprises a significantly smaller portion of the exposed eye surface compared to other animals. It is theorized that this adaptation evolved because of our social nature as the eye became a useful communication tool in addition to a sensory organ. It is believed that the conspicuous sclera of the human eye makes it easier for one individual to identify where another individual is looking, increasing the efficacy of this particular form", "development stages of the eye. Some affected individuals may also develop photophobia/photodysphoria. All these symptoms are due to lack of pigmentation of the retina. Moreover, in an ocular albino eye, nerves from back of the eye to the brain may not follow the usual pattern of routing. In an ocular albino eye, more nerves cross from back of the eye to the opposite side of the brain instead of going to the both sides of the brain as in a normal eye. An ocular albino eye appears blueish pink in color with no pigmentation at all unlike a normal eye.", "with age. However, when an optician examines the eye by shining a light from the side of the eye, the light shines back through the iris since very little pigment is present.\"\nBecause individuals with albinism have skin that entirely lacks the dark pigment melanin, which helps protect the skin from the sun's ultraviolet radiation, their skin can burn more easily from overexposure.\nThe human eye normally produces enough pigment to color the iris blue, green or brown and lend opacity to the eye. In photographs, those with albinism are more likely to demonstrate \"red eye\", due to the red of the", "through night vision devices always show very bright pupils because, in the dark, the pupils are fully dilated and the infrared light is not absorbed by any ocular pigment.\nThe role of melanin in red-eye effect is demonstrated in animals with heterochromia: only the blue eye displays the effect. The effect is still more pronounced in humans and animals with albinism. All forms of albinism involve abnormal production and/or deposition of melanin.\nRed-eye effect is seen in photographs of children also because children's eyes have more rapid dark adaption: in low light a child's pupils enlarge sooner, and an enlarged pupil accentuates", "Ocular albinism type 1 Signs and symptoms OA1 is recognized by many different symptoms. Reduced visual acuity is accompanied by involuntary movements of the eye termed as nystagmus. Astigmatism is a condition wherein there occurs significant refractive error. Moreover, ocular albino eyes become crossed, a condition called as ‘lazy eyes’ or strabismus. Since very little pigment is present the iris becomes translucent and reflects light back. It appears green to blueish red. However, the most important part of the eye, the fovea which is responsible for acute vision, does not develop properly, probably indicating the role of melanin in the", "reacts to light for several purposes.\nAs a conscious sense organ, the eye allows vision. Rod and cone cells in the retina allow conscious light perception and vision including color differentiation and the perception of depth. The human eye can distinguish about 10 million colors.\nThe human eye's non-image-forming photosensitive ganglion cells in the retina receive the light signals which affect adjustment of the size of the pupil, regulation and suppression of the hormone melatonin and entrainment of the body clock. Visual acuity Visual acuity is acuteness or clearness of vision, especially form vision, which is dependent on the sharpness", "image from the turned eye.\nAdditionally in adults who have had exotropia since childhood, the brain may adapt to using a \"blind-spot\", whereby it receives images from both eyes, but no full image from the deviating eye, thus avoiding double vision, and in fact, increasing peripheral vision on the side of the deviating eye.", "also cause a vitamin B₁₂ deficiency from poor absorption.\nPatients who suffer from nutritional optic neuropathy may notice that colors are not as vivid or bright as before and that the color red is washed out. This normally occurs in both eyes at the same time and is not associated with any eye pain. They might initially notice a blur or fog, followed by a drop in vision. While vision loss may be rapid, progression to blindness is unusual. These patients tend to have blind spots in the center of their vision with preserved peripheral vision. In most cases, the pupils", "angles, the iris and pupil appear to be rotated toward the viewer due to the optical refraction in the cornea. As a result, the pupil may still be visible at angles greater than 90°. Cone-rich rim of the retina The rim of the retina contains a large concentration of cone cells. The retina extends farthest in the superior-nasal 45° quadrant (in the direction from the pupil to the bridge of the nose) with the greatest extent of the visual field in the opposite direction, the inferior temporal 45° quadrant (from the pupil of either eye towards the bottom of the", "Iris (anatomy) Development The stroma and the anterior border layer of the iris are derived from the neural crest, and behind the stroma of the iris, the sphincter pupillae and dilator pupillae muscles as well as the iris epithelium develop from optic cup neuroectoderm. Eye color The iris is usually strongly pigmented, with the color typically ranging between brown, hazel, green, gray, or blue. Occasionally, the color of the iris is due to a lack of pigmentation, as in the pinkish-white of oculo-cutaneous albinism, or to obscuration of its pigment by blood vessels, as in the red of an", "Red eye (medicine) Visual acuity A reduction in visual acuity in a 'red eye' is indicative of serious ocular disease, such as keratitis, iridocyclitis, and glaucoma, and never occurs in simple conjunctivitis without accompanying corneal involvement. Ciliary flush Ciliary flush is usually present in eyes with corneal inflammation, iridocyclitis or acute glaucoma, though not simple conjunctivitis.\nA ciliary flush is a ring of red or violet spreading out from around the cornea of the eye. Corneal abnormalities The cornea is required to be transparent to transmit light to the retina. Because of injury, infection or inflammation, an area of opacity may", "factors determining iris color Iris color is a highly complex phenomenon consisting of the combined effects of texture, pigmentation, fibrous tissue and blood vessels within the iris stroma, which together make up an individual's epigenetic constitution in this context. A person's \"eye color\" is actually the color of one's iris, the cornea being transparent and the white sclera entirely outside the area of interest.\nMelanin is yellowish-brown to dark brown in the stromal pigment cells, and black in the iris pigment epithelium, which lies in a thin but very opaque layer across the back of the iris. Most human irises also", "and absorption from the other stromal components. Sometimes lipofuscin, a yellow \"wear and tear\" pigment, also enters into the visible eye color, especially in aged or diseased green eyes.\nThe optical mechanisms by which the non-pigmented stromal components influence eye color are complex, and many erroneous statements exist in the literature. Simple selective absorption and reflection by biological molecules (hemoglobin in the blood vessels, collagen in the vessel and stroma) is the most important element. Rayleigh scattering and Tyndall scattering, (which also happen in the sky) and diffraction also occur. Raman scattering, and constructive interference, as in the feathers of birds,", "allows some color-blind people to distinguish colors better. Red-filtering contact lenses can also be an option for extreme light sensitivity in some visual deficiencies such as achromatopsia.\nChromaGen contact lenses have been used and shown to have some limitations with vision at night although otherwise producing significant improvements in color vision. An earlier study showed very significant improvements in color vision and patient satisfaction.\nLater work that used these ChromaGen lenses with dyslexics in a randomised, double-blind, placebo controlled trial showed highly significant improvements in reading ability over reading without the lenses. This system has been granted FDA approval for use in", "the iris pigment epithelium. The iris pigment epithelium prevents damaging light scattering within the eye. Blue-eyed humans and mammals have little or no pigment in the stroma, but retain pigment in the iris pigment epithelium. If pigment is missing from both the stroma and the iris pigment epithelium, the only pigment in the eye is the hemoglobin in blood vessels. This accounts for the reddish appearance of eyes in some types of albinism.\nIn research mammals, such as mice, albinism is more strictly defined. Albino mice occur due to a recessive mutation of the C gene. No such mutation exists in", "retina being visible through the iris. Lack of pigment in the eyes also results in problems with vision, both related and unrelated to photosensitivity.\nThose with albinism are generally as healthy as the rest of the population (but see related disorders below), with growth and development occurring as normal, and albinism by itself does not cause mortality, although the lack of pigment blocking ultraviolet radiation increases the risk of melanomas (skin cancers) and other problems. Genetics Oculocutaneous albinism is generally the result of the biological inheritance of genetically recessive alleles (genes) passed from both parents of an individual such as OCA1", "of the retina (i.e., from one region of the retina verticals appear pink and horizontals appear greenish; from an adjacent region of the retina, verticals appear greenish and horizontals appear pink). Nevertheless, if a small region of the retina is exposed to the induction stimuli, and the test contours run through this region, the effect spreads along those test contours. Of course, if the induced area is in the fovea (central vision) and the eyes are allowed to move, then the effect will appear everywhere in the visual scene visited by the fovea.\nThe effect is also optimal when the thickness", "of melanin within the iris tissues. Although the processes determining eye color are not fully understood, it is known that inherited eye color is determined by multiple genes. Environmental or acquired factors can alter these inherited traits.\nThe human iris can be seen in a number of various colors. There are three true colors in human eyes that determine the outward appearance: brown, yellow, and grey. The amount of each color an individual has determines the appearance of the eye color.\nCentral heterochromia appears to be prevalent in irises containing low amounts of melanin.\nA famous case of a person with central heterochromia", "the living eye except when viewed with light from which red has been filtered. Function Structures in the macula are specialized for high-acuity vision. Within the macula are the fovea and foveola that both contain a high density of cones, which are nerve cells that are photoreceptors with high acuity.\nIn details, the normal human eye contains three different types of cones, with different ranges of spectral sensitivity. The brain combines the signals from neighboring cones to distinguish different colors. There is only one type of rod, but the rods are more sensitive than the cones, so in dim light", "the autosomal dominant color is yellow-green.\nAs the perception of color depends on viewing conditions (e.g., the amount and kind of illumination, as well as the hue of the surrounding environment), so does the perception of eye color. Changes in eye color Most new-born babies who have European ancestry have light-colored eyes. As the child develops, melanocytes (cells found within the iris of human eyes, as well as skin and hair follicles) slowly begin to produce melanin. Because melanocyte cells continually produce pigment, in theory eye color can be changed. Adult eye color is usually established between 3 and 6 months", "fact that there is a larger variety of background S/(L+M) and luminance values under long-distance viewing. Short-distance foliage hypothesis This hypothesis suggests that trichromacy has evolved to show higher sensitivity to low spatial frequencies. Spatiochromatic properties of the red-green system of color vision may be optimized for detecting any red objects against a background of leaves at relatively small viewing distances equal to that of a typical “grasping distance.\" Evolution of olfactory systems The sense of smell may have been a contributing factor in selection of color vision. One controversial study suggests that the loss of olfactory receptor genes coincided", "disrupted by albinism. Abnormal eye development and appearance Melanin functions in the normal development of various parts of the eye, including the iris, retina, eye muscles, and optic nerve. The absence of melanin results in abnormal development of eyes and leads to problems with focusing, and depth perception. The eyes of albino animals appear red because the colour of the red blood cells in the retina can be seen through the iris, which has no pigment to obscure this. Some albino animals may have pale-blue eyes due to other colour generating processes. Albino vertebrates exposed to intense", "angles, in turn modified by local occlusion and mutual reflection, all of which may vary with time and position.\" The wide spectrum of possible illuminances in the natural environment and the limited ability of the human eye to perceive color means that color constancy plays a functional role in daily perception. Color constancy allows for humans to interact with the world in a consistent or veridical manner and it allows for one to more effectively make judgements on the time of day. Physiological basis The physiological basis for color constancy is thought to involve specialized neurons in the primary", "can perceive the polarization of light, which enhances their perception of contrast. They have two spots of concentrated sensor cells on their retinas (known as foveae), one to look more forward, and one to look more backward. The eye changes focus by shifting the position of the entire lens with respect to the retina, instead of reshaping the lens as in mammals. Unlike the vertebrate eye, no blind spot exists, because the optic nerve is positioned below the retina.\nThe cuttlefish's eyes are thought to be fully developed before birth, and they start observing their surroundings while still in the egg.", "by PION, the pupils may look symmetrical. However, if the eyes are asymmetrically affected, i.e. one eye's optic nerve is more damaged than the other, it will produce an important sign called an afferent pupillary defect.\nDefective light perception in one eye causes an asymmetrical pupillary constriction reflex called the afferent pupillary defect (APD). Arteritic PION A-PION most commonly affects Caucasian women, with an average age of 73. At onset vision loss is unilateral, but without treatment it rapidly progresses to involve both eyes. Vision loss is usually severe, ranging from counting fingers to no light perception. Associated symptoms are jaw", "Eye color Eye color is a polygenic phenotypic character determined by two distinct factors: the pigmentation of the eye's iris and the frequency-dependence of the scattering of light by the turbid medium in the stroma of the iris.\nIn humans, the pigmentation of the iris varies from light brown to black, depending on the concentration of melanin in the iris pigment epithelium (located on the back of the iris), the melanin content within the iris stroma (located at the front of the iris), and the cellular density of the stroma. The appearance of blue and green, as well as hazel eyes,", "during a simple eye exam using an ophthalmoscope to look through the pupil. A positive diagnosis is usually made only with an examination under anesthetic (EUA). A white eye reflection is not always a positive indication of retinoblastoma and can be caused by light being reflected badly or by other conditions such as Coats' disease.\nThe presence of the photographic fault red eye in only one eye and not in the other may be a sign of retinoblastoma. A clearer sign is \"white eye\" or \"cat's eye\" (leukocoria). Cause Mutation of genes, found in chromosomes, can affect the way in which" ]
Why is it when I drink a glass of liquid I urinate at least twice as much back out?
[ "Your bladder only sends the \"time to pee\" message to your brain when it reaches a certain level of fullness. So the amount you pee out doesn't just represent the glass of water you just drank, but all of the water you have drank since the last time you peed plus the water your body needed to dissolve the waste products it excretes in urine (urea, creatine and some other compounds).", "Urine isn't just made of water. Your kidneys constantly filter out a lot of salts and wastes from your blood which all contribute to urine." ]
[ "the most readily available being in the form of water, which leads to frequent urination.", "water by increasing water reabsorption in the collecting ducts of the kidney nephron. Vasopressin increases water permeability of the kidney's collecting duct and distal convoluted tubule by inducing translocation of aquaporin-CD water channels in the kidney nephron collecting duct plasma membrane. Urination Urination is the ejection of urine from the urinary bladder through the urethra to the outside of the body. In healthy humans (and many other animals), the process of urination is under voluntary control. In infants, some elderly individuals, and those with neurological injury, urination may occur as an involuntary reflex. Physiologically, micturition involves coordination between the central,", "the person may reach a stage where they are no longer able to refrain from urination and involuntary voiding of the bladder may take place. Instances of this sort will often result in full emptying of the bladder, but are likely to be one-off or rare occurrences. Excessive alcohol consumption can also cause episodes of incontinence in otherwise healthy adults.", "water to make him/her urinate) has no support from the mechanism of immersion diuresis. On the other hand, sitting up to the neck in a pool for a few hours clearly increases the excretion of water, salts, and urea. Cold-induced diuresis Cold-induced diuresis, or cold diuresis, is a phenomenon that occurs in humans after exposure to a hypothermic environment, usually during mild to moderate hypothermia. It is currently thought to be caused by the redirection of blood from the extremities to the core due to peripheral vasoconstriction, which increases the fluid volume in the core. Overall, acute exposure to cold", "causing an almost irresistible (if the hypertonicity is severe enough) urge to drink water. The cessation of urine flow prevents the hypovolemia and hypertonicity from getting worse; the drinking of water corrects the defect.\nHypo-osmolality results in very low plasma ADH levels. This results in the inhibition of water reabsorption from the kidney tubules, causing high volumes of very dilute urine to be excreted, thus getting rid of the excess water in the body.\nUrinary water loss, when the body water homeostat is intact, is a compensatory water loss, correcting any water excess in the body. However, since the kidneys cannot generate", "reducing fluid consumption to avoid fluid retention before, during, and after exercise.\nHowever, since this can risk dehydration, an alternative approach is possible of consuming a substantial amount of salt prior to exercise. It is still important not to overconsume water to the extent of requiring urination, because urination would cause the extra salt to be excreted. The Role of Thirst In a published statement of the Third International Exercise-Associated Hyponatremia Consensus Development Conference, researchers concluded that drinking in accordance with the sensation of thirst is sufficient for preventing both dehydration and hyponatremia. This advice is contradicted by the American College", "applied to the urinary bladder wall, but voiding can be initiated without straining even when the bladder is nearly empty.\nVoiding can also be consciously interrupted once it has begun, through a contraction of the perineal muscles. The external sphincter can be contracted voluntarily, which will prevent urine from passing down the urethra. Experience of urination The need to urinate is experienced as an uncomfortable, full feeling. It is highly correlated with the fullness of the bladder. In many males the feeling of the need to urinate can be sensed at the base of the penis as well as the bladder,", "water lost through urination. Even people who are resting quietly in extreme heat or humidity may run the risk of water intoxication if they drink large amounts of water over short periods for rehydration. Psychiatric conditions Psychogenic polydipsia is the psychiatric condition in which patients feel compelled to drink large quantities of water, thus putting them at risk of water intoxication. This condition can be especially dangerous if the patient also exhibits other psychiatric indications (as is often the case), as the care-takers might misinterpret the hyponatremic symptoms. Iatrogenic When an unconscious person is being fed intravenously (for example,", "to the endothelium Urinary sodium Because the hypothalamus/osmoreceptor system ordinarily works well to cause drinking or urination to restore the body's sodium concentrations to normal, this system can be used in medical treatment to regulate the body's total fluid content, by first controlling the body's sodium content. Thus, when a powerful diuretic drug is given which causes the kidneys to excrete sodium, the effect is accompanied by an excretion of body water (water loss accompanies sodium loss). This happens because the kidney is unable to efficiently retain water while excreting large amounts of sodium. In addition, after sodium excretion, the", "the hypothalamus, which relay osmotic pressure information to the posterior pituitary, the site of antidiuretic hormone release. Alcohol causes the osmoreceptors to signal that there is low osmotic pressure in the blood, which triggers an inhibition of the antidiuretic hormone. As a consequence, one's kidneys are no longer able to reabsorb as much water as they should be absorbing, therefore creating excessive volumes of urine and the subsequent overall dehydration. Mellanby effect The Mellanby effect is the phenomenon that the behavioral impairment due to alcohol is less, at the same BAC, when the BAC is decreasing than when it is", "out of the urethra. The micturition reflex normally produces a series of contractions of the urinary bladder.\nThe flow of urine through the urethra has an overall excitatory role in micturition, which helps sustain voiding until the bladder is empty.\nAfter urination, the female urethra empties partially by gravity, with assistance from muscles. Urine remaining in the male urethra is expelled by several contractions of the bulbospongiosus muscle, and, by some men, manual squeezing along the length of the penis to expel the rest of the urine.\nFor land mammals over 1 kilogram, the duration of urination does not vary with body mass,", "twenty different uroscopy flasks with urine of different colors aligned around the border of the circle. Each flask has a line that connects it to a summary of a particular disease. This allowed doctors to have a quick reference guide to twenty different types of urine. Temperature The temperature at which the urine is examined is a very important factor to consider in the process of uroscopy. When a patient urinates, the urine will be warm, so it is necessary for it to stay warm for proper evaluation. The external temperature should be the same as the internal temperature. When", "blood pressure to rise enough to cause the rupture of an aneurysm or to dislodge blood clots (see thrombosis). Also, in releasing the Valsalva maneuver blood pressure falls; this, coupled with standing up quickly to leave the toilet, can result in a blackout.\nDuring defecation, the external sphincter muscles relax. The anal and urethral sphincter muscles are closely linked. Experiments by Harrison Weed at the Ohio State University Medical Center have shown they can be contracted only together, not individually, and that both show relaxation during urination. This explains why defecation is frequently accompanied by urination. Voluntary and involuntary control Defecation", "usually with the aid of a glass dropper. It may be taken diluted with water just before use, which may slightly reduce the intensity of its effects, but can also serve to lessen or avoid a stinging sensation in the mouth caused by the presence of alcohol. Tinctures vary in potency, and the effects can range from inducing a mild meditative state to bringing about a more intense hallucinatory one.\nWhen taken as a tincture the effects and duration are similar to other methods of oral ingestion, though they may be significantly more intense, depending on extract potency. Effects Aside from", "the temperature of urine goes down the bubbles in it will change. Some of them will disappear, but some will remain. With the temperature decrease particles and impurities will be more difficult to evaluate. They will move toward the middle of the flask, then sink to the bottom. They will all mix, making it more difficult to see the impurities.\nAnother problem with urine cooling is that it would become thicker. The longer that it had to cool down the more likely it was that the crystals in the it would bond together, causing it to thicken. This could lead to", "that drinking urine tends to worsen rather than relieve dehydration due to the salts in it, and that urine should not be consumed in a survival situation, even when there is no other fluid available.\nWhile some people in dire straits have drunk urine, it is unclear whether this actually helped or hindered their situation.\nIn one incident, Aron Ralston drank urine when trapped for several days with his arm wedged under a boulder. The survivalist television host Bear Grylls drank urine and encouraged others to do so on several episodes on his TV shows. Folk medicine In various cultures, there are", "play a large role in determining the extent of intoxication; for example, eating a heavy meal before alcohol consumption causes alcohol to absorb more slowly. The amount of alcohol consumed largely determines the extent of hangovers, although hydration also plays a role. After excessive drinking, stupor and unconsciousness both can occur. Extreme levels of consumption can cause alcohol poisoning and death; in fact, a concentration in the blood stream of 0.40% will kill half of those affected. Alcohol may also cause death indirectly, by asphyxiation from vomiting.\nAlcohol can greatly exacerbate sleep problems. During abstinence, residual disruptions in sleep regularity and", "of the glass with alcohol. In the second study, Miles used similar methodology as the first study with the exception of giving participants alcohol after eating a full meal to see if food diluted the effects of alcohol. It reduced adverse effects, but still impair performance. In the third study, Miles collaborated with T. M. Carpenter to examine the effects of alcohol administered via rectal injection during sleep. Rectal injection of either alcohol or a saline solution was used to ensure the participant did not know if he was being administered alcohol or a placebo, and because it was believed", "be accomplished, usually in a position that would promote urination only while seated/squatting, though a permanent urinary catheter may be used in rare cases. Alternative urination tools Sometimes urination is done in a container such as a bottle, urinal, bedpan, or chamber pot (also known as a gazunder). A container or wearable urine collection device may be used so that the urine can be examined for medical reasons or for a drug test, for a bedridden patient, when no toilet is available, or there is no other possibility to dispose of the urine immediately.\nAn alternative solution (for traveling, stakeouts, etc.)", "well as alcohol consumption can reduce urine pH, whilst potassium and organic acids such as from diets high in fruit and vegetables can increase the pH and make it more alkaline. Some drugs also can increase urine pH, including acetazolamide, potassium citrate, and sodium bicarbonate.\nCranberries, popularly thought to decrease the pH of urine, have actually been shown not to acidify urine. Drugs that can decrease urine pH include ammonium chloride, chlorothiazide diuretics, and methenamine mandelate. Density Human urine has a specific gravity of 1.003–1.035. Any deviations may be associated with urinary disorders. Hazards Healthy urine is not toxic. However, it", "and sometimes foul-smelling urine, while older children typically present with discomfort or pain with urination and frequent urination. Causes In healthy individuals the ureters enter the urinary bladder obliquely and run submucosally for some distance. This, in addition to the ureter's muscular attachments, helps secure and support them posteriorly. Together these features produce a valvelike effect that occludes the ureteric opening during storage and voiding of urine. In people with VUR, failure of this mechanism occurs, with resultant backward (retrograde) flow of urine. Primary VUR Insufficient submucosal length of the ureter relative to its diameter causes inadequacy of the valvular", "do the same for the host. Therefore, paying attention to other’s drink glasses and filling them when empty is a common procedure at bars, parties, and other social settings. If one does not wish to drink any further, that person is to simply leave their glass full. Tradition states that guests should not refuse the first drink offered by a host. If a guest refuses a drink up to three times, that specific guest will not be offered anymore.\nWhen adult guests are asked to pour a drink, they are expected to offer the drink respectfully with two hands. When pouring", "as only 100 to 200 mL are lost in the stool. Volume depletion occurs when the fluid ordinarily secreted by the GI tract cannot be reabsorbed. This occurs when there is retractable vomiting, diarrhea, or external drainage via stoma or fistulas. Kidneys Renal losses of salt and fluid can lead to hypovolemic shock. The kidneys usually excrete sodium and water in a manner that matches sodium intake and water intake. \nDiuretic therapy and osmotic diuresis from hyperglycemia can lead to excessive renal sodium and volume loss. In addition, there are several tubular and interstitial diseases beyond the scope of this", "close to 1 (U/P≅1). Because of this, solely excreting urine is not sufficient to resolve the osmoregulatory problem in tunas. In turn, they excrete only the minimum volume of urine necessary to rid of solutes that are not excreted by other routes, and the salt is mostly excreted via gills. This is why the composition of solutes in urine differs significantly from that of the blood plasma. Urine has a high concentration of divalent ions, such as Mg²⁺ and SO₄²⁻ (U/P>>1), as these ions are mostly excreted by the kidneys keeping their concentration in blood plasma from rising. Monovalent ions", "blood vessels within the body to conserve heat. The body detects an increase in the blood pressure and inhibits the release of vasopressin (also known as antidiuretic hormone (ADH)), causing an increase in the production of urine. The pressure component is caused by the hydrostatic pressure of the water directly increasing blood pressure. Its significance is indicated by the fact that the temperature of the water does not substantially affect the rate of diuresis. Partial immersion of only the limbs does not cause increased urination. Thus, the hand in warm water trick (immersing the hand of a sleeping person in", "for at least 8 hours prior to a procedure, and should not drink even clear liquids for at least 2 hours prior. Clear liquid fasting includes water, juices without pulp, carbonated beverages, clear tea, and black coffee. Ingestion of water 2 hours prior to a procedure results in smaller gastric volumes and higher gastric pH when compared with those who ingested > 4 hours prior. The volume of liquid is less important than the type of liquid ingested. Non-emergency surgical cases should be delayed for NPO status.\nFor extended periods without food or water, patients may be started on total parenteral", "flow (which is solute clearance + free water clearance) will equal the rate of solute excretion divided by the urine osmolality. With a diet of only solute poor beer, only about 200–300 mOSM (normal 750 mOSM to greater than 900 mOSM) of solute will be excreted per day, capping the amount of free water excretion at four liters. Any intake above 4 liters would lead to a dilution of the serum sodium concentration and thus hyponatremia.\nAny vomiting or GI absorptive problems due to alcohol intoxication can also compound the effect of potomania due to additional electrolyte and acid-base disturbances. Treatment", "Urinal (health care) A urinal is a bottle for urination. It is most frequently used in health care for patients who find it impossible or difficult to get out of bed during sleep. Urinals allow the patient who has cognition and movement of their arms to toilet independently.\nUrinals can also be used for measuring the amount of urine produced by a patient on input & output (I & O), even if not used by the patient for toileting.\nGenerally, patients who are able to are encouraged to walk to the toilet or use a bedside commode as opposed to a urinal.", "waste or matter exits the lower most extremities of the body, the anus and urethra, as either feces, urine, semen or gas. For wudhu to be invalid through flatulence, one must actually hear or smell the passing, otherwise it is not considered void. In addition, wudhu is considered void when someone falls into a deep sleep in which they have no alert consciousness. \nBelching and vomiting do no invalidate wudhu, however it is strongly recommended that the individual rinses his or her mouth following the latter. Bleeding is not considered to invalidate wudhu either, as Ja'far al-Sadiq made it", "The mechanism by which voluntary urination is initiated remains unsettled. One possibility is that the voluntary relaxation of the muscles of the pelvic floor causes a sufficient downward tug on the detrusor muscle to initiate its contraction. Another possibility is the excitation or disinhibition of neurons in the pontine micturition center, which causes concurrent contraction of the bladder and relaxation of the sphincter.\nThere is an inhibitory area for micturition in the midbrain. After transection of the brain stem just above the pons, the threshold is lowered and less bladder filling is required to trigger it, whereas after transection at the" ]
What prevents DNA from getting tangled?
[ "Proteins!\n\n\nThere are *many, many* proteins in your body that have a specific job of keeping your DNA tangled/condensed the perfect amount. There are topoisomerases, a family of proteins, that specifically twist/untwist your DNA to introduce/remove \"supercoils\" (like what would happn when you twist an elastic band) to condense it or expand it. There are some proteins like histones to which the DNA will almost always be attached. The histones kind of serve as a backbone for the DNA; a place for the DNA to organize itself.\n\n\nOf course, this is just the very basic level of proteins. There are many more proteins and ways to organize DNA. It's always proteins!" ]
[ "to 3' or downstream direction. The DNA double helix is rewound by RNA polymerase at the rear of the transcription bubble. Like how two adjacent zippers work, when pulled together, they unzip and rezip as they proceed in a particular direction. Various factors can cause double-stranded DNA to break; thus, reorder genes or cause cell death. RNA-DNA hybrid Where the helix is unwound, the coding strand consists of unpaired bases, while the template strand consists of an RNA:DNA composite, followed by a number of unpaired bases at the rear. This hybrid consists of the most recently added nucleotides of the", "crosslinks. These lesions cause the two opposing strands of DNA to be covalently bound together. Such crosslinks are lethal to cells since they would prevent DNA from being copied (DNA replication) or for the genes it carries to be read (DNA transcription). DNA crosslinks are caused by numerous anti-cancer drugs (such as cisplatin), but they also must arise naturally since individuals carrying a genetic defect in crosslink repair suffer from the illness Fanconi anaemia. This devastating inherited illness leads to congenital defects, progressive loss of blood production and an enormous lifetime risk of certain cancers.\nPatel's research on the Fanconi pathway", "rope.\nAlthough non-complementary sequences are also possible in the middle of double stranded DNA, mismatched regions away from the ends are not referred to as \"frayed\". Discovery Ronald W. Davis first discovered sticky ends as the product of the action of EcoRI, the restriction endonuclease. Strength Sticky end links are different in their stability. Free energy of formation can be measured to estimate stability. Free energy approximations can be made for different sequences from data related to oligonucleotide UV thermal denaturation curves. Also predictions from molecular dynamics simulations show that some sticky end links are much stronger in stretch than the", "RNA, it is also possible for a sequence to have internal complementarity resulting in the sequence binding to itself in a folded configuration. Self-complementarity and hairpin loops Self-complementarity refers to the fact that a sequence of DNA or RNA may fold back on itself, creating a double-strand like structure. Depending on how close together the parts of the sequence are that are self-complementary, the strand may form hairpin loops, junctions, bulges or internal loops. RNA is more likely to form these kinds of structures due to base pair binding not seen in DNA, such as guanine binding with uracil. Regulatory", "because its size makes it easily physically hindered. Thus is more likely to have its action blocked by a bound protein on a DNA sequence. In addition, the DNase I enzyme is easily controlled by adding EDTA to stop the reaction. There are however some limitations in using DNase I. The enzyme does not cut DNA randomly; its activity is affected by local DNA structure and sequence and therefore results in an uneven ladder. This can limit the precision of predicting a protein’s binding site on the DNA molecule.Hydroxyl radicals are created from the Fenton", "twisting DNA can expose internal bases to the outside, without the aid of any proteins. Also, transcription itself contorts DNA in living human cells, tightening some parts of the coil and loosening it in others. That stress triggers changes in shape, most notably opening up the helix to be read. Unfortunately, these interactions are very difficult to study because biological molecules morph shapes so easily. In 2008 it was noted that transcription twists DNA, leaving a trail of undercoiled (or negatively supercoiled) DNA in its wake. Moreover, they discovered that the DNA sequence itself affects how the molecule responds to", "reposition itself in between each and every fragment length of DNA.\nDNA structure changes when a single-stranded nick is introduced. Stability is decreased as a break in the phosphodiester backbone allows DNA to unwind, as the built up stress from twisting and packing is not being resisted as strongly anymore. Nicked DNA is more susceptible to degradation due to this reduced stability.", "in DNA to cleave adjacent to the nick and then winds or unwinds the twisted helical structure of DNA (complex topologies associated with winding). Here, the nick in the DNA serves as a marker for single strand breakage and subsequent unwinding. It is possible that this is not a highly conserved process. Topoisomerase may cause short deletions when it cleaves bonds, as studies showed full-length DNA products and short deletion strands as products of topoisomerase cleavage while inactive mutants only produced full-length DNA strands.\nNicks in DNA also give rise to different structural properties, can be involved in repairing damages caused", "frayed regions of the pre-existing double-strand. Although the simplest example of branched DNA involves only three strands of DNA, complexes involving additional strands and multiple branches are also possible. Branched DNA can be used in nanotechnology to construct geometric shapes, see the section on uses in technology below. Artificial bases Several artificial nucleobases have been synthesized, and successfully incorporated in the eight-base DNA analogue named Hachimoji DNA. Dubbed S, B, P, and Z, these artificial bases are capable of bonding with each other in a predictable way (S–B and P–Z), maintain the double helix structure of DNA, and be transcribed", "because DNA polymerase can synthesize DNA in only one direction by adding nucleotides to the 3′ end of a DNA strand.\nThe pairing of complementary bases in DNA (through hydrogen bonding) means that the information contained within each strand is redundant. Phosphodiester (intra-strand) bonds are stronger than hydrogen (inter-strand) bonds. This allows the strands to be separated from one another. The nucleotides on a single strand can therefore be used to reconstruct nucleotides on a newly synthesized partner strand. DNA polymerase DNA polymerases are a family of enzymes that carry out all forms of DNA replication. ", "segment. The intervening DNA between the V and D segments is ligated to form a circular DNA molecule that is lost from the chromosome. At each of the two remaining ends, called the coding ends, the two strands of DNA are joined to form a hairpin structure. Artemis nuclease, in a complex with the DNA-dependent protein kinase (DNA‑PK), binds to these DNA ends and makes a single cut near the tip of the hairpin. The exposed 3' termini are subject to deletion and addition of nucleotides by a variety of exonucleases and DNA polymerases, before the", "and topoisomerase II. When the DNA double-strand helix is unwound, during DNA replication or transcription, for example, the adjacent unopened DNA winds tighter (supercoils), like opening the middle of a twisted rope. The stress caused by this effect is in part aided by the topoisomerase enzymes. They produce single- or double-strand breaks into DNA, reducing the tension in the DNA strand. This allows the normal unwinding of DNA to occur during replication or transcription. Inhibition of topoisomerase I or II interferes with both of these processes.\nTwo topoisomerase I inhibitors, irinotecan and topotecan, are semi-synthetically derived from camptothecin, which is obtained", "positioning of nucleosomes along DNA. Linker DNA is relatively resistant to bending and rotation. This makes the length of linker DNA critical to the stability of the fibre, requiring nucleosomes to be separated by lengths that permit rotation and folding into the required orientation without excessive stress to the DNA.\nIn this view, different lengths of the linker DNA should produce different folding topologies of the chromatin fiber. Recent theoretical work, based on electron-microscopy images\nof reconstituted fibers supports this view. Spatial organization of chromatin in the cell nucleus The spatial arrangement of the chromatin within the nucleus is not random -", "by Miguel Godinho Ferreira solved a paradox related to telomeres, the protective tips of chromosomes. The broken chromosome ends generated by DNA damage are quickly joined together. However, telomeres are never tied to each other, thus allowing for the correct segregation of the genetic material into all cells. The researchers found that one of the histones neighbouring the telomeres lacks a chemical signal, thus rendering the DNA damage recognition machinery incapable of arresting the cell cycle. PhD Programmes The IGC has started the postgraduate training with the format of a PhD programme in 1993 with the Gulbenkian PhD Programme in", "is produced through projection of four bulky phenylalanine residues into the minor groove. As the DNA bends, its contact with TBP increases, thus enhancing the DNA-protein interaction.\nThe strain imposed on the DNA through this interaction initiates melting, or separation, of the strands. Because this region of DNA is rich in adenine and thymine residues, which base-pair through only two hydrogen bonds, the DNA strands are more easily separated. Separation of the two strands exposes the bases and allows RNA polymerase II to begin transcription of the gene.\nTBP's C-terminus composes of a helicoidal shape that (incompletely) complements the T-A-T-A region of", "Crosslinking of DNA In genetics, crosslinking of DNA occurs when various exogenous or endogenous agents react with two nucleotides of DNA, forming a covalent linkage between them. This crosslink can occur within the same strand (intrastrand) or between opposite strands of double-stranded DNA (interstrand). These adducts interfere with cellular metabolism, such as DNA replication and transcription, triggering cell death. These crosslinks can, however, be repaired through excision or recombination pathways.\nDNA crosslinking also has useful merit in chemotherapy and targeting cancerous cells for apoptosis, as well as in understanding how proteins interact with DNA. Crosslinking agents Many characterized crosslinking agents have", "by the DNA double helix make DNA well suited to the storage of genetic information, while base-pairing between DNA and incoming nucleotides provides the mechanism through which DNA polymerase replicates DNA and RNA polymerase transcribes DNA into RNA. Many DNA-binding proteins can recognize specific base-pairing patterns that identify particular regulatory regions of genes.\nIntramolecular base pairs can occur within single-stranded nucleic acids. This is particularly important in RNA molecules (e.g., transfer RNA), where Watson–Crick base pairs (guanine–cytosine and adenine–uracil) permit the formation of short double-stranded helices, and a wide variety of non-Watson–Crick interactions (e.g., G–U or A–A) allow RNAs to fold", "and would be 85 mm long if straightened.\nDNA does not usually exist as a single strand, but instead as a pair of strands that are held tightly together. These two long strands coil around each other, in the shape of a double helix. The nucleotide contains both a segment of the backbone of the molecule (which holds the chain together) and a nucleobase (which interacts with the other DNA strand in the helix). A nucleobase linked to a sugar is called a nucleoside, and a base linked to a sugar and to one or more phosphate groups is called a nucleotide.", "mechanism protects against the improper activation of DNA damage checkpoints by natural chromosome ends. Previous research had observed that in addition to protecting the ends of chromosomes, telomeric complexes also allow cells to distinguish random DNA breaks and natural chromosome ends.\nIn 2005, de Lange came to the crucial realization that six telomeric proteins form a dynamic protein complex, that she named shelterin, named for its function of protecting chromosome ends. The six shelterin subunits are: TRF1, TRF2, TIN2, Rap1, TPP1, and POT1. Shelterin subunits are not the only proteins that associate with telomeres but they differ from other proteins by", "is caused by something inherent to the molecular structure of DNA and is associated with DNA-repeat instability. These fragile sites are thought to form hairpin structures on the lagging strand during replication from single-stranded DNA base-pairing with itself in the trinucleotide repeat region. These hairpin structures cause DNA breaks that lead to a higher frequency of recombination at these sites.\nRecombination hotspots are also thought to arise due to higher-order chromosome structure that make some areas of the chromosome more accessible to recombination than others. A double stranded-break initiation site was identified in mice and yeast, located at a common chromatin", "to separate. The cell avoids this problem by allowing its DNA-melting enzymes (helicases) to work concurrently with topoisomerases, which can chemically cleave the phosphate backbone of one of the strands so that it can swivel around the other. Helicases unwind the strands to facilitate the advance of sequence-reading enzymes such as DNA polymerase. Grooves Twin helical strands form the DNA backbone. Another double helix may be found by tracing the spaces, or grooves, between the strands. These voids are adjacent to the base pairs and may provide a binding site. As the strands are not directly opposite each other, the", "their DNA only across the first of the two membranes surrounding the recipient cytoplasm, and they use a different system, competence-derived rather than phage-derived, to transport one strand of the double-stranded DNA across the inner membrane into the cytoplasm.\nIf the cell's recombinational repair machinery finds a chromosomal sequence very similar to the incoming DNA, it replaces the former with the latter by homologous recombination, mediated by the cell's RecA protein. I the sequences are not identical this will produce a cell with a new genetic combination.  However, if the incoming DNA is not closely related to DNA sequences in the", "of DNA hairpin A constant magnetic force is applied to unzip the DNA hairpin, and reducing the force allows the hairpin to rezip. Prior to performing the downstream applications several unzipping and rezipping cycles are performed. While the magnetic force required to unzip and rezip may vary depending on the DNA sequence and hairpin length, their absolute values are not critical as long as they are consistent within a sequencing run. Detection of hybridization events When the DNA hairpin is unzipped into single-strand, oligonucleotides complementary to the hairpin sequence are allowed to hybridize. During the time course", "form, they can cause damage by a number of different mechanisms. Exposed single-stranded DNA can come under attack by endogenous mutagens, including DNA-modifying enzymes such as activation-induced cytidine deaminase, and can block replication forks to induce fork collapse and subsequent double-strand breaks. As well, R-loops may induce unscheduled replication by acting as a primer.\nR-loop accumulation has been associated with a number of diseases, including amyotrophic lateral sclerosis type 4 (ALS4), ataxia oculomotor apraxia type 2 (AOA2), Aicardi–Goutières syndrome, Angelman syndrome, Prader–Willi syndrome, and cancer. R-loops, Introns and DNA damage Introns are non-coding regions within genes that are transcribed along with", "site makes extensive hydrogen bonds with the DNA backbone. These interactions result in the DNA polymerase III closing around a correctly paired base. If a base is inserted and incorrectly paired, these interactions could not occur due to disruptions in hydrogen bonding and van der Waals interactions.\nDNA is read in the 3' → 5' direction, therefore, nucleotides are synthesized (or attached to the template strand) in the 5' → 3' direction. However, one of the parent strands of DNA is 3' → 5' while the other is 5' → 3'. To solve this, replication occurs in opposite directions. Heading towards", "pleading and was not at all convinced by it. It turned out, some years later, that this is exactly what does happen. Nick Cozzarelli and his co-workers showed that a special enzyme, called topoisomerase II, can cut both strands of a piece of DNA, pass another piece of DNA between the two ends, and then join the broken ends together again. It can thus unlink two linked DNA circles, and can even, at high enough concentrations of DNA, produce linked circles of DNA from separate ones. Awards and honors Cozzarelli was elected a Member of the National Academy of Sciences", "by rolling circle replication with the Phi 29 DNA polymerase which binds and replicates the DNA template. The newly synthesized strand is released from the circular template, resulting in a long single-stranded DNA comprising several head-to-tail copies of the circular template. The resulting nanoparticle self-assembles into a tight ball of DNA approximately 300 nanometers (nm) across. Nanoballs remain separated from each other because they are negatively charged naturally repel each other, reducing any tangling between different single stranded DNA lengths. DNA nanoball patterned array To obtain DNA sequence, the DNA nanoballs are attached to a patterned array flow cell.", "a lesser extent, their shape (see gel electrophoresis). The control lane (DNA probe without protein present) will contain a single band corresponding to the unbound DNA or RNA fragment. However, assuming that the protein is capable of binding to the fragment, the lane with a protein that binds present will contain another band that represents the larger, less mobile complex of nucleic acid probe bound to protein which is 'shifted' up on the gel (since it has moved more slowly).\nUnder the correct experimental conditions, the interaction between the DNA (or RNA) and protein is stabilized and the ratio of bound", "fragments maps binding sites to within ±300 base pairs, limiting specificity. Secondly, contaminating DNA presents a grave problem since so few genetic loci are cross-linked to the protein of interest, making any non-specific genomic DNA a significant source of background noise.\nTo address these problems, Rhee and Pugh revised the classic nuclease protection assay to develop ChIP-exo. This new ChIP technique relies on a lambda exonuclease that degrades only, and all, unbound double-stranded DNA in the 5′-3′ direction. Briefly, a protein of interest (engineering one with an epitope tag can be useful for immunoprecipitation) is crosslinked in vivo to its natural", "topoisomerases (including DNA gyrase) achieve this by adding negative supercoils to the DNA helix.\nBare single-stranded DNA tends to fold back on itself forming secondary structures; these structures can interfere with the movement of DNA polymerase. To prevent this, single-strand binding proteins bind to the DNA until a second strand is synthesized, preventing secondary structure formation.\nClamp proteins form a sliding clamp around DNA, helping the DNA polymerase maintain contact with its template, thereby assisting with processivity. The inner face of the clamp enables DNA to be threaded through it. Once the polymerase reaches the end of the template or detects double-stranded" ]
Why does the tray in a microwave rotate?
[ "Because there are hot and cooler spots due to the way the microwaves reflect around inside the oven. Rotating the food attempts to distribute the heat in the food more evenly." ]
[ "due to the different rates of energy absorption in different parts of the food. The first problem is reduced by a stirrer, a type of fan that reflects microwave energy to different parts of the oven as it rotates, or by a turntable or carousel that turns the food; turntables, however, may still leave spots, such as the center of the oven, which receive uneven energy distribution. The location of dead spots and hot spots in a microwave can be mapped out by placing a damp piece of thermal paper in the oven. When the water saturated paper is subjected", "shape that resonates with microwaves (like an organ pipe with sound waves). At the resonance frequency of the cavity microwaves remain inside the cavity and are not reflected back. Resonance means the cavity stores microwave energy and its ability to do this is given by the quality factor Q, defined by the following equation:\nThe higher the value of Q the higher the sensitivity of the spectrometer. The energy dissipated is the energy lost in one microwave period. Energy may be lost to the side walls of the cavity as microwaves may generate currents which in turn generate heat. A consequence", "this forms part of a rotating assembly, the sandwich may be curved. This allows energy selection in addition to collimation - the curvature of the collimator and its rotation will present a straight path only to one energy of neutrons. Only rays that are travelling nearly parallel to the holes will pass through them—any others will be absorbed by hitting the plate surface or the side of a hole. This ensures that rays are recorded in their proper place on the plate, producing a clear image.\nFor industrial radiography using gamma radiation sources such as iridium-192 or cobalt-60, a collimator (beam", "boiled and steamed taste that microwave-only cooking tends to create.\nIn order to aid browning, sometimes an accessory browning tray is used, usually composed of glass or porcelain. It makes food crisp by oxidizing the top layer until it turns brown. Ordinary plastic cookware is unsuitable for this purpose because it could melt.\nFrozen dinners, pies, and microwave popcorn bags often contain a susceptor made from thin aluminium film in the packaging or included on a small paper tray. The metal film absorbs microwave energy efficiently and consequently becomes extremely hot and radiates in the infrared, concentrating the heating of oil for", "(such as Starbucks novelty cups) or cups with metal lining. If any bit of the metal is exposed, all the outer shell will burst off the object or melt.\nThe high electrical fields generated inside a microwave often can be illustrated by placing a radiometer or neon glow-bulb inside the cooking chamber, creating glowing plasma inside the low-pressure bulb of the device. Direct microwave exposure Direct microwave exposure is not generally possible, as microwaves emitted by the source in a microwave oven are confined in the oven by the material out of which the oven is constructed. Furthermore, ovens are equipped", "from other directions would be out of phase and cancel. \nSince the microwaves had to pass through the plastic surface to reach the antennas, special low-loss plastic was used. Three of these plastic sheets were stacked upon each other, padded with polystyrene layers to add rigidity to the unit. All this was engineered into a 38 cm white plastic body with the BSB logo at the bottom. The low-noise block converter mounted in the center, behind the layers, was a standard unit similar to those in other satellite dishes, which converts the frequencies from the satellite down to", "system fed signals to the electronics in the display that rotated the timebase to the same angle. If the scanner were turned off and the brightness (gain) control of the display turned all the way up, the time base would cause a line to appear on the display at the angle the dish was currently pointed.\nWhen the scanner was turned on it rotated the dish clockwise through a complete circle 17 times a second. The time base ran at 2500 pps, which means there are about 147 pulses for every rotation, or about one pulse every 2.5 degrees. The time base", "dish was pointed towards the ground, causing a strong return that produced a sharp return on the display. Due to the circular scanning pattern, the dish would be pointed to the sides when the beam first struck the ground, continuing to strike the ground while the scanner continued rotating until it is pointed down, and then back up until the beam no longer intersects the ground again. Since the beam strikes the ground at a point closer to the aircraft when it is pointed straight down, the returns during this period are closest to the zero ring. When the reflector", "barbecuing delicate foods, such as mushrooms and vegetables. Using this method, sometimes called a hobo pack, food is wrapped in foil, then placed on the grill, preventing loss of moisture that may result in a less appealing texture.\nAs is the case with all metallic items, aluminium foil reacts to being placed in a microwave oven. This is because of the electromagnetic fields of the microwaves inducing electric currents in the foil and high potentials at the sharp points of the foil sheet; if the potential is sufficiently high, it will cause electric arcing to areas with lower potential, even to", "A framework that supports the reflector includes a mechanism that can be used to tilt it and also bend it appropriately. The mirror is never exactly paraboloidal, but it is always close enough for cooking purposes.\nSometimes the rotating reflector is located outdoors and the reflected sunlight passes through an opening in a wall into an indoor kitchen, often a large communal one, where the cooking is done.\nParaboloidal reflectors that have their centres of mass coincident with their focal points are useful. They can be easily turned to follow the sun's motions in the sky, rotating about any axis that passes", "to the microwave radiation it becomes hot enough to cause the dye to be released which will provide a visual representation of the microwaves. If multiple layers of paper are constructed in the oven with a sufficient distance between them a three-dimensional map can be created. Many store receipts are printed on thermal paper which allows this to be easily done at home.\nThe second problem is due to food composition and geometry, and must be addressed by the cook, by arranging the food so that it absorbs energy evenly, and periodically testing and shielding any parts of the food that", "popcorn or even browning surfaces of frozen foods. Heating packages or trays containing susceptors are designed for a single use and are then discarded as waste. Heating characteristics Microwave ovens produce heat directly within the food, but despite the common misconception that microwaved food cooks from the inside out, 2.45 GHz microwaves can only penetrate approximately 1 centimeter (0.39 in) into most foods. The inside portions of thicker foods are mainly heated by heat conducted from the outer 1 centimeter (0.39 in).\nUneven heating in microwaved food can be partly due to the uneven distribution of microwave energy inside the oven, and partly", "lid may not be needed and the food may be placed on an uncovered tray or in a bowl. If several foods are to be cooked separately, then they are placed in different containers.\nThe container of food is placed inside the solar cooker, which may be elevated on a brick, rock, metal trivet, or other heat sink, and the solar cooker is placed in direct sunlight. Foods that cook quickly may be added to the solar cooker later. Rice for a mid-day meal might be started early in the morning, with vegetables, cheese, or soup added to the solar cooker", "the parabolic dish. Being offset, the beams produced by the two dipoles were angled away from each other, to either side of the dish centreline. Normally the signals from both were added together and displayed, producing an output largely identical to the single-dipole case. The dipole shaft was mounted on another motor that rapidly spun them at 800 rpm. A switch was placed so that it was triggered by the motor when the dipoles were roughly vertical or roughly horizontal, triggering a second circuit that subtracted the signals from each other instead of adding. The result was the difference in signal", "is brought all the way around the central vertical axis of the cup and back to its original position.\nNote that after this rotation, the cup has been returned to its original orientation, but that its orientation with respect to the walls is twisted. In other words, if we lower the coffee cup to the floor of the room, the two bands will coil around each other in one full twist of a double helix. This is an example of orientation entanglement: the new orientation of the coffee cup embedded in the room is not actually the same as the old", "signal-to-noise ratio in turn allows a lower transmitter power, reducing exposure to EMR. Heating In microwave ovens, the waveguide leads to a radio-frequency-transparent port into the cooking chamber. As the fixed dimensions of the chamber and its physical closeness to the magnetron would normally create standing wave patterns in the chamber, the pattern is randomized by a motorized fan-like stirrer in the waveguide (more often in commercial ovens), or by a turntable that rotates the food (most common in consumer ovens). Lighting In microwave-excited lighting systems, such as a sulfur lamp, a magnetron provides the microwave field that is passed", "Microwave popcorn Microwave popcorn is a convenience food consisting of unpopped popcorn in an enhanced, sealed paper bag intended to be heated in a microwave oven. In addition to the dried corn, the bags typically contain cooking oil with sufficient saturated fat to solidify at room temperature, one or more seasonings (often salt), and natural or artificial flavorings or both. With the many different flavors, there are many different providers. Design The bag is typically partially folded when it is placed in a microwave, and inflates as a result of steam pressure from the heated kernels.\nThe design of a microwave", "waves in the tube, which acts as an open-ended resonant cavity, and is formed into a beam, which radiates through a window in the side of the tube into a waveguide. The spent electron beam is absorbed by a collector electrode at the end of the tube.\nAs in other linear-beam microwave tubes, the energy of the output electromagnetic waves comes from the kinetic energy of the electron beam, which is due to the accelerating anode voltage. In the region before the resonant cavity where the magnetic field strength is increasing, it compresses the electron beam, converting the longitudinal", "Penetration depth of microwaves is dependent on food composition and the frequency, with lower microwave frequencies (longer wavelengths) penetrating further. Control panel Modern microwave ovens use either an analog dial-type timer or a digital control panel for operation. Control panels feature an LED, liquid crystal or vacuum fluorescent display, in the 90s brands such as Panasonic and GE began offering models with a scrolling-text display showing cooking instructions, numeric buttons for entering the cook time, a power level selection feature and other possible functions such as a defrost setting and pre-programmed settings for different food types, such as meat, fish,", "gray in colour, usually making them easily identifiable; the cardboard sleeves included with Hot Pockets, which have a silver surface on the inside, are a good example of such packaging. Microwavable cardboard packaging may also contain overhead ceramic patches which function in the same way. The technical term for such a microwave-absorbing patch is a susceptor. Effects on food and nutrients Any form of cooking will destroy some nutrients in food, but the key variables are how much water is used in the cooking, how long the food is cooked, and at what temperature. Nutrients are primarily lost by leaching", "Isolator (microwave) An isolator is a two-port device that transmits microwave or radio frequency power in one direction only. It is used to shield equipment on its input side, from the effects of conditions on its output side; for example, to prevent a microwave source being detuned by a mismatched load. Resonance absorption In this type the ferrite absorbs energy from the microwave signal travelling in one direction. A suitable rotating magnetic field is found in the TE₁₀ mode of rectangular waveguide. The rotating field exists away from the centre-line of the broad wall, over the full height of the", "its focal length, so the focus is within the dish. This can lead to the focus being difficult to access. An alternative approach is exemplified by the Scheffler Reflector, named after its inventor, Wolfgang Scheffler. This is a paraboloidal mirror which is rotated about axes that pass through its centre of mass, but this does not coincide with the focus, which is outside the dish. If the reflector were a rigid paraboloid, the focus would move as the dish turns. To avoid this, the reflector is flexible, and is bent as it rotates so as to keep the focus stationary.", "main lobe) is no longer perpendicular to the rods, but the radiation pattern will have lobes at an angle to the rods, making it advantageous to be able to adjust them to various angles Whip antenna Some portable televisions use a whip antenna. This consists of a single telescoping rod about a meter long attached to the television, which can be retracted when not in use. It functions as a quarter-wave monopole antenna. The other side of the feedline is connected to the ground plane on the TV's circuit board, which acts as ground. The whip", "similar to that of the loudspeaker without the aperiodic membrane and electronic processor. Dipole enclosures A dipole enclosure in its simplest form is a driver located on a flat baffle panel, similar to older open back cabinet designs. The baffle's edges are sometimes folded back to reduce its apparent size, creating a sort of open-backed box. A rectangular cross-section is more common than curved ones since it is easier to fabricate in a folded form than a circular one. The baffle dimensions are typically chosen to obtain a particular low-frequency response, with larger dimensions giving a lower frequency before the", "microwave cavity resonators, the \"catcher\" and the \"buncher\". When used as an amplifier, the weak microwave signal to be amplified is applied to the buncher cavity through a coaxial cable or waveguide, and the amplified signal is extracted from the catcher cavity.\nAt one end of the tube is the hot cathode which produces electrons when heated by a filament. The electrons are attracted to and pass through an anode cylinder at a high positive potential; the cathode and anode act as an electron gun to produce a high velocity stream of electrons. An external electromagnet winding creates", "been much publicity about analysis of results from the Wilkinson Microwave Anisotropy Probe (WMAP) and Planck mission that show both expected and unexpected anisotropies in the CMB. The motion of the solar system, and the orientation of the plane of the ecliptic are aligned with features of the microwave sky, which on conventional thinking are caused by structure at the edge of the observable universe. Specifically, with respect to the ecliptic plane the \"top half\" of the CMB is slightly cooler than the \"bottom half\"; furthermore, the quadrupole and octupole axes are only a few degrees apart, and these axes", "symmetrically within each cell of a periodic split-ring resonator array which achieved negative propagation of electromagnetic waves in the microwave region. The concept was and still is used to build interacting elements smaller than the applied electromagnetic radiation. In addition, the spacing between, referred to as the lattice constant, is also smaller than the applied radiation.\nAdditionally, the splits in the ring allow the SRR unit to achieve resonance at wavelengths much larger than the diameter of the ring. The unit is designed to generate a large capacitance, lower the resonant frequency, and concentrate the electric field. Combining units creates a", "waved under the handle of the pan, which begins the cooking process; each recipe card can incorporate 23 separate recipe steps. The recipe cards have cooking steps to follow that are indicated by a beeping sound from the induction heater. The system can cook almost all types of food, including cakes and fried foods.\nEach pan is embedded with a RFID tag in the handle of cookware, which is covered by a special pan tag that protects the RFID tag from heat and moisture. A temperature sensor connected to the RFID tag is imbedded within a tunnel in the bottom center", "cast a shadow onto the reflector. The whole reflector receives energy, which is then focused onto the receiver. This is frequently done, for example, in satellite-TV receiving dishes, and also in some types of astronomical telescope (e.g., the Green Bank Telescope).\nAccurate off-axis reflectors, for use in solar furnaces and other non-critical applications, can be made quite simply by using a rotating furnace, in which the container of molten glass is offset from the axis of rotation. To make less accurate ones, suitable as satellite dishes, the shape is designed by a computer, then multiple dishes are stamped out of", "sold has a protective interlock so that it cannot be run when the door is open or improperly latched.\nMicrowaves generated in microwave ovens cease to exist once the electrical power is turned off. They do not remain in the food when the power is turned off, any more than light from an electric lamp remains in the walls and furnishings of a room when the lamp is turned off. They do not make the food or the oven radioactive. Compared to conventional cooking, the nutritional content of some foods may be altered differently, but generally in a positive way by" ]
why child support is based on income rather than what a child would need monthly.
[ "Child support is partially based on income. It is also partially based on the number of children and their age, the cost of basic living expenses and school in that general area, and whether or not any special needs are present. Which sometimes leads to a very high ratio, but that is also something that can happen when both parents live with their children; not all jobs pay a wage that covers a child's reasonable expenses. That doesn't mean those expenses don't occur though.", "It is because it makes the payments easy to calculate. Calculating how much a child actually needs would be a burden on the courts as people brought in expert witnesses and evidence every single time. It would vary over time and you'd have to change court ordered withholding every few years. Basing it on salary is easier for everyone. In Texas, there is kind of a cap unless you can prove special needs.", "This unfortunately is the result of one or both parties involved NOT being grown ass adults regarding the best interests of their kid(s).... And thus, bureaucracy is the only mediator remaining. Sprinkle in time + continued stupidity and you get this \"system\" (relative from state to state) that becomes the rule and not the exception. \n\nIf adults would just act accordingly and make choices based on merit and understanding instead of malice and contempt, I believe this would not be such a problem.", "The children are the first priority and the state doesn't want the children to suffer a change in circumstance just because of a divorce. If they were rich because of the parent that left they should not suddenly struggle, if the supporting parent still has that income. A friend pays 5600 a month on a salary of 160k with child support and alimony combined. 3600 is temporary alimony. Spouse earns 48k. In this case, unfortunately, the needs of the child (and upkeep of 'standard of living accustomed to') may have been exploited in court as an excuse to support the spending habits of the spouse.", "I'm an attorney in Texas, but there are too many non-replies for me to think this will be seen... So, it'll be kept short and I shall expand if this comment gets visability.\n\n1. The ultimate standard is the need to the child with past income levels dictating what the child needs... A child who is attending private school should continue. A child who goes skiing every winter, and summer camp every summer continues. A child that lives in a nice house, eats out with their parents every day, and a new toy every day is suppose to continue that lifestyle.\n\n2. The income percentages are a base line, they are where you start but if you want to prove in court that those levels are not correct one can do that... That said, dropping 30-50k on a full divorce trial is not crazy numbers. Most people just do not have that. So, the economy class solution is to just not fight over this and get the standard percentage.", "Because the system is fucked.\n\nChicago Blackhawks player Duncan Keith had his settlement, and as a successful sports star, makes a lot of money. His support to his ex wife is like $16k... a month. The cost of having a child before college is around 250k, 300k MAX, from 0-18 years. \n\nShe's getting 200k. A year. Almost enough to support a new child every year, for the next 18 years.\n\nEdit: changed some things with updated facts", "It's your kid and you're obligated to support it in the same manner as if you had custody. I make a ton of money, and my daughter gets expensive private school, lives in an awesome apartment with pool, etc. I shouldn't be able to save money on her by leaving my wife.", "Out of curiosity, everyone here seems to agree the various systems are wrong. Does anyone have an eloquent solution that a real legislature could pass as a law that would universally solve the issues for everyone?", "A very good reason that child support is the way it is is that in the past, if a young man knocked up a young woman out of wedlock, it was designed to support her as well. Think of it like a shotgun wedding. Back then a young woman would find it extremely difficult to find a husband with a kid. She would be left supporting herself and the kid for the rest of her life. Well, if you're not going to marry her...\n\nOf course in our modern world its unnecessary and even detrimental to men and our society. But it was a very valid reason at one point.\n\nIt is my opinion, and most of you would not agree, that there should be no mandatory child support anymore. In a world where a woman can unilaterally decide whether or not she will have a child even after she is pregnant, or even if she will care for it after it is born, it is unethical to hold someone to a decision he has no say in. If a woman doesn't have to have a child even if she's pregnant, or doesnt have to raise a child when she has one, why should a man?", "Or vis versa. My best friend (female) makes 100 a year on an executive track to pay her ex husband and his new wife (who refuse to finish a college degree or job with benefits between them) half of her monthly income. Between that, mortgage, and her student loans she's basically broke. It's absurd, but don't make it sexist too.", "In Australia the calculation starts with a basic minimum amount for living that both parents are entitled to, and then a ratio based both on care % and income, so that care % and money equal out overall. If the person with the greater care percentage also has a greater income above the minimal survival income rate, the child support rate owed is less. If otherwise, the rate is directly proportionate to income.\n\nThe idea is explained in the calculations that they don't want the child to be at an economic disadvantage when in either parent's care, so the lower % care parent has to be economically stable, but the main custodial parent also needs assistance when it's available. The other idea in all this is that hypothetically, the ceiling on the amount of money that could benefit a child's development is so high that it can be ignored, so once the first idea is honoured, it only scales with income. The more income, the better for society, statistically speaking.\n\nSource: I used to pay my ex child support, and now I have my son living with me, I receive no child support because I have a job and my ex doesn't. I know the US is different but I still think you could probably remove the gendered assumptions in your OP there, especially for all the single dads out there who never get recognition. My apartment sure as fuck isn't free; I never had to work 60 hours to support my son from afar, but could probably use that 60 hours worth of pay now that I do it on my own.", "The idea that a child should continue to live the same lifestyle as before a divorce is ridiculous. It is not founded in reality. Everyone suffers financially from a divorce. You take one pool of money, be it the income of one or both spouses and then have to divide it into thirds: one third each for new homes for each parent and the other third goes to supporting the divorce industry of lawyers, two sets of clothes, books, toys, etc. To act like the predivorce money covers the family in the same way is irresponsible of the courts. And child should feel the effect of it so they don't live in a fantasy world, just as they would if the parents were still married and suffered a financial setback.", "The custodial parent should have to account for how the money received was spent. If they don't use it, they lose it. I think of the thousands of dollar in \"child support\" my own mother drank away. It's disgusting.", "Brutal topic I know all too well. I really feel for the stories I've read here. It will get better, and no matter what our kids are worth it. I'm a remarried dad, we have 50/50 legal but I have residential custody, and have him 75% of the time or more, we offered to pay all of his concrete expenses w childcare and health insurance, she and court agreed, and we feel very satisfied. The system with which they figure things out is unrealistic and I believe cause more problems than it solves. Nothing used to bother me more than to send 700 a month to find out she was being evicted or losing her car, or didn't pay bills, it was pathetic. If your taking this much money from people you should come up with a way to ensure its spent on its purpose. Good luck everyone.", "Many men can't. It drives some to suicide and others to poverty. \n\nWhy do you think marriage rates are declining? Changes in social dynamics over the past 50 years combined with laws like this play a huge role.", "I was told by a clerk in the Child Support System that the reason it's 20% of your pay is because they expect you to not only provide the support, but provide enough of it that the Child can effectively live the same lifestyle they would be living if you were still in the home. \nSo if Mom is a server at a restaurant and Dad is a CEO, little Susie is supposed to be living the life of a CEO's daughter, not that of a server's daughter. (I am not looking down on anyone's job, I only said server because that's what I do.)", "It's not fair. It's not based on what is in the child's best interest. The mission of child support enforcement is to get as much money as possible. Period. If that ruins the father financially, then so be it. If it means incarceration for inability to pay, then tough shit. CSE doesn't count that as a loss because the judgement is still there even if the father is in jail. The fact that the child will suffer financially and emotionally by the father being in jail doesn't mean shit to CSE. Don't believe me? Check out their mission statement: \n\n_URL_0_", "Child support is determined, 99% of the time, by a straightforward calculator. Often this takes into account cost of living. There are a lot of indirect expenses. An extra room, a premium to be in a good school district, etc. Child support is also the right of the child. So even if I wanted to, I can't legally absolve my ex of support, because it's not mine to turn down.\n\nRe: the comments here about courts favouring mothers - maybe in some areas, but generally, that's not the case. It's often sour grapes. Any family lawyer will tell you that.", "I make 9.50$ I don't have a license or car I brig home roughly 650 before child support every 2 weeks and after I bring hone 300 I have to survive off 600 a month I can't afford to save ever barely afforded presents this year life is gonna suck for another 12 years", "I'm currently in a situation that has almost made me not see the point in living anymore.\n\nI was married for 8 and a half years to a woman that was extremely unfaithful, I knew this from the beginning since she was married when I met her...The biggest sign. But when you're young dumb full of cum and on a mission, you ignore the obvious.\n\nEver since a kid I wanted to raise kids, some people have goals to be astronauts etc., not me. I wanted to raise kids with a life better than I had.\n\nI ended up having 3 beautiful kids in this relationship I constantly tried to make work for them. She couldn't handle being alone with the kids and insisted I be a stay at home dad, I had no issue with this since I loved raising muh babies. I was the primary guardian for my lil ones almost the entire marriage. I even helped raise her two younger brothers from the ages of 13-17 and 16-18 because my wifes mother could not handle them anymore in her own words. The 13 year old was failing all his classes, stealing credit cards, etc. He comes to live with me becomes a straight A student and is a good kid. The 16 year old graduates and goes to college. Meanwhile I'm raising 4 kids at this point at the age of 22. No problem, I love children!\n\nFew years down the line she runs away with my kids to a different state, of course I move there and she begs me to come back I do. Maybe 15 minutes away from where her mom lives. Ok. Her mom visits maybe once a year? Meanwhile my family drives halfway across the country to see the babies, flys my kids back home so they can enjoy them as well. They are great kids extremely healthy etc.\n\nI'm completely illiterate when it comes to do with anything court related and my ex is taking full advantage of it. She files for divorce I let it default because we wrote out terms and had them notified thinking they were the terms we agreed upon. NOPE. She gets full custody of my kids she barely raised even though I spent day in and day out changing diapers, raising them with good morals etc. Now I have to pay to see my kids along with child support even though I've never had any kind of altercations around my kids ever. She's court ordered to let them call whenever they want and vice versa. A span of 4 months go by without a word me sending emails begging to just let them call because I can't afford visitation without a word. I finally get on my feet enough to afford to pay someone for visitation and it costs the same as the child support so I'm forced to either pay it and not see my kids or pay for visitation. After telling the visitation lady about the scenario she says she's alienating you from the kids.\n\nIt's put me under tremendous stress, I'm so depressed to the point now where I don't even function correctly anymore, I've lost nearly 50 lbs, recently lost my job so there goes visits, but wait I can at least talk to my kids, nope. She cuts off phone calls again, fathers day and my birthday on the same day and I hear nothing. Finally get to talk to them and the first question they ask is \"dad why haven't you been calling.\" It's christmas and the only thing that would make me happier is to be able to say merry christmas to them, nope. This is the cruelest joke I've ever been in. I can no longer afford anything and it feels like i'm withering away. I'm to the point now, do I even want my kids to see me like this.\n\nNow I can possibly go to jail for not paying child support on top of it, it's debilitating.", "It's based on maintaining the same lifestyle the child was experiencing while with both parents.", "I'm a father in Texas. My ex lost custody of all three of her children due to drug addiction and abuse. CPS gave my son to me on two different occasions and his mom came and kidnapped him. I received zero assistance from anyone. I was told by CPS that if she hurt my son I would be held liable and prosecuted but I couldn't physically remove him from her because she was the mother. I paid child support the entire time I had him. My ex received disability and SSI payments for my son while I had him and I was paying for daycare and child support. The last time I got a text from her saying that I needed to come to a different city and pick him up or CPS was taking him (she moved against court order but I had to hire a private attorney to enforce it and I didn't have the money ). When I picked him up the place they were staying had no working sewage and my son had lice. The state of Texas has offered only hurdles for me even though my ex has screwed up repeatedly. I just found out recently that my ex filed a complaint and now my sons medicaid is being terminated and I will have to pay $1000+ a month for his doctor visits and medication because she decided that if she wasn't getting all of the money then no one would get it. I was told I would have to hire a private attorney to get his benefits back even though she only had to file a verbal complaint to end everything. Texas favors the mother. End of discussion.", "What a child 'needs' is subjective. Sure we can all agree on clothes and food. But what about things like music lessons? Organized sports? A personal computer? Obviously a child can survive without them, but these are things a parent should provide, if they can afford it. A child's needs increase when you have more money to pay for them, so child support should increase too", "What gets me is people having to pay support when there is 50/50 custody... Like why?", "Well, this is my story. When I was 32 I dated a recently divorced woman with two kids for two months. She lied about using birth control, I did not use a condom every time, it was my mistake. Five weeks into our dating relationship she started talking about wanting a kid with me and that threw up red flags and I cut things off with her. Two months after that she is with another guy. She calls me out of the blue and tells me she is pregnant, wanted to get back together. After doing the maths it was determined that it was my child most likely and she stated that she was not sexual active with the other guy. I supported her emotionally through the pregnancy, after baby was born he did the parental testing and I am bio dad. She ended up getting an apartment right next door to me and I supported her and my child for the first two years but we were not in a relationship but I was single for the first year while she was dating someone else. \n\nShe did not accept child support from the father of her other two kids and he was also in jail for domestic abuse and stalking awhile she was pregnant. She turned down child support from me as well when offered through the state because she deemed it unfair to expect me to pay child support when her ex husband did not. \n\nThe mom was on state healthcare at the time and it covered the pre-natal and hospital costs for the complications at birth which ended up having a mild form of cerebral palsy. Mother later confided that she became depressed and abused alcohol and chain smoked while pregnant in hopes that she would miscarry.\n\n My son needed a lot of therapy, medication management, and surgery and was accepted into Shriners and had a lot of care provided at no cost. Mom ended up going completely on welfare by not working so that she could take care of baby. I worked full time, lived next door to mom and baby, and provided financial support when needed/asked to cover medical and basic needs.\n\nThree years later after my son was born the State filed for child support on behalf of the mom to recoup costs for mom being on welfare. I was ordered to pay $400/month and from day one of final support order I was in arrears of three years of backdated child support from time of my sons birth amounting to $20K. Since I was automatically over the limit of 10K they took my passport and suspended my drivers license and wages were automatically garnished. My child support + arrears is 60% of my gross paycheck before taxes. At the time of the calculation I was making $13/hour full time at 40 hours as the Resident Care Coordinator at an assisted living facility and was a CNA.\n\nI was making around $2K a month at the time of the calculation and they take about $750 off the top before state and federal taxes. After Insurance and Taxes my 2K gross turns into about $900 net. They also take all of my federal and state tax returns. \n\nI was able to get my drivers license back by applying for a hardship as my employment requires driving.\n\nI now work about 60+ hours a week between two jobs just to make up the offset of income due to child support and arrears which is easy for me to do since I work in the behavioral/mental health Adult Foster Care system as a Resident Manager/Certified Substitute Caregiver and my shifts are either 16 hour or 24 hour shifts. I have three day weekends though, which is nice.\n\nWhen it's all said and done, mom only gets a couple hundred of month out of the $700/month I pay. She is not hurting all though - she gets around $15K a year from taxes for three kids and she gets SSD for my son while also working part time and living with her fiance for the past five years in his house who makes a decent paycheck as well.\n\nMom and I are still friends and on good terms - I see my kid every week and while she longer lives next door to me we both have moved and live about 15 mins from each other. My kid is pretty awesome, he is very high functioning although he will forever be at a age 7 on a cogitative level otherwise he has a pretty normal life. Physical defects are not visible, he has internal problems with partial paralysis affecting muscle control on the left side of his body and a seizure disorder but you would not know it from looking at him - he runs, jumps, plays hard, tumbles around, rides bikes, thrown balls. etc. With finer motor skills he has more of an issue like with writing or painting.", "I'm someone who works for an agency having to do with child support. Obviously this is a throwaway. First, a child deserves two parent incomes and to live the lifestyle their actual parent can provide. If you were still together and had the kid, you'd want the best life for your kid, right? Why should that be different because you chose to bring a kid into the world and you're no longer together? If you make $100k and she makes 30k and you have a kid, obviously you're going to be paying child support if a kid enters the picture. This is no surprise. \n\nBased on these posts, I'm sorry reddit's other seems half sucks, but the truth is you choose him or her. Was she into being manipulative when you first got together? Was he a shady person to begin with? Was he/she a one night stand? Did he/she get money under the table and now you can't get monet from him/her for child support? Then you KNEW what you were getting into. \n\nI know most of you believe that support isnt being used correctly, but the fact is that most dads are deadbeats and don't pay (when we know they can afford it) and the moms are whiners. Dude, You can pay to go on vacation, but not child support? He's supposed to help support your kid lady, not pay your entire rent. Child is NOT going away. You will pay it forever unless your child or custodial party dies. Having another kid with the same or multiple woman is just going to get you deeper into debt. \n\nIf you have any doubts about having a kid or having one with your partner, don't do it! You know how the system works and even if you're one of the good guys who wants to help out your child by paying the custodial party directly, you can still end up and be stuck in a system that caters mostly to deadbeats. I understand that people get upset when their license is taken away and they can't work, but for a lot of cases, no money would have been paid otherwise. Go to court and get an attorney if you really can't make ends meet. The attorney may be costly in the short term, but will help in the long run. Even if you can't afford an attorney, represent yourself and bring all the information requested. \n\nBe prepared that once you bring a kid into this world, your relationship may not work out and you will owe a lot of money! Actually, by even bringing a kid into this world, you will still owe a lot of money. Kids are expensive. Period. \n\n And if you're not married (the kid is automatically yours if conceived during marriage)don't sign anything saying you're the father until you have a DNA test. I've seen fathers devastated 5 years after when they find out little Billy isn't theirs and they still have to pay child support. You signed a legal document saying you were the father. I didn't make you sign. If you aren't married, get a DNA test done just to be sure he's really yours. I don't care I'd she yells or screams. She probably will yell about something else, too, anyway. I've had women come to me and name 5 possible fathers and we have to rule them out one by one. \n\nAlways - for goodness sake - use a condom if you don't want a kid! Thats your life savings right there.", "If you marry a shitty person, or you are a shitty person who truly wrecked someone, managing child support payments is not a problem. Almost all mothers will work with a father on hard times, if only to keep their own children from hating them. is the system broken? Of course. It's just horrible, but it's not the system fucking you, it's the person on the other side. If you marry a terrible person, or you are terrible to your spouse you will have a bad time. I have seen good divorces and bad divorces, and it really comes down to if there was a bad person in the marriage. \n\nSo my advice is, don't have a kid with someone unless you are married to them. Do whatever it takes not to have that kid until you are married. Next make sure this is a good and decent person. Not just good and decent to you, but is good and decent when no one else would know if they weren't. Someone who is good to another even when they would never see them again anyways. When in a fight, cuts the middle and negotiates. Is willing to lose to save a relationship. Next be that decent person too. So even if, things don't work out, you'll always be able to come to an equitable arrangement. If you don't do this, if you marry the hot girl/guy who is entertaining and takes advantage of others, is not considerate when no one is paying attention, just don't be surprised when they turn on you and abuse you.\n\nTl;dr The system can be abused, but it usually works. Where you see it breaking down is when people are abusing it because they are a shitty person", "A long time ago I had a guy who worked for me in a warehouse. He took home about $400 a week. Before he worked for me he had his own BBQ place bringing home about $800 a week. His child support was $370. He worked 40 hours a week for $30. Really nice guy too. White guy from West Virginia, Muslim just a salt of the earth kinda guy. Was thrown in jail cause he couldn't keep up on his child support. How is he suppose to live on $30 a week. Tried for two years to get child support reduced.", "Reading through this thread adds on to how important finding the right person is. Personality and character trumps good looks all the way", "Why dont women pay child support? If the kids are older they should work too", "So I have a question. How would it work when the dad has 2 children from 2 different women? Wondering bc I am about to divorce my husband bc he has knocked up some other gal. He is trying to convince me to stay married so that he isn't paying 2 child supports. I am planning on divorcing him but at the same time don't want to screw him over for child support.", "Part of the reason they go by percentage is for wealthy living families. If my kids, for example, are 15 and in the best private school in the country and used to living a certain lifestyle than the $1500 a month that would support a normal child might not support this example child. \n\nThat being said the whole system is fucked from the experiences of those around me.", "Why can't fathers decide to whether or not to keep the child? If they don't want it, then they pay for the abortion. If they don't want it, but the mother does, why should the father be force to pay? It was the mother's decision to keep it so it should be her responsibility if the father is more than willing to pay for the abortion.", "Seems that no one here is actually answering the question.\n\nIt's based off of income because the idea is that the child should maintain the lifestyle it had before the separation of the parents. At least, that's in the US. I can't give any insight into other countries child support laws.", "I need to get knocked up. This paying more in taxes and not getting an extra income sucks.\n\n\n\nTotally kidding", "There are several reasons why it is based on the parent's income rather than the child's needs. I think the first important reason is that support is a floor. That is, it is the minimum needed to keep a child fed, clothed, housed, etc. The court cannot order parents to go above and beyond, because then it would be veering off into the realm of defining how parents should parent on a day to day basis. This is absolutely unconstitutional. So the courts have to balance competing interests within this constitutional framework that respects a parent's rights.\n\n\nMore directly, if child support is based solely on the child's needs, then what is the standard of determining what is a \"need\" and what is not? This dovetails nicely with the above, but it is slightly different. For example, you will end up with the paying parent saying, \"She doesn't need new clothes, what she's got is perfectly good.\", just so they don't have to pay more. The receiving parent might retaliate by signing the kid up for ballet and violin and swimming just to make the paying parent cough up more money (people actually do stoop this low in family law, btw). Result: cue endless litigation.\n\n\nAs well, income based support provides predictability. This is similar to the above, and courts love predictability. So do most people. Because the amount that a child needs can fluctuate based on many different factors (age, health, activities), setting support relative to the child's \"needs\" would create unpredictability. That isn't great for either parent. The paying parent will continually see requests for more, and more, and more, while the other parent would have the ability to manipulate those amounts as they please. And people do try; I've seen it.\n\n\nAnother factor is that, at least in Washington, support can only be modified in one of two ways. One is a substantial change in circumstances, which would be something like losing your job. The other circumstance would be by right once every two years. So here, you would be asking the court to look at the paying parent's income and adjust child support accordingly. So if the paying parent has gotten a couple of nice raises (say a $5,000 raise and then a $2,500 raise) over the last two years, that can be accounted for. What this does is it prevents people from clogging the courts with petty requests for adjustments.\n\n\nIf on the other hand, it was based on the amount that a child needs per month, you would see many more of these petty requests. For example, let's say the paying parent goes out and buys a new car. The receiving parent sees them pull up in their sweet new 'Vette, and then decides the kid needs a bunch of new things - and that the paying parent should pay for it. It's pretty easy to see how this can get out of hand. And if you think that people aren't this silly, well, go work in family law for a few years.\n\n\nSomething else worth considering is that many of the child's potential needs are usually sorted via other clauses in the order of child support. Here, it is standard to allocate certain expenses (medical, educational) in proportion to each parent's income. So if little Jenny gets in a horrible accident and racks up $30,000 in medical expenses, the paying parent (if they make say, $55,000 out of $100,000 combined between the two parents) would be required to pay 55% of the balance after insurance kicks in. The receiving parent would pay 45%. Similarly, the parents can also agree to share costs above and beyond medical and education. They might agree, for example, to split the cost of putting little Tommy in youth sports, or to split the cost of summer camp. So parents can consider what a child needs, and factor that into their final order. If it is a litigated expense, like little Tommy has *always* participated in AYSO, but now one parent suddenly doesn't want to pay, then the court will step in and require them to pay their proportionate share.\n\n\nTLDR: The court orders are going to be formally set based on what you can actually pay. Courts can't reach into families and tell parents how to be parents, only that they have a floor beneath which they cannot go. This protects both parties from abuse and retaliation, and promotes judicial economy. At the same time, people aren't precluded from coming up with their own method of accounting for things that go above and beyond basic necessities, education, and medical.\n\nSource: am family law paralegal, will be family law attorney from January 15 on.", "Something I'd really like to see happen with child support is that the money goes into an escrow account which only releases funds when both parents agree on a purchase for the child. Once the child reaches 16, they get added to the escrow account and get a say on how their money is spent. If the kid thinks his parents are abusing *his* money, he can say no to the withdrawals. At 18 the parents are removed from the account and it becomes available to the child directly.\n\nThe absent parent has assurance that their monetary support is being used for the kid and not being abused by the other parent. School books, food, clothes, field trips, summer camp, gas money, Disneyland... anything that *both* parents agree on is fair game.\n If the supported parent thinks the the supporting parent is being stingy on what they are releasing for the account then they can complain and have the account audited. If the supported parent doesn't use all the money each month then it simply builds up in the account for a rainy day to eventually be released to the kid for whatever they want to use in the future. Car, college, ect. \n\nedit: additionally, the kid gets an opportunity to learn some personal finance when they added to the escrow account and have a say in how their money is spent.", "So, let me get this straight.\n\nTwo people meet, they both have completed their education etc. and both earn exactly $50,000 a year each.\n\nThey save the exact same amount of money every month and they spend the exact same amount a month. They get married and use their savings, totaling 50% of each persons savings, and buy a house.\n\nThey then have two kids together.\n\nNone of the above has changed, wage is identical, saving and spending identical etc., now they get divorced.\n\nMan applies for joint custody of Children, woman gets full custody. Why?\n\nMan then has to pay 50% of his income to ex-wife to support children.\n\nWoman remains in the home as she is with the children, but he is still liable for 50% of the debt owed on the house.\n\nSo with all things being equal, in a divorce, he loses his kids, his home - even though he's still 50% liable for it's expense, he now operates on 25% of the marital income to try and find somewhere else to live whilst still paying for the original house, and she operates on 75% of the original income and is only responsible for 50% of the cost of the home she now owns.\n\nHow is this legal?", "It is a dated system. Back when it was first introduced, most households relied on a single income, and divorces were really quite rare (usually granted for serious problems only). The idea was that one member of a couple would sacrifice their career to stay at home and raise the children, the other would earn the money. Ideally, the money earned would be split among the members of the household (so typically a decent sum was given to the stay-at-home parent, for the purpose of taking care of the children). Based on that notion, a recipient of child support gets a \"split\" of the payees wages, to simulate the wages that would have been allocated to the children's expenses. \n\nAs for the second part of your post, people getting free apartments and pulling in bulk money for no real purpose is the result of the model being so dated. Often a divorcee will find a new partner and double dip. It is also far more common for households to be dual income these days, so the concept is really silly now (given both parents can now pursue a career AND still raise their children).", "To give you another end of the spectrum, my ex-husband refuses to work, and lives off his girlfriend. He calls his addiction to drugs a \"disability\" (un-certified, no sdi payments, and no jobs in the last 3 years). He pays no child support despite having two children, one of them severely deaf. I work 60 hours a week raising and paying for 100% - including $1500 hearing aides, speech therapy, ASL classes, and a special school. There are severe stories on both sides of the fence. There are shitty people out there who just know how to work the system, and dont have the morals to stop themselves.", "Either party should have to prove what the Child Support is going to, like some will get the child support and it goes to what they want and not enough to the child. \n\nOr as soon as child support is paid, it should be transferred in to food and items fund, where you only get what you need depending on the children's age. Clothing, Food, Toys ect. Not talking about Donations of reused items, Like give them a voucher for like Wal Mart that can not be transferred in to cash.", "I suspect that a lot of the stories you've been hearing are just that - stories. I work for a payroll company and see exactly what people are paying. To say that the majority or even a measurable minority of custodial parents are living it up on child support is pretty laughable. Unless you consider $17/week \"living it up.\" That doesn't even buy school lunch! Father of The Year right there.", "To add to the reasons of everyone else I have to say child support is not only indemnifying but also punitive in nature. The country prospers when families are nuclear and stick together. Child support is a means of giving incentive to families to stick together.", "Shit like this, in addition to being the only gender not protected from genital mutilation at birth. This is why MRA and The Red Pill are desperately needed and why feminists are evil scumbags for directly creating and supporting this state of affairs.", "Double standard: Women have an absolute say in aborting or not a baby, while men are absolutely never given the option not to acknowledge and \"provide\" for the kid.", "Child support payments is the most fucked up law ever. I fucking rage when i read some of these comments.", "I'm late to the party and this will never see the light of day but I'll write it anyway to make myself feel better.\n\nThe answer to OP's question is that we have an antiquated bullshit system based on a time when it was assumed that the mans job was to make money and the woman's job was to raise the kids. I filed for divorce in 2012 because my wife was cheating on me and wouldn't stop doing it or lying about it despite me catching her red handed and dragging her to marriage therapy for months. I gave up and filed for divorce.\n\nWe had a one year old girl and was (still am) an excellent father. My lawyer and the mediator both told me, essentially, that despite the circumstances of the divorce that unless I could prove my wife was criminally negligent (drug addict or physically abusive, basically) that she would get primary custody if she wanted it and I would pay child support. My lawyer went as far as to jokingly refer to this as \"the penis penalty\" of divorce.\n\nAt multiple lawyers urgings and advisement that a fight in court would just cost me more money with the same ultimate outcome, I caved and agreed to \"joint custody with mother as primary\" in mediation. Despite having my daughter essentially 50% of the time I pay child support to my ex as is I was a deadbeat dad. In a sense, I pay twice to support my daughter - all her expenses at my house and all at her moms house (and then some, I pay $1800/month due to what I make). My ex owns a house and a condo. She has a good job that pays plenty. I try not to think about how unfair the situation is but its hard sometimes.\n\nPeople talk about how the world is stacked against women all the time and I get it - I've seen some of it in my career and I empathize for sure. But in the realm of family law it's disgusting how men - good men and good fathers - get shafted and fucked over by unscrupulous women and the laws & judges that perpetuate and even encourage the behavior.", "I got custody of my 2 daughters after 7 years of complete and utter bullshit in MA. They were meal tickets to my ex who used them as pawns to make her life as cushy as possible. She even filed a false diability claim on behalf of our younger daughter (who legitimately has a pysical disability) and she pocketed the money for 7 years.\n\nThe only thing I did that saved me was that I didn't pay through the state. I paid her directly and it kept me with some power. At the time I told her if she went through the department of revenue, I'd fall off the map and she'd never get a dime. I wouldn't have, but it worked and gave me some leverage.\n\nI got my girls every weekend, every school break and all summer. It allowed my ex the time she wanted to get her floozy merit badges and allowed me to bond with my girls. They finally just decided they didn't want to go back. I got lucky....\n\nMassachusetts is a brutal place for Dad's rights, I know countess dudes that lost everything to crazy ex's. I paid 490 a week for 7 years and never missed a payment. My kids saw none of it. I bought back to school clothes and supplies, phones, etc... I had no issue with supporting my kids, I just wish that there was some mandatory accounting oversight to ensure the children benefited from the support. \n\nBooze, hair and nails shouldn't be allowed. I now have a support order against her of which h she made the first payment of 20 bucks a month, per child and then hasn't made a payment since. She says she has no income and is awaiting a disability claim and is living with her boyfriend who pays for everything. Unreal...\n\nOn a good note, my oldest is a junior in college and my youngest is applying to schools as a HS Senior now. It took a while to get them pointed down range, but they were worth all the pain. The system is just broken. Very very broken.", "My husband was ordered to pay $1,200 a month for his 2 kids plus health insurance. Part of his expense was child care while the mom (custodial parent) \"looked for a job\". If the custodial parent is a student, working, or \"looking for a job\" and needs child care to do so, it comes out of the non-custodial parents pocket.\n\nWell, at the time they went to court, she had the kids (not of elementary school age at the time) set up in a private Montessori daycare program that her GRANDMA paid for as a freebie gift. She printed off a couple emails as proof of seeking employment. After court, the kids were out of the school within 2 months. Friends and grandparents watched them. Then she stayed home to do school online and he still had to pay.\n\nThe screwed up part is, when you have to move because you can't afford anything and have to live in a lesser environment and maybe not enough bedrooms, how does that not affect the kids? And financially, if you get a 2nd job or a higher paying job, they can take you back to get money out of those checks too.\n\nI've seen the games. I've seen the way she reaps in the benefit. It's lose lose for him, and she's also always in contempt of visitation, since she only views him as a child support check, always withholding the children intentionally. You can't do that, whether the dad pays or doesn't pay!\n\nChild support is only half the battle. Enforcing visitation, communication, and trying to not let the other parents spite dictate... is the other half.", "Some things to remember are that every state has different rules. For example in Texas, it's a flat 20% for the first kid and an additional percentage for every kid thereafter. NJ has a sliding scale where they look at each parents individual income over the last 3 years and compare that to a chart that is based on those numbers that shows what a child, with parents who make that amount of money, will cost to raise per week. The non custodial parent (99.99% of the time that's the father) pays half of that rate. \n\nOverall it's not TOO BAD. Where it really gets out of hand is when you realize the non custodial parent, the one paying thousands of dollars per year, can't claim that as an expenditure on income tax. Also, the custodial parent, one receiving the money, dosent have to claim that as income. \n\nIn many states the custodial parent is afforded many low cost and free legal advice and consultation as well, they are guided how to apply for COLA increases as well as how to petition the court to make the non custodial parent pay for daycare, medical expenses and even after school and extra curricular activities that you would assume would be covered under the base child support. \n\nIt's not only a broken system, it's also terribly biased against the non custodial parent (again 99% of the time that's the father). \n\nSource- I paid child support in NJ and TX. When my ordeal began, I was making 2200/ a month gross. Out of that I paid $800 a month in child support.", "The premise used to justify it is \"maintaining a lifestyle.\" \nReally, most times, its so the mother doesn't hafta buy fewer things with money thats no thers. \nBUT, there are some legit reasons this stays alive. \nIf the child is in private school, tutoring, medical bills- the same amount of money needs to go to that regardless of marital status. \nAlso, continueing bills, like car loans, mortgages, and etc. \nThe system gets real ugly at anything in the middle, like selling off and splitting assets (and often times, both people have seen enough of that in a divorce), so, they go this route to make custofy-winners not lose cars, homes, etc that would affect the childrens lives. \nThe big problem is, these reasons really only look good on paper. In practicality, it's INCREDIBLY abusable (cause it's literally free money), favors the mother (and sadly, gender has no actual tie to care-giving ability or goodness of character), and doesn't account for extenuating circumstances. \nIt's an old, archaic system. \nAnd fixing it really requires looking at cost of living more accurately.... \nwhiiiiich points us at things like minimum wage..... \nwhiiiiich puts us right in the political quagmire of not accomplishing a damn thing.", "Child support is something that should be paid, but the way it is implemented now in the US is pretty broken and highly in favor of the wife. I have heard similar if not worse stories in Canada and the UK as well so I assume it is a broken western system. \n\nOn the flip side, Japan (where I live now) is pretty fucked and broken in the complete opposite manner. There is no such thing as joint custody and the father typically goes on to his next phase in life with zero contact or support... Which is the norm and there is no taboo about it for the husband. Child support can be ordered in court but there is no enforcement... Likewise if the father wants to see his children, the mother doesn't not have to commit to the time he is given. So Japan has this label for being a child abduction black hole as if the mom doesn't want you seeing the kids, she can take measures to make sure you don't. But on the flip side, if she wanted to claim unpaid child support, the courts wouldn't have much power to do anything...", "I had a conversation with my boss about this once. He mentioned that he actively discourages the president of the company from giving him raises. Mainly because although his ex wife has remarried, and makes as much as he does, because she has primary custody, he's been saddled with a hefty payment. Because it's calculated pre tax, and the more he makes the more he has to pay, and because of his tax bracket, if he got a raise, he'd effectively just end up giving that additional money to his ex wife, or losing a little money because of the higher payment and higher taxes.\n\nHis kids are already extremely well off financially because his ex wife has remarried and because of his payments, he could get the raise and smile because he's giving his kids and even better life, but his words were \"they don't really need a second jet ski at their cottage, they really don't need my raise\"\n\nThe system is so broken is encourages the spouse making payments to get paid under the table illegal, or to not try to make more because they'll just get fucked a little harder.", "My 2€. It's a shitty situation for both party's, but it's a solution that scales.\nIf you have a dead-beat partner that isn't \"willing\" to provide financial support, then in a majority of cases they aren't willing to provide any overall positive support. Therefore the child is better off in the custody of the parent / guardian that will do what what's best for that child, and provide the best quality of life - no matter the sacrifice.\n\nOther side of the spectrum the child's quality of life argument still holds up. We are products of our environment, and that environment can drastically differ according to wealth. Analogy of some animals raised in captivity cannot survive in the wild can also be applied to humans and expectations of silver spoons.\n\nI'll end my drunken rant with everything in life should be solved on case by case basis, but the overall blanket protection provided by child support laws makes sense to me in helping more humans than it hurts. Only a shrinking handful of laws I could same the same...", "Middle GA checking in. Was paying 265 a month and that was my part. She was also required to come up with 265. I covered insurance. Problem is, she didn't let me have her. I only got her for a few hours on holidays and whenever she wanted to have a Saturday to herself. So I took her to court for visitation, chil d support went up on both sides, her part? 305. Mine? 655 and that's with insurance. The really fucked up part is she also put down my child needs child care and had money added to the amount owed every month. My daughter doesn't go to daycare but because she said it, she got more money. No proof required.Two months after getting the increase, baby mama buys a new car. Fun. I pay 66% of our daughters needs but due to the fact she lives with her, I can't claim her on taxes. Sorry for not really answering the question, just needed to rant.", "I feel for all of the dads on here. The laws certainly do not favor you in Colorado. We pay my husband's ex $2,400 a month alimony for life and $1,600 a month child support for two girls. The child support doesn't even bother me, although I guess what does bother me is instead of saving for their future with the $1,600 portion, she spends on hair extensions and plastic surgery. Fathers get absolutely no say in how these women spend the child support either and I think that's absurd! I think Congress and the Judicial system are pretty backwards and corrupt though so I doubt much will change.", "@OP: To maintain the lifestyle they're accustomed to, as best possible. A family that makes $1,200/month is used to a very different lifestyle than a family making $12,000/month, and the entire goal of the process is to protect the children -- and their lifestyle they've grown accustomed to -- as best as possible.\n\nBut ITT: Deadbeat dads. \n\nIf you ever need to see how gullible people are on the internet, just visit these kind of threads. Nobody tells the total and complete truth about their fuckups, and yet this thread is littered with plenty of deadbeat fathers hoisting themselves up high on that cross.", "I got a buddy we call last chance lance. He is over half a million backed up on child support, he said they give him 50 bucks a day for jail time but he would have to do about 19 years to even it out. Kicker is he raised the child alone and the mother skipped town. She is 30 now. The system sucks for fathers without lawyer money.", "I'm trying to figure out how the system doesn't encourage women to have kids by multiple men.\n\n\nIf she has 1 or 2 kids with the same guy, he can only give the same 20%. But 2 dads? She gets 20% from one and 20% from the other. \n\n\nI just don't see how responsibility or encouragement to maintain a family unit is promoted.", "I'm 32. Own a company. Not married nor will I ever be. Never want kids. Make $300k. For Christmas I bought myself a watch, a laptop, a new set of golf clubs and am taking a trip. I also pay as little as taxes that keeps me out of prison. Life is good", "I think The receiving parent should be required to submit receipts for what the money is used for. My brother's ex-wife spent hers in rent for a house beyond her means but my neice never had clothes that fit her or enough food. But by god her mom had a \"fancy\" house.", "My mother had custody of me until I was 7. I'm not sure if my dad had to pay her. When my dad remarried, he and his wife got custody of me and all my mom had to pay was 50% of the bills directly related to me (school, doctor, etc).", "I have a friend who is a dentist. When he divorced he was ordered to pay his bat shit crazy wife $795 per kid (two) per month plus $4500 in spousal support for life. It was egregious. \n\nHe offered her a settlement. She accepted. It saved him $250k.", "As a very short answer to this, child support is supposed to satisfy the needs of a child at a certain standard of living. Thus children of wealthy parents will receive more to maintain that standard of lifestyle, than would children of parents with lesser means.", "My boyfriend has been paying tens of thousands of dollars for his 2 daughters for the past 10 years and hasn't seen them in 7. And he's pretty sure their mom isn't spending that cash on them, since they always ask him (via phone) for money.", "One more reason to never marry. The facts are that the woman spends most of this money in herself" ]
[ "ever been.\" For households with income of £19,000 a year, 30% of the children in that category are having £19 a month saved for them. Part of this is due to grandparents being more willing to contribute to funds, since the money cannot be diverted to the family finances. Creation of new funds and Government payments into them were ended in January 2011 by the Savings Accounts and Health in Pregnancy Grant Act 2010. Political opposition Child trust funds were opposed by the Liberal Democrats in the 2005 general election, and the Liberal Democrats remain opposed. Their policy has been", "Child support Legal theory Child support is based on the policy that both parents are obliged to financially support their children, even when the children are not living with both parents. Child support includes the financial support of children and not other forms of support, such as emotional support, intellectual support, physical care, or spiritual support.\nWhen children live with both parents, courts rarely, if ever direct the parents how to provide financial support for their children. However, when the parents are not together, courts often order one parent to pay the other an amount set as financial support of the", "children. Free from the stress of childcare, the working mother is able to actively pursue their career. This allows for a more relaxed working environment for the mother and allows her to focus on her career. If the mother has a higher paying job, this extra income will allow for savings to be made for the children; these savings could help the mother later on pay for university for the child and/or children. Thus, she can advance her career and provide more money for the family. It puts a sound mind for the mother knowing that the child/children are", "for how child support money is spent. Critics of child support argue that, as a result, the support payments do not need to be used to support the child and can be regarded as a punishment to the parent who is paying child support. The response to that criticism is that if a parent is caring for the children, that parent will incur costs in providing that support, even if they have no duty to account for their expenditures in support of the child.\nCritics of child support, such as father's rights groups, complain that in most US states, and the", "remainder must come out of the parents' resources.\nIn a few cases, in which a student qualifies for merit-based (rather than need-based) financial aid, the family pays less than the EFC. Independent and dependent students Students who are unmarried, younger than 24, and not supporting a minor child are categorized as Dependent Students, and the parents' income and assets are used in determining the EFC. Even if the parents have no intention of helping pay the student's college expenses, which legally they are not required to do, the student remains dependent and the parents' income and assets are used in determining", "child. In such situations, one parent (the obligee) receives child support, and the other parent (the obligor) is ordered to pay child support. The amount of child support may be set on a case-by-case basis or by a formula estimating the amount thought that parents should pay to financially support their children.\nChild support may be ordered to be paid by one parent to another when one is a non-custodial parent and the other is a custodial parent. Similarly, child support may also be ordered to be paid by one parent to another when both parents are custodial parents (joint or", "United Kingdom, there is no requirement that the child support money be used for the child. Barring unusual circumstances, most jurisdictions do not require accountings on the request of a child support payor. The custodial parent also has a duty to support the children and child support payments on average are significantly less than the cost of raising a child. In ten U.S. states, an accounting of child support money can be required under certain circumstances.\nCritics of child support suggest that support orders carry the threat of state violence to give the resident parent a degree of financial control over", "Use of child support payments Most international and national child support regulations recognize that every parent has an obligation to support his or her child. Under this obligation, both parents are expected to share the responsibility for their child(ren)'s expenses. What differs between jurisdictions is which \"expenses\" are covered by \"Child Support\" and which are \"Extraordinary\" and fall outside the definition of \"Child Support\"\nSupport moneys collected are often assumed to be used for the child's expenses, such as food, clothing, and ordinary educational needs, but that is not required. Under California law, for example, child support money may be used", "to devote any income for schooling, it tends to take a higher proportion of their income compared to most other countries. There is a disjunction between the high opinion of education and educational attainment.\nIncreasing a family's income would appear to solve the problem of insufficient family funds to pay for schooling.In reality, though, there are a confluence of systems and actors in Haiti's educational sphere that need to be taken into consideration.\nLocale needs to be considered – depending on whether or not the community is urban or rural.\nThere are the different actors – students, families, schools, teachers,curriculum, the government, and", "The new system in the United Kingdom whereby the amount of child support that, in the vast majority of cases, the father pays, is acknowledged to be less fair than the old because it has ceased to take into account the other household's income. This is justified on the grounds that it saves administrative cost for the government agency concerned.\nThere are issues to do with the non-enforcement of Contact Orders - orders made by family court judges which oblige the so-called resident recalcitrant parent (usually the mother) to let the children spend some time with their dad. Such orders are", "or if the child is going to university or college full-time.\nNormally a parent pays the exact amount of child support the Guidelines tables say should be paid. A parent can pay a smaller amount if the children's time is shared almost equally between the parents, if one or more children live with each parent, or if paying the amount required by the Guidelines would cause serious financial hardship.\nThe basic amount of child support is intended to cover most of the children's expenses. Some expenses, called special or extraordinary expenses, are not covered in this basic amount. Typically, extraordinary expenses are", "per child. He finds that in school districts whose taxpayers and property-owners are relatively wealthy, the per-child annual spending is much higher (for example, over $20,000 per year per child in one district) than in school districts where poor people live (for example, $11,000 per year per child in one district). He asks rhetorically whether it is right that the place of one's birth should determine the quality of one's education. Non-profit Kozol founded The Education Action Fund, which serves as a nonprofit charitable fund that provides direct assistance to many of the children and families profiled in Jonathan’s", "of the time with one of the parents. \nAdditionally, a non-custodial parent is responsible for child support payments even if they do not wish to have a relationship with the child. Courts have maintained that a child's right to financial support from parents supersedes an adult's wish not to assume a parenting role.\nWhile child support and contact are separate issues, in some jurisdictions, the latter may influence the former. In the United Kingdom, for example, the amount of support ordered may be reduced based on the number of nights per week the child regularly spends at the support-giving parent's home.", "parents on low incomes do this regularly through lack of money. Roughly half of those families are behind with household bills.\nTUC sponsored research indicates that 3.1 million children in working families will be below the official breadline in 2018, this is a million more than in 2010. About 600,000 children with working parents became poor due to the government's benefit cuts and public sector pay limits, the report by the consultancy Landman Economics stated. The research found that the biggest increase in child poverty among working families will be in the East Midlands, followed by the West Midlands and", "child support, alimony, etc.) and dividing it by the monthly income. For an example, if a borrower has a $500 car payment, $100 in credit and loan payments, pays $500 in child support and wants a mortgage with payments $1,000 per month, her total monthly obligations is $2100. If she makes $5,000 a month, her debt to income ratio is 42%. Typically the ratio must be below anywhere from 32% for the most conservative loans to 65% for the most aggressive loans.\nAssets are also considered when evaluating capacity. Borrowers who have an abundance of liquid assets at the time", "There are now financial ramifications in deciding whether the mother or father should become the stay-at-home parent. In cases where the woman is the higher-paid parent, it makes more economic sense for her to continue to work while the man takes on the caregiver role. It also makes sense at times the mother's job offers health benefits for the family whereas the father's does not. It has also been shown that if the \"pregnancy was jointly planned\", the father is more likely to be involved.\nWith the growth of telecommuting, many men are also able to work from home. In this", "at risk.\nIn her paper \"The capacity of families to support young Australians: financial transfers from parents, co-residence and youth outcomes\", the data collected reveals that modern youth are increasingly dependent on their parents for money, education, and life choices as the public sector offers little support to children. The research finds that families' tendencies to make use of income support tools is related to their children's education and employment. Children from families in need of income support are less likely to receive money from their parent and be part-time employees but more likely to be unemployed. However, no correlation has", "and educational materials, and extramural activities. Most schools supplement the government grant with other streams of income, such as school fees paid by parents, fundraising events, and receiving donations.\nGenerally, higher school fees prevent poorer children from attending affluent schools. There is no limit to the amount of the fees that a school may set. Parents may apply to the school for full or partial reduction of school fees, and many affluent schools do provide financial assistance to a small number of learners (for example, if the parents are alumni), but it is not a legal requirement.\nChildren at", "may or may not receive from family, but schools themselves vary greatly in the resources they give their students. On December 2, 2011, the U.S. Department of Education released that school districts are unevenly distributing funds, which are disproportionately underfunding low-income students. This is holding back money from the schools that are in great need. High poverty schools have less-qualified teachers with a much higher turnover rate. In every subject area, students in high poverty schools are more likely than other students to be taught by teachers without even a minor in their subject matter. Better resources allows for", "(Total inflation-adjusted estimated expenditure: $196,000 to $393,000, depending on household income.) Breaks down cost by age, type of expense, region of country. Adjustments for number of children (one child — spend 24% more, 3 or more spend less on each child.)\nInvesting in family planning has clear economic benefits and can also help countries to achieve their “demographic dividend,” which means that countries productivity is able to increase when there are more people in the workforce and less dependents. UNFPA says that, “For every dollar invested in contraception, the cost of pregnancy-related care is reduced by $1.47.”\nUNFPA states that,\nThe lifetime", "Income Support Income Support is an income-related benefit in the United Kingdom for some people who are on a low income. Claimants of Income Support may be entitled to certain other benefits, for example, Housing Benefit, Council Tax Reduction, Child Benefit, Carer's Allowance, Child Tax Credit and help with health costs. A person with capital over £16,000 cannot get Income Support, and savings over £6,000 affect how much Income Support can be received. Claimants must be between 16 and Pension Credit age, work fewer than 16 hours a week, and have a reason why they are not actively seeking work", "on the year before. This is lower than the £1.5 billion of benefit underpayment due to error.\nIn some cases, relatives who bring up a child when the parents cannot bring up the child face sanctions and financial penalties, they can be left poor and homeless. There are also widespread complaints from church groups and others that the UK welfare state does insufficient work to prevent poverty, deprivation even hunger.\nSupport for raising taxes to finance more provision on health, education and social benefits is the highest it has been since 2002, NatCen Social Research maintains. Two-thirds of Labour", "were receiving government support to still go to the parent. At the time all child-support payments made to parents in this situation were withheld by the government to offset the cost of government assistance. They also wished to force the government to make advanced child support payments when the non-custodial parent did not make the payments on time. Employment and training It was recommended that the government work with current industries to create a pathway for parents with low or no skills to attain training and education. This included a vocational pathway to ease the transition between secondary school and", "Children's Savings Accounts Motivation There are significant disparities in educational attainment by family wealth. As savings projects such as the American Dream Demonstration began to prove that it was possible to encourage low-income individuals and families to save, policymakers began to turn their attention to the potential of asset initiatives to address educational disparities. Family assets build children's expectations about college and, in turn, influence their engagement with school and their parents’ savings behavior and academic support. These effects can help to reduce the achievement gap between wealthy and disadvantaged students by increasing the likelihood that all students take required", "these \"donation fees.\"\nThe money spent by parents on non-core curriculum activities, stationary and other material costs, and uniforms, is not taken into account. \nIn Michelle Egan-Bitran's project, \"This is how I see it: Children, young people and young adults' views and experiences of poverty\", children and young people were found to be aware of these hidden costs of going to school, and the ability to not take part in school trips, for example, was important for those whose families could not afford holidays, as they felt they were missing out on opportunities to be a part", "to work whilst keeping their children with them due to the prohibitive cost of child-care services in North America. The importance of financial stability in parents' decision-making is also demonstrated by the timing of when children rejoin the parental household; children tend to return after parents have bought houses, found stable higher paying jobs, or after moving to an area with good schools, which are believed to be indicators of economic success. However, despite economic necessity being the predominant factor, the practice is also prevalent in middle-class, highly educated Chinese immigrant households. Cultural Factors According to surveys, the expectation of", "easier to have children start school than finish. For families whose children do not get promoted, school fees must still be paid for the grade that is being repeated. This doubles the cost per grade or even more if the exam fees are once more not paid at the end of the year. This scenario is more likely for lower income families who can least afford the increased cost.\nA solution to this issue of less family funds at the end of the school year that Lunde proposes is a change in the banking system. She suggests that access to loans", "parents. This may be in the form of a contract or simply an agreement. With joint custody where the child lives with each parents roughly half of the time no child support needs to be paid. The amount agreed on is adjusted for inflation each year (though it has been raised by 0% some years).\nIf the parent supposed to pay child support doesn't pay (or doesn't pay in time), the child may receive \"underhållsstöd\" from Försäkringskassan. This includes if the parent pays less than 1273 SEK per month and doesn't provide equivalent support some other way. The parent not living", "whether they are caused by abortions or increased use of contraceptives. Child poverty and health Critics argue that the child exclusion policy keeps children in poverty by denying them the critical supports they need at a young age to become self-sufficient in adulthood. A decrease in family wealth usually leads to negative effects on children.\nSpecifically, family caps were found to increase the poverty rate of children by 13.1%. Also, critics argue that the costs of child exclusion exceed the savings. Nationally, the costs associated with child poverty total about $500 billion a year, the equivalent of 4% of the GDP.\nThe", "typically use the funding to top-up the Operational Grant. Funds are tagged for items attractive to parents - e.g. additional teachers/small class sizes, ICT, or other learning resources, but as they are counted as income for operational matters in reality donations are indistinguishable from other operational grant expenditure, including any staff funded by the Board of Trustees.\nThe Government provides a higher Operations Grant for low decile schools because the decile represents the school community's socio-economic rank. As they get less Government funding, and because parents have more ability to pay, high decile schools typically request a larger donation.\nOn 10 May" ]
If you had a room with all walls, the floor, and the ceiling made of perfect mirrors and you shined a light in there somehow, would the light continue in there forever? Would it somehow disappear?
[ "Nothing is a perfect mirror. The material still ends up absorbing some of the light. Eventually it would all get absorbed." ]
[ "feel, while cleverly-placed mirrors create the illusion of infinite space.\" Londonist reported: \"The look of the space is unique. A ceiling clad with fabric that would feel at home on the seats of the Bakerloo line, carpeted corridors your gran would like, and a scattering of pot plants and nic-nacs lend a feel that's simultaneously homely and nothing at all like a home you could imagine.\" Grace Dent of the London Evening Standard described a \"glorious dining room that is part classic French brasserie, part industrial—supporting pillars, a fireman's pole and low-hanging lights—and part chintzy in-joke with pot plants, ornaments,", "is that the outer wall is not made of glass. Apart from the top floors, there are even hardly any windows. The traditional natural light solution of having a large central hall, cutting through all the floors, with a glass roof, wasn't chosen either because that would take up too much (expensive) space. This means that almost all the light has to come from lamps. The outer wall (except for the two upper floors) is made of marble, interspaced with horizontal strips of lamps that are lit at night. This gives the building a very horizontal visual aspect. Here too,", "slowly into the living area. There is no hallway because the horizon connects all the spaces and once in the living-dining room a massive curved masonry wall is bisected horizontally by a band of glass that frames the sea and cuts off most of the sky. Mirrors are placed at the corners to dissolve the edges as well as reflect unexpected expressions of the gardens and pool as one moves around. The more private spaces are revealed through a connecting secret passage which eventuates into the room with a striking blue backdrop. Structure and materiality The main overhang is supported", "One component to this section is the \"Illusion Room\" where visitors can enter a maze of mirrors that create the illusion of walking on the ceiling, growing and shrinking in size. Kids Land Kids Land was built for young visitors. It includes a ball pit, climbing components and educational cartoons.", "work, disappeared, parting in the middle, flying asunder as if by the touch of magic, and lo! we are at the entrance of a splendid room, which was almost dizzy and alive with waterfalls, that tumbled in all directions - the great cascade, which was opposite to the window that faced us, being reflected in innumerable mirrors upon the ceiling and against the walls\". Early literary accounts of the Hall of Mirrors Garnett in 1800 visited the site. He describes the 'Hall of Mirrors' as having its sides and ceiling covered with mirrors, in which \"the cascade is seen", "a room without light the camera obscura allows us to see the reflection of the exterior images of the world, and understand why this phenomenon is the basis on which the technique of photography and cinema is founded. The next section is dedicated to mirrors, which allowed us to capture ephemeral images of the world generating optical games that drew the attention of science and the esoteric interests of the past \nFollowing on this, we observe one of the essential sections of the museum, dedicated to the magic lantern. Two hundred years before the invention of cinema, the magic lantern", "distributed through the interior volume of each story by the glass ceiling panels. Artificial lighting in the cavity above the glass ceilings complements or replaces daylight as required. These light sources are not visible. The ground and three upper stories and their material and formal aesthetic make up a unity with great potential for art installations. Two subterranean levels complete the spatial program. The first, supplied with daylight by a light pit, accommodates a lecture room, the museum educational center, and sanitary rooms, separated from the non public areas (stock, maintenance, personnel rooms) by translucent glass brick walls. The second", "walls can be seen and which is now a viewing point.", "the only plaster being on the inside of the walls of the rooms to ensure ... smooth surfaces for the purposes of light and cleanliness. The question of lighting the rooms both day and night has had especial study and we consider the desired result has been achieved. The main building contains seven classrooms - four on the ground floor and three on the first floor - and in addition, a board-room and library combined, a main entrance hall or vestibule and a museum, besides passages and verandah balcony. The rooms have all been designed to suit present and future", "piece tableau that dominated the room was an enormous glass box. But because the room outside the box was lit and the inside of the box was unlit, the glass walls appeared as large mirrors, so that the seated audience saw only their own reflection. When the show began, lights came on inside the enormous glass case and revealed the interior to be filled with moths and, at the centre, a naked model on a chaise longue with her face obscured by a gas mask. The glass walls then fell away and smashed on the ground.\nThe model chosen by McQueen", "loft, creating a sequence from shadow into light.\n\"Civilization is measured by the shape of your ceiling,\" said Kahn. The complex ceiling of the sanctuary rises above both floors of surrounding rooms and extends over the sanctuary wall to the outer walls of the corridor outside. Light towers in the four corners of the sanctuary bring in indirect natural light from areas that are not typically well lit. The ceiling's layered outer edges and light-filled corners give the room \"an expansive, boundless character\", according to Kahn biographer Robert McCarter. Kahn said, \"If you think about it, you realize that you don't", "Glass floor Glass floors are made with transparent glass when it is useful to view something from above or below; whereas translucent glass is used when there is no need to view through. In either case, toughened glass is usually chosen, for its durability and resistance to breakage. Flooring Translucent floors are sometimes set into outdoor sidewalks and pavements, or the floors of well-lit interior spaces, to daylight the space below. These are generally called pavement lights, and have a long history.\nGlass as a flooring material is used in both residential and commercial structures. Special hollow glass blocks known", "Times, wrote that \"stepping into the main hall is like entering the soft insides of an oyster...The concave ceiling is pierced by thousands of little lights—it looks like you're sitting under the dome of a clear night sky.\" Ourousoff noted that the finished building had construction problems: many of the granite tiles on the exterior had to be replaced, and the plaster and other interior work was poorly done by the inexperienced workers, but he praised Hadid's ability \"to convey a sense of bodies in motion\" and called the building \"a Chinese gem that elevates its setting.\" Riverside Museum, Glasgow,", "kind of living room. He enjoyed sitting in the niche, sometimes reading there the whole night. Because Ludwig II used to sleep in the daytime and stay awake in the night, the mirrors created an unimaginable effect for him when they reflected the light of the candles a thousand times. The parallel placement of some mirrors evoke the illusion of a never ending avenue.\nAppointments:\nThe middle table has a top with lapis-lazuli, amethyst and chalcedony inlay work and shows the Bavarian coat of arms in glass mosaic.\nA carpet made of ostrich plumes.\nAn ivory candelabra in the alcove with 16 branches.\nTwo mantelpieces", "room not lit directly by a light source would be totally dark), and omnidirectional lighting without shadows (to reduce the flatness of the ambient lighting).\nThe image on the right was rendered using a radiosity algorithm. There is only one source of light: an image of the sky placed outside the window. The difference is marked. The room glows with light. Soft shadows are visible on the floor, and subtle lighting effects are noticeable around the room. Furthermore, the red color from the carpet has bled onto the grey walls, giving them a slightly warm appearance. None of these effects were", "seem to appear or disappear. This illusion can also be used to make one object or person reflected in the mirror appear to morph into another behind the glass (or vice versa). This is the principle behind the Girl-to-Gorilla trick found in old carnival sideshows. The hidden room may instead be painted black, with only light-colored objects in it. In this case when light is cast on the room, only the light objects reflect the light and appear as ghostly translucent images superimposed in the visible room. This can be used to make objects appear to float in space. Giambattista", "Jerry Saltz as “experimentally rich, buzzing with energy and entropy, crammed with chaos and contradiction.”\nIn Death of a Moment (2007), two entire walls are equipped with floor-to-ceiling mirrors and set in motion by a hydraulic system, to create the surreal effect of a room in flux, morphing in shape and size.\nIn 2010, Fischer released a publication with fellow artist Darren Bader, titled The Bearded Island / The Artists Lament. The publication was a parallel project to the 2009 group exhibition “Remembering Henry’s Show” at the Brant Foundation in Greenwich, Connecticut. The text is a close examination of the fear and", "about 800 AD, during the Tang dynasty (618–907), a book entitled Record of Ancient Mirrors described the method of crafting solid bronze mirrors with decorations, written characters, or patterns on the reverse side that could cast these in a reflection on a nearby surface as light struck the front, polished side of the mirror; due to this seemingly transparent effect, they were called \"light-penetration mirrors\" by the Chinese. This Tang era book was lost over the centuries, but magic mirrors were described in the Dream Pool Essays by Shen Kuo (1031–1095), who owned three of them as a family heirloom.", "the doors, windows, bay window and stairs are wooden, and the basement was furnished with marble flag pavement. In some rooms, carpets were used. In the hall, in the right and left niches, there are some marble statuettes, a large crystal mirror and a bust of Atatürk. Fireplaces from the 19th century are used. In general and for the exterior facades, white and shades of white were used. Sunlight is provided by high doors and windows.", "glass ceiling allowed natural light to enter. An electronic system was used to keep lighting conditions unchanged throughout the day using artificial light to complement it. The interior, however, was more recognizably done in Niemeyer's mode, with cat-walk ramps linking the different levels and the mezzanine made as a free-form slab hung from ceiling beams.\nThis aesthetic simplicity would culminate in his work in Brasília, where the qualities of the buildings are expressed by their structural elements alone. Design of Brasília Juscelino Kubitschek visited Niemeyer at the Canoas House in September 1956, soon after he assumed the Brazilian presidency. While driving", "into the inhabited space surrounding it. The simultaneous representation of traditional dimensions and of reality in motion reveal the new dimensions of the mirror-paintings. Sometimes the paintings on the mirrors are portraits of Pistoletto's friends, patrons and/or self-portraits: this is true for the artist's recent entirely mirrored-hall at the Ristorante del Cambio, Piazza Carignano, Turin.", "gave rise to the legend that the governor could \"spy\" on arriving guests. The narrowness of the closet and the governor's considerable girth, as recorded in his portrait, are incompatible, suggesting this window was merely for practical illumination of a narrow deep space. In an era when the sole lighting technologies involved dangerous flame, the borrowed light theory is the only logical one. Elsewhere in the house are similar internal windows to borrow light from brighter spaces to dimmer spaces.\nBeyond the stair hall is a back parlor. In Benning's day, it was likely an everyday sitting room. It is trimmed", "more modern techniques and materials such as the use of concrete.\nThe building has two floors: one base or ground floor and another main floor which holds double pilasters, marking the great blind wall panels. At the north-eastern part of the structure lies a subterranean space, which at the moment of construction was destined for the installation of kitchens. There was also a set of rooms constructed: the Throne Room, rooms for the King and Queen and, to the front of the building, the museum section. To the back of the building an area for events was created, with a", "feet (91 m) wide, or 265,000 square feet (24,600 m²) in total, with an arching roof supported by concrete columns in the center of the building and along the perimeter. A frequently noted feature of the building is the use of glass to create an \"open\" feel and provide natural lighting—most of the outer wall is made of baffled glass panels. There is also integratedness between the different areas of the facility: most interior walls do not reach the ceiling, making it possible to see and hear activities in other parts of the building.\nA key feature of the building is its", "of the Island.\nLevels -1 and -2 are smaller floors, and thus have a limited number of rooms. Their lighting is no longer an overhead light useful for study as in the halls of level 0. At level-1 has installed after the lobby, three rooms of Greek, Etruscan and Egyptian antiquities, and at the other end of the building, four rooms covering art at the end of the 20th century (after 1960). Below, level-2 has six rooms for the 21st century. It is also at this level that leads to the spectacular integration of the end of the 19th century wall", "the structure of the building, for instance, register on the facade.\nThe 3.40 metres (11.2 ft) width of the rooms is further subdivided into three sections of 1.13 metres (3 ft 8 in) and this module determines the width of doors, windows and passages between rooms within the apartment. The wooden windows have two sets of nine movable slats that can be independently controlled to modulate the natural light in the room, they can be completely closed to make the room totally dark, even in bright days. The pattern of the windows and door and the bearing walls (9.40 meters apart) are expressed on", "at Charlottenborg Palace in Copenhagen and other European Baroque rooms as inspiration and created the lantern as a way to bring light into the otherwise mostly windowless room. The walls are clad in combinations of reflective plaster and tinfoil with the intention of creating diverse lighting situations dependent on weather and season.", "rooms. Glare control (drapes) may be required. Prisms The oldest use of prisms for daylighting may well be deck prisms, let into the decks of ships to transmit light below. Later, pavement lights or vault lights were used to light basement areas under sidewalks.\nPrisms that used total internal reflection to throw light sideways, lighting the deeper portions of a room, later became popular. Early thick, slow-cooling cast glass prism tiles were often known as \"luxfer tiles\" after a major manufacturer. They were and are used in the upper portions of windows, and some believe that they contributed to the trend", "finished in different sculptors' workshops. Through the eight arched french doors, light enters the building's two rooms, one on top of the other. The upper room can only be reached by the stairs, while the lower room has a door between the stairs on the platform. Interior space The lower room has not yet been restored since the destruction of 1945. In the 18th century, its decorations included a walls of white Silesian marble and vases of red jasper between, as well as above, the french doors. The trapezoid-shaped grey marble slabs of the floor formed an eight-pointed star in", "kept everything in the center of the huge rooms, leaving all the wall spaces free for decorative treatment. Lighting, in the case of the land inhabitants, was accomplished by a device probably electro-chemical in nature. Both on land and under water they used curious tables, chairs and couches like cylindrical frames – for they rested and slept upright with folded-down tentacles – and racks for hinged sets of dotted surfaces forming their books.\nGovernment was evidently complex and probably socialistic, though no certainties in this regard could be deduced from the sculptures we saw. There was extensive commerce, both local and" ]
It seems like the whole world is against George Lucas' remade and remastered version of the Original Star Wars trilogy. What exactly did he do to change the story that makes fans hate it so much? Why all the vitriol?
[ "As Pandromeda mentioned, Han Solo fired first. Also, he added in a bunch of CG aliens that didn't fit, put back in a deleted scene with Jabba the Hutt that wasn't necessary, added cheesy special effects to the Death Star explosion, added in a fucking song and dance number to Return of the Jedi, replaced the original ending of Jedi and added in Hayden Christiansen. He basically tinkered with it unnecessarily and added in a bunch of crappy looking CG aliens and effects.\n\nedit: cheese=cheesy", "In the original Star Wars, Han Solo fired first and toasted Gredo purely on principle. That was a very important element to his character. In the remastered version Gredo fires first (and somehow misses from just across a table).\n\nThat was an utterly PC act on the part of Lucas.", "All of the other answers are using specific examples that might be confusing to someone who has not seen the movies, when it's really as simple as this: George Lucas decided to use computer special effects to make numerous alterations to the original STAR WARS films, both to improve elements he personally thought were lacking or wrong and to make things more in-line with the prequels that nobody likes. The mere fact that the films were altered from their original presentation irks people, especially because the original versions are not widely available in an acceptable format.", "There's another angle that people don't seem to be mentioning - - movies are a collaborative effort. However much we say that Lucas \"created\" Star Wars or \"made\" the original movies, the truth is that he had an enormous amount of help and input from others into making the final product. In fact, if you do some reading on this, you'll see that Lucas had some pretty awful ideas for the movies, which he was talked out of by his collaborators (in addition to the positive ideas that they contributed). Now, years later, he has total creative control (read: ownership) of the movies and the money to do with them whatever he wants, and he's decided to keep tinkering with them. \n\nIt's also worth noting that since he considers himself the real authority on these movies and his new changes to be for the better, he's not letting the original version out there for release. It's not like he's offering an enhanced or extended version of the original - - he's saying \"this is what the movie is, despite the original being out there for decades without problems.", "In the original Star Wars Han Solo shoots Gredo without even letting Gredo make a move. Han knows that if he refuses to go with Gredo that Gredo will shoot him. Rather than be the noble warrior and allow Gredo to go for his gun first before drawing himself and shooting Han instead draws first and guns down Gredo before Gredo even gets a chance to know what's going on. It sets Han's character as one who lives in the gray. He's neither entirely good or entirely evil. He lives in the grey ground between.\n\nIn the remastered version Han shoots in self defence after Gredo shoots first. It's really poorly done (Han's head slides to the side to dodge since Lucas had no actual footage of it and so it was done with a computer) and totally changes Han's character but for no reason because after that he's back being a rogue again. \n\nHe also added in animals for the Storm Troopers to ride in Star Wars: A New Hope. So they can fly around the galaxy but need to ride animals into battle?", "It turns out that people don't like their childhood memories messed with. More than that, he refused to sell the original versions to fans in new formats that came along. I found that confusing, since when does George miss a chance to make money?", "Let's see. Many of these have already been mentioned so I'll start off with a new one.\n\n* Fart jokes - A lot of the new CGI effects have serious gas problems. They add nothing and frequently suck all the dramatic tension out of scenes. I'm thinking of the arrival at Mos Eisley. Luke has just seen his foster parents burnt to the bone and still smoking. And they are entering a town where the imperials are everywhere. Tension should be high. We start off with a nice new overhead shot if them speeding into town. This is a nice addition. But as Luke drives through town, we see farting pack animals, and their handlers fighting with them. Instead of mounting tension we get a moment of slapstick which completely undermines the moment.\n* Greedo shoots first - This undermines the character of Han. He's not established as cold blooded. This helps undermine the tension of him running away at Yavin. He has to be established as a scoundrel or his potentially scoundrel like behavior later loses it's impact.\n* Quality - A lot of the edits just kind of suck. Han dodging Greedo's shot. Han walking behind Jabba. A lot of the character effects like Jabba. They all look fake. That doesn't help.\n* Missed opportunities - There are a lot of scenes that could have been cleaned up. On the Millennium Falcon, Luke trains against a computer remote. When he turns off the light saber there is a visible cut. That could have been cleaned up. Instead we get crap.\n\nThat said, there are some good parts too. The introduced effects allowed some changes that were improvements. In some scenes they are used to establish some scale that is nice. I'm thinking of places on the Death Star where he edited in some larger open spaces. Make it feel more like a hundred mile wide battle station. Same thing in cloud city, he threw in some windows that opened up the place and made it look more beautiful and spacious, rather than just some claustrophobic corridors on a set.", "You guys are forgetting some of the good ones. Lucas added the word \"noooooo\" to Vader when he throws the emperor down the death tube. The one I am most pissed about was ROTJ. The end was a travesty. Not only putting mister whinny pants in place of David, but completely changing the song at the end. The ewoks were beating the storm troopers helmets to the beat of the music and the new music doesn't line up. There are soooo many things wrong with the remakes.", "1988, George Lucas Speaks to Congress.\n\n\"My name is George Lucas. I am a writer, director, and producer of motion pictures and Chairman of the Board of Lucasfilm Ltd., a multi-faceted entertainment corporation.\n\nI am not here today as a writer-director, or as a producer, or as the chairman of a corporation. I've come as a citizen of what I believe to be a great society that is in need of a moral anchor to help define and protect its intellectual and cultural heritage. It is not being protected.\nThe destruction of our film heritage, which is the focus of concern today, is only the tip of the iceberg. American law does not protect our painters, sculptors, recording artists, authors, or filmmakers from having their lifework distorted, and their reputation ruined. If something is not done now to clearly state the moral rights of artists, current and future technologies will alter, mutilate, and destroy for future generations the subtle human truths and highest human feeling that talented individuals within our society have created.\n\nA copyright is held in trust by its owner until it ultimately reverts to public domain. American works of art belong to the American public; they are part of our cultural history.\n\nPeople who alter or destroy works of art and our cultural heritage for profit or as an exercise of power are barbarians, and if the laws of the United States continue to condone this behavior, history will surely classify us as a barbaric society. The preservation of our cultural heritage may not seem to be as politically sensitive an issue as \"when life begins\" or \"when it should be appropriately terminated,\" but it is important because it goes to the heart of what sets mankind apart. Creative expression is at the core of our humanness. Art is a distinctly human endeavor. We must have respect for it if we are to have any respect for the human race.\n\nThese current defacements are just the beginning. Today, engineers with their computers can add color to black-and-white movies, change the soundtrack, speed up the pace, and add or subtract material to the philosophical tastes of the copyright holder. Tommorrow, more advanced technology will be able to replace actors with \"fresher faces,\" or alter dialogue and change the movement of the actor's lips to match. It will soon be possible to create a new \"original\" negative with whatever changes or alterations the copyright holder of the moment desires. The copyright holders, so far, have not been completely diligent in preserving the original negatives of films they control. In order to reconstruct old negatives, many archivists have had to go to Eastern bloc countries where American films have been better preserved.\n\n**In the future it will become even easier for old negatives to become lost and be \"replaced\" by new altered negatives. This would be a great loss to our society.** Our cultural history must not be allowed to be rewritten.\nThere is nothing to stop American films, records, books, and paintings from being sold to a foreign entity or egotistical gangsters and having them change our cultural heritage to suit their personal taste.\nI accuse the companies and groups, who say that American law is sufficient, of misleading the Congress and the People for their own economic self-interest.\n\nI accuse the corporations, who oppose the moral rights of the artist, of being dishonest and insensitive to American cultural heritage and of being interested only in their quarterly bottom line, and not in the long-term interest of the Nation.\n\nThe public's interest is ultimately dominant over all other interests. And the proof of that is that even a copyright law only permits the creators and their estate a limited amount of time to enjoy the economic fruits of that work.\n\nThere are those who say American law is sufficient. That's an outrage! It's not sufficient! If it were sufficient, why would I be here? Why would John Houston have been so studiously ignored when he protested the colorization of \"The Maltese Falcon?\" Why are films cut up and butchered?\nAttention should be paid to this question of our soul, and not simply to accounting procedures. Attention should be paid to the interest of those who are yet unborn, who should be able to see this generation as it saw itself, and the past generation as it saw itself.\n\nI hope you have the courage to lead America in acknowledging the importance of American art to the human race, and accord the proper protection for the creators of that art--as it is accorded them in much of the rest of the world communities.\"", "They added lots of CGI special effects, they added USELESS scenes. There was one scene where vader screams NOOOO like hayden christensesneseses bitch ass WHY? There was one scene, where in the original Han stumbled into a room with like 6 troopers. They changed it and added 100 more CGI troopers, WHY?? \n\nThey actually added a deleted scene, and pasted a CGI Jabba the hut in. THE FUCK LUCAS? They even changed the scene where when Han is about to be shot by the Alien Greedo so that the Alien shoots first. The WHOLE POINT WAS THAT HAN WAS AN AWESOME BASTARD, NOT THAT HE WAS A LUCKY ONE. \n\nThey changed the emporer to look like the new one, and they changed Anakin to look like the new one. WHY???? WHY??????\n\nThe worst bit though was this piece of utter shit, [Jabbas Palace CGI WHY???](_URL_0_)\n\nAnd that is why George Lucas FUCKED UP!", "I think it all boils down to his immense arrogance in not letting fans enjoy the original trilogy as they were - even better if there were remastered and improved image/sound quality versions.\n\nInstead, he turned his back to the fan-base (now adults with strong opinions) and ignored several decades of fleshing out every single details of the movies. He set out to replace their core nature with artificial political correctness, sub par CGI and character/scene changes that are widley considered shallow and vapid. \n\nAs creator, of course he had the right to change and experiment if he wanted. His \"refinements\" surely have adepts and probably little children would relate to them very well. But not letting others enjoy the originals as they were is so pretentious and egotistical, that he burned away admiration built over decades to become despised over a wide audience.\n\nSome of these changes:\n\n* Overly \"clean\" CGI. The original weathered, battered, real life sets and props gave the movies a credible atmosphere. These are real places/ships/artifacts with history, and have been used over time. CGI replacements make them look whitewashed, overly clean and artificial, diminishing their value in story telling.\n\n* Excessive CGI content. Battles in the original movies had emotional investment - there was tension between a limited number of combatants and you were acquainted with their reasons. Your focus was centered and high. Some changes were made to introduce a myriad of excessive details and actions in scenes, that prove unnecessary as they simply don't add anything to the story.\n\n* Han Solo as the rogue, likeable villain in the originals. His nebulous character is defined by murdering Greedo in Mos Eisley. This is replaced by PC that doesn't even **look** credible.\n\n* Slapstick comedy and situations. The arrival at Mos Eisley was originally tense, as protagonist had gone through trauma and the Empire was a menacing shadow, and watching eye over everyone. After the changes, it was reduced to a series of bodily function and slapstick humor that makes it difficult to take the story seriously. This is also the case with the poorly rendered scene between Jabba and Han Solo -It's the equivalent of having Michael Corleone give Sollozo a slap in the butt when they meet in *the Godfather* - and the awful extended singing scene in Jabba's palace. \n\n* \"Expliciting\" characters emotions. The screaming of Luke as he falls, the screaming of Vader as he attacks the emperor, etc. When a character is fleshed out well, you can predict their reactions and emotions. To exaggerate these response with unnecessary artifacts diminishes the experience.\n\nI could go on ranting. But I think there's noting I've added that hasn't been discussed and ranted before.", "It's one thing to fix little SFX mistakes that were made in the original production, improve some of the lighting, or clarity of picture. Things that were unavoidable due to time / technology. Really, that's all he had to do. Just clean up the picture, make it look awesome, fix some of the little errors, and release it.\n\nHowever, they also decided to add a bunch of extra stuff. Some of it I think was okay. They added in some little details in some of the scenes and locations that are unobtrusive and give a little more atmosphere. I liked that he got rid of some of the static walls in Cloud City and added in windows and lighting from them.\n\nIt's another thing to add a cram in mounds of unnecessary crap in scenes that don't need them (adding a bunch of cartoon-y, distracting bullshit in the background, foreground to Mos Eisley), try to stuff in scenes that add nothing (The song & dance scene in Return. Han and Jabba. \"dur... what do we do about him going behind a formerly human Jabba? Let's awkwardly shift his image upward so he's walked on his tall. huehuehue!\"), and, worst, make little changes to the characters everyone loves (Greedo shooting first, Bobba Fet has a New Zealand accent, just little things that add nothing to do the story). \n\nPeople have dissected these characters and every little choice they've made over the last few decades. And when fans realized that George Lucas, the person fans have idolized for decades, doesn't really understand his own characters (proven in these changes and *especially* the prequel trilogy), they realize that they've been ignoring the writers and directors that actually brought their characters to life and made them real people and heroes. And not just ham-fisted cartoons.\n\nThis is also why, we Ep:1 was announced, the fans were hopeful and scared. They'd seen what had happened with these changes and they *wanted* to like them. But no one really expected an entire movie that looked like someone had vomited the spirit of those changes onto a full-length original film. But then we get Jar-Jar, midichlorians (sp), a Jesus origin story, pointless cameos by C3P0 and R2D2 that fly in the face of logic and continuity, and characters whose motivations are based on how cool a particular action would be on film (and not if it makes any sense in a narrative). Fans realized that that's what these re-release versions were: Lucas was trying his hardest to turn their beloved original trilogy into the same vapid, cartoon-y, in-joke, kid-friendly bullshit the new trilogy became.", "_URL_1_ This is mostly about why the prequels were so awful, but it does touch on the remastered versions and will definitely answer your questions.", "I didn't know people hated the early nineties revisions too. Makes sense, but all I really remember in those was the hover affect for the speeder in A New Hope and the deathstar explosion being bigger.", "Honestly, even just ignoring the context of the extraneous CGI added to some of the scenes, the CGI itself was done *horribly*. It is ugly as sin.", "Now that Disney owns Star Wars, shouldn't we be petitioning them to release the original on Bluray/digital?", "Thanks for the answer, guys!\n\nI'm all for people offering more specific examples though--- this is fascinating.", "Say, when you were about 8 years old, someone told you the best story ever. You loved it. You asked to be told it over and over again. You replayed it with your friends on the playground. You drew pictures of the characters and wanted to be them. You heard two more stories just like them, not long after, and loved them too. These stories, to you, were a huge part of your childhood. A huge part of your formative years, even, silly as that sounds. \nNow leap forward to your mid thirties. A time of self doubt, introspection, apprehension, second guessing. But hey at least there's the reassuring stories you grew up with, right?\nWRONG. At every turn, the very person who told you these strories is now telling you you're remembering them wrong, and that they weren't good enough, and that you can never go back to what you remembered as a kid. YOU CAN'T GO BACK TO WHAT YOU LOVED AS A KID.\nOh! And! He's telling new stories, which is something that 13 year old you would have been over the moon about. Except those stories don't have the same warmth, and heart... and there's a bunch of technical sounding stuff where your faith used to be, and \"eh, trust us\" where there really should be answers, and some grown-up things like politics awkwardly shoved into what used to be a rousing adventure tale.\nSo not only can't you go back to how your beloved stories used to be, you have proof positive you won't get more new ones too.\n\nAt the risk of hyperbole over some silly movies: when the original Star Wars trilogy was altered, with no way to get the true originals ever again, a whole generation of kids were reminded that sometimes being an adult really blows.", "Imagine you like hot chocolate. Its a cold winter day and you curl up on the couch under a blanket with a mug of your favorite brand. Everything is just the way you like it. Just as you take a sip, ready to relax, you realize they added marshmallows. That's okay, you guess, its basically the same. The next time you notice they took out some sugar. Then they add raspberry. Then they take the raspberry out and add coffee. Then they change the coffee. At that point you don't know what you are going to get the next time you want some. Oh, its still hot chocolate, but it isn't the same, and can't provide the warm comfort you wanted on that cold day - its just a distant memory.", "Having only seen Star Wars the first time in 2009, it was glaring seeing what didn't obviously fit.\n\nThe Greedo bit really looks like when Poochie goes back to his home planet, Han just jolts out of the laser blast and they both shot at the same time. \n\nThere are like, fourteen CGI aliens when Obi and Luke are cruising on that speeder thing. One even walks in front of the view of the two of them, while they're having dialogue, and slowly lumbers around for five ish seconds, giving a fantastic glimpse of the mid-quarter of an alien we'd never see again.\n\nAnd then there was the jazz monster in the second one. With the lips and the beatbox and the holy fuck, what the shit am i watching", "What annoyed me more than anything was that annakin was young at the end of the movie why in the hell would he be young and yet obi wan and yoda were still old", "Disney are doing the same shit as well, it recently came out that the Sith (species) homeworld is going to be renamed from the established Korriban to [Moriband](_URL_2_)\n\nJust why?", "Nice try, George. You're not going to release *another* version of the films, even if it is based on public opinion.", "He put digital images of Hayden Christiansen in episode VI and its terrible." ]
[ "Wars exceeded all expectations. The success of the film and its merchandise sales led Lucas to make Star Wars the basis of an elaborate film serial, and use the profits to finance his filmmaking center, Skywalker Ranch. After the release of the first sequel, the original film was subtitled Episode IV: A New Hope in the screenplay released in the 1979 book The Art of Star Wars and for all subsequent rereleases beginning with a theatrical rerelease in 1981. The Empire Strikes Back Three years after the destruction of the Death Star, the Empire forces the Rebel Alliance to evacuate", "one controllable banner;as a result, this left fans of these books to only read new entries in the Unified Canon, and if they wish to see the continued growth of the Star Wars universe, the previous universe is now stuck in limbo.\nOn June 20, 2017, Phil Lord and Chris Miller, the directors of the film Solo: A Star Wars Story, left the production of the film five weeks before filming ended. Lord and Miller cited \"creative differences\" for their reason to part ways with the film. Many compared this to Edgar Wright stepping down as director of Ant-Man due to", "a remake of the original 1977 movie, A New Hope. Lucas felt betrayed by Iger and J. J. Abrams, because they discarded some of his sequel trilogy ideas (despite not being contractually obligated to use them. In 2018, Lucas revealed a few elements of his discarded pre-Disney script about midichlorians, a microbiotic world, and the Whills. Star Wars: The Force Awakens About 30 years after the destruction of the second Death Star, Luke Skywalker has vanished. The remnants of the Empire have become the First Order, and seek to destroy Luke and the New Republic, while the Resistance opposes, led by", "two days earlier, reportedly due to their refusal to compromise with Lucasfilm over the direction of the film; reportedly the directors encouraged significant improvisations by the actors, which was believed by some at Lucasfilm to be \"shifting the story off-course\". At the time, the film was nearly completed, with three and a half weeks left to film and another five weeks of reshoots scheduled. Howard posted on Twitter, \"I'm beyond grateful to add my voice to the Star Wars Universe after being a fan since 5/25/77. I hope to honor the great work already done & help deliver on the", "the series' fanbase. Radcliffe defended the split, stating that it would have been impossible to properly adapt the final novel into a single film. He added that the last movie was going to be extremely fast-paced with a lot of action, while the first part would be far more sedate, focusing on character development; he added that, had they combined them, those things would not have made it to the final cut. Filming lasted for a year, concluding in June 2010.\nThe two-film finale, Harry Potter and the Deathly Hallows – Part 1 and Part 2, was released in November 2010", "went as far as to accuse the film of plagiarizing A New Hope and resorting to nostalgia. He felt that it \"didn't [justify] a return to the universe\" from not having an original story of its own to tell in the plot, characters, and musical score, negatively comparing it to George Lucas' prequel trilogy, and that some of its climatic moments felt unearned.\nIn an interview with journalist Charlie Rose that aired on December 24, 2015, Lucas likened his decision to sell Lucasfilm to Disney to a \"divorce\" and outlined the creative differences between him and the producers of The Force", "title Star Wars Trilogy: Special Edition. This version of the film runs 124 minutes.\nThe Special Edition contains visual shots and scenes that were unachievable in the original release due to financial, technological, and time constraints; one such scene involves a meeting between Han Solo and Jabba the Hutt. The process of creating the new visual effects for Star Wars was featured in the documentary film, Special Effects: Anything Can Happen, directed by Star Wars sound designer Ben Burtt. Although most changes are minor or cosmetic in nature, many fans and critics believe that Lucas degraded the film with the additions.", "the later ones.\" In early May 2002, just before the worldwide release of Episode II: Attack of the Clones and while Lucas was working on the script for Episode III, rumors of Star Wars episodes VII, VIII, and IX were posted on the Internet. In reply, Lucas noted that there would be no such sequels, since the time felt right to move on: \nI am going to do my own movies. I have got some ideas but they are the kind of movies that aren't going to be popular, they're not going to be successful in terms of financing. I", "trilogy, Lucas has collectively referred to the first six episodic films of the franchise as \"the tragedy of Darth Vader\".\nIn 2004, for their DVD release, the original trilogy films were furtherly altered in order to bring continuity with the prequels, for example replacing Palpatine's depiction in The Empire Strikes Back and Anakin's in Return of the Jedi to match their prequel selves, using their prequel portrayers. Sequel trilogy Prior to releasing the original film, and made possible by its success, Lucas planned \"three trilogies of nine films.\" He announced this to Time in 1978, and confirmed that he had", "and was well into the playtesting phase, but in 1995 LucasArts decided to halt the development and cancel the release. An unfinished version of this port was leaked onto the internet, but as of 2015 LucasArts has not yet released the game into public domain. Reception Entertainment Weekly wrote that \"If you've ever fantasized about piloting an X-wing fighter into the heart of the Death Star, now you can do it—in simulated 3-D as well as reenact the movie's key plot developments.\"\nSuper Star Wars was awarded Best Action/Adventure Game of 1992 by Electronic Gaming Monthly, as well as Best Movie-to-Game.", "1980s and 1990s. The films were distributed by CBS/Fox Video on several formats, such as VHS, Betamax, and LaserDisc. In 1997, to coincide with the 20th anniversary of Star Wars, Lucas re-released new cuts of the trilogy to theaters, naming them the \"Special Editions\". The Special Editions made a number of changes to the original releases, including additions such as enhanced digital effects, previously unreleased scenes, and entirely new CGI sequences.\nReaction to the new cuts was mixed, with commentators criticising unnecessary additions such as a computer-generated Jabba the Hutt in the first film and a new musical number in Return", "shoot at the same time.\" For the 2011 Blu-ray release, the scene of Solo and Greedo firing at each other was shortened by several frames. Criticism The change is one of the most controversial of many alterations made in the 1997 Special Edition Star Wars rerelease. Many fans argued that it alters Han's initially morally ambiguous character, making his later transition from anti-hero to hero less meaningful. According to Variety, \"Fans lost their minds. It was an affront, the neutering of a badass.\" Fans have created fan edits of the original Star Wars films to redact Lucas' changes, especially the", "changes made by Lucas in re-releases of the original trilogy as well as the prequel trilogy.\nPhilippe thought that fans deserved a complete re-mastering and re-release of the original series in current formats (DVD, Blu-ray, etc.) without any changes. Philippe also stated that, to his knowledge, Lucas has never seen the documentary. However, Philippe has said that he would love to hold a private screening at Skywalker Ranch.\nThe film begins with a brief history of Lucas' career leading up to the release of Star Wars in 1977. The rest of the film is structured by inter-cutting interviews with many different fans,", "the films, \"we'd all be thrilled to death\".\nWith the 2012 acquisition of Lucasfilm by Disney, most of the licensed Star Wars novels and comics produced since the originating 1977 film Star Wars were rebranded as Star Wars Legends and declared non-canon to the franchise in April 2014. Though Lucasfilm made it clear that new media would \"not tell the same story told in the post-Return of the Jedi Expanded Universe\", it was also established that \"creators of new Star Wars entertainment have full access to the rich content of the Expanded Universe.\" Acknowledging that Thrawn had long been considered by", "anybody else making Star Wars films, and additionally added that the Expanded Universe novels and comics did not line up with his six films Star Wars saga. Asked if he was happy for new Star Wars films to be made after his death, he said: \"I've left pretty explicit instructions for there not to be any more features. There will definitely be no Episodes VII–IX. That's because there isn't any story. I mean, I never thought of anything. And now there have been novels about the events after Episode VI, which isn't at all what I would have done with", "in theaters as the Star Wars Special Edition. For DVD releases in 2004 and Blu-ray releases in 2011, the trilogy received further revisions to make them congruent with the prequel trilogy. Besides the additions to the Star Wars franchise, Lucas released a Director's Cut of THX 1138 in 2004, with the film re-cut and containing a number of CGI revisions.\nThe first Star Wars prequel was finished and released in 1999 as Episode I – The Phantom Menace, which would be the first film Lucas had directed in over two decades. Following the release of the first prequel, Lucas announced that", "said that his story material for Star Wars was too long for a single film, prompting Lucas to split the story into multiple films. Lucas also stated that the story evolved over time and that \"There was never a script completed that had the entire story as it exists now [in 1983] ... As the stories unfolded, I would take certain ideas and save them ... I kept taking out all the good parts, and I just kept telling myself I would make other movies someday.\" In early interviews, it was suggested the series might comprise nine or twelve films.\nStar", "Alec Sulkin stated that a spoof of the Star Wars prequel and sequel trilogies were unlikely to happen due to the difficulty and struggle of spoofing The Empire Strikes Back and the 2012 Disney acquisition of Lucasfilm being the primary reasons. Sulkin stated, \"We like the first three but by the time we were done with the third one I think we were about ready to kill ourselves, The new regime at Star Wars slash Disney is a little more difficult to deal with. Before we were just dealing with Lucasfilm and Seth had a good relationship with them... I", "Star Wars became a hit of epic proportions, and forced Fox to readdress a struggling Damnation Alley. In a panic, the release date was delayed to October, while Fox went in to re-edit the entire film. Directorial control was wrestled from Smight, and large sections of the film were edited out by the studio in order to focus more on the \"Landmaster\" vehicle, and the special effects. Excised were several key scenes critical to the storyline, including many scenes with George Peppard (much to his chagrin), Murray Hamilton (the General of the Missile Base, which rendered his", "in the Star Wars prequel trilogy, Lucas and Hales continued to refine their script as production began. The production draft was completed less than a week before commencement of principal photography. Hales worked with Lucas as costumes were designed and sets were constructed. “At that stage, Attack of the Clones felt like a ‘virtual film’ because we got the script only three days before we started shooting,” recalls producer Rick McCallum. “We had to build these sets to a script that didn’t exist.”", "effects and story. Others noted that the film was quite ambitious for a production of its kind. Some even compared the production and ambition of the film to that of the original Star Wars film, A New Hope.\nGeorge Lucas, though he admits he has yet to see Revelations, has said how much he appreciates the work and ideas of his fans on fan films in general, and enjoys watching them. He encourages productions such as these, which is something relatively rare for an owner and creator of such a series to do. Soundtrack Chris Bouchard composed an original soundtrack for", "2, 2017, Mark Hamill stated during an interview that he felt that the documentary is biased against Lucas and the prequels and that he could not believe the backlash that they received. Sequel In June 2014 it was reported that a sequel, The People vs. George Lucas – Episode II, was in development. The film plans to examine what fans think of the Star Wars franchise since George Lucas sold Lucasfilm to The Walt Disney Company, and will pose the question \"What does the future of Star Wars look like without George Lucas?\"", "Lucas Arts' previous successes and association with the Star Wars title enabled DroidWorks to be distributed at retail stores, such as Walmart and Costco. Reception Sandra Vogel of The Scotsman noted that, while part of the game's success was due to its association with George Lucas, it had a \"pedigree all its own\", including a series of gaming awards. Multimedia Schools praised its user-friendliness, tutorials, replayability, and the ease of installation, giving the title 5 stars. Computer Shopper noted that while the game was an exploitation of the Star Wars brand, it used the association to ensure the \"productive\" game", "the films are still only widely available in their altered versions.\nAs a result of these changes, a group of fans met on various Internet forums to construct higher quality cuts as fan edits by using the available home media and blending the Special Edition DVDs with the LaserDisc transfers. One such edit for The Empire Strikes Back was created by Star Wars fan Adywan. Conception Petr Harmáček (known online by the alias \"Harmy\") had watched a dubbed version of the original cut of Star Wars at the age of six, and had then seen the Special Editions of The Empire", "film being cut from the final version. He cited Pixar's decision in October 2016 to swap the release dates of Toy Story 4 and Incredibles 2, which meant that Bird's film lost a full year of production. Bird stated that the lingering plotlines could lead to a third installment, just as they did with the second. \"There were a lot of ideas that we had on this film that could be [used]... whether it's another Incredibles film, or something else.\" Cast members including Samuel L. Jackson and Sophia Bush have expressed interest in reprising their roles. Producer John Walker would", "said there were seven further Star Wars films he wanted to make. He said he had \"twelve-page outlines\" for those films. In an interview with Jim Steranko in Prevue magazine published in late 1980, Lucas described how the expansive scope of Star Wars had started with an overlong screenplay:\nSo, I took the screenplay and divided it into three stories, and rewrote the first one. ... Then, I had the other two films, which were essentially split into three parts each, two trilogies. When the smoke cleared, I said, 'This is really great. I'll do another trilogy that takes place after", "Star Wars prequel trilogy Background According to original trilogy producer Gary Kurtz, loose plans for a prequel trilogy were developed during the outlining of the original two films. In 1980, Lucas confirmed that he had the nine-film series plotted, but due to the stress of producing the original trilogy and pressure from his wife to settle down, he had decided to cancel further sequels by 1981.\nHowever, technical advances in the late 1980s and early 1990s, including the ability to create computer-generated imagery, inspired Lucas to consider that it might be possible to revisit his saga. In 1989, Lucas stated that", "can watch all six films together as they were intended to be seen.\"\nIn 2007, Lucas described making the films at that age as \"an idea that seemed amusing at the time, but doesn't seem realistic now\", and suggested that \"off-the-cuff\" comments he had made in earlier years had been misconstrued as absolute statements. In 2008, after all six films had been released, Lucas said: \"The movies were the story of Anakin Skywalker and Luke Skywalker, and when Luke saves the galaxy and redeems his father, that's where that story ends.\" In another 2008 interview in Total Film, Lucas ruled out", "such critic, Peter Biskind, complained, \"When all was said and done, Lucas and Spielberg returned the 1970s audience, grown sophisticated on a diet of European and New Hollywood films, to the simplicities of the pre-1960s Golden Age of movies... They marched backward through the looking-glass.\" In an opposing view, Tom Shone wrote that through Star Wars and Jaws, Lucas and Spielberg \"didn't betray cinema at all: they plugged it back into the grid, returning the medium to its roots as a carnival sideshow, a magic act, one big special effect\", which was \"a kind of rebirth.\" Merchandising Little Star Wars", "Wars films. In October of that year, The Walt Disney Company agreed to buy Lucasfilm and announced that Episode VII would be released in 2015. The co-chairman of Lucasfilm, Kathleen Kennedy, became president of the company and served as executive producer of new Star Wars feature films. Lucas provided Kennedy his story treatments for the sequels during the 2012 sale, but in 2015 it was revealed Lucas's sequel outline had been discarded. The sequel trilogy also meant the end of the existing Star Wars expanded universe, which was discarded to give \"maximum creative freedom to the filmmakers and also preserve" ]
How do blankets work? Why do they allow me to become warm even when the outside is cold?
[ "your body makes heat. this warms the air around your skin. the blanket holds that air close to you." ]
[ "controlling body temperature. Water blankets lower a person's temperature exclusively by cooling a person's skin and accordingly require no invasive procedures.\nWater blankets possess several undesirable qualities. They are susceptible to leaking, which may represent an electrical hazard since they are operated in close proximity to electrically powered medical equipment. The Food and Drug Administration also has reported several cases of external cooling blankets causing significant burns to the skin of person. Other problems with external cooling include overshoot of temperature (20% of people will have overshoot), slower induction time versus internal cooling, increased compensatory response, decreased patient access, and discontinuation", "is cut in the center of the blanket, the blanket is then worn over the head. 3) The blanket has a slit cut from one edge to the center to allow the blanket to be worn over the shoulders, fastenings may be added.\nCamp blankets tend to be worn at campfires and singalongs in the evening, where an extra layer is a welcome addition to normal clothing as the temperature drops. The blanket can also be used at night as an extra sleeping layer or pillow.\nThe first use of the camp blanket is unknown, but it can be traced back to", "usually over 20. Suppliers include J. E. Ashworth & Sons and Faribault Woolen Mills who made half of all blankets in America at one time.\nThrow blankets are smaller blankets, often in decorative colors and patterns, that can be used for extra warmth and decoration on the outside of bed. Blankets are sometimes used as comfort objects by small children. \nBlankets may be spread on the ground for a picnic or where people want to sit in a grassy or muddy area without soiling their clothing. Temporary blankets have been designed for this purpose.", "not compress well. Stuff sacks and compression sacks are used for carrying insulated clothing and sleeping bags. Layered clothing allows for fine tuning of body temperature. The inner-base layer should wick away moisture. The mid-layer is used for the appropriate insulation, and the outer-shell layer provides wind and rain protection.\nFor long trips, having enough clothes to change into is helpful, while washing or drying others. An extra pair of socks can be used as mittens. Shorts for swimming and fording streams are also useful. Wet clothes do not insulate as well and can freeze while a hiker is wearing them.", "significant drawback. A suspended hammock allows for a cooling air flow to surround the camper in hot weather. However, this also makes it harder to stay warm when temperatures plummet, either during the evening or seasonally, as a sleeping bag will be compressed under a camper's weight, reducing its ability to trap air and provide insulation. \nWhen deciding to commit to hammock camping most \"hangers\" trade their sleeping bags for down-filled or synthetic quilts. The quilts are divided into two different types, top quilts (TQ) and under quilts (UQ). The UQ is suspended underneath the hammock so the weight of", "the hanger doesn't compress the baffles, thus providing air pockets for one's body to heat and keep one warm. Concurrently the TQ is just a down blanket, with some having the ability to make a small box for the feet. Essentially, it is just the top half of a sleeping bag. Because a sleeping bag's underside is compressed, it loses its insulating properties. A TQ cuts the unnecessary material to save weight and fabric. The TQ/UQ sleep system is not only warm, but each quilt packs into the size of a grapefruit, or smaller, depending on temperature rating. Some hammocks", "replace the embers by hot sand. \nAn alternative to the bed warmer was the bed wagon (moine in French, monaco in Italian, both meaning \"monk\"). It consisted of a large wooden frame enclosing a bucket of embers, possibly with an iron tray and an iron roof-plate to protect the bed covers from direct heat.\nAfter the invention of rubber, the classical bed warmer was largely supplanted by the hot water bottle, which is still widely used. In the early 20th century, electric blankets were invented to fulfill the same need. Another modern replacement was the electric bed", "Hiking equipment Apparel Apparel, including clothing, jackets, shoes, hats, etc., provides insulation from heat, cold, water or fire. It shades the body and protects it from injury from thorns and insect bites.\nBasic outdoor clothing materials are goose down, wool, polyester, and polyolefin, which provide similar degrees of insulation when dry. Wool and polyesters perform reasonably well for most weather conditions and provide some insulation while wet. Cotton/linen wicks moisture, good for hot/humid weather. Cotton, linen and down lose insulation when wet unless they are treated to be water-resistant.\nNatural fabrics, such as cotton, linen and wool have higher burn temperatures, and", "Blanket sleeper Design considerations Blanket sleepers are usually intended as practical garments, worn mostly by younger children and primarily in the home. Style and fashion thus tend not to be important in its design, and the basic design of the typical blanket sleeper has changed little over the years.\nThe sleeper serves mainly to keep the wearer warm at night, even in the absence of blankets and bed covers. The sleeper covers the entire body except for the head (except in certain cases where a hood is present) and (in most cases) hands (except in cases where a sleeper", "the blankets are used as capes and gifts at ceremonial dances and potlatches.\nThe blankets were originally acquired from the Hudson's Bay Company traders during the mid-19th century. The trade blankets were typically dark blue duffel and decorated with buttons made from abalone or dentalium shells. The central crest typically portrayed a symbol of the wearer's family heritage.\nThe blankets usually have a red border on the upper and lateral edges. A central crest figure is created from the buttons and red flannel appliqué. Button blankets are worn over the shoulders and the crest design hangs on the back of the wearer.\nAmong", "all highly insulating clothing materials such as wool, down feathers and fleece.\nThe air-trapping property is also the insulation principle employed by homeothermic animals to stay warm, for example down feathers, and insulating hair such as natural sheep's wool. In both cases the primary insulating material is air, and the polymer used for trapping the air is natural keratin protein. Mechanical systems Space heating and cooling systems distribute heat throughout buildings by means of pipes or ductwork. Insulating these pipes using pipe insulation reduces energy into unoccupied rooms and prevents condensation from occurring on cold and chilled pipework.\nPipe insulation is also", "Blanket sleepers without feet allow more room for growth and reduce the possibility of slipping. Also, children with larger or smaller feet find a better fit.\nThe blanket sleeper is designed so that it can be worn either by itself as a standalone garment, or as a second layer worn over regular pajamas or other sleepwear. The one-piece design is simple to launder and has no detachable pieces that could be individually misplaced.\nYet another potential benefit of the blanket sleeper is that it may help prevent infants from removing or interfering with their diapers during the night. This", "house. Usually this is normal house insulation, using materials such as polyisocyanurate foam, rock wool, foil and polystyrene.\nThis collector is very responsive - in the sun it heats up rapidly and the air inside starts to convect. If the collector were to be directly connected to the building using a hole near the floor and a hole near the ceiling an indirect solar gain system would be created. One problem with this that, like Trombe walls, the heat would radiate back out at night, and a convection current would chill the room during the night. Instead,", "Thermal blanket Concerns It is reported that the application of the thermal blanket is limited and this could be attributed to a number of concerns. For example, as a contaminant becomes heated, it may leak outside of the area of the thermal blanket. Therefore, the blanket must completely cover the contaminated area and have a strong enough vacuum to prohibit the spread of contamination. Incomplete destruction of contaminants may also lead to the introduction of dioxins and furans into the air.\nThe thermal blanket method has not been effectively tested on organic contaminants. The technology is presently commercially available. Shell", "Clothing insulation Clothing insulation is the thermal insulation provided by clothing.\nEven if the main role of clothing is to protect from the cold, protective clothing also exists to protect from heat, such as for metallurgical workers or firemen. As regards thermal comfort, only the first case is considered.", "blankets would distributed among the attendants as a show of wealth. While the attendants obtained the blankets the donor gained prestige allowing for him to raise his social status. Sometimes, in order to supply as many people with blankets as possible, the blankets at would be cut in pieces so that more attendees could receive a gift. These fragments would often be reworked and incorporated into larger blankets.\nIn the winter season, spirit dances were often held. Here, a group of men would perform a dance. A change in the song could lead to their being \"possessed\" allowing them to perform", "the wool fiber is hygroscopic (attracts water); this makes a wool garment suitable cover for a wet diaper by inhibiting wicking, so outer garments remain dry. Wool felted and treated with lanolin is water resistant, air permeable, and slightly antibacterial, so it resists the buildup of odor. Some modern cloth diapers use felted wool fabric for covers, and there are several modern commercial knitting patterns for wool diaper covers.\nInitial studies of woolen underwear have found it prevented heat and sweat rashes because it more readily absorbs the moisture than other fibers.\nMerino wool has been used in baby sleep products such", "Blanket Etymology The term arose from the generalization of a specific fabric called Blanket fabric, a heavily napped woolen weave pioneered by Thomas Blanket (Blanquette), a Flemish weaver who lived in Bristol, England, in the 14th century.\nEarlier usage of the term is possible through its derivation from the French word for white, blanc. Uses Blankets have been used by militaries for many centuries. Most militaries have blankets as compulsory for sleeping quarters in preference to duvets. Militaries are some of the biggest single consumers of woolen blankets. Military blankets tend to be coarse grey with a high level of microns,", "but the bottom fabric contains no insulation. The philosophy behind these two alternatives is that insulation crushed under a person's weight is devoid of air and therefore useless. Some modern down sleeping bags are through-baffled and under-filled such that the user can shift all the insulation to the top of their body thereby maximizing its potential to retain heat. Ultralight hikers also tend to carry bags rated for warmer temperatures than traditional-weight backpackers, making up the difference on cold nights by wearing insulated clothing to bed, such as a balaclava or an insulated jacket. Proper camping site selection that avoids", "preventing heat bridging. Blankets can cover joists and studs as well as the space between them. Batts can be challenging and unpleasant to hang under floors between joists; straps, or staple cloth or wire mesh across joists, can hold it up.\nGaps between batts (bypasses) can become sites of air infiltration or condensation (both of which reduce the effectiveness of the insulation) and require strict attention during the installation. By the same token careful weatherization and installation of vapour barriers is required to ensure that the batts perform optimally. Air infiltration can be also reduced by adding a layer of cellulose", "is connected by a flexible hose to the single-use blanket. Warm air from the warming unit passes through the flexible hose and into the blanket. Once the warmed air reaches the blanket it exits through a series of micro-perforations on the underside of the blanket, warming the patient's skin in an area not involved in the surgical procedure. Performance The Bair Hugger system warms effectively due to the properties of convection and radiation; heat transfer improves with the movement of warmed air across the surface of the patient's skin. Up to 64 percent of the patient's body surface may be", "Yourself heated articles of clothing and blankets. Due to its chemical inertness, it can be used relatively safely amongst most fabrics and materials; however, shorts caused by the material folding back on itself will lead to increased heat production and can lead to a fire.", "the latter, the ability to be washed.\nWaterproof mattress protectors keep the mattress clean by securing it from absorbing body excretions (such as sweat) or other liquids resulting from spills. These can take the form of flat rubberized flannel pads (commonly used under a bedsheet for infants) or special breathable fitted covers. The plastic pads are hot to sleep on and change the feel of the mattress. A urethane laminate on cotton that has good wicking properties is an alternative to a rubberized flannel pad. A protector with a thin laminate that is not pulled too tightly across the bed", "gel that can be activated by twisting the package, thus triggering a chemical reaction. The pack can be put in a pot of boiling water to convert the chemical reaction back and allow it to be reused. While these products are commonly called \"hand warmers\", they can be placed in boots or, with special garments such as vests, in cloth pockets on the inside of the garment. The warmth produced by these tends to be lowest among the above heating methods. Related Product Base on the heating systems, heated jacket manufacturer developed some related products like: heated gloves, heated cusion,", "a blanket to protect his family members from the chilling winter cold. In the end, he decides to get the blanket, much to the happiness of his family. But then his dream of buying the book is shattered.", "Sleeved blanket A sleeved blanket is a body-length blanket with sleeves usually made of fleece or nylon material. It is similar in design to a bathrobe that is meant to be worn backwards (i.e., with the opening in the back). The product has been marketed by various brands as the Snuggie, Snuggler, Doojo, Toasty Wrap, and Slanket, with varying sizes, colors and qualities of materials but similar basic design. Popularity In late 2008 and early 2009 the Snuggie brand of sleeved blankets became a pop culture phenomenon, sometimes described humorously as a \"cult\".\nThe product became famous after a direct response commercial", "for sunlight to pass through during daylight, while maintaining a level of privacy. Due to the loose weave in sheer fabrics curtains offer little heat insulation. However, when it is lighter on the inside of a room than it is on the outside (such as at nighttime), then the inside of the room can be seen from the outside.\nSheer fabric is used in clothing, in garments such as stockings or tights and in dancewear and lingerie, and sometimes as part of clothing, such as in wedding gowns and formal costumes. Sheer fabric for clothing offers very little in the way", "convective fluid can be either a liquid or a gas. For heat transfer from the outer surface of the body, the convection mechanism is dependent on the surface area of the body, the velocity of the air, and the temperature gradient between the surface of the skin and the ambient air. The normal temperature of the body is approximately 37 °C. Heat transfer occurs more readily when the temperature of the surroundings is significantly less than the normal body temperature. This concept explains why a person feels cold when not enough covering is worn when exposed to a cold environment. Clothing", "bag often cannot be rolled like a rectangular bag. Instead, it is simply stuffed into a stuff sack or compression sack.\nThe bottom of a sleeping bag typically does not provide significant insulation, because body weight crushes the loft of the insulation material. It is therefore necessary to use a pad or other less crush-able insulation underneath the sleeper, especially in cold weather. Due to this, some sleeping bags do not include insulation on the bottom. Some include a sleeve for holding a sleeping pad. Additionally, some campers, especially ultralight backpackers or hammock campers, have started to use a top quilt,", "Welding blanket A welding blanket is a piece of safety equipment designed to protect equipment and the welder while welding. A welding blanket typically consists of a layer of flexible protective material containing unexpanded vermiculite and inorganic heat resistant fibrous material. When contacted by spatter of molten metal during a welding process the material protects the surrounding areas by maintaining the structural integrity of the blanket. Many modern welding blankets are made of flame retardant fiberglass and can stand working temperatures ranging from 300 to 2,500 degrees Fahrenheit. Historically welding blankets were made of woven asbestos, however due to" ]
Difference between computer virus, worm, and trojan horse
[ "All of these are software programs.\n\nComputer virus - the typical attribute here in a software program that makes it behave somewhat like a biological virus, is its ability to copy and replicate itself by \"infecting\" other software programs - i.e it attaches itself to these programs, either by infecting them as they are running in the memory of the computer or by accessing the disk and changing the file. When these infected programs are used, or copied to another computer, that computer becomes infected too. It also means, if you delete the virus or reboot the computer, running any of the infected programs will run the virus again and mean your computer is still infected.\n\nComputer viruses tend to spread and infect via replication. As anti-virus programs appeared that could detect computer viruses, programmers added the ability for these programs to mutate as well - i.e to change their code in subtle ways that wouldn't change their function but would make code that looked for a specific pattern fail to spot them. In some way this is similar to the way viruses mutate to avoid an immune system - albeit it's more about the word \"virus\" being descriptive rather than actual parallels between the 2.\n\nA trojan horse - the attribute here, is that it's a program that looks like it performs a specific function - maybe a game or something - but which hides inside it a program that performs another function (usually a malicious one) - the analogy here is, of course, with the [trojan horse legend](_URL_0_) about people hiding inside a \"gift\" in order to enter and destroy a city.\n\nA computer worm differs from a virus in that it doesn't infect another program, but it operates as a standalone program. It does copy itself, replicate and spread by exploiting security weaknesses usually via a network. You can picture this as a program running on your computer, which detects other computers connected to yours, so it \"moves\" over the network, via whatever security holes exist, until it's running on the other computers...and it continues like that traversing across the network looking for machines to infect.\n\nIt's worth noting that although bugs or issues with any of the above methods of infecting a computer may cause computers to crash or other faults and usually take resources, it's not the above actions, from which viruses, worms and trojans get their name, that are necessarily the motives of whoever creates them (Although earlier examples often did nothing more than copy and infect as exercises in curiosity)\n\nMore typically, there is another piece of the software, called the 'payload' which is designed to actually do something malicious, like steal your passwords or sink your nuclear submarine. Payload coming from flight or launch vehicle terminology." ]
[ "as the Code Red II worm that infected more than 259 000 systems in less than 14 hours. On a much larger scale, worms can be designed for industrial espionage to monitor and collect server and traffic activities then transmit it back to its creator. Trojan horses A Trojan horse is designed to perform legitimate tasks but it also performs unknown and unwanted activity. It can be the basis of many viruses and worms installing onto the computer as keyboard loggers and backdoor software. In a commercial sense, Trojans can be imbedded in trial versions of software and can gather", "and extortion whilst increasing security, secrecy and anonymity. Worms may be utilized by organized crime groups to exploit security vulnerabilities (duplicating itself automatically across other computers a given network), while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be", "are known for the manner in which they spread, rather than any specific types of behavior. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executables. On the other hand, a worm is a stand-alone malware software that actively transmits itself over a network to infect other computers. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the", "Worm drive A worm drive is a gear arrangement in which a worm (which is a gear in the form of a screw) meshes with a worm gear (which is similar in appearance to a spur gear). The two elements are also called the worm screw and worm wheel. The terminology is often confused by imprecise use of the term worm gear to refer to the worm, the worm gear, or the worm drive as a unit.\nLike other gear arrangements, a worm drive can reduce rotational speed or transmit higher torque. A worm is an example of a screw, one", "Worms 3 Plot Story mode consists of twenty seven single player missions across four themes: Beach, Spooky, Farmyard and Sewer. Gameplay Gameplay follows on the earlier games of the series, in which teams of worms take turns to use a variety of weapons and items in order to eliminate the opposing teams.\nWorms 3 is the first Worms game to feature card mode, which allows the player to alter the start and end of each turn. There are forty one cards in total, which must be collected first by unlocking in-game rewards and purchasing them. There are also four different worms", "survey conducted by BitDefender from January to June 2009, \"Trojan-type malware is on the rise, accounting for 83% of the global malware detected in the world.\" Trojans have a relationship with worms, as they spread with the help given by worms and travel across the internet with them. BitDefender has stated that approximately 15% of computers are members of a botnet, usually recruited by a Trojan infection.", "Worms 4 (2015 video game) Gameplay In Worms 4, up to three teams of worms take turns maneuvering a 2D map using weapons and items in order to eliminate the opposing teams. The game features a single-player campaign designed to gradually introduce game mechanics, and three multiplayer options consisting of a battle against the AI, hotseat, and online matchmaking.", "Worms? Gameplay The game is abstract, like Conway's Game of Life, but the player's ostensible goal is to optimally program one or more \"worms\" (each a sort of cellular automaton) to grow and survive as long as possible. The game area is divided up into hexagonal cells, and the worms are essentially programmed to move in a particular direction for each combination of filled-in and empty frame segments in their immediate vicinity. Over the course of a game, the player needs to give his/her worm less and less input, and more and more moves by their worm result in the", "Worms World Party Gameplay Like its predecessors, Worms World Party is a side-scrolling video game involving controlling a team of worms and using a collection of weaponry to eliminate the opposing team(s). The worms can walk and jump around and use tools such as the ninja rope and parachute to move to otherwise unreachable locations.\nThe worms have an arsenal of dozens of weapons, ranging from longbows to bazookas and from fireball to Holy Hand Grenades. There are also an array of special weapons, such as Armageddon (meteor shower) or the infamous Concrete Donkey. Some of these weapons are present in", "Worms 2 Gameplay Gameplay is turn-based, with each team moving in a randomly determined sequence across two-dimensional terrain. During a single turn, a team can only move one of its worms. Worms can crawl and jump, as well as swing by ninja-rope, parachute, teleport, and bungee when the appropriate items are available. The objective of a traditional match or campaign mission is to defeat all opposing teams by killing their worms. Each worm begins the round with a specific amount of health which is predefined by the chosen game options or by scripting in campaign levels. When hit with a", "trojan has several family members, depending on the antivirus vendor's classification. Symantec classifies members of the Vundo family into two distinct categories, Trojan.Vundo and Trojan.Vundo.B.\nWhile it may be advantageous to identify a specific virus, it can be quicker to detect a virus family through a generic signature or through an inexact match to an existing signature. Virus researchers find common areas that all viruses in a family share uniquely and can thus create a single generic signature. These signatures often contain non-contiguous code, using wildcard characters where differences lie. These wildcards allow the scanner to detect viruses even if they", "Trojan horse (computing) Malicious uses Trojan Viruses, in this way, may require interaction with a malicious controller (not necessarily distributing the Trojan) to fulfil their purpose. It is possible for those involved with Trojans to scan computers on a network to locate any with a Trojan installed, which the hacker can then control.\nSome Trojans take advantage of a security flaw in older versions of Internet Explorer and Google Chrome to use the host computer as an anonymizer proxy to effectively hide Internet usage, enabling the controller to use the Internet for illegal purposes while all potentially incriminating evidence indicates the", "precisely.\nWorm drives are a compact means of substantially decreasing speed and increasing torque. Small electric motors are generally high-speed and low-torque; the addition of a worm drive increases the range of applications that it may be suitable for, especially when the worm drive's compactness is considered.\nWorm drives are used in presses, rolling mills, conveying engineering, mining industry machines, on rudders, and worm drive saws. In addition, milling heads and rotary tables are positioned using high-precision duplex worm drives with adjustable backlash. Worm gears are used on many lift/elevator and escalator-drive applications due to their compact size and the non-reversibility of", "posts sent by a user. The worm modifies a registry key to automatically start itself when the computer is rebooted. In some cases, the program may cause several error messages to appear.\nThe worm was written by a French virus writer known as \"Spanska\". Other than propagating itself, the worm does no further damage to an infected computer. The worm typically uses port 25 to spread, but uses port 119 if port 25 is not available. The executable of the worm is 10,000 bytes in size; a list of spammed newsgroups and mail addresses is stored on the infected hard drive.", "Worms Armageddon Gameplay Gameplay is turn-based, with each team moving in sequence, which is determined randomly, across two-dimensional terrain. During a single turn, a team can only move one of their worms (unless an item that allows the team to select their worm is used). Worms can walk and jump, as well as (when the proper items are available) swing by rope, parachute, teleport, and bungee. The objective of a traditional match is to defeat all opposing teams by killing their worms, although in the campaign some missions have other objectives such as collecting a specific crate.\nEach worm begins the", "executable files, no registry keys, and no driver modules, which makes it harder to detect without antivirus software. In addition to running antivirus software, one can also remove the Trojan by wiping or repairing the master boot record, the hard drive, and the operating system. Distribution Three variants of Mebroot have been discovered. It was estimated that the first version was compiled in November 2007. In December, Mebroot started drive-by downloads. In early 2008, a second wave of attacks arrived. In February 2008 a second variant was discovered which is accompanied by a modified installer. In March 2008 a third", "various Linux distributions, including Debian and Ubuntu. Use as a (possibly-distributed) bug tracker Although wikis and bug tracking systems are conventionally viewed as distinct types of software, Ikiwiki can also be used as a (possibly-distributed) bug tracking system; however, \"Ikiwiki has little structured data except for page filenames and tags,\" so its query functionality is not as advanced or as user-friendly as some other, centralised bug trackers such as Bugzilla.", "Antivirus always uses system resources when running, potentially making an infected computer run more slowly than before.\nThe malware can also block access to known spyware removal sites and in some instances, searching for \"antivirus 2009\" (or similar search terms) on a search engine will result in a blank page or an error page. Some variants will also redirect the user from the actual Google search page to a false Google search page with a link to the virus' page that states that the user has a virus and should get Antivirus 2009. In some rare cases, with the newest version", "script is run automatically by the browser and steals a copy of Bob's real name and email directly from his own machine.\nPersistent XSS vulnerabilities can be more significant than other types because an attacker's malicious script is rendered automatically, without the need to individually target victims or lure them to a third-party website. Particularly in the case of social networking sites, the code would be further designed to self-propagate across accounts, creating a type of client-side worm.\nThe methods of injection can vary a great deal; in some cases, the attacker may not even need to directly interact with the web", "virus to spread, whereas a worm spreads itself. Concealment These categories are not mutually exclusive, so malware may use multiple techniques. This section only applies to malware designed to operate undetected, not sabotage and ransomware. Viruses A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). An example of this is a PE infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. Screen-locking", "in order to reproduce. The virus can hide in unlikely locations in the memory of a computer system and attach itself to whatever file it sees fit to execute its code. It can also change its digital footprint each time it replicates making it harder to track down in the computer. Worms A worm does not need another file or program to copy itself; it is a self-sustaining running program. Worms replicate over a network using protocols. The latest incarnation of worms make use of known vulnerabilities in systems to penetrate, execute their code, and replicate to other systems such", "like inserting NOP instructions (brute force), changing what registers to use, changing flow control with jumps, changing machine instructions to equivalent ones or reordering independent instructions.\nMetamorphism does not protect a virus against heuristic analysis.\nMetamorphic code can also mean that a virus is capable of infecting executables from two or more different operating systems (such as Windows and GNU/Linux) or even different computer architectures. Often, the virus does this by carrying several viruses within itself. The beginning of the virus is then coded so that it translates to correct machine-code for all of the platforms that it is supposed to execute", "all worms as malware.\nSeveral worms, like XSS worms, have been written to research how worms spread. For example, the effects of changes in social activity or user behavior. One study proposed what seems to be the first computer worm that operates on the second layer of the OSI model (Data link Layer), it utilizes topology information such as Content-addressable memory (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered.", "have been variants of the worm, some that use alternative search engines after Google blocked queries from the Santy worm, and an anti-Santy anti-worm that attempts to patch vulnerable installations.\nThe phpBB Group had released a patch for the vulnerability a month before the attacks, in phpBB 2.0.11.", "Worms (1995 video game) Development The game was originally created by Andy Davidson as an entry for a Blitz BASIC programming competition run by the Amiga Format magazine, a cut-down version of the programming language having been covermounted previously. The game at this stage was called Total Wormage (possibly in reference to Total Carnage) and it did not win the competition. Davidson sent the game to several publishers with no success. He then took the game to the European Computer Trade Show, where he met with Mark Foreman – Head Games Buyer at GEM Distribution. Mark suggested to Andy that", "an infected computer. Industry experts describe the writers of the Trojan Horse as professionals and describe Mocmex as a \"nuclear bomb of malware\". Protection As Mocmex can be described as a serious virus, protection is not hard. First of all, it is important to update your antivirus software, as updated antivirus works unless the malware writers get ahead of the antivirus vendors (which is what happened with the new Mocmex). Another way is to check a digital photo frame for malware on a Macintosh or Linux machine before plugging it into a computer with Windows, or disable autorun on Windows.", "Apple Worm Programs A typical computer program manipulates data which is external to the corporeal representation of the computer program. In programmer-ese, this means the code and data spaces are kept separate. Programs which manipulate data which is internal to its corporeal representation, such as that held in the code space, are self-relational; in part at least, its function is to maintain its function. In this sense, a dynamic self-relocator is a self-referential system, as defined by Douglas R. Hofstadter. Other examples The instruction set of the PDP-11 computer includes an instruction for moving data, which when constructed in a", "Silvio Cesare Software and Services Silvio has released numerous tools to perform software similarity classification. Simseer Simseer is a free online service that tells you how similar to each other are the software that you give it. It is built using the technology of Malwise. There are a number of applications where it is useful to know if software is similar such as malware classification, incident response, plagiarism detection, and software theft detection. Bugwise Bugwise is a service that performs bug detection in Linux executable binaries. It does this by using static program analysis. More specifically, it is performed using", "damage, but have less powerful attacks. Scientists can produce better weapons and equipment and award the other worms on the team a health bonus when their turn comes around. Finally, Heavies are slow moving, but have more powerful attacks and can take more damage. The game features options for single player, multiplayer and online play. There are also various customization options for changing worm appearances, match rules, weapon loadouts and stage appearances. Development The gameplay is based on the original 2D Worms games. On March 30, 2012, Team17 announced Worms Revolution with a completely new engine.\nOn May 26, 2012, the", "have increased by 54% in the year 2017. Trojans, worms and viruses are all considered malware. A Trojan is a program that is on the smartphone and allows external users to connect discreetly. A worm is a program that reproduces on multiple computers across a network. A virus is malicious software designed to spread to other computers by inserting itself into legitimate programs and running programs in parallel. However, it must be said that the malware are far less numerous and important to smartphones as they are to computers.\nNonetheless, recent studies show that the evolution of malware in smartphones have" ]
Why does the media spend so much time covering the question of whether or not Jeb Bush can rise in the polls, but doesn't extend nearly that level of coverage to other non popular contestants?
[ "Jeb Bush is considered (generally) the primary establishment candidate, which means he's expected to have significant political clout with the republican party. Alternatively, he's also a Bush, which means he's entangled in a lot of familial controversy, 'Bush Dynasty' 'Can George Bush's brother win after his unpopularity?' sort of stuff.\n\nBoth attract interest, which the media wants in order to get paid.", "Because other \"non popular\" candidates aren't the son/brother of two former presidents. He was widely considered the guaranteed republican nominee before the race really started, so it is fairly newsworthy that someone with his name recognition has dropped so far, so early, especially considering who he is losing to." ]
[ "choice may be less likely to receive unprompted support during a political poll, and methods of push polling can persuade a voter towards choosing a certain candidate from a list. Surveys and opinion polling is made less reliable by social desirability bias, whereby respondents will report answers in public that may not share their personal views if they believe they are in the minority. Voters are also subject to stating support for candidates that are well-known and recognizable, although they may not have the enthusiasm and commitment to the candidate necessary to generate a vote. Ronald Reagan was noted as", "for strategic reasons. The researchers concluded that when evaluating the impact of celebrity endorsements, one must also consider \"subtler effects, such as those on viability assessments.\" Polls A CBS poll found that a third of all Americans claimed that most people they know would be more inclined to vote for Obama because of Winfrey's endorsement. A study by the Pew Research Center found that Winfrey's campaign appearances had dramatically increased Obama's visibility, especially among African-Americans.\nOne reason Winfrey's endorsement was useful in helping Obama compete with Senator Clinton was because as of December 2007 (when Winfrey first began campaigning) Winfrey was", "be accurate during the election, but the company decided to reallocate resources. Gallup Editor-in-Chief Frank Newport told The Washington Post said Gallup felt polling the public on issues was a better use of resources. Polling in the United States The Gallup Poll is the division of Gallup that regularly conducts public opinion polls. Gallup Poll results, analysis, and videos are published daily in the form of data-driven news. Conducting polls brings the company financial losses of about $10 million a year, but gives Gallup company the visibility of a well-known brand, which helps promote its corporate research.\nHistorically, the Gallup Poll", "risky to focus on aggregating and analyzing others’ polls.\"\nIn 2012, poll analyst Mark Blumenthal criticized Gallup for a slight but routine under-weighting of black and Hispanic Americans that led to an approximately 2% shift of support away from Barack Obama. At the same time, Blumenthal commended Gallup for its \"admirable commitment to transparency\" and suggested that other polling firms disclose their raw data and methodologies.\nIn 2013, the accuracy of Gallup polling on religious faith was questioned. Gallup's polling on religiosity in the U.S. has produced results somewhat different from other studies on religious issues, including a 2012 study by the", "presidential campaigns, because social media can help the candidate get their vote. One study concluded that social media is allowing politicians to be perceived as more authentic with a key finding that shows voters feel politicians to be more honest on social media, compared to interviews or TV shows. This is the case especially among young voters, who predominantly use these type of mediums, this opens up a new voter base for politicians to appeal to directly. Public opinion also affect politics through the new media. New media provides a two-way communication, which achieves an interactive role. People can directly", "positions on issues and their personal backgrounds, more about lesser-known candidates and more about debates. Commentators have pointed out that when covering election campaigns news media often emphasize trivial facts about the candidates but more rarely provide the candidates' specific public stances on issues that matter to voters.", "group, which was \"looking for a candidate for 2000 with good political instincts, someone they could work with,\" was impressed, and Shultz encouraged Bush to enter the race. Due in part to establishment backing, Bush dominated in early polling and fundraising figures. After stumbling in early primary debates, he easily won the Iowa caucuses.\nConsidered a dark horse, U.S. Senator John McCain of Arizona won 48% of the vote to Bush's 30% in the first-in-the-nation New Hampshire primary, giving his campaign a boost of energy and donations.\nThen, the main primary season came down to a race between Bush and McCain. McCain's", "me.\"\nBush mobilized the state's evangelical voters, and leading conservative broadcaster Rush Limbaugh entered the fray supporting Bush and claiming McCain was a favorite of liberal Democrats. Polls swung in Bush's favor; by not accepting federal matching funds for his campaign, Bush was not limited in how much money he could spend on advertisements, while McCain was near his limit. With three days to go, McCain shut down his negative ads against Bush and tried to stress a positive image. But McCain's stressing of campaign finance reform, and how Bush's proposed tax cuts would benefit the wealthy,", "also hoped it would add an element of toughness to a candidate who was suffering from a perception of being weak and vacillating. At the time Bush was significantly behind Michael Dukakis in the polls, and Darman later argued that the campaign was far more concerned with winning than governing. The strategy appeared successful; after the convention, Bush began to take the lead over Dukakis. A Gallup poll taken the following week showed Bush leading by a 48 to 44 percent margin, with his favorability ratings increasing by nine points from pre-convention polls. California-based pollster Mervin Field", "hall meetings, answering every question voters asked, in a successful example of \"retail politics\", and he used free media to compensate for his lack of funds. One reporter later recounted that, \"McCain talked all day long with reporters on his Straight Talk Express bus; he talked so much that sometimes he said things that he shouldn't have, and that's why the media loved him.\" On February 1, 2000, he won New Hampshire's primary with 49 percent of the vote to Bush's 30 percent. The Bush campaign and the Republican establishment feared that a McCain victory in the crucial South Carolina primary might", "announced that it was leading in the polls in every state primary and caucus. November After enjoying success after success in the previous months Bush was quizzed on his knowledge of foreign affairs on the fourth at WHDH-TV in Boston and he failed it with a score of 25%. Bush was asked to name the leaders of Chechnya, Taiwan, India and Pakistan, Bush was only able to name Lee Teng-hui of Taiwan. More failures occurred as polls conducted by WNDS-TV and Franklin Pierce College showed that John McCain had risen in the polls with Bush falling from 45% to Bush", "and 12% to McCain in September to 38% for Bush and 30% for McCain. However, this was lessen when Bush was polling at 52% in Iowa, well ahead of second place Steve Forbes who had received 13% and safe from McCain who had decided to skip campaigning for the Iowa Caucus in favor of the New Hampshire Primary. Despite these setbacks Bush's war chest still made him untouchable by the rest of the Republican field except for multi-millionaire Steve Forbes. December Despite his campaign's previous statement that Bush would not appear in a debate before January, Bush participated in a", "have dropped since his election throughout the entire voter base and among his most ardent supporters. The increased amount of information available to voters during the campaigning cycle does not guarantee satisfaction during candidacy. Now, voters are prone to information overload and projection bias during campaigns as they have to sift through a growing amount of negative and overhyped advertisements rather than being presented with facts about political platforms.\nLife-Cycle Consumption\nProjection bias influences the life-cycle of our consumptions. The immediate utility obtained from consuming particular goods exceeds the utility of future consumption. Consequently, projection bias causes \"a person to (plan to)", "raised the ire of the American political and media establishment. When the Public Opinion Strategies poll put Colbert ahead of Bill Richardson, Richardson's spokesman responded: \"This is a serious election with serious consequences and we are not going to comment on this ridiculous exercise\". Katon Dawson, South Carolina's Republican party chairman believed Colbert would be better off using the $35,000 entrance fee to \"buy a sports car and get a girlfriend\". The high polling gave way to what New York called a \"Stephen Colbert Backlash\", as bloggers criticized Colbert for verging into legitimate political territory, asserting that he had \"crossed", "candidates position on hot issues will help attract voters to their campaigns, but drastic shifts from the candidates original beliefs will cause the candidate's campaign to be discredited due to \"flip-flopping\". The media will release high-profile news stories which will damage a candidate's national momentum and voters will become alienated.\nA candidate's success throughout the elections is closely tied to their momentum in each state, as voters are drawn to high-profile candidates with lots of momentum driving their campaign forward. Candidates need to focus on gaining momentum by creating advertising campaigns, visiting states and fundraising. Good advertising campaigns will help convince", "campaign planned to leave Right to Rise in charge of television and digital advertising efforts, while the Bush campaign would take charge of voter outreach.\nThrough July 2015, Bush's campaign and Super PAC had raised over $114 million, which gave \"Bush a sizable financial advantage over more than a dozen GOP rivals and over Democratic front-runner Hillary Rodham Clinton\". Bush rewarded top donors by inviting them to a donor retreat in Kennebunkport, hosted at his parents' estate in Walker's Point. By August 2015, Right to Rise had raised over $100 million. Criticism In spring of 2015, donors were concerned \"that focusing", "majority of caucus delegates. However, his controversial win has been credited to procedural manipulation by Robertson supporters who delayed final voting until late into the evening when other supporters had gone home. He later spoke at the 1988 Republican National Convention in New Orleans and told his remaining supporters to cast their votes for Bush, who ended up winning the nomination and the election. He then returned to the Christian Broadcasting Network and has remained there as a religious broadcaster.\nBush unexpectedly came in third in the Iowa caucus (that he had won back in 1980), behind the winner Senator Bob", "able to impact viewers across the country, enlarging the realm of influence.\nRick Shenkman also analyzes the media's impact on politics in his book, Just How Stupid Are We?: Facing the Truth About the American Voter, and observes that although American voters have gained significant political power over the last 50 years, their knowledge of politics and world affairs have decreased, which makes them more vulnerable to manipulation, and claims that \"politicians have repeatedly misled voters\" by \"dumbing down of American politics via marketing, spin machines, and misinformation.\"\nThrough setting news priorities, the news media play a significant role in determining the", "campaign team subsequently redacted the personal information.\nBy extending the exploration mode of his potential candidacy to a six-month period (his scheduled announcement came one day short of six months into his exploratory phase), Bush used his time to get acquainted with the press, court donors, and prepare a strategy. In doing this, he navigated several campaign finance laws which limit donations and prohibit coordination with Super PACs. In May 2015, it was reported that Bush had been raising money since January 2015, estimated to be close to US$100 million, for his super PAC, Right to Rise.\nBush announced his candidacy on", "the line from lampooning the process to actively messing it up.\" Republican candidate John McCain gave a more positive view, stating that he hoped Colbert would join the Republican party's debates. \"He can make them livelier and he can reach a wider audience than that narrow little sliver that watches his show.\" In conversation with ABC News, Fox News commentator and template for Stephen Colbert's The Colbert Report persona Bill O'Reilly dismissed Colbert's run as a publicity stunt for his book, I Am America. O'Reilly also called Colbert out for not going on the O'Reilly Factor to discuss the book:", "candidate they want to win.\" Forty-nine (49) percent of respondents stated that the reporters were helping Obama to get elected, while only 14 percent said the same regarding McCain. A further 51 percent said that the press was actively \"trying to hurt\" Republican Vice Presidential nominee Sarah Palin with negative coverage. In October 2008, Washington Post media correspondent Howard Kurtz reported that Palin was again on the cover of Newsweek, \"but with the most biased campaign headline I've ever seen.\"\nAfter the election was over, The Washington Post ombudsman Deborah Howell reviewed the Post's coverage and concluded that it was slanted", "had been focused on campaigning in New Hampshire while Bush was running a national campaign and by the ninth McCain had overtaken Bush and was leading him by seven points with 37%. After suffering from numerous failures during this month Bush was still able to receive the endorsement of Lamar Alexander, who had end his presidential campaign on August 16 after placing sixth place in the Iowa GOP straw poll on August 14.\nAnother high point happened late in the month when Bush added another $10 million to his campaign warchest, reaching $67 million by the end of the year. January", "debate.\nABC News, while stating its commitment to give coverage to a wide range of candidates, argued that focusing more of its \"finite resources\" on those candidates most likely to win would best serve the public debate. Polls and primaries In the 2004 Democratic presidential nomination race, national polls consistently showed Kucinich's support in single digits, but rising, especially as Howard Dean lost some support among peace activists for refusing to commit to cutting the Pentagon budget. Though he was not viewed as a viable contender by most, there were differing polls on Kucinich's popularity.\nHe placed second in MoveOn.org's primary, behind", "relatively moderate on hot button social issues.\nFurthermore, Bush's approvals never went above 45% from February 1992 until weeks after the election, according to Gallup. In the recent history prior to 1992, only Jimmy Carter's term saw such numbers, during which he lost to Ronald Reagan. During the portion of the race when Perot had (temporarily exited), Bush continued to trail Clinton consistently, with polling numbers often double digits behind the Arkansas governor. Election of 1996: Bill Clinton President Bill Clinton was renominated by acclamation and faced Senate Majority Leader Bob Dole in 1996. As in 1992, Ross Perot again ran", "18, 2000. Bush notably did not mention losing the popular vote but did make note of the controversy surrounding the election, including the presence of protesters at his 2001 inauguration.\nBush also discusses his decision to send troops to Iraq, initially and again in 2007, arguing that Saddam Hussein's refusal to comply with the United Nations needed to end, as well as arguing that failure to send more troops to Iraq in 2007 could have resulted in a situation similar to the Vietnam War. In Afghanistan, he noted the difficulties of capturing former Al-Qaeda leader Osama Bin Laden. He states that", "She also adds that she tries \"to empower the campaigns as much as possible, because they know their campaigns the best.”\nWith respect to the 2008 Presidential race, she recently explained,\n\"With Bush, our targeting efforts focused on turning out the base. Now with McCain, it's about convincing the swing voters. It's a different audience we're going after, and we're able to find those swing universes much better than we would have in the past.\nBut sometimes microtargeting isn't user-friendly enough -- a lot of campaigns get a book that explains it, and then that book goes on the shelf. I've built software", "push polls is that they are an effective way of maligning an opponent (\"pushing\" voters towards a predetermined point of view) while avoiding direct responsibility for the distorted or false information suggested (but not directly alleged) in the push poll. They are risky for this same reason: if credible evidence emerges that the polls were directly ordered by a campaign or candidate, it could do serious damage to that campaign. Push polls are also relatively expensive, having a far higher cost per voter than radio or television commercials. Consequently, push polls are most used in elections with fewer", "Pre-election polling showed a tight race early on. But since September 22, Obama swept the rest of the polls taken in the state. Since October 1, Obama never polled below 50%. Fundraising John McCain raised a total of $867,279 in the state. Barack Obama raised $2,470,579. Advertising and visits Obama and his interest groups spent $10,931,32. McCain and his interest groups spent $6,478,902. Each campaign visited the state 6 times.", "campaign, centered on campaign finance reform, drew positive press coverage and a fair amount of public excitement, with polls giving the senator superior crossover support from independents and Democrats. Bush's campaign dealt with \"compassionate conservatism,\" including a greater role for the federal government in education, subsidies for private charitable programs, and large reductions in income and capital gains taxes.\nThe next primary contest in South Carolina was notorious for its negative tone. Although the Bush campaign said it was not behind any attacks on McCain, locals supporting Bush reportedly handed out fliers and made telephone calls to prospective voters suggesting among", "the results, which showed that he was ahead of all of his second-tier candidates, and said \"we think [the poll is] a great sign for us because it shows that when other candidates are standing still or moving backwards we clearly are moving forward.\" An Iowa focus group gave Huckabee high marks after the debate, citing that he gave \"honest and clear answers\" to the questions. As the August 11 Iowa straw poll draws near, Huckabee's campaign manager Chip Saltsman has said to supporters that a strong showing in the poll will vault the campaign into the top-tier.\nIn the days" ]
The different between Sunni and Shi'ite Muslims.
[ "Shi'ites think that leadership in Islam should be hereditary, and that Imams more or less represent the authority of the founder through his bloodline.\n\nSunnis think that leadership in Islam should be by some sort of democratic process, and you don't need to be a descendant of the founder to hold authority.\n\nIt started out that way when the movement had to decide on how to continue after the death of its founder. Pretty soon, through in-fighting and because that is the way things go in a closely knit community, everybody and his uncle also had an opinion that would be forced upon the community.\n\nThere is a Wikipedia article that goes into the various branches of islam in more detail:\n\n_URL_0_", "I recently learned about this, so take this high school history with a grain of salt.\n\nSunn'i- followers of Abu Bakr, had a lot of Hadith (oral traditions), no shrines, no traditions of martyrdom, and they believe that one day messiah will come for the first time. 90% of Islam\n\nShi'a- followers of Ali, not a lot of oral traditions, traditions of martyrdom, shrines, and the belief that messiah came and will return. 10% of Islam.", "Pardon the simplification but it's similar to the various Christian denominations. You only need to look at those to see that 'we're all Christian, can't we all just get along'\nCenturies of squabbling over very minor semantics and details that only those on the inside really care a great deal about. \n\n\nLord knows (excuse the pun) how many people have died because people couldn't agree who was Gods rep on earth; the king or the pope.. Or whether the holy trinity is one or three different beings.. Or who should be able to read from the bible directly instead of relying on intermediaries.\n\n It's unfortunate that people across time get so hung up on the details, but such is the nature of religion.", "OP if you are interested there is a PBS documentary called [Once Upon a Time in Iran](_URL_1_) that gives insight about the Shiite ideology of Iran. They follow some pilgrims travelling from Iran to Karbala (in Iraq) and touches on Iran's recent history; the Revolution, Iran-Iraq War, and the cuurent relationship between Iran and the West. The documentary was released in 2007 at a time when relations were at an all time low and is basically saying why seeking a war with Iran is a bad idea. But, I think it gives people insight into Twelver Shiism, which is almost 10% of the muslim population.", "Shia Sunni same religion - both believe in monotheism version of Islam. No real difference other than a few customs which also differ in the 4 branches of Sunnism. \nThe real difference is political over who should have ruled after the departure of Prophet Muhammad. \nShia means the party. Sunni means traditions/traditional. \nALL POLITICS VIEW NO BIG RELIGIOUS DIFFERENCE IN SHORT!", "Also Sunni's believe the universe was created in 6 days... Shi'ite's believe it was 7 :/" ]
[ "Sunni fatwas on Shias Points of difference While all sects of Islam recognise the Qur'an, they differ in which other authorities they acknowledge; in particular the question of the Succession to Muhammad separates the Sunni, who acknowledge the elected Rashidun Caliphs and their descendants, from the Shia, who acknowledge the Imams or descendants of Prophet Muhammad; these two branches are then subdivided by their views on the further course of the succession. Shia fiqh differs with Sunni fiqh on not only political issues, but also important theological issues. Various attitudes towards Shias can be found among the worldwide majority Sunni", "Shiite or Sunni. In contrast to Iraq, where just over half the country’s Muslims are Shiite, among Iraqis in Canada as in the Arab world as a whole, Sunni are by far the majority.", "is the true successor to Muhammad, while Sunnis consider Abu Bakr to hold that position. The Khawarij broke away from both the Shias and Sunnis during the First Fitna (the first Islamic Civil War) and subsequently opposed both the Shias and the Sunnis, often violently.\nIn addition, there are several differences within Sunni Islam and Shia Islam. Sunni Islam is separated into four main schools of jurisprudence, namely, Hanafi, Maliki, Shafi'i, Hanbali. These schools are named after Abu Hanifa, Anas bin Malik, al-Shafi'i, and Ahmad ibn Hanbal, respectively.\nShia Islam, on the other hand, is separated into three major sects: Twelvers, Ismailis,", "and Zaydis. The vast majority of Shias are Twelvers (a 2012 estimate puts the figure as 94% of Shias being Twelvers) to the extent that the term \"Shia\" frequently refers to Twelvers by default. The Twelver Shias are also notably the only sect of Muslims that complies with the saying of Muhammad that he would have twelve successors, a saying accepted by both Shia and Sunni Muslims. All mainstream Twelver Shia Muslims follow the same school of thought, the Jafari school of thought (named after Jafar as-Sadiq, the sixth Shia Imam). All four founders of the Sunni schools of thought", "(shirk).\nSunni and Shia Islam Muslims see each other as heterodox, differing in practice mainly on matters of jurisprudence or fiqh, splitting historically on the matter of the succession of Ali to the caliphate by Muawiyah. A third and much smaller movement is Ibadi, which differ from both of these groups on a few key points. Several ultra-orthodox groups such as the Wahhabis, in turn, see themselves as the only truly orthodox groups within Islam.\nThe Shia Ismailis, who in turn split from the Shia mainstream of Twelvers over another succession dispute, have subsumed several groups which the majority of Muslims view", "Imam Sunni imams The Sunni branch of Islam does not have imams in the same sense as the Shi'a, an important distinction often overlooked by those outside of the Islamic religion. In everyday terms, the imam for Sunni Muslims is the one who leads Islamic formal (Fard) prayers, even in locations besides the mosque, whenever prayers are done in a group of two or more with one person leading (imam) and the others following by copying his ritual actions of worship. Friday sermon is most often given by an appointed imam. All mosques have an imam to lead the (congregational)", "No. 171).\nSunni Muslims, often referred to as Ahl as-Sunnah wa’l-Jamā‘h or Ahl as-Sunnah, are the largest denomination of Islam. The word Sunni comes from the word Sunnah, which means the teachings and actions or examples of the Islamic prophet, Muhammad; therefore, the term Sunni refers to those who follow or maintain the Sunnah of Muhammad. The Sunni believe that Muhammad died without appointing a successor to lead the Muslim ummah (community). After an initial period of confusion, a group of his most prominent companions gathered and elected Abu Bakr, Muhammad's close friend and father-in-law, as the first Caliph. Sunnis regard", "beliefs in the world. Sunnism Sunni is the largest branch of Islam and dominates most countries in the Middle East. Twelver Shia Although there are many Shia subsects, modern Shia Islam has been divided into three main groupings: Twelvers, Ismailis and Zaidis, with Twelver Shia being the largest and most influential group among Shia, making up perhaps 88 percent of Shias.\nTwelver Shia have their largest populations in the Middle East in Iran (90–95%) Iraq (55–65%) and Bahrain (60-70%). Zaydi Zaydi make up about 35-40% of the population of Yemen. They emerged in the eighth century out of Shi'a Islam.", "Shia Muslims in the Arab world Islam is historically divided into two major sects, Sunni and Shia Islam, each with its own sub-sects. Significant minorities of Shia Arab Muslims live in some Arab countries including Lebanon, Iraq and the Arab states of the Persian Gulf: Saudi Arabia, Kuwait, Oman, the UAE, and Qatar. Shia Muslims are a numerical majority in Iraq and Bahrain. Nearly half of the Muslim population in Lebanon and in Yemen are Shia.\nThere is also a significant (30-40% Kuwait, 15-20% in Saudi Arabia, 10% in Qatar) presence of Shia Muslims in the Arab States of", "As such, Sunnis provide the central symbolic and cultural orientation. Of these, a minority are of the Yazidi faith, reducing the core Sunni Arab majority to roughly two-thirds of the populace. Approximately another sixteen percent of the population, while Arab in ethnicity, consists of a few Twelver Shi`a, and various offshoots of Shi'a Islam – Alawite, Druze, and Isma'ilis. The 'Alawis are by far the largest community in the category of non-Sunni Muslims. Their number is estimated at eleven percent of the overall population. Christians, of various Eastern Orthodox and Uniate traditions and the Latin Rite, along with a smattering", "more common opinion among Sunni Muslims is, that the Mahdi is an expected ruler sent by God before the endtime to reestablish righteousness, coincides with the Second Coming of Jesus Christ (Isa), but, unlike most Shia traditions, Sunni Islam often do not believe the Mahdi has already been born. Sunnis in general reject the Twelver Shi'ite principle of the Mahdi's occultation. Sunnis do, however, rely on traditionally canonical collections of narrations for derivations of the Mahdi's attributes and lineage. According to Sunan Abi Dawud, one of the six canonical books of Hadith in Sunni Islam, narrated by Umm Salamah, \"The", "origin of Shia Islam, with many Western scholars positing that Shiism began as a political faction rather than a truly religious movement. Other scholars disagree, considering this concept of religious-political separation to be an anachronistic application of a Western concept. Demographics According to Shia Muslims, one of the lingering problems in estimating Shia population is that unless Shia form a significant minority in a Muslim country, the entire population is often listed as Sunni. The reverse, however, has not held true, which may contribute to imprecise estimates of the size of each sect. For example, the 1926 rise of the", "Sunni Islam Terminology Sunnī (Classical Arabic: سُنِّي /ˈsunniː/), also commonly referred to as Sunnīism, is a term derived from the word sunnah (سُنَّة /ˈsunna/, plural سُنَن sunan /ˈsunan/), meaning \"habit\", \"usual practice\", \"custom\", \"tradition\". In Arabic, the word is an adjective literally meaning \"pertaining to the Sunnah\". The Muslim use of this term refers to the sayings and living habits of the prophet Muhammad. In Arabic, this branch of Islam is referred to as ahl as-sunnah wa l-jamāʻah (Arabic: أهل السنة والجماعة‎), \"the people of the sunnah and the community\", which is commonly shortened to ahl as-sunnah (Arabic أهل السنة).", "Islam in Lebanon Branches Lebanese Muslims are divided into many branches like Shiites, Sunnites, Druze, Alawites, and Ismailis. Shia Islam The Lebanese Shia Muslims are around 27%–29% of the total population. Twelvers are the predominant Shia group, followed by Alawites and Ismailis. The Speaker of Parliament is always a Shi'a Muslim, as it is the only high post that Shi'as are eligible for. The Shiites are largely concentrated in northern and central Beqaa, Southern Lebanon, in south Beirut (southern parts of Greater Beirut). Sunni Islam The Lebanese Sunni Muslims constitute also about 27%–29% of the total population. Sunni notables", "Shiites (Shias) make up the minority. The Shias are mainly the ethnic Hazaras.", "Shia Islam Terminology The word Shia (Arabic: شيعة‎) literally means \"followers\" and is the short form of the historic phrase shīʻatu ʻAlī (شيعة علي /ˈʃiːʕatu ˈʕaliː/), meaning \"followers of Ali\", \"faction of Ali\", or \"party of Ali\". Shi'a, Shia, Shi'ism/Shi'ite or Shiism/Shiite are the forms used in English, for adherents, mosques, and things associated with the religion. Shi'i is the singular form of Shi'a.\nThe term was first used during Muhammad's life. At present, the word refers to the Muslims who believe that the leadership of the community after Muhammad belongs to Ali and his successors. Nawbakhti states that the", "rather than real, whence \"the two schools are equally orthodox\" in traditional Sunnism. The traditional Sunni point of view is summarized in the words of the twentieth-century Islamic publisher Munīr ʿAbduh Agha, who stated: \"There is not much [doctrinal] difference between the Ashʿarīs and Māturīdīs, hence both groups are now called People of the Sunna and the Community.\"", "three distinct times mentioned in the Quran. The Sunnis tend to combine only under certain circumstances. Shia Islam embodies a completely independent system of religious interpretation and political authority in the Muslim world. The original Shia identity referred to the followers of Imam Ali, and Shia theology was formulated in the 2nd century AH, or after Hijra (8th century CE). The first Shia governments and societies were established by the end of the 3rd century AH/9th century CE. The 4th century AH /10th century CE has been referred to by Louis Massignon as \"the Shiite Ismaili century in the history", "retained their mother tongue.\nIn 1991 Professor Alasdair Drysdale and Professor Raymond Hinnebusch said that less than 1% of the country was formed of Sunni Muslim Circassians. Shi'a Other Muslims in the country, who do not practice Sunni Islam, form up to 16% of the population and are formed of mostly Alawites (11%) and other Shias (such as Ismailis). These Muslim sects include diverse ethnic groups, including: Arabs, Kurds, Turkmen/Turkoman, and other smaller communities. Alawites The Alawites are the second largest religious group in Syria, after the Sunni Muslims. They are divided into two main groups: traditional Alawites, who form the", "Islam Sunnis account for the majority of Qatar's Muslim population at upwards of 90%. Most Sunnis adhere to the Salafi interpretation of Islam. The country's state mosque is Imam Muhammad ibn Abd al-Wahhab Mosque, which was named in honor of the Sunni scholar Wahhabi founded Muhammad ibn Abd al-Wahhab. Shia Islam Shiites comprise around 10% of Qatar's Muslim population. Several of Qatar's most notable merchant families have historically been Shia. Qatari Shiites are granted religious liberty and some have held government positions. In contrast to the Shiites in nearby Bahrain, the Qatari Shiites have an identical dress, dialect and culture", "in Arabic as ahl as-sunnah wa l-jamāʻah (\"the people of the sunnah and the community\") or ahl as-sunnah for short. In English, its adherents are known as Sunni Muslims, Sunnis, Sunnites and Ahlus Sunnah. Sunni Islam is sometimes referred to as \"orthodox Islam\". The Quran, together with hadith (especially those collected in Kutub al-Sittah) and binding juristic consensus form the basis of all traditional jurisprudence within Sunni Islam. Sharia rulings are derived from these basic sources, in conjunction with analogical reasoning, consideration of public welfare and juristic discretion, using the principles of jurisprudence developed by the traditional legal schools.\nAlthough many", "encompass other Shia areas of the Middle East. The nations where Shia Muslims form a dominant majority are Iran and Iraq. Shias also represent a large majority in Azerbaijan, however it is constitutionally a secular state. Those who are actual practicing adherents are much lower, which has led to them generally being excluded from the crescent. Shia are also the majority of citizens in Bahrain, however the government is largely Sunni.\nLarge Shia minorities also exist in Lebanon, Kuwait, Yemen, Saudi Arabia, Turkey, Afghanistan, Pakistan, India and to a lesser extent, UAE. Excepting Lebanon, where the weak central", "Sunni sect.\nA central figure in an Islamic movement is also called as an Imam like the Imam Nabhawi in Syria and Ahmad Raza Khan in India and Pakistan is also called as the Imam for Sunni Muslims. Shi'a imams In the Shi'a context, an imam is not only presented as the man of God par excellence, but as participating fully in the names, attributes, and acts that theology usually reserves for God alone. Imams have a meaning more central to belief, referring to leaders of the community. Twelver and Ismaili Shi'a believe that these imams are chosen by God to", "turned into many colors from Sunnism, Shi'ism, Esmaili, Aliollahi, Sheikhi, and Karimkhani, and the like. They call both Islam, but they are not one. They are completely different and are opposite of one another.... Nothing is left of that Islam. This establishment that the mullas are running not only does not have any benefits but it also causes many harms and results in wretchedness.\nBasically, he believed and wrote that \" all the present-day representations of Islam have been deviated from the essence and the true concept of its foundation\". He was particularly critical of Shia ( since its formation", "Mohammed in 632 CE. Within Islam, different schools and sects have different opinions on the proper selection and use of Hadith. The four schools of Sunni Islam all consider Hadith second only to the Quran, although they differ on how much freedom of interpretation should be allowed to legal scholars. Shi'i scholars disagree with Sunni scholars as to which Hadith should be considered reliable. The Shi'as accept the Sunnah of Ali and the Imams as authoritative in addition to the Sunnah of Muhammad, and as a consequence they maintain their own, different, collections of Hadith.\nIt has been suggested that there", "by Timothy Drew (Drew Ali) in 1913. Drew taught that black people were of Moorish origin but their Muslim identity was taken away through slavery and racial segregation, advocating the return to Islam of their Moorish ancestry. Sunni Islam Sunni Islam is the world's largest religious denomination, followed by Catholicism. It is also the largest community of Black Muslims. Sunni is a term derived from sunnah (سُنَّة /ˈsunna/, plural سُنَن sunan /ˈsunan/) meaning \"habit\", \"usual practice\", \"custom\", \"tradition\". The Muslim use of this term refers to the sayings and living habits of the prophet Muhammad. Its adherents are referred to", "philosophical belief identifies a denomination, which also typically has distinct cultural and religious practices. The major denominations include Shaivism, Shaktism, Vaishnavism and Smartism. Islam Historically, Islam was divided into three major sects well known as Sunni, Khawarij and Shī‘ah. Nowadays, Sunnis constitute more than 85% of the overall Muslim population while the Shi'as are slightly more than 12%. Today, many of the Shia sects are extinct. The major surviving Imamah-Muslim Sects are Usulism (with nearly more than 10%), Nizari Ismailism (with nearly more than 1%), Alevism (with slightly more than 0.5% but less than 1%). The other existing groups include", "Although Wahabism is a strand of Sunni Islam, the promotion of non-Salafi-Sunnism is restricted. Shia Islam An estimated 15% of citizens in Saudi Arabia are Shia Muslims, most of whom are adherents to Twelver Shia Islam. Twelvers are predominantly represented by the Baharna community living in the Eastern Province, with the largest concentrations in Qatif, Al-Hasa, and Dammam. In addition there is a small Twelver Shia minority in Medina (called the Nakhawila). Sizable Zaydi and Isma'ili communities also live in Najran along the border with Yemen.\nShia, human rights groups and other observers have complained of \"systematic discrimination\" of Shia in", "a result, such Sunni groups reject the Shia defense that they believe in the same Quran as Sunnis, accusing Shiites of lying in line with their practice of taqiyya so as not to expose themselves to the certain Sunni backlash.\nMost of Shias nowadays believe that nothing have been omitted or added to the Quran, however, traces of earlier views can be find in some Hadith books like Bihar al-Anwar. The contemporary Shia scholar Abu al-Qasim al-Khoei states that even if The Book of Ali (a copy of Quran written by Ali containing Ali's commentary, which sometimes is called the Book", "literally been drawn on a map by European colonial powers. Sunni and Shia differences According to scholar Vali Nasr, political tendencies of Sunni and Shia Islamic ideology differ, with Sunni Islamic revivalism \"in Pakistan and much of the Arab world\" being \"far from politically revolutionary\", while Shia political Islam is strongly influenced by Ruhollah Khomeini and his talk of the oppression of the poor and class war. Sunni revivalism \"is rooted in conservative religious impulses and the bazaars, mixing mercantile interests with religious values.\" ... Khomeini's version of Islamism engaged the poor and spoke of class war.\n This Cleavage" ]
Why did film become a synonym for movies when photography also used film?
[ "It depends on the context, but I'll stick to your examples. People didn't view still photographs on photographic film. They needed to be printed on photographic paper. Slides are an exception, but they didn't get popular until later. \n\nMotion picture film is negative and printed onto another piece of film to make a positive for viewing via a projector. Many people view magnified motion picture film, but most people never view still photo negatives. \n\nThis is may not be the etymology, but it makes sense, and that's what your looking for." ]
[ "cameras are instead called sources. History The origin of the term \"footage\" is that early 35 mm silent film has traditionally been measured in feet and frames; the fact that film was measured by length in cutting rooms, and that there are 16 frames (4-perf film format) in a foot of 35 mm film which roughly represented 1 second of screen time (frame rate) in some early silent films, made footage a natural unit of measure for film. The term then became used figuratively to describe moving image material of any kind. Film footage Sometimes film projects will also sell", "Photoshop which was released in 1989, improvements in consumer level digital color printers and increasingly widespread computers in households during the late 20th century facilitated uptake of digital photography by consumers. Although modern photography is dominated by digital users, film continues to be used by enthusiasts. Film remains the preference of some photographers because of its distinctive \"look\". Renewed interest in recent years Despite the fact that digital cameras are by far the most commonly-used photographic tool and that the selection of available photographic films is much smaller than it once was, sales of photographic film have been on a", "pictures that can be considered as \"films\" – emerged, and film-makers began to introduce basic editing techniques and film narrative. Invention and advancement of the camera Early movie cameras were fastened to the head of a tripod with only simple levelling devices provided. These cameras were effectively fixed during the course of a shot, and the first camera movements were the result of mounting a camera on a moving vehicle. The Lumière brothers shot a scene from the back of a train in 1896.\nThe first rotating camera for taking panning shots was built by Robert W. Paul in 1897, on", "is cinema-truth.” To paraphrase Hilmar Hoffmann, this means that in film, only what the camera ‘sees’ exists, and the viewer, lacking alternative perspectives, conventionally takes the image for reality.\nFilms are effective propaganda tools because they establish visual icons of historical reality and consciousness, define public attitudes of the time they're depicting or that at which they were filmed, mobilize people for a common cause, or bring attention to an unknown cause. Political and historical films represent, influence, and create historical consciousness and are able to distort events making it a persuasive and possibly untrustworthy medium.", "form of cinematography until the early 21st century when digital formats supplanted the use of film in many applications. This has also led to the replacement of film projectors with digital projection.\nYet, digital videos are sometimes deliberately altered to achieve a film look, such as adding film grain or other noise for artistic effect.", "for motion pictures. This illustrates how a movie can be thought of as a photographed play. Much of the production for a live-action movie is similar tot that of a theatre play, with very similar contributions by actors, a theatre director/film director, producers, a set designer, lighting designer, costume designer, composer, etc. Much terminology later used in film theory and film criticism was already applied for theatre, such as mise en scene. \nMany other forms of theatre have an equivalent in movies. For instance: puppetry can be regarded as a precursor of stop motion film with animated puppets (while puppets", "term \"art film\" began to be much more widely used in the United States than in Europe. In the U.S., the term is often defined very broadly to include foreign-language (non-English) \"auteur\" films, independent films, experimental films, documentaries and short films. In the 1960s, \"art film\" became a euphemism in the U.S. for racy Italian and French B-movies. By the 1970s, the term was used to describe sexually explicit European films with artistic structure such as the Swedish film I Am Curious (Yellow). In the U.S., the term \"art film\" may refer to films by modern American artists, including", "to analyse the film and its place within the history of its genre, or the whole of film history. History Film was introduced in the late 19th century. The earliest artistic criticism of film emerged in the early 1900s. The first paper to serve as a critique of film came out of The Optical Lantern and Cinematograph Journal, followed by the Bioscope in 1908.\nFilm is a relatively new form of art, in comparison to music, literature and painting which have existed since ancient times. Early writing on film sought to argue that films could also be considered a form of", "technique, the film was usually black and white and it was without sound.\nThe novelty of realistic moving photographs was enough for a motion picture industry to blossom before the end of the century, in countries around the world. \"The Cinema\" was to offer a relatively cheap and simple way of providing entertainment to the masses. Filmmakers could record actors' performances, which then could be shown to audiences around the world. Travelogues would bring the sights of far-flung places, with movement, directly to spectators' hometowns. Movies would become the most popular visual art form of the late Victorian age.\nThe Berlin Wintergarten", "art. In 1911, Ricciotto Canudo wrote a manifesto proclaiming cinema to be the \"Sixth Art\" (later \"Seventh Art\"). For many decades after, film was still being treated with less prestige than longer-established art forms.\nBy the 1920s, critics were analyzing film for its merit and value as more than just entertainment. The growing popularity of the medium caused major newspapers to start hiring film critics. In the 1930s, the film industry developed concepts of stardom and celebrity in relation to actors, which led to a rise in obsession with critics as well, to the point that they were often seen on", "films were called \"actuality\" films; the term \"documentary\" was not coined until 1926. Many of the first films, such as those made by Auguste and Louis Lumière, were a minute or less in length, due to technological limitations (example on YouTube).\nFilms showing many people (for example, leaving a factory) were often made for commercial reasons: the people being filmed were eager to see, for payment, the film showing them. One notable film clocked in at over an hour and a half, The Corbett-Fitzsimmons Fight. Using pioneering film-looping technology, Enoch J. Rector presented the entirety of a famous 1897 prize-fight on", "worldwide attractions by using dubbing or subtitles that translate the dialogue.\nCinematography is the discipline of making lighting and camera choices when recording photographic images for the cinema. It is closely related to the art of still photography, though many additional issues arise when both the camera and elements of the scene may be in motion.\nIndependent filmmaking often takes place outside of Hollywood, or other major studio systems. An independent film (or indie film) is a film initially produced without financing or distribution from a major movie studio. Creative, business, and technological reasons have all contributed to the growth of", "of sound for film, argued that the silent film era was aesthetically superior to the \"talkies\". He held that by adding sound to previously silent moving images, the unique status of film had been removed. Instead of being a unique art form that could carefully study bodies in motion, film had become merely a combination of two other art forms.\nAndré Bazin, contrary to Arnheim, held that whether or not a film has sound is largely irrelevant. He believed that film, due mainly to its foundation in and relationship with photography, had a realist aspect to it. He argued that film", "a [film] genre, with its own distinct conventions\". Film theorist Robert Stam also argues that \"art film\" is a film genre. He claims that a film is considered to be an art film based on artistic status in the same way film genres can be based on aspects of films such as their budgets (blockbuster films or B-movies) or their star performers (Adam Sandler films). Art Film and Film Criticism There are scholars who point out that mass market films such as those produced in Hollywood appeal to a less discerning audience. This group then turns to film critics as", "when advances in digital photography drew consumers to digital formats. Although modern photography is dominated by digital users, film continues to be used by enthusiasts and professional photographers. The distinctive \"look\" of film based photographs compared to digital images is likely due to a combination of factors, including: (1) differences in spectral and tonal sensitivity (S-shaped density-to-exposure (H&D curve) with film vs. linear response curve for digital CCD sensors) (2) resolution and (3) continuity of tone. Black-and-white Originally, all photography was monochrome, or black-and-white. Even after color film was readily available, black-and-white photography continued to dominate for decades, due to", "Films are a major form of entertainment, although not all films have entertainment as their primary purpose: documentary film, for example, aims to create a record or inform, although the two purposes often work together. The medium was a global business from the beginning: \"The Lumière brothers were the first to send cameramen throughout the world, instructing them to film everything which could be of interest for the public.\" In 1908, Pathé launched and distributed newsreels and by World War I, films were meeting an enormous need for mass entertainment. \"In the first decade of the [20th] century cinematic programmes", "urban audiences with the outbreak of hostilities in 1914. Governments’ use of film as propaganda reflected this. The British and Americans’ initial struggles in the official use of film led to eventual success in their use of the medium. The Germans were off to a faster start in recognising film's value as a tool of perpetuating pro-German sentiment in the US through The American Correspondent Film Company as well as on the front lines with their mobile cinemas, which showed feature films and newsreels.\nThough the Allied governments were slow to use film as a medium for conveying a desired position", "Film format A film format is a technical definition of a set of standard characteristics regarding image capture on photographic film, for either stills or filmmaking. It can also apply to projected film, either slides or movies. The primary characteristic of a film format is its size and shape.\nIn the case of motion picture film, the format may also include audio parameters (though often not). Other characteristics usually include the film gauge, pulldown method, lens anamorphosis (or lack thereof), and film gate or projector aperture dimensions, all of which need to be defined for photography as well as projection, as", "a process analogous to digital photography. While there is no clear technical distinction that separates the images captured in digital cinematography from video, the term \"digital cinematography\" is usually applied only in cases where digital acquisition is substituted for film acquisition, such as when shooting a feature film. The term is seldom applied when digital acquisition is substituted for video acquisition, as with live broadcast television programs. Cameras Professional cameras include the Sony CineAlta(F) Series, Blackmagic Cinema Camera, RED ONE, Arriflex D-20, D-21 and Alexa, Panavisions Genesis, Silicon Imaging SI-2K, Thomson Viper, Vision Research Phantom, IMAX 3D camera based on", "important and widely distributed photos were taken in separate photo studios, which consisted of portraits of stars, featured players, and sometimes the director. The film Gone With the Wind had a key set of stills containing more than 1,000 photographs. Because of the Production Code of 1930, which reviewed films before release to maintain moral values, still photographers also had to submit their key set to movie censors for their stamp before being distributed to the press.\nMost feature films have a still photographer, who is typically required to find the best scenes to shoot photos of, using their own", "photo capture by certain cameras that offer this proprietary function).\nCinemagraphs are made by taking a series of photographs or a video recording, and, using image editing software, compositing the photographs or the video frames into a seamless loop of sequential frames. This is done in such a way that motion in part of the subject between exposures (for example, a person's dangling leg) is perceived as a repeating or continued motion, in contrast with the stillness of the rest of the image.\nThe term \"cinemagraph\" was coined by U.S. photographers Kevin Burg and Jamie Beck, who used the technique to animate", "and created the art of film making. The concept of motion picture was almost unfathomable but it gained such a huge popularity amongst people. The birth of cinema originated in the mid-late 1800's, through the advancement of the invention called a camera.The film industry became very popular and still is one of the greatest forms of American entertainment as of today. Important people The film industry were initially predominately controlled by white men. White men were the ones who had power when it came to how certain images and stereotypes were portrayed. African Americans were not often given a chance", "Film genre History The term \"genre\" was used to organize films according to type since the earliest days of cinema. By the 1950s, André Bazin was discussing the concept of \"genre\" by using the Western film as an example; during this era, there was a debate over auteur theory versus genre. In the late 1960s, the concept of genre became a significant part of film theory.\nFilm genres draw on genres from other forms; Western novels existed before the Western film, and musical theatre existed before film musicals were made. The perceived genre of a film can change over time; for", "and use of cinematography, including camera angles, lighting, and mise en scène. A film's writer may also offer a pastiche based on the works of other writers (this is especially evident in historical films and documentaries but can be found in non-fiction drama, comedy and horror films as well). Italian director Sergio Leone`s Once Upon a Time in the West is a pastiche of earlier American Westerns. Another major filmmaker, Quentin Tarantino, often uses various plots, characteristics and themes from many lesser-known films to create his films, among them from the films of Sergio Leone, in effect creating a pastiche", "CCD technology, the idea, now re-branded as \"digital cinematography,\" began to gain traction in the market. Shot and released in 1998, The Last Broadcast is believed by some to be the first feature-length video shot and edited entirely on consumer-level digital equipment.\nIn May 1999 George Lucas challenged the supremacy of the movie-making medium of film for the first time by including footage filmed with high-definition digital cameras in Star Wars: Episode I – The Phantom Menace. The digital footage blended seamlessly with the footage shot on film and he announced later that year he would film its sequels entirely on", "Art film An art film is typically a serious, independent film, aimed at a niche market rather than a mass market audience. It is \"intended to be a serious, artistic work, often experimental and not designed for mass appeal\", \"made primarily for aesthetic reasons rather than commercial profit\", and contains \"unconventional or highly symbolic content\".\nFilm critics and film studies scholars typically define an art film as possessing \"formal qualities that mark them as different from mainstream Hollywood films\". These qualities can include (among other elements): a sense of social realism; an emphasis on the authorial expressiveness of the director; and", "Andy Warhol with his 1969 film Blue Movie, but is sometimes used very loosely to refer to the broad range of films shown in repertory theaters or \"art house cinemas\". With this approach, a broad range of films, such as a 1960s Hitchcock film, a 1970s experimental underground film, a European auteur film, a U.S. \"independent\" film, and even a mainstream foreign-language film (with subtitles) might all fall under the rubric of \"art house films\". 1980s–2000s By the 1980s and 1990s, the term \"art film\" became conflated with \"independent film\" in the U.S., which shares many of the same stylistic", "understood as a much more varied art form than among most other kinds of filmmakers, who assume that \"film\" cannot be disconnected from the film medium.", "mainstream films to follow their example. However, long before the Production Code, early silent comedy film makers produced and attempted several 'gross-out' pictures to the disdain of early film reviewers. One such example is the lost Nell's Eugenic Wedding starring Fay Tincher and Tod Browning.\nThe label \"gross-out movie\" was first applied by the mainstream media to 1978's National Lampoon's Animal House, a comedy about the fraternity experience at US colleges. Its humor included not only explicit use of bodily functions (like projectile vomiting), but also references to topical political matters like Kent State shootings, Richard Nixon, the Vietnam war, and", "and the press. Its critical reputation was well-sustained in subsequent years. Film archivist Henri Langlois described it as \"the first example of film writing\". He argued that the film was not just a narrative of events linked together by intertitles, but a sequence of images whose message conveyed an idea; the superimposed titles reinforced the images in the manner of ideograms. While some critics were troubled by the contrast between the film's natural environment of coast and sea and its aesthetic use of frequent editing wipes, irises and superimpositions, there was broader appreciation for the rhythmic structure of shots" ]
The core beliefs of American political parties.
[ "This is a difficult question, America is insanely vast. A Republican in New York is going to be much different from a republican in Texas. A democrat in California will be different from a democrat in Michigan. Any person that wants to run for major office with a likable chance of winning usually has to run under one of these two parties, recent example: Bernie Sanders. \n\nThe idea is Republican is generally more conservative, pushing for no economic regulation but social restrictions. Democrats are generally more Liberal pushing for zero social regulation but economic and business restrictions.", "Republicans: Man is the best decider for himself. Society will be much more efficient if it is every man to himself within reason. So the smaller the govt the better, the less control the govt has the more freedom individual man enjoys. The govt is only there to enforce laws so we dont go full anarchy. Republicans also believe in traditionalism; men should be men; women should be women, everyone has a fixed role in society.\n\nDemocrats: The govt is the parent of its citizen children. As such govt needs to be big, and stuffed with taxes so it can take care of its citizens. No fixed societal roles, people can be whatever they want, do whatever they want (within reason). People's needs are fulfilled by govt back institutions; IE Dept of Education, Welfare Dept, Dept of Health, Dept of Security, etc.", "The simplest I could put it is: \n\nDemocrats: Government should make adjustments to the distribution of wealth and services for the well-being of the majority. \n\nRepublicans: Government should do only what is necessary to encourage a fair playing field so individuals can create their own well-being." ]
[ "States Congress since 1856. The Democratic Party positions itself on the left of the left–right political spectrum in American politics and supports a modern American liberal platform, while the Republican Party positions itself on the right of the spectrum and supports a modern American conservative platform.\nThird parties and independent voters have achieved relatively minor representation from time to time at local levels. The Libertarian Party is the largest third party in the country, claiming more than 250,000 registered voters in 2013; it generally positions itself as centrist or radical centrist and supports a classical liberal position. Other contemporary third parties", "conviction, and purpose, not of creed or birthplace.\"\nAmericanism has two different meanings. It can refer to the defining characteristics of the United States and can also signify loyalty to the United States and a defense of American political ideals. These ideals include, but are not limited to self-government, equal opportunity, freedom of speech, and a belief in progress. This collection of ideals that forms the modern ideology of Americanism holds an enduring appeal to people from lands throughout the globe. History In an essay devoted to Americanism, Agnes Repplier emphasized that, \"Of all the countries in the world, we", "Party was started as a coalition of Pro-Union Democrats, Pro-Confederate Democrats, and former members of the Whig Party. After 1872, its political dominance flourished when restrictions that disenfranchised former Confederates were struck from the state constitution. Democratic electorate Democratic and Republican parties have dominated the American political scene for close to two centuries. One party often overpowers the other and controls the government as a whole. In these times of dominance, the party in power holds a majority of seats at national and state levels and commands the loyalty of the electorate for an extended period of time. In West", "parties has been one of the major driving forces of polarization as policy platforms have become more distant. This theory is based on recent trends in the United States Congress, where the majority party prioritizes the positions that are most aligned with its party platform and political ideology. The adoption of more ideologically distinct positions by political parties can cause polarization among both elites and the electorate. For example, after the passage of the Voting Rights Act, the number of conservative Democrats in Congress decreased, while the number of conservative Republicans increased. Within the electorate during the 1970s, Southern Democrats", "favoring only two major parties.\nGary Cox suggested that America's two-party system was highly related with economic prosperity in the country:\nThe bounty of the American economy, the fluidity of American society, the remarkable unity of the American people, and, most important, the success of the American experiment have all mitigated against the emergence of large dissenting groups that would seek satisfaction of their special needs through the formation of political parties.\n— Cox, according to George Edwards\nAn effort in 2012 by centrist groups to promote ballot access by Third Party candidates called Americans Elect spent $15 million to get ballot access but failed", "in 1854. Since the Civil War, only one third-party presidential candidate—former president Theodore Roosevelt, running as a Progressive in 1912—has won as much as 20% of the popular vote. The president and vice president are elected through the Electoral College system.\nIn American political culture, the center-right Republican Party is considered \"conservative\" and the center-left Democratic Party is considered \"liberal\". The states of the Northeast and West Coast and some of the Great Lakes states, known as \"blue states\", are relatively liberal. The \"red states\" of the South and parts of the Great Plains and Rocky Mountains are relatively conservative.\nRepublican Donald", "conservatism, particularly Protestantism, culture of honor, Southern hospitality, military tradition, agrarian ideals and American nationalism. Besides the cultural influence, some said that the South had infiltrated the national political stage.\nIn 1992, the winning presidential ticket consisted of Bill Clinton, the Governor of Arkansas; and Al Gore, a Senator from Middle Tennessee. From both parties, many leaders in Congress were also from the South. Meanwhile, the Republican Party underwent its own Southernization as more Republican leaders called for policies and principles previously held by conservative or moderate Southern Democrats. Commentators such as Adam Nossiter and Michael Hirsh suggest that politics", "more moderate American Party, which included more northern conservatives and Schmitz supporters, and the American Independent Party, which focused on the Deep South. Both parties have nominated candidates for the presidency and other offices. Neither the American Party nor the American Independent Party has had national success, and the American Party has not achieved ballot status in any state since 1996.\nIn the early 1980s, Bill Shearer led the American Independent Party into the Populist Party. From 1992 to 2008, the American Independent Party was the California affiliate of the national Constitution Party, formerly the U.S. Taxpayers Party, whose founders included", "political issues within their party is a false assumption. Despite contrary beliefs, there are many liberal Republicans and conservative Democrats in the U.S. who have differing political beliefs within their parties. However, these voters most often align with their party because of the limited choice of candidates, and to do otherwise (i.e. vote for a third-party candidate) is perceived as a waste of time. Issue partisanship Despite various claims that argue American society is more polarized today than leading up to the U.S. Civil War, numerous scholars explain that much evidence shows there is a relatively stable public opinion on", "Conservative Party (United States) The Conservative Party in the United States refers to various state parties that have no connection with one another that support Conservatism in the United States. National level There never has been an active national political party that used the name \"Conservative.\" \nThe Conservative Party USA is a 527 organization. \nThe \"American Conservative Party was formed in 2008 and then decommissioned in 2016. It does not claim any members who ran for or held political office. Illinois A conservative party in Illinois established in 2018, largely to support State Senator Sam McCann's run for governor. New", "National Republican Party History Before the election of John Quincy Adams to the presidency in 1825, the Democratic-Republican Party, which had been the only national American political party for over a decade, began to fracture, losing its infrastructure and identity. Its caucuses no longer met to select candidates because now they had separate interests. After the 1824 election, factions developed in support of Adams and in support of Andrew Jackson. Adams politicians, including most ex Federalists (such as Daniel Webster and Adams himself), would gradually evolve into the National Republican Party; and those politicians that supported Jackson would later help", "Political positions of the Republican Party The platform of the Republican Party of the United States is generally based on conservatism, in contrast to the modern liberalism of the Democrats. The party incorporates moderates, sometimes described as establishment Republicans, and members of the Tea Party or Freedom Caucus, who have been described as populist, right-wing, and far-right. The Republican Party's conservatism involves support for free market capitalism, free enterprise, business, a strong national defense, deregulation, restrictions on labor unions, social-conservative policies, and traditional values, usually with a Christian foundation. The party is generally split on the issue of how to", "Electoral history of the American Independent and American parties This is a list detailing the electoral history of the American Independent and American Parties, sorted by year. While initially a single party, a schism occurred between factions that sought either to expand the party's influence beyond into the North, and those that sought to concentrate largely within the Deep South. Though they were by 1976 established as two parties, it remains difficult to ascertain which candidates were loyal to which faction, and so they have been collected for the sake of simplicity into a single list.\nThe list only consists of", "and the question is tied to the reason for its existence. There are two currents within the party, namely the radical democrats and the progressive liberals. Although sometimes antagonistic, these two currents currently complement each other as both emphasise the self-realisation of the individual. The Radical League and the Free-thinking Democratic League, two early 20th century parties are historic exponents of these two traditions. Radical democrats The first party congress emphasised radical democratisation of Dutch society and the political system. Its ideal was a two-party system. To obtain this, it wanted to reform the electoral system after the American first", "shifted toward the Republican Party, showing polarization among both the elites and the electorate of both main parties.\nPolitical scientists have shown politicians have an incentive to advance and support polarized positions. These argue that during the early 1990s, the Republican Party used polarizing tactics to become the majority party in the United States House of Representatives—which political scientists Thomas E. Mann and Norman Ornstein refer to as Newt Gingrich's \"guerrilla war.\" What political scientists have found is that moderates are less likely to run than are candidates who are in line with party doctrine, otherwise known as \"party fit.\"Other theories", "States The meaning of \"conservatism\" in the United States has little in common with the way the word is used elsewhere. As Ribuffo (2011) notes, \"what Americans now call conservatism much of the world calls liberalism or neoliberalism\". Since the 1950s, conservatism in the United States has been chiefly associated with the Republican Party. However, during the era of segregation, many Southern Democrats were conservatives and they played a key role in the Conservative coalition that largely controlled domestic policy in Congress from 1937 to 1963. The Conservative Democrats continued to have influence in the U.S. politics until 1994's Republican", "party is the most common ideological breakdown in such a system but in two-party states political parties are traditionally catch all parties which are ideologically broad and inclusive.\nThe United States has gone through several party systems, each of which has been essentially two-party in nature. The divide has typically been between a conservative and liberal party; presently, the Republican Party and Democratic Party serve these roles. Third parties have seen extremely little electoral success, and successful third party runs typically lead to vote splitting due to the first-past-the-post, winner-takes-all systems used in most US elections. There have been several examples", "Setting the stage Urban politics in late 19th century America proved an ideal situation for the emergence of associationalism, ripe with several qualifications discussed by early associationalists. In addition, voter turnout was relatively high, though usually confined to party lines. Despite this fact, the two large national parties at the time (Democrats and Republicans) lacked significant ideological differences on specific issues. Respected members of communities across the country began to propose associationalism as a solution to America's social political problems. Several Protestant ministers such as Lyman Abbot, Washington Gladden, Josiah Strong, and Walter Raushenbusch began to call", "interest. While the framers of the Constitution did not think that political parties would play a role in American politics, political parties have long been a major force in American politics, and the nation has alternated between periods of intense party rivalry and partisanship, as well as periods of bipartisanship. According to Robert Siegel of National Public Radio, there has been virtually no cooperation between Democrats and Republicans in the U.S. during the few years before 2010.\nBipartisanship can also be between two or more opposite groups (e.g. liberal and conservative) to agree and determine a plan of action on an", "History The Republican Party of the United States was founded during the 1850s in response to the political tensions that revolved around slavery and came to define that era. The Republican Party's goal was to abolish slavery and preserve the hierarchy of the national government over that of the states. The ensuing years were marked by an increasing divide between northern and southern states that eventually boiled over when the state of South Carolina seceded from the Union in 1860. Other southern states followed and the Civil War of the United States began in 1861 between the Union", "United States preferred the values of the Democratic Party over those of the Republican Party. He added that most New Agers \"soundly rejected\" the agenda of former Republican President Ronald Reagan. Social communities MacKian suggested that this phenomenon was \"an inherently social mode of spirituality\", one which cultivated a sense of belonging among its participants and encouraged relations both with other humans and with non-human, otherworldly spirit entities.\nMacKian suggested that these communities \"may look very different\" from those of traditional religious groups.\nOnline connections were one of the ways that interested individuals met new contacts and established networks. Commercial aspects Some", "to adopt the convention \"Opposition Party\" for the 34th and 35th Congresses. This term encompasses Independent, Know Nothing, Fusion, Anti-Nebraska, Anti-Administration, Whig, Free Soil and Unionist.\nFollowing the 1854 election, the Opposition Party actually was the largest party in the U.S. House of Representatives. In the resulting 34th United States Congress, the U.S. House's 234 Representatives were made up of 100 Oppositionists, 83 Democrats, and 51 Americans (Know Nothing). That was a very dramatic shift from the makeup of the 33rd United States Congress (157 Democrats, 71 Whigs, 4 Free Soilers, 1 Independent, 1 Independent Democrat). As a provisional coalition more", "parties tend to exist to promote a specific issue or personality. Often, the intent is to force national public attention on such an issue. Then, one or both of the major parties may rise to commit for or against the matter at hand, or at least weigh in. H. Ross Perot eventually founded a third party, the Reform Party, to support his 1996 campaign. In 1912, Theodore Roosevelt made a spirited run for the presidency on the Progressive Party ticket, but he never made any efforts to help Progressive congressional candidates in 1914, and in the 1916 election, he supported", "C. Martis' analysis, a political party must meet one of four criteria, including (a) run clearly identifiable congressional candidates, many times in three-way contests; and/or (b) they represent a clearly identifiable historical political movement or sentiment that is regional or national in scope. Elements of the pro-Union American Party and the Whig Party in the South needed to organize a political party which could not be accused of disloyalty to Southern institutions (slavery). Later activity in North Carolina In North Carolina, a Republican organization did not develop until after the Civil War and many former Whigs such as John Pool", "Democratic Party Congressmen in May.\nMeeting in a Ripon, Wisconsin, Congregational church on February 28, 1854, some thirty opponents of the Nebraska Act called for the organization of a new political party and suggested that \"Republican\" would be the most appropriate name (to link their cause to the defunct Republican Party of Thomas Jefferson). These founders also took a leading role in the creation of the Republican Party in many northern states during the summer of 1854. While conservatives and many moderates were content merely to call for the restoration of the Missouri Compromise or a prohibition of slavery extension, radicals", "Third Position United States In the United States, Political Research Associates argues that Third Position politics has been promoted by some white nationalist and neo-Nazi groups such as the National Alliance, American Front, Traditionalist Worker Party, and White Aryan Resistance, as well as some religious nationalist groups, such as the Nation of Islam, since the late 20th century. In 2010, the American Third Position Party (later renamed American Freedom Party) was founded in part to channel the right-wing populist resentment engendered by the financial crisis of 2007–2010 and the policies of the Obama administration.", "Political positions of the Democratic Party The Democratic Party is one of the two major contemporary political parties in the United States. The party describes itself as supporting American liberalism and American progressivism. The party incorporates centrists liberals and progressives, as well as more left-wing or socialist movements, many aligned with the presidential campaign of independent Senator Bernie Sanders. There is also a small Conservative wing represented in the house by the Blue Dog Coalition, although Conservative Democrat ideology is different from the traditional Conservatism the Republican party supports. Policies of past Democratic platforms have sought to protect social programs,", "Politics of the United States Political culture Scholars from Alexis de Tocqueville to the present have found a strong continuity in core American political values since the time of the American Revolution in the late 18th century. Usage of \"left–right\" politics The modern American political spectrum and the usage of the terms \"left–right politics\", \"liberalism\", and \"conservatism\" in the United States differs from that of the rest of the world. According to American historian Arthur Schlesinger, Jr. (writing in 1956), \"Liberalism in the American usage has little in common with the word as used in the politics of any European", "critical of capitalism, especially banks and railroads, and allied itself with the labor movement.\nEstablished in 1891 as a result of the Populist movement, the People's Party reached its zenith in the 1892 presidential election, when its ticket, composed of James B. Weaver and James G. Field, won 8.5% of the popular vote and carried five states (Colorado, Idaho, Kansas, Nevada and North Dakota), and the 1894 House of Representatives elections, when it won nine seats. Built on a coalition of poor, white cotton farmers in the South (especially North Carolina, Alabama and Texas) and hard-pressed wheat farmers in the Plains", "on the founders of the United States. In the 1960s and 1970s, a revisionist school led by the likes of Bernard Bailyn began to argue that republicanism was just as or even more important than liberalism in the creation of the United States. This issue is still much disputed and scholars like Isaac Kramnick completely reject this view." ]
How do broadcasters sell and maximize advertising revenue during live sports when they don't know how many commercial breaks there will be?
[ "For American football games they know within one or two how many breaks there will be. On between possessions they will radio down and stop lay during the break a \"TV timeout\" and a dude in a bright colored red or yellow jacket will come out and stand with the ref until it is time to resume play.", "They know roughly how many breaks there will be, and live events aren't ever actually broadcasted \"live\", there is always a few seconds to a few minutes delay both for purposes of censoring, postprocessing, and for inserting of advertisements." ]
[ "Commercial broadcasting Advertising Commercial broadcasting is primarily based on the practice of airing radio advertisements and television advertisements for profit. This is in contrast to public broadcasting, which receives government subsidies and usually does not have paid advertising interrupting the show. During pledge drives, some public broadcasters will interrupt shows to ask for donations.\nIn the United States, non-commercial educational (NCE) television and radio exists in the form of community radio; however, premium cable services such as HBO and Showtime generally operate solely on subscriber fees and do not sell advertising. This is also the case for the portions of the", "well the parties negotiate. During busier times of the year, stations can actually sell out of ads entirely, because, unlike the print media, radio stations only have a limited number of commercial units available per hour. During the dot-com boom, some stations ran as much as twenty minutes of ads per hour. While commercial levels are nowhere near as high today, with the average station running approximately nine minutes of ads per hour, peak periods can and do sell out.\nThus, advertising rates will vary depending on time of year, time of day, how well the station does in", "does not carry outside advertising aside from commercials inserted by local providers: commercial breaks consist solely of promos for Fox Sports Racing programming and public service announcements.", "shows. However, programming must be regularly cycled, otherwise it gets stale with the audience and produces low ratings.\nAdvertising is also offered via contracts, which require certain rating marks to pay out. For example, a contract for Nike might pay better than one for a local business, but the Nike contract will require substantially more viewers. Access to more viewers can be achieved by buying more transmitters and satellites.\nThe player competes against two other television stations, run by computer-controlled program directors, in the same building. These program directors inhabit the same space and locations as the player, and they can directly", "them to fast forward through commercials. Additionally, as more seasons of pre-recorded box sets are offered for sale of television programs; fewer people watch the shows on TV. However, the fact that these sets are sold, means the company will receive additional profits from these sets.\nTo counter this effect, a variety of strategies have been employed. Many advertisers have opted for product placement on TV shows like Survivor. Other strategies include integrating advertising with internet-connected program guidess (EPGs), advertising on companion devices (like smartphones and tablets) during the show, and creating mobile apps for TV programs. Additionally, some like brands", "excluding production expenses) to showcase their work and generate buzz that many people tune into television's biggest event of the year just to watch the commercials, not just the actual game. For those reasons, USA Today started the Ad Meter, a poll that gives live responses per second of each commercial. According to the newspaper, ads by rule are limited to those shown during the game - from opening kickoff to the end of the game, excluding those shown at halftime or local commercials - are officially qualified for consideration in the Ad Meter survey.\nA new element was added", "airings. Advertisements are not shown seeing as that play does not stop for two forty-five-minute half’s, other than a halftime report, during which, commercials are aired. Logos are shown on the screen during broadcasting throughout the game and advertisements from sponsors can be seen before and after the game. Both pregame and post-game segments are included with a large number of games if time between matches permits, and are always aired for USMNT games. World Cup Live has kept this basic format over the past couple tournaments and plans on continuing for the 2014 World Cup. The show ended after", "not being subject to pressure from sponsors to tone down content. As a result, programming is typically aired with limited to no edits for time or, where applicable, mature content such as graphic violence, profanity, nudity, and sexual activity.\nAs premium television services are commonly devoid of traditional commercial advertising, breaks between programming typically include promotions for upcoming programs, and interstitial segments (such as behind-the-scenes content, interviews, and other feature segments). Some sports-based pay services, however, may feature some commercial advertising, particularly if they simulcast sporting events that are broadcast by advertiser-supported television networks.\nIn addition, most general interest or movie-based pay", "not sell air time for commercials but its licence did allow for it to carry sponsored programming, and eight such sponsored broadcasts were aired in 1925. However, the main source of its income was from the sale of radio receiving sets and transmitters manufactured by its shareholding member companies as well as from a portion of the government (GPO) licence fee that had to be purchased by BBC listeners.", "United States. Major cable television in the United States operators include Comcast, Cox Communications and Time Warner Cable. Direct-broadcast satellite (DBS) services include DirecTV and Dish Network.\nIn an hour of broadcast time on a commercial broadcasting station, 10 to 20 minutes are typically devoted to advertising. Advertisers pay a certain amount of money to air their commercials, usually based upon program ratings or the audience measurement of a station or network. This makes commercial broadcasters more accountable to advertisers than public broadcasting, a disadvantage of commercial radio and television. Europe In Europe, commercial broadcasting coexists with public broadcasting (where", "as 90% off the rate card. Outdoors Everywhere you look you see billboards that go unfilled. Although this is not last minute advertising in the strictest sense because often these spaces go unfilled for a long time, it is a major form of remnant advertising and should not be ignored by companies looking for opportunities to advertise especially for short bursts. Sponsorship Many sporting and other events are unable to get the advertisers that they would like. This is another form of remnant advertising. While large sporting events such as the Super Bowl or Formula One sell their advertising and", "to television shows can be skipped, advertising in TV shows themselves (\"product placement\") cannot be skipped. Streaming services such as Hulu show shorter advertisements with a countdown timer and tailored to the viewers interests, asking interactive questions like \"Is this ad relevant to you?\".", "today it is between 14 and 17 minutes. With the introduction of the shorter 15-second-spot the total amount of ads increased even more. Ads are not only placed in breaks but also into sports telecasts during the game itself. They flood the Internet, a growing market.\nOther growing markets are product placements in entertainment programming and movies where it has become standard practice and virtual advertising where products get placed retroactively into rerun shows. Product billboards are virtually inserted into Major League Baseball broadcasts and in the same manner, virtual street banners or logos are projected on an entry canopy or", "is a \"fair deal\". Furthermore, broadcast radio advertising often offers the advantage of being localized and inexpensive in comparison with other mediums such as television. Thus, radio advertising can be an effective, low-cost medium through which a business can reach their target consumer. Studies show that radio ads create emotional reactions in listeners. In turn, consumers perceive the ads as more relevant to them personally, which can lead to increased market awareness and sales for businesses running ad schedules. Twenty-five percent of listeners say they're more interested in a product or business when they hear about it on", "on the station for a low cost, advertisements for services of a sexual nature (such as premium-rate adult rate entertainment services and adult products from companies such as Adam & Eve), direct response advertising for products and services (often marketed \"As Seen On TV\") otherwise seen during infomercials, and public service announcements (such as those commissioned by the Ad Council) airing in these time slots due to the reduced importance of advertising revenue. Network overnight programming The Big Three television networks in the United States all offer regular programming in the overnight slot. Both ABC and CBS carry overnight newscasts", "show TV total on the German television channel ProSieben. The network used to declare these broadcasts as sporting events. Under German law that allowed the network to treat the massive corporate sponsorship of the event as incidental advertising which didn't count against Germany's strict rules regarding time limits for TV commercials. After a Berlin court ruling in 2009, however, the shows have to be labeled as an infomercial, since – unlike a regular sporting event – the races are explicitly staged for the TV broadcast, and there is strong evidence that the profits of the event sponsorship directly benefit the", "commercials, etc.) shown during play breaks with highlight clips, live footage of in-arena activities including dance team performances, half-time entertainment, fans in the crowd, and interviews or features produced by the local broadcaster. International Packages and Promotions In addition to the standard and Premium packages, users also have the option to purchase a stand-alone streaming subscription to NBA TV International, which broadcasts games, studio shows, press conferences, and other basketball content. In past seasons, International League Pass has also offered sampling packages that provide stand-alone access to Christmas Day games and All Star Weekend events. The last several weeks of", "you by…\", and is usually limited to about thirty words. Fifteen-second spots are generally reserved for station promotional announcements, although some stations sell them.\nIn addition to traditional radio advertising, some stations are selling airtime during their streaming broadcasts. In the past, the radio station stream included only the commercials that were also running on air. CBS announced it would begin airing 'live reads' in its streaming radio broadcasts, sold and voiced separately from the stations' regular spots, noting the efficacy of live endorsements. Efficacy More than eight out of ten Americans feel listening to commercials in exchange for free radio", "progression of an event or at the beginning or end of an advertising break when viewers are more likely to be attentive to what is being advertised. Certain events also allow sponsors the right to brand themselves as \"exclusive\" event sponsors in television and print media for an additional charge. In general, advertisers are advised to divide television advertising budgets so that approximately 20% is used to secure a spot and the remaining 80% is used to develop the content of the advertisement. Networks may also offer advertising time packages in which much less desirable advertising time spots are offered", "does not carry commercial advertising: commercial breaks consist solely of promos for its programming, with no outside advertising aside from public service announcements and promotions inserted by local providers.\nIn early 2014, major Canadian service providers including Rogers Cable and Bell TV began to drop the service upon the expiration of their carriage contracts. Cogeco dropped the Speed Channel on July 15, 2014. Shaw later announced they will drop Speed on April 1, 2015 within their cable and satellite system (a.k.a. Shaw Cable and Shaw Direct). Reports indicate that Fox had attempted to raise the channel's carriage fees significantly, despite the", "television advertising spots in the 2014 Super Bowl sold at up to $4 million. This reflects increased competition of national and international level brand names as well as developing interest and demand among viewers for television broadcast mega-events. The cost of mega event advertising spots are determined to some degree by the costs the network paid to air the event and generally, like regular advertising time, are sold on a first-come, first-served basis. However, prices can increase with increasing advertiser demand. Advertisers may pay additional for specific demands such as placement of their advertisement at a specific point during the", "that in addition to the program being a paid advertisement, the broadcaster bears no responsibility or liability for the infomercial's content (the legality of a station or network attempting to absolve itself of liability for a program it airs, while profiting from the same program, has never been tested in court). A few stations also encourage viewers to contact their local Better Business Bureau or state or local consumer protection agency to report any questionable products or claims that air on such infomercials. Some channels, such as CNBC (until early 2017), Fox Business Network (which has stopped doing so) and", "advertising to the same degree as commercial broadcasters, or at all; this allows public broadcasters to transmit programmes that are not commercially viable to the mass market, such as public affairs shows, radio and television documentaries, and educational programmes.\nOne of the principles of public broadcasting is to provide coverage of interests for which there are missing or small markets. Public broadcasting attempts to supply topics of social benefit that are otherwise not provided by commercial broadcasters. Typically, such underprovision is argued to exist when the benefits to viewers are relatively high in comparison to the benefits to advertisers from contacting", "advertising as ground signage/clothing/equipment advertising, promoting games, promoting using players/club/league or developing ‘business opportunities.’\nThe peculiarity of sports is that “sports is the only entertainment where, no matter how many times you go back, you never know the ending.” This singular fact is used by marketing companies as an advantage: every time the audience attends an event it will see the advertisements again and again, providing a wide range of opportunities for the different companies which operate in this field. Sponsorship of events One of the oldest examples of the marketing of products through sports is Slazenger's supplying of the official", "is also done to avoid watching advertisements. Using television advertisements is beneficial due to its wide reach and the degree to which content can be segmented according to the intended target market. Advertisements are carefully paired with time segments and / or linked with appropriate programming, known as \"media vehicles\". This helps to ensure the intended audience is being reached with the marketing message.\nWhile initial production costs of a television advertisement are high, it is likely to reach a mass audience and, therefore, maintains a low cost per viewer, making it an efficient communication platform. Radio Radio by definition is", "Box, where commercials are displayed in a prominent widescreen box, accompanied by an \"L-bar\" with sponsor logos relevant to the commercial, and a small window showing continued live footage from the event (limited mostly to teams in the huddle and no actual gameplay, as the commercials took place, as normal, during a television timeout). Fox also experimented with a similar format during American Idol, where selected breaks showcased behind-the-scenes camera feeds from the live broadcast\nIn 2017, Fox introduced a similar presentation for short-form, in-game commercials displayed in the midst of a telecast, which are acknowledged and introduced by the commentator.", "ability to communicate with consumers effectively. Spot advertising, a novel form of promotion in this era, came to be known as a prodigious way of advertising. This is television advertising where advertisements appear between programmes.\nAs the popularity of sponsorship arrangements grew, American advertisers sponsored TV programmes or films in order to promote their products through broadcast media. Concern grew that this form of advertising could easily manipulate young children as they are less able to comprehend the implicit objective of advertisers.\nA late-August 2016 report indicated that various Internet streaming services have saved children of the 2010s from 150 hours of", "to enjoy the recorded programs was seen so negatively that in 2006 major networks acceded to advertisers to only use live ratings as currency when setting prices for TV advertising space. The primary justification for advertisers was the notion that recorded advertisements had no value due to advertising avoidance.\nAn important discussion often ignored was the fact that viewers have been avoiding TV advertisements since their invention. One such way was to switch to another channel, or “multitask” by having conversations with others, leave the room, mute the TV, or more recently, zip through the commercials in a recorded program. While", "as sports and adult networks may ask for monthly pricing that may go as high as near $50 a month. There are also premium television services which are priced significantly higher than the mini-pay channels, but they compensate for their higher price by carrying little or no advertising and also providing a higher quality program output. As advertising sales are sensitive to the business cycle, some broadcasters try to balance them with more stable income from subscriptions.\nSome providers offer services owned by the same company in a single package. For example, American satellite provider DirecTV offers the Encore channels along", "ads, wastes class time, and wastes tax dollars. Supporters argue that the ads are necessary to help keep the program running and lease TVs, VCRs, and satellite dishes to schools, as well as commercial-free educational video through Channel One Connection. In 2006, the American Academy of Pediatrics reported that research indicated that children who watched Channel One remembered the commercials more than they remembered the news.\nAnother criticism, noted by Media Education Foundation's documentary Captive Audience, is that very little time is dedicated to actual news, and the majority of the programming is corporate marketing and PR tie-ins to promote products" ]
Why when we are sick/have an infection does our body temperature go up, as in a fever?
[ "Many infections grow best at particularly precise temperatures. Your body raises your temperature as a defense mechanism, slowing down the reproduction of the infectious agent and giving your own defenses a chance to 'catch up'. At the same time it enhances the ability of some of your body's defenders to move around more actively in their war.", "I see this question A LOT here, but I know Reddit's search function doesn't work that well so it's fine.\n\nu/stuthulhu already explained that the substances/cells that protect our body against intruders do their best job in an environment with a higher temperature. A part of your brain controls the body temperature by setting a preferrable body temperature and compare it to the actual body temperature. When the body temperature is higher than the setpoint, you'll feel hot and the body will set processes in motion in order to lose heat (more blood to the skin and sweating). When the body temperature is lower than the setpoint, you'll feel cold and you start to shiver because you need to generate heat in order to reach that setpoint.\nIn the case of fever, the setpoint increases and as a result, you'll feel cold while your body temperature is much warmer than normal. It's a good sign when a sick person is sweating, because it means that the setpoint has returned to the normal temperature." ]
[ "pain, and swelling (inflammation).\nThis reddened skin or rash may signal a deeper, more serious infection of the inner layers of skin. Once below the skin, the bacteria can spread rapidly, entering the lymph nodes and the bloodstream and spreading throughout the body. This can result in influenza-like symptoms with a high temperature and sweating or feeling very cold with shaking, as the sufferer cannot get warm.\nIn rare cases, the infection can spread to the deep layer of tissue called the fascial lining. Necrotizing fasciitis, also called by the media \"flesh-eating bacteria\", is an example of a deep-layer infection. It is", "sepsis, Kawasaki syndrome, neuroleptic malignant syndrome, drug overdose, serotonin syndrome, and thyroid storm.\nInfections are the most common cause of fevers, but as the temperature rises other causes become more common. Infections commonly associated with hyperpyrexia include roseola, measles and enteroviral infections. Immediate aggressive cooling to less than 38.9 °C (102.0 °F) has been found to improve survival. Hyperpyrexia differs from hyperthermia in that in hyperpyrexia the body's temperature regulation mechanism sets the body temperature above the normal temperature, then generates heat to achieve this temperature, while in hyperthermia the body temperature rises above its set point due to an outside source.", "Fever Signs and symptoms A fever is usually accompanied by sickness behavior, which consists of lethargy, depression, loss of appetite, sleepiness, hyperalgesia, and the inability to concentrate. Hyperpyrexia Hyperpyrexia is an extreme elevation of body temperature which, depending upon the source, is classified as a core body temperature greater than or equal to 40.0 or 41.5 °C (104.0 or 106.7 °F). Such a high temperature is considered a medical emergency, as it may indicate a serious underlying condition or lead to problems including permanent brain damage, or death. The most common cause of hyperpyrexia is an intracranial hemorrhage. Other possible causes include", "Hypovolemic and endotoxic shock are manifest by increased capillary refill time, congested or cyanotic (purplish) mucous membranes, and cold extremities. While there may initially be a fever, temperature usually returns to normal.\nClinical signs are similar to those of other diarrheal diseases, including toxemia caused by Clostridium, Potomac horse fever, experimental endotoxic shock, and anaphylaxis. Causes To date, the precise causative factor has not been verified, and the disease has been attributed by various sources to viruses, parasites, bacteria, use of antibiotics and sulfonamides, and heavy metal poisoning. Other possible causes include peracute salmonellosis, clostridial enterocolitis, and endotoxemia. Clostridium difficile toxins", "central nervous system, from brain hemorrhage, status epilepticus, and other kinds of injury to the hypothalamus can also cause hyperthermia. Pathophysiology A fever occurs when the core temperature is set higher, through the action of the pre-optic region of the anterior hypothalamus. For example, in response to a bacterial or viral infection, certain white blood cells within the blood will release pyrogens which have a direct effect on the anterior hypothalamus, causing body temperature to rise, much like raising the temperature setting on a thermostat.\nIn contrast, hyperthermia occurs when the body temperature rises without a change in the heat", "temperature variation is typically 0.5 °C (0.90 °F), but can be greater among people recovering from a fever.\nAn organism at optimum temperature is considered afebrile or apyrexic, meaning \"without fever\". If temperature is raised, but the setpoint is not raised, then the result is hyperthermia. Hyperthermia Hyperthermia occurs when the body produces or absorbs more heat than it can dissipate. It is usually caused by prolonged exposure to high temperatures. The heat-regulating mechanisms of the body eventually become overwhelmed and unable to deal effectively with the heat, causing the body temperature to climb uncontrollably. Hyperthermia at or above about 40 °C", "In Chapter 16, the author presents a number of examples from common experience. For instance, in a fever hot and cold humors counteract each other in the body without the need of medical aid. As he points out in chapter 17, however, in some cases the fever persists. This is an indication that hot is not the sole cause of the fever. There must be some other inherent factor responsible for sustaining the fever. In chapters 18 and 19, he continues to develop the idea that recovery from disease comes about when there is a blending and coction of", "fatality in severe cases. Babies suffering from hypothermia will experience low skin temperatures despite appearing healthy otherwise. Heat loss from the skin to the external environment is a significant factor contributing to acute hypothermia. As the barrier between the human body's internal organs and contents, skin undoubtedly plays the pivotal role in heat exchange between the body's internals and the external environment. Internal body heat is released to the environment at a greater rate with low skin temperature, as heat follows temperature gradients from regions of high temperature (the body's internals) to another location of lower temperature, as described by", "of a fever. Most commonly this means that the elevated temperature has occurred in a hot, humid environment (heat stroke) or in someone taking a drug for which hyperthermia is a known side effect (drug-induced hyperthermia). The presence of signs and symptoms related to hyperthermia syndromes, such as extrapyramidal symptoms characteristic of neuroleptic malignant syndrome, and the absence of signs and symptoms more commonly related to infection-related fevers, are also considered in making the diagnosis.\nIf fever-reducing drugs lower the body temperature, even if the temperature does not return entirely to normal, then hyperthermia is excluded. Prevention When ambient", "quite vague and similar to the signs that can indicate other illnesses or diseases, so it is relatively difficult to identify when only looking at symptoms. However, in several cases, these infections result after an individual's immune system has been weakened, so it is likely to occur in recovering or ill patients. Most patients, after receiving treatment for another disease or during recovery from surgery, experience chills and increase in body temperature. While these symptoms could mean a variety of things, it is clear that the patient's recovery is halted and that there is an infection of", "fever tends to begin around 3-8 days after infection, which is often accompanied by a low white blood cell count, especially of lymphocytes, as well as low platelet count. These signs may or may not be accompanied by anorexia, a runny nose, and discharge from the eye. This first round of fever typically recedes rapidly within 96 hours, and then a second round of fever begins around the 11th or 12th day and lasts at least a week. Gastrointestinal and respiratory problems tend to follow, which may become complicated with secondary bacterial infections. Inflammation of the", "to shift work schedules may affect body temperature. Fever A temperature setpoint is the level at which the body attempts to maintain its temperature. When the setpoint is raised, the result is a fever. Most fevers are caused by infectious disease and can be lowered, if desired, with antipyretic medications.\nAn early morning temperature higher than 37.2 °C (99.0 °F) or a late afternoon temperature higher than 37.7 °C (99.9 °F) is normally considered a fever, assuming that the temperature is elevated due to a change in the hypothalamus's setpoint. Lower thresholds are sometimes appropriate for elderly people. The normal daily", "drinking water, removing clothing that might keep heat close to the body, or sitting in front of a fan. Bathing in tepid or cool water, or even just washing the face and other exposed areas of the skin, can be helpful.\nWith fever, the body's core temperature rises to a higher temperature through the action of the part of the brain that controls the body temperature; with hyperthermia, the body temperature is raised without the influence of the heat control centers. Hypothermia In hypothermia, body temperature drops below that required for normal metabolism and bodily functions. In humans,", "humid and hot arid. High temperatures pose serious stresses for the human body, placing it in great danger of injury or even death. For example, one of the most common reactions to hot temperatures is heat exhaustion, which is an illness that could happen if one is exposed to high temperatures, resulting in some symptoms such as dizziness, fainting, or a rapid heartbeat. For humans, adaptation to varying climatic conditions includes both physiological mechanisms resulting from evolution and behavioural mechanisms resulting from conscious cultural adaptations. The physiological control of the body’s core temperature takes place primarily through the hypothalamus, which", "Gastroenteritis Signs and symptoms Gastroenteritis usually involves both diarrhea and vomiting. Sometimes, only one or the other is present. This may be accompanied by abdominal cramps. Signs and symptoms usually begin 12–72 hours after contracting the infectious agent. If due to a virus, the condition usually resolves within one week. Some viral infections also involve fever, fatigue, headache and muscle pain. If the stool is bloody, the cause is less likely to be viral and more likely to be bacterial. Some bacterial infections cause severe abdominal pain and may persist for several weeks.\nChildren infected with rotavirus usually make a full recovery", "follow acute illness, or mild or even subclinical infections. Chronic carriers are most often women who were infected in their middle age. Pathophysiology After ingestion, if the immune system is unable to stop the infection, the bacteria multiply and then spread to the bloodstream, after which the first signs of disease are observed in the form of fever. They penetrate further to the bone marrow, liver, and bile ducts, from which bacteria are excreted into the bowel contents. In the second phase of the disease, the bacteria penetrate the immune tissue of the small intestine, and the initial symptoms of", "Hypothermia Signs and symptoms Signs and symptoms vary depending on the degree of hypothermia, and may be divided by the three stages of severity. Infants with hypothermia may feel cold when touched, with bright red skin and an unusual lack of energy. Mild Symptoms of mild hypothermia may be vague, with sympathetic nervous system excitation (shivering, high blood pressure, fast heart rate, fast respiratory rate, and contraction of blood vessels). These are all physiological responses to preserve heat. Increased urine production due to cold, mental confusion, and liver dysfunction may also be present. Hyperglycemia may be present, as glucose", "when they are ovulating, so as to aid conception or contraception. Variations due to fever Fever is a regulated elevation of the set point of core temperature in the hypothalamus, caused by circulating pyrogens produced by the immune system. To the subject, a rise in core temperature due to fever may result in feeling cold in an environment where people without fever do not. Variations due to biofeedback Some monks are known to practice Tummo, biofeedback meditation techniques, that allow them to raise their body temperatures substantially. Low body temperature increases lifespan It has been theorised that low body temperature", "Hyperthermia Hyperthermia is an example of a high temperature that is not a fever. It occurs from a number of causes including heatstroke, neuroleptic malignant syndrome, malignant hyperthermia, stimulants such as substituted amphetamines and cocaine, idiosyncratic drug reactions, and serotonin syndrome. Pathophysiology Temperature is ultimately regulated in the hypothalamus. A trigger of the fever, called a pyrogen, causes release of prostaglandin E2 (PGE2). PGE2 in turn acts on the hypothalamus, which creates a systemic response in the body, causing heat-generating effects to match a new higher temperature set point.\nIn many respects, the hypothalamus works like a thermostat. When the", "be the direct cause of all diseases. Health was associated with a balance of humors, or eucrasia. The qualities of the humors, in turn, influenced the nature of the diseases they caused. Yellow bile caused warm diseases and phlegm caused cold diseases. In On the Temperaments, Galen further emphasized the importance of the qualities. An ideal temperament involved a balanced mixture of the four qualities. Galen identified four temperaments in which one of the qualities, warm, cold, moist or dry, predominated and four more in which a combination of two, warm and moist, warm and dry, cold and dry or", "and various endocrine organs. Management Fever should not necessarily be treated. Most people recover without specific medical attention. Although it is unpleasant, fever rarely rises to a dangerous level even if untreated. Damage to the brain generally does not occur until temperatures reach 42 °C (107.6 °F), and it is rare for an untreated fever to exceed 40.6 °C (105 °F). Treating fever in people with sepsis does not affect outcomes. Conservative measures Some limited evidence supports sponging or bathing feverish children with tepid water. The use of a fan or air conditioning may somewhat reduce the temperature and increase comfort. If the temperature", "Nature of Man gives first hand accounts and explanations of individual medical cases. For example, dysentery and nosebleeds occur in the spring and summer because this is when the blood is at its hottest. Hippocrates concludes that the degree of damage a given disease can do to a person depends on its nature. The most serious of illnesses are those that affect the strongest part of the body. If the strongest part of the body is affected, then the weak parts are easily affected and may cause death. However, if a disease starts in a weak area of the body,", "the body temperature tend to decrease. Elderly patients may have a decreased ability to generate body heat during a fever, so even a somewhat elevated temperature can indicate a serious underlying cause in geriatrics. Variations due to outside factors Many outside factors affect the measured temperature as well. \"Normal\" values are generally given for an otherwise healthy, non-fasting adult, dressed comfortably, indoors, in a room that is kept at a normal room temperature, 22.7 to 24.4 °C (73 to 76 °F), during the morning, but not shortly after arising from sleep. Furthermore, for oral temperatures, the subject must not have eaten,", "while others experience only minor itching or burning for a few days. Some evidence indicates genetics play a role in the frequency of cold sore outbreaks. An area of human chromosome 21 that includes six genes has been linked to frequent oral herpes outbreaks. An immunity to the virus is built over time. Most infected individuals experience fewer outbreaks and outbreak symptoms often become less severe. After several years, some people become perpetually asymptomatic and no longer experience outbreaks, though they may still be contagious to others. Immunocompromised individuals may experience longer, more frequent, and more severe episodes. ", "skin and excessive sweating, urinary incontinence, and altered sexual function. Constipation and impaired stomach emptying (gastric dysmotility) can be severe enough to cause discomfort and even endanger health. Changes in perception may include an impaired sense of smell, disturbed vision, pain, and paresthesia (tingling and numbness). All of these symptoms can occur years before diagnosis of the disease. Causes Many risk factors have been proposed, sometimes in relation to theories concerning possible mechanisms of the disease; however, none have been conclusively proven. The most frequently replicated relationships are an increased risk in those exposed to pesticides, and a reduced risk", "are harder to treat, but still curable.\nThe common cold/flu is the most common cause for the upper respiratory tract infection, which can cause more serious illness that can develop in the lower respiratory \ntract. Pneumonia is the most common, and frequent lower respiratory tract infection. This can be either viral, bacterial, or fungal. This infection is very common, because pneumonia can be airborne, and when you inhale this infection in the air, the particles enter the lungs and move into the air sacs. This infection quickly develops in the lower part of the lung, and fills the lung with fluid,", "to illness (such as HIV) or medical treatment (such as chemotherapy for cancer) are also more likely to get sick. The first symptom of Cronobacter infection in infants is usually a fever, coupled with poor feeding, crying, or very low energy. Parents or caregivers should take an infant with these symptoms to see a doctor. Heating breast milk or infant formula There are two ways to heat bottles with disposable inserts or hard plastic, and glass bottles. A bottle can be placed under hot, running tap water until the desired temperature is reached. This should take one-to-two minutes. A bottle", "Continuous fever Continuous fever is a type or pattern of fever in which temperature does not touch the baseline and remains above normal throughout the day. The variation between maximum and minimum temperature in 24 hours is less than 1°C (1.5°F). It usually occurs due to some infectious disease. Diagnosis of continuous fever is usually based on the clinical signs and symptoms but some biological tests, chest X-ray and CT scan are also used. Typhoid fever is an example of continuous fever and it shows a characteristic step-ladder pattern, a step-wise increase in temperature with a high plateau. Management Management", "a simple infection or to start attacking other body cells. Because leukemia prevents the immune system from working normally, some people experience frequent infection, ranging from infected tonsils, sores in the mouth, or diarrhea to life-threatening pneumonia or opportunistic infections.\nFinally, the red blood cell deficiency leads to anemia, which may cause dyspnea and pallor.\nSome people experience other symptoms, such as feeling sick, having fevers, chills, night sweats, feeling fatigued and other flu-like symptoms. Some people experience nausea or a feeling of fullness due to an enlarged liver and spleen; this can result in unintentional weight loss. Blasts affected by", "symptomatic infections have ranged from 3 to 100. Cholera has been nicknamed the \"blue death\" because a person's skin may turn bluish-gray from extreme loss of fluids.\nFever is rare and should raise suspicion for secondary infection. Patients can be lethargic, and might have sunken eyes, dry mouth, cold clammy skin, or wrinkled hands and feet. Kussmaul breathing, a deep and labored breathing pattern, can occur because of acidosis from stool bicarbonate losses and lactic acidosis associated with poor perfusion. Blood pressure drops due to dehydration, peripheral pulse is rapid and thready, and urine output decreases with time. Muscle cramping and" ]
Why do real almonds not taste like almond paste/flavoring?
[ "The almond flavour you taste in almond paste, marzipan and so forth comes from an aromatic called benzaldehyde. This is found in *bitter* almonds, which also have a fairly hefty amount of cyanide; the latter is removed during the extraction of the benzaldehyde.\n\nThe almonds you eat in nut form are *sweet* almonds, which contain a much lower level of benzaldehyde, and, luckily enough, cyanide as well.\n\nBenzaldehyde is also present in apricots, cherries, and peaches, which is why they all have similar taste profiles." ]
[ "in the United States are sweet cultivars. The US Food and Drug Administration reported in 2010 that some fractions of imported sweet almonds were contaminated with bitter almonds. Eating such almonds could result in vertigo and other typical bitter almond (cyanide) poisoning effects. Almond milk Almonds can be processed into a milk substitute called almond milk; the nut's soft texture, mild flavor, and light coloring (when skinned) make for an efficient analog to dairy, and a soy-free choice for lactose intolerant people and vegans. Raw, blanched, and lightly toasted almonds work well for different production techniques, some of which are", "bitter almonds, usually made with barley syrup (orgeat syrup) or in a syrup of orange flower water and sugar, often flavored with a synthetic aroma of almonds. Orgeat syrup is an important ingredient in the Mai Tai and many other Tiki drinks.\nDue to the cyanide found in bitter almonds, modern syrups generally are produced only from sweet almonds. Such syrup products do not contain significant levels of hydrocyanic acid, so are generally considered safe for human consumption. Health Almonds are included as a good source of protein among recommended healthy foods by the US Department of Agriculture. A 2016 review", "The Lucques is primarily used as a green table olive, and the fruit tastes meaty and sweet. Some compare it to fresh almonds and avocados. It is a highly valued olive among gourmets. It can also be used for oil, and the oil it produces is of excellent quality, but it is difficult to extract. It gives a medium oil yield, of about 17%. The smell of the oil has alternately been described as \"almond\", \"green apple\", and \"tomato\". The taste is sweet; to some, excessively so. Agronomy It is considered a productive cultivar, but depends on good quality soil", "and shorter than the sweet almond and contains about 50% of the fixed oil that occurs in sweet almonds. It also contains the enzyme emulsin which, in the presence of water, acts on the two soluble glucosides amygdalin and prunasin yielding glucose, cyanide and the essential oil of bitter almonds, which is nearly pure benzaldehyde, the chemical causing the bitter flavor. Bitter almonds may yield 4–9 mg of hydrogen cyanide per almond and contain 42 times higher amounts of cyanide than the trace levels found in sweet almonds. The origin of cyanide content in bitter almonds is via the enzymatic hydrolysis", "Almond paste Almond paste is made from ground almonds or almond meal and sugar in equal quantities, with small amounts of cooking oil, beaten eggs, heavy cream or corn syrup added as a binder. It is similar to marzipan which is smooth, sweet and often dyed and molded into shapes which is different than the coarse texture of almond paste. Almond paste is used as a filling in pastries, but it can also be found in chocolates. In commercially manufactured almond paste, ground apricot or peach kernels are sometimes added to keep the cost down (also known as persipan). Uses", "the apple (3 g/kg). Benzaldehyde released from amygdalin provides a bitter flavor. Because of a difference in a recessive gene called Sweet kernal [Sk], less amygdalin is present in nonbitter (or sweet) almond than bitter almond. In one study, bitter almond amygdalin concentrations ranged from 33–54 g/kg depending on variety; semibitter varieties averaged 1 g/kg and sweet varieties averaged 0.063 g/kg with significant variability based on variety and growing region.\nFor one method of isolating amygdalin, the stones are removed from the fruit and cracked to obtain the kernels, which are dried in the sun or in ovens. The kernels are boiled in ethanol; on", "of clinical research indicated that regular consumption of almonds may reduce the risk of heart disease by lowering blood levels of LDL cholesterol. Potential allergy Almonds may cause allergy or intolerance. Cross-reactivity is common with peach allergens (lipid transfer proteins) and tree nut allergens. Symptoms range from local signs and symptoms (e.g., oral allergy syndrome, contact urticaria) to systemic signs and symptoms including anaphylaxis (e.g., urticaria, angioedema, gastrointestinal and respiratory symptoms). Aflatoxins Almonds are susceptible to aflatoxin-producing molds. Aflatoxins are potent carcinogenic chemicals produced by molds such as Aspergillus flavus and Aspergillus parasiticus. The mold contamination may occur from soil,", "used - with other tropical spices - when marinating anchovies and some types of pickled herring such as matjes, sprat, and certain types of traditional spegesild, inducing a redish colour and slightly perfumed flavour.\nPresent-day chefs have begun experimenting in using the nut as a substitute for macadamia nuts or a bush food substitute for almonds, hazelnuts, and others in Southeast Asian-styled cuisine. The oil is also used as a flavor component in different food items, including candy, ice cream, baked food, puddings, alcoholic and nonalcoholic beverages, and gelatin. The flavoring is used at levels below 10 ppm, the highest possible", "in pectin, they are used to make jam, jelly and quince pudding, or they may be peeled, then roasted, baked or stewed; pectin levels diminish as the fruit ripens. The flesh of the fruit turns red after a long cooking with sugar by formation of anthocyanins. The very strong perfume means they can be added in small quantities to apple pies and jam to enhance the flavor. Adding a diced quince to apple sauce will enhance the taste of the apple sauce with the chunks of relatively firm, tart quince. The term \"marmalade\", originally meaning a quince jam, derives", "Granita Ingredients Common and traditional flavoring ingredients include lemon juice, mandarin oranges, jasmine, coffee, almonds, mint, and when in season wild strawberries and black mulberries. Chocolate granitas have a tradition in the city of Catania but are also available in other parts of Sicily. The nuances of the Sicilian ingredients are important to the flavor of the finished granita: Sicilian lemons are a less acidic, more floral variety similar to Meyer lemons, while the almonds used contain some number of bitter almonds, crucial to the signature almond flavor. Another popular flavor used in granita is pistachio, also an agricultural product", "almonds). Symptoms range from local effects (e.g. oral allergy syndrome, contact urticaria) to more severe systemic reactions, including anaphylaxis (e.g. urticaria, angioedema, gastrointestinal and respiratory symptoms). Adverse reactions are related to the \"freshness\" of the fruit: peeled or canned fruit may be tolerated. Aroma Some 110 chemical compounds contribute to peach aroma, including alcohols, ketones, aldehydes, esters, polyphenols and terpenoids.", "kinds of almond come from Avola's area. Blooming in winter, these almonds can only grow either in sea areas or on litte hills, where frost rarely happens. Since Avola belongs to one of the sunniest towns in Sicily, this makes it one of the main production areas for almond.\nPizzuta and Fascionello are mainly used in the making of confetti, white sugared almonds, granita, ice slush, almond milk and other pastries, while Romana is only used for pastries and other bakery products.", "Acetomel Acetomel is a syrup made from honey and vinegar with a sweet and sour taste. It was commonly used in the preservation of fruit, though it is very seldom used today. Certain fruits, when preserved thus, such as quinces, pears, and grapes, are called aceto-dolce, that is \"sweet-and-sour fruit\". A related sauce is called agrodolce.", "three seeds each. This pulp is the edible part, and its consistence and flavour are indescribable. A rich custard highly flavoured with almonds gives the best general idea of it, but there are occasional wafts of flavour that call to mind cream-cheese, onion-sauce, sherry-wine, and other incongruous dishes. Then there is a rich glutinous smoothness in the pulp which nothing else possesses, but which adds to its delicacy. It is neither acidic nor sweet nor juicy; yet it wants neither of these qualities, for it is in itself perfect. It produces no nausea or other bad effect, and the more", "marmalades, sauces, sorbets and salads.\nZest is a key ingredient in a variety of sweet and sour condiments, including lemon pickle, lime chutney, and marmalade. Lemon liqueurs and liquors such as Licor de oro require zest.\nZest is used in some cocktails not only for flavor and aroma but also for color as a garnish. For use as a cocktail garnish, zest often is cut in a long spiral called a twist. Cocktails featuring a twist include Dry Martini and Horse's Neck. For maximum flavor and aroma, as in mulled wine, zest is simply cut from the fruit with a knife.", "Amandine (garnish) Amandine is a culinary term indicating a garnish of almonds. Dishes of this sort are usually cooked with butter and seasonings, then sprinkled with whole or flaked, toasted almonds. \nThe term is often spelled almondine in American cookbooks.\nGreen beans, potatoes, fish and asparagus are frequently served amandine.", "Amer Picon), bitters, fruit juices and \"smoothing agents\" such as sugar, eggs, and cream.\nSpecial flavoring and coloring agents include liqueurs (such as Grand Marnier or Chartreuse), Cordials, bitters like Angostura Bitters, etc. and non-alcoholic flavored syrups (such as grenadine or orgeat syrup). These are typically used in place of simple syrup, and are to be used sparingly. Categories of cocktails Embury breaks all cocktails down into two categories:\nCocktails of the Aromatic Type use as modifying agents bitters or aromatic wines or spirits.\nCocktails of the Sour Type use as modifying agents a fruit juice (typically, lemon or lime) and sugar. For", "traditional galette des Rois cake.\nAlmond meal has recently become important in baking items for those on low carbohydrate diets. It adds moistness and a rich nutty taste to baked goods. Items baked with almond meal tend to be calorie-dense.\nAlmonds have high levels of polyunsaturated fats in them. Typically, the omega 6 fatty acids in almonds are protected from oxidation by the surface skin and vitamin E. When almonds are ground, this protective skin is broken and exposed surface area increases dramatically, greatly enhancing the nut's tendency to oxidize.", "foundation with fresh herbs, chili peppers, nuts, and lime juice.\nIn China and Japan, a similar salad dressing is made with sesame oil/sesame paste and rice vinegar. In north China, sometimes mustard is added to enhance the flavor and texture of the sauce.\nDifferent vinegars, such as raspberry, create different flavors, and lemon juice or alcohol, such as sherry, may be used instead of vinegar. Balsamic vinaigrette is made by adding a small amount of balsamic vinegar to a simple vinaigrette of olive oil and wine vinegar.\nIn Brazil, a mix between olive oil, alcohol vinegar, tomatoes, onions and sometimes bell peppers is", "sauces, and jams because of their natural sweetness. Because Royal Ann cherries are so fragile, they make a great option for canning because the fruit is not being selected based on appearances as if it were freshly picked. Bruised Royal Ann cherries will taste the same mashed into a pie or in canned preserves.\nRoyal Ann cherries are also the ideal variety used to make maraschino cherries for cocktails and dishes. Royal Ann cherries are also excellent and sweet eaten fresh on their own.", "an absinthe expert and historian. Lucid's green color is derived directly from the botanicals, without any artificial coloring added – a key feature of genuine absinthe. Lucid's natural color requires a dark bottle because exposure to light will cause the natural color to fade, which explains why so many traditional absinthes were bottled in dark glass. Taste Profile Lucid is characterized by upfront flavors of anise and fennel, followed by mild mid-palate earthy textures attributable to the absinthe (Artemisia absinthium). The herbs round out the flavor with additional spice and grassy notes, which linger in a moderately long finish. Proof", "of the flavors used are consumed in processed and packaged food.\nMost flavors represent a mixture of aroma compounds, the raw material that is produced by flavor companies. In rare cases, a single synthetic compound is used in pure form. Artificial vanilla flavors vanillin and ethylvanillin are a notable exception, as well as the artificial strawberry flavor (ethyl methylphenylglycidate). The ubiquitous \"green apple\" aroma is based on hexyl acetate.\nThe flavor creation is done by a specially trained scientist called a \"flavorist\", whose job combines scientific knowledge of the chemical palette with creativity to develop new and distinctive flavors. The flavor creation", "other spices for extra flavouring. Betel leaf has a fresh, peppery taste, but it can also be bitter to varying degrees depending on the variety.\nAreca nuts are chewed with betel leaf for their effects as a mild stimulant, causing a warming sensation in the body and slightly heightened alertness, although the effects vary from person to person.\nThe areca nut contains the tannins arecatannin and gallic acid; a fixed oil gum; a little terpineol; lignin; various saline substances; and three main alkaloids—arecoline, arecaidine, and guvacine—all of which have vasoconstricting properties. The betel leaf chewed along with the nut contains eugenol, another", "Almond meal Almond meal, almond flour or ground almond is made from ground sweet almonds. Almond flour is usually made with blanched almonds (no skin), whereas almond meal can be made with whole or blanched almonds. The consistency is more like corn meal than wheat flour.\nIt is used in pastry and confectionery – in the manufacture of almond macarons and macaroons and other sweet pastries, in cake and pie filling, such as Sachertorte – and is one of the two main ingredients of marzipan and almond paste. In France, almond meal is an important ingredient in frangipane, the filling of", "word amaro, meaning \"bitter\", which references the distinctive flavour lent by the mandorla amara or by the drupe kernel. However, the bitterness of amaretto tends to be mild, and sweeteners (and sometimes sweet almonds) enhance the flavour in the final products. Thus one can interpret the liqueur's name as a description of the taste as \"a little bitter\". Cyanide is processed out of the almond preparation prior to its use.\nOne should not confuse amaretto with amaro, a different family of Italian liqueurs that, while also sweetened, have a stronger bitter flavour derived from herbs. Usage Amaretto serves a variety of", "Honey garlic sauce Honey garlic sauce is a sweet and sour sauce that tastes like a mix between honey and garlic, popular in Canada. Honey garlic is one of the many sauces put on chicken wings, ribs, and other foods such as meatballs.", "Almond paste is used as a filling in pastries of many different cultures. It is a chief ingredient of the American bear claw pastry. In Scandinavia almond paste is used extensively, in various pastries and cookies. In Sweden (where it is known as mandelmassa) it is used in biscuits, muffins and buns and as a filling in the traditional spring season pastry semla and is used in Easter and Christmas sweets. In Denmark (where it is known as marcipan or mandelmasse), almond paste is used in several pastries, for example as a filling in the Danish traditional", "Growers prefer the variety because of its drought tolerance, high level of scab resistance, and consistent nut quality. The Elliot Pecan fetches a premium price from consumers due to the nut's attractive symmetry and exceptional flavor. It is often served with hors d’oeuvres at social functions and weddings. The buttery, hickory taste of the Elliot pecan also makes the nut a popular addition to specialty snacks and desserts, such as pecan pie.", "The nuts can differ from almonds to walnuts, with different spice coatings. The dips and oils include hummus and olive oil.\nThere are many regional differences in the Arab cuisine. For instance, mujadara in Syria and Lebanon is different from mujadara in Jordan and Palestine. Some dishes, such as mansaf (the national dish of Jordan), are native to certain countries and rarely, if ever, make an appearance in other countries. Unlike most Western recipes, cinnamon is used in meat dishes, as well as in sweets such as baklava. Dishes including Tajine and Couscous can differ from Morocco to Libya, each having", "softer candies. Once the syrup reaches 171 °C (340 °F) or higher, the sucrose molecules break down into many simpler sugars, creating an amber-colored substance known as caramel. This should not be confused with caramel candy, although it is the candy's main flavoring.\nMost candies are made commercially. The industry relies significantly on trade secret protection, because candy recipes cannot be copyrighted or patented effectively, but are very difficult to duplicate exactly. Seemingly minor differences in the machinery, temperature, or timing of the candy-making process can cause noticeable differences in the final product. Packaging Candy wrapper or sweets wrapper is" ]
Why haven't people as a whole adapted to the cold? We have adpated to the sun by the pigment in our skin changing colour depending on your exposure to sunlight.
[ "Human's primary form of adaptation is the use of technology. So we have adapted to the cold by inventing insulated shelter, controlling fire, and making clothing.", "We grew intelligent enough to skin other warmer animals and wear their hides over our own.", "For the same reason we can't fly like a bird. The compromises necessary to adapt to freezing temperatures cost in other areas so much that they are not evolutionary advantages. Cold, like flying, is something humans handle through their giant brains, social cooperation, and most excellent technology. It's a feature.", "In addition to what others have said, our species originates in Africa which is generally pretty hot. We haven't been in cold areas for very long so we haven't adapted much to deal with it." ]
[ "eumelanin in their skins. This makes their skins brown or black and protects them against high levels of exposure to the sun, which more frequently result in melanomas in lighter-skinned people.\nNot all the effects of pigmentation are advantageous. Pigmentation increases the heat load in hot climates, and black people absorb 30% more heat from sunlight than do white people, although this factor may be offset by more profuse sweating. In cold climates black skin entails more heat loss by radiation. Pigmentation also hinders synthesis of vitamin D, so that in areas of poor nutrition black children are more liable to", "fading with increased age, leading to grey or even white hair. Most researchers believe that skin darkening is an adaptation that evolved as protection against ultraviolet solar radiation, which also helps balancing folate, which is destroyed by ultraviolet radiation. Light skin pigmentation protects against depletion of vitamin D, which requires sunlight to make. Skin pigmentation of contemporary humans is clinally distributed across the planet, and in general correlates with the level of ultraviolet radiation in a particular geographic area. Human skin also has a capacity to darken (tan) in response to exposure to ultraviolet radiation. Psychology The human brain, the", "produced the current range of human skin color. Of the two common gene variants known to be associated with pale human skin, Mc1r does not appear to have undergone positive selection, while SLC24A5 has undergone positive selection. Effects As with peoples having migrated northward, those with light skin migrating toward the equator acclimatize to the much stronger solar radiation. Most people's skin darkens when exposed to UV light, giving them more protection when it is needed. This is the physiological purpose of sun tanning. Dark-skinned people, who produce more skin-protecting eumelanin, have a greater protection against sunburn and the development", "sunburns and a more dangerous, but invisible, damage done to connective tissue and DNA underlying the skin. This can contribute to premature aging and skin cancer. The strongly red appearance of lightly pigmented skin as a response to high UV radiation levels is caused by the increased diameter, number, and blood flow of the capillaries.\nPeople with moderately pigmented skin (Types III-IV) are able to produce melanin in their skin in response to UVR. Normal tanning is usually delayed as it takes time for the melanins to move up in the epidermis. Heavy tanning does not approach the photoprotective effect against", "found to be more prevalent in certain population than others. Health implications Skin pigmentation is an evolutionary adaptation to the various UV radiation levels around the world. There are health implications of light-skinned people living in environments of high UV radiation. Various cultural practices increase problems related to health conditions of light skin, for example sunbathing among the light-skinned. Advantages of light skin pigmentation in low sunlight environments Humans with light skin pigmentation living in low sunlight environments experience increased vitamin D synthesis compared to humans with dark skin pigmentation due to the ability to absorb more sunlight. Almost every", "the amount of ultraviolet radiation penetrating the skin, controlling its biochemical effects.\nNatural skin color can darken as a result of tanning due to exposure to sunlight. The leading theory is that skin color adapts to intense sunlight irradiation to provide partial protection against the ultraviolet fraction that produces damage and thus mutations in the DNA of the skin cells. There is a correlation between the geographic distribution of ultraviolet radiation (UVR) and the distribution of indigenous skin pigmentation around the world. Darker-skinned populations are found in the regions with the most ultraviolet, closer to the equator, while lighter skinned populations", "individuals are less likely to seek shade or to protect themselves against the sun, and are more likely to stay exposed to the burning effects of the sun's UV radiation for longer. Along with being cooling, the wind also has a drying effect on the skin, which may exacerbate the symptoms of a sunburn. There are also some claims that the natural oils and moisture in the skin are reduced in cold conditions, making the skin more vulnerable to the drying effects of the wind and the sun's UV radiation, and thus more easily burnt in situations where people may", "period in the Northern Hemisphere. Folate is needed for DNA replication in dividing cells and deficiency can lead to failures of normal embryogenesis and spermatogenesis.\nIndividuals with lightly pigmented skin who are repeatedly exposed to strong UV radiation, experience faster aging of the skin, which shows in increased wrinkling and anomalies of pigmentation. Oxidative damage causes the degradation of protective tissue in the dermis, which confers the strength of the skin. It has been postulated that white women may develop wrinkles faster after menopause than black women because they are more susceptible to the lifetime damage of the sun through life.", "eumelanin, and possess fewer melanosomes than humans with dark skin pigmentation. Light skin provides better absorption qualities of ultraviolet radiation. This helps the body to synthesize higher amounts of vitamin D for bodily processes such as calcium development. Light-skinned people who live near the equator with high sunlight are at an increased risk of folate depletion. As consequence of folate depletion, they are at a higher risk of DNA damage, birth defects, and numerous types of cancers, especially skin cancer.\nThe distribution of indigenous light-skinned populations is highly correlated with the low ultraviolet radiation levels of the regions inhabited by them.", "of vitamin D in skin, so lighter colored skin - less melanin - is an adaptation related to the prehistoric movement of humans away from equatorial regions, as there is less exposure to sunlight at higher latitudes. People from parts of Africa, South Asia, Southeast Asia, and Australia have very dark skin, but this is not melanism. Peutz–Jeghers syndrome This rare genetic disorder is characterized by the development of macules with Hyperpigmentation on the lips and oral mucosa (melanosis), as well as benign polyps in the gastrointestinal tract. Socio-politics The term melanism has been used on Usenet, internet forums and", "Human skin Structure Skin has mesodermal cells, pigmentation, such as melanin provided by melanocytes, which absorb some of the potentially dangerous ultraviolet radiation (UV) in sunlight. It also contains DNA repair enzymes that help reverse UV damage, such that people lacking the genes for these enzymes suffer high rates of skin cancer. One form predominantly produced by UV light, malignant melanoma, is particularly invasive, causing it to spread quickly, and can often be deadly. Human skin pigmentation varies among populations in a striking manner. This has led to the classification of people(s) on the basis of skin color.\nIn terms of", "2004 found that human skin contains photoreceptors like those in the retina, allowing it to mount an immediate defence against damaging ultraviolet radiations. They suspect that the protein that protects the skin from sunlight evolved following the loss of protective hair, which happened about 1.2 million years ago. Public nudity People have a variety of views on nudity, both of their own as well as those of others. This would depend on their level of inhibition, cultural background and upbringing, as well as on context. A society's attitude to public nudity varies depending on the culture, time, location and context", "between a person's genotype and sunlight; thus, suntans are not passed on to people's children. However, some people tan more easily than others, due to differences in genotypic variation; a striking example are people with the inherited trait of albinism, who do not tan at all and are very sensitive to sunburn.\nHeritable traits are passed from one generation to the next via DNA, a molecule that encodes genetic information. DNA is a long biopolymer composed of four types of bases. The sequence of bases along a particular DNA molecule specify the genetic information, in a manner similar to a sequence", "Light skin Light skin is a human skin color, which has little eumelanin pigmentation and which has been adapted to environments of low UV radiation. Light skin is most commonly found amongst the native populations of Europe and Northeast Asia as measured through skin reflectance. People with light skin pigmentation are often referred to as white or fair, although these usages can be ambiguous in some countries where they are used to refer specifically to certain ethnic groups or populations.\nAs populations migrated away from the tropics between 125,000 and 65,000 years ago into areas of low UV radiation, they developed", "to cold, the human body can increase heat production by shivering, or non-shivering thermogenesis in which brown adipose tissue (BAT), also known as brown fat, converts chemical energy to heat. Mild cold exposure is known to increase BAT activity. A group of scientists in the Netherlands wondered whether frequent exposure to extreme cold would have comparable effects. The Hof brothers are identical twins, but unlike Wim, Andre has a sedentary lifestyle without exposure to extreme cold. The scientists had them practice Wim's breathing exercises and then exposed them to the lowest temperature that would not induce shivering. They found no", "able to generate more vitamin D (cholecalciferol) than darker skin, so it would have represented a health benefit in reduced sunlight if there were limited sources of vitamin D. The genetic mutations leading to light skin may have experienced selective pressure due to the adoption of farming and settlement in northern latitudes.\nAnthropologist Peter Frost has proposed that sexual selection was responsible for the evolution of pigmentary traits of women in Northern and Eastern European populations. He contends that the diversity of hair and eye color in Northeast European populations originated as a consequence of intense female-female competition, and is an", "Dr. Taylor, of Yale School of Medicine, concluded that the study could not prove the findings but they suspect the underlying cause. Light-coloured skin has been suspected to be one of the contributing factors that promote wrinkling. Geographic distribution There is a correlation between the geographic distribution of UV radiation and the distribution of skin pigmentation around the world. Areas that are further away from the equator and are generally closer to the poles have lower concentration of UV radiation. As a general rule, populations that evolved north or south of 46 degrees latitude therefore tend to be lighter skinned;", "skin color between lightly and darkly pigmented individuals is due not to the number (quantity) of melanocytes in their skin, but to the melanocytes' level of activity (quantity and relative amounts of eumelanin and pheomelanin). This process is under hormonal control, including the MSH and ACTH peptides that are produced from the precursor proopiomelanocortin.\nPeople with oculocutaneous albinism typically have a very low level of melanin production. Albinism is often but not always related to the TYR gene coding the tyrosinase enzyme. Tyrosinase is required for melanocytes to produce melanin from the amino acid tyrosine. Albinism may be caused by", "process of (sun-based) tanning. This earlier study also found that dihydroxyacetone also has an effect on the amino acids and nucleic acids which is bad for the skin.\nThe free radicals are in part due to the action of UV light on AGE (Advanced Glycation End-products) such as Amadori products (a type of AGE) as a result of the reaction of DHA with the skin. AGEs are behind the damage to the skin that occurs with high blood sugar in diabetes where similar glycation occurs. Some of the damage from AGE is independent of UV light. A study showed glycation of", "light skinned person is able to produce between 10 - 20000 IU of vitamin D. Disadvantages of light pigmentation in high sunlight environments Light-skinned people living in high sunlight environments are more susceptible to the harmful UV rays of sunlight because of the lack of melanin produced in the skin. The most common risk that comes with high exposure to sunlight is the increased risk of sunburns. This increased risk has come along with the cultural practice of sunbathing, which is popular among some human populations. This cultural practice to gain tanned skin if not regulated properly can lead to", "health risks. In a report by the World Health Organization, it was stated that “skin whitening products can cause leukemia, liver and kidney cancer and could also result in severe skin conditions.” Though these health risks exist, women of color in many parts of the world are purchasing skin lightening creams.\nChoma and Prusaczyk's survey of women of color in the US and India “show[s] that chronic surveillance of skin tone predicts skin tone dissatisfaction and skin bleaching.” Some companies in the cosmetic industry have capitalized off of the cultural pressure and standards for having lighter skin.  This study concluded that", "bottoms\" prefer hairier men. Skin color Testosterone has been shown to darken skin color in laboratory experiments. Despite this, the aesthetics of skin tone varies from culture to culture. Manual laborers who spent extended periods of time outside developed a darker skin tone due to exposure to the sun. As a consequence, an association between dark skin and the lower classes developed. Light skin became an aesthetic ideal because it symbolized wealth. \"Over time society attached various meanings to these colored differences. Including assumptions about a person's race, socioeconomic class, intelligence, and physical attractiveness.\"\nA scientific review published in 2011, identified", "light, resulting in less protection over time. The UV-A light in a day of sunlight in a temperate climate is sufficient to break down most of the compound. It's important to continue wearing SPF while self-tanning, as self-tanner is generally a fake and temporary tan, and your skin is still sensitive to the sun.\nIf avobenzone-containing sunscreen is applied on top of tanner, the photosensitizer effect magnifies the free-radical damage promoted by DHA, as DHA may make the skin especially susceptible to free-radical damage from sunlight, according to a 2007 study led by Katinka Jung of the Gematria Test Lab in", "Exposure to light or starvation causes them to lose their color, but deeply-pigmented cells can even be killed by strong light.", "2. People with this disorder have red, scaly, plate-like skin covering most of their bodies. The ABCA12 mutations that cause this disorder substitute one amino acid (a building block of proteins) for another amino acid in the ABCA12 protein. These mutations almost always occur in an important functional region of the protein (the region that binds to ATP, a molecule that supplies energy for chemical reactions). Changes in the structure of the ABCA12 protein likely disrupt its ability to transport lipids, which affects the development of skin before and after birth.", "sun exposure occurs. However, the \"hardening\" effect, with respite during the later summer, frequently occurs with gradual exposure of sunlight, eventually leading to significant improvement. Causes The cause of PLE is not yet understood, but several factors may be involved. It is thought to be due to a type IV delayed-type hypersensitivity to an allergen produced in the body following sunlight exposure, in a genetically susceptible person. It is also thought that skin microbiome or microbial elements could be involved in pathogenesis of the disease UV exposure PLE can be provoked by UVA or UVB (chief cause of sunburn) rays,", "a decrease in the productivity of cells is known as cellular senescence. Research shows that in skin that has aged intrinsically does not only degenerate collagens, elastin etc., but also oligosaccharide which affects the skin's ability to retain moisture.\nBesides the internal factors that may cause skin aging, external factors such as been exposed to sunlight also causes the skin to age. 80% of the cases of skin aging have been caused by been exposed to the ultraviolet radiation which is the primary cause of extrinsic aging of the skin. In contrast to the thinning of the epidermis in internally aged", "as in Western culture, where tanned skin used to be associated with the sun-exposed manual labor of the lower-class, but since the mid-20th century it has generally been considered more attractive and healthier than before, with sun tanning becoming fashionable. A study on men of the Bikosso tribe in Cameroon found no preference for attractiveness of females based on lighter skin color, bringing into question the universality of earlier studies that had exclusively focused on skin color preferences among non-African populations.\nSkin radiance or glowing skin may influence perception of beauty and physical attractiveness. Fertility-driven attractiveness There are some subtle changes", "Environmental Science, University of Jyväskylä, Finland, said humans evolved by \"natural selection\" to be hairless when the trade off of \"having fewer parasites\" became more important than having a \"warming, furry coat\".\nP.E. Wheeler of the Department of Biology at Liverpool Polytechnic said quadrupedal savannah mammals of similar volume to humans have body hair to keep warm while only larger quadrupedal savannah mammals lack body hair, because their body volume itself is enough to keep them warm. Therefore, Wheeler said humans who should have body hair based on predictions of body volume alone for savannah mammals evolved no body hair after", "heat transfer. Such implications arise from heat transfer, from the environment to the skin, causing skin temperature to increase. Subsequently the blood travelling through the dilated skin vessels is heated during circulation. Delivery of the heat to subcutaneous regions of the body is facilitated by the body's impaired vasodilation.\nSkin temperature may also be an indicator of the presence of cancer. Widespread methods for detection of cancer involve identification of non-neuronal thermoregulation of blood perfusion as well as periodic alterations to, or aberrant oscillations in, the spatial homogeneity of skin temperature. This is because sites of tumour growth are often associated" ]
When I swallow a pill, why is there sometimes a heavy feeling in the back of my throat?
[ "I used to get that feeling a lot when I first started taking my daily pills. Turns out I wasn't getting the pill \"stuck\" in my throat exactly, but I was not swallowing them with enough water. \n\nWhen someone swallows pills without proper salivation or lubricant the object can \"scrape\" itself on the back of your throat, leaving you with that heavy and sometimes painful feeling that doesn't go away for a while. It may feel like it's lodged in there, which could be possible, but it's most likely just pain from the pills contact. \n\nLong story short, always drink water before and with pills.", "I get pills stuck in my esophagus a lot. Could that be what you're experiencing? It kinda feels like what you're describing imo.", "I don't know if this is it, but I always assumed it was an \"afterfeeling\" of the pill going down. Similar to if you pinch or flick yourself, you \"feel\" it for a while.", "[Globus hystericus](_URL_0_)? You might have acid reflux. \n\nELI5: Your throat may be inflamed from stomach acid. You are feeling its sensitivity when you swallow." ]
[ "were all activated. After swallowing, only the insula remained activated and the response of the other brain regions was not evident. This suggests that the insula may be a primary region for aftertaste sensation because it was activated even after the aspartame solution was no longer present in the mouth. This finding aligns with the insula's identification as a central taste processing area and simply expands its function. An explanation for less activation of the amygdala was that because it is a reward center in the brain, less reward would be experienced by the subjects during prolonged exposure to the", "determining the risk for swallowing disorders is severely limited. Pharyngeal sensation, on the other hand, as seen by this study, is rarely absent, and could prove better at predicting future problems with swallowing. Reflexive pharyngeal swallow Closely related to the gag reflex, in which food or other foreign substances are forced back out of the pharynx, swallowing generally pushes food through the digestive system into the stomach. This reflex in particular functions as a protective system for the upper respiratory tract as it not only forces the glottis to close, thereby preventing any substances getting into the airways, but also", "signs and symptoms. The chest pain caused by GERD has a distinct 'burning' sensation, occurs after eating or at night, and worsens when a person lies down or bends over. It also is common in pregnant women, and may be triggered by consuming food in large quantities, or specific foods containing certain spices, high fat content, or high acid content. If the chest pain is suspected to be heartburn, patients may undergo an upper GI series to confirm the presence of acid reflux.\nHeartburn or chest pain after eating or drinking and combined with difficulty swallowing may indicate esophageal spasms. GI", "carcinoma, though not usually in cases of adenocarcinoma. Eventual weight loss due to reduced appetite and undernutrition is common. Pain behind the breastbone or in the region around the stomach often feels like heartburn. The pain can frequently be severe, worsening when food of any sort is swallowed. Another sign may be an unusually husky, raspy, or hoarse-sounding cough, a result of the tumor affecting the recurrent laryngeal nerve.\nThe presence of the tumor may disrupt the normal contractions of the esophagus when swallowing. This can lead to nausea and vomiting, regurgitation of food and coughing. There is also an", "to chronic infections of the involved site. Esophageal dysmotility Presents as a sensation of food getting stuck (dysphagia) in the mid- or lower esophagus, atypical chest pain, or cough. People often state they must drink liquids to swallow solid food. This motility problem results from atrophy of the gastrointestinal tract wall smooth muscle. This change may occur with or without pathologic evidence of significant tissue fibrosis. Sclerodactyly Though it is the most easily recognizable manifestation, it is not prominent in all patients. Thickening generally only involves the skin of the fingers distal to the metacarpophalangeal joints in CREST.", "swallowing and pain during swallowing, as well as erectile dysfunction in men; this occurs mainly when the breakdown of red blood cells is rapid, and is attributable to spasm of smooth muscle due to depletion of nitric oxide by red cell breakdown products.\nForty percent of people with PNH develop thrombosis (a blood clot) at some point in their illness. This is the main cause of severe complications and death in PNH. These may develop in common sites (deep vein thrombosis of the leg and resultant pulmonary embolism when these clots break off and enter the lungs), but in PNH blood", "after food passes through. In some individuals, this valve becomes incompetent and acid goes up into the esophagus. Reflux episodes often occur at night and one may develop a bitter taste in the mouth. The throat can be severely irritated when acid touches the vocal cords and can lead to spasms of coughing. To prevent throat irritation from reflux, one should lose weight, stop smoking, avoid coffee beverages and sleep with the head elevated. Post-viral cough A post-viral cough is a lingering cough that follows a viral respiratory tract infection, such as a common cold or flu and lasting", "box, and throat, making it very hard to breathe and swallow. Symptoms can also include cardiac arrhythmias, myocarditis, and cranial and peripheral nerve palsies. Diphtheritic croup Laryngeal diphtheria can lead to a characteristic swollen neck and throat, or \"bull neck\". The swollen throat is often accompanied by a serious respiratory condition, characterized by a brassy or \"barking\" cough, stridor, hoarseness, and difficulty breathing, and historically referred to variously as \"diphtheritic croup\", \"true croup\", or sometimes simply as \"croup\". Diphtheritic croup is extremely rare in countries where diphtheria vaccination is customary. As a result, the term \"croup\" nowadays most often refers", "Esophageal spasm Signs and symptoms The symptoms may include trouble swallowing, regurgitation, chest pain, heartburn, globus pharyngis (which is a feeling that something is stuck in the throat) or a dry cough. Causes It is not clear what causes esophageal spasms. Sometimes esophageal spasms start when someone eats hot or cold foods or drinks. However, they can also occur with eating or drinking. The increased release of acetylcholine may also be a factor, but the triggering event is not known. Spasms may also be the result of a food intolerance. Diagnosis The diagnosis is generally confirmed by esophageal manometry. DES", "motor/movement problem on that particular side of the throat. The treatment for this discovered throat numbness is to then teach the patient to turn their head to the numb side of their throat when they swallow. This maneuver, called a \"head turn\" effectively closes off the numb side of the throat so when they swallow the food is only exposed to the normal side of the throat, thereby insuring a safer swallow (on the normal side there is no residue so there is no chance of the residue accidentally falling into the vocal folds and then into the lungs (aspiration).", "when someone is eating or drinking. Most modern protocols, including those of the American Heart Association, American Red Cross and the European Resuscitation Council, recommend several stages, designed to apply increasingly more pressure. Most protocols recommend first encouraging the victim to cough, and allowing them an opportunity to spontaneously clear the foreign body if they are coughing forcefully. If the person's airway continues to be blocked, more forceful maneuvers such as hard back slaps and abdominal thrusts (Heimlich maneuver) can be performed. Some guidelines recommend alternating between abdominal thrusts and back slaps while others recommend starting with back slaps first.", "of sudden pressure in the chest or a crushing pain in the back, neck, and arms, pain that is felt due to noncardiac issues gives a burning feeling along the digestive tract or pain when deep breaths are attempted. Different people feel pains differently for the same condition. Only a patient truly knows if the symptoms are mild or serious.\nChest pain may be a symptom of myocardial infarctions ('heart attack'). If this condition is present in the body, discomfort will be felt in the chest that is similar to a heavy weight placed on the body. Sweating, shortness of breath,", "notched. Function The epiglottis is normally pointed upward during breathing with its underside functioning as part of the pharynx. Swallowing During swallowing, the epiglottis bends backwards, folding over the entrance to the trachea, and preventing food from going into it. The folding backwards is a complex movement the causes of which are incompletely understood. It is likely that during swallowing the hyoid bone and the larynx move upwards and forwards, which increases passive pressure from the back of the tongue; because the ariepiglottic muscles contract; because of the passive weight of the food pushing down; and because of contraction of", "Bloating Symptoms The most common symptoms associated with bloating is a sensation that the abdomen is full or distended. Rarely, bloating may be painful or cause shortness of breath.\nPains that are due to bloating will feel sharp and cause the stomach to cramp. These pains may occur anywhere in the body and can change locations quickly. They are so painful that they are sometimes mistaken for heart pains when they develop on the upper left side of the chest. Pains on the right side are often confused with problems in the appendix or the gallbladder.\nOne symptom of gas that is", "Oropharyngeal dysphagia Signs and symptoms Some signs and symptoms of swallowing difficulties include difficulty controlling food in the mouth, inability to control food or saliva in the mouth, difficulty initiating a swallow, coughing, choking, frequent pneumonia, unexplained weight loss, gurgly or wet voice after swallowing, nasal regurgitation, and dysphagia (patient complaint of swallowing difficulty). When asked where the food is getting stuck patients will often point to the cervical (neck) region as the site of the obstruction. The actual site of obstruction is always at or below the level at which the level of obstruction is perceived. Complications If left", "swallowing difficulties. Despite the high prevalence of post-operative swallowing difficulties in the first days following the laryngectomy, most patients recover swallowing function within 3 months. Laryngectomy patients do not aspirate due to the structural changes in the larynx, but they may experience difficulty swallowing solid food. They may also experience changes in appetite due to a significant loss in their senses of taste and smell.\nIn order to prevent the development of pharyngocutaneous fistula, it is common practice to reintroduce oral feeding as of the seventh to tenth day post-surgery, although the ideal timeline remains controversial. Pharyngocutaneous fistula typically develops before", "associated with inflammation around the pseudodiverticulae has been reported over time leading to chest pain or pain while swallowing. Epidemiology Approximately 200 cases of esophageal intramucosal pseudodiverticulosis have been reported. One study of over 14000 barium swallow x-rays identified the condition in 0.15% of individuals who had the procedure. While the disease has been reported as occurring at any time during life, it most frequently affects individuals in their 50s and 60s.", "Martin, a man with a gunshot-induced fistula in his abdomen, experienced lower secretions of digestive juices and a slower stomach emptying when he was upset. In this case, the emotions St. Martin was feeling affected his physiological reaction, but the reverse can also be true. In a study with Crohn's disease patients where patients and unaffected controls watched happy, frightening, disgusting, and saddening films, patients with active Crohn's disease had more responsive EGG (a greater physiological response) and reported feeling more aroused when feeling the negative emotions of disgust or sadness. This leads researchers to believe that increased physiological activation", "may include slight swelling in the throat, making it feel like it is closing. The ability to breathe is still present though, so it is not fatal. Other symptoms due to hypersensitivity The symptoms may vary depending upon the person, the severity of the allergy, and type of fruit. For example, mango allergy symptoms include hoarseness, dyspnoea and bronchitic rales (asthma) (Sareen and Shah). The duration of the symptoms tested by Saree and Shah were variable and ranged from 4 h [11] to 7 days [12]. The symptoms may appear within a few minutes. Different allergic fruits There are many", "form where a balloon of mucosa becomes trapped outside the pharyngeal boundaries. Food or other materials may reside here, which may lead to infection.\nMotor incoordination of the cricopharyngeus can cause difficulty swallowing.", "the upper lip and gum. This prevents the substances from getting swallowed with salivation, as would normally occur between the lower lip and gum, permitting slow release of the drug to prolong the duration of action.", "find that the pain is intensifying. At its peak, however, it disappears. Thinking that the stomachache was brought by the berries he ate the night before, he turns to look at the terrible mess he made, only to find that, instead of \"doo-doo,\" there was a baby \"Winkie\". For months, father-mother and daughter live peacefully in the forest, eating berries and sometimes from garbage cans nearby. One day, Baby Winkie is kidnapped by a mad English professor living in the woods. The professor is a terrorist, making bombs and mailing them to other terrorists. He kidnapped Baby Winkie for he", "to state that \"Stomach inflation is a complex problem that may cause regurgitation, [gastric acid] aspiration, and, possibly, death.\" When stomach inflation leads to vomiting of highly acidic stomach acids, delivery of subsequent breaths can force these caustic acids down into the lungs where they cause life-threatening or fatal lung injuries including Mendelson's syndrome, aspiration pneumonia, acute respiratory distress syndrome and \"pulmonary injuries similar to that seen in victims of chlorine gas exposure\". Apart from the risks of gastric inflation causing vomiting and regurgitation, at least two reports have been found indicating that gastric insufflation itself remains", "that it fuddles the head. It is said also, to be of great use to a democratic candidate: because a person having swallowed a glass of it, is ready to swallow anything else.", "sore throat, may require medical attention. Other severe side effects include unusual or severe tiredness or weakness, as well as yellowing of the skin or the eyes. When baclofen is administered intrathecally, it may cause CNS depression accompanied with cardiovascular collapse and respiratory failure. Tizanidine may lower blood pressure. This effect can be controlled by administering a low dose at the beginning and increasing it gradually.", "beverages. In response to ingesting the type of beverage that the subjects reported to provoke their symptoms, six developed the asthmatic symptom of chest tightness, two developed a symptom often associated with asthma, rhinitis, and one subject developed both chest tightness and rhinitis. Symptoms developed almost immediately after ingestion, inhalation of fumes from the beverages did not precipitate symptoms, and bronchoconstriction in response to the ingestion was confirmed in the three patients evaluated by pulmonary function tests. The study suggested that these reactions were induced by non-alcoholic allergens that were contained in or contaminated the beverages. ", "specialist physician. Shaped like a pill, once swallowed the small device would open inside the patient's stomach after a pre-determined time and sample the stomach contents.", "pharynx and larynx before and after swallowing. During the actual swallow, the camera is blocked from viewing the anatomical structures. A rigid scope, placed into the oral cavity to view the structures of the pharynx and larynx, can also be used, though this prevents the patient from swallowing.\nOther less frequently used assessments of swallowing are imaging studies, ultrasound and scintigraphy and nonimaging studies, electromyography (EMG), electroglottography (EGG)(records vocal fold movement), cervical auscultation, and pharyngeal manometry.", "may feel dizzy or faint after taking the first few doses. Tachycardia (fast heart rate) may occur as a reaction. These problems are much less frequent in the sustained-release preparations of nifedipine.\nExtended release formulations of nifedipine should be taken on an empty stomach, and patients are warned not to consume anything containing grapefruit or grapefruit juice, as they raise blood nifedipine levels. There are several possible mechanisms, including the inhibition of CYP3A4-mediated metabolism. Overdose A number of persons have developed toxicity due to acute overdosage with nifedipine, either accidentally or intentionally, and via either oral or parenteral administration. The adverse", "but it’s still a very, very tough pill to swallow that this is really a possibility of something that happened on our campus.\"" ]
Why is Reddit valued at "only" ~$1.8 billion, when less popular sites (e.g. Twitter) are worth many times more?
[ "Reddit isn't publicly traded (there hasn't been an IPO yet), so speculation can't inflate the value of the company like Twitter or Tesla.\n\nA company is basically worth how much people are willing to pay for shares of it, but you can't buy shares in Reddit yet.\n\nIt's also not profitable, yet, which doesn't help.", "Well, for one, twitter allows people to monetize content they create using ads from which twitter gets a cut. Reddit doesn't. You can have a billion unique users on your site, but if they're not doing anything that's making you money, it doesn't matter from the perspective of the market value of your site." ]
[ "popularity in terms of unique users per day, Reddit has been a platform to raise publicity for a number of causes. Additionally, the user base of Reddit has given birth to other websites, including image sharing community and image host Imgur, which started in 2009 as a gift to Reddit's community. In its first five months, it jumped from a thousand hits per day to a million total page views.\nStatistics from Google Ad Planner suggest that 74% of Reddit users are male. In 2016 the Pew Research Center published research showing that 4% of U.S. adults use reddit, of which", "large quantities and a high frequency of low quantities. This illustrates popularity of many different objects.\nFor example, there are few very popular websites, but many websites have small followings. This is the result of interest; as many people use e-mail, it is common for sites like Yahoo! to be accessed by large numbers of people; however, a small subset of people would be interested in a blog on a particular video game. In this situation, only Yahoo! would be deemed a popular site by the public. This can additionally be seen in social networking services, such as Facebook. The majority", "to any kind of user interaction or participation. Before this, their Alexa ranking had already been in a steady decline, but this major change of removing all comments and discussions brought about a steeper decline during March/April in their page ranking, as can be seen on the Alexa rankings. Many users stopped visiting the website and they have dropped (as of September 2018) to 3414th most visited website in USA, losing a significant amount of their popularity since being ranked #248 in 2008.\nThe website is owned by TMFT Enterprises, LLC.\nOn November 6, 2018, parent company Defy Media announced that it", "did not fit elsewhere. In particular, there are many alt.fan newsgroups, mostly devoted to discussions of the work and life of famous people: writers, musicians, actors and athletes have alt.fan groups. This sub-hierarchy has also been used for self-promotion by otherwise unknown people. During the notorious trial of Karla Homolka, alt.fan.karla-homolka was created to get around the Canadian news blackout on the case.\nTwo major sections of the alt.* hierarchy, the alt.sex.* and alt.binaries.* hierarchies, have been found to fit better in the alt.* hierarchy than the Big-eight. Because of the inevitably lurid and sometimes offensive subjects that it would cover,", "that strives to meet the majority of your needs. Thanks for your input, and for your patience in the year ahead\".\nMore recently, users noticed a decline in the site's performance, i.e. not only were photos no longer being loaded to Google Earth but daily view statistics were often not appearing. Since November 11, 2015, the daily count of users' individual image hits began to increasingly show up as zero. Up to October 2, 2016, the number of days with \"lost\" statistics amounted to 76 days. Google did not explain the reason for the unreliability of the statistics.\nOn January 30, 2016,", "feels like we are leaving money on the table due to the lack of time and know-how.\"\nThe website ranking system Alexa lists Inquisitr as one of the top 12,000 worldwide with monthly traffic well below Inquisitr's claimed traffic number. Around 75 percent of the audience is located within Anglophone countries like the United States, Canada, Australia, and the United Kingdom.", "of May 28, 2013, Yahoo!'s videos attract 45 million unique visitors a month, while Hulu has 24 million visitors—the combination of the two audiences can place Yahoo! in the second-most popular position after Google and its subsidiary YouTube.\nData collated by comScore during July 2013 revealed that more people in the U.S. visited Yahoo! websites during the month in comparison to Google websites—the occasion was the first time that Yahoo! outperformed Google since 2011. The data did not incorporate visit statistics for the Yahoo!-owned Tumblr website or mobile phone usage.\nOn September 22, 2016, Yahoo disclosed a data breach in which hackers", "$662,907.60 was collectively spent on gift purchases and shipping costs. In 2014, about 200,000 users from 188 countries participated. Several celebrities have participated in the program, including Bill Gates, Alyssa Milano, and Snoop Dogg. Eventually, the secret Santa program expanded to various other occasions through RedditGifts, which Reddit acquired in 2011. Global Reddit Meetup Day The online Reddit community conducts real-world meetups across the globe each summer. These in-person meetups are called Global Reddit Meetup Day. Mr. Splashy Pants Reddit communities occasionally coordinate Reddit-external projects such as skewing polls on other websites, like the 2007 incident when Greenpeace allowed web", "unique visitors each month from the United States. As of February 2015, the site is around the 3,000th most popular on the internet according to Alexa. It is also among the top 50 sites in the United States according to Quantcast.\nA Plus has also partnered or plans to partner with celebrities including rapper Lil Wayne and singers Nicki Minaj, Rihanna, and Britney Spears, whose sharing of A Plus content is expected to boost the site's popularity. Despite the view counts and the social media following of Ashton Kutcher and the partnered celebrities, the social media following of A", "the article was pushed off the front page, which could take from 12 to 18 hours after its initial posting. However, some articles had significantly longer lifetimes due to the popularity, newsworthiness, or interest in the linked article.\nBy 2005, reporters were commenting that the Slashdot effect had been diminishing. However, the effect has been seen involving Twitter when some popular users mention a website. Communities When the targeted website has a community-based structure, the term can also refer to the secondary effect of having a large group of new users suddenly set up accounts and start to participate in", "12% to 7%. It becomes apparent that the decline of these companies has come because of Google's increase in market share from 43% in 2007 to about 55% in 2009.\nIt can be said that Google is more dominant because they provide better services. However, Experian Hitwise has also created graphs to show the market share of about fifteen different companies at once. This has been done for every category for the market share of pictures, videos, product search, and more. The graph for product search is evidence enough for Google's influence because their numbers went from 1.3 million unique visitors", "comScore reported an average of 3.3 million visitors a month in the United States, just after Rolling Stone, and followed by Pitchfork and Spin. A year and a half later, in 2014, the site had 13 million unique viewers for the month of August, and combined with totals for its sister publication, The Hollywood Reporter, the Guggenheim Media Entertainment Group placed as the fourth most popular entertainment website, behind TMZ, E! Online and People.com. In addition to the U.S. based website, Billboard has business operations in South Korea, home of K-pop.\nThe relaunch included a new column, \"K-Town\", in a move", "the conversation. A key feature to Reddit is that users can cast positive or negative votes, called upvotes and downvotes respectively, for each post and comment on the site. The number of upvotes or downvotes determines the posts' visibility on the site, so the most popular content is displayed to the most people. Users can also earn \"karma\" for their posts and comments, which reflects the user's standing within the community and their contributions to Reddit.\nThe most popular posts from the site's numerous subreddits are visible on the front page to those who browse the site without an account. By", "add content on a daily, rather than weekly, basis. Some contributors have become established as freelance writers and editors.\nIn December 2004, Stephen Thompson left his position as founding editor of The A.V. Club.\nAccording to Sean Mills, then-president of The Onion, the A.V. Club website first reached more than 1 million unique visitors in October 2007. In late 2009 the website was reported to have received more than 1.4 million unique visitors and 75,000 comments per month.\nAt its peak, the print version of The A.V. Club was available in 17 different cities. Localized sections of the website were also maintained, with", "of multiple Google bombs caused by Reddit users' dissatisfaction with the eighth season of their show Game of Thrones. Targeted phrases included \"bad writers\" and \"Dumb and Dumber\".", "because now everything is put out on the internet by fans or even the celebrity themselves. Websites like Twitter, Facebook, Instagram and YouTube allow people to become a celebrity overnight. For example, Justin Bieber got his start on YouTube by posting videos of him singing and got discovered. All of his fans got direct contact to his content and were able to interact with him on several social media platforms. Social media has substantially changed what it means to be a celebrity. Instagram and YouTube gives regular people an opportunity to become rich and famous all from inside their home.", "63,000.\nThe high charting debut would prove to be short lived, as Ursa Major fell to #45 in its second week on the Billboard 200 with a 77% sales drop.", "was reported in mid-October 2013 as $14.89 billion, a 12 percent increase compared to the previous quarter. Google's Internet business was responsible for $10.8 billion of this total, with an increase in the number of users' clicks on advertisements. By January 2014, Google's market capitalization had grown to $397 billion.\nGoogle uses various tax avoidance strategies. Out of the five largest American technology companies, it pays the lowest taxes to the countries of origin of its revenues. Google between 2007 and 2010 saved $3.1 billion in taxes by shuttling non-U.S. profits through Ireland and the Netherlands and then to Bermuda. Such", "the time the average subscriber count for a FameBit Influencer was 46,000.\nBy the end of the 2015 that number had risen to 21,000 across 6 social media platforms (Vine, Twitter, Facebook, Tumblr, Instagram, & YouTube)\nBy 2016 FameBit had helped in the creation of over 25,000 branded videos, with and estimated 2 billion minutes of viewing time. Acquisition by YouTube On October 11, 2016, Google acquires Famebit, for initially an undisclosed amount, but was later revealed to be 36 million dollars. At the time of purchase it was stated that FameBit had over 50,000 creators registered on the platform. Google planned", "site is also frequently used as a humorous source for news by many radio stations, as well as late night comedy shows. However, much to Drew Curtis' dismay, it is very rarely cited as a source for many of these stories.\nSeveral celebrities have also stated that they either checked the website regularly or participated in its discussion forums using an account. Some of these celebrities include Alan Colmes of Fox News, MythBusters co-host Adam Savage, science fiction author John Scalzi, and actor Wil Wheaton.", "such as NPR and CNN. Wade and Sharp believe that their post Evolution of Evony Video Game Ads is their most popular post.\nReaders of Sociological Images tend to be between 18 and 34 years old, female and college educated, with incomes of less than $60,000. Forty-nine percent of readers are in the United States, 10% from Western Europe, 10% from Canada, 5% from India, and 2% from Australia. Readers are drawn to the site in a variety of ways, some as part of their daily reading habits and some through internet searching, such as through the phrase \"Disney princess\". Social", "followed celebrities on Twitter. In 2016, a New York Times study of the 50 TV shows with the most Facebook Likes found that Tosh.0 was \"very much of a Northern show, but not necessarily an urban one. It is most popular in Colorado; least so in Mississippi\".", "based on Amazon's accounting of which pages are read. Amazon has been criticized for short-changing authors by paying them out of this monthly fund. As a result of the program, many Amazon authors found that their income decreased substantially when the company switched to the pages-read basis. The collective fund for KDP authors in August 2017 was $19.4 million which was the \"largest ever\" of the monthly funds, but overall authors received the lowest amount, which was $0.00419 per page for that month. Some authors tried to compensate for less income by slightly altering and republishing their work, to try to", "value of Tumblr had fallen by $230 million since it was acquired. In July 2013, Yahoo! reported a fall in revenues, but a rise in profits compared with the same period in the previous year. Reaction on Wall Street was muted, with shares falling 1.7%. In September 2013, it was reported that the stock price of Yahoo! had doubled over the 14 months since Mayer's appointment. However, much of this growth may be attributed to Yahoo!'s stake in the Chinese e-commerce company Alibaba Group, which was acquired before Mayer's tenure.\nIn November 2013, Mayer instituted a performance review system based on", "respecting the parameters of legitimate debate, joining our marketplace of ideas.\" In order \"to avoid the kind of anonymous comments that can reduce discussion to toxic lows\", comments on news articles and features in all of the site's editions can only be posted by readers identified through their Facebook profiles or equivalent.\nIn February 2014, two years after its launch, The Times of Israel claimed a readership of two million. In 2017, readership increased to 3.5 million.\nSince 2016, The Times has hosted the websites of Jewish newspapers in several countries. In March 2016, it began hosting New York's The Jewish Week.", "been named as the most viewing web site ever in the world of Internet based IT surveys.\nGossip Lanka, which ranked top out of the websites of local websites from February 2011 according to Alexa ranked websites, continued to stay to date.\nGossip Lanka was the brainchild of a number of other Gossip websites, and this was the key to maintaining Gossip websites, even in mainstream media.\nGossip Lanka News is different from the one used by other Gossip websites and is the main streamlined and site-related web site responsible for reporting. As a result, the majority of them have been able to", "billion. During the three years since Trump announced his presidential run in 2015, Forbes estimated his net worth declined 31% and his ranking fell 138 spots. Discrepancies in estimates of various organizations is due in part to the uncertainty of appraised property values, as well as Trump's own assessment of the value of his personal brand.\nIn its 2018 billionaires ranking, Forbes estimated Trump's net worth at $3.1 billion (766th in the world, 248th in the U.S.). Bloomberg Billionaires Index listed Trump's net worth as $2.48 billion on May 31, 2018, and Wealth-X listed it as at least $3.8 billion on July 16,", "under 10 days, becoming the most-liked Instagram post of all time. It then continued to rise over 45 million likes in the next 48 hours, surpassing the \"Despacito\" music video and taking the world record for the most liked online post (on any media platform) in history.\nAfter the account became verified on 14 January, the post rose in popularity and 'likes', which snow-balled into coverage in various media outlets.\nBy 18 March, the post had accumulated over 53.3 million likes, nearly three times the previous record of 18.4 million. It posted frequent updates for a few days in the form of", "services like Excite, Lycos and America Online. By 1998, Yahoo was the most popular starting point for web users, and the human-edited Yahoo Directory the most popular search engine, receiving 95 million page views per day which was triple the number compared to rival Excite. It also made many high-profile acquisitions. Yahoo began offering free e-mail from October 1997 after the acquisition of RocketMail, which was then renamed to Yahoo! Mail. In 1998, Yahoo! decided to replace AltaVista as the crawler-based search engine underlying the Directory with Inktomi. Yahoo's two biggest acquisitions were made in 1999 – that of Geocities", "is now the celebrity website seher.no, run by Aller Internet. As of October 2012, the site had approximately 450,000 unique users per week. As of January 2013, it ranked 74th in Norway at the Alexa Internet statistics service. David Stenerud served as its editor until May 2012, when he left and was not replaced as part of a policy of closer coordination between the website and the print magazine. In summer 2012, the magazine became available for the iPad from the Apple App Store; this mobile service had 70,000 subscribers in 2012.\nIn the 1990s, the Norwegian Se og Hør had the largest" ]
How can there be a sex wage gap in the US if we've had the Equal Pay Law since 1960?
[ "There's a bit of a misconception about the wage gap. For jobs in the exact same role with the exact same responsibilities, the wages are about the same. However, men tend to be more likely to be promoted to higher-paying positions. Women are also more likely than men to take extended time off or work part time while raising a family, meaning their careers are held back during that time.", "I read the reason women today get paid less isn't because of gender discrimination, it's because women are less likely to give up other benefits, such as vacation time, and they're more likely to accept or seek part time work instead of fulltime. But when you take those facts out and just look at numbers, you get \"women make less than their colleagues\"\n\nI don't know how true that is, but it sounds plausible to me.", "Isn't the wage gap mostly a myth? Most women tend to not take dangerous jobs and are more likely to work part time because they want to start families. I work at a hospital, the ceo is very highly paid woman and everyone is paid equally for same work. If this was really true you would see companies with a mostly female workforce and less payroll overhead. But as far as I know that doesn't really exist. \n\nNote: there are always exceptions to everything." ]
[ "sex, according to a recent case, Rizo v. Yovino. Specifically, employers can no longer justify the wage differential between male and female employees by relying on their prior salaries, either alone or in combination with other factors. The 9th Circuit reasoned that prior salary is not a legitimate measure of work experience, and that “it may well operate to perpetuate the wage disparities prohibited under the [Equal Pay] Act.”\nThe Second, Sixth and Eleventh Circuits allow employers to rely on applicants’ prior salary to justify wage differentials between genders, if an employer has an “acceptable business reason” for setting starting", "The first attempt at equal pay legislation in the United States, H.R. 5056, \"Prohibiting Discrimination in Pay on Account of Sex,\" was introduced by Congresswoman Winifred C. Stanley of Buffalo, N.Y. on June 19, 1944. Twenty years later, legislation passed by the federal government in 1963 made it illegal to pay men and women different wage rates for equal work on jobs that require equal skill, effort, and responsibility, and are performed under similar working conditions. One year after passing the Equal Pay Act, Congress passed the 1964 Civil Rights Act. Title VII of this act makes", "was coming into effect, there was concern over how these two laws would interact, which led to the passage of Senator Bennett's Amendment. This Amendment states: \"It Shall not be unlawful employment practice under this subchapter for any employer to differentiate upon the basis of sex ... if such differentiation is authorized by the provisions of the [Equal Pay Act].\" There was confusion on the interpretation of this Amendment, which was left to the courts to resolve.\nThus US federal law now states that \"employers may not pay unequal wages to men and women who perform jobs that", "Employment discrimination law in the United States History of federal laws Federal law governing employment discrimination has developed over time.\nThe Equal Pay Act amended the Fair Labor Standards Act in 1963. It is enforced by the Wage and Hour Division of the Department of Labor. The Equal Pay Act prohibits employers and unions from paying different wages based on sex. It does not prohibit other discriminatory practices in hiring. It provides that where workers perform equal work in the corner requiring \"equal skill, effort, and responsibility and performed under similar working conditions,\" they should be provided equal pay. The", "of Appeals held with respect to the latter that \"claims for sex-based wage discrimination can also be brought under Title VII even though no member of the opposite sex holds an equal but higher paying job, provided that the challenged wage rate is not exempted under the Equal Pay Act's affirmative defenses as to wage differentials attributable to seniority, merit, quantity or quality of production, or any other factor other than sex.\" It interpreted the intention of the Amendment as incorporating \"into Title VII only the affirmative defenses of the Equal Pay Act, not its prohibitory language requiring equal pay", "(71.2–77.0%). When the first Equal Pay Act was passed in 1963, female full-time workers earned 48.9% as much as male full-time workers.\nResearch conducted in the Czech and Slovak Republics shows that, even after the governments passed anti-discrimination legislation, two thirds of the gender gap in wages remained unexplained and segregation continued to \"represent a major source of the gap\".\nThe gender gap can also vary across-occupation and within occupation. In Taiwan, for example, studies show how the bulk of gender wage discrepancies occur within-occupation. In Russia, research shows that the gender wage gap is distributed unevenly across income levels, and that", "less than the rates paid to employees of the opposite sex in the same establishment for equal work on jobs\". Because of the vagueness of this law, employers are able to find loopholes and pay women in California much lower than their male co-workers. As of 2015, female workers make only 80 cents for every dollar earned by male workers thus putting the gender wage gap of 20%. Over 38.8 billion dollars is lost due to the wage gap between men and women. On October 6, 2015, Governor Jerry Brown signed the bill into law and the amendment took effect", "be considered a wage was specifically defined, and entitlement to sue for back wages was granted. 1963 Equal Pay Act The Equal Pay Act of 1963 was passed to amend the FLSA and make it illegal to pay some workers lower wages than others strictly on the basis on their sex. It is often summed up with the phrase \"equal pay for equal work.\" The Equal Pay Act allows unequal pay for equal work only when the employer sets wages pursuant to a seniority system, a merit system, a system that measures earnings by quantity or quality of production or", "it unlawful to discriminate based on a person's race, religion, color, or sex. Title VII attacks sex discrimination more broadly than the Equal Pay Act extending not only to wages but to compensation, terms, conditions or privileges of employment. Thus with the Equal Pay Act and Title VII, an employer cannot deny women equal pay for equal work; deny women transfers, promotions, or wage increases; manipulate job evaluations to relegate women's pay; or intentionally segregate men and women into jobs according to their gender.\nSince Congress was debating this bill at the same time that the Equal Pay Act", "a bill that establishes additional penalties for violations of equal pay requirements in the Fair Labor Standards Act, including, among other things, a prohibition on an employer from paying a wage rate to employees of a particular sex that is lower than the rate paid to employees of the opposite sex for equal work unless such payment is made due to certain factors including, but not limited to, \"a bona fide factor other than sex.\". Other groups have characterized the legislation as redundant, citing the 1963 Equal Pay Act and Title VII of the 1964 Civil Rights Act as existing", "of the Civil Rights Act of 1964 to provide an equal hiring and promotional process, that practice has had limited success. The pay gap between men and women is slowly closing. Women make approximately 21% less than her male counterpart according to the Department of Labor. This number varies by age, race, and other perceived attributes of hiring agents. A proposed step towards solving the problem of the gender pay gap and the unequal work opportunities is the ratification of the Equal Rights Amendment which would constitutionally guarantee equal rights for women. This is hoped to end gender-based discrimination and", "Although the Equal Pay Act came into force almost several decades ago, there is still a pay gap of 15% between men and women doing the same work.\nAccording to the Close the Gap Project, there are several reasons for differences in pay; the first one being that jobs are segregated regarding to gender. So it is normal to press men and women into stereotypical male or female occupations. The majority of women (72%) are employed in public administration, education and health. Typical male jobs are handy work, mechanical work with the 89% of male employees working in the field of", "Gay wage gap The gay wage gap is the pay gap between homosexuals and heterosexuals. Studies had shown that gay men earn less than their heterosexual counterparts, whereas lesbians tended to earn more. A recent study suggests that this may be changing, as gay men earned more than their heterosexual counterparts in the US. People who are openly Lesbian, Gay, Bisexual, and/or Transgender are more likely to experience socioeconomic disadvantages. Phenomenon A study by Georgia State University from 2009 stated, that queer men earn 8–10% less in government compared to heteronormative men, even when taking education, race, years of", "Equal Pay Act and Prior Salary The Controversy The Equal Pay Act forbids employers from paying men and women different wages for equal jobs that require equal skill, effort, and responsibility, performed under similar conditions. However, employers can rebut Equal Pay Act challenges by showing that the contested pay differential is based on seniority, merit, quantity or quality of work produced or “any other factor other than sex.” Courts disagree about whether an employee’s prior salary information counts as “any other factor other than sex.”\nIn the 9th Circuit, prior salary information no longer counts as a factor other than", "wage gap is a possible consequence of occupational segregation. The gender wage gap is the \"difference between wages earned by women and men\". In 2008, globally, men were estimated to earn 16.5 per cent more than women. The gender wage gap is narrowing, but progress remains slow. Additionally, the narrowing of the gender wage gap may be attributed to a decrease in men's wages instead of an increase in women's wages. \"The persistent gender wage gap across regions may reflect a number of factors, including women's continued disadvantage in terms of education and skills; their lack of an organized voice", "require substantially equal skill, effort and responsibility, and that are performed under similar working conditions within the same establishment.\" New York state In 1944, the state of New York outlawed wage discrimination based on one's gender. On 10 July 2019, New York Governor Andrew Cuomo signed into law legislation guaranteeing equal pay for equal work regardless of one's gender. This builds on the 1944 law by prohibiting employers from asking job candidates about their previously salary, a loophole that has had a history of enforcing pay inequality based on gender. Cuomo signed the law in tandem with the 2019 Women's", "all occupations to have equal gender composition. While women have begun to more frequently enter traditionally male-dominated professions, there have been much fewer men entering female-dominated professions; professor of sociology Paula England cites this horizontal segregation of careers as a contributing factor to the gender pay gap. Pay gap With regards to the gender pay gap in the United States, International Labour Organization notes as of 2010 women in the United States earned about 81% of what their male counterparts did. While the gender pay gap has been narrowing since the passage of the Equal Pay Act, the convergence began", "on January 1, 2016. Features The new bill is set to fix many of the previous law's issues by fixing terms such as \"bona fide factor other than sex\", \"substantially similar work\" and \"same establishment\" that have allowed employers to justify the wage gap. Before employers would rely on irrelevant \"factors other than sex\" to justify the wage gap. SB358 is set to alter the term \"bona fide factor other than sex\" defense with actual legitimate factors. It ensures to employees who perform \"substantially similar work\" but are paid differently to have equal pay. It also adds onto the \"same", "result in 60% to 75% difference between men's and women's average aggregate wages or salaries, depending on the source. Various explanations for the remaining 25% to 40% have been suggested, including women's lower willingness and ability to negotiate salary and sexual discrimination. According to the European Commission direct discrimination only explains a small part of gender wage differences.\nIn the United States, the average female's unadjusted annual salary has been cited as 78% of that of the average male. However, multiple studies from OECD, AAUW, and the US Department of Labor have found that pay rates between males and females", "discrimination.\nEstimates of the discriminatory component of the gender pay gap vary. The OECD estimated that approximately 30% of the gender pay gap across OECD countries is due to discrimination. Australian research shows that discrimination accounts for approximately 60% of the wage differential between men and women. Studies examining the gender pay gap in the United States show that a large portion of the wage differential remains unexplained, after controlling for factors affecting pay. One study of college graduates found that the portion of the pay gap unexplained after all other factors are taken into account is 5% one year after", "of Labor to advance their social reform agenda. This included equal pay for comparable work, shorter workdays for women and men, and social welfare support for childbearing and childrearing. In 1945, they introduced the Equal Pay Act in Congress, which sought to abolish wage disparity based on sex. Their version of the bill, which was different than what passed in 1963, advocated for equal pay for comparable work in addition to same work because employers often undervalued the contributions of women in roles that women tended to occupy. Labor feminists re-introduced the bill every year until 1963 when the Equal", "to pay women a minimum rate of pay that was 25% less than male employees doing the same or similar work. In 1969, the first federal Equal Pay case established the principle that where women perform 'equal work' alongside men they should receive equal pay, referred to as \"equal pay for equal work\". Importantly however equal pay was not applicable \"where the work in question is essentially or usually performed by females but is work upon which male employees may also be employed\". By 1972 only 18% of women workers, mostly teachers and nurses, received the benefit of the decision.\nIn", "workforce that is often exempted from overtime laws. In summary, the study stated:\n\"Although additional research in this area is clearly needed, this study leads to the unambiguous conclusion that the differences in the compensation of men and women are the result of a multitude of factors and that the raw wage gap should not be used as the basis to justify corrective action. Indeed, there may be nothing to correct. The differences in raw wages may be almost entirely the result of the individual choices being made by both male and female workers.\"\nHowever, later, in 2014, the Department of Labor", "to slow down in the 1990s. In addition, overall wage inequality has been increasing since the 1980s as middle-wage jobs are decreasing replaced by larger percentages of both high-paying and low-paying jobs, creating a highly polarized environment.\nHowever numerous studies dispute the claim that discrimination accounts for the majority of the pay gap. When adjusting for industries commonly chosen, \"choices\" often being the result of gender stereotypes, hours worked, and benefits received, the pay gap returns to 5%, which has been attributed to less aggressive pay negotiating in women. One study actually found that before 30, females made more", "Gender Equality Duty does not just apply to bigger companies. It also applies to public bodies as schools and to education in general.\nIt was replaced by a general equality duty under the Equality Act 2010. Equal pay The Equal Pay Act 1970 demanded that men and women doing the same work get paid equally. With the Gender Equality Duty in 2007, it was stated that companies and public authorities have to publicly show how they want to improve the pay issue as a difference in payment shows gender discrimination. They are controlled regularly whether they achieved their objectives or not.", "Rebecca M. Blank found that only about 27% of the gender wage gap in each year is explained by differences in such characteristics.\nA 1993 study of graduates of the University of Michigan Law School between 1972 and 1975 examined the gender wage gap while matching men and women for possible explanatory factors such as occupation, age, experience, education, time in the workforce, childcare, average hours worked, grades while in college, and other factors. After accounting for all that, women were paid 81.5% of what men \"with similar demographic characteristics, family situations, work hours, and work experience\" were paid.\nSimilarly, a comprehensive", "skill, effort and responsibility of its male and female employees, yet pays them different rates, that difference in pay is deemed to be gender-based, and illegal. If a class of work is exclusively or predominantly performed by females, gender-based pay inequality is deemed to exist if a different rate would be paid to male employees with the same, or similar, skills performing the work under substantially similar conditions and with substantially similar degrees of effort. Human Rights Act 1993 The Human Rights Act 1993 (HRA) expressly prohibits discrimination on thirteen grounds, including sex. The HRA applies to all aspects of", "theories maintain that the wage penalties associated with working in female-dominated occupations result from different requirements in specialized training and that the effect is indirect. Many feminist scholars insist that sexual difference is the primary reason for differences between both sexes in the labor market outcomes.\nWomen face discrimination in the workplace, such as the “glass ceiling,” although female participation in the labor market has increased markedly during the past twenty years. However, even with increased participation in the labor force and the high levels of commitment that women give to their workplace, women's work is still undervalued. Additionally, many", "the other single, average wage increased 26%. Some studies have suggested this premium is greater for men with children while others have shown fatherhood to have no effect on wages one way or the other. Gender differences in perceived pay entitlement According to Serge Desmarais and James Curtis, the \"gender gap in pay …is related to gender differences in perceptions of pay entitlement.\" Similarly, Major et al. argue that gender differences in pay expectations play a role in perpetuating non-performance related pay differences between women and men.\nPerceptions of wage entitlement differ between women and men such that men are more", "of their time in clerical tasks, but also found as a matter of law that a sex-based wage discrimination claim cannot be brought under Title VII unless it satisfies the equal work standard of the Equal Pay Act of 1963. Court of Appeals, Ninth Circuit While not reviewing the first finding, the 9th Circuit Court of Appeals held with respect to the latter that \"claims for sex-based wage discrimination can also be brought under Title VII even though no member of the opposite sex holds an equal but higher paying job, provided that the challenged wage rate is not exempted" ]
Why/how does eye-makeup (even simple eyeliner/moderate mascara use) have such a dramatic impact on how attractive women are perceived? Why only women? - is it all just socialization? (Are we just conditioned to think that's attractive?)
[ "Eye make-up is often used to extenuate the size, shape or colour of someone's eyes.\n\n\nYour eyes can give away a huge amount about your current state - revealing indicators about your health, your energy levels, your age, your state of mind etc.\n\n\nA good application of eye make-up could take tired, old eyes and transform them into bright, youthful eyes with energy. The difference is enormous visually because so much of human contact is face-to-face and the eyes are the focal point of the face.", "The whiter the whites of a person's eyes, the healthier they are (in general). Mascara creates an optical illusion that a person's whites of their eyes are whiter than reality." ]
[ "curvier figures. Research suggests that women of color, as well as communities of color in general, may consider more body types attractive than white beauty standards. However, because women of color are often excluded from fat positivity and acceptance movements, many have turned to social media as a way of finding inclusion within the movements. Some fat women of color resist dominant beauty standards by creating intersectional frameworks for accepting fat women of all identities. Fat women of color work to resist fetishization by the male gaze or those giving unwanted health advice, while also creating positive and accepting", "Gentry noted that images of blonde, thin women are predominant in mass media, and that these characteristics are often portrayed as being ideal. Martin and Gentry also found that advertising can \"impose a sense of inadequacy on young women's self-concepts\". This is because girls and young women tend to compare their own physical attractiveness to the physical attractiveness of models in advertisements. They then experience lowered self-esteem if they do not feel that they look like the models in advertisements.\nToday's models weigh 23 percent less than the average woman, while the average model two decades ago weighed eight percent less", "were shown magazine pictures of models, [suggests] that media portrayal of images can prolong anorexia and bulimia in women and may even be a cause of it\".\nAccording to Dove's Global Beauty And Confidence report, \"a total of 71% of women and 67% of girls want to call on the media to do a better job portraying women of diverse physical appearance, age, race, shape and size.\" In addition, 67% of men now strongly believe that it is unacceptable for brands to use photo manipulation techniques to alter the body image of a model. To counter such issues, the fashion magazine", "beauty myth by removing any remaining blemishes or imperfections visible to the eye.\" Advertisements for products \"such as diets, cosmetics, and exercise gear [help] the media construct a dream world of hopes and high standards that incorporates the glorification of slenderness and weight loss.\"\nWith a focus on an ideal physical appearance, the feminine beauty ideal distracts from female competency by prioritizing and valuing superficial characteristics related to beauty and appearance. When physical beauty is idealized and featured in the media, it reduces women to sexualized objects. This creates the message across mass media that one's body is inadequate apart", "lower cheeks, and chin. Contouring and highlighting the face with white eye shadow cream also became popular. Avon introduced the lady saleswoman. In fact, the whole cosmetic industry in general opened opportunities for women in business as entrepreneurs, inventors, manufacturers, distributors, and promoters.", "the eyes. Black lash mascara is the most popular and commonly used by women with fair and brown complexions. Very fair individuals and men use brown mascara. The bottom lashes are coated with mascara and to avoid using false lashes, a process of layering powder and mascara is used to provide greater thickness. Powder A generous amount of powder is needed to reduce unwanted shine. If a performer's makeup is under-powdered, his skin oils will break through quickly, producing shine and possibly running. After powder is applied to the entire face, starting under and around the eyes, it is gently", "U.S. Department of Health and Human Services reported that, 91% of women were mostly unhappy with their bodies, while 40% will consider cosmetic surgery to fix their flaws. Women Women \"all over the world are evaluated and oppressed by their appearances\"; be it age, skin tone, or size. A large facet of \"social currency for girls and women continues to be rooted in physical appearance\". With accessories and apparel designed to enhance a look, social media, magazines, marketing campaigns and advertisements also add to the burden on women to achieve perfection. This is still prevalent today, whereby female bodies are", "and that this puts tremendous pressure on women to conform to conventional beauty standards by spending time and money on fashion, cosmetics, hair styling, and even cosmetic surgery. They say that this pursuit of physical beauty even encourages some women to go on a diet to the point of harming themselves.\nThe London Feminist Network argues that rather than being empowering, beauty pageants do exactly the opposite because they deny the full humanity of women by placing them as the subject of objectification; they reinforce the idea that a woman's only purpose is to look attractive.\nAnother criticism that is placed on", "and brown for selfishness. There are about a hundred different mask-like kumadori makeup styles. Age group Young men who are between 18-34 years old are more likely to use cosmetics. Males using cosmetics Male cosmetics were originally targeted towards homosexual men, however, market research revealed that only 1/3 of male cosmetic consumers were gay. Some men use beauty products to cover flaws on their faces, such as acne marks and freckles. Additionally, some men use cosmetics in an effort to appear more handsome. \nMakeup is frequently used by male stage performers and movie actors. Intensive makeup might be used to", "trends Women's makeup in the early 1990s primarily consisted of dark red lipstick and neutral eyes. Around 1992 the \"grunge look\" came into style among younger women and the look was based on dark red lipstick and smudged eyeliner and eyeshadow. Both styles of makeup continued into 1994, but went out of style the next year.\nThe trends in makeup shifted in the mid 1990s. In 1995, nude shades became desirable and women had a broader color palette in brown. Another makeup trend that emerged was matte lipsticks, with deep shades of red and dark wine colors worn as part of", "or—worse yet—unable to afford stylish new products was a fate many Americans went to great lengths to avoid.\nFor women, face, figure, coiffure, posture, and grooming had become important fashion factors in addition to clothing. In particular, cosmetics became a major industry. Women did not feel ashamed for caring about their appearance and it was a declaration of self-worth and vanity, hence why they no longer wanted to achieve a natural look. For evenings and events, the popular look was a smoky eye with long lashes, rosy cheeks and a bold lip. To emphasize the eyes, Kohl eyeliner became", "relationship between the amount of media exposure that a young woman has and the likelihood that she will develop eating disorder symptoms.\nMartin and Gentry also found that the mass media \"creates and reinforces a preoccupation with physical attractiveness in young women\", which can lead to bulimia, anorexia, and opting for cosmetic surgery. She also concluded that, \"exposure to ultra-thin models in advertisements and magazine pictures produced depression, stress, guilt, shame, insecurity, and body dissatisfaction in female college students\".\nIn a study published in the Journal of Youth and Adolescence, Paxton et al. found body dissatisfaction to be more prevalent in young", "this era, due to the chemical makeup of the substances used, cosmetics often caused serious health problems, including premature death.\nWith the advent of modern film making in the United States in the 1930s, men's hair and cosmetics re-emerged in the public eye. However, men's beauty products were non-existent on the market until the end of the 1990s. Only a few brands were interested in producing men's cosmetics because it was regarded as a niche market. Male cosmetics are not as widely accepted as female cosmetics; only 17% of men think that makeup products are important in daily life. Nevertheless, 97%", "were not used exclusively by women. Men started to use makeup to rebuild their image. Meanwhile, modern beauty methods became a popular beauty topic in advertisements, newspaper columns and magazines in the late 1920s to early 1930s. At that time, cosmetic consumers focused on the selection of the makeup and their uses. The single makeup method of painting the face white was considered outdated. The beauty consumers liked to apply up to seven different colors of face powder including ‘’ white, yellow, flesh, rose, peony, green and purple’’ to match their skin tone. In order to explore more potential", "for and against In a study by Pazda it was shown that females wearing red are rated more attractive by males. They explained this by referring to the biological aspect that sexually receptive women are more attractive because of them having a higher probability for engaging in sexual activity, as well as a higher probability for the males to successfully reproduce.\nThe same effect seems to work the other way round. In a disputed study by Elliot it was shown that males wearing red are rated more attractive by females.\nA large replication study by Peperkoorn et al. found no evidence for", "a study done at Old Dominion University, Thomas F. Cash, Julie R. Ancis and Melissa D. Strachan studied college women and their attitudes toward gender, feminist identity and body image. \"Relative to men, women are considerably more psychologically invested in their appearance. Moreover, women's poor evaluations of and stronger investments in their looks potentiate greater body-image dysphoria in women's daily lives.\" A contributing factor in this scenario that leads women to greater objectification of their bodies are the images that are seen throughout media. Women who are portrayed in the media often possess unattainable beauty. \"Furthermore, the social construct of", "diversity can contribute to body image issues amongst non-white minorities. In one such experiment, conducted in 2003, 3 photographs of attractive white, black and Asian women were shown to a group of white, black and Asian students. The study concluded that Asian women thought that the photograph of the white woman was the most attractive, and reported high levels of body dissatisfaction. Such dissatisfaction may even cause these individuals to suffer psychologically due to the pressure to embody these ideals, and may result in them going through several means to change their physical appearance in order to match the Eurocentric", " However, these products, such as ceruse, a lead derivative severely irritated the skin, leaving women's faces blemished and burned. Although safer alternatives existed, women preferred the consistency and coverage offered by ceruse. Not all cosmetics were dangerous, many women relied on lotions and balms containing almonds, olive oil, lemon juice, bread crumbs, eggs, honey, rosewater and snake fat to clarify and cleanse the skin. Red lips and rosy cheeks were achieved primarily through the application of vermilion; ceruse mixed with organic dyes such as henna and cochineal (a powder made from the ground exoskeleton", "skinny and gorgeous women will have a bigger impact on increasing negative body image, than ads in magazines. The author of \"Influence of Appearance-Related TV Commercials on Body Image State\", Tanja Legenbauer, conducted a study to demonstrate that images presented in commercials can lead to harmful effects in those that watch them.  Her study included participants who looked at different silhouettes of differently shaped women, and their response to these images was reviewed. These participants included those with and without eating disorders, and usually those participants with eating disorders reacted more negatively to the images presented to them in the", "it is important that this not obscure the damaging impact that harmful ideals of body image and beauty may have on black women.", "used not as a mask, but rather to alter perception and proportion, creating a personalized \"ideal\" face. Glamorization Make-up used by European fashion designers in the 1970s presented a sensual look for women in striking contrast to the \"natural look\". Though models in Yves Saint Laurent's hugely influential runway shows wore menswear and short, slicked-back hair, their lips were glossy and bright red. YSL's cosmetics line also employed intense, feminine colors. In the violent, sexual porno chic fashion photography of French and Italian Vogue, women wore blood-red lipstick, glossy red nail polish, pencil-thin eyebrows and black eye make-up. Women employed", "to wear make up'. (Bordo, 1993). unfortunately these demands have not yet been fulfilled as women in today's society still feel the need to dress in a particular way and to wear makeup to feel beautiful and attractive to the opposite gender and within today's society.\nHowever, these efforts to erase the 'ideal body image' are opposed by modern reality TV shows that encourage such behaviour. Extreme Makeover puts individuals through extreme physical changes to change the way they look, which is then viewed by women of all ages. This tends to encourage people to think about their image, and change", "women surveyed felt insecure when seeing photos of celebrities in the media. Of the women surveyed who had lower self-esteem, 71% of them do not believe that their appearance is pretty or stylish enough in comparison to cover models. Social and cultural implications The growing popularity of image manipulation has raised concern as to whether it allows for unrealistic images to be portrayed to the public. In her article \"On Photography\" (1977), Susan Sontag discusses the objectivity, or lack thereof, in photography, concluding that \"photographs, which fiddle with the scale of the world, themselves get reduced, blown up, cropped, retouched,", "to Do About It, \"most women agree, reporting the good looks continue to be associated with respect, legitimacy, and power in their relationships\". In the commercial world, hiring, evaluations and promotions based on physical appearance push women to place the importance of beauty above that of their work and skills.\nOver the course of history, beauty ideals for women have changed drastically to represent societal views. Women with fair skin were idealized and segregated and used to justify the unfair treatment of dark-skinned women. In the early 1900s, the ideal female body was represented by a pale complexion and cinched-waist; freckles,", "literature, paintings, and miniatures portrayed traits such as long black curly hair, a small mouth, long arched eyebrows, large almond shaped eyes, a small nose, and beauty spots as being beautiful for women. Eyes A study where photographs of several women were manipulated (so that their faces would be shown with either the natural eye color of the model or with the other color) showed that, on average, brown-eyed men have no preference regarding eye color, but blue-eyed men prefer women of the same eye color.\nThrough the East Asian blepharoplasty cosmetic surgery procedure, Asian women can permanently alter the structure", "as Instagram, Facebook, Twitter, and Snapchat, new standards of beauty have emerged in the relationship between media and gender. This can create a false image of how individuals, particularly young children, should look. Young people are more likely to purchase products endorsed by social media personalities such as Instagram models in hopes of getting that model's body type when in reality the figures are likely attained through plastic surgery. This look has also lead to a 115% increase in the number of plastic surgeries since 2000. Feminist response Germaine Greer, Australian-born author of The Female Eunuch (1970), offered a systematic", "self-perception of appearance is how an individual measures their own beauty. Women with lower self-perceptions of appearance tend to be more dissatisfied after viewing \"ideal\" images of women in the media. This same issue can also be seen in the male population but isn't as prevalent and widespread as in the female population. In the journal \"Media Images and Women's Self-evaluations\", researchers D. Henderson-King, Henderson-King, and Hoffman demonstrated that the importance that women place on physical attractiveness is associated with images displayed in the media. Body image Body image is a very important developmental concern for children and young", "Cosmetics in the 1920s Cosmetics in the 1920s were characterized by their use to create a specific look: lips painted in the shape of a Cupid's bow, kohl-rimmed eyes, and bright cheeks brushed with bright red blush. Context The heavily made-up look of the 1920s was a reaction to the demure, feminine Gibson girl of the pre-war period. In the 1920s, an international beauty culture was forged, and society increasingly focused on novelty and change. Fashion trends influenced theater, films, literature, and art.\nWomen also found a new need to wear more make-up, as a skewed postwar sex ratio created a", "women. Those wearing heavy makeup are seen as significantly more feminine than those wearing moderate makeup or no makeup and those wearing heavy or moderate makeup are seen as more attractive than those wearing no makeup. While a woman wearing no makeup is perceived as being more moral than the other two conditions, there is no difference between experimental conditions when judging personality or personal temperament.\nFirst impression formation can be influenced by the use of cognitive short hands such as stereotypes and representative heuristics. When asked to rate the socioeconomic status (SES) and degree of interest in friendship with", "differences. However, the lack of diversity in clinical trials for breast cancer treatment may contribute to these disparities, with recent research indicating that black women are more likely to have estrogen receptor negative breast cancers, which are not responsive to hormone treatments that are effective for most white women. Research is currently ongoing to define the contribution of both biological and cultural factors.\nPart of the differences in incidence that is attributable to race and economic status may be explained by past use of hormone replacement therapy Tea One research published in 2009 has shown that moderate green tea or black" ]
How can electric motors for cars be small enough to fit into a car and relatively cheap while industrial electric motors with similar power and torque are the size of a kitchen and cost more than an electric car?
[ "Industrial electric motors are meant to be run nearly 24/7 at higher loads and don't have to be portable, so size isn't usually a factor as much as keeping them cool, so they're built to shed excess heat better, and more surface are = more heat that can be transferred away.\n\non the other hand for cars, weight and size are bigger factors, and the motors in them will never be run full power all the time, so more effort is put into them to keep them smaller. Heat dissipation isn't as much of a problem either in a car as you can use the cars air flow to help keep things cool, whereas industrial motors don't usually sit in well ventilated areas.", "* they are designed to run 24/7\n* space is less of a premium in a factory\n* weight is much less of a design consideration\n* heating is less of a problem\n* they don't have to be designed to run on batteries" ]
[ "dynamo. Traction motors used on vehicles often perform both tasks. Electric motors can be run as generators and vice versa, although this is not always practical.\nElectric motors are ubiquitous, being found in applications as diverse as industrial fans, blowers and pumps, machine tools, household appliances, power tools, and disk drives. They may be powered by direct current (for example a battery powered portable device or motor vehicle), or by alternating current from a central electrical distribution grid. The smallest motors may be found in electric wristwatches. Medium-size motors of highly standardized dimensions and characteristics provide convenient mechanical power for", "losses.\nThere are, however, disadvantages in increasing the electrical efficiency of motors through larger windings. This increases motor size and cost, which may not be desirable in applications such as appliances and in automobiles. In transformers A transformer is a device that transfers electrical energy from one circuit to another through its coils (windings). The properties needed for motor windings are similar to those needed for transformers, but with the additional requirement to withstand mechanical vibration and centrifugal forces at operating temperatures.\nTransformer windings are normally made from copper but aluminium is a suitable competitor where weight and first cost are decisive", "industrial uses. The very largest electric motors are used for propulsion of large ships, and for such purposes as pipeline compressors, with ratings in the thousands of kilowatts. Electric motors may be classified by the source of electric power, by their internal construction, and by their application.\nThe physical principle of production of mechanical force by the interactions of an electric current and a magnetic field was known as early as 1821. Electric motors of increasing efficiency were constructed throughout the 19th century, but commercial exploitation of electric motors on a large scale required efficient electrical generators and electrical distribution networks.\nTo", "mechanical energy more efficient.\nThere are three specification options. The first one contains the turbine and two electric motors, which does 429 hp (320 kW; 435 PS) and 575 lb⋅ft (780 N⋅m), which means the power-to-weight ratio sits at 252 hp (188 kW; 255 PS) per ton. This makes the car rear-wheel drive only. The second includes a turbine and four motors that boasts 858 hp (640 kW; 870 PS) and 1,150 lb⋅ft (1,559 N⋅m), making the power-to-weight ratio at 504 hp (376 kW; 511 PS). The final setup has the turbine and six motors, this time pushing 1,287 hp (960 kW; 1,305 PS) and 1,725 lb⋅ft (2,339 N⋅m), leaving the power-to-weight ratio at 757 hp (564 kW; 767 PS) per ton. These last two", "are several advantages over electric tools. They offer greater power density (a smaller pneumatic motor can provide the same amount of power as a larger electric motor), do not require an auxiliary speed controller (adding to its compactness), generate less heat, and can be used in more volatile atmospheres as they do not require electric power and do not create sparks. They can be loaded to stop with full torque without damages.\nHistorically, many individuals have tried to apply pneumatic motors to the transportation industry. Guy Negre, CEO and founder of Zero Pollution Motors, has pioneered this field", "equipped with its own electric motor, which can be fed varying electrical power to provide any required torque or power output for each wheel independently. This produces a much simpler solution for multiple driven wheels in very large vehicles, where drive shafts would be much larger or heavier than the electrical cable that can provide the same amount of power. It also improves the ability to allow different wheels to run at different speeds, which is useful for steered wheels in large construction vehicles. Hydrodynamic If the hydraulic pump or hydraulic motor make use of the hydrodynamic effects of the", "more efficient charge/discharge cycling than petro-electric hybrids and is also cheaper to build. The accumulator vessel size dictates total energy storage capacity and may require more space than an electric battery set. Any vehicle space consumed by a larger size of accumulator vessel may be offset by the need for a smaller sized charging engine, in HP and physical size.\nResearch is underway in large corporations and small companies. Focus has now switched to smaller vehicles. The system components were expensive which precluded installation in smaller trucks and cars. A drawback was that the power driving motors were not efficient enough", "torque of an electric motor. However Neighborhood Electric Vehicles (NEVs) may have a low acceleration due to their relatively weak motors.\nElectric vehicles can also use a direct motor-to-wheel configuration which increases the available power. Having motors connected directly to each wheel simplifies using the motor for both propulsion and braking, increasing traction. Electric vehicles that lack an axle, differential, or transmission can have less drive-train inertia.\nFor example, the Venturi Fetish delivers supercar acceleration despite a relatively modest 220 kW (300 hp), and top speed of around 160 km/h (100 mph). Some DC-motor-equipped drag racer EVs have simple two-speed manual transmissions to improve top", "in DC motors. A universal motor's armature typically has far more coils and plates than a DC motor, and hence fewer windings per coil. This reduces the inductance. Efficiency Even when used with AC power these types of motors are able to run at a rotation frequency well above that of the mains supply, and because most electric motor properties improve with speed, this means they can be lightweight and powerful. However, universal motors are usually relatively inefficient: around 30% for smaller motors and up to 70–75% for larger ones. Torque-speed characteristics Series wound electric motors respond to increased", "to be expensive compared with standard, or general-purpose lower-precision units. Applications Fractional-horsepower motors are used across a wide range of industries and applications for a variety of motion and compression needs. The largest portion of sales can be attributed to the automotive sector, however, accounting for some 35% of all FHP motor sales, driving auxiliary applications such as electric windows, wind-shield wipers, powered seats, wing mirrors, central locking systems, roof openers, and trunk openers. In Europe, the majority of these applications are fulfilled by the industry's largest players: Brose (formerly Siemens), Bosch, and Nidec (formerly Valeo).\nThe second-largest area of consumption", "energy.\nElectric motors may be classified by considerations such as power source type, internal construction, application and type of motion output. In addition to AC versus DC types, motors may be brushed or brushless, may be of various phase (see single-phase, two-phase, or three-phase), and may be either air-cooled or liquid-cooled. General-purpose motors with standard dimensions and characteristics provide convenient mechanical power for industrial use. The largest electric motors are used for ship propulsion, pipeline compression and pumped-storage applications with ratings reaching 100 megawatts. Electric motors are found in industrial fans, blowers and pumps, machine tools, household appliances, power tools and", "in the world supply power at 210–240 V or at 100–120 V. A transformer or auto transformer can be used; (auto)transformers are inherently reversible, so the same transformer can be used to step the voltage up, or step it down by the same ratio. Lighter and smaller devices can be made using electronic circuitry; reducing the voltage electronically is simpler and cheaper than increasing it. Small, inexpensive, travel adapters suitable for low-power devices such as electric shavers, but not, say, hairdryers, are available; travel adapters usually include plug-end adapters for the different standards used in different countries. A transformer would be used", "head positioners, electromagnets, and other devices. In electric motors Electric motors convert electrical energy into mechanical motion, usually through the interaction of magnetic fields and current-carrying conductors. Electric motors are found in numerous diverse applications, such as fans, blowers, pumps, machines, household appliances, power tools, and disk drives. The very largest electric motors with ratings in the thousands of kilowatts are used in such applications as the propulsion of large ships. The smallest motors move the hands in electric wristwatches.\nElectric motors contain coils to produce the required magnetic fields. For a given size of motor frame, high conductivity", "generator primarily. One of the primary requirements of these machines is that they are very efficient, as the electrical portion of the energy must be converted from the engine to the generator, through two inverters, through the motor again and then to the wheels.\nMost of the electric machines used in hybrid vehicles are brushless DC motors (BLDC). Specifically, they are of a type called an interior permanent magnet (IPM) machine (or motor). These machines are wound similarly to the induction motors found in a typical home, but (for high efficiency) use very strong rare-earth magnets in the rotor. These magnets", "tapped through a mechanical connection. Modern vehicles run most accessories on electrical power. Typically, only 2% of a vehicle's total power output has gone towards powering accessories. Electrical and hybrid vehicles may use a larger proportion of energy for accessories, due to reduced inefficiencies in the drive train, especially the elimination of engine idling. Mechanical Some automobile accessories are connected directly to the engine through gears or belts. These usually require large amounts of power. The air conditioning compressor has been a familiar example, though new all-electric refrigerant compressors are starting to be used in production vehicles. Electrical Early", "when a much lighter-duty system would be suitable for city driving. Electric motors offer all the advantages of engines, and more so, but their \"fuel\" (batteries) are only suitable for short and infrequent service.\nIf one was able to design cars for specific purposes, they can be tuned for much greater efficiency. The vast majority of car trips are short and low-speed; cars designed for this role can be far more efficient than the generalist vehicles generally used. However, the low ownership of specific-purpose vehicles, like motorcycles, is a good indication of the basic problem: people don't want to have to", "and motor current. In order to judge the range available with varying solar production and motive consumption, an ampere-hour meter multiplies battery current and rate, thus providing the remaining vehicle range at each moment in the given conditions.\nA wide variety of motor types have been used. The most efficient motors exceed 98% efficiency. These are brushless three-\"phase\" DC, electronically commutated, wheel motors, with a Halbach array configuration for the neodymium-iron-boron magnets, and Litz wire for the windings. Cheaper alternatives are asynchronous AC or brushed DC motors. Mechanical systems The mechanical systems are designed to keep friction and weight to a", "electric cars, DC motors are often used. In some cases, universal motors are used, and then AC or DC may be employed. In recent production vehicles, various motor types have been implemented, for instance: Induction motors within Tesla Motor vehicles and permanent magnet machines in the Nissan Leaf and Chevrolet Bolt. Vehicle types It is generally possible to equip any kind of vehicle with an electric powertrain. Plug-in electric vehicle A plug-in electric vehicle (PEV) is any motor vehicle that can be recharged from any external source of electricity, such as wall sockets, and the electricity stored in the Rechargeable", "They typically require a high-voltage power supply, although very small motors employ lower voltages. Conventional electric motors instead employ magnetic attraction and repulsion, and require high current at low voltages. In the 1750s, the first electrostatic motors were developed by Benjamin Franklin and Andrew Gordon. Today, the electrostatic motor finds frequent use in micro-electro-mechanical systems (MEMS) where their drive voltages are below 100 volts, and where moving, charged plates are far easier to fabricate than coils and iron cores. Also, the molecular machinery that runs living cells is often based on linear and rotary electrostatic motors.\nA piezoelectric motor or piezo", "design elements of premium motors is the reduction of heat losses due to the electrical resistance of conductors. To improve the electrical energy efficiency of induction-type motors, load loss can be reduced by increasing the cross section of copper coils. A high efficiency motor will usually have 20% more copper in the stator winding than its standard counterpart.\nEarly developments in motor efficiency focused on reducing electrical losses by increasing the packing weight of stator windings. This made sense since electrical losses typically account for more than half of all energy losses, and stator losses account for approximately two‐thirds of electrical", "most visibly employed in the electric motor, which provides a clean and efficient means of motive power. A stationary motor such as a winch is easily provided with a supply of power, but a motor that moves with its application, such as an electric vehicle, is obliged to either carry along a power source such as a battery, or to collect current from a sliding contact such as a pantograph. Electrically powered vehicles are used in public transportation, such as electric buses and trains, and an increasing number of battery-powered electric cars in private ownership.\nElectronic devices make use of the", "appliances with the same total power draw can be distinguished by differences in their complex impedance. As shown in figure 8 from the patent, for example, a refrigerator electric motor and a pure resistive heater can be distinguished in part because the electric motor has significant changes in reactive power when it turns on and off, whereas the heater has almost none.\nNILM systems can also identify appliances with a series of individual changes in power draw. These appliances are modeled as finite state machines. A dishwasher, for example, has heaters and motors that turn off and off during a", "and related inventions led to an explosion of interest and use in electric motors for industry. The development of electric motors of acceptable efficiency was delayed for several decades by failure to recognize the extreme importance of an air gap between the rotor and stator. Efficient designs have a comparatively small air gap. The St. Louis motor, long used in classrooms to illustrate motor principles, is extremely inefficient for the same reason, as well as appearing nothing like a modern motor.\nElectric motors revolutionized industry. Industrial processes were no longer limited by power transmission using line shafts, belts, compressed air or", "(134 hp) (previously 110 hp). The larger engine displacement allows for increased torque, reducing engine speeds (rpm), which increases fuel economy at highway speeds. With an electric water pump, the Prius engine is the first production engine that requires no accessory belts, which also further improves fuel economy. The electric motors and other components of the hybrid powertrain are also smaller and more efficient. Toyota estimates the new inverter, motor and transaxle are 20 percent lighter. It has a 1.3 kWh nickel-metal hydride (NiMH) battery. ZVW35: plug-in version The Prius Plug-In Concept was shown at the October 2009 Tokyo Motor Show, the", "reduce the electric energy consumption from motors and their associated carbon footprints, various regulatory authorities in many countries have introduced and implemented legislation to encourage the manufacture and use of higher efficiency electric motors. A well-designed motor can convert over 90% of its input energy into useful power for decades. When the efficiency of a motor is raised by even a few percentage points, the savings, in kilowatt hours (and therefore in cost), are enormous. The electrical energy efficiency of a typical industrial induction motor can be improved by: 1) reducing the electrical losses in the stator windings (e.g., by", "is even more effective if it is actuated through two electric motor drives located on the same axle, as this configuration can be used for shaping the vehicle understeer characteristic and improving the transient response of the vehicle. A special transmission unit is used in the experimental car MUTE of the Technical University of Munich, where the bigger motor is providing the driving power and the smaller for the torque vectoring functionality. The detailed control system of the torque vectoring is described in the doctoral thesis of Dr.-Ing. Michael Graf. In case of electric vehicles with four electric motor drives,", "did not go into production. Flexibility Modular vehicles make it possible to use different types of bodies, e.g. sedan, sports car or pickup truck, on one standardized chassis.\nAlso, the modular chassis, with its batteries and motor, are relatively easy to work on, since there is no vehicle body to impede access.", "Motors Electric cars have traditionally used series wound DC motors, a form of brushed DC electric motor. Separately excited and permanent magnet are just two of the types of DC motors available. More recent electric vehicles have made use of a variety of AC motor types, as these are simpler to build and have no brushes that can wear out. These are usually induction motors or brushless AC electric motors which use permanent magnets. There are several variations of the permanent magnet motor which offer simpler drive schemes and/or lower cost including the brushless DC electric motor.\nOnce electric power is", "become popular recently, mainly due to the popularity of park flyers and the development of technologies like brushless motors and lithium polymer batteries. These allow electric motors to produce much more power rivaling that of fuel-powered engines. It is also relatively simple to increase the torque of an electric motor at the expense of speed, while it is much less common to do so with a fuel engine, perhaps due to its roughness. This permits a more efficient larger-diameter propeller to be used which provides more thrust at lower airspeeds. (e.g. an electric glider climbing steeply to a good thermalling", "they are not equally efficient at all speeds. To allow for this, some cars with dual electric motors have one electric motor with a gear optimised for city speeds and the second electric motor with a gear optimised for highway speeds. The electronics select the motor that has the best efficiency for the current speed and acceleration. Regenerative braking, which is most common in electric vehicles, can recover as much as one fifth of the energy normally lost during braking. Efficiency increases when renewable electricity is used Cabin heating and cooling While heating can be provided with an electric resistance" ]
Why are sunglasses universally considered "cool"?
[ "people use their eyes to communicate their level of comfort/aggression/submission with one another. shades will remove this information and allow others to fill in the blanks. for example, you might be avoiding eye contact, but because of your sunglasses this does not register with people and you seem undeservingly \"cool\"" ]
[ "eyes, sunglasses have become popular for several further reasons, and are sometimes worn even indoors or at night.\nSunglasses can be worn to hide one's eyes. They can make eye contact impossible, which can be intimidating to those not wearing sunglasses; the avoided eye contact can also demonstrate the wearer's detachment, which is considered desirable (or \"cool\") in some circles. Eye contact can be avoided even more effectively by using mirrored sunglasses. Sunglasses can also be used to hide emotions; this can range from hiding blinking to hiding weeping and its resulting red eyes. In all cases, hiding one's eyes has", "women, and celebrities may use them, ostensibly to hide from paparazzi.\nOversized sunglasses, because of their larger frames and lenses, are useful for individuals who are trying to minimize the apparent size or arch of their nose. Oversized sunglasses also offer more protection from sunburn due to the larger areas of skin they cover, although sunblock should still be used. Shutter shades Shutter shades were invented in the late 1940s, became a fad in the early 1980s and have experienced a revival in the early-to-mid 2010s. Instead of tinted lenses, they decrease sun exposure by means of a set of parallel,", "used for humorous purposes. They usually come in bright colors with colored lenses and can be purchased cheaply.\nThe singer Elton John sometimes wore oversized sunglasses on stage in the mid-1970s as part of his Captain Fantastic act.\nSince the late 2000s, moderately oversized sunglasses have become a fashion trend. There are many variations, such as the \"Onassis\", discussed below, and Dior white sunglasses.\nOnassis glasses or \"Jackie O's\" are very large sunglasses worn by women. This style of sunglasses is said to mimic the kind most famously worn by Jacqueline Kennedy Onassis in the 1960s. The glasses continue to be popular with", "while questioning witnesses.\nJames Ayscough began experimenting with tinted lenses in spectacles in the mid-18th century, around 1752. These were not \"sunglasses\" as that term is now used; Ayscough believed that blue- or green-tinted glass could correct for specific vision impairments. Protection from the Sun's rays was not a concern for him. One of the earliest surviving depictions of a person wearing sunglasses is of the scientist Antoine Lavoisier in 1772. \n Yellow/amber and brown-tinted spectacles were also a commonly prescribed item for people with syphilis in the 19th and early 20th centuries because sensitivity to light was one of the", "popular again around 2000, as the hippie movement experienced a brief revival, and was prominently featured in the MTV show Jackass. Browline Based on the eyeglass design of the same name, browline glasses have hard plastic or horn-rimmed arms and upper portions joined to a wire lower frame. A traditional, conservative style based on mid-20th century design, browlines were adapted into sunglasses form in the 1980s and rapidly became one of the most popular styles; it has ebbed and sprung in popularity in the decades that have followed. Oversized Oversized sunglasses, which were fashionable in the 1980s, are now often", "Sunglasses Precursors In prehistoric and historic time, Inuit peoples wore flattened walrus ivory \"glasses\", looking through narrow slits to block harmful reflected rays of the Sun.\nIt is said that the Roman emperor Nero liked to watch gladiator fights using cut emeralds. These, however, appear to have worked rather like mirrors.\nSunglasses made from flat panes of smoky quartz, which offered no corrective powers but did protect the eyes from glare, were used in China in the 12th century or possibly earlier. Ancient documents describe the use of such crystal sunglasses by judges in ancient Chinese courts to conceal their facial expressions", "geometric aesthetics of the era's architecture, interiors and furnishings, it was designed less for aesthetics and more for functionality - with the longer stem reducing the warming effect of body heat upon the contents of the glass, and the widened brim increasing surface area, supposedly allowing the gin, the main ingredient in martinis, to release its bouquet. Steeply sloping sides prevent ingredients separating, and also serve to support a toothpick or olives on a cocktail skewer.\nThe Martini glass has somewhat fallen out of favour in modern times due to its tendency to spill drinks, and the coupe is sometimes used", "a favorite affectation of thousands of women all over the U.S.\" It stated that 20 million sunglasses were sold in the United States in 1937, but estimated that only about 25% of American wearers needed them to protect their eyes. Polarized sunglasses first became available in 1936, when Edwin H. Land began experimenting with making lenses with his patented Polaroid filter. In 1947, the Armorlite Company began producing lenses with CR-39 resin.\nAt present, Xiamen, China, is the world's largest producer of sunglasses, with its port exporting 120 million pairs each year. Protection Sunglasses offer protection against excessive exposure to light,", "because it secured the lenses directly to the nose and kept them in place. The style became popularized in the years prior to World War I by Theodore Roosevelt, whose popularity with the American people and public image as a frontiersman helped to eliminate some of the stigma associated with eyeglasses.\nDuring this same period, another style became available in which the lenses were mounted to two arms as well as a bridge; the style became known as three-piece glasses for the three separate structural components. The most popular three-piece style was known as a riding temple, and was modeled after", "a description in Albanov's journal: 'We had no effective sunglasses. Our mechanic had fabricated some with pieces of green glass scavenged from gin bottles, but they were essentially useless'", "glasses, (naturally) drawing comparison to those of Ricky (Wild Thing) Vaughn, a character in the movie Major League (as portrayed by Charlie Sheen). Hammer chose glasses over contacts because contacts burned his eyes, and said: \n\"I was like, 'OK, if I'm going to do glasses, I might as well do something different'. They kind of look like the Wild Thing, so I figured I might as well just go for it. I got teased last spring. I got called everything from Harry Potter to Professor, but it's kind of what I've been known for.\"\nOn July 26, 2017, the Rockies traded", "bespectacled Heinrich Himmler. 2000s – 2010s Three-piece glasses rose in popularity in the early 21st century with the implementation of lightweight titanium frames, which, coupled with polycarbonate lenses, made the glasses virtually weightless on the wearer's face. The favoring of rimless glasses by a variety of public figures also served to increase their popularity; in 2008, demand rose for rimless titanium glasses similar to those worn by Sarah Palin during public appearances during the 2008 United States Presidential Election. In 2011, the waning popularity of rimless glasses—which were being supplanted by horn-rimmed glasses—was invigorated following the death of Steve Jobs,", "have large lenses and side shields to avoid incidental light exposure. Sunglasses should always be worn, even when the sky is overcast, as UV rays can pass through clouds.\nThe Inuit, Yupik, and other Arctic peoples carved snow goggles from materials such as driftwood or caribou antlers to help prevent snow blindness. Curved to fit the user's face with a large groove cut in the back to allow for the nose, the goggles allowed in a small amount of light through a long thin slit cut along their length. The goggles were held to the head by a cord", "slender glass reveals the colour, and carbonation of the beer, and the broad top helps maintain a beer head.\nWeizen glasses are sometimes mistakenly called pilsner glasses because they are somewhat similar in appearance, but true pilsner glasses have an even taper without any amount of curvature. Connoisseur's glassware Beer connoisseurs sometimes invest in special, non-traditional glassware to enhance their appreciation. An example was the range marketed by Michael \"Beer Hunter\" Jackson. Snifters Typically used for serving brandy and cognac, a snifter is ideal for capturing the volatiles of aromatic beers such as Double/Imperial IPAs, Belgian ales, barley wines and wheat", "not allowed to wear sunglasses or hats. However, in extremely cold conditions one can wear a hat (without sun reflector) and other extra protective clothing. When one has not enough hair or eyebrows or in extreme hot conditions, one can wear a tenugui (手拭い) or hachimaki (鉢巻) to prevent sweat irritating the eyes or to keep hair out of the face. Note that tabi and jiki-tabi should preferably match the colour of the hakama.\nIt is prohibited to wear jewellery and the like as is custom in many martial arts. This rule is to prevent injuries to oneself and practicing partner", "distemper, sprinkle cool patience,\" and the antagonist Iago in Othello is musing about \"reason to cool our raging motions, our carnal stings, our unbitted lusts.\"\nThe cool \"Anatolian smile\" of Turkey is used to mask emotions. A similar \"mask\" of coolness is worn in both times of stress and pleasure in American and African communities.\nIn Diary of a Nobody, coolness is used as a criticism: 'Upon my word, Gowing’s coolness surpasses all belief.' European inter-war cool The key themes of modern European cool were forged by avant-garde artists who achieved prominence in the aftermath of the First World War, most notably", "reasons include tea shades and mirrorshades. Many blind people wear nearly opaque glasses to hide their eyes for cosmetic reasons.\nSunglasses may also have corrective lenses, which requires a prescription. Clip-on sunglasses or sunglass clips can be attached to another pair of glasses. Some wrap-around sunglasses are large enough to be worn over top of another pair of glasses. Otherwise, many people opt to wear contact lenses to correct their vision so that standard sunglasses can be used. Mixed doubleframe The doubleframe uplifting glasses have one moving frame with one pair of lenses and the basic fixed frame", "on style in glasses with a variety of spectacles available. Meta Rosenthal wrote in 1938 that the pince-nez was still being worn by dowagers, headwaiters, old men, and a few others. The monocle was worn by only a minority in the United States. Sunglasses, however, became very popular in the late '30s. Equipment Opticians use a variety of equipment to fit, adjust and dispense eyewear, contact lenses and low vision aids.\nThe dispensing of eyewear requires the use of a focimeter, or lensometer, to verify the correct prescription in a pair of eyeglasses, properly orient and mark uncut lenses, and to", "this idea and explain that the presence of a cocktail umbrella has no effect on this. In the past, cocktail umbrellas have served as a gimmick to draw women into bars that were mostly frequented by men. However, this purpose has faded in current times.\nCurrently, the cocktail umbrella has become an important part of the drinks it is found on. It has become a garnish that is essential to the identities of these drinks. Cocktail garnishes started being used in the 19th century, with non-edible garnishes being introduced after prohibition. Two examples of these non-edible garnishes are cocktail umbrellas and", "Spring by Soviet tanks in 1968, part of the dissident underground called itself the \"Jazz Section\". As a positive trait According to this theory, coolness is a subjective, dynamic, socially-constructed trait, such that coolness is in the eye of the beholder. People perceive things (e.g., other people, products or brands) to be cool based on an inference of “autonomy”. That is, something is perceived to be cool when it follows its own motivations. However, this theory proposes that the level of autonomy that leads to coolness is constrained - inappropriate levels of autonomy, such that the autonomy is too high", "Lensless glasses Lensless glasses are glasses that lack lenses. They are worn solely for aesthetic or fashion purposes, having no function in vision correction or eye protection. The frames are usually oversized, and commonly all black in color. They may be worn in conjunction with contact lenses. Advantages of lensless glasses are that they do not fog or reflect, and there is no lens that will touch long eyelashes and eyelash extensions.\nLensless glasses first became popular in Japan in the 1990s. The trend died out, but has resurged recently in China and Taiwan.\nMaison Martin Margiela released gold frames that are", "cool with that\". As aesthetic appeal Cool is also an attitude widely adopted by artists and intellectuals, who thereby aided its infiltration into popular culture. Sought by product marketing firms, idealized by teenagers, a shield against racial oppression or political persecution and source of constant cultural innovation, cool has become a global phenomenon that has spread to every corner of the earth. Concepts of cool have existed for centuries in several cultures. As fashion In terms of fashion, the concept of \"cool\" has transformed from the 1960s to the 1990s by becoming integrated in the dominant fabric of culture. America’s", "symptoms of the disease. Modern developments In 1913, Crookes lenses were introduced, made from glass containing cerium, which block ultraviolet light. In the early 1920s, the use of sunglasses started to become more widespread, especially among movie stars. Inexpensive mass-produced sunglasses made from celluloid were first produced by Sam Foster in 1929. Foster found a ready market on the beaches of Atlantic City, New Jersey, where he began selling sunglasses under the name Foster Grant from a Woolworth on the Boardwalk. By 1938, Life magazine wrote of how sunglasses were a \"new fad for wear on city streets ...", "the frames and attempted to order a new pair from the manufacturer, his check was returned along with an order of twenty frames and a note from the company thanking him for his endorsement. Explaining his reasons for the glasses, as well as their sartorial advantages, Lloyd said: \"They make low-comedy clothes unnecessary, permit enough romantic appeal to catch the feminine eye, usually diverted from comedies, and they hold me down to no particular type or range of story.\"\nHorn-rimmed glasses were popular in the 1920s but steadily lost their appeal as sturdier metal styles became more economic alternatives during the", "However, it was in the late 1960s when the frames became widely used with the rise of the hippie counterculture, which preferred large metallic sunglasses. The brand became an icon of the 1970s, worn by Paul McCartney and Freddie Mercury among others, and was also used as prescription eyeglasses. Aviators' association with disco culture led to a decline in their popularity by 1980. The model saw more limited use throughout the 1980s and 1990s, aided by a 1982 product placement deal, featured most notably in Top Gun and Cobra, with both films causing a 40% rise in 1986. Aviators became", "Browline glasses Browline glasses are a style of eyeglass frames which were very popular during the 1950s and 1960s, especially in the United States of America. The name derives from the fact that the \"bold\" upper part of the frames frame the lenses in the same way that eyebrows frame the eyes. The glasses were first manufactured by Shuron Ltd in 1947 under the \"Ronsir\" brand, and quickly emulated by various other manufacturers. The design became the most common style of eyeglasses throughout the 1950s and the early 1960s before it was surpassed in popularity by solid plastic styles. Browlines", "in the 1880s as a means to alleviate the combined weight of metal frames with heavy glass lenses. The style also came about from a desire to make eyewear as inconspicuous as possible; at the time, eyeglasses were not considered an acceptable fashion statement and carried connotations of one being elderly or a member of the clergy; historically, most eyeglass wearers needed them to correct presbyopia, and only clergymen tended to be literate enough to require reading glasses. 1800s – 1920s Rimless glasses were first widely offered as pince-nez, with manufacturers arguing that the design was superior to extant eyeglasses", "African cultures, something which, Thompson argues, is absent from the idea in a Western context.\nThe telling point is that the \"mask\" of coolness is worn not only in time of stress, but also of pleasure, in fields of expressive performance and the dance. Struck by the re-occurrence of this vital notion elsewhere in tropical Africa and in the Pan-American African Diaspora, I have come to term the attitude \"an aesthetic of the cool\" in the sense of a deeply and completely motivated, consciously artistic, interweaving of elements serious and pleasurable, of responsibility and play. African Americans Ronald Perry writes that", "in the 1920s–1930s and in the 1950s–1960s in particular, while ceding to rimless and wire framed glasses during the 1970s and 1990s–2000s. The style has brought a resurgence of popularity in the late 20th (1980s–1990s) and early 21st (2010s) centuries, with an emphasis on retro fashions. This may be due in part from the influence of hipster subculture, and the television series Mad Men, which repopularized 1960s fashions in general. History Horn rim glasses were initially popularized by comedian Harold Lloyd after he wore them in his 1917 comedy short Over the Fence. Lloyd had risen to fame playing an", "a result does not produce the ghosting effect for those not wearing glasses or the color distortion of technologies such as anaglyph. The Pulfrich effect can also be achieved by wearing a sunglass lens over one eye, and since sunglasses are very common, the need to distribute \"special\" 3D glasses is reduced.\nThe effect achieved a small degree of popularity in television in the late 1980s and 1990s. On Sunday, January 22, 1989 the Super Bowl XXIII halftime show and a specially produced commercial for Diet Coke were telecast using this effect. In the commercial, objects moving in one direction appeared" ]
How To Turn an Extra Wireless Router into a Wireless Extender
[ "You may be better off in one of the tech subreddits (like /r/techsupport or /r/networking).\n\nHowever, I have done this before with a Linksys router. Find out if one of the popular 3rd party firmwares (like [DD-WRT](_URL_0_) or [Tomato](_URL_1_)) will work on your router. Then find a guide online to help you set it up as a repeater.\n\nMake sure you read all instructions carefully, because you can brick your router if you are not careful when updating the firmware." ]
[ "Wireless operation Recently, wireless DMX512 adapters have become popular, especially in architectural lighting installations where cable lengths can be prohibitively long. Such networks typically employ a wireless transmitter at the controller, with strategically placed receivers near the fixtures to convert the wireless signal back to conventional DMX512 wired network signals.\nAlthough wireless DMX512 networks can function over distances exceeding 3,000 feet (910 m) under ideal conditions, most wireless DMX512 links are limited to a maximum distance of 1,000–1,500 feet (300–460 m) to ensure reliable operation. The first commercially marketed wireless DMX512 system was based on frequency-hopping spread spectrum (FHSS) technology using commercial wireless", "modem. A wireless router allows all three devices, mainly the access point and router, to be configured through one central utility. This utility is usually an integrated web server that is accessible to wired and wireless LAN clients and often optionally to WAN clients. This utility may also be an application that is run on a computer, as is the case with as Apple's AirPort, which is managed with the AirPort Utility on macOS and iOS. Bridge Wireless network bridges can act to connect two networks to form a single network at the data-link layer over Wi-Fi. The main", "them a 'range extender' option.\nA better option for extending wireless coverage is to configure a secondary box as a wireless access point, with a wired connection between a LAN port on this secondary box and a LAN port on the primary box (a router). If Ethernet wiring is not an option, an alternative is powerline networking. Wireless extender kits consisting of a powerline adapter module (connected to the wireless router) and a wireless extender module (integrated powerline networking and wireless access point) are available.", "adapter Wireless adapters allow devices to connect to a wireless network. These adapters connect to devices using various external or internal interconnects such as PCI, miniPCI, USB, ExpressCard, Cardbus and PC Card. As of 2010, most newer laptop computers come equipped with built in internal adapters. Router Wireless routers integrate a Wireless Access Point, Ethernet switch, and internal router firmware application that provides IP routing, NAT, and DNS forwarding through an integrated WAN-interface. A wireless router allows wired and wireless Ethernet LAN devices to connect to a (usually) single WAN device such as a cable modem, DSL modem or optical", "computers to directly communicate with each other without a router. Wireless mobile ad hoc networks are self-configuring, dynamic networks in which nodes are free to move. \nWireless networks lack the complexities of infrastructure setup and administration, enabling devices to create and join networks \"on the fly\" – anywhere, anytime.\nEach device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the", "wireless network. Strategically placed range-extenders can elongate a signal area or allow for the signal area to reach around barriers such as those pertaining in L-shaped corridors. Wireless devices connected through repeaters suffer from an increased latency for each hop, and there may be a reduction in the maximum available data throughput. In addition, the effect of additional users using a network employing wireless range-extenders is to consume the available bandwidth faster than would be the case whereby a single user migrates around a network employing extenders. For this reason, wireless range-extenders work best in networks supporting low traffic throughput", "standard for wireless home networking. 802.11ac equipment is backward compatible with 802.11n, 802.11g or 802.11b equipment.\nAn older range extender will not be able to repeat the signal of a newer generation router. Security encryption compatibility also matters and must be at the same level of compatibility for the signal to be extended. For example, an older range extender which supports WEP and WPA will not be able to boost a WPA2-encrypted signal from a router. Alternatives Most wireless repeaters (or range extenders) are purpose built, but certain wireless routers can be flashed with custom firmware such as DD-WRT to give", "follow similar principles. The use of the term backhaul to describe this type of connectivity may be controversial technically. They invert the business definition, as it is the customer who is providing the connectivity to the open Internet while the vendor is providing authentication and management services. Transition from wireless to wired backhaul Wireless backhaul is easy to deploy, and allows moving points of presence, however, these wireless connections are slower, occupy spectrum that could be used by user devices (especially as 5.8 GHz devices proliferate), require more truck rolls (typically three times as many) as wired backhaul, and", "wired connection to operate at a wireless networking standard that is faster than supported by the wireless network connectivity feature (external dongle or inbuilt) supported by the device (e.g., enabling Wireless-N speeds (up to the maximum supported speed on the wired Ethernet port on both the bridge and connected devices including the wireless access point) for a device that only supports Wireless-G).\nA dual-band wireless bridge can also be used to enable 5 GHz wireless network operation on a device that only supports 2.4 GHz wireless and has a wired Ethernet port.\nWireless range-extenders or wireless repeaters can extend the range of an existing", "Wireless onion router A wireless onion router is a router that uses Tor to connect securely to a network. The onion router allows the user to connect to the internet anonymously creating an anonymous connection. Tor works using an overlaid network which is free throughout the world, this overlay network is created by using numerous relay points created using volunteer which helps the user hide personal information behind layers of encrypted data like layers of an onion. Routers are being created using Raspberry Pi adding a wireless module or using its own inbuilt wireless module in the later versions.\nThis router", "requirements, such as for cases whereby a single user with a Wi-Fi equipped tablet migrates around the combined extended and non-extended portions of the total connected network. Also, a wireless device connected to any of the repeaters in the chain has data throughput limited by the \"weakest link\" in the chain between the connection origin and connection end. Networks using wireless extenders are more prone to degradation from interference from neighboring access points that border portions of the extended network and that happen to occupy the same channel as the extended network. Embedded systems The security standard, Wi-Fi Protected Setup,", "are limited in bandwidth. They are often viewed as an initial or temporary measure. Hardware issues Aside from changes to the network (wires and switching and management) a well designed future-proof wireless network may not require much change at the endpoints. All equipment used in a wireless backhaul configuration supports simultaneous dual band communication (one band for user communication, another for the backhaul). Almost all such equipment also supports wired connections, typically using power over Ethernet or (less often in outdoor applications) unpowered Ethernet. So assuming reasonable software flexibility, both bands can be repurposed to user connectivity while", "Wireless router Operating system The most common operating system on such embedded devices is Linux. More seldomly, VxWorks is used. The devices are configured over a web user interface served by a light web server software running on the device. It is possible for a computer running a desktop operating system with appropriate software to act as a wireless router. This is commonly referred to as a SoftAP.\nIn 2003, Linksys was forced to open-source the firmware of its WRT54G router series (the best-selling routers of all time) after people on the Linux kernel mailing list discovered that it used GPL", "to a DSL modem or cable modem to connect to the internet via the ISP. The more complex kind has a built-in modem to connect to the internet without needing another device. This converged device saves desk space and simplifies wiring by replacing two electronic packages with one. It has a wired connection to the internet service provider ISP, at least one jack port for the LAN (usually four jacks) and an antenna for wireless users. The wireless gateway could support wireless 802.11b and 802.11g with speed up to 56Mbit/s, 802.11n with speed up to 300Mps and recently the 802.11ac", "a quick (but now insecure) method of joining a new device to an encrypted network. Infrastructure Most Wi-Fi networks are deployed in infrastructure mode.\nIn infrastructure mode, a base station acts as a wireless access point hub, and nodes communicate through the hub. The hub usually, but not always, has a wired or fiber network connection, and may have permanent wireless connections to other nodes.\nWireless access points are usually fixed, and provide service to their client nodes within range.\nWireless clients, such as laptops, smartphones etc. connect to the access point to join the network.\nSometimes a network will have a multiple access", "to promote a technology aimed for residential use, but it disbanded at the end of 2002. Stations All components that can connect into a wireless medium in a network are referred to as stations (STA).\nAll stations are equipped with wireless network interface controllers (WNICs).\nWireless stations fall into two categories: wireless access points, and clients.\nAccess points (APs), normally wireless routers, are base stations for the wireless network. They transmit and receive radio frequencies for wireless enabled devices to communicate with.\nWireless clients can be mobile devices such as laptops, personal digital assistants, IP phones and other smartphones, or non-portable devices such as", "distribution method, usually providing a connection through an access point for internet access. The use of spread-spectrum or OFDM technologies may allow users to move around within a local coverage area, and still remain connected to the network.\nProducts using the IEEE 802.11 WLAN standards are marketed under the Wi-Fi brand name .\nFixed wireless technology implements point-to-point links between computers or networks at two distant locations, often using dedicated microwave or modulated laser light beams over line of sight paths. It is often used in cities to connect networks in two or more buildings without installing a wired link.\nTo connect to", "(which must be unique to all other networks within range) and plugged into the same logical Ethernet segment (one or more hubs or switches directly connected without IP routers). Wireless clients then automatically select the strongest access point from all those with the specified SSID, handing off from one to another as their relative signal strengths change. On many hardware and software implementations, this hand off can result in a short disruption in data transmission while the client and the new base station establish a connection. This potential disruption should be factored in when designing a network for low-latency services", "Wireless Router Application Platform The Wireless Router Application Platform (WRAP) is a format of single board computer defined by Swiss company PC Engines. This is specially designed for wireless router, firewall, load balancer, VPN or other network appliances. Operating System The WRAP is capable of running many different operating systems, including various Linux distributions, FreeBSD, NetBSD, OpenBSD, as well as proprietary OSes. The WRAP lacks a keyboard controller (for obvious reasons), so some OSes that rely on one for the boot process may have to be modified. End Of Life (EOL) PC Engines announced the end of life for the", "can also carry up to 14 bytes of arbitrary user data for custom applications. Network topology Insteon is an integrated dual-mesh (formerly referred to as \"dual-band\") network that combines wireless radio frequency (RF) and a building's existing electrical wiring. The electrical wiring becomes a backup transmission medium in the event of RF/wireless interference. Conversely, RF/wireless becomes a backup transmission medium in the event of powerline interference. As a peer-to-peer network, devices do not require network supervision, thus allowing optional operation without central controllers and routing tables.\nInsteon devices can function without a central controller. Additionally, they may be managed by", "snooping.\nAdditionally, some switches with layer 3 capabilities can act as an IGMP querier. In networks where there is no router present to act as a multicast router, a switch with IGMP snooping querier enabled can be used to generate the needed IGMP messages to get users to subscribe to multicast traffic. Wireless (802.11) considerations Like Ethernet, 802.11 uses the same range of MAC addresses to map IP multicast addresses. However, an 802.11 wireless network will handle multicast traffic differently, depending on the configuration of delivery traffic indication message (DTIM), and beacon interval settings. If no stations within the basic service", "reliably. A wireless system can be moved to a new home easily, an advantage for those who rent or who move frequently. The more important wireless connection for security is the one between the control panel and the monitoring station. Wireless monitoring of the alarm system protects against a burglar cutting a cable or from failures of an internet provider. This full wireless setup is commonly referred to as 100% wireless.\nHybrid systems use both wired and wireless sensors to achieve the benefits of both. Transmitters can also be connected through the premises' electrical circuits to transmit coded signals to the", "Wireless gateway A wireless gateway routes packets from a wireless LAN to another network, wired or wireless WAN. It may be implemented as software or hardware or combination of both. Wireless gateways combine the functions of a wireless access point, a router, and often provide firewall functions as well. They provide network address translation (NAT) functionality, so multiple user can use the internet with a single public IP. It also acts like a dynamic host configuration protocol (DHCP) to assign IPs automatically to devices connected to the network.\nThere are two kinds of wireless gateways. The simpler kind must be connected", "Hot Standby Router Protocol In computer networking, the Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing a fault-tolerant default gateway. Version 1 of the protocol was described in RFC 2281 in 1998. There is no RFC for version 2 of the protocol.\nThe protocol establishes an association between gateways in order to achieve default gateway failover if the primary gateway becomes inaccessible. HSRP gateways send multicast hello messages to other gateways to notify them of their priorities (which gateway is preferred) and current status (active or standby).", "common access points, no modification is required to the STAs (or minor modifications to improve synchronization performance) and a very small overhead is added to the wireless channel (typically a message every 1 second). Moreover, it allows an easily synchronization with an external time source, because it is a master/slave protocol. Its major drawback is that it does not compensate the propagation delay. This fact limits the achievable synchronization quality to a couple of microsecond, which is typically enough for the very majority of the applications, especially for home automation. An example is the connection of wireless speakers to a", "which enables the user to connect to their encrypted network by the use of a \"one touch\" button, and also includes \"smart wireless technology\", which automatically chooses the wireless channel to give the strongest possible wireless signal. WPS has since been (temporarily) disabled by firmware updates due to security issues with the standard.\nThe BT Home Hub supports port forwarding.\nThe BT Home Hub versions 3, 4 and 5 may be used for access to files stored on an attached USB stick - USB 2.0 is supported. The server by default has the address File://192.168.1.254 and is available to the entire network.", "and forwarding) is negotiated between the nodes (redistribution points) of the mesh infrastructure. The mesh's BSS is distinct from the networks (which may also be wireless) used by a mesh's redistribution points to communicate with one another.\nIn contrast to the stations in an infrastructure-mode network, the stations in a wireless ad hoc network communicate directly with one another, i.e. without a dependence on a distribution point to relay traffic between them. In this form of peer-to-peer wireless networking, the peers form an independent basic service set (IBSS). Some of the responsibilities of a distribution point — such as defining network", "wireless router which can use the onion router network can be used to keep the user safe from hackers or network sniffers. The data captured by them won't make any sense as it will only look like messed up text. These are small and handy which will give the user a freedom to carry this tool and connect to the network from anywhere. This setup does not require installation of Tor browser on the work station. Whistle blowers and NGO workers use this network to pass information or to talk to the their family without disclosing any information. The applications", "The exact stream of messages may change when configuring different kinds of devices (AP or STA), or when using different physical media (wired or wireless). Band or radio selection Some devices with dual-band wireless network connectivity do not allow the user to select the 2.4 GHz or 5 GHz band (or even a particular radio or SSID) when using Wi-Fi Protected Setup, unless the wireless access point has separate WPS button for each band or radio; however, a number of later wireless routers with multiple frequency bands and/or radios allow the establishment of a WPS session for a specific band and/or radio", "communicate through a wireless access point. But only one device can transmit at a time in order to avoid packet collisions. Prior to transmitting, Node A sends out a Ready to Send (RTS) signal. If it is not receiving any other traffic the access point will broadcast a Clear to Send (CTS) signal over the network. Node A will then begin transmitting while Node B knows to hold off transmitting its data for the time being. Even though it cannot directly communicate with Node A, i.e. Node A is hidden, it knows to" ]
What is the difference between quality sushi and regular sushi?
[ "Fresh vs. Frozen - was it alive this morning? \n\nThe Chef's reputation and experience - you're buying his car! \n\nThe ambience isn't free, if you're having sushi at a Chinese buffet, it's mostly fake crab and Thai illegal immigrants doing the work. \n\nThe exact kind of fish! You're not going to find supermarket fish at the Sushi-is-us hole in the wall. If you want the whole range of selection, you need the real Sushi Bar.", "Related issue is that the terms sushi grade or sashimi grade are a little misleading. They **do not** relate to the freshness of the fish. It just means the fish has been frozen below a specified temperatures for a certain duration to kill parasites." ]
[ "staple in Japanese restaurants worldwide.\nDespite common misconceptions, onigiri is not a form of sushi and should not be confused with the type of sushi called nigirizushi or simply nigiri. Onigiri is made with plain rice (sometimes lightly salted), while sushi is made of rice with vinegar, sugar and salt. Onigiri makes rice portable and easy to eat as well as preserving it, while sushi originated as a way of preserving fish. History In Murasaki Shikibu's 11th-century diary Murasaki Shikibu Nikki, she writes of people eating rice balls. At that time, onigiri were called tonjiki and often consumed at outdoor picnic", "like azuki, soybean or green pea and starches are often used too.\nThose made with wasanbon, Japanese premium fine-grained sugar made by traditional methods, are commonly regarded as the finest ones. The most common and well-known higashi is rakugan, but the definition of the word is somewhat vague and sometimes not suitable for a certain type of wagashi, so the word higashi would be better in some cases.\nHigashi are often served at Japanese tea ceremonies.", "and the dish became unique to Japanese culture. It was the first time that rice was not being used for fermentation. Rice was now mixed with vinegar, with fish, vegetables and dried food stuff added. This type of sushi is still very popular today. Each region utilizes local flavors to produce a variety of sushi that has been passed down for many generations.\nToday's style of nigirizushi (握り寿司), consisting of an oblong mound of rice with a slice of fish draped over it, became popular in Edo (contemporary Tokyo) in the 1820s or 1830s. One common story of nigirizushi's origins is", "be used as a delicacy that is served as sushi. However, not to be confused, there is a Japanese Suzuki, and a Chinese Suzuki, both out of different species, but in the same genus. The Japanese Suzuki is more appreciated as a rinsed sashimi as it is more favored than other fish used for sashimi because of the clean white flesh of the fish. The name Suzuki refers to type of Asian seabass that is used for sushi. However, the fish mainly depends on chopped trash fish, which deteriorates quickly and could result in the spread of diseases. The fish", "(called akajiso), or flavoured with katsuobushi, kombu or even sweetened with honey. Because these flavored varieties end up at 3% to 15% salt content, they usually contain a natural or artificial preservative to extend shelf life. Natural preservatives include vinegar, alcohol, and vitamin B1. Consumption Umeboshi are usually eaten in small quantities with rice, for added flavor. It is also a common ingredient in onigiri, rice balls wrapped with nori, and they may also be used in makizushi. Makizushi made with umeboshi may be made with either pitted umeboshi or umeboshi paste (which is cheaper), often in conjunction with slivered", "9th and 10th century \"鮨\" and \"鮓\" are read as \"sushi\". This \"sushi\" was similar to today's narezushi.\nFor almost the next 800 years, until the early 19th century, sushi slowly changed and the Japanese cuisine changed as well. The Japanese started eating three meals a day, rice was boiled instead of steamed, and of large importance, was the development of rice vinegar. While sushi continued to be produced by fermentation of fish with rice, the addition of rice vinegar greatly reduced the time of fermentation and the rice used began to be eaten along with the fish. In the Muromochi", "special local version of sushi, which is made in a square mold. What is unique about this sushi is that it is prepared in large amounts, generally enough to feed about 150 people. There are also many \"sushi-go-rounds\" where sushi makes its way around the restaurant for patrons to pick and choose from via a moving belt.\nIwakuni is famous for fresh lotus roots which many people enjoy. These are cooked in different ways such as sautéed or simmered.\nIwakuni Chagayu is a tea-flavored rice porridge originally created about 400 years ago by Hiroie Kikkawa as an inexpensive means of providing food", "Higashi (food) Overview The concept of higashi is comparable to the antonym of namagashi, and the definition can include rakugan, konpeitō, senbei, arare, and so on (though usually senbei and similar snack foods are not sweet and thus the word kashi/wagashi is not so fitting).\nA narrower definition of higashi may confine the recipe to one or more kinds of sugar, with a particular sort of flour, and some other additives, while there are some made solely of sugars.\nThe flour used in higashi is usually made of rice, which has many different varieties of its own. Flours made of other ingredients,", "size of the container they wish to buy, and then is free to fill it with their choice of food. It is common to combine several options in one container, and some outlets charge by weight rather than by item. In large cities, these restaurants may offer free delivery for purchases over a minimum amount.\nSushi has seen rapidly rising popularity recently in the Western world. A form of fast food created in Japan (where bentō is the Japanese variety of fast food), sushi is normally cold sticky rice flavored with a sweet rice vinegar and served with some topping (often", "worship. In China, red peach symbolizes longevity and luck, it reflects people's aspiration when they pray. Ingredients Main ingredients include rice flour, glutinous rice, mushroom, tiniest shrimps, peanut, garlic, pork, etc. Additional ingredients can include MSG, pepper, oil, salt, etc. Nutritional value Glutinous rice is the main filling of Tao Kuish, which fully contains proteins, fat, saccharides, starch, Ca, F, Fe, vitamin B1, vitamin B2. Traditional Chinese medical science think it can invigorate spleen-stomach and replenish Qi, and it do help to your spleen and stomach. What is more, glutinous rice can remission frequency of urination. Kuish mould Tao kuish", "Sushi Seki Menu Among its offerings are butter fish, tuna tofu, young yellowtail with jalapeño, and pickled toro. It offers omakase. In addition to sushi, with modern sushi being its specialty, the restaurant offers a wide array of sake. The food is served by a knowledgeable staff. Reviews In 2013, Zagat's gave it a food rating of 28, which was third-best on the Upper East Side and 10th-best in New York City.", "or more grades. Generally, grades are determined by leaf size and quality, with higher numbered grades meaning older/larger, broken, or less tender leaves. Grading is rarely consistent between factories, and first grade tea leaves may not necessarily produce first grade cakes. Different grades have different flavors; many bricks blend several grades chosen to balance flavors and strength. Season Harvest season also plays an important role in the flavor of pu'er. Spring tea is the most highly valued, followed by fall tea, and finally summer tea. Only rarely is pu'er produced in winter months, and often this is what is called", "gluten structures and enhance the sheeting properties of dough, and it can make the noodles softer and more elastic. Salt also offers the basic salty flavor of noodles and can cover some of the off-flavor generated by flour and processing. Another function of salt is to slow down the activities of enzymes, such as proteolytic enzymes, which could interrupt the gluten structures and microbial growth. Alkaline salt, such as sodium and potassium carbonates, could be added to noodle dough to enhance the yellow color of the product if needed because flavonoid pigments in flour turns yellow at alkaline pH levels,", "Sushi Saito Description Sushi Saito, owned by chef Takashi Saito, is located at First Floor Ark Hills south Tower, 1-4-5 Roppongi, Minato-ku, Tokyo. It moved to its current location in February 2014. The restaurant seats eight people. Because of the limited seating and popularity of the restaurant, reservations have been described as essential. Reception Kelly Wetherille for CNN Travel, described Sushi Saito as a \"hidden gem\". She said that \"tender, flavorful seafood and perfectly seasoned rice are worth every penny\". Fodor's travel guide described the food there as being \"the freshest sushi available in the world\". Chef Joël Robuchon,", "rice — and other whole grains for sushi, is also a Bun Lai innovation, which today is emulated throughout the world of sushi.\nChef Bun Lai created the first menu dedicated to the idea of using invasive species at Miya's in 2005, during which time half the menus invasive species offerings were conceptual because invasive species were not yet commercially available. The menu featured locally caught invasive species such as Asian shore crabs and European green crabs. The invasive species menu was created in order to take pressure off of popular over-fished species by utilizing ones, instead, that are abundant but", "especially saturated fats, are thicker and rich and are thus considered more enjoyable to eat. Sweet Generally regarded as the most pleasant taste, sweetness is almost always caused by a type of simple sugar such as glucose or fructose, or disaccharides such as sucrose, a molecule combining glucose and fructose. Complex carbohydrates are long chains and thus do not have the sweet taste. Artificial sweeteners such as sucralose are used to mimic the sugar molecule, creating the sensation of sweet, without the calories. Other types of sugar include raw sugar, which is known for its amber color, as it is", "History of sushi The history of sushi began with Paddy Fields in Asia, where fish was fermented with rice vinegar, salt and rice, after which the rice was discarded. The dish is today known as narezushi, and was introduced to Japan around the Yayoi period. In the Muromachi period, people began to eat the rice as well as the fish. During the Edo period, vinegar rather than fermented rice began to be used. In pre-modern times and modern times, it has become a form of food strongly associated with Japanese culture. Early history The earliest form of sushi, a dish", "Asian soups, snacks, desserts, and sweet-and-sour foods, either fresh or dried, and sometimes preserved and canned in syrup. The taste is different from lychees; while longan have a drier sweetness similar to dates, lychees are often messily juicy with a more tropical, grape-like sour sweetness.\nDried longan are often used in Chinese cuisine and Chinese sweet dessert soups. In Chinese food therapy and herbal medicine, it is believed to have an effect on relaxation. In contrast with the fresh fruit, which is juicy and white, the flesh of dried longans is dark brown to almost black. Cultivation, harvest and distribution It", "and hot, whereas those with yin qualities are considered expansive, light, cold, and diffuse. However, these terms are relative; \"yangness\" or \"yinness\" is only discussed in relation to other foods.\nBrown rice and other whole grains such as barley, millet, oats, quinoa, spelt, rye, and teff are considered by macrobiotics to be the foods in which yin and yang are closest to being in balance. Therefore, lists of macrobiotic foods that determine a food as yin or yang generally compare them to whole grains.\nNightshade vegetables, including tomatoes, peppers, potatoes, and eggplant; also spinach, beets and avocados are not recommended or are", "Sushi Yasuda Menu Sushi Yasuda usually has five or more variants of tuna available. Food is served omakase style. Decor The stark, minimalist restaurant is lined in simple blond-wood, with high ceilings. Sushi Yasuda uses bamboo on its floor, walls, and ceiling. Reviews In 2000, restaurant critic William Grimes of The New York Times gave Sushi Yasuda three stars, and in 2001 he called it \"sublime.\" In 2011, Eric Asimov of The New York Times gave it three stars, and Bloomberg gave it two and a half stars.\nIn 2013, Zagat's gave it a food rating of 28, the", "be found in 1 or 2 cho. This means that there were nearly 2 sushi restaurants for every soba restaurant.\nThese early nigirizushi were not identical to today's varieties. Fish meat was marinated in soy sauce or vinegar or heavily salted so there was no need to dip into soy sauce. Some fish was cooked before it was put onto a sushi. This was partly out of necessity as there were no refrigerators. Each piece was also larger, almost the size of two pieces of today's sushi.\nThe advent of modern refrigeration allowed sushi made of raw fish to reach more consumers", "Heartiness Kokumi (k/uˈkuːmi/, Japanese: 濃く味) is translated as \"heartiness\" or \"full flavor\" and describes compounds in food that do not have their own taste, but enhance the characteristics when combined.\nThere are four basic tastes: sweet, sour, salt, and bitter. Two additional tastes for some people are umami (which enhances the original four and has been described as fatty or \"deliciousness\" associated with Asian foods), and kokumi which may enhance the other five tastes by magnifying and lengthening the other tastes. This sensation has also been described as \"mouthfulness\". Garlic is a common ingredient to add flavor used to help define", "breads in Chinese, also including pastries and sweets. These are baked wheat flour based confections, with different stuffings including red bean paste, jujube and various of others. Su (酥) is another kind of pastry made with more amount of oil, making the confection more friable. Chinese candies and sweets, called táng (糖) are usually made with cane sugar, malt sugar, honey, nuts and fruit. Gao or Guo are rice based snacks that are typically steamed and may be made from glutinous or normal rice.\nAnother cold dessert is called baobing, which is shaved ice with sweet syrup. Chinese jellies are", "into five main categories depending on differences in their ingredients and method of production. Most, but not all Japanese soy sauces include wheat as a primary ingredient, which tends to give them a slightly sweeter taste than their Chinese counterparts. They also tend towards an alcoholic sherry-like flavor, sometimes enhanced by the addition of small amounts of alcohol as a natural preservative. The widely varying flavors of these soy sauces are not always interchangeable, some recipes only call for one type or the other, much as a white wine cannot replace a red's flavor or beef stock does not make", "China, rice flour is called zhānmǐfěn (粘米粉) and glutinous rice flour is called nuòmǐfěn (糯米粉).\nIn Japan, rice flour is called komeko (米粉) and is available two forms: glutinous and non-glutinous. The glutinous rice is also called sweet rice, but despite these names it is neither sweet nor does it contain gluten; the word \"glutinous\" is used to describe the stickiness of the rice when it is cooked. The glutinous variety called mochigomeko (もち米粉, or mochiko for short) is produced from ground cooked glutinous rice (もち米 mochigome) and is used to create mochi or as a thickener for sauces. Another variety", "A story from Konjaku Monogatarishū written in early 12th century makes it clear that it was not an attractive smell, even if it tasted good: In the early 18th century, oshizushi was perfected in Osaka and it came to Edo by the middle of 18th century. These sushi were sold to customers, but because they still required a little fermentation time, stores hung a notice and posters to customers on when to come for a sushi. Sushi was also sold near a park during a hanami period and a theater as a type of Bento. Inarizushi was sold along oshizushi.", "balance any overpowering taste with its creamy and sweet flavour.\nThe term kurang manis, which can be translated to \"less sweet\", is a common request for those who are health conscious or not fond of sugary drinks, as teh tarik is typically prepared on the sweet side to taste by most vendors.", "drink, or when a Mai Tai is topped with any number of tropical fruit pieces. Sushi may be garnished with baran, a type of plastic grass or leaf. Sometimes a garnish and a condiment will be used together to finish the presentation of a dish; for example, an entrée could be topped with a sauce, as the condiment, along with a sprig of parsley as a garnish.\nA garnish may be so readily identified with a specific dish that the dish may appear incomplete without the garnish. Examples include a banana split sundae with cherries on top or buffalo wings served", "cultures the dishes have been adapted to fit the palate of the local populace. In 1970s sushi travelled from Japan to Canada and the United States, it was modified to suit the American palate, and re-entered the Japanese market as \"American Sushi\". An example of this phenomenon is the California roll, which was created in North America in the 1970s, rose in popularity across the United States through the 1980s, and thus sparked Japanese food's – more precisely, sushi's – global popularity.\nIn 2014, Japanese Restaurant Organization has selected potential countries where Japanese food is becoming increasingly popular, and conducted research concerning the", "and vinegars. Glutinous rice (\"sticky rice\") is a variety of rice used in specialty dishes such as lotus leaf rice and glutinous rice balls. Wheat In wheat-farming areas in Northern China, people largely rely on flour-based food, such as noodles, bing (bread), jiaozi (a kind of Chinese dumplings), and mantou (a type of steamed buns). Noodles Chinese noodles come dry or fresh in a variety of sizes, shapes and textures and are often served in soups or fried as toppings. Some varieties, such as Shou Mian (寿面, literally noodles of longevity), is an avatar of long life and" ]
Why do American cities often have to take large public transport projects such as light rail and metro system to the voters but don't have to do the same for massive highway and road construction?
[ "Large road projects usually exist to keep the existing road network running, or to improve its relation to the rest of the city. Bridges need to be retrofitted, underpasses capped, tarmac replaced. They may be big projects, but they're really necessary to keep the system functioning like it is.\n\nA major public transportation network is an entirely new investment. If you don't do it, you don't it--there's no downside other than that you don't have the network. A comparable project would be the construction of an entirely new highway link (or in some cities, the removal of major highways), which is rare and nowadays often put to voters as well. Of note is that many major highway projects were initiated in a time when referendums for transportation were not as common.", "It all depends on funding. If it's a locally-funded project, the voters will probably have to approve one or more bond issues to pay for the construction. Highway construction is often largely paid for with federal funds and it's the FHWA that has to be sold on the idea, rather than the local residents." ]
[ "Rail. Overall though, public transportation has been an important issue for 21st Century American cities, and as a result there has been a large amount of focus on building or expanding various public transportation systems within urban areas.", "taken on mass transit increased by 4.0%. At least part of the drop in urban driving can be explained by the 4% increase in the use of public transportation.\nMost medium-sized cities have some sort of local public transportation, usually a network of fixed bus routes. Among larger cities many of the older cities also have metro rail systems (also known as heavy rail in the United States) and/or extensive light rail systems, while the newer cities found in the Sun Belt either have modest light rail systems or have no intracity rail at all. Water transportation Water transport is largely", "to the booming cities in the Southern and Western states. \nStarting in the late 20th Century and continuing into the 21st Century, many cities across the country began creating new public transportation systems. After many public transportation systems, such as streetcars, were scrapped in cities starting in the 1950s, the automobile dominated America's urban transportation network. However, many cities, especially in the 21st Century, have started creating new, rebuilding, or expanding public transportation systems to help combat problems like traffic congestion and air pollution from all of the commuting vehicles. Many cities have added new light rail systems, such as", "that building more systems based on existing technologies would not help the problem, as Fitcher had earlier noted. Proponents suggested that systems would have to offer the flexibility of a car:\nThe reason for the sad state of public transit is a very basic one - the transit systems just do not offer a service which will attract people away from their automobiles. Consequently, their patronage comes very largely from those who cannot drive, either because they are too young, too old, or because they are too poor to own and operate an automobile. Look at it from the standpoint of", "small subway and large streetcar, an \"intermediate\" sized system. ICTS Work on an Intermediate Capacity Transit System (ICTS) had already started in 1970. Several consulting firms were asked to provide separate feasibility reports with outlines of a basic system. At the time, new urban transit systems were a field of active research across North America due to U.S. federal funding under the Urban Mass Transportation Administration's (UMTA) plans to roll out new systems in cities across the country. UMTA was convinced that urban rail systems would only be able to compete with cars if they had more car-like capabilities, and", "still operate conventional public transit by rail, as exemplified by the ever-popular New York City Subway system. Rapid transit is widely used in Europe and has increased in Latin America and Asia.\nWalking and cycling (\"non-motorized transport\") enjoy increasing favor (more pedestrian zones and bike lanes) in American and Asian urban transportation planning, under the influence of such trends as the Healthy Cities movement, the drive for sustainable development, and the idea of a carfree city. Techniques such as road space rationing and road use charges have been introduced to limit urban car traffic. Housing Housing of residents presents one of", "cars and fewer were using public transportation, and it was not practical to extend to the suburbs. At the same time, the number of surface roads exploded to serve the ever-increasing numbers of individually owned cars, further burdening city and country resources. During this time, the perception of using public transportation turned more negative. In what is arguably the most extreme example, Detroit, the fifth largest city in the United States in 1950 with 1,849,568 residents, had shrunk to 706,585 by 2010, a reduction of 62 percent.\nIn some instances, the automotive industry and others were directly responsible for the decline", "of roads and public transportation systems. These can take the form of light rail lines extending from the city centre to new streetcar suburbs and new or expanded highways, whose construction and traffic can lead to the community becoming part of a larger conurbation.\nIn the United States, it is common for commuter towns to create disparities in municipal tax rates. When a commuter town collects few business taxes, residents must pay the brunt of the public operating budget in higher property or income taxes. Such municipalities may scramble to encourage commercial growth once an established residential base has been reached.\nA", "destination, people would not leave their cars to use it. Busses and metro systems are not personalized, they run on pre-planned routes and schedules, making stops along the way that do not serve each individual, only the group of riders as a whole.\nFichter and other planners tapped into a zeitgeist that was being fuelled by rapid urban decay in the U.S. President Kennedy addressed congress in 1962 and stated that \"To conserve and enhance values in existing urban areas is essential. But at least as important are steps to promote economic efficiency and livability in areas of future development. Our", "longer located in the cities. Those who cannot afford cars inevitably suffer the worst, because they have no choice but to rely on public transport. The problem is illustrated by an estimation that 70% of entry level jobs are located in the suburbs, while only 32% of those jobs are within a quarter mile of public transportation. More difficult (or more expensive) access to jobs and other goods & services can act as a ghetto tax.\nAs a result of the transportation systems in use, but not adequately meeting the needs of those who rely on them, they tend to generate", "and indoor lighting. Cities rely to a lesser extent on hydrocarbon fuels such as gasoline and natural gas for transportation, heating, and cooking. Telecommunications infrastructure such as telephone lines and coaxial cables also traverse cities, forming dense networks for mass and point-to-point communications. Transportation Because cities rely on specialization and an economic system based on wage labour, their inhabitants must have the ability to regularly travel between home, work, commerce, and entertainment. Citydwellers travel foot or by wheel on roads and walkways, or use special rapid transit systems based on underground, overground, and elevated rail. Cities also rely on long-distance", "the planners but we directly go to the locals and ask for their opinion, their vision. The purpose is obviously to increase buses utilization, but it is also to have people satisfied with the arrangements put in place. \".\nThe first cities to use Unlimited Cities PRO call the attention due to the mediators’ ability to query people in the street, often off guard, with an appealing playful tablet. Their presence in the neighbourhoods for several weeks, right where people live and work, prompts the number of participants to be much higher (over 1 600 people in Evreux) than with conventional", "level as buses and cars. Some light rail systems have elevated or underground sections. Both new and upgraded tram systems allow faster speed and higher capacity, and are a cheap alternative to construction of rapid transit, especially in smaller cities.\nA premetro design means that an underground rapid transit system is built in the city center, but only a light rail or tram system in the suburbs. Conversely, other cities have opted to build a full metro in the suburbs, but run trams in city streets to save the cost of expensive tunnels. In North America, interurbans were constructed as street-running", "their fulcrum of public transportation include the Silver Line in Grand Rapids, Michigan, the GRTC Pulse in Richmond, Virginia, and the BusPlus in Albany, New York. Several satellite and suburban cities to larger cities also have bus rapid transit systems as secondary public transit services to light rail and commuter rail. For example, the Salt Lake City suburb of Murray has the planned Murray Taylorsville MAX BRT route. The Denver suburb of Fort Collins, and the Washington, D.C. suburbs of Arlington and Alexandria, Virginia contain the Metroway system.\nSome major cities have their own BRT routes within city limits that function", "impact, and a lower cost.\nElevated or underground systems in city centers allow the transport of people without occupying expensive land, and permit the city to develop compactly without physical barriers. Motorways often depress nearby residential land values, but proximity to a rapid transit station often triggers commercial and residential growth, with large transit oriented development office and housing blocks being constructed. Also, an efficient transit system can decrease the economic welfare loss caused by the increase of population density in a metropolis.\nRapid transit systems have high fixed costs. Most systems are publicly owned, by either local governments, transit authorities or", "train or metro systems have the most efficient means and highest capacity to transport people around cities. Therefore, mixed-mode commuting in the urban environment is largely dedicated to first getting people onto the train network and once off the train network to their final destination. Automobile to public transport nodes Although automobiles are conventionally used as a single-mode form of transit, they also find use in a variety of mixed-mode scenarios. They can provide a short commute to train stations, airports, and piers, where all-day \"park and ride\" lots are often available. Used in this context, cars offer commuters the", "Phoenix's Valley Metro Rail or Charlotte's Lynx Blue Line. Other cities have heavily expanded their already existing transportation networks with new lines, such as the Expo Line that opened in 2012 in Los Angeles. Modern streetcars have been built in various cities across America recently as well, including the Atlanta Streetcar and the Dallas Streetcar. Some cities though have rebuilt their heritage streetcars in the 21st Century, such as Tampa with its TECO Line Streetcar System that opened in 2002. New commuter rail systems have been built in a bunch of cities too like Orlando's Sunrail or Seattle's Sounder Commuter", "but still carries the same capacity and can connect to roads in the same way. The t-intersection for highways was also introduced.\nAnother addition is a toll booth which can be placed on roads, highways, or avenues in order to get money. However they can worsen traffic congestion and lower the player's mayor rating. Public transportation Major changes to the public transportation section were made. The monorail, a fast moving above-ground railway, was introduced for high density areas. Unlike its similar partner, the above-ground railway (Elevated Rail), the monorail is much more modern-looking and faster, and also can be built over", "the world, mass transit have been struggling to compete with private automobile and in many places its market is eroding. Transit metropolis and TOD are among the planning strategies being introduced to help reserve ridership losses and advance more sustainable patterns of urban development.\nTransit metropolises recognize that one or two TODs as islands in a sea of automobile-oriented development (AOD) will do little to get people out of cars and into trains and buses. Only when TODs are organized along linear corridors, as in Stockholm, Copenhagen and Curitiba, or inter-connected by high-capacity transit at a regional scale can", "Director of the newly founded American Public Transportation Association (APTA) (initially known as the American Public Transit Association) headquartered in Washington, D.C. in 1974. This was at a time when many American cities were considering building mass transit systems similar to BART, and the National Mass Transportation Assistance Act, that would provide federal funding to cover part of the operating costs and construction costs of mass transit, was just becoming law (building on the Urban Mass Transportation Act of 1964 and Urban Mass Transportation Act of 1970). Under the leadership of Stokes, APTA pushed for cities to build out their", "highways than roads or streets. However, they need on-ramps to function.\nYou cannot build streets over rivers. However, building a road or railway over a river automatically creates a bridge.\nRailways are what trains run on. However, they require train stations to work although they lower traffic congestion.\nSubways are underground railways so they do not require buildings to be bulldozed, which makes it a more sensible choice for dense cities. They are more expensive to build than ordinary railways, about 8 in-game currency per tile, however, making it more sensible not to use them to link parts of your city that are", "to improve the level of traffic by deterring some from driving the roadways. Some may choose to telecommute, or run their errands at a different time of day. Finally, differentiated business hubs within a metro area can help alleviate traffic by directing it to several different areas, rather than one centralized location. Cities that spend time and resources on making travel efficient within their borders will attract a healthier, wealthier, and happier population. Criticism It has been suggested that the benefits of traffic optimization have never been scientifically justified. It inherently favors motorized traffic over alternate modes such as pedestrians,", "such a system was to be practical, the distance between the vehicles had to be reduced, something that the emerging computer market appeared able to address.\nDuring the 1950s the United States underwent a period of intense urban decay. Planners pointed to the construction of the interstate highway system as the culprit; people were able to buy houses at low prices farther and farther from their jobs in the downtown cores, leading to a flight of capital out of the cities. Only those cities with well-developed mass transit systems, like New York and Boston, seemed to be avoiding these problems.", "Therefore, transit use in these areas is often less practical. Critics claim this promotes a reliance on cars, which results in more traffic congestion, pollution, and urban sprawl.\nTraditional solutions to the last mile problem in public transit have included the use of feeder buses, bicycling infrastructure, and urban planning reform. Other methods of alleviating the last mile problem such as bicycle sharing systems, car sharing programs, pod cars (personal rapid transit), and motorized shoes have been proposed with varying degrees of adoption. Late in 2015, the Ford Motor Company received a patent for a \"self-propelled unicycle engagable with vehicle\", which", "during a Congressional hearing ) because it contains specific features that are designed to encourage public transport use and differentiate the development from urban sprawl. A few examples of these features include mixed-use development that will use transit at all times of day, excellent pedestrian facilities such as high quality pedestrian crossings, narrow streets, and tapering of buildings as they become more distant from the public transport node. Another key feature of transit-oriented development that differentiates it from \"transit-proximate development\" is reduced amounts of parking for personal vehicles.\nOpponents of compact, or transit oriented development typically argue that Americans, and", "safe and dangerous states here).\nFor bus transportation, most of the main bus companies serve the main cities. Between smaller towns, you will generally need to rely on shared mini-vans, called 'colectivos.' However, taxi and car rentals are relatively affordable and a good option for saving time if you plan on visiting several sites in one day.", "York City where more people use public transit than cars, means shifting a paradigm dominated by the private automobile. The expression/phrase One Less Car was coined and given to TA by Richard Rosenthal around 1981. Since 2014, TransAlt has been at the forefront of monitoring New York City's Vision Zero initiative and advocating for progress in meeting safety goals. Volunteer support Transportation Alternatives relies on thousands of volunteers activists to achieve its goals. While many support TransAlt's bike tours, many more help as part of the organization's eight active borough activist committees, representing The Bronx, Brooklyn, South Brooklyn, Staten Island,", "areas. Lacking pollution control systems, the rapid rise in car ownership and the longer trips to and from work were causing significant air quality problems. Additionally, movement to the suburbs led to a flight of capital from the downtown areas, one cause of the rapid urban decay seen in the US.\nMass transit systems were one way to combat these problems. Yet during this period, the federal government was feeding the problems by funding the development of the Interstate Highway System, while at the same time funding for mass transit was being rapidly scaled back. Public transit ridership in most cities", "taken on mass transit increased by 4.0%. At least part of the drop in urban driving can be explained by the 4% increase in the use of public transportation \nAbout one in every three users of mass transit in the United States and two-thirds of the nation's rail riders live in New York City and its suburbs. Advanced public transportation systems Advanced public transportation systems (or APTS) is an Intelligent Vehicle Highway Systems, or IVHS, technology that is designed to improve transit services through advanced vehicle operations, communications, customer service, energy efficiency, air pollution reduction and market development.", "bus stop for the city. The main train station was built under the plaza, and actually includes some of the foundations from the Christoffelturm and wall in the train station. However, one of the biggest challenges has been integrating automobile traffic into the Old City. Due to the number of important buildings in the Old City and the central location of the Old City, it was impossible to completely close off this area to vehicles. While some streets have remained pedestrian zones, most major streets carry city buses, trams or personal vehicles. Districts and neighbourhoods The old city was historically" ]
How come bluetooth is so much slower than Wi-Fi?
[ "Bluetooth is designed to be short-range very low-power for small portable equipment. Part of the power-savings of Bluetooth come from diminished bandwidth (just as much as the weaker signal). One could speed up Bluetooth to Wi-Fi speeds, but then it would defeat the purpose of BT's major design feature.\n\nIf you're looking for something that works like plunging a cable between devices but has Wi-Fi speeds, you might like wireless USB: _URL_0_", "They can, but it's complicated. Original Wi-Fi (the 802.11 specification) is just as slow as Bluetooth 2.0 (the most basic standard). They both operate in the same 2.4GHz frequency band and use similar frequency hopping algorithms. \n\nWith the 802.11a specification IEEE changed the game by moving the frequency band to 5GHz (increasing bitrate) and improving their modulation algorithms. This had the effect of dramatically increasing power consumption and hardware costs, a move Bluetooth couldn't take. At the same time, the 802.11b standard was released which moved the 802.11a improvements to the 2.4GHz spectrum for less speed. It was after this (and the subsequent 802.11g standard) that Bluetooth began to simply incorporate the Wi-Fi standards into their own, resulting in the 3.0 HS specification. This spec simply allowed people to shove a Wi-Fi radio onto Bluetooth chips and have the protocol be able to use them when necessary, bringing the theoretical throughput up to a WiFi-comparable 24Mb/S. \n\nAll subsequent Wi-Fi standards have used higher frequencies with larger bandwidths, which have detrimental effects on battery life. Bluetooth devices are also required to operate at ranges of over 100m in very noisy environments while maintaining that power consumption, features Wi-Fi trades off to achieve high throughput.\n\nBluetooth is a very good protocol for the market it hits. Very few people need to transfer files larger than a few MB regularly and not optimizing for that unusual case has huge benefits for reliability and power consumption. The simplicity also allows it to encapsulate very different data models within a single protocol that can serve everything from keyboards to headphones to car keys. This has enormous manufacturing cost benefits since similar hardware can be used to make completely different devices, increasing economies of scale.", "Because it was designed that way on purpose. It's intended to be low power and short range specifically because WiFi is usually overkill for devices that need to be low power and short range." ]
[ "this for speeds up to 3 Mbit/s. Bluetooth 2.1 improved device pairing speed and security. Bluetooth 3.0 again improved transfer speed up to 24 Mbit/s. In 2010 Bluetooth 4.0 (Low Energy) was released with its main focus being reduced power consumption. Before Bluetooth 4.0 the majority of connections using Bluetooth were two way, both devices listen and talk to each other. Although this two way communication is still possible with Bluetooth 4.0, one way communication is also possible. This one way communication allows a bluetooth device to transmit information but not listen for it. These one way \"beacons\" do not", "the near-field communication to establish a Wi-Fi Direct connection between two devices for the data transfer, instead of a Bluetooth connection. This results in faster transfer speeds between devices which feature S Beam. S Beam is limited to devices with S Beam support, Wi-Fi Direct, and NFC such as HTC One and Samsung Galaxy S III.", "WiGig WiGig, alternatively known as 60GHz Wi-Fi, refers to a set of 60 GHz wireless network protocols. It includes the current IEEE 802.11ad standard and also the upcoming IEEE 802.11ay standard.\nThe WiGig specification allows devices to communicate without wires at multi-gigabit speeds. It enables high performance wireless data, display and audio applications that supplement the capabilities of previous wireless LAN devices. WiGig tri-band enabled devices, which operate in the 2.4, 5 and 60 GHz bands, deliver data transfer rates up to 7 Gbit/s (for 11ad), about as fast as an 8-band 802.11ac transmission, and more than 11 times faster than the highest", "theoretical downlink 3CA speed is limited to maximum 370 Mbit/s. Connectivity and Features Unlike some recently released smartphones from competing brands, the Xperia XZ doesn't abandon the standard 3.5 mm audio jack in favor of wireless substitutes. It does, however, have LDAC, an audio coding technology developed by Sony, that enables the transmission of 24bit/96khz High-Resolution (Hi-Res) audio content over Bluetooth at up to 990 kbit/s, three times faster than conventional audio streaming codecs, to compatible audio devices. It also has the standard set of connectivity options like Bluetooth 4.2 LE with aptX, NFC, dual-band Wi-Fi with Wi-Fi Direct, DLNA", "low stalls and is based on technologies faster than 3G. Wi-Fi is often used for connecting at home.", "the overall speed was compensated by the SSD. It was marketed toward casual computer users who mainly use the device for web browsing and email checking, not computation-intensive application users. \n\nOn January 7, 2014, Samsung Electronics announced the new ATIV Book 9 2014 Edition at CES 2014. The screen size was increased from 15.0\" to 15.6\" from the previous 15 inch Book 9 and the resolution was upgraded from HD to FHD as well. It was announced as the world's first laptop PC to have native lossless audio up to 24bit/192 kHz, such as FLAC and", "is less than that of 802.11b/g. In theory, 802.11a signals are absorbed more readily by walls and other solid objects in their path due to their smaller wavelength, and, as a result, cannot penetrate as far as those of 802.11b. In practice, 802.11b typically has a higher range at low speeds (802.11b will reduce speed to 5.5 Mbit/s or even 1 Mbit/s at low signal strengths). 802.11a also suffers from interference, but locally there may be fewer signals to interfere with, resulting in less interference and better throughput. 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses", "broadband with Wi-Fi works seamlessly as well. Currently, smartphones can use Wi-Fi or mobile data, but not both at the same time... While mobile operators cope with spectrum and capacity issues, HNIS can reduce the load on wireless networks, without creating a hassle for wireless customers who used to register with every Wi-Fi service they encountered. The theoretical speed of an HNIS-enhanced 3G and Wi-Fi connection in South Korea will be 60Mbps when SK Telecom fully deploys the technology this year. As SK expands the technology to its 4G networks, theoretical maximum speeds will increase to 100Mbps.\". SK plans to", "time period to transmit and they do not collide or overlap with other units operating within the same piconet.\nPiconet range varies according to the class of the Bluetooth device. Data transfer rates vary between about 200 and 2100 kilobits per second.\nBecause the Bluetooth system hops over 79 channels, the probability of interfering with another Bluetooth system is less than 1.5%. This allows several Bluetooth piconets to operate in the same area at the same time with minimal interference.", "wired networks do not. One challenge is the infrastructure of a wireless network, like the spectrum, versus a wired network. For Ten Sleep, they installed fiber optic cable to increase their network speed. Wireless does not have this capability. Fiber optic cable has more capacity than the electromagnetic spectrum, meaning even if the entire spectrum was allocated to the national wireless network, there still would not be the same capacity in fiber optic. New technologies Technology is growing at an incredible speed, with one important technology being the speed of information. The newest generation of speed at \"4G\" is being", "that network. Every Wi-Fi standard provides for automatic adjustment of the data rate to channel conditions; poor links (usually those spanning greater distances) automatically operate at lower speeds. Deploying additional base stations around the coverage area of a network, particularly in existing areas of poor or no coverage, reduces the average distance between a wireless device and its nearest access point and increases the average speed. The same amount of data takes less time to send, reduces channel occupancy, and gives more idle time to neighboring networks, improving the performance of all networks concerned.\nThe alternative of increasing coverage by adding", "Google Fast Pair Google Fast Pair Service (GFPS) or Fast Pair, is Google's proprietary standard for quickly pair Bluetooth devices when they come in close proximity for the first time using Bluetooth Low Energy (BLE). It announced in October 2017, initially design for connecting audio device such as speakers, headphones and car kits with Android. In 2018 Google updated Fast Pair with support for Chrome OS devices in 2019 and Fair Pair connections to be sync with other Android devices with the same Google Account. Google has partnered with Bluetooth SoC designers including Qualcomm, Airoha Technology and BES Technic to", "802.11n can use double the radio spectrum/bandwidth (40 MHz- 8 channels) compared to 802.11a or 802.11g (20 MHz). 802.11n can also be set to limit itself to 20 MHz bandwidth to prevent interference in dense communities. In the 5 GHz band, 20, 40, 80 and 160 MHz bandwidth signals are permitted with some restrictions, giving much faster connections. Communication stack Wi-Fi is part of the IEEE 802 protocol family. The data is organized into 802.11 frames that are very similar to Ethernet frames at the data link layer, but with extra address fields. MAC addresses are used as network addresses for routing over the LAN.\nWi-Fi's", "5 will quadruple the range by using increased transmit power or coded physical layer, double the speed by using optional half of the symbol time compared to Bluetooth 4.x, and provide an eight-fold increase in data broadcasting capacity by increasing the advertising data length of low energy Bluetooth transmissions compared to Bluetooth 4.x, which could be important for IoT applications where nodes are connected throughout a whole house.\nThe Bluetooth SIG released Mesh Profile and Mesh Model specifications officially on 18 July 2017. Mesh specification enables using Bluetooth Low Energy for many-to-many device communications for home automation, sensor networks and other", "close because of bluetooth's limited range, and the ability to daisy-chain devices to send messages further than Bluetooth's range.", "as IEEE 802.11n and IEEE 802.11ac for Wi-Fi allow a device to have multiple antennas. Multiple antennas enable the equipment to focus on the far end device, reducing interference in other directions, and giving a stronger useful signal. This greatly increases range and network speed without exceeding the legal power limits.\nIEEE 802.11n can more than double the range. Range also varies with frequency band. Wi-Fi in the 2.4 GHz frequency block has slightly better range than Wi-Fi in the 5 GHz frequency block used by 802.11a (and optionally by 802.11n).\nUnder optimal conditions, IEEE 802.11ac can achieve communication rates of 1Gbit/s. Radio bands", "Gigabit Ethernet interface, the network speed is significantly slower. Especially for older \"blue rings\" models (200 MHz ARM CPU and 32 MByte RAM), where it varies between 3–6 MByte/s, with an average of 4.5 MByte/s. The newer \"white lights\" MyBook World Edition 1 TB and 2 TB storage capacity models, WDH1NC and WDH2NC (oxnas810, 380 MHz ARM CPU and 128 MByte RAM), have drive speeds comparable to USB, at about 10 MB/s write and 25 MB/s read.\nThe \"white lights\" WDH1NC is Jumbo Frames capable and can achieve ~36 MByte/s reading and ~18 MByte/s writing speed over Gigabit Ethernet. Internals This drive runs BusyBox on Linux on an Oxford", "identical to the PHY of HiperLAN/2.\nIn 2009 802.11n was added to 802.11. It operates in both the 2.4 GHz and 5 GHz bands at a maximum data transfer rate of 600 Mbit/s. Most newer routers are able to utilise both wireless bands, known as dualband. This allows data communications to avoid the crowded 2.4 GHz band, which is also shared with Bluetooth devices and microwave ovens. The 5 GHz band is also wider than the 2.4 GHz band, with more channels, which permits a greater number of devices to share the space. Not all channels are available in all regions.\nA HomeRF group formed in 1997", "compared to 20253.80, 10973.36 and 5034.75 on respectively the 5s, 5 and 4s.\nThe expanded LTE connectivity on the iPhone 6 and iPhone 6 Plus is improved to LTE Advanced, with support for over 20 LTE bands (seven more than the iPhone 5s), for up to 150 Mbit/s download speed, and VoLTE support. Wi-Fi performance has been improved with support for 802.11ac specifications, providing speeds up to 433.0581 Mbit/s—which is up to three times faster than 802.11n, along with Wi-Fi Calling support where available. The iPhone 6 and iPhone 6 Plus add support for near-field communications (NFC). It is initially used exclusively for", "of the Android Open Source Project, that enables the transmission of 24bit/96 kHz High-Resolution (Hi-Res) audio content over Bluetooth at up to 990 kbit/s, three times faster than conventional audio streaming codecs, to compatible audio devices.\nOther connectivity options include Bluetooth 5 with aptX and Low Energy, NFC, 4x4 MIMO antennas for fast WI-Fi and cellular upload/download speeds, dual-band Wi-Fi a/b/g/n/ac, Wi-Fi Direct, MirrorLink, screen casting via Miracast and Google Cast, DLNA, GPS (with A-GPS), GLONASS, BeiDou and Galileo satellite positioning. The Xperia XZ2 Compact, like most new smartphone nowadays, has no FM radio. Software The Sony Xperia XZ2 Compact launched with", "at the heart of the current high speed WiFi and 4G mobile systems – has revolutionized high speed wireless.\"\nIn an April 1996 paper and subsequent patent, Greg Raleigh proposed that natural multipath propagation can be exploited to transmit multiple, independent information streams using co-located antennas and multi-dimensional signal processing. The paper also identified practical solutions for modulation (MIMO-OFDM), coding, synchronization, and channel estimation. Later that year (September 1996) Gerard J. Foschini submitted a paper that also suggested it is possible to multiply the capacity of a wireless link using what the author described as \"layered space-time architecture.\"\nGreg Raleigh, V. K.", "not backward-compatible with the previous (often called \"classic\") Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) protocol. The Bluetooth 4.0 specification permits devices to implement either or both of the LE and BR/EDR systems.\nBluetooth Low Energy uses the same 2.4 GHz radio frequencies as classic Bluetooth, which allows dual-mode devices to share a single radio antenna. BLE does, however, use a simpler modulation system. History In 2001, researchers at Nokia determined various scenarios that contemporary wireless technologies did not address. The company began developing a wireless technology adapted from the Bluetooth standard which would provide lower power usage and cost while minimizing its", "adding Wi-Fi to smaller devices has accelerated, and it is now possible to find printers, cameras, scanners and many other common devices with Wi-Fi in addition to other connections, like USB.\nThe widespread adoption of Wi-Fi in new classes of smaller devices made the need for ad hoc networking much more important. Even without a central Wi-Fi hub or router, it would be useful for a laptop computer to be able to wirelessly connect to a local printer. Although the ad hoc mode was created to address this sort of need, the lack of additional information for discovery makes it difficult", "of form factors, including small coin cell devices, USB sticks, and generic Bluetooth 4.0 capable USB dongles. History and development The development of the \"short-link\" radio technology, later named Bluetooth, was initiated in 1989 by Dr. Nils Rydbeck CTO at Ericsson Mobile in Lund and Dr. Johan Ullman. The purpose was to develop wireless headsets, according to two inventions by Johan Ullman, SE 8902098-6, issued 1989-06-12 and SE 9202239, issued 1992-07-24. Since its creation the Bluetooth standard has gone through many generations each adding different features. Bluetooth 1.2 allowed for faster speed up to ≈700 kbit/s. Bluetooth 2.0 improved on", "and Sony have used NFC technology to pair Bluetooth headsets, media players and speakers with one tap. The same principle can be applied to the configuration of Wi-Fi networks. Samsung Galaxy devices have a feature named S-Beam—an extension of Android Beam that uses NFC (to share MAC Address and IP addresses) and then uses Wi-Fi Direct to share files and documents. The advantage of using Wi-Fi Direct over Bluetooth is that it permits much faster data transfers, running up to 300 Mbit/s. Social networking NFC can be used for social networking, for sharing contacts, text messages and forums, links to", "sent until another transfer can be initiated. This reduces bus occupancy, meaning that nothing is sent for considerable fractions of bus time. A gap every 23 frames is not noticeable, but a gap every three frames can be very costly to throughput.\nAs USB has become faster, devices have also become hungrier for data and so there is now demand for sending large amounts of data - either to be stored on the device, or be relayed over wireless links (see 3GPP Long Term Evolution).\nSince the new devices, although faster than before, are still much lower in power than desktop PCs,", "Bluebugging Bluebugging is a form of Bluetooth attack often caused by a lack of awareness. It was developed after the onset of bluejacking and bluesnarfing. Similar to bluesnarfing, bluebugging accesses and uses all phone features but is limited by the transmitting power of class 2 Bluetooth radios, normally capping its range at 10–15 meters. However, the operational range has been increased with the advent of directional antennas. History Bluebugging was developed by the German researcher Martin Herfurt in 2004, one year after the advent of bluejacking. Initially a threat against laptops with Bluetooth capability, it later targeted mobile phones and", "designed to work within predefined standards. Wireless access points are also often close to people, but the drop off in power over distance is fast, following the inverse-square law. However, wireless laptops are typically used close to people. WiFi had been anecdotally linked to electromagnetic hypersensitivity but research into electromagnetic hypersensitivity has found no systematic evidence supporting claims made by sufferers.\nThe HPA's position is that \"... radio frequency (RF) exposures from WiFi are likely to be lower than those from mobile phones.\" It also saw \"... no reason why schools and others should not use WiFi equipment.\" In October 2007,", "was called the Joint Proposal. The final 802.11n standard supported speeds up to 600 Mbit/s (using four simultaneous data streams) and was published in late 2009.WiMAX was developed as an alternative to cellular standards, is based on the 802.16e standard, and uses MIMO-OFDM to deliver speeds up to 138 Mbit/s. The more advanced 802.16m standard enabled download speeds up to 1 Gbit/s. A nationwide WiMAX network was built in the United States by Clearwire, a subsidiary of Sprint-Nextel, covering 130 million pops by mid-2012. Clearwire subsequently announced plans to deploy LTE (the cellular 4G standard) covering 31 cities by mid-2013.\nThe", "inside data centers. Conventional PCI-E data cables carry data at up to eight gigabits per second, while networking cables reach 40 Gbit/s. The latest version of the USB standard tops out at ten Gbit/s. The technology does not directly replace existing cables in that it requires a separate circuit board to interconvert electrical and optical signals. Its advanced speed offers the potential of reducing the number of cables that connect blades on a rack and even of separating processor, storage and memory into separate blades to allow more efficient cooling and dynamic configuration.\nGraphene photodetectors have the potential to surpass germanium devices" ]
How does the ISS avoid damage from solar wind's if it is always in constant orbit?
[ "The ISS orbits beneath the protective shield created by the earth's magnetism. The bulk of the solar wind is deflected away from earth by the earth's magnetic field.", "Because the ISS isn't that far out at all, at a measily 400KM from the surface of the earth, the ISS is still far within the magnetic fields the earth creates.\n\nNote: 400KM is LESS than the distance between London and Paris.\n\nThe main issue astronauts deal with is the lack of a Ozone/ Atmosphere - not a lack of the earths electro-magnetic field." ]
[ "of these panels varies depending upon their predicted exposure to damage. Radiation Stations in low earth orbit are partially protected from the space environment by the Earth's magnetic field. From an average distance of about 70,000 km, depending on Solar activity, the magnetosphere begins to deflect solar wind around the Earth and space stations in orbit. However, solar flares are still a hazard to the crew, who may receive only a few minutes warning. The crew of the ISS took shelter as a precaution in 2005 in a more heavily shielded part of that station designed for this purpose during the", "ultimately lower the risks to an acceptable level.\nCrew living on the International Space Station (ISS) are partially protected from the space environment by Earth's magnetic field, as the magnetosphere deflects solar wind around the earth and the ISS. Nevertheless, solar flares are powerful enough to warp and penetrate the magnetic defences, and so are still a hazard to the crew. The crew of Expedition 10 took shelter as a precaution in 2005 in a more heavily shielded part of the station designed for this purpose. However, beyond the limited protection of Earth's magnetosphere, interplanetary manned missions are much more vulnerable.", "as Texas and the Mediterranean countries of Europe.\nThe SOHO satellite failed temporarily and the Advanced Composition Explorer (ACE) was damaged by the solar activity. Numerous other spacecraft were damaged or experienced downtime due to various issues. Some of them were intentionally put into safe mode in order to protect sensitive equipment. Astronauts aboard the International Space Station (ISS) had to stay inside the more shielded parts of the Russian Orbital Segment to protect themselves against the increased radiation levels. Both the Ulysses spacecraft which was near Jupiter at the time, and Cassini, approaching Saturn, were able to detect the emissions.", "distance of about 70,000 km (43,000 mi), depending on Solar activity, the magnetosphere begins to deflect solar wind around Earth and ISS. Solar flares are still a hazard to the crew, who may receive only a few minutes warning. In 2005, during the initial 'proton storm' of an X-3 class solar flare, the crew of Expedition 10 took shelter in a more heavily shielded part of the ROS designed for this purpose.\nSubatomic charged particles, primarily protons from cosmic rays and solar wind, are normally absorbed by Earth's atmosphere. When they interact in sufficient quantity, their effect is visible to the naked eye", "flights away from the polar regions are far less likely to see an impact from solar proton events.\nSignificant proton radiation exposure can be experienced by astronauts who are outside of the protective shield of the Earth's magnetosphere, such as an astronaut in-transit to, or located on the Moon. However, the effects can be minimized if astronauts are in a low-Earth orbit and remain confined to the most heavily shielded regions of their spacecraft. Proton radiation levels in low earth orbit increase with orbital inclination. Therefore, the closer a spacecraft approaches the polar regions, the greater the exposure to energetic proton", "to the ISS, the two connected spacecraft were flipped around so the better-armored station shielded the orbiter.\nNASA's study concluded that debris accounted for half of the overall risk to the Shuttle. Executive-level decision to proceed was required if catastrophic impact was likelier than 1 in 200. On a normal (low-orbit) mission to the ISS the risk was c. 1 in 300, but STS-125 (the Hubble repair mission) at 350 mi (560 km) was initially calculated at a 1-in-185 risk (due to the 2009 satellite collision). A re-analysis with better debris numbers reduced the estimated risk to 1 in 221, and the mission", "to fully use the solar arrays on the ISS. This can cause a drop in power generation, requiring the conservation of energy. This may affect many systems that otherwise require a lot of energy.\nThe amount of time that an object such as the ISS can remain safely in free-drift varies depending on moment of inertia, perturbation torques, tidal gradients, etc. The ISS itself generally can last about 45 minutes in this mode.", "on orbit, knowing that there was nothing to be done, until the air ran out?\nMuch of the risk assessment hinged on damage predictions to the thermal protection system. These fall into two categories: damage to the silica tile on the wing lower surface, and damage to the reinforced carbon-carbon (RCC) leading-edge panels. The TPS includes a third category of components, thermal insulating blankets, but damage predictions are not typically performed on them. Damage assessments on the thermal blankets can be performed after an anomaly has been observed, and this was done at least once after the return to flight following", "missions, typically missions for which the orbit should be accurately synchronized with Earth rotation, this is necessary to avoid the orbital period shortening.\nSolar radiation pressure will in general perturb the eccentricity (i.e. the eccentricity vector), see Orbital perturbation analysis (spacecraft). For some missions this must be actively counter-acted with manoeuvres. For geostationary spacecraft the eccentricity must be kept sufficiently small for a spacecraft to be tracked with a non-steerable antenna. Also for Earth observation spacecraft for which a very repetitive orbit with a fixed ground track is desirable, the eccentricity vector should be kept as fixed as possible. A large", "was not required, and the tile damage on the underside of the orbiter was not a threat to crew safety. However, the spacewalk to repair the damage could pose a variety of risks, and those risks weighed heavily into the final decision. He noted the arc jet tests actually showed a higher degree of damage than the orbiter would sustain during re-entry, so the tests were helpful in showing the worst \"possible\" damage, and still did not damage the tile during testing enough to warrant repair.\nShannon did note that the JSC Engineering Independent Group advised NASA managers that repairing the", "Several systems are currently used on board the ISS to maintain the spacecraft's atmosphere, which is similar to the Earth's. Normal air pressure on the ISS is 101.3 kPa (14.7 psi); the same as at sea level on Earth. \"While members of the ISS crew could stay healthy even with the pressure at a lower level, the equipment on the Station is very sensitive to pressure. If the pressure were to drop too far, it could cause problems with the Station equipment.\". Air revitalization system Carbon dioxide and trace contaminants are removed by the Air Revitalization System. This is a NASA rack,", "a week and observe its consequences. Engineers observed the behavior of the solar array as it was exposing it to extreme temperature swings through the ISS's orbit. Vibrations and oscillations were also mechanically introduced to assay the array's response to structural loads. Subsequent to the experiments, ground controllers were unable to lock the solar panel in its stowed configuration. The solar array was therefore jettisoned from the International Space Station. Applications ROSA being very compact in size and due to its large power generation capacity it is reliable for future missions and majorly for interplanetary travels which need a huge", "shock waves and coronal clouds are also important drivers of space weather as they can compress the magnetosphere and trigger geomagnetic storms. Solar energetic particles (SEP) accelerated by coronal mass ejections or solar flares can trigger solar particle events (SPEs), a critical driver of human impact space weather as they can damage electronics onboard spacecraft (e.g. Galaxy 15 failure), and threaten the lives of astronauts as well as increase radiation hazards to high-altitude, high-latitude aviation. Spacecraft electronics Some spacecraft failures can be directly attributed to space weather; many more are thought to have a space weather component. For example, 46", "the orbiter's reentry and landing, it would likely have sent Columbia into the Pacific Ocean; NASA later developed the Remote Control Orbiter system to permit mission control to land a shuttle.\nNASA investigators determined that on-orbit repair by the shuttle astronauts was possible but overall considered \"high risk\", primarily due to the uncertain resiliency of the repair using available materials and the anticipated high risk of doing additional damage to the Orbiter. Columbia did not carry the Canadarm, or Remote Manipulator System, which would normally be used for camera inspection or transporting a spacewalking astronaut to the wing. Therefore, an unusual", "because they block out alarm signals. More research is necessary in this field as well as in other astronautical hygiene areas e.g. measures to reduce the risks of exposure to radiation, methods to create artificial gravity, more sensitive sensors to monitor hazardous substances, improved life support systems and more toxicological data on the Martian and lunar dust hazards. Trapped radiation The Earth's magnetic field is responsible for the formation of the trapped radiation belts that surround Earth. The ISS orbits at between 200 nautical miles (370 km) and 270 nautical miles (500 km), known as a Low Earth Orbit (LEO). Trapped radiation", "solar power generation and thermal control are affected by that beta angle. Shuttle launches to the ISS were normally attempted only when the ISS was in an orbit with a beta angle of less than 60 degrees.", "pleated objects extending in the aft direction from the trusses, between the central habitable modules and the large solar panel arrays at the ends of the truss structure, and control the temperature of the ISS by dumping excess heat to space. The panels are double-sided, and radiate from both sides, with ammonia circulating between the top and bottom surfaces.\nThe problem was first noticed in Soyuz imagery in September 2008, but was not thought to be serious. The imagery showed that the surface of one sub-panel has peeled back from the underlying central structure, possibly due to micro-meteoroid or debris impact.", "public safety that a controlled crash into an ocean was preferable to letting the craft come down on its own at random. Unlike the Hubble Space Telescope or the International Space Station, it was not designed for on-orbit repair and refurbishment. It entered the Earth's atmosphere on 4 June 2000, with the debris that did not burn up (\"six 1,800-pound aluminum I-beams and parts made of titanium, including more than 5,000 bolts\") falling into the Pacific Ocean.\nThis de-orbit was NASA's first intentional controlled de-orbit of a satellite.\n (see also Skylab)", "geomagnetic storms induce currents in conductors that disrupt communications both in space and in cables on the ground. Better understanding of the magnetosphere and the ring current and its interaction with the solar wind during high solar activity will allow us to better protect these assets.\nAstronauts on deep space missions will not have Earth's protections so understanding the factors that may affect their exposure to cosmic rays and the solar wind is critical to manned space exploration.", "solar cells in satellites. Solar proton events also can cause single-event upset (SEU) events on electronics; at the same, the reduced flux of galactic cosmic radiation during solar maximum decreases the high-energy component of particle flux.\nCME radiation is dangerous to astronauts on a space mission who are outside the shielding produced by the Earth's magnetic field. Future mission designs (e.g., for a Mars Mission) therefore incorporate a radiation-shielded \"storm shelter\" for astronauts to retreat to during such an event.\nGleißberg developed a CME forecasting method that relies on consecutive cycles.\nOn the positive side, the increased irradiance during solar maximum expands", "was given, meaning that the danger has passed and the crew can reboard the station. This kind of incident has happened several times, and the crew would perform a debris avoidance maneuver should the situation arise. 2011–2012 – Failure of Main Bus Switching Unit #1 and Replacement EVA The four Main Bus Switching Units (MBSUs, located in the S0 truss), control the routing of power from the four solar array wings to the rest of the ISS. In late 2011 MBSU-1, while still routing power correctly, ceased responding to commands or sending data confirming its health, and was scheduled", "variation. The correction of this effect requires station-keeping maneuvers with a maximal delta-v of about 2 m/s per year, depending on the desired longitude.\nSolar wind and radiation pressure also exert small forces on satellites: over time, these cause them to slowly drift away from their prescribed orbits.\nIn the absence of servicing missions from the Earth or a renewable propulsion method, the consumption of thruster propellant for station-keeping places a limitation on the lifetime of the satellite. Hall-effect thrusters, which are currently in use, have the potential to prolong the service life of a satellite by providing high-efficiency electric propulsion. Mars By", "flexible if a parking orbit is used, because the inclination and time the spacecraft initially spends in the parking orbit can be varied. See the launch window used by the Mars Global Surveyor spacecraft to the planet Mars at . Specific issues Space Shuttle missions to the International Space Station were restricted by beta angle cutout. Beta angle () is defined as the angle between the orbit plane and the vector from the Sun. Due to the relationship between an orbiting object's beta angle (in this case, the ISS) and the percent of its orbit that is spent in sunlight,", "available. Operationally, it is sometimes desirable to orient the solar arrays to produce the opposite effect, and maximize the drag on the arrays. This may be done, for example, to reduce the space station orbital altitude in order to reduce the amount of fuel required for the shuttle to reach the space station. Choosing which solar array orientation mode is used is a function of ISS operations (\"mission control\").", "to increased solar activity can potentially blind sensors aboard spacecraft, or interfere with on-board electronics. An understanding of space environmental conditions is also important in designing shielding and life support systems for manned spacecraft. Environmental considerations Rockets as a class are not inherently grossly polluting. However, some rockets use toxic propellants, and most vehicles use propellants that are not carbon neutral. Many solid rockets have chlorine in the form of perchlorate or other chemicals, and this can cause temporary local holes in the ozone layer. Re-entering spacecraft generate nitrates which also can temporarily impact the ozone layer. Most rockets are", "apogee higher than ISS orbit. According to initial assessment by DRDO some of the debris (depending on size and trajectory) should re-enter in 45 days. A spokesperson from NASA disagreed, saying the debris could last for years because the solar minimum had contracted the atmosphere that would otherwise cause the debris to be destroyed. Another research from a leading space trajectory and environment simulation company AGI has also came to same conclusion that certain debris will take more than a year to come down and other debris still might pose a risk to other satellites and ISS and these results", "unimpeded solar winds. The kinetic energy gained from pick-up and sputtering associated with the solar winds increases thermal escape throughout the transit of Titan, causing neutral hydrogen to escape. The escaped hydrogen maintains an orbit following in the wake of Titan, creating a neutral hydrogen torus around Saturn. Io, in its transit around Jupiter, encounters a plasma cloud. Interaction with the plasma cloud induces sputtering, kicking off sodium particles. The interaction produces a stationary banana-shaped charged sodium cloud along a part of the orbit of Io. Observations of exoplanet atmospheric escape Studies of exoplanets have measured atmospheric escape as a", "remote manipulation, and emergencies that may happen while landing. This can be a major roadblock to mission success.\nIn addition, after long space flight missions, male astronauts may experience severe eyesight problems. Such eyesight problems may be a major concern for future deep space flight missions, including a crewed mission to the planet Mars. Radiation Without proper shielding, the crews of missions beyond low Earth orbit (LEO) might be at risk from high-energy protons emitted by solar flares and associated solar particle events (SPEs). Lawrence Townsend of the University of Tennessee and others have studied the overall most powerful solar storm", "risk of cancer caused by extreme radiation exposure of the Martian crew.\nIn addition, coronal mass ejections from the Sun are highly dangerous, and are fatal within a very short timescale to humans unless they are protected by massive shielding. Reliability Any major failure to a spacecraft en route is likely to be fatal, and even a minor one could have dangerous results if not repaired quickly, something difficult to accomplish in open space. The crew of the Apollo 13 mission survived despite an explosion caused by a faulty oxygen tank (1970). Launch windows For astrodynamics reasons, economic spacecraft travel to", "low Earth orbit, the ISS serves as a safety refuge in case of emergency. The inability to fall back on the safety of the ISS during the latest Hubble Space Telescope Servicing Mission (because of different orbital inclinations) was the reason a backup shuttle was summoned to the launch pad. So, ISS astronauts operate with the mindset that they may be called upon to give sanctuary to a Shuttle crew should something happen to compromise a mission. The International Space Station is a colossal cooperative project between many nations. The prevailing atmosphere on board is one" ]
Why do we tear up when we yawn
[ "Not 100% sure if this is the correct answer, but the act of yawning presses against the glands which produce tears. These glands are like a sac, so pressing against these sacs make the tear flow regardless of if you need it or not", "I thought i were just weird. So to yawn, i would go to a private place and afterwards pinch myself to neutralize the urge", "Whenever something on a film (or sometimes even an advert/commercial lol) gets me to tear up I pretend to yawn for the benefit of other people in the room ha", "To yawn, a nerve impulse is triggered to all the muscles. It just so happens that the same nerves also affect the tear glands, triggering them simultaneously.", "I don't know, but you're a wizard casting magic onto me as I just yawned and for sure did tear up too." ]
[ "wrote, \"One man's yawning makes another yawn\", and the French proverbialized the idea to \"Un bon bâilleur en fait bâiller sept\" (\"One good gaper makes seven others gape\"). Often, if one person yawns, this may cause another person to \"empathetically\" yawn. Observing another person's yawning face (especially his/her eyes), reading or thinking about yawning, or looking at a yawning picture can cause a person to yawn. The proximate cause for contagious yawning may lie with mirror neurons in the frontal cortex of certain vertebrates, which, upon being exposed to a stimulus from conspecific (same species) and occasionally interspecific organisms, activates", "transmission. Exorcists believe yawning can indicate that a demon or possessive spirit is leaving its human host during the course of an exorcism. Superstitions regarding the act of yawning may have arisen from concerns over public health. Polydore Vergil (c. 1470–1555), in his De Rerum Inventoribus, writes that it was customary to make the Sign of the Cross over one's mouth, since \"alike deadly plague was sometime in yawning, wherefore men used to fence themselves with the sign of the cross ... which custom we retain at this day.\"\nYawning is often perceived as implying boredom, and yawning conspicuously in another's presence", "slapping the babies backside telling it to be born. Others say it's because the baby does not want to leave the mother's womb so Songzi Guanyin will kick it out, leaving the bruise. While a small portion of people, wrongfully, believe it happens when the doctor is slapping the baby's backside to make it cry. Scientifically, it is also referred to as \"蒙古斑\" (Pinyin: Měng Gǔ Bān; Literally: Mongolian Spot)\nIn Khmer, it is known as \"khnau\" (ខ្នៅ) which translates to 'Mongolian spot' as well as other skin conditions such as vitiligo and leucoderma.\nThe mark is also common among Maya people", "of tears because it is said to emanate eerie cries and have a heavy energy surrounding it.", "you yawning right from the start.\"", "egg looks like it has been cooked then it means that they did have Mal de Ojo and the patient will start feeling better. Sometimes if the patient starts getting ill and someone knows that they had stared at patient, usually a child, if the person who stared goes to the child and touches them, the child's illness goes away immediately so the Mal De Ojo energy is released.\nIn some parts of South America the act of ojear, which could be translated as to give someone the evil eye, is an involuntary act. Someone may ojear babies, animals and inanimate", "Grown Men Don't Cry Background and writing Co-writer Tom Douglas told The Boot about the story behind the song. \"I had gone to the grocery store one day, had parked my car and was walking into the store when I saw this woman talking on a pay phone,\" he said. \"She had mascara tears running down her face, and her little boy was weaving in and out of her legs while she was talking on the phone and she looked like an ice cream cone, melting. I went in the store, got my groceries, came back out, and wondered what", "aunt gave her when she found Blanche crying because some kids teased her about having a dark, black complexion. Her aunt consoled her by saying:\n\"They jealous 'cause you got the night in you. Some people got night in 'im, some got morning, others, like me and your mama, god dusk. But it's only them that's got night can become invisible. People what got night in 'em can step into the dark and poof...Go any old where they want. Do anything. Ride them stars up there, like as not. Shoot, girl, no wonder them kids teasing you. I'm a grown woman", "is angry because she thought someone ate her bed. Baby Bunny cries because he thinks someone used his pimple cream. Then Papa Bunny dances, Mama Bunny sings a song, and Baby Bunny flushes her down the toilet. At the end of the book, a picture on the back cover shows her coming out of a sewer pipe and landing in a lake. Note: The cover originally had the word \"spam\" on the bowl of porridge, which Dav claims was meant to be a joke, until the Hormel Foods Corporation threatened legal action, causing either a recall of the book or", "eyes. Weaning is a mirroring that leaves the subject both unable to mourn and unable to care—leaves the child in the state of melancholy. Melancholy for Hassoun is the result of a gesture that leaves the infant to suffer interminably for having spied the mother's indifference at the moment of weaning.", "Cry Me Out Background Lott explained the song to BBC News: \"I always prefer to write songs about emotional situations and heartbreak [...] because I like getting into the character. When we were writing 'Cry Me Out', I said, 'I feel like singing about something sad but, obviously, still being strong'. So the guy has to cry to get over me, instead of the other way around.\" She also told Digital Spy that the song's opening lyric \"I got your e-mails, you just don't get females\" was her favourite line on the Turn It Up album. Lott explained that she", "me; weep instead for yourselves and for your children, for indeed, the days are coming when people will say, ‘Blessed are the barren, the wombs that never bore and the breasts that never nursed.' At that time, people will say to the mountains, ‘Fall upon us!' and to the hills, ‘Cover us!' for if these things are done when the wood is green what will happen when it is dry?\" Luke 23: 27-31 Tenth station: Jesus is crucified When they came to the place called the Skull, they crucified him and the criminals there, one on his right, the other", "Tear catcher Origin The myth of the ancient origins of the tear catcher was inspired by the biblical book of Psalms where David says of God \"You have kept count of my tossings; put my tears in your bottle.\" Psalm 56:8 These were widely used in Ancient Persia during funeral processions as they believed the dead should not be mourned and have progressed to the next stage of life. Thus a tear shed by those that remain would appear as obstacles on the souls passage from the material world to the next. Also mentioned by a passage in \"The Divine", "morning, the old man came to the stable and caught the hen while the old women prepared to cook it. When she made the fire ready, the old man put the hen in the hot pot. The hen screamed loudly because of the painful she got before she died. The seven chicks heard their mother's voice then they came to see her immediately. When they saw their mother's body, their heart were broken. They can not take it anymore. The seven chicks looked at each other and threw themselves to the fire like their mother. Moral The moral of this", "7- or 8-years-old. They find it difficult to feed themselves, much less have mental ability or physical capacity for work. No one can hold back the tears when seeing the heads turning round unconsciously, the bandy arms managing to push the spoon of food into the mouths with awful difficulty ... Yet they still keep smiling, singing in their great innocence, at the presence of some visitors, craving for something beautiful.\nOn June 16, 2010, members of the U.S.-Vietnam Dialogue Group on Agent Orange/Dioxin unveiled a comprehensive 10-year Declaration and Plan of Action to address the toxic legacy of Agent Orange and", "a condition which causes sufferers to shed tears while consuming food, so has been labelled \"crocodile tears syndrome\" with reference to the legend. History and usage The expression comes from an ancient anecdote that crocodiles weep for the victims they are eating. A collection of proverbs attributed to Plutarch suggests that the phrase \"crocodile tears\" was well known in antiquity: comparing the crocodile's behaviour to people who desire or cause the death of someone, but then publicly lament for them. The story is given a Christian gloss in the Bibliotheca by early medieval theologian Photios. Photios uses the story to", "Tears Are Not Enough Recording process Joni Mitchell later spoke to writer Iain Blair about the recording experience: \"I know it sounds ridiculous, but I was literally starving when we did the session 'cause my yoga teacher had sent me to a psychic dietician who, while rubbing her chin and swinging her arm around in a circle, had diagnosed a lot of food allergies. The result was, predictably, that I was hardly allowed to eat anything, so by the time I arrived with an apple and a rice patty, my poor stomach was making all these strange noises. Then we", "weep? Why do you not eat? Why is your heart sad? Am I not more to you than ten sons?\"\nThe story indicates that Hannah gave no answer to the questions, and instead rose and presented herself before God. She wept bitterly in the temple of Shiloh. In her despair, Hannah prayed to Yahweh for a child, and promising that if her prayer is granted, she would dedicated her son to God. When Eli found Hannah in the temple, she was praying silently with her lips moving. Eli witnessed this unusual behavior, and concluded that Hannah was intoxicated. After Hannah's explanation", "lot of time crying in the last year and feeling trapped and alone. That's what 'Knucklehead' is about. Sometimes the dark spawns incredible things, and the music came from that. I went through some deep shit that I hope I never go through again, but look what came from it: this incredible opportunity in music that i love. The scream at the end of the song makes me feel like I'm just putting my face in a pillow and screaming my guts out.\"\nThey also released the song \"Generation Fucked\" on SoundCloud and made a lyric video. The band came to", "of the Temple. In history Jesus's tears have figured among the relics attributed to Jesus. Use as an expletive In some places in the English-speaking world, including Great Britain, Ireland (particularly Dublin and Belfast) and Australia, the phrase \"Jesus wept\" is a common mild expletive spoken when something goes wrong or to express incredulity. It is also used sarcastically when expressing unsympathetic indifference to someone else's perceived unfortunate situation or self-pity.\nIn 1965 broadcaster Richard Dimbleby accidentally used the expletive live on air during the state visit of Elizabeth II to West Germany.\nIt is commonly used as an expletive in novels", "tears\" (and equivalents in other languages) refers to a false, insincere display of emotion, such as a hypocrite crying fake tears of grief. It is derived from an ancient anecdote that crocodiles weep in order to lure their prey, or that they cry for the victims they are eating, first told in the Bibliotheca by Photios I of Constantinople. The story is repeated in bestiaries such as De bestiis et aliis rebus. This tale was first spread widely in English in the stories of the Travels of Sir John Mandeville in the 14th century, and appears in several of Shakespeare's", "Cry Baby A boy burns his buttocks after trying to photocopy them, causing him to feel pain whenever he sits down. He then helps his grandfather find a water-holding frog, but they get trapped in the desert without water. Knowing that neither of them can go on any further, the boy sits down on his burnt bottom and tears rush from his eyes as he feels the unbearable pain. His tears fall onto the ground, causing a ton of frogs to appear on the ground and the grandfather's wish is granted. Ex Poser A boy invents a lie detector that", "The dog may yawn when someone bends over him, when you sound angry, when there is yelling and quarreling in the family, when the dog is at the vet's office, when someone is walking directly at the dog, when the dog is excited with happiness and anticipation – for instance by the door when you are about to go for a walk, when you ask the dog to do something he doesn´t feel like doing, when your training sessions are too long and the dog gets tired, when you have said NO for doing something you disapprove of, and in", "episode by \"[choosing] incest and rape\" in order to \"provoke [emotions].\"\nThe episode was heavily criticized by families of the victims of Pan Am Flight 103 for the nursery rhyme, \"It's raining babies and luggage and limbs and Daddy doesn't come home\", which explicitly describes the debris from the disintegrating plane falling into Lockerbie, sung in the fashion of that of a nursery rhyme.", "cry on camera because the kidnapper might enjoy her distress, and this led to more criticism: the Portuguese tabloid Correio da Manhã cited sources complaining that she had not \"shed a single tear\". Journalism professor Nicola Goc argued that Kate had joined a long list of mothers deemed killers because of unacceptable maternal behaviour. Commentators compared her experience to that of Lindy Chamberlain, convicted of murder after her baby was killed by a dingo. Like Kate, she was suspected, in part, because she had not wept in public. There was even a similar (false) story about supposedly relevant Bible passages", "John 20:15 Analysis According to John, \"Woman, why are you crying? Who is it you are looking for?\" is the first thing Jesus says upon his resurrection. The first part \"Why are you crying?\" repeats the statement made by the angels in John 20:13. Jesus adds \"Who is it you are looking for?\" This question, which Jesus has asked others previously in the Gospel, is often read as a wider question of what people are seeking in their lives. That Jesus quickly understands why Mary is weeping is also said to show his greater understanding of", "that is known to evoke feelings of contentment, reductions in anxiety, and feelings of calmness and security around the mate. Oxytocin is further released during labour when the fetus stimulates the cervix and vagina, and it is believed that it plays a major role in the bonding of a mother to her infant and in the establishment of maternal behavior. The act of nursing a child also causes a release of oxytocin.\nBetween 70% and 80% of mothers in the United States report some feelings of sadness or \"baby blues\" after giving birth. The symptoms normally occur for a few", "fast asleep, the male demon cut away a piece of her flesh with his knife. When she cried in pain, the female demon said, \"Did grandfather pinch you?\" and caressed her. A little later, she cut away a piece of her flesh too. The male demon then said, \"Did grandmother pinch you? Come, lie next to me.\" This went on until only her bones were left.\nThe next day, the step-mother was combing her hair as she waited expectantly for her daughter to return with gold and silver. A crow perched on the roof and kept saying, \"The mother is beautifying", "Reap in joy the fruit\n\nWhich we in bitter tears did Sow (lines 5–8) \nHere is a paraphrase of Psalm 126:5: \"They that sow in tears shall reap in joy.\" The 3rd stanza is the beginning the first story. \"If of masculine, enduring nature, it falls under the control and ban of the already existing state of society (the woman old).\" Blake, within \"The Mental Traveller\" and other poems, returns to the Elizabethan reliance on metaphor, especially when he says:\n And if the Babe is born a Boy\n\nHe's given to a Woman Old\n\nWho nails him down upon a rock\n\nCatches", "first to go down) and \"[The wheat that's growing] above the mowing line [gets cut down]\" (\"[Koren dat] boven het maaiveld uitsteekt [wordt afgehakt]\"). Similarly, one of the Chinese proverbs goes \"会哭的孩子有奶吃\", which means \"The crying baby gets the milk\" and Korean one \"모난 돌이 정 맞는다: Pointy stone meets chisel.\" while German and Spanish proverbs go \"Das Rad, das am lautesten quietscht, bekommt das meiste Fett: The wheel that squeaks the loudest gets most of the grease.\" and \"El que no llora no mama: He who does not cry does not suck.\" However, a sentiment similar to the Japanese" ]
With the Separation of Pangea, how come we didn't evolve into several different species?
[ "We weren't around back then. The continents were already in their present form when humans evolved (in Africa, almost certainly).", "Because hominins only evolved 6.3 million years ago, when the continents were pretty much in their current configuration.\n\nAlso, humans only left Africa and travelled to different continents 120 000 to 60 000 years ago, not enough time for major evolutionary differences to accumulate.", "First, to bound this discussion, Pangea was long gone before the first hominids (Humans and our closest relatives / ancestors) evolved on the planet. The continents were pretty much in their current configuration when the first hominids appeared.\n\nOn why we are all human, it is pretty simple that Humans survived and the other species did not. When Humans left Africa they interacted with a fairly large population of Neanderthals in Europe and a small population of Denisovans in Asia. We can't be precisely sure why Humans won out, but they did. Our luck.\n\nWhile yes our Human ancestors didn't have the travel efficiencies we have today, Eurasia and Africa have always remained in some amount of contact and A-B, B-C, C-D propagation would maintain the gene pool. Human settlement on the American continent is very recent in evolutionary timescales.", "Pangea existed 300 million years ago, humans evolved in Africa about 100,000 years ago.", "> Several generations in would be Isolated and there would eventually become another separate species, right?\n\nNope, speciation doesn't need to happen. It usually does given enough time, but it is not required by evolution.\n\nSpeciation is a process. A process that can take thousands, if not hundreds of thousands of years, especially for a species like ours. Species characterized by long life spans, small litters, long generation times, slow to mature, take a long time to fully speciate. \n\nIn order for speciation to come into fruition, there needs to be a barrier to reproduction. This barrier might be external (e.g. different reproductive periods, different mating rituals) or they may be internal (e.g. The penis cannot fit into the vagina, the sperm cannot penetrate the egg, chromosomal or genetic barriers, the fetus cannot come to term, hybrids are sterile).\n\nJust because two populations of the same species live on different continents does not mean that they will speciate. First, there must be a random mutation that produces a reproductive barrier. This random mutation may never happen. This random mutation never happened for early humans living in distant parts of the planet. Humans in the Americas maintained the ability to reproduce with humans living in Africa, or Europe, or Australia. No reproductive barriers arose, and all humans remained part of the same species. Nowadays, humans can move between populations much more easily, to such an extent that it is very unlikely that any given population is isolated enough to have a reproductive barrier selected for.", "The separation of Pangaea happened hundreds of millions of years ago, humans and our predecessors only evolved about 500,000 years ago, give or take. In fact, ape evolution happened so much later that all apes don't live naturally in the Americas. The only primates that live in the Americas naturally are one type of monkey, and then some types of lemurs and tarsiers. All the others, especially the ones closer to humans, like chimps, most monkeys, gorillas, and of course humans, all of these species come from Africa, Europe, and Asia originally, (mostly Africa). Modern humans evolved in Africa about 100,000 years ago and only came to the Americas about 10,000 years ago.\n\nAnd as for why we didn't evolve, it's because speciation (evolution into an entirely new species) doesn't take only a couple generations, it takes thousands of generations. 10,000 years of separation between Europeans and Native Americans is not nearly enough time to evolve into separate species. The only differences that evolved at all are, well, what you see today: differences in skin color and hair color, and minor facial differences. That's it. We're still very much the same species, all living humans are, for probably the past 30,000 years at least, when the last neanderthals died.", "Pangaea was long gone by the time humans hit the scene. The continents looked more or less like they do today, although sea levels were probably lower. The entire world was colonized by people migrating out of East Africa.\n\nThis means that before the advent of high-speed travel, people were very isolated from one another, but it wasn't for long enough for different groups to totally diverge into different species. It is responsible for the traits that differentiate the \"races,\" such as skin color.", "People didn't evolve on all the continents simultaneously. Pangea split up into a bunch of sections. People evolved on one of the section (Africa) and then traveled to all the others over time." ]
[ "to coastal plains, a type of common and stable habitat at the time. Although the formation of Pangea helped the genus to widespread, it also affected its environments. They began to disappear due to a climatic change that caused alterations of depositional and vegetational patterns across the world, provoking a decrease in number of the genus. A. sellardsi from the Artinskian (around 290-284 mya, Early Permian) epoch of Kansas, United States, was the last species of Adelophthalmus and therefore of all the suborder Eurypterina. The genus expanded the temporal range of the suborder by about 100 million years and turned", "have diverged from Characiphysi (Characiformes and relatives) is thought to be about the Early Triassic, about 250 million years ago (mya). However, their divergence probably occurred only with the splitting-up of Pangaea in the Jurassic, maybe 160 million years ago (Mya). By 110 Mya, the plate tectonics evidence indicates that the Laurasian Cypriniformes must have been distinct from their Gondwanan relatives.\nThe Cypriniformes are thought to have originated in South-east Asia, where the most diversity of this group is found today. The alternative hypothesis is that they began in South America, similar to the other otophysans. If this were the case,", "to be due to the breakup of Gondwana during the Jurassic period. The majority of species can be found originating in the Old World tropics with emphasis in Asia and the Pacific islands", "seems to have colonized two islands at the same time but independently, yielding two equally old but divergently evolved daughter species. Recognizing hard polytomies As DNA sequence evolution is usually much faster than evolution of complex phenotypic traits, it may be that genetic lineages diverge a short time apart from each other, while the actual organism has not changed if the whole ancestral population is considered. Since few if any individuals in a population are genetically alike in any one population – especially if lineage sorting has not widely progressed – it may be that hard polytomies are indeed rare", "widely distributed, meaning that phytosaurs dispersed across Pangea early on and there were probably few geographical barriers for their distribution; only in the southernmost regions are they rare, possibly due to increased aridity.\nA somewhat more advanced and larger form, Angistorhinus appears at the same time or soon after. Later in the Carnian, both these animals were replaced by more specialised forms like Rutiodon, Leptosuchus, and the huge Smilosuchus (Lucas 1998). The Carnian-Norian extinction meant that these animals died off, and the Early Norian sees new genera like Nicrosaurus and Pseudopalatus, both of which belong to the most derived clade of", "with centers of diversity in Africa, South America, and Southeast Asia. They most likely originated in West Gondwana 67–107 million years ago, so the oldest split could relate to the break-up of Gondwana in the middle Eocene to late Oligocene, 45–24 million years ago. The group reached their current distribution by multiple intercontinental dispersal events. One factor was product of aridification, other groups responded to favorable climatic periods and expanded across the available habitat, occurring as opportunistic species across wide distribution; other groups diverged over long periods within isolated areas.\nThe Cucurbitales comprise the families: Apodanthaceae, Anisophylleaceae, Begoniaceae, Coriariaceae, Corynocarpaceae, Cucurbitaceae,", "and the creation of separate land masses would create diversified ecosystems and biodiversity, one of the strongest defences against extinction. An example of species diversification and later competition on Earth's continents is the Great American Interchange. North and Middle America drifted into South America at around 3.5 to 3 Ma. The fauna of South America evolved separately for about 30 million years, since Antarctica separated. Many species were subsequently wiped out in mainly South America by competing Northern American animals. A large moon The Moon is unusual because the other rocky planets in the Solar System either have no satellites", "as parts of the supercontinent Gondwana (which comprised most landmasses of the modern southern hemisphere). This connection was broken by rifting and sea-floor spreading 130–110 million years ago. Afterwards, the transoceanic assemblages would have continued to evolve separately, contributing to small differences between taxa. Machado stated that Cajual Island was still attached to the African continent during the Cenomanian. Similarly, Medeiros and colleagues noted that the presence of an island chain or other lasting land connection during that time could explain the faunal similarities.\nSpinosaurids likely spent most of their time near or in water and fed mostly on aquatic animals,", "birds. Certain island studies have demonstrated that on a small spatial scale, that avian taxonomic homogenization occurs far more rapidly than it does on a larger spatial scale. In France, communities have been recorded as becoming increasingly functionally similar over the course of two decades. Interestingly, in other French studies, it has been noted that there is not a temporal relationship between functional and taxonomic homogenization, a trend that had been observed in freshwater fishes. There have been predictions that avian taxonomic homogenization is occurring on the global scale, which could lead to future mass extinctions of avifauna. Mammals Ungulates", "Late Triassic or Early Jurassic. This isolation first occurred when the supercontinent Pangaea began to break apart, forming the smaller northern supercontinent of Laurasia. The authors of a 2007 study of early crocodylomorphs did not include shartegosuchids in a phylogenetic analysis, indicating that they were so highly endemic to Asia that their relationship to other crocodylomorphs would be difficult to interpret.", "was a fraction of its original size, however, the landmasses that would become Australia, Antarctica and Zealandia were still attached. Most of the modern 'Gondwanan fauna' had its origin in the Cretaceous. During this time Zealandia was temperate and almost flat, with no alpine environments. Gondwanan funa Fossils found at Lightning Ridge, New South Wales, suggest that 110 million years ago (Ma), Australia supported a number of different monotremes, but did not support any marsupials. Marsupials appear to have evolved during the Cretaceous in the contemporary northern hemisphere, to judge from a 100-million-year-old marsupial fossil, Kokopellia, found in the badlands", "confirmed this close relationship; the estimated time of divergence is about 1.4 million years ago. A. heterophylla sequences nest within those of the more diverse A. koa, making the latter paraphyletic. Both species are thought to be descended from an ancestral species in Australia, presumably their sister species, Acacia melanoxylon. Dispersals most likely occurred via seed-carrying by birds such as petrels. Both species have very similar ecological niches, which differ from that of A. melanoxylon.\nA closely related species, koaiʻa or koaiʻe (A. koaia), is found in dry areas. It is most easily distinguished by having smaller seeds that are", "southern supercontinent Gondwana. This supercontinent began to break up 140 million years ago, and the New Guinea region (previously known as Sahul) moved towards the equator. As a result, animals from New Guinea travelled to Australian continent and vice versa, creating many different species living in different ecosystems. These activities still occur until the two regions separated completely.\nAsian continent influences, on the other hand, is the result of the reformation of the Laurasia supercontinent, which existed after the break-up of Rodinia around 1 billion years ago. Around 200 million years ago, the Laurasia supercontinent split completely, forming Laurentia (now America)", "three European countries that were included in the study, hoverflies had homogenized in all of the countries while bees and butterflies only homogenized in two countries. The scale at which homogenization occurred also varied between taxonomic groups. Amphibians and reptiles There has been relatively little research on homogenization in the herpetofauna, and according to a 2006 study, introduction of nonnative reptiles has not led to homogenization of reptilian communities in Florida. However, in Central America, Batrachochytrium dendrobatidis, which is pathogenic to amphibians, has led to selective extinction of certain taxa, which in turn has resulted in homogenization of certain amphibian", "and genetic differences have resulted in the species being split in recent years. Such a similarity between the two species can be explained by a recent evolutionary divergence, and is an example of allopatric speciation where the prevention of gene flow by geographical isolation has resulted in an accumulation of differences by genetic drift and differing selection pressures. Description The painted-snipes are short-legged, long-billed birds similar in shape to the true snipes, but their plumage is much more striking. There is sexual dimorphism in both size and plumage, with the males being duller overall and smaller. All three species have", "which also included South America, Africa, India and Antarctica. Gondwana began to break up 140 million years ago (MYA); 50 MYA Australia separated from Antarctica and was relatively isolated until the collision of the Indo-Australian Plate with Asia in the Miocene era 5.3 MYA. As Australia drifted, it was isolated from evolutionary pressures in the rest of the world. Other examples of island isolation include Madagascar, New Zealand, Socotra, the Galapagos and Mauritius.\nThe placental mammals made their reappearance in Australia in the Pleistocene, as Australia continued to move closer to Indonesia, both bats and rodents appearing reliably in the fossil record.", "probably began to evolve separately c. 105 Ma when Africa and South America separated.\nThe laurel forests of Australia, New Caledonia, and New Zealand have a number of species related to those of the laurissilva of Valdivia, through the connection of the Antarctic flora. These include gymnosperms and the deciduous species of Nothofagus, as well as the New Zealand laurel, Corynocarpus laevigatus, and Laurelia novae-zelandiae. New Caledonia and New Zealand became separated from Australia by continental drift 85 million years ago. The islands still retain plants that originated in Gondwana and spread to the Southern Hemisphere continents later. However, strong evidence", "and Australia and Antarctica began to detach from one another. Life The life on Gondwana has changed throughout its existence. Gondwana was a smaller piece of Rodinina and stayed together all the way through the breakup of Pangea. This allowed Gondwana to host almost all species that have ever lived on Earth. Gondwana also was a part of some great mass extinction events. During the Ordovician, sea levels rose so much that the entire Gondwana continent was covered, at this time marine life was dominant. Also, vertebrates started to make an appearance in the fossil record. Terrestrial species started to", "are considered different species, often because they can no longer successfully reproduce with one another. This process is intuitive for conspicuous examples such as ring species, wherein a population splits due to a geographical barrier such as a mountain range, leading to allopatric populations. However why species diverge when their geographic ranges overlap (sympatric speciation) is less understood.\nThe sister species Drosophila subquinaria and Drosophila recens overlap in geographic range and are capable of hybridization, meaning they can successfully reproduce with each other; however the offspring are very sickly. Thus, these two species are almost fully reproductively isolated, despite overlapping in", "Jordan and David Starr Jordan, noticed that closely related species were often geographically isolated from one another (allopatrically distributed) which lead to the advocation of the importance of geographic isolation in the origin of species. Karl Jordan is thought to have recognized the unification of mutation and isolation in the origin of new species — in stark contrast to the prevailing views at the time. David Starr Jordan reiterated Wagner's proposal in 1905, providing a wealth of evidence from nature to support the theory, and asserting that geographic isolation is obvious but had been unfortunately ignored by most geneticists and", "Eumenophorinae Distribution At about 158-160 million years ago (Mya), Gondwana split up and the Indo-Madagascan plate drifted away from the rest of the super continent. At around 84-86 Mya, India split from Madagascar and drifted into Eurasia (66-55 Mya), to its current position. Therefore, all fauna in Gondwana (such as the Eumenophorinae) would be distributed on all three land masses. Characteristics The Eumenophorinae have stridulatory spike setae on the coxae of all legs, and a \"comb\" of stiffened setae on the palpal femur. In 2005, Richard Gallon described the monotypic genus Mascaraneus, which lacks the stridulatory spike setae.", "may have been separated geographically from one another while not necessarily having to be separated stratigraphically (that is, if the temporal ranges of the two species coincide with one another). More importantly, the separate biogeographic ranges of the two species may be evidence for a transoceanic dispersal event from one continent to the other. Since the presumed ages of the localities from which specimens have been found are quite similar yet inexact, it is currently unknown just what continent this dispersal event may have originated. A recent reevaluation of the holotype material of E. lerichei, which in the past has", "Nothofagus Distribution The pattern of distribution around the southern Pacific Rim suggests the dissemination of the genus dates to the time when Antarctica, Australia, and South America were connected in a common land-mass or supercontinent referred to as Gondwana. However, genetic evidence using molecular dating methods has been used to argue that the species in New Zealand and New Caledonia evolved from species that arrived in these landmasses by dispersal across oceans. Uncertainty exists in molecular dates and controversy rages as to whether the distribution of Nothofagus derives from the break-up of Gondwana (i.e. vicariance), or if long-distance dispersal has", "splitting-up of this species into several seems to be the eventual outcome, pending data from the populations south of Mexico. In addition, it would be interesting to determine whether there are geographical variations in the song that would further strengthen the case for species status of the taxa. The morphological variation, though recognizable, is rather inconspicuous and probably more the consequence of genetic drift in freshly isolated subpopulations than a cause for their separation. Southern group Meanwhile, ecological data shows some interesting differences between southern populations too. Several subspecies appear to be well distinct, and there is much evidence suggesting", "As of 2013 this had not been confirmed by DNA studies.\nThe original species has been shown to be two morphologically identical forms – Plasmodium ovale curtisi and Plasmodium ovale wallikeri – which can be differentiated only by genetic means. Both species have been identified in Ghana, Myanmar, Nigeria, São Tomé, Sierra Leone and Uganda. The separation of the lineages is estimated to have occurred between 1.0 and 3.5 million years ago in hominid hosts. A second analysis suggests that these species separated 4.5 million years ago (95% confidence interval 0.5 – 7.7 Mya). A third worked sequenced the whole", "large population, \"intermarriages\" (crossing) would even out these variations and explain why species appeared constant, but reproductive isolation of a small sub-group could lead to divergence and geographic speciation: \"animals on separate islands ought to become different if kept long enough apart with slightly differing circumstances\", as in the various species he had seen of Galápagos tortoises and mockingbirds, the Falkland Fox and the Chiloe fox, the \"Inglish and Irish Hare\". What Darwin called \"inosculation\" would abruptly introduce a clear distinction between even the most closely related species, explaining the rheas which remained distinct species with overlapping territories.\nUniquely for his", "closely follows the order that Pangaea separated into the modern continents. By the Middle Jurassic period, tetanurans had spread to every continent and diverged into the allosauroids and the coelurosaurs. Allosauroids first appeared in the Middle Jurassic period and were the first giant taxa (weighing more than 2 tons) in theropod history. Along with members of the superfamily Megalosauroidea, allosauroids were the apex predators that occupied the Middle Jurassic to the early Late Cretaceous periods. Allosauroids have been found in North America, South America, Europe, Africa, and Asia. Specifically, a world-wide dispersal of carcharodontosauroids likely happened in the Early Cretaceous.", "view consistent with present ecological partitioning between the two groups. This advantage could as well be in part responsible for the observed associated adaptive radiation of echidnas and expansion of the niche space, which together contradict the fairly common assumption of halted morphological and molecular evolution that continues to be associated with monotremes. Furthermore, studies of mitochondrial DNA in platypuses have also found that monotremes and marsupials are most likely sister taxa. It also implies that any shared derived morphological traits between marsupials and placental mammals either occurred independently from one another or were lost in the lineage to monotremes.", "describers of Tongtianlong suggested that this diversity is indicative of an evolutionary radiation of oviraptorids that occurred just prior to the Cretaceous–Paleogene extinction event. However, the possibility that these species come from different points in time cannot be excluded, due to a lack of study on the stratigraphy and age of the Nanxiong Formation.", "or that the plotopterids were not as close to other pelecaniforms as generally assumed, which would necessitate splitting the traditional Pelecaniformes in three.\nA 2014 analysis of whole genomes of 48 representative bird species has concluded that penguins are the sister group of Procellariiformes, from which they diverged about 60 million years ago (95% CI, 56.8-62.7).\nThe distantly related puffins, which live in the North Pacific and North Atlantic, developed similar characteristics to survive in the Arctic and sub-Arctic environments. Like the penguins, puffins have a white chest, black back and short stubby wings providing excellent swimming ability in icy water." ]
The new changes to paypal's policies, and why its bad for me.
[ "The big one that's mentioned is the change that you can't join a class-action against paypal so I'll explain that.\n\nLawsuits are expensive. Even a little suit against your neighbor over cutting down your tree can rack up costs from court fees and time spent arguing the case. In a major court case involving a huge business, this gets even worse with the added time and expense of hiring a lawyer.\n\nGenerally speaking, a large corporation will have more money to throw at the court case than you do and can bog it down until you can't afford the costs anymore. Class action lawsuits are one of the defenses in the law against this. Instead of just representing yourself, you represent a whole group of people (a class) who were wronged by the corporation in the same way you were.\n\nEXAMPLE:\nWidget Works sells you a widget to trim your cat's fur. It sets the cat on fire and you sue for 200$ (cost of widget + damage to cat). Now, you can't afford to sue them and a lawyer won't do it for a cut of the reward. However, upon further research, you find that 10,000 other people had their cat set on fire by widgets. Although a cut of 200$ isn't enough for a lawyer, a cut of $2,000,000 is worth it. By filing a class action lawsuit of for yourself and those 10,000 people, you can actually find a lawyer to represent you." ]
[ "set currency conversion option in account settings.\nFrom 2009 to 2016, PayPal operated Student Accounts, allowing parents to set up a student account, transfer money into it, and obtain a debit card for student use. The program provided tools to teach how to spend money wisely and take responsibility for actions. PayPal discontinued Student Accounts in August 2016.\nIn November 2009, PayPal opened its platform, allowing other services to get access to its code and to use its infrastructure in order to enable peer-to-peer online transactions.\nIn 2007, PayPal acquired the online credit product Bill Me Later, Inc., which has since been", "PayPal, it protects sellers in a limited fashion via the Seller Protection Policy. In general, the Seller Protection Policy is intended to protect the seller from certain kinds of chargebacks or complaints if the seller meets certain conditions including proof of delivery to the buyer. PayPal states the Seller Protection Policy is \"designed to protect sellers against claims by buyers of unauthorized payments and against claims of non-receipt of any merchandise\". The policy includes a list of \"Exclusions\" which itself includes \"Intangible goods\", \"Claims for receipt of goods 'not as described'\", and \"Total reversals over the annual limit\". There are", "\"the most interesting weekend in tech\" that \"pushes the web forward.\" PayPal controversy In May 2012, PayPal froze two of McMillan's accounts, withholding over $64,000 of funds collected from Build's ticket sales as collateral against pre-orders of The Manual. Five months later, with the matter still unresolved, McMillan went public with his complaints on Twitter. The resulting social media backlash led to a public response and personal apology to McMillan from former PayPal president David A. Marcus, who released the funds and asked McMillan to work with him personally on improving the service. Three days later, PayPal announced they would", "from the account. Although PayPal refused to comment, it would appear the offer was made as a result of a backlash of negative media attention, with CNN, Fast Company and other media outlets picking up the story. Exhibitions & Lectures The Foundation has exhibited at several art and music festivals, including Maker Faire, Coachella, Burning Man, the Electric Daisy Carnival, Nocturnal Festival, Beyond Wonderland and others. Principals have spoken on Flux's work at TED, SXSW, the Exploratorium, the Annual Meeting of the American Association of Museums, Maker Faire and several universities.", "At the time of this cessation, it was the largest payment processor for online gambling transactions. In 2010, PayPal resumed accepting such transactions, but only in those countries where online gambling is legal, and only for sites which are properly licensed to operate in said jurisdictions.\nIf an account is subject to fraud or unauthorized use, PayPal puts the \"Limited Access\" designation on the account. PayPal has had several notable cases in which the company has frozen the account of users such as Richard Kyanka, owner of the website Something Awful, in September 2005, Cryptome in March 2010, or April Winchell,", "PayPal PayPal launches different marketing activities in various channels and emphasizes that consumers can use it in different ways. Paypal's marketing includes the TV commercials, outdoor advertising, Facebook, and display advertisement.\nPayPal provides free analytics to traders about the ways that consumers utilise online payments. By the free tracking service, PayPal assists traders to target the consumers. PayPal's code gathers the consumer information which can be installed on the trader's website. Both PayPal and traders get benefit from the free service.\nPayPal cooperates with \"Synchrony Financial\" and provides a financial service to PayPal Cashback Mastercard, which offers 2% return cash to customers", "PayPal. As PayPal's COO and product leader, he built many of the company’s key teams, and was responsible for product management and design, sales and marketing, business development, international, customer service, fraud operations, and human resources functions.\nDuring his tenure, PayPal grew payment volume from zero to $500 million/month and revenue from zero to $240 million/year. The company introduced business accounts, and expanded into multiple currencies and over 80 countries.\nIn February 2002, PayPal went public, it was one of the first IPOs after the September 11, 2001 attacks (ABCO went Public in November 2001). The stock rose more than 54% that", "was hateful and discriminatory against certain religious groups. Litigation In March 2002, two PayPal account holders separately sued the company for alleged violations of the Electronic Funds Transfer Act (EFTA) and California law. Most of the allegations concerned PayPal's dispute resolution procedures. The two lawsuits were merged into one class action lawsuit (In re: PayPal litigation). An informal settlement was reached in November 2003, and a formal settlement was signed on June 11, 2004. The settlement requires that PayPal change its business practices (including changing its dispute resolution procedures to make them EFTA-compliant), as well as making a US$9.25 million", "anti-PayPal Facebook sites and Twitter accounts to air their complaints.\nIn February 2017, PayPal froze the account of News Media Canada, a Canadian trade association, in response to a payment from The Reminder, a Flin Flon, Manitoba community newspaper, intended to cover the fee for the Reminder's submission of articles for consideration in a nationwide journalism contest run by News Media Canada, including one discussing Syrian refugees. PayPal cited United States regulations as a reason for flagging the transaction between Canadian entities.\nIn September 2018, PayPal banned radio host Alex Jones and his website Infowars. They claimed his site has content that", "for political aims in Russia\", through PayPal's Acceptable Use Policy does not mention financing for political goals. Non-governmental organization Freedom House issued a statement that \"PayPal should immediately lift this ban, to help, rather than hinder, press freedom in Russia.\"\nIn 2016, PayPal generated controversy after it was discovered that one of its founders, Peter Thiel, had funded a lawsuit brought by Hulk Hogan against Gawker. Thiel may have benefited from the $140 million lawsuit that was decided in favor of the former wrestler.\nBy 2016, ConsumerAffairs had received over 1,200 consumer complaints relating to PayPal policies. Consumers have also launched numerous", "significantly different from the product itself. In these circumstances PayPal.com acts akin to an online arbitrator. However, in those circumstances where the seller takes away the money from his account before the buyer makes the claim, PayPal.com will not be responsible for the buyer's loss. Despite this, PayPal is in a very strong position since in most cases it is able to freeze the amount of money and resolve the dispute providing an instant and effective enforcement.\nOverall, chargebacks intends to balance the inequality of power between consumers and businesses. It is regarded as a very efficient tool for consumers because", "US economic sanction list and other rules and interventions required by US laws or government.\nPayPal is an acquirer, a performing payment processing for online vendors, auction sites, and other commercial users, for which it charges a fee. It may also charge a fee for receiving money, proportional to the amount received. The fees depend on the currency used, the payment option used, the country of the sender, the country of the recipient, the amount sent and the recipient's account type. In addition, eBay purchases made by credit card through PayPal may incur extra fees if the buyer and seller use", "PayPal was rejected by a Federal court in Nebraska in June 2006. The summons was issued to PayPal to obtain information about donations to (or purchases made at) an internet web site maintained by Schulz or We the People Foundation. The court record indicates that the IRS issued the summons to PayPal as part of an investigation of an alleged failure by Schulz to file Federal income tax returns for the years 2001 through 2004, after Schulz refused to cooperate with the IRS inquiry. Schulz lost this case on appeal on September 13, 2007. In this case, the United States", "Eight years after the company first started operating in the country, Paypal ceased operations in Turkey on 6 June 2016 when Turkish financial regulator BDDK denied it a payments license. The regulators had demanded that Paypal's data centers be located inside Turkey to facilitate compliance with government and court orders to block content and to generate tax revenue. PayPal said that the closure will affect tens of thousands of businesses and hundreds of thousands of consumers in Turkey. PayPal Giving Fund PayPal Giving Fund is a registered charity supported by Paypal that streamlines donations to nonprofit organizations. Digital marketing with", "encourage sellers to use their service. This same leveraging of users helped PayPal see exceptional growth.", "PayPal's 2010 developer conference in San Francisco, California. The stunt involved dropping a 600-pound block of ice filled with hundreds of dollar bills. The statement was that PayPal freezes your money and that better payment processors exist.\nIn 2011, the company was used by many Occupy Wall Street supporters to donate money to the movement, which resulted in a surge of transactions. Dominic Basulto of The Washington Post called WePay the \"de facto official way\" to give financial donations to the Occupy movement \"while simultaneously bypassing the largest financial institutions\". By October 27, 2011, over 8,000 donors from 37 countries had", "PayPal is a payment intermediary and not otherwise regulated directly, TILA/Z and EFTA/E do not operate exactly as written once the credit/debit card transaction occurs via PayPal. Basically, unless a PayPal transaction is funded with a credit card, the consumer has no recourse in the event of fraud by the seller.\nIn 2008, PayPal Europe was granted a Luxembourg banking license, which, under European Union law, allows it to conduct banking business throughout the EU. It is therefore regulated as a bank by Luxembourg's banking supervisory authority, the Commission de Surveillance du Secteur Financier (CSSF). All of the company's European accounts", "began accepting PayPal in January 2013, ten and a half years after eBay acquired PayPal. Sellers were paid by pre-arranged deposits into a designated personal checking account.\nOn November 17, 2016, it was announced that Half.com commission rates would increase significantly, with lower-priced item rates going from 15% to 25%. The rates went into effect on December 16, 2016, with the initial notification to sellers being sent out less than a month prior and right in the midst of the holiday shopping season. The move was seen as an attempt by eBay to soon force the closure of Half.com.\nOn June 16,", "in the suit.\nCraig Comb and two others filed a class action against PayPal in Craig Comb, et al. v. PayPal Inc.. They sued, alleging illegal misappropriation of customer accounts and detailed their customer service experiences, including freezing deposited funds for up to 180 days until disputes were resolved by PayPal. PayPal argued that the plaintiffs were required to arbitrate their disputes under the American Arbitration Association's Commercial Arbitration Rules. The court ruled against PayPal, stating that \"the User Agreement and arbitration clause are substantively unconscionable under California law.\"\nIn September 2002, Bank One Corporation sued PayPal for allegedly infringing its cardless", "that the account was being used for \"activities that encourage, promote, facilitate or instruct others to engage in illegal activity.\" On 8 December 2010 the foundation released a press statement, saying it has filed legal action against PayPal for blocking its account and for libel due to PayPal's allegations of \"illegal activity.\"\nAs a consequence of this activity of collecting donations for Wikileaks, its charitable status has been challenged and later revoked by the German authorities. Its charitable status has been reinstated on 12 December 2012, applied retroactively for 2011 and 2012.", "PayPal History At a 2019 World Economic Forum panel in Davos, founder Luke Nosek stated that PayPal’s initial mission was to \"create a global currency that was independent of interference by these, you know, corrupt cartels of banks and governments that were debasing their currencies\". Nosek said this mission ultimately failed because of investor pressure to release a product as soon as possible. Early history PayPal was established in December 1998 as Confinity, a company that developed security software for handheld devices. PayPal was founded by six persons: Max Levchin, Peter Thiel, Luke Nosek, Ken Howery, Yu Pan and Russel", "to PayPal’s 17 million merchants through the Baidu service. Crimea In January 2015, PayPal ceased operations in the Crimea in compliance with international sanctions against Russia and Crimea. India As of March 2011, PayPal has made changes to the User Agreement for Indian users to comply with Reserve Bank of India regulations. The per transaction limit had been set to USD $3,000, since October 14, 2011. However, on July 29, 2013, PayPal increased the per transaction limit to USD $10,000. This brings the per transaction limit for India in line with the restrictions imposed by PayPal on most other countries.\nPayPal", "the owner of Regretsy, in December 2011. The account was reinstated, and PayPal apologized and donated to her cause.\nIn September 2010, PayPal froze the account of a Minecraft developer, Markus Persson. Persson stated publicly that he had not received a clear explanation of why the account was frozen, and that PayPal was threatening to keep the money if they found anything wrong. His account contained around €600,000.\nPayPal's partner MasterCard ceased taking donations to WikiLeaks in 2010, and PayPal also suspended, and later permanently restricted, payments to the website after the U.S. State Department deemed WikiLeaks activities as illegal. Online supporters", "their old means because if they try the people will switch to dollars or Pounds or Yen, in effect dumping the worthless local currency for something more secure.\nWhen PayPal launched at a successful press conference in 1999, representatives from Nokia and Deutsche Bank sent $3 million in venture funding to Thiel using PayPal on their PalmPilots. PayPal then continued to grow through mergers with Elon Musk's financial services company, X.com, and with Pixo, a company specializing in mobile commerce, in 2000. These mergers allowed PayPal to expand into the wireless phone market, and transformed it into a safer and more", "a commercial credit history. The service also appealed to auction buyers because they could fund PayPal accounts using credit cards or bank account balances, without divulging credit card numbers to unknown sellers. PayPal employed an aggressive marketing campaign to accelerate its growth, depositing $10 in new users' PayPal accounts. Phase 2 Until 2000, PayPal's strategy was to earn interest on funds in PayPal accounts. However, most recipients of PayPal credits withdrew funds immediately. Also, a large majority of senders funded their payments using credit cards, which cost PayPal roughly 2% of payment value per transaction.\nTo solve this problem, PayPal tailored", "X is always over 100% to ensure that the member makes a profit. Members also have even more incentive to build a downline because further commissions are received based on the amount of money that referred members put in or earn.\nThe investment autosurf concept is against PayPal's Acceptable Use Policy . Historically, PayPal blocked most autosurf programs' accounts after the 12DailyPro incident. However, autosurf traffic exchanges that do not have investment options or pay members to surf were allowed to continue or resume using PayPal as a payment processor. Controversy A large amount of controversy is concentrated over whether autosurfs", "The PayPal Mafia is sometimes credited with inspiring the re-emergence of consumer-focused Internet companies after the dot-com bust of 2001. The PayPal Mafia phenomenon has been compared to the founding of Intel in the late 1960s by engineers who had earlier founded Fairchild Semiconductor after leaving Shockley Semiconductor. They are discussed in journalist Sarah Lacy's book Once You're Lucky, Twice You're Good. According to Lacy, the selection process and technical learning at PayPal played a role, but the main factor behind their future success was the confidence they gained there. Their success has been attributed to their youth;", "to notify its customers that ICC-Cal was illegally charging them for currency conversion fees.\nA class-action lawsuit filed in 2010 was settled in 2016, in which the plaintiffs contested PayPal's \"holds\" on funds. PayPal has proposed a settlement in the amount of $3.2 million in Zepeda v. PayPal which has yet to be ratified. As part of the settlement, the company agreed to change some of its policies. CFPB consent On 21 May 2015 PayPal agreed that PayPal Credit would pay a $25 million fine to settle a complaint filed in Federal Court by the Consumer Financial Protection Bureau. The complaint", "Israel, claiming that they arbitrarily freeze accounts and hold funds for up to 180 days without paying interest and thereby directly profit from it. The lawsuit requests that PayPal be declared a monopoly and thus regulated accordingly.\nIn April 2015 The Guardian reported PayPal blocking the account of London-based human rights group Justice for Iran.\nIn May 2015 PayPal blocked an account intended to raise money for the distribution of Boris Nemtsov's report \"Putin. War\". The explanation by PayPal was that \"PayPal does not offer the opportunity to use its system for collecting funds to finance the activities of political parties or", "three-phase strategy described by former eBay CEO Meg Whitman: \"First, PayPal focused on expanding its service among eBay users in the US. Second, we began expanding PayPal to eBay's international sites. And third, we started to build PayPal's business off eBay.\" Phase 1 In the first phase, payment volumes were coming mostly from the eBay auction website. The system was very attractive to auction sellers, most of which were individuals or small businesses that were unable to accept credit cards, and for consumers as well.\nIn fact, many sellers could not qualify for a credit card Merchant account because they lacked" ]
How is Canadian healthcare different from Obamacare?
[ "Canadian healthcare is, more or less, single-payer. Basically, you pay a tax to the government and the government insures you.\n\nAmerican healthcare is a big old mess. We have single-payer for some people (Medicare), full-on nationalized healthcare for some (the Veterans' administration, where doctors are government employees), private insurance for many, and no insurance (fuck you and die) for some. \n\nObamacare is actually working--it's fixing some of the worst problems with private insurance and reducing the number of people with no insurance. But our health care system is still a big old mess. Obamacare didn't create the mess, but it does sort of freeze it in place.\n\nIf you want more detail, I created a comic to explain Obamacare here: _URL_0_.", "The 'why (and if) American healthcare isn't working' would very much break the bias rule if I went on a rant about it, so here's just some bare bones differences between the two.\n\nIn Canada we have \"single payer\" healthcare- the government buys all the equipment and employs healthcare workers. This is seen as a good thing because it [lowers the cost of procedures](_URL_1_) by giving one entity (the government) bargaining power (and eliminates the 'hidden costs' your insurance is supposed to haggle down in American health care.) We don't ever have to put money down to get health care- it's not regular insurance, so you never have a doctors visit only covered 80%. (There are certain things not covered, of course.)\n\nSingle-payer would never have passed in the US, so they compromised and used a partially privatised solution. Americans still use private insurance, but the government introduced subsidies to lower the cost of it, and enacted a large amount of reform, including mandating a minimum amount of coverage they have to offer, laws against different pricing based on sex or pre-existing conditions.\n\nThere are a lot of similarities between the two- the ACA tried to take healthcare to a similar place, covering everyone, through market competition (private hospitals and insurance companies) plus subsidies rather than through a government monopoly on it. Now whether or not they've succeeded... Generally everyone on both sides is unhappy about it, but at least more people have some coverage in the mean time.", "Our healthcare system is run like a business. Affordable Care Act or \"Obamacare\" requires citizens to have health insurance, and requires health insurance companies to cover everyone (There is obviously [more to it than](_URL_2_) that, but that will suffice for this ELI5). That is the difference: we still pay for the health insurance and health care." ]
[ "Fairness for American Families Act Background The Patient Protection and Affordable Care Act (PPACA), commonly called Obamacare or the Affordable Care Act (ACA), is a United States federal statute signed into law by President Barack Obama on March 23, 2010. Together with the Health Care and Education Reconciliation Act, it represents the most significant government expansion and regulatory overhaul of the U.S. healthcare system since the passage of Medicare and Medicaid in 1965.\nThe ACA is aimed at increasing the affordability and rate of health insurance coverage for Americans, and reducing the overall costs of health care (for individuals and the", "American Health Care Act of 2017 Background The ACA (colloquially called \"Obamacare\"), a major reform of health care in the United States, was passed in 2010 by the 111th Congress and signed by President Barack Obama in 2010 after nearly a year of bipartisan debate. The ACA draws from many conservative ideas proposed by the Heritage Foundation in the 1980s and 1990s, which included a mandate that all have coverage (to prevent \"free riders\"), subsidy tax credits, and Medicaid reform. Heritage proposed funding program costs by taxing health insurance premiums paid by employers on behalf of workers (presently exempt from", "and this ruling does not apply outside the province. See: Chaoulli v. Quebec (Attorney General).\nIn November 2005, the Quebec government announced that it would allow residents to purchase private medical insurance to comply with this ruling.\nPrivate insurance from companies such as Blue Cross, Green Shield and Manulife have been available for many years to cover services not covered by the Canadian health care system, such as dental care and some eye care. Private insurance is provided by many employers as a benefit.\nThe Canadian Medical Association (CMA) released a report in July 2007 endorsing private healthcare as a means to improve", "system covered the health care costs of those mothers affected.\nIn 2003, the Government in Canada spent US$2,998 per capita on healthcare as compared to US$5,711 per capita in the United States, while almost every Canadian citizen is fully covered. In the United States, 11.9% of adults lack public or private health coverage, despite higher proportional spending along with large private investment.\nThe lack of competition has given healthcare unions a monopoly on essential services, thus ensuring a very strong bargaining position. Nova Scotia is currently debating healthcare legislation aimed at removing the threat of striking healthcare workers and replacing it with", "to grow stronger and the need for a well-rounded healthcare plan rises. Because Canada's public policies come from the federal government as well as the provincial governments, these two need to work together in order to create a healthcare plan that is beneficial. There are quite a few plans in which one, 65 years of age or older, can apply for in order to ensure they are covered. These include: Old Age Security (OAS), Guaranteed Income Supplement (GIS), Allowance and, Canada Pension Plan (CPP). The OAS is one in which citizens who have lived in Canada for 10 or more", "programs generally provide some form of universal healthcare, which is implemented in a variety of ways. In some cases doctors are employed and hospitals are run by the government, such as in the UK or Spain. Alternatively, the government may purchase healthcare services from outside organizations, such as the approach taken in Canada. Canada Healthcare in Canada is delivered through a publicly funded healthcare system, which is mostly free at the point of use and has most services provided by private entities. The system was established by the provisions of the Canada Health Act of 1984. The government assures the", "both niche markets.\nOpponents of Canadian health care often raise issues such as long wait times, a 'brain-drain' drawing qualified professionals away from Canada to other jurisdictions where working in the health care field is more profitable, and impairment of the Canadian health care system due to budget cuts. Fox News ran a story in 2007 reporting that during a period of above average numbers of births, at least 40 Canadian mothers of premature babies had to travel to the U.S. for treatment due to insufficient capacity for premature babies in British Columbia neonatal units. Nonetheless, Canada's health care", "the private sector to do it better.\nMassachusetts has adopted a universal health care system through the Massachusetts 2006 Health Reform Statute. It mandates that all residents who can afford to do so purchase health insurance, provides subsidized insurance plans so that nearly everyone can afford health insurance, and provides a \"Health Safety Net Fund\" to pay for necessary treatment for those who cannot find affordable health insurance or are not eligible.\nIn July 2009, Connecticut passed into law a plan called SustiNet, with the goal of achieving health care coverage of 98% of its residents by 2014.", "health care reform have increasingly encouraged physicians to work in multidisciplinary teams, and be paid through blended funding models, including elements of capitation and other 'alternative funding formulas'. Similarly, some hospitals (particularly teaching hospitals and rural/remote hospitals) have also experimented with alternatives to fee-for-service.\nIn summary, the system is known as a \"public system\" due to its public financing, but is not a nationalized system such as the UK's NHS: most health care services are provided privately.\nAn additional complexity is that, because health care is deemed to be under provincial jurisdiction, there is not a \"Canadian health care system\". Most providers", "equal access across the country and especially in rural areas, portability because abortion is excluded from the standard reciprocal billing between provinces, accessibility because of lack of clinics in some provinces, and possibly public administration because private clinics are forced to administer its costs.\nIn Canada, general oral health care is not included in the Act. Most Canadians receive oral health care through privately operated dental clinics and pay for services through insurance or by paying for it themselves. Some dental services are covered through government dental programs.\nFuture Saskatchewan Member of the Legislative Assembly Ryan Meili stated \"Extra-billing in Ontario, private", "the Patient Protection and Affordable Care Act, also known as the \"ACA\" or \"Obamacare\". According to the United States Census Bureau, in 2012 there were 45.6 million people in the US (14.8% of the under-65 population) who were without health insurance. Following the implementation of major ACA provisions in 2013, this figure fell by 18.3 million or 40%, to 27.3 million by 2016 or 8.6% of the under-65 population.\nHowever, under President Trump these gains in healthcare coverage have begun to reverse. The Commonwealth Fund estimated in May 2018 that the number of uninsured increased by 4 million from early 2016", "them receive it through their employers. Private-sector services not paid for by the government account for nearly 30 percent of total health care spending.\nIn 2005, the Supreme Court of Canada ruled, in Chaoulli v. Quebec, that the province's prohibition on private insurance for health care already insured by the provincial plan violated the Quebec Charter of Rights and Freedoms, and in particular the sections dealing with the right to life and security, if there were unacceptably long wait times for treatment, as was alleged in this case. The ruling has not changed the overall pattern of health insurance across Canada,", "\"equal accessibility\" tenets of the Canada Health Act. Some politicians and medical professionals have proposed allowing public funding for these hospitals. Workers' Compensation Boards, the Canadian Forces, the RCMP, federally incarcerated prisoners, and medical care for which an insurance company has liability (e.g., motor vehicle accidents) all pay for health care outside of the public systems in all provinces.\nIn Quebec, a recent legal change has allowed this reform to occur. In June 2005, the Supreme Court of Canada overturned a Quebec law preventing people from buying private health insurance to pay for medical services available through the publicly funded system", "United States is provided by many separate legal entities. Health care facilities are largely owned and operated by the private sector. Health insurance in the United States is now primarily provided by the government in the public sector, with 60–65% of healthcare provision and spending coming from programs such as Medicare, Medicaid, TRICARE, the Children's Health Insurance Program, and the Veterans Health Administration. Having some form of comprehensive health insurance is statutorily compulsory for most people lawfully residing within the US.\nMedicare is a social insurance program administered by the United States government, providing health insurance coverage to people who are", "and limited health care options” for Native Americans in the United States. Insurance coverage is held by the majority of Native Americans, but 33% of American Indians and Alaska Natives do not possess health insurance. About 36% did have private health insurance to cover their medical care, while 24% relied on Medicaid provided through the federal government. In addition to these services available to all Americans, the need for health care for Native Americans has been addressed by the American government. Currently there is a division of the U.S. Department of Health and Human Services called the Indian Health Service.", "primary care physician in the United States is 47 years old, and one quarter of all primary care physicians are nearing retirement. Fifty years ago roughly half of the physicians in America practiced primary care; today, fewer than one third of them do.\nThe medical home model is intended to help coordinate care with the primary care provider the center of the patient's healthcare. US Strategies to Address the Primary Care Shortage The Patient Protection Affordable Care Act contains a number of provisions to increase primary care capacity. These provisions are directed towards medical school graduates and include payment reform, student", "American Health Care Act because it has more bad policy than any bill I have ever faced.\" On May 4, 2017 Brooks voted to pass the American Health Care Act, which would repeal the Patient Protection and Affordable Care Act.\nIn an interview with CNN's Jake Tapper, Brooks controversially argued that the AHCA \"will allow insurance companies to require people who have higher health care costs to contribute more to the insurance pool. That helps offset all these costs, thereby reducing the cost to those people who lead good lives, they're healthy, they've done the things to keep their bodies healthy. And", "or there are government subsidies. For instance, in North America, KinderCare Learning Centers, one of the largest of such companies, has approximately 1,600 centers located in 39 states and the District of Columbia. Bright Horizons Family Solutions another of the largest has over 600 daycare centers. Similarly the Australian government's childcare subsidy has allowed the creation of a large private-sector industry in that country.\nAnother factor favoring large corporate daycares is the existence of childcare facilities in the workplace. Large corporations will not handle this employee benefit directly themselves and will seek out large corporate providers to manage their corporate daycares.", "for families who do not qualify for Medi-Cal or Healthy Families due to either income or immigration status. It was expanded to children ages 6–18 in 2004. L.A. Care announced that the Healthy Kids programs would end at the end of 2016 as a result of SB 75 – a California law implemented in May 2016 – which expanded full-scope Medi-Cal benefits to all low-income children regardless of immigration status.\nIn 2008, L.A. Care launched the Medicare Advantage Special Needs Plan (SNP) for those dually-eligible for both Medi-Cal and Medicare. L.A. Care closed the Medicare SNP on December 31, 2014, as", "Implementation history of the Patient Protection and Affordable Care Act The Patient Protection and Affordable Care Act, often shortened to the Affordable Care Act (ACA) or nicknamed Obamacare, is a United States federal statute enacted by the 111th United States Congress and signed into law by President Barack Obama on March 23, 2010. Together with the Health Care and Education Reconciliation Act of 2010 amendment, it represents the U.S. healthcare system's most significant regulatory overhaul and expansion of coverage since the passage of Medicare and Medicaid in 1965. Once the law was signed, provisions began taking effect, in a process", "world. In 2013, Bloomberg ranked Israel as having the fourth most efficient healthcare system in the world, surpassed only by Hong Kong, Singapore, and Japan.\nIsrael's medical facilities are recognized worldwide for their high standards of health services, top-quality medical resources and research, modern hospital facilities, and an impressive ratio of physicians and specialists to the population. Israeli doctors make NIS 20,000–24,000 (US$5,000–$6,000) per month.\nIsrael has one of the highest life expectancies at birth in the world, ranking 8 out of 224 nations (2009), with an average life expectancy of 80.73. However, Israel's Arab population has a life expectancy of 75.9", "Healthcare in England Healthcare in England is mainly provided by England's public health service, the National Health Service, that provides healthcare to all permanent residents of the United Kingdom that is free at the point of use and paid for from general taxation. Since health is a devolved matter, there are differences with the provisions for healthcare elsewhere in the United Kingdom. Though the public system dominates healthcare provision in England, private health care and a wide variety of alternative and complementary treatments are available for those willing to pay. National Health Service (NHS) The National Health Service (NHS)", "Program that provides children enrolled in Medicaid more access to primary care.", "by older, sicker patients and decreased supply of primary care practitioners has led to a crisis in primary care delivery. The research identified a set of innovations that could enhance the quality, efficiency and effectiveness of primary care in the United States.\nOn March 23, 2010 President Obama signed the Patient Protection and Affordable Care Act (ACA) into law. The law is estimated to have expanded health insurance coverage by 20 million people by early 2016 and is expected to expand health care to 34 million people by 2021. The success of the expansion of health insurance under the ACA in", "have data suggesting that the Affordable Care Act supplements Native American healthcare. With the two services, tribes have greater flexibility in health care availability. Tribes have direct access to IHS funds, which can be administered via contracts and other arrangements made with providers. However, it alters trust relationships. The Affordable Care Act provides an opportunity for uninsured adults to gain Medicaid coverage. Although half of the uninsured adults are white, increases in coverage expand to all races to substantially reduce racial gaps in health insurance coverage. With new outreach and enrollment efforts, streamlined enrollment systems, penalties for not having health", "to those who suffer on a social standard. Provincial insurance plans Though the Canada Health Act provides national guidelines for healthcare, the provinces have exclusive jurisdiction over health under the constitution and are free to ignore these guidelines, although if they ignore the guidelines, the federal government may deny federal funding for healthcare. All provinces currently abide by the Canada Health Act in order to receive this funding; however the Alberta legislature has considered proposals to ignore the Act to allow them to implement reforms not allowed under the Act.\nThe federal government has no direct role in the delivery of", "similar to the United States health system, medical care is provided by private physicians and by private and public hospitals and patients have free choice of physicians. In addition, most people receive health insurance coverage through their workplace and health insurance is provided by multiple third-party insurers (Chernichovsky, 1995). On the other hand, planned/public-based health systems such as in the United Kingdom expects that healthcare is a right (Chernichovsky, 1995). As such, health demands are provided directly through budgeting and management of providers. Low and middle income countries (LMICs) are placed in between these continuum. In most LMICs, various", "Keep Your Health Plan Act of 2013 Background The Obama Administration announced on November 12, 2013, that in October 2013 only 27,000 people had been able to use HealthCare.gov to purchase insurance from the federal government. Provisions of the bill The Keep Your Health Plan Act of 2013 would permit a health insurance issuer that has in effect health insurance coverage in the individual market as of January 1, 2013, to continue offering such coverage for sale during 2014 outside of a health care exchange established under the Patient Protection and Affordable Care Act. The bill would treat such coverage", "Public health insurance option The public health insurance option, also known as the public insurance option or the public option, is a proposal to create a government-run health insurance agency that would compete with other private health insurance companies within the United States. The public option is not the same as publicly funded health care, but was proposed as an alternative health insurance plan offered by the government. The public option was initially proposed for the Patient Protection and Affordable Care Act, but was removed after Sen. Joe Lieberman (I-CT) threatened a filibuster. Debate in 2009–10 The public", "an ailing healthcare system. Dr. Brian Day, who acted as President of the CMA in 2007/2008, is the owner of the largest private healthcare hospital in Canada and a proponent of mixed public and private healthcare in Canada. Canadian Health Practitioner standards It is generally accepted that physicians arriving in Canada from other countries must meet Canadian Health Practitioner standards. So there is concern that doctors from other countries are not trained or educated to meet Canadian standards. Consequently, doctors who want to practise in Canada must meet the same educational and medical qualifications as Canadian-trained practitioners. Others suggest" ]
Why do app developers like supercell release their updates/apps way earlier on one platform than the other?
[ "If you're referring to the time gap between Android and iOS releases, the answer is because of Apple.\n\nThings get on the Android market very easily and quickly, because the Android market is cool. Apple has dozens of excessive rules and guidelines that they strictly enforce, so they actually look through the app/code. This takes time, so they usually push the update to Android and iOS at the same time, and Apple takes forever to approve.\n\nedit: of course this doesn't mean that Android doesn't have or enforce guidelines. They just aren't ridiculous like Apple's." ]
[ "cumulative downloads by June 27, 2009; 30 official and 31 unofficial apps by July 13, 2009; 1,000 official apps by January 1, 2010; 4,000 official apps September 29, 2010; and 10,002 official apps on December 9, 2011.\nSubsequently, the number of available apps decreased because many apps were withdrawn from the App Catalog by their owners. Examples include the apps for The New York Times and Pandora Radio. After a Catalog splash screen on November 11, 2014 announcing its depreciation, the HP App Catalog servers were permanently shut down on March 15, 2015. The number of functional apps remaining at that", "App Store, the developers pulled the app from the store in December 2015 and instead sold it through their own website. Bohemian Coding cited Apple's strict technical guidelines, slow review process and lack of upgrade pricing as reasons for the decision. On 8 June 2016, Bohemian Coding announced on their blog that they were switching to a new licensing system for Sketch. Licenses would allow users to receive updates for 1 year, after which they could continue using the last version published prior to the license expiring, or renew their license to continue receiving updates for another year.", "the official launch taking place in January 2011 with the release of its 10.6.6 \"Snow Leopard\" update.\nIn February 2013, Apple informed developers that they could begin using appstore.com for links to their apps. In June at its developer conference, Apple announced an upcoming \"Kids\" section in App Store, a new section featuring apps categorized by age range, and the section was launched alongside the release of iOS 7 in September 2013.\nIn November 2014, due to pressure from the European Commission, Apple updated App Store so that all apps that have no charge to download are labeled \"Get\" instead of the", "updates can be installed on devices over-the-air. The latest major release is Android 10.\nCompared to its primary rival mobile operating system, Apple's iOS, Android updates typically reach various devices with significant delays. Except for devices within the Google Nexus and Pixel brands, updates often arrive months after the release of the new version, or not at all. This was partly due to the extensive variation in hardware in Android devices, to which each upgrade must be specifically tailored, a time- and resource-consuming process. Manufacturers often prioritize their newest devices and leave old ones behind. Additional delays can be introduced by", "included demonstrations of what can be done, but the true power of what’s under the hood will be realized over the coming days, weeks and months\" as third-party developers gradually incorporate new features into their apps.\nOn September 23, 2014, \"roughly a week\" after the release of iOS 8, user adoption of iOS 8 had reached 46%. In October 2014, Andrew Cunningham of Ars Technica reported that iOS 8 user adoption rate had \"stalled\", only climbing \"a single percentage point\" since the previous September measurement of 46%. Cunningham blamed the \"over-the-air\" update requiring 5 gigabytes to install, an \"unusually large amount\" that", "of existence. To get applications into the App Store, developers were required to submit their app and wait for approval or rejection by Apple. Rejected apps were given feedback on the reason they were rejected so they could be modified and resubmitted.\nThe approval process for Apple has changed over time in terms of its feedback to developers and the time delay for apps to be approved. In July 2009, the application could take weeks. Apple streamlined the process at the end of 2009, and some apps were processed in a few days. In addition, in December 2009, the", "Google Reader. By April 2, 2013, the total number of new users was up to 3 million. At the end of May 2013, the total user number was up to 12 million. Android and iOS app The Feedly mobile application is available for iOS (iPhone, iPad), and Android devices. All versions of the app run on Streets (DevHD's other project), which allows for the application to run on the same code for all devices. Running the same code across multiple platforms lets the developers release updates faster because they are only working with one version. Like its web counterpart, the", "software licensed under the GNU General Public License (GPL) from App Store, due to text in Apple's Terms of Service agreement imposing digital rights management and proprietary legal terms incompatible with the terms of the GPL. Large-scale app removals On September 1, 2016, Apple announced that starting September 7, it would be removing old apps that do not function as intended or that don't follow current review guidelines. Developers will be warned and given 30 days to update their apps, but apps that crash on startup will be removed immediately. Additionally, app names registered by developers cannot exceed 50 characters,", "on template apps when they do not possess the resources to develop apps in-house\", and that the new rules cast \"too wide a net\", specifically \"invalidating apps from longstanding and legitimate developers who pose no threat to the App Store’s integrity\". Additionally, the news of stricter enforcement caused significant criticism from app development firms; one company told TechCrunch that it chose to close down its business following the news, saying that \"The 4.2.6 [rule enforcement] was just a final drop that made us move on a bit faster with that decision [to close]\", and another company told the publication that", "AppsBuilder 2.1 which, though numbered as a simple point update, contained a significant number of new features such as the ability to visually create Widgets (user created controls). This was followed in close succession by the release of version 2.2 which established the new Package and Widget features formerly introduced in 2.1 as the basis on which to build controls for independent distribution.\nIn May 2010, Morfik 3.0 went into beta testing introducing a change in the way application and websites are designed in order to provide direct support for Search Engine Optimization and facilitate the process of designing the", "apps will be automatically restored. iOS 9 also features \"app thinning\" functionality, whereby only the necessary assets needed to run apps on each individual device is downloaded rather than the entire app, potentially saving space. Multitasking iOS 9 adds a number of features to the iPad to improve productivity. These include Slide Over, Split Screen, and Picture in Picture, for enhanced multitasking, similar to the experience found on OS X El Capitan. Slide Over allows the user to pull in a second app with a swipe from the right edge of the display. This app takes up 1/3 of the", "the same model as Apple with in-app subscriptions on the App Store. Installation history The Play Store app features a history of all installed apps. Users can remove apps from the list, with the changes also synchronizing to the Google Play website interface, where the option to remove apps from the history does not exist. Compatibility Google publishes the source code for Android through its \"Android Open Source Project\", allowing enthusiasts and developers to program and distribute their own modified versions of the operating system. However, not all these modified versions are compatible with apps developed for Google's official Android", "grew to process US$1.78 billion worth of apps. iTunes App Store had 435,000 apps as of July 11, 2011, while Google Play had 438,000 as of May 1, 2012. By 2016, Apple's App Store had surpassed 2 million total apps and Apple had paid out close to $50 billion in revenue to developers. Industry predictions estimate that by 2020, the App Store will hold over 5 million apps.\nAs the number of apps in app stores has grown, the possibility of any one app being found has dropped. This has led to the realization of how important it is to be", "in an attempt to stop developers from inserting long descriptions or irrelevant terms in app names to improve the app's ranking in App Store search results. App intelligence firm Sensor Tower revealed in November 2016 that Apple, as promised from its September announcement of removing old apps, had removed 47,300 apps from App Store in October 2016, a 238 percent increase of its prior number of average monthly app removals.\nIn June 2017, TechCrunch reported that Apple had turned its app removal focus on apps copying functionality from other, popular apps. An example cited included \"if a popular game like Flappy", "how the new version of the app would integrate with newer music platforms such as Apple Music and Spotify. Android Winamp for Android is a mobile version for the Android (version 2.1) operating system, released in beta in October 2010 with a stable release in December 2010. It includes syncing with Winamp desktop (ver. 5.59 beta+) over USB or WiFi. It was received with some enthusiasm in the consumer blog press. The app was removed from the Play Store in 2014.\nIt was reported by TechCrunch that a redesigned Android app was planned alongside the announcement of the development of Winamp", "the old kind of extensions was deprecated and replaced by the new, more safe, one, available exclusively on the Mac App Store). Apple Support Download section also remains online, as it provides mostly security updates for current and older software applications and operating systems, many dating back to before 1998. Counterfeit apps Not long after independent game developer Wolfire Games placed its game, Lugaru, on Mac App store, as Lugaru HD for $9.99, the developer noticed a counterfeit copy of their game also being sold on the App Store for $0.99 USD. The developer contacted Apple on January 31,", "company reported the following month that Apple rejected its application to Apple's app, citing \"violence towards children\" violating content policies. Nicalis has worked with Apple to obtain preapproval and will release a universal iOS version of Rebirth (including the Afterbirth+ expansion) with improvements for that platform, including the use of iCloud for ease of play on multiple devices. Although Nicalis wants to add this to the Vita port, the company said it was a low priority due to the Vita's limited ability to handle many weapon combos. The initial iOS version of the core game, without expansions, was released on", "middleman between operators and developers that further reduced the revenue share seen by developers.\nThe launch of Apple's App Store in 2008 radically changed the market. First of all, it widened consumers' opportunities to choose where to download apps; the application store on the device, operator's store or third party stores via the open internet, such as GetJar and Handango. The Apple users, however, can only use the Apple App Store, since Apple forbids the distribution of apps via any other distribution channel. Secondly, mobile developers can upload applications directly to the App Store without the typically lengthy negotiations with publishers", "what extensions they install.\nThere have also been cases of applications installing browser extensions in a sneaky manner, while making it hard for the user to uninstall the unwanted extension.\nSome Google Chrome extension developers have sold their extensions to third-parties who then incorporated adware. In 2014, Google removed two such extensions from the Chrome Web Store after many users complained about unwanted pop-up ads. The following year, Google acknowledged that about five percent of visits to its own websites had been altered by extensions with adware.", "change at any time. Essentially the guidelines are put in place to prevent problems with pornography, violence, legal issues, user experience, and other more specific guidelines in apps. Apple checks each app against these guidelines before approving it for sale and inclusion on the App Store.\nApps that get featured will get promoted by Apple within the App Store, typically within a specific app category. There are no specific guidelines for getting an app featured, but in some notable cases, app developers that gather feedback directly from Apple before releasing their app have indicated that this improves chances of getting featured.", "for sites like VersionTracker. App stores like the Mac App Store, in which applications can be searched, purchased, and kept up to date, further reduced the audience for VersionTracker, and download sites in general.", "date.\nAs of 2013, Apple employed mostly static analysis for their app review process, which means that dynamic code reassembly techniques could defeat the review process.\nIn June 2017, Apple updated its App Store review guidelines to specify that app developers will no longer have the ability to use custom prompts for encouraging users to leave reviews for their apps. With the release of iOS 11 in late 2017, Apple will also let developers choose whether to keep current app reviews when updating their apps or to reset. Additionally, another update to App Store policies allows users to optionally \"tip\" content creators,", "networks. Snell noted that the App Store's design had been unchanged for years, but received a full redesign in iOS 11, and wrote that Apple's commitment to editorial pages was \"impressive\", making the App Store \"a richer, more fun experience\". Regarding the introduction of augmented reality, he stated that most apps using it were \"bad\", though some also \"mind-blowingly good\", adding that the \"huge potential\" depended on how third-party apps were using it. Snell also praised improvements to the iPad experience, including multitasking and drag-and-drop across apps, the latter of which he stated \"actually surpasses my expectations\" due to ease", "App Store at the start of 2011, the VLC project re-licensed the VLC library, from the GPLv2 to the LGPLv2, to achieve better compatibility. In July 2013, the software re-licensed under the Mozilla Public License, the VLC application would then be resubmitted to the iOS App Store.\nThe Free Software Foundation's GNU Free Documentation License version 1.2 is not compatible with the widely used Creative Commons Attribution-ShareAlike license, which was a problem for Wikipedia, for instance. Therefore, at the request of the Wikimedia Foundation, the FSF added a time-limited section, to version 1.3 of the GFDL, that allowed specific types of", "companies working on Triple-A titles created their own apps company to open up another access point that they didn't have before. Sony was the first between the two big console developers to follow this trend, which led to Lanning's criticism of Microsoft at E3 in 2013, which was reluctant to allow independent developers onto its console as easily as Sony did with the PlayStation.\nLanning's plan to transform Oddworld Inhabitants from a game-developing studio to a self-sustaining micro-publisher independent of \"disconnected investor demands,\" with an ability to communicate with its audience, is where Lanning says the independent developer movement needs to", "to performance and responsiveness on a wide variety of Android devices. The Verge wrote that the development team had tested the app on devices not for sale in the United States, particularly low-end models like Samsung Galaxy Y, in an effort to improve the app for its userbase located outside the U.S. Engineering manager Philip McAllister told The Verge that \"More than 60 percent of our users are outside the US, and Android covers roughly half of total Instagram users\". The second update, introduced in April 2017, added an offline mode, in which content previously loaded in the news feed", "App Store is not supported by Apple, the stated reason being that such native applications could be broken by any software update, but Apple has stated it will not design software updates specifically to break native applications other than those that perform SIM unlocking.\nAs of October 2013, Apple has passed 60 billion app downloads. As of September 2016, there have been over 140 billion app downloads from the App Store.\nAs of January 2017, the App Store has over 2.2 million apps for the iPhone. Reception The original iPhone has been described as \"revolutionary\", a \"game-changer\" for the mobile phone industry, and has been credited with helping", "is introduced as a new location to the game. The app supports kml and gpx files, photo/bitmap image importing, and GPS tracing of real-life driving routes. Imported tracks can be used in arcade mode races, time trials, and shared online. The app was an immediate hit with journalists. In the first 24 hours, over 5000 users of the Android store had downloaded the app, and had given it a rating of 4/5. A week later, the Android store had had 10,000 downloads.\nIt was announced that the editor will be taken off the App Store the same time the servers go", "iOS was developed by a third party company that has since gone bankrupt. According to a company representative, Ronimo Games never owned the source code, and therefore has no plans to release an update that will run on current Apple mobile devices. Sequel At the end of February 2014, it was announced that a sequel was in development. It will feature the Vikings versus two new factions, one of which will be demons. Players will be able to control the location of their base and tell units where to move.", "enabled an opt-out feature for iAds, Apple's developer-driven advertisement system. The app was removed shortly afterwards for violating guidelines.\nIn April 2013, Apple removed AppGratis, a then-successful app store market that promoted paid apps by offering one for free each day. Apple told All Things Digital that the app violated two of its developer agreement clauses, including \"Apps that display Apps other than your own for purchase or promotion in a manner similar to or confusing with the App Store will be rejected\" and \"Apps cannot use Push Notifications to send advertising, promotions, or direct marketing of any kind\". Apple did," ]
Why doesn't the SAP button work in reverse
[ "conjecture:\n\nEnglish speakers don't watch the shows, so they are not translated.\n\nThe shows are not translated because English speakers do not watch the shows." ]
[ "can change the button to a 'Back' button, there is no way to add a 'Forward' button. However, as the browser supports swipe navigation for both forwards and back, this is a minor issue. Multitasking Unlike its predecessor, Windows Phone 8 uses true multitasking, allowing developers to create apps that can run in the background and resume instantly.\nA user can switch between \"active\" tasks by pressing and holding the Back button, but any application listed may be suspended or terminated under certain conditions, such as a network connection being established or battery power running low. An app running in the", "is used for selecting options and navigating menus, with the \"C\" button as an 'undo' or 'delete' button, and the arrow-labelled button as a 'return' or 'back' button. The two buttons labelled by white horizontal lines, known as 'hotkeys' or 'soft keys' perform the function of making binary decisions, labelled on the phone's display. The button in between of these 'soft keys' acts as a shortcut key, which brings up a user-customisable shortcut menu when pressed. The on/off button is located on the top of the phone next to the IrDA port.\nThere is one side key on the left of", "user to that level, instead of repeatedly pressing the Back button or pressing the up button. This is roughly analogous to what is possible prior to Windows Vista by pressing the small down-arrow next to \"Back\" and selecting any folder from a list of previously accessed folders. It makes the \"Up One Level\" button obsolete so that is removed. It is also possible to navigate to any subfolder of the current folder using the arrow to the right of the last item, or to click in the space to the right of this to copy or edit the path manually.", "stickers \"Any key\" to the reset buttons of their office computers, causing their less experienced colleagues to misinterpret the message – to considering it just as being a sarcasm about software-related difficulties solving skills of novice users (seeing a message you didn't expect? ahh, panic! don't even try to read it and understand!! just press reset!!!), or a Murphy's law-similar pessimism about actual resolvability of some types of work-flow problems caused by bugs in software.", "to the lower left corner of the primary display on fresh systems.\nUsers can choose whether to turn the Control Strip on and off and even set a hot key to hide and reveal it using its control panel. Two buttons at either end allow the Strip to be collapsed and expanded (with the one opposite the screen edge also allowing the strip to be resized when dragged), while two more buttons just inside those allow one to scroll through a very full Strip. Holding down the option key while clicking turns the cursor into a distinctive hand shape that allows", "the Start button has been updated to support Fitts's law. To help the user access a wider range of common destinations more easily from a single location, the Start menu was expanded to two columns; the left column focuses on the user's installed applications, while the right column provides access to the user's documents, and system links which were previously located on the desktop. Links to the My Documents, My Pictures and other special folders are brought to the fore. The My Computer and My Network Places (Network Neighborhood in Windows 95 and 98) icons were also moved off the", "with making changes to the content of the file. As a result, users who were more familiar with the logic of the old menus would be somewhat frustrated with the new, more visually oriented ribbon. PC World has stated that upgrading to Office 2007 presents dangers to certain data, such as templates, macros, and mail messages. The ribbon cannot be moved from the top to the side of the page, as floating toolbars could be.\nSome users with experience using previous versions of Microsoft Office have complained about having to find features in the ribbon. Others state that having learnt to", "that … Usage in menus In computer menu functions or buttons, an appended ellipsis means that upon selection a dialog will be displayed, where the user can or must make a choice. If the ellipsis is missing, the function is immediately executed upon selection.\nE.g., the menu item \"Save\" indicates that the file will be overwritten without further input, whereas \"Save as…\" indicates that a dialog follows where the user can, for example, select another location, file name, or format. Programming languages A two- or three-dot ellipsis is used as an operator in some programming languages. The precise meaning varies by", "top and folders appear at the bottom. Hovering the mouse over a folder does not open it; the folder needs to be clicked. A limitation of the new Start menu is that subfolders inside the All Programs menu cannot be opened simply by searching or double clicking. Also, as more programs are installed, a vertical scroll bar appears between the two columns. A dynamically changing icon showing the user's display picture by default is present at the top of the right column. It changes as users hover over any other item to reflect that item's icon. The Power button's action", "of a dialog box is the about box found in many software programs, which usually displays the name of the program, its version number, and may also include copyright information. Modeless Non-modal or modeless dialog boxes are used when the requested information is not essential to continue, and so the window can be left open while work continues elsewhere. A type of modeless dialog box is a toolbar which is either separate from the main application, or may be detached from the main application, and items in the toolbar can be used to select certain features or functions of", "most often to mean Stop. This use continues today in Microsoft Windows's use of escape as a shortcut in dialog boxes for No, Quit, Exit, Cancel, or Abort, as well as a common shortcut key for the Stop button in many web browsers.\nOn machines running Microsoft Windows, prior to the implementation of the Windows key on keyboards, the typical practice for invoking the \"start\" button was to hold down the Control key and press escape. This key combination still works as of Windows 10.\nMicrosoft Windows makes use of \"Esc\" for many key shortcuts. Many of these shortcuts have", "including the error code, was displayed in the dialog. In some cases, a \"Resume\" button would be available, allowing the user to dismiss the dialog and force the offending program to quit, but most often the resume button would be disabled and the computer would have to be restarted. Originally, the resume button was unavailable unless the running program had provided the OS with code to allow recovery. With the advent of System 7, if the OS thought it could handle recovery, a normal error dialog box was displayed, and the application was forced to quit. This was helped by", "\"system bar\" across the bottom of the screen, removing the need for physical equivalents. The \"Menu\" button that was present on previous generations of Android devices is deprecated, in favor of presenting buttons for actions within apps on \"action bars\", and menu items which do not fit on the bar in \"action overflow\" menus, designated by three vertical dots. Hardware \"Search\" buttons are also deprecated, in favor of search buttons within action bars. On devices without a \"Menu\" key, a temporary \"Menu\" key is displayed on-screen while running apps that are not coded to support the new navigation scheme. On", "appearance from the ribbon tabs in the Office 2007 interface and was positioned away from them, with a target that extended toward the upper left corner of the screen in accordance with Fitts's law. Microsoft has stated that this button enhanced the usability of Office, but many users saw it as \"branding decoration, rather than a functional button.\" As a result, in Office 2010 it was replaced with a File tab that appears next to the other tabs in the ribbon instead of the upper left-hand corner of the screen. The File tab is colored on a per-app basis (e.g.,", "the top switch is on (and the bottom switch is off), both sources are connected.\nIn reality, it is impossible to have a perfect synchronization between the switches. At one point during the commutation, they would be either both on (thus shorting the voltage source) or off (thus leaving the current source in an open circuit). This is why one of the switches has to be replaced by a diode. A diode is a natural commutation device, i.e. its state is controlled by the circuit itself. It will turn on or off at the exact moment it has to. The consequence", "allows users to select from them by sliding on the spacebar. The autocomplete dictionary is also automatically updated using data from Bing, allowing it to recognize and suggest words relating to current trends and events. Similarly to Windows Phone, certain apps now display a narrow bar with three dots on it to indicate the presence of a pop-up menu accessible by swiping, clicking on the dots, or right-clicking.\nTo improve the usability of the desktop interface, a visible Start button was restored to the taskbar for opening the Start screen, and the Quick Links menu (accessed by right-clicking the Start button", "Reset button Personal computers The reset button could be an actual button or concept. The reset button would typically kick off a soft boot, instructing the computer to go through the process of shutting down, which would clear memory and reset devices to their initialized state. Contrary to the 'Power Button', which would simply remove power immediately.\nPressing the reset button would be preferable to the power button, which could potentially leave a device in the middle of some operation and subject to defect. In most commodity hardware, the consumer would expect the device to be resilient enough to 'reset' when", "file directory. Restarting an Office program after crashing prompts the user to save the last recovered version. However, this does not protect users who mistakenly click \"No\" when asked to save their changes if Excel closes normally (except for Office 2013 and later). Autosave also syncs documents to OneDrive when editing normally.\nMac OS 10.7 Lion added an autosave feature that is available to some applications, and works in conjunction with Time Machine-like functionality to periodically save all versions of a document. This eliminates the need for any manual saving, as well as providing versioning support through the same system.", "other. One of the corollaries of the Schmitt trigger's use of positive feedback is that, should the input voltage move gently down again past the same threshold, the positive feedback will hold the output in the same state with no change. This effect is called hysteresis: the input voltage has to drop past a different, lower threshold to 'un-latch' the output and reset it to its original digital value. By reducing the extent of the positive feedback, the hysteresis-width can be reduced, but it can not entirely be eradicated. The Schmitt trigger is, to some extent, a latching circuit.\nAn electronic", "which is normally-off (i.e. push-to-make) and a \"stop\" switch which is normally-on (i.e. push-to-break).\nWhen the motor is not running, although line voltage is available, no current is drawn by the starter or motor.\nWhen the \"start\" button is pressed, the motor is not powered directly, rather the electromagnet in the contactor is energized. The magnetic switch in the contactor then engages, simultaneously switching current to the motor and providing self-sustaining current to maintain its own state. Thus when the start button is released, the magnetic switch remains engaged and the motor remains running.\nPressing the \"stop\" button breaks the circuit", "End key Microsoft Windows In modern Microsoft Windows text editing applications, the End key is primarily used to move the cursor to the end of the line in which it is positioned. When the text is not editable, it is used to scroll to the end of the document; this can also be done in editable text if the key is pressed along with Control.\nThe End key can also be used to highlight all the characters after the cursor in a certain line if pressed along with ⇧ Shift in editable text. Mac OS X In most Mac OS X", "right. These icons can be activated by dragging them upwards. Phone calls After dragging the phone icon up to unlock the phone a dial pad will appear; this gives the user both the flexibility to dial and access contacts. After dialing one can choose to put the call on speaker, mute, hold, and record, check contacts list or end the call by pressing the orange box at the bottom. All this commands appear on the screen during the time of the phone call. Text To write a text message first press the “TYPE TO COMPOSE” button and the keyboard will", "keypad), its space instead filled with a double-size Delete key.\nWhen keymapping using Octal code, set the desired key by sending \\e\\161 to perform the \"insert\" function. Application usage Modern word processing applications operate in insert mode by default, but can still be switched to overtype mode by pressing the Insert key. Some applications indicate overtype mode with a letter-width cursor box, as opposed to the standard narrow cursor; however, others use the narrow cursor for both modes, and indicate overtype with an \"OVR\" indicator in the status bar.\nThe Insert key, when pressed along with Control or Shift, can also be", "to get in line, slowing down the application. This is particularly a problem in clustered databases, which may require the block to be copied from one computer's memory to another's to allow the next user to perform their insert.\nReversing the key spreads similar new values across the entire index instead of concentrating them in any one leaf block. This means that 24538 appears on the same block as 14538 while 24539 goes to a different block, eliminating this cause of contention. (Since 14538 would have been created long before 24538, their inserts don't interfere with each other.) Querying data Reverse", "when turning on the unit. The entire LED screen shows. The user presses the blue buttons one at the time, a big \"OK\" appears in the programming grid after last button. The user turns the unit off and then on to exit test mode and go back to normal mode.", "refresh mechanism that follows Apple’s platform conventions, Brichter’s work with pull-to-refresh resulted in a novel interaction new to Apple’s platform at the time. Creation In the initial design of Tweetie’s refresh mechanism, Brichter placed a refresh button at the top of the Tweet list because users typically expected new tweets to appear at the top of the page. This design rolled out in Tweetie Version 1.0. Although it provided users with the ability to refresh their Twitter feed, the button utilized valuable screen real estate that Brichter wanted to use for other features. Brichter said “Tweetie 1.0 (with the refresh", "two small control boxes. One of them is an electrical control box, with a speed adjustment knob, attached to the main box by an electrical cable. The other is a pneumatic control box, linked by a rubber tube to the diaphragm chamber, and has two push-buttons, one to add air to the system, and the other to remove air from the system. The final adjustment possible is an internal adjustment that can be used to change the amplitude of the pumping motion, but this is not available in operation, as adjusting it requires the main box of the machine to", "the down arrow key. An application can be used to change this behaviour. Linux In Linux, the End key has basically the same functionality as it does on Windows. It positions the cursor at the end of a line in editable text, and otherwise scrolls a scrollable document to the end. Also, like Windows, the End key can be used to highlight all the characters after the cursor in a certain line if pressed along with ⇧ Shift in editable text. Non-GUI applications In older screen-oriented, text-based (non-GUI) applications, the user pressed the \"End\" key to indicate that they had", "Another recent innovation is intelligent sensors that detect someone standing in front of the toilet and initiate an automatic raising of the lid (if the person is facing away from the toilet) or the lid and seat together (if someone is facing the toilet).\nText explaining the controls of these toilets tends to be in Japanese only. Although many of the buttons often have pictograms, the flush button is often written only in Kanji, meaning that non-Japanese users may initially find it difficult to locate the correct button.\nIn January 2017, The Japan Sanitary Equipment Industry Association, a consortium of companies producing", "Delete or Del, sometimes accompanied by a crossed-out right-arrow symbol. However, sometimes the key labelled Delete performs the Backspace function instead, for example on some Apple keyboards.\nIn other cases, the Delete key is in its original IBM notebook position of above and to the right of the Backspace key. Many laptops add rows of smaller keys above the Function key line to add keys on a non-standard size keyboard. On this row of smaller keys, the position of the Delete key is positioned at or near the right-hand end. On Apple's line of laptops (e.g. the MacBook and MacBook Pro)," ]
Why do the vast majority of good police officers and other form of L.E. protect the "bad apples" and not outcast/ help remove them?
[ "Cop here. Truly \"bad\" cops don't want to get caught. If they're doing something shady, they're probably hiding it.\n\nA couple other factors:\nPolice departments operate independently from one another. I have nothing to do with the department in the next town over, let alone across County or state lines. \n\nEven within the same department, you'll have your own beat. You'll go most of the day without interacting with your fellow officers. I work in a department with over 1700 sworn officers. I see about 10 of them a day, and only 2 or 3 of them will I actuality go on calls with in my response area.", "I'm quite interested in seeing what people will answer. I've been asking essentially the same question for year, and never have gotten a reasonable answer.\n\nIf the bad cops are just a small percentage, 'a few rotten apples', then why don't good cops (who must therefore make up the vast majority of the police) not do something about them??\n\nNon-answers include:\n-they are afraid of not having backup if they report bad cops. \n Of course, if bad cops are such a small number that really shouldn't matter.\n\n-what can they do?\n Report suspicious behaviour by fellow cops. Arrest fellow cops who break the law. Testify against them.\n\nEtc.", "I suspect that LE fall under a very base, human heuristic that is often referred to as in/out group behavior. (_URL_0_). The idea is that humans have learned through evolution that people in our family, friends, community are more important than strangers. It is a very powerful instinct that can act as a bias in a morally complex situation. While there is no doubt a myriad of factors that contribute to people in a group behaving one way or the other - seeing themselves as a single, unified entity reduces the desire to see one of their own removed under bad circumstances. Speaking for myself I would suspect this plays a very large role in the unspoken community rules within a police force.", "I would say there are two different answers to this. 1. They do get rid of the bad apples. The media hypes up the bad to give you a misrepresentation. If the media started to focus on off limit discussions like black on black crime, you'd find that the police are all saints.\n\nThey do protect their own. This really changes from one police dept to the next. Say you have a chief in one town who hired his knucklehead son. The son is a POS who never should have been a cop. He has 3 dwi and they never made the paper until he hurt someone on the third one. How can a cop do his job without a license? He was protected by his dad. This is a result of the wrong people in power as the other police officers dont want to bring attention to this due to the fact that their jobs might be in jeopardy.\n\nJust like police work, this answer isn't a black and white issue, its all gray.", "I've actually put a lot of thought into this. When you work in such an intense line of duty, you develop a certain fraternal bond with your fellow officers so any accusations against one of them may seem like a threat to all of you. Also, if it becomes common place to throw officers accused of wrongdoing under the bus there becomes a fear that other officers could be wrongly accused and suffer the same treatment.\n\nI agree that bad policing exists and it would do a lot of good if police as individuals or their unions would acknowledge this, but I also respect the factors I mentioned are at play.", "Because the percentage of bad apples is a lot larger than we think and the percentage of contamination by those bad apples is even higher?" ]
[ "is not enough to mouth platitudes about \"a few bad apples\". The problem might lie with a minority of officers, but it is still a significant problem, and a problem that needs to be addressed ... according to one survey carried out recently, only 42% of black people from a Caribbean background trust the police. That is simply not sustainable ... I will soon publish proposals to strengthen the protections available to whistleblowers in the police. I am creating a new criminal offence of police corruption. And I am determined that the use of stop and search must come down,", "in the open to identify and expose the persons involved.\nCreep Catchers refers to non-affiliated individuals and groups which operate in 15 cities across Canada, posing as children in chat rooms to sting, record and shame adults who try to meet them for sex. POP Squad (\"POP\" standing for \"Prey on Predators\"), a Connecticut-based group, is one of several similar online groups operating in the United States.\nWanted Pedo is the main French association struggling against paedophile networks. Their website have been suspended by justice for exposing paedophile websites. Criticism of tactics A representative of the National Center for Missing and Exploited", "organizations' rigorous rules enforced by violence, who engage in activities that bring them and their club into serious conflict with society and the law\".\nMembers and supporters of these clubs insist that illegal activities are isolated occurrences and that they, as a whole, are not criminal organizations. They often compare themselves to police departments, wherein the occasional \"bad cop\" does not make a police department a criminal organization and the Hells Angels sponsors charitable events for Toys for Tots in an attempt to legitimize themselves with public opinion.\nContrary to other criminal organizations, OMGs operate on an individual basis instead of top-down,", "Ordinary Decent Criminal (slang) Ordinary Decent Criminal (ODC) is a term used by the Garda Síochána, the police force of the Republic of Ireland, to distinguish criminals engaging in illegal practices for financial or personal ends from those who have terrorist goals.\nThe term was originally used to distinguish \"regular\" criminals from the IRA and other paramilitary groups in Ireland.\nIn Ireland the term is sometimes used to refer to criminals who refuse to deal with the drugs trade.", "It is unclear whether this is due to discrimination from police officers and the courts, as opposed to a simple higher rate of offence among minorities. Arrest-based databases, which are found in the majority of the United States, lead to an even greater level of racial discrimination. An arrest, as opposed to conviction, relies much more heavily on police discretion.\nFor instance, investigators with Denver District Attorney's Office successfully identified a suspect in a property theft case using a familial DNA search. In this example, the suspect's blood left at the scene of the crime strongly resembled that of a current", "of Law Enforcement, Tennessee Bureau of Investigation, and the Florida Department of Law Enforcement.\nSeveral Native American tribes also employ what they refer to as \"Special Agents\" which include criminal investigators, court investigators, or gaming investigators, and some are deputized as special federal officers of the Bureau of Indian Affairs. In popular culture Special Agents, particularly those within the FBI, have been depicted in popular entertainment for years.\nThe title \"assistant special agent in charge\" and its acronym \"ASAC\" are stated frequently throughout the TV series Breaking Bad. For example, in Season 1 through Season 4, both Hank Schrader and Gus Fring", "try terrorist and crime-gang offences . Criticism The Special Criminal Court has been criticised by the Irish Council for Civil Liberties, Amnesty International and the United Nations Commission on Human Rights, for its procedures and for being a special court, which ordinarily should not be used against civilians. Among the criticisms are the lack of a jury, and the increasing use of the court to try organised \"ordinary\" crimes rather than the terrorist cases it was originally set up to handle. Critics also argue that the court is now obsolete since there is no longer a serious terrorist threat to", "Technical Intelligence, Social Intelligence, External Intelligence, Political Intelligence, Economic Intelligence And Security Intelligence.\nThe Special Branch is headed by a Commissioner of Police (Currently: Mohd Fadhli Bin Mohd Noh, G/8786). Commercial Crimes Investigation Department This department's main function is to investigate, arrest, and prosecute offenders committing white-collar crimes such as fraud, breach of trust, cyber-crimes, forgery, counterfeiting etc.\nThe Commercial Crimes Investigation Department is headed by a Commissioner of Police (CP). Police uniform and equipment The new Police Constable uniform was introduced in 2008. The headgear is a dark navy blue beret with a silver police force emblem on top of the", "and tries to avoid detection in an effort to spot criminals during criminal activity in order to arrest them. Anti-Crime officers, unlike patrol units, are not required to handle typical radio runs, such as accidents, disputes, and general policing calls that uniformed officers are called on for a majority of their jobs. Anti-Crime officers are typically tasked with finding felony suspects, such as those possessing weapons, or committing recurring crimes in the area. If a certain crime is spiking in an area, such as burglary, Anti-Crime officers will be tasked with finding those responsible, usually through following the suspects. They", "Support Maria Espinoza, director of the Remembrance Project, an anti-illegal immigration organization, said that such an office was needed \"because the perpetrators are illegally in the U.S. If they are here illegally they should be removed from the country\". Mark Krikorian, director of the Center for Immigration Studies said \"highlighting some victims of criminal aliens doesn't suggest that all immigrants are criminals. Shame on those advocacy groups that are trying to minimize the experience of these families.\" Hans von Spakovsky of the Heritage Foundation said \"that every crime that is committed by someone who is here illegally is a crime", "Hebert, say these laws will make resisting arrest a hate crime which has drawn criticism as hate crimes are crimes in which victims are targeted because of identity-based characteristics such as race, sexual orientation, or gender. Finally, according to FBI data, violence against police officers, as well as crime in general has decreased without these laws, calling into question their necessity.", "officers would rather keep personal. Another reason officers may hesitate to go against the blue code may be that challenging the blue code would mean challenging long-standing traditions and feelings of brotherhood within the institution. The fear of consequences may play a large role as well. These consequences can include being shunned, losing friends, and losing back-up, as well as receiving physical threats or having one's own misconduct exposed.\nThere are also forces that work against the code and promote whistleblowing. Many police officers do join the police force because they want to uphold the law; the blue code goes against", "is constantly under threat of erasure while police officers do not face this threat. Another source of criticism is police officers are typically respected and honored in communities while African Americans in urban areas are suspected of being thieves and freeloaders. Finally, some state supporters of Blue Lives Matter are intentionally or unintentionally supporting a system of discriminatory policing and racial profiling.\nSome critics of Blue Lives Matter laws state the laws are redundant as attacking or killing a police officer would already result in a harsher punishment than attacking a non-police officer. Others, such as St. Martinville Police Chief, Calder", "anti-bullying laws and attends numerous bully trials. The Bully Police Squad raises awareness on bullying and social cruelty, advocating for each of our victims. We believe that every call is important, that is why no call ever goes unanswered. The Bully Police Squad strives to educate all parents, children, and teachers on the causes and effects of bullying. Hopefully through this effort, more and more children will be able to see school as a safe learning environment. Currently, she has many projects in the works, television, theatre and advising, just to name a few. The Bully Police Squad was featured", "member is to commit murder. This was an original requirement for the Black Angels sub-clique, and now has been put in place for all starting members of OVS, thus making OVS a feared and respected gang. Crimes of murder can be anywhere. OVS knows that the Ontario Police department and gang task force is fully aware of their initiation process and will send their new recruits to the surrounding counties to get \"jumped in\" by committing a murder. Because of the past RICO act the OVS Mexican Mafia membership has grown. Weeding out the weak from the strong with their", "Give Police a Chance Plot The Goodies are asked to help with the public image of the police, because nobody likes them. The police have no idea why they are so unpopular. Deputy Commissioner Butcher of the City Police, and the sergeant accompanying him, rough the Goodies up, demanding that they help. The Goodies are terrified, but they agree to help anyway.\nThe Goodies, dressed as policemen, turn an Identikit into an Identikit Game (for all the family), and open \"The Coppe Shoppe\" (where they sell handcuffs as a 'charm bracelet', and also sell police helmets). Riding", "Goon squad In the United States, a goon squad is a group of criminals or mercenaries commonly associated with either pro-union violence or anti-union violence. In the case of pro-union violence, a goon squad may be formed by union leaders to intimidate or assault non-union workers, strikebreakers, or parties who do not cooperate with the directives of union leadership. In the case of anti-union violence, goon squads are traditionally hired by employers as an attempt at union busting, and resort to many of the same tactics, including intimidation, espionage, and assault.\nDuring the labor unrest of the late 19th century in", "Drugs. The \"us versus them\" mentality is especially prevalent among inner city minorities, where stereotyping and racial targeting seem to be the norm. Rotten apple theory This theory suggests that one bad cop ruins the entire department. A single officer can not only cause leadership to initiate investigations over entire sections or the department as a whole, but that one corrupt officer/the rotten apple can bring a generally appreciated department to its knees in terms of public relations. People look at that one bad cop and assume, sometimes correctly (especially in this case, where several other officers were found to", "widespread surveillance operations against targets including shareholders, critics, suppliers, the board of directors and employees,\" and that \"most of his spying activities were sanctioned by superiors.\" It has also been alleged that the corporation assigned a \"long-haired employee\" wearing a microphone to infiltrate a group that is critical of Wal-Mart. Wal-Mart used a surveillance van to monitor the organization from \"the perimeter.\" Wal-Mart has characterized its security operations as normal. Agencies Labor spy agencies included the Baldwin–Felts Detective Agency, Pinkerton National Detective Agency, William J. Burns International Detective Agency, Corporations Auxiliary Company, Sherman Service Company, Mooney and Boland, Thiel Detective", "and job, which tempts victims who usually come from countries with lower standards of living. Traffickers and poachers tend to look for easy targets who have no families, no jobs or no place for shelter. Given California's strategic location, presence of major airports and intrastate major airports, traffickers can transport the victims with ease. These individuals are trafficked and put into slavery or some sort of sex trafficking Thus, making human trafficking in California a profitable, low-risk and high-reward scheme.\nSimilarly, domestic traffickers look for easy and vulnerable targets. Domestic traffickers target young aged boys and girls in schools, foster", "enjoy statutory law enforcement authority, although civilian and military agents derive their principal arrest authority from different federal statutes. Other special agents, such as those employed by the National Park Service, have jurisdiction over crimes committed within the boundaries of or have a nexus to the lands managed by their agency or department only. Homeland Security Investigations (HSI) Special Agents have administrative arrest powers under the Immigration and Nationality Act. They can administratively arrest and detain aliens for violations of United States immigration laws pending federal removal (deportation) proceedings. HSI Special Agents can also seize merchandise and articles introduced into", "and misconduct. Officers who engaged in discriminatory arrests, physical or verbal harassment, and selective enforcement of the law may be considered to be corrupt. Many officers who follow the code may participate in some of these acts during their career for personal matters or in order to protect or support fellow officers. All of these are considered illegal offenses and are grounds for suspension or immediate dismissal. Officers who follow the code are unable to report fellow officers who participate in corruption due to the unwritten laws of their \"police family.\"\nPolice perjury or \"testilying\" (in United States police slang) is", "from the City of London Police Professional Standards Department in relation to disciplinary issues. Nonetheless, any criminal allegations made against Forest Keepers would be the responsibility of the either the Metropolitan Police or Essex Police to investigate.\nThe Forest Keepers are paid for out of charitable and private funds held by the City of London Corporation and, as such, their activity is not subject to the Freedom of Information Act. This contrasts with the status of most other constables appointed to serve within private constabularies, such as Port Police, who are subject to the provisions of the Freedom of Information Act.", "to prevent extremist speakers or groups from coming to universities.\nOn July 23, 2019, Christopher A. Wray, the head of the FBI, said at a Senate Judiciary Committee hearing that the agency had made around 100 domestic terrorism arrests since October 1, 2018, and that the majority of them were connected in some way with white supremacy. Wray said that the Bureau was \"aggressively pursuing [domestic terrorism] using both counterterrorism resources and criminal investigative resources and partnering closely with our state and local partners,\" but said that it was focused on the violence itself and not on its ideological basis. A", "or judge may choose to simply ignore these facts because of their association with a seemingly corrupt department. In the case of the Waldo Police Department located in Florida, the entire department was disbanded partly due to allegations of corruption, meaning county law enforcement must take over where the city failed. Officer training Should the corrupt act not be extremely severe, or the department decide discharge of the officer is unnecessary, those involved in corrupt acts may be charged to undergo remedial training. This could be inside or outside the department, and becomes another red mark on the already strapped", "White-collar crime Blue-collar crime The types of crime committed are a function of what is available to the potential offender. Thus, those employed in relatively unskilled environments have fewer opportunities to exploit than those who work in situations where large financial transactions occur. Blue-collar crime tends to be more obvious and thus attracts more active police attention such as vandalism or shoplifting. In contrast, white-collar employees can incorporate legitimate and criminal behavior, thus making themselves less obvious when committing the crime. Therefore, blue-collar crime will more often use physical force, whereas in the corporate world, the identification of a victim", "department and receive further training when they do so.\nMuscovite CID officers are involved in investigation of major crimes such as rape, murder, serious assault, fraud, and any other offences that require complex detection. They are responsible for acting upon intelligence received and then building a case.", "one of the few police officers who is not corrupt and who has been demoted to work behind a desk by his superiors. The men work through targets associated with Manning, whose men went ahead with their threat against Munroe's pregnant wife, killing her and their unborn child. The men use firearms Bryant stole from active duty with the army.\nThe gang attract media attention and become known as the \"Outlaws\", but get themselves into trouble when they reveal their identities to one of Manning's men, Ian Furlong, yet fail to kill him. As a result, Furlong kills Lewis, and Bryant,", "and airports, as prescribed by the Terrorism Act 2000.\nThe intelligence work of Special Branch was often overlooked in some circles. This is because its role sat somewhere between that of the Security Service (MI5) and that of the Metropolitan Police Anti-Terrorist Branch (SO13). Special Branch officers were usually the ones to perform arrests of suspected spies, since Security Service officers are not authorised to take such actions; an example being the Portland Spy Ring.\nIt was announced, in September 2005, that the Metropolitan Police Special Branch would be merging with the Anti-Terrorism Branch of the Metropolitan Police to form a new", "violations. Other similar officers are Tribal Police Officers (TPO's) of local tribal communities and Village Police Officers (VPO's) all of whom receive limited training. This is due to the scarce availability of law enforcement personnel in remote areas of the vast state. Arizona In Arizona, a constable is an elected peace officer of the county for the justice precinct and must live in the precinct to which they are elected. The constable serves a four-year term and has similar powers, duties and authority to sheriffs. Sheriffs and constables are the only two elected peace officers in the State of Arizona.\nThe" ]
If we were still at war with Nazi Germany, Nazi supporters would be tried for treason. Why now are Nazi groups aloud to persist, unchallenged by law?
[ "There is a very fine balancing act between avoiding government censorship and persecution of political groups on the one hand, and allowing desctructive elements to fester until they become too big to deal with on the other.\n\nIf you give the government powers to imprison people for holding certain political beliefs, how is that fundamentally different from what the Gestapo did? And who gets to say exactly which political opinions are allowed and which are not?\n\nBack in the Germany of the 1930s, the popular belief was that it was the Communists who were the dangerous, subversive elements, and the Nazis promised to deal with them. It was when the Reichstag building burned down -- apparently as part of a Communist plot, although nobody can ever be 100% sure of that -- that the Nazis were able to push through their Enabling Act, a kind of emergency legislation, ostensibly to eliminate this threat to society, but which in fact made it possible to effectively ban all other political parties and dismantle Germany's entire democratic system.\n\nFor obvious reasons, modern Germany is very keen to ensure that extremist political groups can never do such a thing ever again, and so they had to come up with a way to ban such organisations without giving a future government the power to eliminate all opposition in exactly the way the Nazis did.\n\nGermany's approach takes on this form: first, the German constitution contains lots of written guarantees of certain basic human rights. Many clauses are subject to what's called an \"eternity clause\", meaning they can never be repealed or weakened for any reason whatever, and they must be included in any new constitution that succeeds the current one.\n\nThen, there is a ban on any political party that is, in the language of German law, \"antagonistic to the constitution\". That is, if your political movement can be shown to be actively working towards undermining the constitution, it can be banned.\n\nThe bar is set quite high, though. The authorities have to gather a *lot* of evidence, and this often means infiltrating the movement. There was an embarrassing case a couple of years ago, when some agents had infiltrated such a movement so successfully, that they rose up through the ranks and some of them were partly responsible for the very policies that were supposed to be evidence of the party's anti-constitutional aims. (It's difficult to blame the agents -- after all, they really didn't want to break cover.)\n\nThen the constitutional court has to study the evidence, and decide whether or not to withdraw the organisation's status as a political party.\n\nBut even if you ban the organisation, you can't change the minds of the individuals. They will simply regroup, and join or found a new party, taking care to ensure that in public at least, they stay on the right side of the law.\n\nThe real key to this, though, is not the nuclear option of suspending basic rights for certain classes of people. It seems to be education, and here Germany has an advantage. All German schoolchildren are taught about the rise of the Nazis and WW2, and in particular they are all made to visit a concentration camp. The message \"Never again\" is drummed into them from a very early age.", "Simply expressing support would not be sufficient to try someone for treason even back in war times. That would be deeply unpopular, but not treason unless you'd do something *material* in regards to the enemy war effort.\n\nFor example, you can look at organizations like German American Bund or British Union of Fascists. In general, their organized activities were prohibited during the war and leaders were detained for various issues; but the detained people, as a rule, were not tried for treason and the vast majority of their members (tens of thousands of them!) weren't tried for anything ever.", "That is not true. The Nazis in the US (yes we had a Nazis Party) were not tried for treason in the US during WWII simply for holding their beliefs. If that was not sufficient for it during time of war it most assuredly is not now.", "You fight ideas *WITH* ideas. \n\nProviding they are not breaking laws or actually hurting people, public shunning, mockery, ridicule, and shaming, are pretty effective ways to change non violent behavior, attitudes, and beliefs. \n\nThere were some pretty effective social movements based on those principles.", "Nazi Germany does not exists. Nazis were a political party and the US has first amendment rights so you can't do anything to them. As long as they are peaceful that is.\n\nYou may not like or agree with what they say or do but that's why we have the first amendment. You have to accept the good with the bad otherwise not allowing people to express their own views would be a form of fascism", "In the US, the legal standard for treason is very high. Expressing support is not treason, and US explicitly protected by the First Amendment.\n\nI recommend reading the Constitution. It isn't very long.", "I'm assuming some sort of combination of the 1st amendment and not committing any war crimes.", "All these people are quoting free expression.\n\nMe, I think it's good they still exist. They're like a showcase example of a dumb idea, just so we can remember why it's a dumb idea and to never pursue it again.", "If my aunt had balls, she'd be my uncle. \n\n1. We're not at war with Germany anymore\n2. First Amendment protects peoples' rights to be shitheads\n3. Treason is defined as \"*Whoever, owing allegiance to the United States, levies war against them or adheres to their enemies, giving them aid and comfort within the United States or elsewhere, is guilty of treason*\" < -- walking around with a swastika flag and tiki torch doesn't count\n4. Allowed.", "If you don't act upon it (or at least within the boundaries of the law) you can believe what you wish. We do live in freedom.", "The American Bund party was the U.S. equivalent of the Nazi party in the 1930s. But by 1941, the House Committee on Un-American Activities were active in denying any Nazi-sympathetic organization the ability to operate freely during World War II.", "Because you cannot say freedom of speech and actions is true while prosecuting someone for saying and believing things that you deem wrong.", "I could try to explain it, but it has already been done in such an excellent way, I dare not ruin it.\n\n\n_URL_0_" ]
[ "the \"decisive part\" played by the Versailles treaty in causing Nazi Germany and the war crimes committed by the Allies \"... by damning the whole German nation as an international outlaw\" and it was \"... the German people as a whole who were to be indicted as the sole criminals, guilty of waging a malevolent war of aggression\". As such, the Nuremberg trials were presented as having nothing to do with justice, but instead were a political show trial. The Commando Order, the cash payments from the Konto 5 slush fund and Raeder's calls for war with the United States were not", "of war, conscientious objectors were executed for treason, as with the Blessed Franz Jagerstatter. Early resistance In the year following Hitler's \"seizure of power\", political players in Germany began wondering how the regime might be overthrown. The old political opponents of Nazism faced their final opportunity to halt the Nazification of Germany. The formerly influential Catholic aligned Centre Party and Bavarian People's Party were dissolved under terrorisation, and non-Nazi parties were prohibited under the proclamation of the \"Unity of Party and State\". The former Centre Party leader and Reich Chancellor Heinrich Brüning looked for a way to oust Hitler, along", "of de-Nazification. It was understood that, in a totalitarian state, few people could participate in public service without also being members of the Nazi Party. Party membership alone was not viewed as sufficient grounds for dismissal, but allegations of involvement or complicity in Nazi war crimes or crimes against humanity were investigated and any police official convicted was sentenced in the usual way.\nHowever, the Allied Powers felt the rule of law would be jeopardised by the mass-sacking of police officials who had served the Nazi state and that maintaining the continuity of a civilian and indigenous police force from the", "moral guilt for anything that had happened under the Third Reich, and that the real responsibility for Nazi crimes rested with the governments of the United Kingdom, France and the United States who had imposed the Treaty of Versailles on Germany. It was claimed that the Allies had \"good reason\" to forbid using resistance against Versailles as a defense at Nuremberg because Nazi Germany was a \"direct consequence of the situation created by the victorious enemy powers in 1918\". Along the same lines, it was charged that the Nuremberg trial of 1945–46 was meant by the Allies to cover up", "willingness to repress German Communists prompted Hindenburg and the old elite to cooperate with them. Hitler and the Nazis also despised German leftists because of their resistance to Nazi racism. Many German leftist leaders were Jews who had been prominent in the 1919 Spartacist uprising. Hitler referred to Marxism and \"Bolshevism\" as means for \"the international Jew\" to undermine \"racial purity\", stir up class tension and mobilize trade unions against the government and business. When the Nazis occupied a territory, communists, socialists and anarchists were usually among the first to be repressed; this included summary executions. An example is Hitler's", "National Committee for a Free Germany History The rise of the Nazi Party to power in Germany in 1933 led to the outlawing of the Communist Party of Germany (KPD) and persecutions of its members, many of whom fled to the Soviet Union.\nWith the German invasion of the Soviet Union in Operation Barbarossa, German prisoners of war began to fall into Soviet hands. Several attempts to establish an anti-Nazi organization from those POWs were made with little success since most of them still believed in the final victory of the Wehrmacht.\nWith the German defeat at the Battle of Stalingrad, the", "the democratic Weimar Republic into the Nazi regime. National Socialism and Holocaust denial German protections for freedom of ideas and expression are superseded by various provisions against \"anti-constitutional\" politics, which usually (but not exclusively) refers to Neo-Nazism. National Socialist parties National Socialism is banned outright in Germany as anti-constitutional; it is illegal to found or belong to a Nazi party. Any party considered to be National Socialist can be banned by the Bundesverfassungsgericht, Germany's highest court. Likewise, publications in support of such groups are automatically placed on the Index, and some may be banned altogether.\nMaterials which express sympathy with National", "prosecution of Nazi war crimes by the SMT did not take place. Among the alleged Nazis were also boys suspected to be Werwolf members: About 10,000 internees were youths and children, half of whom did not return.\nAmong the inmates were many supporters or members of the Social Democratic Party of Germany (SPD), which the Soviet authorities sought to suppress, particularly from 1946. When the Social Democratic Party was merged into the Communist Party of Germany (KPD), renamed Socialist Unity Party of Germany (SED), Social Democrats were interned to ensure Stalinist dominance in the party. Also, people were interned as \"spies\"", "the failed attempt to assassinate Hitler in 1944). The death penalty was used on a wide scale, even before the war. During the war, political repression was greatly expanded both inside Germany and especially in the newly occupied territories. Political prisoners in the concentration camps numbered only about 25,000 at the beginning of the war. By January 1945 they had swelled to 714,211 – most of them non-Germans accused of plotting against the Reich.\nThe second type of Nazi violence, motivated by exclusion and social repression, was the violence aimed at purging German society of people whose lifestyle was considered incompatible", "to seek to overthrow Hitler had initially supported the regime, if not all of its methods. Hitler's 1938 purge of the military was accompanied by increased militancy in the Nazification of Germany, a sharp intensification of the persecution of Jews, homosexuals,, and trade union leaders and aggressive foreign policy, bringing Germany to the brink of war; it was at this time that the German Resistance emerged.\nThose opposing the Nazi regime were motivated by such factors as the mistreatment of Jews, harassment of the churches, and the harsh actions of Himmler and the Gestapo. In his history of the German Resistance,", "1951, the case being pursued in the German legal system was similarly halted by the state's attorney in Lüneburg for lack of reasonable suspicion. The final report came to the conclusion that the trials before the Reich court martial were not objectionable and the accused were rightly sentenced to death, since in every age treason has been treated as the \"most ignominious crime\" and the participants in the July 20, 1944 plot to assassinate Hitler were driven in broad measure by treason and espionage.\nDuring the early 1950s Roeder unabashedly continued his public attacks on, and defamation of, the surviving members", "Reichskommissar as \"head of state\", subordinate only to Adolf Hitler. Post-war The post-war authorities proscribed the party and prosecuted its members as collaborators. Nearly 50,000 were brought to trial, approximately half of whom received prison sentences. The authorities executed Quisling for treason as well as a few other high-profile NS members, and prominent German officials in Norway, for war crimes. The sentences' lawfulness has been questioned, however, as Norway did not have capital punishment in peace-time, and the Norwegian constitution at the time stipulated that capital punishment for war crimes had to be carried out during actual wartime.\nAnother issue of", "in vain, and most APF members now acknowledge that, to counteract Hitler by non-violent means, Governments should not have allowed the economic and political situation of instability in the Weimar Republic to arise in the first place. This issue is discussed at depth in APF's 1989 publication, What to Do About Hitler: A Pacifist Symposium. Notably, many early pacifists had argued against the excessively harsh terms of the Treaty of Versailles from its inception.\nIt is notable that, by 1944, Vera Brittain was on Hitler's list of those English people posing the greatest threat to his regime. ", "organisations. Non-Nazi parties were formally outlawed on 14 July 1933, and the Reichstag abdicated its democratic responsibilities. Hindenburg remained commander-in-chief of the military and retained the power to negotiate foreign treaties.\nThe Act did not infringe upon the powers of the President, and Hitler would not fully achieve full dictatorial power until after the death of Hindenburg in August 1934. Journalists and diplomats wondered whether Hitler could appoint himself President, who might succeed him as Chancellor, and what the army would do. They did not know that the army supported Hitler after the Night of the Long Knives, or expect that", "party and twice extended the act beyond its initial 1937 expiration. The Enabling Act also allowed Hitler to rule that all competing political parties of the Nazi regime were illegal. Albert Hensel and his co-conspirators did not have the strength to outwardly fight against Hitler, so they took a secretive approach to resisting. The German police were secretive in their counter efforts as well. The resisters were often not well received by the German populace and had to also hide their actions from them in fear of the citizens informing the police of their actions. The Resistance", "may not in itself be criminal, that they will not adopt themselves to the community.\n\"The following are examples of asocial:\n\"Persons who through minor, but repeated, infractions of the law demonstrate that they will not adapt socialist state, e.g. beggars, tramps, whores, alcoholics with contagious diseases, particularly transmitted diseases, who evade the measures taken by the public health authorities.\" Background After being appointed Chancellor on 30 January 1933, Hitler still faced huge problems. The Nazi party at this time only held a third of all seats in the Reichstag, thus lacking an overall elected majority. As such the Nazis looked at", "membership and used as their defence the claim that the Nazi Party membership should not be forbidden to Reichswehr personnel. When the three officers were arrested after being caught red-handed distributing Nazi literature at their base, Beck, who was the commanding officer of the 5th Artillery Regiment based in Ulm, to which the three Nazi officers belonged, was furious and argued that since the Nazi Party was a force for good, Reichswehr personnel should not be banned from joining the Nazi Party. At the preliminary hearing, Beck spoke on behalf of the three officers. At the Leipzig trial of Ludin", "to punish those involved in the plot, but to break the power, status, and cohesion of the Prussian officer corps once and for all. Since traditionally German officers could not be tried by civilian courts, he decided that the Army must expel all those accused of involvement. They could then be tried before the People's Court (Volksgerichtshof), a special court established in 1934 to try political crimes and presided over by the fanatical Nazi Roland Freisler. Hitler therefore ordered the convening of a Court of Honour (Ehrenhof) to carry out the expulsions, and appointed Rundstedt to head it. The other", "24 October 1945. Other Nazi collaborators, as well as Germans accused of war crimes, were also arrested and tried during this legal purge.", "was the only organisation in Germany with the capacity to overthrow the government; from within it, a small number of officers came to present the most serious threat posed to the Nazi regime. The Foreign Office and the Abwehr (Military Intelligence) of the Oberkommando der Wehrmacht (Supreme Command of the Armed Forces) also provided vital support to the movement. Hitler's 1938 purge of the military was accompanied by increased militancy in the Nazification of Germany, a sharp intensification of the persecution of Jews and daring foreign policy exploits. With Germany brought to the brink of war, the German Resistance then", "resistance consisted of small and usually isolated groups. They were unable to mobilize political opposition. Except for individual attacks on Nazis (including Hitler) or sabotage acts, the only real strategy was to persuade leaders of the Wehrmacht to stage a coup against the regime: the 1944 assassination attempt against Hitler was intended to trigger such a coup.\nApproximately 77,000 German citizens were killed for one or another form of resistance by Special Courts, courts-martial, People's Courts and the civil justice system. Many of these Germans had served in government, the military, or in civil positions, which enabled them to engage in", "men were arrested and imprisoned or interned in concentration camps. The government blamed the Jewish people for the attacks, and imposed a fine of one billion ℛℳ. After Kristallnacht, additional decrees removed the Jews from German economic and social life; those who could emigrated. Laws After the Reichstag Fire Decree, the Enabling Act of 1933 amended the Weimar Constitution to allow Hitler and his government to enact laws (even laws violating the constitution) without going through the Reichstag. Nazi intimidation of the opposition resulted in a vote of 444 to 94. Flag law According to the Reich flag law, Germany's", "about making membership all political parties other than their own illegal. Their leader, Adolf Hitler, was a powerful speaker who was particularly vitriolic about the Communist Party, Between 1933 and 1945 Wolfgang Bergold was imprisoned several times. In 1933 he was sentenced to a year's detention, and was interned, from April 1933 till July 1934, in the concentration camp at Hohnstein.\nOn his release he resumed his illegal activities, Bergold was arrested again in December 1934, and in November 1935 he was sentenced to a year in prison for \"Preparation of High treason\". In 1935/36 he was interned", "class were dealt the sharpest rebuff. These were the groups which had to be uprooted...\nAfter the failure of the Beer Hall Putsch in 1923, and his subsequent trial and imprisonment, Hitler decided that the way for the Nazi Party to achieve power was not through insurrection, but through legal and quasi-legal means. This did not sit well with the brown-shirted stormtroopers of the SA, especially those in Berlin, who chafed under the restrictions that Hitler placed on them, and their subordination to the party. This resulted in the Stennes Revolt of 1930-31, after which Hitler made himself", "months after Adolf Hitler came to power in 1933. There had been a prior ban in the German state of Saxony, and the League of Nations had supported the Jewish Community of Upper Silesia against Hitler in rejecting the attempts by German officials to confiscate shehitah knives and ban Jewish slaughter there as had been done in the German Reich. Bans were introduced in all the countries which the Nazis occupied, as well as in the countries of the Axis allies: Italy and Hungary. Bans introduced by the German Third Reich and by Benito Mussolini were removed by Allied", "Reich continued to serve in German administration after the war. According to the Simon Wiesenthal Center, many of the more than 90,000 Nazi war criminals recorded in German files were serving in positions of prominence under Chancellor Konrad Adenauer. Not until the 1960s were the former concentration camp personnel prosecuted by West Germany in the Belzec trial, Frankfurt Auschwitz trials, Treblinka trials, Chełmno trials, and the Sobibór trial. However, the government had passed laws prohibiting National Socialists from publicly expressing their beliefs. \"Universal National Socialism\", 1950s–1970s Neo-Nazism found expression outside of Germany, including in countries who fought against the Third", "would prefer to see the Nazis in power rather than lift a finger to save the republic\".\nThe Weimar political parties failed to stop the Nazi rise. Germany's Weimar political system made it difficult for chancellors to govern with a stable parliamentary majority, and successive chancellors instead relied on the president's emergency powers to govern. From 1931 to 1933, the Nazis combined terror tactics with conventional campaigning – Hitler criss-crossed the nation by air, while SA troops paraded in the streets, beat up opponents, and broke up their meetings.\nA middle-class liberal party strong enough to block the Nazis did not exist –", "local Brandenburg branch. The idea of preventing Nazi success by uniting the political left failed, however: in January 1933 the Nazi Party took power and lost no time in transforming the country into a one-party dictatorship, which meant among other things that political activity - other than on behalf of the Nazi Party - became illegal. Because of her Jewish provenance and her record of political activism, Ephraim lost her job. She now relocated from Brandenburg back to Berlin where she joined the underground struggle against Naziism.\nBy the end of 1933 many party activists", "suggestion that ordinary Germans, had they had guns, would have risked their lives in armed resistance against the regime simply does not comport with the regrettable historical reality of a regime that was quite popular at home. Inside Germany, only the army possessed the physical force necessary for defying or overthrowing the Nazis, but the generals had thrown in their lot with Hitler early on.", "toward the establishment of a one-party dictatorship in Germany. With several key government posts in the hands of Nazis and with the constitutional protections on civil liberties suspended by the decree, the Nazis were able to use their control of the police to intimidate and arrest their opposition, in particular the Communists. Due to the use of Article 48, this repression had the mark of legality.\nThe 5 March elections gave the Nazi-DNVP coalition a narrow majority in the Reichstag. Nonetheless, the Nazis were able to maneuver on 23 March 1933 the passage of the Enabling Act by the required" ]
Why is pencil graphite referred to as Lead instead of graphite?
[ "Before chemistry was really a thing, everyone thought that graphite was a type of lead, probably because it's so soft.", "There's an important kind of lead ore called galena that looks a lot like graphite, and miners knew all about the lead ore- which often yields silver, too, which is why they cared about it- long before anyone paid any attention to graphite. So graphite is to galena roughly what fool's gold is to real gold, and it had a similar sort of name, black lead, until someone renamed it in the late 1700s." ]
[ "a mix of powdered graphite and clay; it was invented by Nicolas-Jacques Conté in 1795. It is chemically unrelated to the metal lead, whose ores had a similar appearance, hence the continuation of the name. Plumbago is another older term for natural graphite used for drawing, typically as a lump of the mineral without a wood casing. The term plumbago drawing is normally restricted to 17th and 18th century works, mostly portraits.\nToday, pencils are still a small but significant market for natural graphite. Around 7% of the 1.1 million tonnes produced in 2011 was used to make pencils. Low-quality amorphous graphite", "graphite began in 1832, though logging remained the chief Industry. Graphite was not widely used in the 19th century, as most writing was done in pen, rather than pencil. It was not until the mid-20th century that pencils came into greater use, with the No. 2 HB pencil becoming the standard writing implement in schools and universities.\nHistoric Fort Ticonderoga is in this town, east of the former village of Ticonderoga. Geography According to the United States Census Bureau, the town has a total area of 88.5 square miles (229.1 km²), of which 81.4 square miles (210.9 km²) is land and 7.0 square", "pure graphite easily crumbled and broke. Thus in 1771 Faber undertook the first attempts to improve pencils by using ground graphite, which he mixed with sulfur, antimony, and binding resins. The technique of gluing pencils into wooden sticks was already well known in Nuremberg at that time, but Faber did not use it.\nDuring Faber's lifetime, his pencil production business was still on a small scale. With his small workshop he laid the foundation for a pencil factory which his great-grandson Johann Lothar Freiherr von Faber expanded into the world-famous Faber-Castell brand in the middle of the 19th century. The", "and softness of the lead are some indicators of a brand’s quality and, consequently, its market price. There is no general quality difference between wax/oil-based and water-soluble colored pencils, although some manufacturers rate their water-soluble pencils as less lightfast than their similar wax/oil-based pencils.\nThe rising popularity of colored pencils as an art medium sparked the beginning of the Colored Pencil Society of America (CPSA). According to its website, “[CPSA] was founded in 1990 as a nonprofit organization dedicated to artists over 18 years of age working with colored pencil”. The CPSA not only promotes colored pencil art as fine art,", "or papyrus by leaving dark streaks where the soft metal rubbed off onto the surface. The concept has been revived in recent times as the core of the \"inkless pen\": a lead-based metal alloy that leaves dark markings on paper by abrading small pieces of core onto the surface.\nHowever, most modern \"lead pencils\" have a nonpoisonous core of greyish-black graphite mixed with various proportions of clay for consistency, enclosed within an outer wooden casing to protect the fragile graphite from being snapped apart or from leaving marks on the user's hand.\nWhite chalk has been traditionally used in schoolrooms to write", "Negro (lead pencil) History Negro lead was originally composed of a mixture of wax and charcoal and was often used in combination with heavily textured coquille paper. The intention was to create sturdy pencil line art which was dark enough to be reproduced with early photographic technology. It was used as a replacement for lithographic printmaking, just as pen and ink line art essentially took the place of intaglio in late 19th-century illustration.\nWhile the name is used in the artistic sense, the word \"Negro\" literally, depictions of stylized African natives have been used in marketing campaigns and product packaging. One", "those early days was used only for marking sheep. Later, however, graphite was found to be suitable for lining the casting moulds for cannon and musket balls, which caused its value to soar in the 17th century, as England, France and the Dutch Republic built up their armies. The graphite was also used in pencil-making, which in 1790 led to the founding of the Cumberland pencil industry based in Keswick. The mine closed in 1891 after new techniques meant that graphite no longer needed to be so pure, so the Borrowdale mine became uneconomic. Ascents Grey Knotts can be ascended", "Conté had the idea of mixing powdered graphite with clay and pressing the material between two half-cylinders of wood. Thus was formed the modern pencil. Conté received a patent for the invention in 1795, and formed la Société Conté to make them. He also invented the conté crayon named after him, a hard pastel stick used by artists.\nAt the 1798 Exposition des produits de l'industrie française Conté won an honorable distinction, the highest award, for his \"crayons of various colours\".", "of the original producers of negro pencils was the Koh-i-Noor company, however those manufactured by the company today are composed of lead that is slightly less dark and waxy than the originals. Cretacolor produces what they call Nero pencils, which are similar in composition. Prismacolor also manufactures a lead-based black pencil that is very close in composition.", "sources suggest the altered spelling was intended to distinguish from the use in typesetting of \"lead\" for the metal strips of various thickness used to separate lines of type used in typesetting in the early 20th century. However, the spelling \"lede\" first appears in journalism manuals in the 1980s, well after lead typesetting's heyday. The earliest appearance of \"lede\" cited by the OED is 1951.", "Lead-tin-yellow Lead-tin-yellow is a yellow pigment, of historical importance in oil painting, sometimes called the \"Yellow of the Old Masters\" because of the frequency with which it was used by those famous painters. Nomenclature The name lead-tin yellow is a modern label. During the thirteenth to eighteenth centuries when it was in widest use, it was known by a variety of names. In Italy, it was giallorino or giallolino. In other countries of Europe, it was massicot, genuli (Spanish), Plygal (German), general (English) or mechim (Portuguese). All of these names were often applied to other yellow pigments as well", "in his account of the ascent said “Their claim that this apparatus is like a vessel in which people sit and travel to other countries in order to discover news and other falsifications did not appear to be true.” Writing and drawing equipment Conté invented the modern pencil lead at the request of Lazare Nicolas Marguerite Carnot. The French Republic was at that time under economic blockade and unable to import graphite from Great Britain, the main source of the material. Carnot asked Conté to create a pencil that did not rely on foreign imports. After several days of research,", "laboratory animals. Its carcinogenicity for humans was not proven. History This compound's Latin name minium originates from the Minius, a river in northwest Iberia where it was first mined.\nLead(II,IV) oxide was used as a red pigment in ancient Rome, where it was prepared by calcination of white lead. In the ancient and medieval periods it was used as a pigment in the production of illuminated manuscripts, and gave its name to the minium or miniature, a style of picture painted with the colour. As a finely divided powder, it was also sprinkled on dielectric surfaces to study Lichtenberg figures.\nIn traditional", "found in older properties painted prior to the introduction of such regulations. Although lead has been banned from household paints in the United States since 1978, paint used in road markings may still contain it. Alternatives such as water-based, lead-free traffic paint are readily available, and many states and federal agencies have changed their purchasing contracts to buy these instead. History Lead white was being produced during the 4th century BC; the process is described by Pliny the Elder, Vitruvius and the ancient Greek author Theophrastus.\nThe traditional method of making the pigment was called the stack process. Hundreds or thousands", "dated from about 6500 BC, but the metal may have been known earlier. Ancient smelting was done using loads of lead ore and charcoal in outdoor hearths and furnaces.\nAlthough lead is a common metal, its discovery had relatively little impact in the ancient world. It is too soft to be used for weapons (except possibly as sling projectiles) or for structural elements. However, being easy to cast and shape, it came to be extensively used in the classical world of Ancient Greece and Ancient Rome for piping and storage of water. It was also used as a mortar in", "the figures, possibly at a later date. The ink of the drawings, text and page and quire numbers have similar microscopic characteristics. Energy-dispersive X-ray spectroscopy (EDS) performed in 2009 revealed that the inks contained major amounts of iron, sulfur, potassium, calcium and carbon and trace amounts of copper and occasionally zinc. EDS did not show the presence of lead, while X-ray diffraction (XRD) identified potassium lead oxide, potassium hydrogen sulphate and syngenite in one of the samples tested. The similarity between the drawing inks and text inks suggested a contemporaneous origin. Paint The blue, clear (or white), red-brown, and green", "Conté Conté ([kɔ̃te]), also known as Conté sticks or Conté crayons, are a drawing medium composed of compressed powdered graphite or charcoal mixed with a wax or clay base, square in cross-section. They were invented in 1795 by Nicolas-Jacques Conté, who created the combination of clay and graphite in response to the shortage of graphite caused by the Napoleonic Wars (when the British naval blockade of France prevented import). Conté crayons had the advantage of being cost-effective to produce, and easy to manufacture in controlled grades of hardness.\nThey are now manufactured using natural pigments (iron oxides, carbon black, titanium dioxide),", "pencils included Faber-Castell in 1908 (the Polychromos range was initially 60 colors) and Caran d’Ache in 1924, followed by Berol Prismacolor in 1938. Other notable manufacturers include Bruynzeel-Sakura, Cretacolor, Derwent, Koh-i-Noor Hardtmuth, Mitsubishi (uni-ball), Schwan-Stabilo, and Staedtler. Types Several types of colored pencils are manufactured for both artistic and practical uses. Artist grade Artist-grade pencils are filled with higher concentrations of high-quality pigments than student-grade colored pencils. Their lightfastness – resistance to UV rays in sunlight – is also measured and documented. Core durability, break and water resistance, and brand popularity are also notable features of artist-grade colored pencils.", "materials developed as a protective exterior coating. The use of lead paint has been restricted on most buildings, due to concerns of lead poisoning. Tin Tin is too soft to be used by itself for architectural purposes so it generally falls into two categories: the alloying of tin with other metals such as copper to form bronze, and the coating of tin on harder metals, such as tinplated iron or steel. Architectural bronzes usually contain about 90% copper and 10% tin, although the content may vary widely. The term “tin ceiling” is a misnomer and early manufacturers did not use", "other mediums. Additionally, colored pencils are more affordable, cleaner, and simpler compared to other mediums. History The use of wax-based media in crayons can be traced back to the Greek Golden Age, and was later documented by Roman scholar, Pliny the Elder. Wax-based materials have appealed to artists for centuries due to their resistance to decay, the vividness and brilliance of their colors, and their unique rendering qualities.\nAlthough colored pencils had been used for “checking and marking” for decades prior, it was not until the early 20th century that artist-quality colored pencils were produced. Manufacturers that began producing artist-grade colored", "Staedtler History The origins of the brand can be traced since the 17th century, when Friedrich Staedtler took over the totality of the pencil manufacturing process, from the lead to the wood. Nevertheless, that activity was forbidden by the Council of Nuremberg, which stated that the manufacturing had to be developed by two different experts. Finally, Staedtler's work helped to abolish that regulation, therefore facilitating the work of other pencils manufacturers in Nuremberg.\nThe company was founded by Johann Sebastian Staedtler in 1835 as a pencil factory, first established in Nuremberg, but the roots of the company go back to 1662,", "in lead paint. Paint manufacturers began replacing white lead pigments with titanium white (titanium dioxide), before lead was banned in paint for residential use in 1978 by the US Consumer Product Safety Commission. The titanium dioxide used in most paints today is often coated with silica/alumina/zirconium for various reasons, such as better exterior durability, or better hiding performance (opacity) promoted by more optimal spacing within the paint film.\nMicaceous iron oxide (MIO) is another alternative to lead for protection of steel, giving more protection against water and light damage than most paints. When MIO pigments are ground into fine particles,", "Charcoal (typeface) Truth Truth, an expanded Charcoal family, is sold by Font Bureau, designed by David Berlow, and was released in 2005. It contains small differences from Charcoal, and is available in seven weights: Thin, Light, Regular, Medium, Bold, Black, and Ultra.", "with other metal oxides used in place of lead oxide, must be labeled \"crystalline\" or \"crystal glass\". History Lead may be introduced into glass either as an ingredient of the primary melt or added to preformed leadless glass or frit. The lead oxide used in lead glass could be obtained from a variety of sources. In Europe, galena, lead sulfide, was widely available, which could be smelted to produce metallic lead. The lead metal would be calcined to form lead oxide by roasting it and scraping off the litharge. In the medieval period lead metal could be obtained through recycling", "combination with other mediums. They can be used dry, wet or blended together. Many artists use them for preliminary sketches, given that graphite pencils aren't compatible with pastels. They can also be sharpened to a fine point to add details on pastel drawings.", "Baltimore Lead Paint Study Background Lead has a long history of being used in paint up until recently due to its role in maintaining a paint’s color and increasing durability. Lead’s toxicity was established as a valid concern that modern medicine in the early half of the 20th century could address with public health measures in the United States. In 1951, Baltimore was the first city to ban the use of lead paint in new housing, starting a move towards abating the amount of lead use at home. Twenty-seven years later, in 1978 the Consumer Product Safety Commission laid down", "but also strives to set lightfastness standards for colored pencil manufacturers. Other countries such as the United Kingdom, United States, Canada, Australia and Mexico – among many others – have formed their own organizations and societies for colored pencil artists. Colored pencils are commonly stored in pencil cases to prevent damage.\nDespite colored pencils' existence of more than a century, the art world has greatly treated the medium with less admiration and even disdain compared to other art mediums. However, the discovery of new techniques and methods and the formation of authoritative organizations is better enabling colored pencils to compete with", "packs.\nDerwent's oldest line of colour pencils, Artist, were expanded from a range of 24 to 72 in 1939 and from 72 colours to 120 in 1996. Studio and Watercolour pencils are still available in the 72 original colours. Pastel pencils were introduced in 1994 and come in 90 colours. Derwent also now manufactures ordinary stick pastels.\nDerwent Signature was a range of lightfast pencils, available in 60 colours (Signature Watercolour pencils came in 40 colours) but it was discontinued after a few years. New 72 colour ranges include Derwent Coloursoft and Derwent Inktense pencils. Derwent also produces a range of graphite", "Industrial Gothic Story Pencil and Nickel are two inmates of a prison in a dystopian society in which ugliness is a crime. Pencil was born in the prison; Nickel is incarcerated there because she has no arms or legs. They decide to escape, in order to find a semi-mythical place called The Aluminium Tower, in which everyone is accepted no matter what they look like.", "describes its use as imitation gemstone, and the title of a lost chapter of the work mentions the use of lead in glass. The 12–13th century pseudonymus \"Heraclius\" details the manufacture of lead enamel and its use for window painting in his De Coloribus et artibus Romanorum (Of Hues and Crafts of the Romans). This refers to lead glass as \"Jewish glass\", perhaps indicating its transmission to Europe. A manuscript preserved in the Biblioteca Marciana, Venice, describes the use of lead oxide in enamels and includes recipes for calcining lead to form the oxide. Lead glass was ideally suited for" ]
If your shoe comes off why according to reddit, does it normally equal death in an accident?
[ "Can you imagine being hit so hard you fly out of your shoes??" ]
[ "the players can not move one foot which is planted outer ankle bone to toe. The players score a hit by touching any part of the opponent with their finger of the bound hand or when they cause the other player to lose balance and move their planted foot. Three hits is a win. Players are disqualified for causing injury or using the dead hand for anything but balance.\nAnother variation includes the \"instant death\" rule. The most common version being when a player strikes another in the nose. Other locations such as the neck and forehead may also be used.", "example. Fact is, if you happened to miss out on playing Red Asphalt, you probably wouldn't care.\"", "This suggests the feet could belong to other people who have jumped from the bridge . Level of rarity Decomposition may separate the foot from the body because the ankle is relatively weak, and the buoyancy caused by air either inside or trapped within a shoe would allow it to float away. According to Simon Fraser University entomologist Gail Anderson, extremities such as the hands, feet, and head often detach as a body decomposes in the water, although they rarely float.\nHowever, finding feet and not the rest of the bodies has been deemed unusual. Finding two feet has been given", "(b) slides into or contacts the kicker when both of the kicker’s feet are on the ground. It is not a foul if the contact is not severe, or if the kicker returns both feet to the ground prior to the contact and falls over a defender who is on the ground. \nThe penalty for such a violation in most leagues is 15 yards and an automatic first down. When such a violation occurs, the team about to surrender possession via a punt will retain its possession as a result. If the violation occurs when a successful field", "also awarded instead of an own goal if a team places the ball directly into its own goal from certain restarts (e.g., throw-in, free kick, etc.), though this is rare. Infringements If the kick is taken with a moving ball, or from the wrong place, the corner kick is retaken.\nOpposing players must retire the required distance as stated above. Failure to do so promptly may constitute misconduct and be punished by a yellow card.\nIt is an offence for the kicker to touch the ball a second time before it has been touched by another player; this is punishable by an", "on the brakes when he hit an irregularity on the asphalt, as opposed to previous laps where he already had released the brakes on that spot. The stress this produced on the front tyre, caused a loss of grip over the irregularity, resulting in the crash.\nAs a result of his death, during the 2016 FIM MotoGP Awards, it is announced that his number, the #39, will be retired in the Moto2 class as a tribute for Salom.", "many times the competitor touches the ground with the foot (or any other part of the body). Each time a competitor touches the ground with a foot (commonly called \"dabs\" or \"prods\"), the penalty is one point. \nThe possible scores in each section consist of 0, 1, 2, 3, or 5. If a competitor makes their way through the section without touching the ground with a foot, they earn a score of 0 (which is called \"cleaning the section\"). If they touch the ground once, they receive a score of 1. If they touch down twice, they receive a score", "becomes dead under normal conditions, as if there were no fouls.\nOnce the ball is dead, or immediately when a foul is called after a play is over or prior to a snap (since the ball is dead anyway), the referee, the official(s) who threw the flag(s) and other officials with a view of the play confer to come to a consensus on whether an infraction was actually committed, what it was, and who committed it. The final determination and assessment of the penalty is the sole responsibility of the referee. The referee then makes initial visual body signals to the", "Left-foot braking Racing and rallying Karts, many open wheelers, and some modern road cars (cars that are mounted with automatic transmission or semi-automatic transmission as used in motorsports such as Formula One) have no foot-operated clutch, and so allow the driver to use their left foot to brake.\nOne common race situation that requires left-foot braking is when a racer is cornering under power. If the driver does not want to lift off the throttle, potentially causing trailing-throttle oversteer, left-foot braking can induce a mild oversteer situation, and help the car \"tuck\", or turn-in better. Mild left-foot braking can also help", "over bumps. Dry ball joints have dramatically increased friction and can cause the steering to stick or be more difficult.\nIf a ball joint fails, the results can be dangerous as the wheel's angle becomes unconstrained, causing loss of control. Because the tire will be at an unintended angle, the vehicle will come to an abrupt halt, damaging the tires. Also, during failure, debris can damage other parts of the vehicle. Other uses While in automotive parlance the term \"ball joint\" usually refers to the primary ball joint connections at the ends of the control arms, this type of", "team grounds it or makes it dead immediately, a drop kick from the 22-metre line ensues. In American football, if a kick-off or punt goes into the endzone and the receiving team downs it without leaving the endzone, the result is a \"touch back\" and the receiving team gains possession of the ball at their own 20-yard (25 yard line in College Football) line.\nAn important difference between the two sports involves the aftermath of a score. In American football, the scoring team kicks off, except after a safety. In rugby union, the team conceding the score kicks off (in rugby", "traction in the heel. In a 2010 interview for the Russian sports daily Sovietskiy Sport, he was asked about the lack of heel spikes and said, \"Yes, that's true. Before every season I think it's time to move on and use high jumping shoes but I still haven't switched to them. Somehow they do not work for me.\" Failure to use a \"normal\" jumping shoe does makes it difficult to jump in wet conditions. When it rained during the Men's High Jump final at the 2009 World Championships in Berlin, he finished in tenth place, saying \"When the rain started,", "to the inside of the tire. Thus, before coming to the conclusion that a puncture is causing air to leak from the tire, attempt to remove the puncture lightly by hand. It's very possible that the head of a nail or a very short nail created the appearance of a puncture, while not actually being one.\nAlso worth mentioning is the fact that tires simply lose air over time. A brand new tire, properly inflated, will lose air even with no punctures present. This is mainly due to the design of the valve stem, among other reasons. Given enough time, a", "team cause them to automatically lose a down. In some cases, depending on the spot of the foul, the ball is moved half the distance to the goal line rather than the usual number of yards, or the defense scores an automatic safety. Rationale Because football is a high-contact sport requiring a balance between offense and defense, many rules exist that regulate equality, safety, contact, and actions of players on each team. It is very difficult to always avoid violating these rules without giving up too much of an advantage. Thus, an elaborate system of fouls and penalties has been", "dead. Often, the ball hits the ground and is surrounded by players from the kicking team, who allow it to roll as far as possible downfield – without going into the end zone – before grasping or holding the ball against the ground. (If a punt bounces into the receiving team's end zone, it is dead, and a touchback is awarded.) On the other hand, if the ball touches a member of the receiving team without his gaining possession (a \"muff\"), then the ball can be recovered by either team (but cannot be advanced by the kicking team).", "Accident Physical and non-physical Physical examples of accidents include unintended motor vehicle collisions or falls, being injured by touching something sharp, hot, dropping a plate, accidentally kicking the leg of a chair while walking, unintentionally biting one's tongue while eating, accidentally tipping over a glass of water, contacting electricity or ingesting poison. Non-physical examples are unintentionally revealing a secret or otherwise saying something incorrectly, accidental deletion of data, forgetting an appointment etc. Common causes Poisons, vehicle collisions and falls are the most common causes of fatal injuries. According to a 2005 survey of injuries sustained at home, which used data", "is unsuccessful, the offside rules for a kick apply and play continues until a normal stoppage occurs. Because of the scoring attempt this is usually from the kicked ball going dead or into touch. Defenders may tackle the kicker while he is in possession of the ball, or attempt to charge down or block the kick. Rugby union World Rugby, the international governing body of rugby union, refers to this method of scoring in its publications as a \"dropped goal\", but this is commonly abbreviated to \"drop goal\". Points value A drop goal is worth three points, and before 1948", "is kicked, this effectively makes all twelve players \"onside\" and eligible to recover the kick, once it has gone ten yards downfield. On a punt or missed field goal, usually only the kicker is onside, as no one is behind the kicker. All of the players offside at the time of the kick may neither touch the ball nor be within five yards of the member of the receiving team who fields the kick; violation of this rule is a penalty for no yards. The penalty for no yards is 15 yards if the kick is in flight and 5", "happens when you’re having a good race.\" Ragan commented that he didn't \"know what happened to her, but typically when you hit the wall you hold onto the brakes, you lock it down -- you try not to come back across the track. I saw her coming back down and I was trying. I didn’t want to lock my brakes up because I knew I would hit her, so I was trying to just get it as low as I could and just couldn’t get it as low as I needed to. Unfortunate to get involved in a wreck like", "insult. Shoes are considered to be dirty as they frequently touch the ground, and are associated with the lowest part of the body—the foot. As such, shoes are forbidden in mosques, and it is also considered unmannerly to cross the legs and display the soles of one's shoes to someone when talking to them. This insult was demonstrated in Iraq, first when Saddam Hussein's statue was toppled in 2003, Iraqis gathered around it and struck the statue with their shoes. Secondly, in 2008, United States President George W. Bush had a shoe thrown at him by a journalist as a", "this was changed: it was forbidden for a player to touch the ball again after taking a corner-kick, before the ball had been touched by another player. In 1924, this restriction was accidentally removed, as an unintended consequence of the law-change allowing a goal to be scored directly from a corner. This possibility was exploited by Everton FC winger Sam Chedgzoy in a match against Arsenal FC on 15 November of that year. At the end of November, the International Football Association Board issued emergency instructions that dribbling was once again forbidden. The law was formally", "circles have an unwritten rule that there is no apologizing when a person drops the footbag. This guideline is designed to keep the new players from feeling as if it is their fault that the game is slow, and it keeps the experienced players from having to constantly reassure the new players that it is not their fault.\nVariations on circle kicking are numerous and spontaneously created. Freestyle footbag Freestyle footbag is a sport in which the object is to perform tricks with the bag. The ending position of the footbag on one trick becomes the starting position of the", "shoes may have a hole cut in to the heel to allow water to drain out, keeping the shoes from becoming saturated and heavy. This is especially important on longer run courses, where a minor annoyance can become painful. This is also more common in an aquathlon event where athletes go from swimming straight to running, carrying much more water into the shoe. Elastic Shoelaces Triathletes often replace their shoelaces with laces made of elastic, which allows a triathlete when racing them to pull on the shoes without stopping to tie the laces. This saves a time during the bike", "also will tear and cause swollen ankle. The action damages the ligaments, which is a short band of tough, flexible, fibrous connective tissues holding the bones together. Ankle rolling could also hurt cartilage or tendons. Sprained ankle usually swells and bruises for approximately one week or two, while serious injuries can take several months to fully heal.\nMost ankle sprains are lateral sprains that can occur when your feet roll, causing your lateral ankles to twist to the ground. This action stretches or tears the ligament.\nAthletes have greater risks of sprained ankles. They usually happened in people who play ball", "race, on the Sachsenring in East Germany, his motorcycle's engine seized due to the breaking up of the lower left hand connecting rod bearing cage. He was thrown from the bike, his helmet came off. He and the bike slid off the track where he impacted an unprotected fence post before bouncing back to the edge of the racing surface.\nHis helmet was recovered from the opposite side of the track.\nIvy died from injuries received in the impact with the fence post. Injuries were listed as a fractured skull, brain hemorrhage, fractured ribs and a large puncture to at least one", "believed this due to the emphasis against the metre on 'this'. Line 14 is saying that when one is dead, their truths and beauties come to an end as well.", "Footballer's ankle Footballer's Ankle is a pinching or impingement of the ligaments or tendons of the ankle between the bones, particularly the talus and tibia. This results in pain, inflammation and swelling. Causes A common cause of anterior impingement is a bone spur on anklebone (talus) or the shinbone (tibia). Repeated kicking actions can cause the anklebone to hit the bottom of the shinbone, which can lead to a lump of bone (or bone spur) developing. This bone spur may then begin to impact on the soft tissue at the front of the ankle, causing inflammation and swelling. The condition", "statement against the war that was brought to Iraq and the lives that it has cost. More generally, shoe-throwing or shoeing, showing the sole of one's shoe or using shoes to insult are forms of protest in many parts of the world. Incidents where shoes were thrown at political figures have taken place in Australia, India, Ireland, Taiwan, Hong Kong, Pakistan, the United Kingdom, the United States, and most notably the Arab world.\nEmpty shoes may also symbolize death. In Greek culture, empty shoes are the equivalent of the American funeral wreath. For example, empty shoes placed outside of a Greek", "should also be noted that this shoe design may cause harm to the athlete if worn for extended periods of time outside of competition. Injury may occur when walking in a leisurely fashion, as the athlete is not on his or her toes, which is the manner in which the shoes were meant to be worn. Types of shoes There is considerable variation among track shoes depending on their intended use within the sport of track and field.\nSprint spikes generally have a very stiff spike plate with the greatest number of spike wells. The taper is highest and most rigid", "line to the back of the end zone (adding ten yards to the kick distance) and awarded the ball to the defense on a missed kick at the spot where the ball was snapped (this changed in 1994 to the spot of the kick). Then, in 1977, the NFL added a rule, informally known as the \"Tom Dempsey Rule\", that \"any shoe that is worn by a player with an artificial limb on his kicking leg must have a kicking surface that conforms to that of a normal kicking shoe.\"" ]
Why are the words "Yeah" and "Oh" always in pop songs and said for so long?
[ "They are used as *filler* where the tune requires a note, but the singer doesn't have anything more to say.\n\nAn excellent lyricist will try to adjust the wording so that not too many of these are needed.", "Good filler that can make even the most unintelligible lyrics sound intelligible. [Example](_URL_0_)" ]
[ "Ame)\" in 1991 and several powerful tieups with TV programs, their popularity peaked during the first half of the 1990s. In those days, they released five million-selling hits: \"Say Yes\" and \"if\", \"YAH YAH YAH/夢の番人 (YAH YAH YAH/Yume no Bannin)\", \"HEART/NATURAL/On Your Mark\", \"めぐり逢い (Meguriai)\". \"Say Yes\" and \"YAH YAH YAH\" each sold over two million copies. \"Say Yes\", released in 1991, is the sixth best-selling single in Japanese Oricon charts history. \"Say Yes\" was the opening theme song for 101回目のプロポーズ (101st Proposal), a 1991 TV drama. Their album Tree has been certified by the RIAJ for sales of 3", "Me’ because it's not a very nice thing to say about yourself. It's also not as ‘hit single’-y in people's minds. I know this because people actually suggested removing the ‘t’. I know some of them were joking but not all of them.\nI wrote the song on the piano and my original music was very much like a combination of the picking acoustic guitar part and the piano part Charlie plays on the record. The two parts are, in fact, derived from different parts of my original piano recording. I always knew the song was never supposed to be pretty.\nThe", "with 'Hey Mama', but it was a weird time because I was credited with the song without being really known, [so] it was nice to have another song with him and everything start again from the beginning.\"", "to number one, on the issue dated November 22, 2014, remaining there for five consecutive weeks, giving it a total of seven non-consecutive weeks at number one.\nOn the Bubbling Under Hot 100 Singles chart, which acts as a 25-song extension of the main Billboard Hot 100, \"Say Yes\" peaked at number nine. It also peaked at number 14 on the Billboard component Heatseekers Songs chart. Luis Gomez in an article for the Chicago Tribune opined that the song's religious message was the reason for its mild reception and performance on the mainstream charts.\nIn the United Kingdom, \"Say Yes\" debuted and", "they talk about. My lyrics aren’t generic pop lyrics just there because they rhyme. I’ve tried to write things as I’d say them, so it sounds more like me. There’s a song called Sticks And Stones, which is about when I was 17 and I thought I’d won the jackpot when I got in the band [Girls Aloud], and then things not turning out as I might have expected. The middle eight on that song is very honest and truthful. Advocacy The release of Cinderella's Eyes sparked interest surrounding the track \"Sticks and Stones\", which saw Roberts appear on British", "that mean?' And I went: 'I don't know. But are you telling me, when you've got 60,000 people singing it, they don't know what it means? It means something different to every one of them.' Music video The video for the song was directed by Nigel Dick and was filmed between February 15 and 16, 1996 at Ealing Studios in London, UK. Live performances The song was played at the majority of Oasis concerts. Noel Gallagher has stated that \"I think it's the only song, that since it was written, that we've played every night.\" During the Morning Glory Tour", "else writes about. Basically 90% of all songs seem to be either \"Baby, I love you so\", or \"Baby, you've done me wrong\". Now, when people look at songs, when I play anybody on the planet this song, and I say \"What is this?\", they will say, \"Oh, that's Reggae\", or \"Oh, that's Heavy Metal\", or \"That's Country & Western\", or \"Oh, that's Opera\", you know what I mean? But that's not what I asked. They're answering a question I didn't ask. What they're saying is \"That's the music\". What I'm saying is \"What is the song?\" And the song", "because he wanted to feel as though he was singing to a live audience. The song is one of several tracks on Abbey Road that have never been performed onstage by McCartney or any other of the Beatles to date. Influences \"Oh! Darling\" appears to have drawn heavily on the New Orleans rhythm and blues sound popularised during the 1950s and early 1960s by African-American musicians such as Fats Domino; it also seems to have drawn on the Louisiana swamp blues sound found in songs like Slim Harpo's \"Rainin' in My Heart\" and Charles Brown's \"Please Come Home for Christmas\".", "It was a message that I wanted to deliver through my work, and the inspiration that we wanted to deliver through music and performance was being realized, so it was unlike anything else. At the time when we debuted, I didn’t fully understand the lyrics so I might have been imitating it with bright eyes. But as time passes and I listen to the song, the lyrics touch me even more.\nDuring the 2016-17 South Korean protests, the song, along with Twice's \"Cheer Up\" and Big Bang's \"Bang Bang Bang\", was sung widely in public squares, leading to it becoming the", "a band called Daughtry. The reason why this was chosen was that it struck a nerve with me every time I was listening to my iPhone or my iPod. It feels right. It sounds the way I want it to sound for people to hear me for the first time. That's the other thing for me, an awful lot of people have never heard me sing a full song, they've heard snippets here and there. For me it was really important to have a song that I was really feel happy with and how I sounded on and it stood", "\"Say Something\" debuted at number 47 on the week of December 29, 2013. Later, it re-entered at number 45, on January 19, 2014. The song went to jump from number 50 to number 9, on the week of February 2, 2014, until it reached the top of the ARIA Charts on the week February 16, 2014. It became A Great Big World's first number-one single and Aguilera's third number-one single (the last being \"Beautiful\" in 2003). The song became Aguilera's 18th Top 10 single in Australia, her last entry was on the Pitbull song \"Feel This Moment\" which made it", "adopt a meme simply because it is new. He aborts the intended prank, and instead takes a stand by doing what he really wants. He pulls his shirt out to simulate breasts, and begins to sing a number that spurs both the crowd and the Republicans (Rick Santorum, Mitt Romney, and Newt Gingrich) to join him in a massive act of group Faith Hilling.\nThe episode concludes with a reporter claiming that the messages behind these latest memes is unclear, but it does not matter as long as audiences are given a song, celebrity bashing, and Republican hopefuls dancing around with", "Sto lat Similar songs The song serves the equivalent function of \"Happy Birthday to You\" or \"For He's a Jolly Good Fellow\". Use as a phrase The phrase \"Sto lat!\" is also often used to wish someone longevity or good fortune, or as a toast, without the song. However, the use of \"Sto lat!\" in this manner will often lead to the song being sung by those present.\nThe phrase is also sometimes used to acknowledge someone's sneezing – similarly to \"God bless you\", though for that particular occasion a simple na zdrowie (\"To your health\") is more frequently used.\nIn literature,", "songs, such as \"We Will Rock You\" (1977), \"Start Me Up\" (1981), \"These Words\" (2004) and the theme song of the film Jaws due to the fact the track \"makes its presence known in exactly one second\". According to magazine Blender, \"...Baby One More Time\" is composed by \"wah-wah guitar lines and EKG-machine bass-slaps\". Claudia Mitchell and Jacqueline Reid-Walsh, authors of Girl Culture: Studying girl culture : a readers' guide (2008), observed that the lyrics of the song \"gesture toward [Spears] longing for the return of an ex-boyfriend.\" The next song and third single, \"(You Drive Me) Crazy\" runs through a", "for You\" at number 18 in his mid-year list of \"The Best Songs of 2015 So Far\", saying, \"Somewhere, the late, great Lesley Gore is smiling\". In a similar list raking the 15 best pop songs of same time, Lindner ranked it at number five describing the song as \"like you're wading through dark water with just the gleam of a treasure chest underneath\". She called it \"a truly unique pop song\" and concluded, \"it's weird enough with a meandering melody, but it still has those repeated words you can sing along with and get stuck in your head\". Entertainment", "it up, because it's too good.\" He noted that he wanted to make the song \"sound more now and current\" while keeping the originals \"whole chord progressions, the feeling and the vibe, but brought fresher sounds that are more now.\"\nHaitian-American musician Wyclef Jean also serves as a producer. In addition, Wyclef Jean sings the first line of the second chorus in Haitian Creole. Richie said new artists were selected for the song so the song could be aimed at a new audience, commenting, \"We have a familiar song that kids learn in school. Why not bring in Miley Cyrus and", "among them Mariah Carey, Ed Sheeran, Ariana Grande, Big Sean, Alanis Morissette, Meghan Trainor, Britney Spears, Hilary Duff, Little Mix, Chris Martin, Carly Rae Jepsen, and many others. During an interview with Ryan Seacrest, he described it as fun, summery, and amazing. Regarding its lyrics he commented Well, girls are often just flip-floppy. They say something and they mean something else. So what do you mean? I don't really know, that's why I'm asking. Later, on August 19, 2015, Bieber direct-messaged different lyrics from the song to 49 randomly selected Twitter followers. As explained by Billboard's Jason Lipshutz, Each message", "\"Say Something\" debuted at number nine on the Billboard Hot 100 with 98,000 downloads sold, after selling additional 21,000 before the tracking week, and 12.8 million streams. It also marked Timberlake's seventh number one in Digital Songs, and first since \"Can't Stop the Feeling!\" in 2016. The song has sold 431,000 downloads in the country as of June 2018.\nIn 2018, \"Say Something\" was ranked as the 85th most popular song of the year on the Billboard Hot 100.\nIn 2019, \"Say Something\" was certified Platinum in the UK exactly one year after its release, becoming his sixth Platinum seller in the", "it like that because I want things to be like that. I want it to be like it would be interpreted a lot of different ways. I don't do it so much anymore, but I used to think that when I write lyrics, I tried to do every line to where it could be taken more than one way. And my thought process behind that was, Well, if I can get two meanings out of it, then there are countless meanings out there for somebody else to apply it to their own life.\"\nHe also offers this bit of philosophy: \"The", "That's what 'I Wonder Why' was about. We kind of invented this percussive rhythmic sound. If you listen to that song, everybody was doing something different. There's four guys, one guy was doing bass, I was singing lead, one guy's going 'ooh wah ooh,' and another guy's doing tenor. It was totally amazing. When I listen to it today, oftentimes I think, 'man, those kids are talented.'\"\nTheir initial hit was followed by \"No One Knows\" and \"Don't Pity Me\", which also charted the Billboard Top 100. This success won a place for Dion and the Belmonts on the ill-fated \"The", "From Me to You Composition Lennon and McCartney began writing \"From Me to You\" while riding a coach heading to Shrewsbury as part of the Beatles' tour with Helen Shapiro. The title was inspired by the name of the letters section of the New Musical Express, which they had been reading: \"From You to Us\". McCartney noted that their early songs tended to include the words \"I\", \"me\" or \"you\" in them, as a way of making them \"very direct and personal\" to the band's fans.\nIn his 1980 interview with Playboy, Lennon recalled writing the song:\nWe were writing it in", "said Love. \"I wrote it because in many ways I am Mr. Wrong.\"\nRico Love came up with the song when he was working in the studio with Jim Jonsin. He told \"The Boombox\": \"It came to me when I heard the chorus to the song. It's pretty fast the way my process is - I don't over-think; I don't sit down and come up with concepts. Usually the music kinda tells me what to say. I kinda figure out instantly what I feel like a track is gonna say. With 'Mr. Wrong,' I felt like it described myself and my", "Most pop songs right now are like straight-up bangers, so we wanted to do something that might stand out a little bit and be a little more down-tempo.\"\nLyrically, the song finds the boy trying to forget his former beau in a club and getting himself drunk. According to Gary Saporta, \"the song is kind of like, fun, cheeky, screw-you-haters vibe.\" But as the lyrics describe, you really don’t need to be irritated to point upward. In fact, in this song, it’s an expression of happiness, perhaps after you've had a few drinks. Critical reception The song received mixed reviews from", "U.S. Pop), \"When You Need a Laugh\" (1963 - #47 U.S. Country), \"Someday\" (1964 - #123 U.S. Pop), and \"He Called Me Baby\" (1964 - #23 U.S. Country).", "spent several months \"perfecting\" the song, as Styrke wanted to ensure they would put their best effort into it. She told Pigeons & Planes that \"it usually takes [them] a long time to complete a song but in the end it's so worth it\". In an interview for Time, she described \"Say My Name\" as \"like a starting point of a new era\", and further elaborated on working with Loelv, \"I had been writing a lot prior to that, but it wasn't until I met Elof that it really clicked for me. Sometimes you need somebody to snap you out", "Say Yeah (Kiss song) Background Paul Stanley, the sole writer of the song, said about it: \"It was a song I knew was going to be great... I knew what this song was and its turned out exactly the way I had hoped, and really better. The band has four great voices so when we do a chorus together it sounds like the world singing.\" The song is about how we shouldn't be wasting time and over-thinking things.\n\"Say Yeah\" was announced December 5 to be the second single from Sonic Boom and was officially released on December 8 but", "has a mystery to it, that I have not quite figured out. It has a haunting twist to it.\"\nIn other interviews she said that she does not really know what \"Say It Right\" is about, \"but it captures the feeling I had when I wrote it, and it taps into this other sphere.\" The song was played during the Miss Universe 2007 Introductory Ceremony, the 2006 American Music Awards, and Concert for Diana. Critical reception Billboard magazine called the song \"a Pussycat Dolls-inspired contempo jam, high on hooks and of-the-moment production. Well done, if in the most generic sense.\" About.com's", "The Song Is You \"The Song Is You\" is a popular song composed by Jerome Kern with lyrics by Oscar Hammerstein II. It was written for their musical Music in the Air (1932) and sung in that show by Tullio Carminati. In the subsequent 1934 film, the song was recorded and filmed but cut from the final release. An instrumental of the song can still be heard under the opening credits.\nIn later years the song became often associated with Frank Sinatra.\n\"The Song Is You\" is the recurring musical theme of the 2003 Guy Maddin film The Saddest Music in the", "single \"What Do You Mean?\" for sharing \"a similar tropical pop route\" and found there were \"a few more spritz of sweet, beachy and dancehall-inspired notes\". Many critics also found sonic similarities between both songs.\nLyrically, the song is a plea \"for a chance to apologize to an unidentified lover\", with Bieber asking forgiveness, \"saying that he misses more than just her body and \"hoping they can 'both say the words and forget this. During the song, he sings: \"I know you know that I made those mistakes maybe once or twice By once or twice I mean maybe a couple", "When You Say Nothing at All Origin Overstreet and Schlitz came up with \"When You Say Nothing at All\" at the end of an otherwise unproductive day. Strumming a guitar, trying to write their next song, they were coming up empty. \"As we tried to find another way to say nothing, we came up with the song\", Overstreet later told author Ace Collins. They thought the song was OK, but nothing special. When Keith Whitley heard it, he loved it, and was not going to let it get away. Earlier, he had recorded another Overstreet-Schlitz composition that became a No." ]
How do certain websites offer free copyrighted movies and television shows without being shut down?
[ "I know of a few websites that use servers that are outside of the US, specifically in regions in which they could give fuck-all about US Copyright laws. Think small eastern Euro countries, and the middle east. I personally met someone who ran an operation remotely in Saudi Arabia, from the US, and literally had $25k dropped into his bank account overnight after three or four months of successful operation. It's insanely lucrative if you know and understand basic webdev and some programming.", "Generally they only link to other places that host the content (whether legally or illegally) so they aren't breaking any laws" ]
[ "website is now threatening visitors that their actions can get them caught, displaying the visitor's IP address.\nThe screen text reads as follows:\nThe United States Supreme Court unanimously confirmed that using this service to trade copyrighted material is illegal. Copying copyrighted motion picture and music files using unauthorized peer-to-peer services is illegal and is prosecuted by copyright owners.\nThere are legal services for downloading music and movies.\nThis service is not one of them.\nYOUR IP ADDRESS IS XXX.XXX.XXX.XXX AND HAS BEEN LOGGED.\n\nDon't think you can't get caught. You are not anonymous.\n— Grokster site Impact of legal threats and fallout from Grokster’s demise In the", "by the companies that they despise so much.\"\nProfessor Jukka Kemppinen, an expert on copyright legislation, states that Pirate Cinema is a deliberate provocation, but that, despite it being illegal, there is no point in making a big issue out of it. Kemppinen states \"It is no more illegal than showing a legally rented DVD to residents of an apartment building after an afternoon of volunteer work.\"", "that had been manufactured abroad with the publisher-plaintiff's permission. The defendant, without permission from the publisher, imported the textbooks and resold on eBay. The Supreme Court's holding severely limits the ability of copyright holders to prevent such importation.\nIn addition, copyright, in most cases, does not prohibit one from acts such as modifying, defacing, or destroying his or her own legitimately obtained copy of a copyrighted work, so long as duplication is not involved. However, in countries that implement moral rights, a copyright holder can in some cases successfully prevent the mutilation or destruction of a work that is publicly visible.", "system to change the level of accessibility to \"unsafe\" content for entire nations, including South Korea, Hong Kong and Germany. In summer 2007, German users staged a \"revolt\" over being assigned the user rights of a minor. See Censorship below. Licensing Flickr offers users the ability to either release their images under certain common usage licenses or label them as \"all rights reserved\". The licensing options primarily include the Creative Commons 2.0 attribution-based and minor content-control licenses – although jurisdiction and version-specific licenses cannot be selected. As with \"tags\", the site allows easy searching of only those images that fall", "in April 2014, the Court of Justice of the European Union ruled that \"national legislation which makes no distinction between private copies made from lawful sources and those made from counterfeited or pirated sources cannot be tolerated.\" Legality of uploading Although downloading or other private copying is sometimes permitted, public distribution – by uploading or otherwise offering to share copyright-protected content – remains illegal in most, if not all countries. For example, in Canada, even though it was once legal to download any copyrighted file as long as it was for noncommercial use, it was still illegal to distribute the", "stifles creativity. Illegally downloading movies from sites such as these without proper authorization violates the law, is theft, and is not anonymous. Stealing movies leaves a trail. The only way not to get caught is to stop. LokiTorrent controversy The associations have also obtained records from some closed tracker sites, which could be used to trace individual users. The administrator of one such site, LokiTorrent, closed the site and turned over its logs, amidst controversy, as part of a settlement ending a 2005 copyright infringement lawsuit filed by MPAA studios against him. The anti-\"piracy\" campaign's signature replaced the content of", "film Dearest Sister, Do and Larsen, who are the sole owner of the copyright, offered to enter the film into the public domain if a US$30,000 goal was reached. After reaching the goal, in addition to releasing the copyright, all raw footage and other production material was made available through the Internet Archive and the torrent site EZTV, thus \"open sourcing\" the entire project.\nDo put forth a \"community challenge\", inviting fans to re-edit the film using the material.", "pornographic materials, which could be lifted with the payment of a $20 fee. Censorship by institutions The constitutional and other legal protections that prohibit or limit government censorship of the Internet do not generally apply to private corporations. Corporations may voluntarily choose to limit the content they make available or allow others to make available on the Internet. Or corporations may be encouraged by government pressure or required by law or court order to remove or limit Internet access to content that is judged to be obscene (including child pornography), harmful to children, defamatory, pose a threat to national security,", "to one lost sale, and downloaders might not purchase the movie if illegal downloading was not an option. Due to the private nature of the study, the figures could not be publicly checked for methodology or validity, and on January 22, 2008, as the MPAA was lobbying for a bill which would compel universities to crack down on piracy, it was admitted by MPAA that its figures on piracy in colleges had been inflated by up to 300%.\nA 2010 study, commissioned by the International Chamber of Commerce and conducted by independent Paris-based economics firm TERA, estimated that unlawful downloading of", "Free Speech Zones are used as a form of censorship and public relations management to conceal the existence of popular opposition from the mass public and elected officials.\nWhile federal and state governments are barred from engaging in preliminary censorship of movies, nearly all American theatres refuse to exhibit movies that have not been rated by the MPAA, a private movie industry organization. This does not affect movie distribution via physical tapes or discs, cable TV, or the Internet. Since 2000, it has become quite common for movie studios to release \"unrated\" versions of films on DVD, containing content that had", "done to both control their market and to allow Disney films to be fresh for new generations of young children.\nThe practice of moratorium has been frowned upon by consumers because it forces higher sale prices. A normal DVD that is sold under moratorium can sell at retail for a very high price relative to the general run of DVDs. However, prices are known to drop near the end of the issue. In the past, a moratorium created urgency for people interested in a film to obtain it before it became unavailable. A side effect of the moratorium process is", "the fact that videos and DVDs of films, once they are placed on moratorium, become collector's items. Additional unintended side-effects to the practice of moratorium has made films a prime target for internet piracy and bootleg sales.", "prosecution under the Copyright Act.\nProposed laws such as the Stop Online Piracy Act broaden the definition of \"willful infringement\", and introduce felony charges for unauthorized media streaming. These bills are aimed towards defeating websites that carry or contain links to infringing content, but have raised concerns about domestic abuse and internet censorship. Legality of downloading To an extent, copyright law in some countries permits downloading copyright-protected content for personal, noncommercial use. Examples include Canada and European Union (EU) member states like Poland, and The Netherlands.\nThe personal copying exemption in the copyright law of EU member states stems from the Information", "becoming an entrenched norm built on fear of using any prior work without permission. These clearance fees are typically a major portion of a film's budget, which leads more producers to simply cut any footage out of a film rather than deal with obtaining permissions. The industry motto, according to entertainment attorney Fernando Ramirez, is \"When in doubt, cut it out.\" Analysis Mazzone places blame on both violators and the government:\nCopyright law itself creates strong incentives for copyfraud. The Copyright Act provides for no civil penalty for falsely claiming ownership of public domain materials. There is also no remedy under", "the copier has accessed the original material legally. United Kingdom Private copying of copyrighted material is illegal in the United Kingdom. According to a 2009 survey, 59% of British consumers believed ripping a CD to be legal, and 55% admitted to doing it. \nIn 2010, the UK government sought input on modernizing copyright exceptions for the digital age, and commissioned the Hargreaves Review of Intellectual Property and Growth. The review asserted that a private copying exception was overdue, citing that users were unaware of what was even legally allowed, and that a copyright law where \"millions of citizens are in", "Overnet Takedown notice On September 12, 2005 it was reported that MetaMachine, Inc. has agreed to settle with the RIAA for $30 million (Monterey Herald Article), and the website has been replaced by a text advertisement reflecting the RIAA's interpretation of copyright law:\n\nIf you steal music or movies, you are breaking the law.\n\nCourts around the world -- including the United States Supreme Court --\nhave ruled that businesses and individuals can be prosecuted for illegal\ndownloading.\n\nYou are not anonymous when you illegally download copyrighted material.\n\nYour IP address is xxx.xxx.xxx.xxx and has been logged.\n\nRespect the music, download legally.", "online advertising. The law establishes federal criminal liability for third-party content. There is a concern that this will lead companies to over-censor content rather than face criminal penalties, or to limit the practice of monitoring content altogether so as to avoid \"knowledge\" of illegal content. Americans with Disabilities Act (ADA) In 2016, complainants from Gallaudet University brought a lawsuit against UC Berkeley for not adding closed captioning to the recorded lectures it made free to the public. In what many commentators called an unintended consequence of the Americans with Disabilities Act of 1990, the Department of Justice ruling resulted in", "the Motion Picture Association. Zediva argued that it serves a similar function as rental stores like Blockbuster who don't need a licensing agreement to rent movies. Zediva only rented DVD's to one customer at a time and did not make DVD copies. The Motion Picture Association contended that this type of streaming was illegal and in violation of copyright law. In August 2011, the U.S. District court Judge John Walter ordered a preliminary injunction against Zediva, shutting down their service. The Columbia Pictures v. Redd Horne ruling played a key role in this case.", "any penalties for violating non-disclosure agreements or trade secret law. Family Home Movie Act of 2005 This section is an exemption of liability allowing the creation of technology that can edit a DVD or transmitted movie on the fly (during playback) and thus present a censored version of that movie. This provision arose out of a lawsuit between ClearPlay, a Salt Lake City-based company that markets DVD-sanitizing technology, and a number of Hollywood studios and directors. The ClearPlay technology allows a home consumer to screen out up to 14 different categories of objectionable content, such as drug use, sexual", "rights and the applicability of the law to the sharing of ripped files, not to the act of ripping, per se. Canada The Copyright Act of Canada generally says that it is legal to make a backup copy of any copyrighted work if the user owns or has a licence to use a copy of the work or subject-matter as long as the user does not circumvent a technological protection measure or give any of the reproductions away. This means that in most cases, ripping DVDs in Canada is most likely illegal. Australia and New Zealand In Australia and New", "was the turning point, as it became the precedent used in many other challenge cases. Relevant statute provisions The part of the statute (N. Y. Education Law, §122) in question that forbade the exhibition of unlicensed films read:\n[It is unlawful] to exhibit, or to sell, lease or lend for exhibition at any place of amusement for pay or in connection with any business in the state of New York, any motion picture film or reel [with specified exceptions not relevant here], unless there is at the time in full force and effect a valid license or permit therefor of the", "required to pay for their broadcast content. As in the case with recorded music, law ultimately settled this score by setting a price at which cable companies would pay copyright holders for their content.\nAccording to Lessig, \"every industry affected by copyright today is the product and beneficiary of a certain kind of piracy... Every generation welcomes the pirates from the last... until now. \"Property\" A copyright is an odd kind of property, because it limits free use of ideas and expression. Chapters 6–9 \noffer four stories to help illustrate what it means to say that a copyright is property.", "instructional film, but the archive who had the film made no distinction between copyrighted works and public domain works, thereby requiring her to pay a substantial fee.\nAccording to Matt Dunne, who wrote about this problem in a popular filmmaking trade journal, filmmakers are now \"abandoning projects because of cost or self-censoring materials...the sense in the [independent filmmaker]] community is that the problem [of clearance authorization] has reached a crisis point.\" As a result, MovieMaker magazine, another trade journal, suggests that producers should \"never assume that any film clip is in the public domain.\" Mazzone describes this new \"licensing culture\" as", "first business model that dissuades illegal file sharing is to make downloading digital media easy and cheap. The use of noncommercial sites makes downloading digital media complex. For example, misspelling an artist's name in a search query will often fail to return a result, and some sites limit internet traffic, which can make downloading media a long and frustrating process. Furthermore, illegal file sharing websites are often host to viruses and malware which attach themselves to the files (see torrent poisoning). If digital media (for example, songs) are all provided on accessible, legitimate sites, and are reasonably priced, consumers will", "a free site can earn through advertising may not be sufficient to cover the costs of that bandwidth. One recent entry into the free pornography website market are Thumbnail gallery post sites. These are free websites that post links to commercial sites, providing a sampling of the commercial site in the form of thumbnail images, or in the form of Free Hosted Galleries—samplings of full-sized content provided and hosted by the commercial sites to promote their site. Some free websites primarily serve as portals by keeping up-to-date indexes of these smaller sampler sites. These intents to create directories about adult", "of illegal copies, especially on the Internet. Unlike other organizations, by its own admission the GVU does not primarily aim at end-consumers, rather, it targets mainly the \"big fishes\". Besides those people who for example record a movie at the cinema or make copies from a computer game, these increasingly include the operators of so-called Trackers.\nThe GVU mainly focuses on large, internationally active release groups where copyrighted products are reproduced and distributed systematically, especially for profit. In its work, the association - if possible - accesses to public registers, for example, to reveal the real people behind a shell company.", "it is possible to hire a copy of a film from its distributor with the rights already cleared. The primary non-theatrical distributors of feature films on DVD, video and 16mm in Britain are the BFI and Filmbank Distributors.\nAnother option is to buy a blanket licence for the year known as a 'Public Video Screening Licence' which may work out cheaper if showing film is to be a regular event.", "do ban items, or at least strongly encourage retailers to not carry them. From the time the Ministry of Culture took over the censorship board until March 2006, about 40 VCD or DVD titles were banned, though a list of the banned items was not made available.\nIn 2007, the independent film, Syndromes and a Century was to undergo cuts before public release in Thailand. The censors objected to depictions of a Buddhist monk playing guitar, a physician kissing his girlfriend, some doctors drinking whisky in a hospital conference room and some monks playing with a remote-control flying saucer. Director Apichatpong", "it illegalised acts of demeaning the National Convention. Media laws including the Television and Video Act, which requires owners of media players (including televisions, satellites, and videocassette recorders) to obtain licenses from the Ministry of Communications, Posts, and Telegraphs and instituted Video Censorship Boards on domestic-produced videos, and the Motion Picture Law, which requires licenses issued by the Myanmar Motion Picture Enterprise in making films were passed.\nFilms are subject to censorship by the Motion Picture Censor Board. In addition, The Computer Science Development Law was passed. Under this law, all computer equipment must be approved by the Ministry of Communications,", "by its users. The company will be subject to substantial fines for non-compliance.\nThe US government's congressional international anti-piracy caucus stated that the site was \"overwhelmingly used for the global exchange of illegal movies, music and other copyrighted works\".\nThe Düsseldorf higher regional court twice overturned injunctions filed against RapidShare by Capelight Pictures, a German film and DVD rental company. The court declared that the file hoster could not be held liable for publication of copyright protected material by third parties and revoked the injunction initially upheld by the Düsseldorf district court in the main proceedings. The court also indicated that a" ]
The different branches of Christianity, and why they are no longer combated as heresy
[ "In many Christian circles, this is the analogy that applies:\n\nImagine a target, with three rings. The center, the bullseye, are the core values. I call them \"primaries\". It's what defines Christianity. Without starting a debate, I'll say that some people disagree on what goes in the middle. These people we'd call heretics (an extreme example would be to say that Christians pray to Allah - obviously wrong religion). \n\nIn the next outer ring, the middle, we have \"secondaries\" - this contains issues like speaking in tongues, eating shellfish/pork, Saturday vs Sunday Sabbath, etc. We can disagree and have discussion on these, but it doesn't make you less Christian. \n\nIn the outermost ring, everything else falls. This would be issues like watching R-rate movies, wearing jewelry made of gold, and non-related topics like playing sports or driving race cars. We use our secondaries and primaries to express our outermost issues.\n\nWe have unity in primaries, liberty in secondaries, and charity in all. \n\nSource: I am a Christian (actually a Messianic Jew)." ]
[ "denominational differences to the point of being narrowly exclusive\", similar to sectarianism).\nProtestant leaders differ greatly from the views of the leaders of the Roman Catholic Church and the Eastern Orthodox Church, the two largest Christian denominations. Each church makes mutually exclusive claims for itself to be the direct continuation of the Church founded by Jesus Christ, from whom other denominations later broke away. These churches, and a few others, reject denominationalism.\nHistorically, Catholics would label members of certain Christian churches (also certain non-Christian religions) by the names of their founders, either actual or purported. Such supposed founders were referred to as", "between some churches – one can potentially repair schism. For example, the Catholic and Eastern Orthodox Churches each regard the other as schismatic rather than heretical.\nSimilarly, a number of groups, such as The Church of Jesus Christ of Latter-day Saints (LDS Church), view apostolic succession as an essential element in constituting the one true church, arguing that it has inherited the spiritual, ecclesiastical and sacramental authority and responsibility that Jesus Christ gave to the Apostles. Other groups, such as Iglesia ni Cristo, believe in a last-messenger doctrine, where no such succession takes place. A few believe they have restored the", "are usually held to be the ultimate authority, alongside sacred tradition in some denominations (such as the Catholic Church and the Eastern Orthodox Church). Over many centuries, Christianity divided into three main branches (Orthodox, Catholic, and Protestant), dozens of significant denominations, and hundreds of smaller ones.\nIslam arose in the Arabian Peninsula in the 7th century CE with a strictly unitary view of God. Muslims hold the Quran to be the ultimate authority, as revealed and elucidated through the teachings and practices of a central, but not divine, prophet, Muhammad. The Islamic faith considers all prophets and messengers from Adam through", "claims between some churches – one can potentially repair schism. For example, the Catholic and Eastern Orthodox Churches each regard the other as schismatic rather than heretical.\nSimilarly, a number of groups, such as the Church of Jesus Christ of Latter-day Saints (LDS Church), view apostolic succession as an essential element in constituting the one true church, arguing that it has inherited the spiritual, ecclesiastical and sacramental authority and responsibility that Jesus Christ gave to the Apostles. Other groups, such as Iglesia ni Cristo, believe in a last-messenger doctrine, where no such succession takes place. A few believe they have restored", "Roman Catholics, Orthodox Christians, Episcopalians and most Protestant Christian denominations still maintain this belief. Furthermore, the Catholic Church makes the claim that is the one and only true Church founded by Jesus Christ, but the Eastern Orthodox and Oriental Orthodox Churches also make this claim in respect to themselves.\nChurch unity for these groups, as in the past, is something very visible and tangible, and schism was just as serious an offense as heresy. Following the Great Schism, Roman Catholicism sees and recognizes the Orthodox Sacraments as valid but illicit and without canonical jurisdiction. Eastern Orthodoxy does not have the concept", "is different: these are considered to be imperfectly, though not fully, members of the Church. This nuanced view applies especially to the Churches of Eastern Christianity, more particularly still to the Eastern Orthodox Church.\nThe First Council of Nicaea (A.D. 325) distinguished between schism and heresy. It declared Arian and non-Trinitarian teachings to be heretical and excluded their adherents from the Church. It also addressed the schism between Peter of Alexandria and Meletius of Lycopolis, considering their quarrel to be a matter of discipline, not of faith.\nThe divisions that came to a head at the Councils of Ephesus (A.D. 431) and", "In these churches, it is not possible to have a separation over doctrinal or leadership issues, and any such attempts automatically are a type of schism. Some Protestant groups reject denominationalism as well. Historical schisms and divisions Christianity has not been a monolithic faith since the first century or Apostolic Age, if ever, and today there exist a large variety of groups that share a common history and tradition within and without mainstream Christianity. Christianity is the largest religion in the world (making up approximately one-third of the population) and the various divisions have commonalities and differences in tradition, theology,", "Religious exclusivism Christian exclusivism A number of Christian denominations assert that they alone represent the one true church – the church to which Jesus gave his authority in the Great Commission. The Catholic Church, the Eastern Orthodox Church, the Oriental Orthodox communion and the Assyrian Church of the East each understands itself as the one and only original church. The claim to the title of the \"one true church\" relates to the first of the Four Marks of the Church mentioned in the Nicene Creed: \"one, holy, catholic, and apostolic church\". The concept of schism somewhat moderates the competing", "in the Balkans. As Protestantism is divided into a few distinguishable branches and multiple denominations within the former, it is hard to determine the relations specifically. Many of these denominations can have a different approachment to this matter. Islam is divided as well into various denominations. This article focuses on Protestant-Muslim relations, but should be taken with caution.\nRelations became more adversarial in the early modern and modern periods, although recent attempts have been made at rapprochement. In terms of comparative religion, there are interesting similarities especially with the Sunni, while Catholics are often noted for similarities with Shias, as well", "from ancient church structures such as the episcopate. However, both of these churches hold that they are a part of the catholic (universal) church. According to Harper's New Monthly Magazine: \nThe various Protestant sects can not constitute one church because they have no intercommunion...each Protestant Church, whether Methodist or Baptist or whatever, is in perfect communion with itself everywhere as the Roman Catholic; and in this respect, consequently, the Roman Catholic has no advantage or superiority, except in the point of numbers. As a further necessary consequence, it is plain that the Roman Church is no more Catholic in any", "be essential. Schism is a rejection of communion with the authorities of a Church, and not every break of communion is necessarily about doctrine, as is clear from examples such as the Western Schism and the breaking of communion between Patriarch Bartholomew I of Constantinople and Archbishop Christodoulos of Athens in 2004. But, when for any reason people withdraw from communion, two distinct ecclesiastical entities may result, each of which then, or at least some of its members, may accuse the other of heresy.\nIn Roman Catholic Church canon law, an act of schism, like an act of apostasy or heresy,", "\"through no fault of their own do not know Christ and his Church\", even though the teachings of Protestantism are indeed formally heretical from a Catholic perspective. Modern usage in ecumenical contexts favors referring to Protestants as \"separated brethren\".\nSome of the doctrines of Protestantism that the Catholic Church considers heretical are the belief that the Bible is the only source and rule of faith (sola scriptura), that faith alone can lead to salvation (sola fide), that the Pope does not have universal jurisdiction over the whole Church, that the Catholic Church is not \"the sole Church of Christ\", and that", "ability to rationalize and comprehend. By the same token, Islam never seeks converts through compulsion or threats or pressure of any kind. It deploys facts, reasoning, explanation and persuasion.\nIn contrast, we find that Christianity, the \nlast revealed religion before Islam, was \nimposed by force after Constantine, the Roman Emperor, made Christianity the \nofficial religion throughout his empire. \nHe adopted the same brutal means his \npredecessors had used against Christian \nminorities. These were not restricted to \nsubjects who did not convert to Christianity, but were also used against Christians \nwho would not accept the official doctrine sanctioned by the emperor.\nIslam came", "Church claims that title and considers the Eastern Orthodox Church to be in schism, while the Eastern Orthodox Church also claims that title and holds the view that the Catholic Church is schismatic. Some Protestant Churches believe that they also represent the One Holy Catholic and Apostolic Church and consider the Catholic and Orthodox Churches to be in error, while others do not expect a union of all Christian churches on earth. See also One true church and Great Apostasy.\nSchisms are particularly prevalent among Anabaptists, to the extent that divisions over even minute details of doctrine and theology are", "that some or all Christian groups are legitimate churches of the same religion regardless of their distinguishing labels, beliefs, and practices. The idea was first articulated by Independents within the Puritan movement. They argued that differences among Christians were inevitable, but that separation based on these differences was not necessarily schism. Christians are obligated to practice their beliefs rather than remain within a church with which they disagree, but they must also recognize their imperfect knowledge and not condemn other Christians as apostate over unimportant matters.\nSome Christians view denominationalism as a regrettable fact. As of 2011, divisions are becoming less", "that, in the view of the Catholic Church, the Christian communities born out of the Protestant Reformation and which lack apostolic succession in the sacrament of orders are not \"Churches\" in the proper sense. The Eastern Christian Churches that are not in communion with Rome, such as the Eastern Orthodox Church, Oriental Orthodoxy and the Assyrian Church of the East, are Churches in the proper sense and sister Churches of the Catholic particular Churches, but since communion with the Pope is one of the internal constitutive principles of a particular Church, they lack something in their condition, while on the", "it is used by members of other churches to suggest that the church in full communion with Rome is only one part of the One, Holy, Catholic and Apostolic Church. This argument is linked especially with the branch theory upheld by many Anglicans, (i.e., that the church in communion with the Pope is only one branch of a divided Catholic Church, of which the Eastern Orthodox Church and Anglicanism are the other two principal branches).\nIn 1864, the Holy Office rejected the branch theory, affirming in a letter written to the English bishops that the Roman Church is not just a", "in addition, some schismatic churches not in any communion, with all three groups identifying as Eastern Orthodox.\nThe main traditional historical communion is divided into two groups—those who use the Revised Julian calendar for calculating fixed feasts and the Julian calendar for calculating movable feasts, and those who use the Julian calendar for all purposes. This second group may include congregations whose church allows them to choose, with the proviso that the choice remains in effect at least until the end of the church year. Also in communion are the Estonian and Finnish Orthodox churches who have a dispensation to use", "Protestants, the Bible itself is the only final authority (see sola scriptura and prima scriptura), but tradition still plays an important supporting role. All three groups generally accept the traditional developments on the doctrine of the Trinity, for instance, and set bounds of orthodoxy and heresy based on that tradition. They also have developed creedal and confessional statements which summarize and develop their understanding of biblical teaching.", "that Eastern Catholics constituted churches whose vocation was to provide a bridge to the separated churches of the East. Background Communion between Christian churches has been broken over matters of faith, whereby each side accused the other of heresy or departure from the true faith (orthodoxy). Communion has been broken also because of disagreement about questions of authority or the legitimacy of the election of a particular bishop. In these latter cases each side accused the other of schism, but not of heresy.\nThe following ecumenical councils are major breaches of communion: Council of Ephesus (AD 431) In 431 the Churches", "the Catholic Church at the turn of the second Christian millennium (before the schisms of the Protestant Reformation), these other groups are viewed as being Christian, but who, to varying degrees, lack full theological orthodoxy and orthopraxy. As such, all groups outside of the Orthodox Church are not seen as being members of the church proper, but rather separated brethren who have failed to retain the fullness of the Christian faith and theology. These deviations from orthodoxy have traditionally been called heresy, but due to the term's perceived pejorative connotations, some prefer the more technical designation of the term heterodoxy.\nIn", "church government, doctrine, and language.\nThe largest schism or division in many classification schemes is between the families of Eastern and Western Christianity. After these two larger families come distinct branches of Christianity. Most classification schemes list six (in order of size: Catholicism, Protestantism, Eastern Orthodoxy, Anglicanism, Oriental Orthodoxy, and the Church of the East, which was originally referred to as Nestorianism but in modern times is embodied by the Assyrian Church of the East).\nUnlike Catholicism, Protestantism is a general movement that has no universal governing authority. As such, diverse groups such as Adventists, Anabaptists, Baptists, Binitarians, Charismatics, Congregationalists, Evangelicals, Holiness", "accepting of other denominations, and the basic orthodoxy of some is questioned by most of the others. Individual denominations also have formed over very subtle theological differences. Other denominations are simply regional or ethnic expressions of the same beliefs. Because the five solas are the main tenets of the Protestant faith, non-denominational groups and organizations are also considered Protestant.\nVarious ecumenical movements have attempted cooperation or reorganization of the various divided Protestant denominations, according to various models of union, but divisions continue to outpace unions, as there is no overarching authority to which any of the churches owe allegiance, which can", "Church\", even though the teachings of Protestantism are indeed formally heretical from a Catholic perspective. Modern usage in ecumenical contexts favors referring to Protestants as \"separated brethren\". In his book The Meaning of Christian Brotherhood, Pope Benedict XVI wrote that:\nThe difficulty in the way of giving an answer is a profound one. Ultimately it is due to the fact that there is no appropriate category in Catholic thought for the phenomenon of Protestantism today (one could say the same of the relationship to the separated churches of the East). It is obvious that the old category of ‘heresy’", "lack of commonly-accepted traditions and to disputes as to some peripheral doctrines. However, Anglicanism holds to a unique ecclesiology: in the Anglican view, the ancient and historic churches (such as the Anglican, Roman Catholic, Orthodox and Oriental churches) that maintained apostolic succession, belief, and practice are all branches of the Universal Church and there will always be a section of this tripartite church which will not fall into major heresy. Protestant Denominations A common defining belief of Protestant denominations is a rejection of the idea that any church leaders (popes, bishops, priests, or elders) are preserved from teaching error, or", "of \"validity\" when applied to Sacraments, but it considers the form of Roman Catholic Sacraments to be acceptable, and there is some recognition of Catholic sacraments among some, but not all, Orthodox. Both generally mutually regard each other as \"heterodox\" and \"schismatic\", while continuing to recognize each other as Christian, at least secundum quid. (See ecumenicism). Modern Christian views Some other Protestants hold that only believers who believe in certain fundamental doctrines know the true pathway to salvation. The core of this doctrine is that Jesus Christ was a perfect man, is the Son of God and that he died", "responses The view of the Roman Catholic Church is that Protestant denominations cannot be considered churches but rather that they are ecclesial communities or specific faith-believing communities because their ordinances and doctrines are not historically the same as the Catholic sacraments and dogmas, and the Protestant communities have no sacramental ministerial priesthood and therefore lack true apostolic succession. According to Bishop Hilarion (Alfeyev) the Eastern Orthodox Church shares the same view on the subject.\nContrary to how the Protestant Reformers were often characterized, the concept of a catholic or universal Church was not brushed aside during the Protestant Reformation. On the", "and Protestantism have in common a reliance on textual criticism of the Book. This historical precedence combines to fact that Islam incorporates to a certain extent the Jewish and Christian traditions, recognizing the same God and defining Jesus as a prophet, as well as recognizing Hebrew prophets, thus having a claim to encompassing all the religions of the Book.\nThe Quran itself regards the Christian Bible as corrupt, and holds that Jesus was not physically crucified (Sura 4:156–159). Iconoclasm The rejection of images in worship, although more prominent in Islam, is a common point in Protestantism and Islam. This was already", "Congregationalist, charismatic, and other Protestant denominations). Before the Protestant Reformation, church leaders (the bishops) were universally understood to gain their authority through apostolic succession via the Sacrament of Ordination. Divisions and controversies Today there is a wide diversity of Christian groups, with a variety of different doctrines and traditions. These controversies between the various branches of Christianity naturally include significant differences in their respective ecclesiologies. Christian denominations A denomination in Christianity is a generic term for a distinct religious body identified by traits such as a common name, structure, leadership, or doctrine. Individual bodies, however, may use alternative terms to", "heresy over schism. Presbyterian scholar James I. McCord (quoted with approval by the Episcopalian Bishop of Virginia Peter Lee) drew a distinction between them, teaching: \"If you must make a choice between heresy and schism, always choose heresy. As a schismatic, you have torn and divided the body of Christ. Choose heresy every time.\" Etymology The word schism comes from the greek word 'σχίσμα' which means cleft, division. Christianity The words schism and schismatic have found their heaviest usage in the history of Christianity, to denote splits within a church, denomination or religious body. In this context, \"schismatic\", as" ]
Where does color goes when the sun "bleaches" it?
[ "It breaks the molecules that make the color, and the byproducts don't have any specific color. The atoms are still there, but formed into different molecules." ]
[ "the colors to bleach or change in a process known as photodegradation. Materials that resist this effect are said to be lightfast. The electromagnetic spectrum of the sun contains wavelengths from gamma waves to radio waves. The high energy of ultraviolet radiation in particular accelerates the fading of the dye.\nThe photon energy of UVA-radiation which is not absorbed by atmospheric ozone exceeds the dissociation energy of the carbon-carbon single bond, resulting in the cleavage of the bond and fading of the color. Inorganic colourants are considered to be more lightfast than organic colourants. Black colourants are usually considered the", "materials can be made to look \"whiter than white\", this is achieved using optical brightener agents (OBA). These are chemical compounds that absorb light in the ultraviolet and violet region (usually 340–370 nm) of the electromagnetic spectrum, and re-emit light in the blue region (typically 420–470 nm). OBAs are often used in paper and clothing to create an impression of very bright white. This is due to the fact that the materials actually send out more visible light than they receive. Bleach and bleaching Bleaching is a process for whitening fabrics which has been practiced for thousands of years. Sometimes", "the chemical bonds that make up the chromophore. This changes the molecule into a different substance that either does not contain a chromophore, or contains a chromophore that does not absorb visible light. A reducing bleach works by converting double bonds in the chromophore into single bonds. This eliminates the ability of the chromophore to absorb visible light.\nSunlight acts as a bleach through a similar process. High energy photons of light, often in the violet or ultraviolet range, can disrupt the bonds in the chromophore, rendering the resulting substance colorless.\nSome detergents go one step further; they contain fluorescent chemicals which", "layer of the atmosphere, which works as a filter, scattering all but the longer (redder) wavelengths.\nFrom the observer's perspective, the red sunlight directly illuminates small particles in the lower atmosphere in the sky opposite of the Sun. The red light is backscattered to the observer, which is the reason why the Belt of Venus appears pink.\nThe lower the setting Sun descends, the less defined the boundary between Earth's shadow and the Belt of Venus appears. This is because the setting Sun now illuminates a thinner part of the upper atmosphere. There the red light is not scattered because fewer particles", "as it ages.\nyellowing also occurs due to the acidic sizing Bleaching of recycled pulp Hydrogen peroxide and sodium dithionite are used to increase the brightness of deinked pulp. The bleaching methods are similar for mechanical pulp in which the goal is to make the fibers brighter. Extraction or washing All bleaching agents used to delignify chemical pulp, with the exception of sodium dithionite, break lignin down into smaller, oxygen-containing molecules. These breakdown products are generally soluble in water, especially if the pH is greater than 7 (many of the products are carboxylic acids). These materials must be removed between", "hydrogen peroxide. If the fabric is to be dyed a deep shade, then lower levels of bleaching are acceptable. However, for white bed sheets and medical applications, the highest levels of whiteness and absorbency are essential.\nReductive bleaching is also carried out, using sodium hydrosulphite. Fibers like polyamide, polyacrylics and polyacetates can be bleached using reductive bleaching technology.\nAfter scouring and bleaching, optical brightening agents (OBA), are applied to make the textile material appear more white. These OBAs are available in different tints such as blue, violet and red. Mercerizing Mercerization is a treatment for cotton fabric and thread that gives fabric", "light. The atmosphere in particular filters out over 70% of solar ultraviolet, especially at the shorter wavelengths. Solar ultraviolet radiation ionizes Earth's dayside upper atmosphere, creating the electrically conducting ionosphere.\nThe Sun's color is white, with a CIE color-space index near (0.3, 0.3), when viewed from space or when the Sun is high in the sky. When measuring all the photons emitted, the Sun is actually emitting more photons in the green portion of the spectrum than any other. When the Sun is low in the sky, atmospheric scattering renders the Sun yellow, red, orange, or magenta. Despite its typical whiteness,", "Mie scattering.\nAs a ray of white sunlight travels through the atmosphere to an observer, some of the colors are scattered out of the beam by air molecules and airborne particles, changing the final color of the beam the viewer sees.\nBecause the shorter wavelength components, such as blue and green, scatter more strongly,\nthese colors are preferentially removed from the beam.\nAt sunrise and sunset, when the path through the atmosphere is longer, the blue and green components are removed almost completely leaving the longer wavelength orange and red hues seen at those times. The remaining reddened sunlight can then be scattered by", "– similarly Rayleigh scattering causes the atmospheric reddening of the Sun seen in the sunrise or sunset and causes the rest of the sky to have a blue color. This phenomenon is distinct from redshifting because the spectroscopic lines are not shifted to other wavelengths in reddened objects and there is an additional dimming and distortion associated with the phenomenon due to photons being scattered in and out of the line-of-sight.\nFor a list of scattering processes, see Scattering.", "light will scatter more than the longer wavelengths (yellow and especially red light). However, the Sun, like any star, has its own spectrum and so I₀ in the scattering formula above is not constant but falls away in the violet. In addition the oxygen in the Earth's atmosphere absorbs wavelengths at the edge of the ultra-violet region of the spectrum. The resulting color, which appears like a pale blue, actually is a mixture of all the scattered colors, mainly blue and green. Conversely, glancing toward the sun, the colors that were not scattered away — the longer wavelengths", "is centered near green, and produces the right combination for white light. Greybody radiation is produced at densities above 2400 A/cm².\nCurrent densities that are very high, approaching 4000 A/cm², tend to favor black-body radiation. Spectral lines all but disappear as the continuum radiation dominates, and output center shifts toward the ultraviolet. As current densities become even higher, visually, xenon's output spectrum will begin to settle on that of a blackbody radiator with a color temperature of 9800 kelvins (a rather sky-blue shade of white). Except in cases where intense UV light is needed, such as water decontamination, blackbody radiation is", "used. This involves placing a \"CT\" light filter in front of a light source. To the naked eye this type of filter appears blue, but when put in front of an amber shifted light source it counteracts the dominant amber colours to produce a more white light through a process known as subtractive mixing.", "to 20 minutes. The paper will retain the image of the leaf after it has been rinsed with water. Once the paper dries, parts that were exposed to the sun will turn a shade of Prussian blue (ferric ferrocyanide), while parts that were covered by the leaf will remain white. Light-sensitive vat dyes A specialized type of vat dye called Inkodye is also used for sun-printing due to its light-sensitive quality. Unlike other vat dyes which use oxygen to develop their color, Inkodyes are developed by light. These dyes are suspended in leuco form appearing colorless until they are exposed", "such as red and yellow light — are directly visible, giving the sun itself a slightly yellowish hue. Viewed from space, however, the sky is black and the sun is white.\nThe reddening of the sun is intensified when it is near the horizon because the light being received directly from it must pass through more of the atmosphere. The effect is further increased because the sunlight must pass through a greater proportion of the atmosphere nearer the earth's surface, where it is denser. This removes a significant proportion of the shorter wavelength (blue) and medium wavelength (green) light from the", "that absorbs most wavelengths of light, and appears black or brown as a result. Phaeomelanin, meaning rufous-black, is characterized by the presence of sulfur-containing cysteine, and it appears reddish to yellowish as a result. Melanosomes containing eumelanin are eumelanosomes, while those containing phaeomelanin are phaeomelanosomes. Melanocyte-stimulating hormone (MSH) binds to the Melanocortin 1 receptor (MC1R) and commits melanocytes to the production of eumelanin. In the absence of this signal, melanocytes produce phaeomelanin. Another chemical, Agouti signalling peptide (ASP), can attach itself to MC1R and interfere with MSH/MC1R signalling. In many mammals, variation in the level of ASP switches melanocytes between", "from red to magenta and, in relatively very low carbon dioxide concentrations, to purple. Carbon dioxide, even in the concentrations found in exhaled air, will dissolve in the indicator to form carbonic acid, a weak acid, which will lower the pH and give the characteristic colour change. A colour change to purple during photosynthesis shows a reduction in the percentage of carbon dioxide and is sometimes inferred as production of oxygen, but there is not actually any direct evidence for it.\nGreat care must be taken to avoid acidic or alkaline contamination of the apparatus in such experiments, since the test", "often sun bleach most prominently, and the rest of the coat may have a rusty tinge. A sun-bleached black may also be mistaken for the less common smoky black, but can be distinguished by pedigree analysis or DNA testing. Genetic identification In the study and discussion of equine coat color genetics, black is considered a \"base\" color, as is red. This designation makes the effects of other coat color genes easier to understand. Coat colors that are designated \"black-based\" include grullo (also called blue dun), smoky black, smoky cream, silver black, classic champagne, and blue roan. Sometimes this designation includes", "red light is emitted from the keto form of oxyluciferin, while green light is emitted from the enol form of oxyluciferin. However, 5,5-dimethyloxyluciferin emits green light even though it is constricted to the keto form because it cannot tautomerize.\nAnother mechanism proposes that twisting the angle between benzothiazole and thiazole rings in oxyluciferin determines the color of bioluminescence. This explanation proposes that a planar form with an angle of 0° between the two rings corresponds to a higher energy state and emits a higher-energy green light, whereas an angle of 90° puts the structure in a lower energy state and emits", "red glass illuminated from the outside by the sun appears almost black. In 1946, they installed a combination of different types of glass for the stars, namely, ruby red and milk-white glass with a layer of transparent crystal glass between them. The milk-white glass disperses the light of the lamps and reflects most of the daytime light at the same time, softening the darkness of the ruby glass during the day. In order to achieve more contrast and emphasize the beams of the stars, they installed the ruby glass in different shades, which absorbs only the red rays with a", "for each eye. The most common color filters used are red and cyan. Employing tristimulus theory, the eye is sensitive to three primary colors, red, green, and blue. The red filter admits only red, while the cyan filter blocks red, passing blue and green (the combination of blue and green is perceived as cyan). If a paper viewer containing red and cyan filters is folded so that light passes through both, the image will appear black. Another recently introduced form employs blue and yellow filters. (Yellow is the color perceived when both red and green light passes through the filter.)\nAnaglyph", "Under certain conditions it stains single-stranded nucleic acids fluorescing red (red luminescence) while when interacts with double stranded nucleic acids gives green fluorescence.", "objects such as the moon and bright planets.\nFurthermore, the Sun emits more green photons than any other color; i.e. it peaks in the green part of the visible spectrum. False color images Astronomical images are sometimes printed in false colors, which can make stars look green.", "red in colour, because the charged particles are interacting with hydrogen in its atmosphere. It is not known what the cause is. Some have speculated that material maybe being stripped off the surface of the brown dwarf via stellar winds to produce its own electrons. Another possible explanation is an as-yet-undetected planet or moon around the dwarf, which is throwing off material to light it up, as is the case with Jupiter and its moon Io.", "causes the abnormal cells to blanch white, while the normal tissues stain a mahogany brown from the iodine. Malachite green Malachite green (also known as diamond green B or victoria green B) can be used as a blue-green counterstain to safranin in the Gimenez staining technique for bacteria. It can also be used to directly stain spores. Methyl green Methyl green is used commonly with bright-field, as well as fluorescence microscopes to dye the chromatin of cells so that they are more easily viewed. Methylene blue Methylene blue is used to stain animal cells, such as human cheek", "of other organic matter in the place of application can make these disinfectants less effective, by consuming some of the released chlorine. Whitening agents Chlorine-based bleaches have been used since the late 18th century to whiten cotton and linen clothes, removing either the natural fiber color or stains of sweat or other organic residues. They are still used in households for laundry and to remove organic stains (such as mildew) on surfaces.\nColors of natural materials typically arise from organic pigments, such as beta carotene. Chlorine-based compounds work by breaking the chemical bonds that make up the pigment's chromophore. This", "production of the blue dye using sunlight to produce the blue color is shown. The dye is extracted from the hypobranchial gland of Hexaplex trunculus snails.\nChemically, exposure to sunlight turns the red 6,6'-dibromoindigo in snails into a mixture of blue indigo dye and blue-purple 6-bromoindigo. The leuco (white) solution form of dibromoindigo loses some bromines in the ultraviolet radiation. Alternative interpretations Tekhelet is ancient Hebrew for blue-violet, used in Modern Hebrew as a color equivalent to light blue. Karaite Jews believe that the importance of Tekhelet is that the color of thread is blue rather than it being necessarily a", "and older dye.\nNote that this type of color correction is ineffective on hair lightened with hydrogen peroxide, as hair bleaching is an irreversible chemical reaction that oxidizes hair's melanin, effectively rendering it colorless. Most color depositing dyes use a weak hydrogen peroxide-based developer, or oxidizing agent, so results may not match natural hair color. Notes for usage It is advisable to follow color removal with a clear color filler before attempting to color hair again because hair will be more porous and re-dyed hair may darken more intensely and quickly.\nAdditionally, hair dye stripping products often have a strong, lingering", "they are applied to light blond hair. Darker hair (medium brown to black) would need to be bleached in order for these pigment applications to take to the hair desirably. Some types of fair hair may also take vivid colors more fully after bleaching. Gold, yellow and orange undertones in hair that has not been lightened enough can muddy the final hair color, especially with pink, blue and green dyes. Although some alternative colors are semi-permanent, such as blue and purple, it could take several months to fully wash the color from bleached or pre-lightened hair. Adverse effects Hair coloring", "changes the molecule into a different substance that either does not contain a chromophore, or contains a chromophore that does not absorb visible light.\nIndustrially, chlorine-based bleaches are used in a wide variety of processes, including bleaching of wood pulp. Safety Chlorine-releasing products present significant risks. It is estimated that, in 2002, there were about 3300 accidents needing hospital treatment caused by liquid bleach in British homes, and about 160 due to bleaching powder. Chemical burns Chlorine releasing solutions, such as liquid bleach and solutions of bleaching powder, can burn the skin and cause eye damage, especially when used in", "perceives this resulting light as red. This is the same effect that causes sunsets and sunrises to turn the sky a reddish color. An alternative way of conceiving this scenario is to realize that, as viewed from the Moon, the Sun would appear to be setting (or rising) behind Earth.\nThe amount of refracted light depends on the amount of dust or clouds in the atmosphere; this also controls how much light is scattered. In general, the dustier the atmosphere, the more that other wavelengths of light will be removed (compared to red light), leaving the resulting light a deeper red" ]
Animal cloning
[ "The egg of a donor animal is obtained. The nucleus is sucked out of the egg, and the nucleus from an adult animal that is desired to be cloned is injected. The egg then will either expire or start to divide. If division is allowed to continue, the embryo may be able to be implanted into a host surrogate mother animal, and the clone then gestates as a normal embryo does. Gestation complete, it is born. \n\nTada, clone.\n\nTypically, all the animal parts are the same animal, but not always. An example of a 12 day old experiment with cow egg and human nucleus happened, for example.\n\n_URL_0_\n\nIt is important to note that this does not guarantee a psychological/mental clone, but a physical one. The experiences of the clone, unless *exactly duplicated in every way to the original*, will mean the clone will wind up with a different personalty traits and/or knowledge (say, one dog can sit on command, while the cloned one won't know that if not taught.)\n\nHope that helps!\n\nEdit: Personality bit.", "You take an egg cel from an animal, put the genetic info from the donor animal in that cell and have it gestate normally.\n\nYou wind up with an animal that's nearly identical to the one who donated the genetic material.\n\nI do say nearly because there are a lot of diffrent things besides genetics that determine what an animal is going to be like. Amongst these are the conditions during gestation, moreover the genetic material donated by the 'mother' so to speak will have changed a little due to imperfectiosn in the cell division process or due to radiation and other environmental factors." ]
[ "life; others support therapeutic cloning's potential life-saving benefits.\nCloning of animals is opposed by animal-groups due to the number of cloned animals that suffer from malformations before they die, and while food from cloned animals has been approved by the US FDA, its use is opposed by groups concerned about food safety. Cloning extinct and endangered species Cloning, or more precisely, the reconstruction of functional DNA from extinct species has, for decades, been a dream. Possible implications of this were dramatized in the 1984 novel Carnosaur and the 1990 novel Jurassic Park. The best current cloning techniques have an average", "Scientists knew that many cloned animals suffer arthritis and ailments with the lungs and liver, and they were concerned that too many unanswered questions surround the prospect of cloning of humans safely. Clonaid set up press conferences in which they described their method of cloning, but they did not give any details. However, they did say that the third cloning was different in that it did not involve a mother's egg, but the surrogate's egg with the injection of the boy's DNA.\nAccording to Boisselier, Mark and Tracy Hunt, who were seeking to clone their dead son, invested $500,000", "the technology as usurping God's place and, to the extent embryos are used, destroying a human life; others support therapeutic cloning's potential life-saving benefits.\nCloning of animals is opposed by animal-groups due to the number of cloned animals that suffer from malformations before they die, and while food from cloned animals has been approved by the US FDA, its use is opposed by some other groups concerned about food safety. Philosophical debate The various forms of cloning, particularly human cloning, are controversial. There have been numerous demands for all progress in the human cloning field to be halted. Most scientific,", "extinction. The technique is similar to SCNT cloning which typically is between domestic animals and rodents, or where there is a ready supply of oocytes and surrogate animals. However, the cloning of highly endangered or extinct species requires the use of an alternative method of cloning. Interspecies nuclear transfer utilizes a host and a donor of two different organisms that are closely related species and within the same genus. In 2000, Robert Lanza was able to produce a cloned fetus of a gaur, Bos gaurus, combining it successfully with a domestic cow, Bos taurus.\nInterspecies nuclear transfer provides evidence of the", "are questionable. Cloning Cloning is the method discussed as an option for bringing back extinct species. This can be done by extracting the nucleus from a preserved cell from the extinct species and swapping it into an egg of the nearest living relative. This egg can then be inserted into a relative host. It is important to note that this method can only be used when a preserved cell is available. This means that it is most feasible for recently extinct species.\nAlthough de-extinction efforts have not yet succeeded in producing viable offspring of a previously extinct species, the same process", "and the clone. In another example, there may be expectations that the cloned individuals would act identically to the human from which they were cloned, which could infringe on the right to self-determination.\nProponents of animal rights argue that non-human animals possess certain moral rights as living entities and should therefore be afforded the same ethical considerations as human beings. This would negate the exploitation of animals in scientific research on cloning, cloning used in food production, or as other resources for human use or consumption. Religious views Religious views of cloning are mixed. Judaism Jewish view on cloning is", "article made the institute possible.\nThe Yanagimachi laboratory and his former associates continued to make advances in cloning. The first male animal cloned from adult cells was announced in 1999. In 2004 the laboratory participated in the cloning of an infertile male mouse. This advance may be used to produce many infertile animals for use in research in human infertility.\nMice cloned by the Honolulu technique were displayed at the Bishop Museum in Honolulu, Hawaiʻi, and the Museum of Science and Industry in Chicago, Illinois. Major work before and after 1960 As a graduate student of Hokkaido University in Japan Yanagimachi studied", "taken from the animal being cloned. The enucleated egg is then fused together with the nucleus of the cloning subject's cell using electricity. This creates an embryo, which is implanted into a surrogate mother through in vitro fertilization. If the procedure is successful, then the surrogate mother will give birth to a baby that is a clone of the cloning subject at the end of a normal gestation period. In 2014 researchers were reporting cloning success rates of seven to eight out of ten but in 1996 it took 277 attempts to create Dolly.\nHwang allegedly used this technique at his", "the subject was explored further in works such as Poul Anderson's 1953 story UN-Man, which describes a technology called \"exogenesis\", and Gordon Rattray Taylor's book The Biological Time Bomb, which popularised the term \"cloning\" in 1963.\nCloning is a recurring theme in a number of contemporary science fiction films, ranging from action films such as Jurassic Park (1993), Alien Resurrection (1997), The 6th Day (2000), Resident Evil (2002), Star Wars: Episode II (2002) and The Island (2005), to comedies such as Woody Allen's 1973 film Sleeper.\nThe process of cloning is represented variously in fiction. Many works depict the artificial creation of", "In 2003, a banteng was successfully cloned, followed by three African wildcats from a thawed frozen embryo. These successes provided hope that similar techniques (using surrogate mothers of another species) might be used to clone extinct species. Anticipating this possibility, tissue samples from the last bucardo (Pyrenean ibex) were frozen in liquid nitrogen immediately after it died in 2000. Researchers are also considering cloning endangered species such as the giant panda and cheetah. However, cloning of animals is opposed by animal-groups due to the number of cloned animals that suffer from malformations before they die. Interspecific pregnancy A potential technique", "believe it's just common sense.\" Cloning Some, such as Harvard geneticist George M. Church, believe that ongoing technological advances will let us \"bring back to life\" an extinct species by cloning, using DNA from the remains of that species. Proposed targets for cloning include the mammoth, the thylacine, and the Pyrenean ibex. For this to succeed, enough individuals would have to be cloned, from the DNA of different individuals (in the case of sexually reproducing organisms) to create a viable population. Though bioethical and philosophical objections have been raised, the cloning of extinct creatures seems theoretically possible.\nIn 2003, scientists tried", "interest. Virtually any tissue source can be used (even tissues from extinct animals), as long as the DNA is not extensively degraded. The DNA is then purified using simple methods to remove contaminating proteins (extraction with phenol), RNA (ribonuclease) and smaller molecules (precipitation and/or chromatography). Polymerase chain reaction (PCR) methods are often used for amplification of specific DNA or RNA (RT-PCR) sequences prior to molecular cloning.\nDNA for cloning experiments may also be obtained from RNA using reverse transcriptase (complementary DNA or cDNA cloning), or in the form of synthetic DNA (artificial gene synthesis). cDNA cloning is usually used to obtain", "altered in order to simulate human ailments. When these animals are altered, the group who created them are able to obtain a government patent for that animal. So far, 660 animal patents have been granted to various testing facilities for the creation of new animals that are bred to have specific human ailments. The AAVS has created Stop Animal Patents campaign and have already overturned two animal patents – rabbits bred with bad eyesight to simulate dry eye and beagles bred with lung infections. Animal cloning A more recent concern of the organization is that of animal cloning. Animal cloning", "successful cloning of primates until now. They then placed 21 of these ova into surrogate mother monkeys, resulting in six pregnancies, two of which produced living animals. The monkeys were named Zhong Zhong and Hua Hua, a reference to Zhonghua (Chinese: 中华, a Chinese name for China). Although the success rate was still low, the methods could be improved to increase survival rate in the future. By comparison, the Scotland-based team that created Dolly the sheep in 1996 required 277 attempts and produced only one lamb.\nThe scientists also attempted to clone macaques using nuclei from adult donors, which is much", "to form/become any cell in the body.\nThe reason why SCNT is used for cloning is because somatic cells can be easily acquired and cultured in the lab. This process can either add or delete specific genomes of farm animals. A key point to remember is that cloning is achieved when the oocyte maintains its normal functions and instead of using sperm and egg genomes to replicate, the oocyte is inserted into the donor's somatic cell nucleus. The oocyte will react on the somatic cell nucleus, the same way it would on sperm cells.\nThe process of cloning a particular farm animal", "obtained in a single day. Indeed, Xenopus was the first vertebrate animal for which methods were developed to allow rapid analysis of gene function using misexpression (by mRNA injection). Injection of mRNA in Xenopus that led to the cloning of interferon. Moreover, the use of morpholino-antisense oligonucleotides for gene knockdowns in vertebrate embryos, which is now widely used, was first developed by Janet Heasman using Xenopus.\nIn recent years, these approaches have played in important role in studies of human disease genes. The mechanism of action for several genes mutated in human cystic kidney disorders (e.g. nephronophthisis)", "Cloning Cloning is the process of producing genetically identical individuals of an organism either naturally or artificially. In nature, many organisms produce clones through asexual reproduction. Cloning in biotechnology refers to the process of creating clones of organisms or copies of cells or DNA fragments (molecular cloning). Beyond biology, the term refers to the production of multiple copies of digital media or software.\nThe term clone, coined by Herbert J. Webber, is derived from the Ancient Greek word κλών klōn, \"twig\", referring to the process whereby a new plant can be created from a twig. In botany, the term lusus was", "cloning was once the woolly mammoth, but attempts to extract DNA from frozen mammoths have been unsuccessful, though a joint Russo-Japanese team is currently working toward this goal. In January 2011, it was reported by Yomiuri Shimbun that a team of scientists headed by Akira Iritani of Kyoto University had built upon research by Dr. Wakayama, saying that they will extract DNA from a mammoth carcass that had been preserved in a Russian laboratory and insert it into the egg cells of an African elephant in hopes of producing a mammoth embryo. The researchers said they hoped to produce", "S. Haldane's 1924 non-fiction book Daedalus; or, Science and the Future, which used the Greek myth of Daedalus to symbolise the coming revolution in genetics; Haldane predicted that humans would control their own evolution through directed mutation and in vitro fertilisation. Cloning was explored further in stories such as Poul Anderson's 1953 UN-Man.\nCloning is a recurring theme in science fiction films like Jurassic Park (1993), Alien Resurrection (1997), The 6th Day (2000), Resident Evil (2002), Star Wars: Episode II (2002) and The Island (2005). The process of cloning is represented variously in fiction. Many works depict the artificial creation of", "person as well as to the fundamental equality of all people.\" Many conservative Christian groups have opposed human cloning and the cloning of human embryos, since they believe that life begins at the moment of conception. Other Christian denominations such as the United Church of Christ do not believe a fertilized egg constitutes a living being, but still they oppose the cloning of embryonic cells. Use of cloned animals for food On December 28, 2006, the U.S. Food and Drug Administration (FDA) approved the consumption of meat and other products from cloned animals. Cloned-animal products were said to be", "Campbell's interest in cloning mammals was inspired by work done by Karl Illmensee and John Gurdon. Working at the Roslin Institute since 1991, Campbell became involved with the cloning efforts led by Ian Wilmut. In July 1995 Keith Campbell and Bill Ritchie succeeded in producing a pair of lambs, Megan and Morag from embryonic cells, which had differentiated in culture. Then, in 1996, a team led by Ian Wilmut with Keith Campbell as the main (66% of the credit) contributor used the same technique and shocked the world by successfully cloning a sheep from adult mammary cells. Dolly, a Finn", "into any cell type. SCNT stem cells do not pose such a problem and continue to remain relevant in stem cell studies. Reproductive cloning This technique is currently the basis for cloning animals (such as the famous Dolly the sheep), and has been theoretically proposed as a possible way to clone humans. Using SCNT in reproductive cloning has proven difficult with limited success. High fetal and neonatal death make the process very inefficient. Resulting cloned offspring are also plagued with development and imprinting disorders in non-human species. For these reasons, along with moral and ethical objections, reproductive cloning in humans", "escape their enclosures. Despite being selectively cloned as females to prevent them from breeding, the dinosaurs develop the ability to reproduce through parthenogenesis. Cloning for warfare The use of cloning for military purposes has also been explored in several fictional works. In Doctor Who, an alien race of armour-clad, warlike beings called Sontarans was introduced in the 1973 serial \"The Time Warrior\". Sontarans are depicted as squat, bald creatures who have been genetically engineered for combat. Their weak spot is a \"probic vent\", a small socket at the back of their neck which is associated with the cloning process. The", "Snuppy History After Dolly the sheep was cloned in 1996, scientists had managed to clone numerous other animals, including cats, cows, gaur, horses, mice, mules, pigs, rabbits and rats but had been unsuccessful in cloning a dog due to the problematic task of maturing a canine ovum in an artificial environment. After several failed attempts by other scientists, Woo Suk Hwang, a lead researcher at Seoul National University, created a clone using tissue from the ear of a 3-year-old Afghan hound. 123 surrogate mothers were used to carry the embryos, of which 1,095 were implanted, the procedure resulted in only", "advantages that Raëlians had, as a pro-cloning religious group, in finding willing surrogates. A biotechnology company called Advanced Cell Technology had cloned human embryo cells for medical purposes, and its CEO Michael D. West said that the directions for cloning a human being were available in published scientific literature. Experts knowledgeable of the scientific advances in the field have noted that human reproductive chemistry is better understood than that of most animals. For this reason, they thought that a higher rate of success was possible in human cloning compared with animal cloning. Brigitte Boisselier anticipated that", "gametes; thus the fertilised ovum. Section 39A thus prohibits human cloning. United Kingdom On January 14, 2001 the British government passed The Human Fertilisation and Embryology (Research Purposes) Regulations 2001 to amend the Human Fertilisation and Embryology Act 1990 by extending allowable reasons for embryo research to permit research around stem cells and cell nuclear replacement, thus allowing therapeutic cloning. However, on November 15, 2001, a pro-life group won a High Court legal challenge, which struck down the regulation and effectively left all forms of cloning unregulated in the UK. Their hope was that Parliament would fill this gap by", "his laboratory, Sooam Biotech Research Foundation, which had performed the first-ever dog cloning in 2005. The cloning, performed in Yongin, Korea, involved inserting the DNA into five \"surrogate\" egg cells, each of which was implanted into a different female dog. In June 2009 five clone puppies, Trustt, Solace, Valor, Prodigy, and Deja Vu, were all delivered to Symington. At the time, BioArts was selling cloning services privately for $144,000 per puppy.\nSome animal welfare groups, including the American Society for the Prevention of Cruelty to Animals, criticized or questioned the cloning effort over concerns that cloned animals may suffer", "used in cloning the first mammal of the world, Dolly. Noori was cloned by Dr. Riaz Ahmad Shah, Dr.Syed Hilal Yaqoob, Dr. Maajid Hassan Bhat, Dr. Mujeeb Fazili,Firdous Ahmad Khan and colleagues at the Faculty of Veterinary Sciences and Animal Husbandry of Sher-e-Kashmir University of Agricultural Sciences and Technology of Kashmir in Shuhama, 13 km to the east of Srinagar. The successful cloning of Noori, which took two years, will assist the department in cloning the endangered species of Kashmir stag (hangul); they previously cloned a water buffalo in 2009. The funding for Noori's cloning was provided by the World Bank,", "of living cells. Steps In standard molecular cloning experiments, the cloning of any DNA fragment essentially involves seven steps: (1) Choice of host organism and cloning vector, (2) Preparation of vector DNA, (3) Preparation of DNA to be cloned, (4) Creation of recombinant DNA, (5) Introduction of recombinant DNA into host organism, (6) Selection of organisms containing recombinant DNA, (7) Screening for clones with desired DNA inserts and biological properties.\nAlthough the detailed planning of the cloning can be done in any text editor, together with online utilities for e.g. PCR primer design, dedicated software exist for the purpose. Software for", "Functional cloning Functional cloning is a molecular cloning technique that relies on prior knowledge of the encoded protein’s sequence or function for gene identification. In this assay, a genomic or cDNA library is screened to identify the genetic sequence of a protein of interest. Expression cDNA libraries may be screened with antibodies specific for the protein of interest or may rely on selection via the protein function. Historically, the amino acid sequence of a protein was used to prepare degenerate oligonucleotides which were then probed against the library to identify the gene encoding the protein of interest. Once candidate clones" ]
Considering the origins of the English language (of which I have limited knowledge). Could an alien civilisation develop a strikingly similar language?
[ "Well, you have rather easy window into this:\n\nTry comparing languages from other places around the Earth. Do they resemble each other?\n\nTurns out, even if you have people who repeatedly talked to each other, shared environment, and their language was born from the same original language, the languages within just the span of hundreds of years diverge greatly.\n\nLanguages sharing roots basically means that the language you speak and language they speak were originally the same language, but both developed in other direction. For example, English is a Germanic language. A long time ago speakers of that Germanic language started living in various places in Europe, and that Germanic language then developed, due to various circumstances, into English, German, Swedish, Norse, etc. Germanic languages belong to wider group of Indo-European languages, which also contains Latin and other Romance languages, like Spanish. Originally these were a single tongue that was just split.\n\nBut there are other language families. Within Europe, Finno-Ugric language group is entirely unrelated to Indo-European languages. Japanese belongs seemingly to the language family of its own, it doesn't seem to share similarities with any other major languages. Africa has languages that for example utilize that clicking sound you can do with your tongue, resulting in massively different kind of language. Etc etc.\n\nBasically, even if you have humans, living on the same continent, that couple hundred or thousand years ago were speaking the same tongue, the language they speak today doesn't necessarily resemble much at all each other.\n\nEven further, if you're curious about English, you know how Shakespeare has his curious style of writing? That style is kinda what defines \"Early Modern English\". But turns out, English just couple hundred years earlier was almost unintelligible to modern speaker, \n\nHere for example is a Bible passage, in English, from 1380's:\n\n > And it was don aftirward, and Jhesu made iorney by citees and castelis, prechinge and euangelysinge þe rewme of God, and twelue wiþ him; and summe wymmen þat weren heelid of wickide spiritis and syknessis, Marie, þat is clepid Mawdeleyn, of whom seuene deuelis wenten out, and Jone, þe wyf of Chuse, procuratour of Eroude, and Susanne, and manye oþere, whiche mynystriden to him of her riches.\\\n\nHere's Lord's Prayer in Old English, from about 1000 years ago:\n\n > Fæder ūre þū þe eart on heofonum,\n\n > Sī þīn nama ġehālgod.\n\n > Tōbecume þīn rīċe,\n\n > ġewurþe þīn willa, on eorðan swā swā on heofonum.\n\n > Ūre ġedæġhwāmlīcan hlāf syle ūs tō dæġ,\n\n > and forġyf ūs ūre gyltas, swā swā wē forġyfað ūrum gyltendum.\n\n > And ne ġelǣd þū ūs on costnunge, ac ālȳs ūs of yfele.\n \n > Sōþlīċe.\n\nThe same read out loud: _URL_0_", "All the responses you've gotten so far are addressing this from a (human) linguistics point of view, which is probably the most scientific approach. That being said, xenobiology is more fun because the entire field is made of speculation and magic.\n\nSo, short answer: probably not.\n\nLong answer: the development of spoken language occurred, like all of human evolution, as a profound coincidence whose selective causes are still not certain. However, most animals - humans included - only accomplish a fraction of their communication through vocalizations, if any at all. Body language is the far more universal means of information transfer.\n\nOutside the animal kingdom, however, chemical secretions dominate almost every other form of life. Cells release chemicals to signal other cells in their population to divide or grow (or to avoid doing so). Plants and fungi communicate their health to their neighbors using airborne compounds. None of these forms of life use sound-based communication to any significant degree.\n\nFurthermore, while no forms of biological life that we know of use it, there is also electronic and radio communication, which humans use - by way of technology - to transmit vast sums of information. A different biosphere could potentially evolve this as a physiological capacity.\n\nEven ignoring the many, many theoretically possible means of information transfer that are supported by physics but did not evolve on Earth, there are clearly a lot of ways for organic beings to talk to each other, and most of them don't involve vibrating some chords in your throat and modulating the resulting noise with your lips and tongue.\n\nThere is also the fact that human language contains universal features because it is a creation of the human brain, and all human brains have certain structural and functional similarities. An alien species that did not evolve abstract reasoning in the mostly relational form we did might have entirely different - or absent - notions of syntax, grammar, and meaning. Even if you could construct a vocabulary out of some alien language composed of pheromones or magnetic pulses, there's no guarantee the resulting translation would be meaningful to you at all.\n\ntl;dr- we have absolutely no idea how similar any hypothetical extraterrestrial life might be to us, but the possibility space is vast, so the likelihood of any human-like language is very slim." ]
[ "attempts to show its relation to other languages than any other language in the world. Since Japanese first gained the consideration of linguists in the late 19th century, attempts have been made to show its genealogical relation to languages or language families such as Ainu, Korean, Chinese, Tibeto-Burman, Ural-Altaic, Altaic, Uralic, Mon–Khmer, Malayo-Polynesian and Ryukyuan. At the fringe, some linguists have suggested a link to Indo-European languages, including Greek, and to Lepcha. As it stands, only the link to Ryukyuan has wide support. Current theories and possibilities Modern main theories tried to link Japanese on the one hand to northern", "other Australian Aboriginal languages as well as Basque, Burushaski and Tibetan. Among all Indo-European languages only, Yaghnobi, Kurdish language varieties (including Kurmanji, Zazaki and Sorani), and Hindi/Urdu, along with some other Indo-Aryan languages, are ergative.\nThe ergative case is also a feature of some constructed languages such as Na'vi, Ithkuil and Black Speech.", "(or subsequent) language learner cannot easily accomplish. Consequently, descriptive empirical studies of languages are usually carried out using only native speakers. This view is, however, slightly problematic, particularly as many non-native speakers demonstrably not only successfully engage with and in their non-native language societies, but in fact may become culturally and even linguistically important contributors (as, for example, writers, politicians, media personalities and performing artists) in their non-native language. In recent years, linguistic research has focused attention on the use of widely known world languages, such as English, as a lingua franca or a shared common language of professional and", "are especially important, although grammar (especially morphology) and the lexicon (vocabulary) may also be significant. Historical-comparative linguistics thus makes it possible to see great similarities between languages which at first sight might seem very different. Various characteristics of the Indo-European languages argue against an Indian origin of these languages, and point to a steppe origin of these languages. Archaeology: migrations from the steppe Urheimat The archaeological part posits an \"Urheimat\" on the Pontic steppes, which developed after the introduction of cattle on the steppes around 5,200 BCE. This introduction marked the change from foragist to pastoralist cultures, and the development", "period of uncertainty about whether indigenous languages could be described and investigated by the methods applied to European languages, the first linguists began the daunting task of trying to classify the languages of the Americas by using the comparative method.\nAmong the most prolific and gifted linguists of his times was Edward Sapir, who was among the first to apply the comparative method to Native American languages. However, contrary to current practice in historical linguistics, Sapir also often relied on \"hunches\" and \"gut feeling\" when proposing new language families. Some of these suggestions have been proven correct while others have not.", "of its own, which explains the exceptional interest that these languages have received from linguists. Looking for relationships It is possible that all natural languages spoken in the world today are related by direct or indirect descent from a single ancestral tongue. The established language families would then be only the upper branches of the genealogical tree of all languages, or, equally, lower progeny of a parent tongue. For this reason, language isolates have been the object of numerous studies seeking to uncover their genealogy. For instance, Basque has been compared with every living and extinct Eurasian language family", "this universal language is an intermediary language; one that different species can easily translate to and from their own languages, thus allowing simple communication between races. Examples of this approach include Interlac from the Legion of Super-Heroes, Babylon 5, and the Uplift Universe, where numerous sapient species use at least twelve \"Galactic\" languages (each version is used in communication between species that can articulate it, and that find it useful in expressing their concepts).\nNot all of these universal/intermediate languages take the form of spoken/written languages as is recognized in the human world. In the film and book Close Encounters of", "linguists argue that if individuals were truly so profoundly different as a result of their languages, then it would be immensely difficult to translate works between cultures and languages. However, there are Linguistic universals that occur in most, if not all, natural languages. Cross-linguistic and cross-cultural translations happen everyday, some even in a fraction of a second thanks to Artificial intelligence linguistic models such as Google Translate.\nFurther criticism was met from fellow linguist Steven Pinker, who was skeptical of Whorf's evidence based on the Hopi language. According to Pinker, Whorf is \"an amateur scholar of Native American languages\" whose claims", "believed that all languages were derived from Hebrew.\nMikhail Lomonosov compared numbers and other linguistic features in different languages of the world including Slavic, Baltic (\"Kurlandic\"), Iranian (\"Medic\"), Finnish, Chinese, Khoekhoe (\"Hottentot\") and others. He emphatically expressed the antiquity of the linguistic stages accessible to comparative method in the drafts for his Russian Grammar published in 1755:\nImagine the depth of time when these languages separated! ... Polish and Russian separated so long ago! Now think how long ago [this happened to] Kurlandic! Think when [this happened to] Latin, Greek, German, and Russian! Oh, great antiquity!\nGaston-Laurent Coeurdoux (1691–1779) sent a Mémoire to", "having been separated by the Torres Strait only 8000 years ago, and that a deep reconstruction would likely include languages from both. However, Dixon later abandoned his proto-Australian proposal, and Foley's ideas need to be re-evaluated in light of recent research. Wurm also suggested the Sepik–Ramu languages have similarities with the Australian languages, but believed this may be due to a substratum effect, but nevertheless believed that the Australian languages represent a linguistic group that existed in New Guinea before the arrival of the Papuan languages (which he believed arrived in at least two different groups). Typology The West Papuan,", "Jonathan Kaye (linguist) Travels Kaye traveled extensively, studying native languages in the area (Ex. languages of North and South America, the Ivory Coast, Slavic, Semitic, France, and others) and would frequently protest the idea that languages were radically different from one another:\nFrom our point of view as English speakers, a language such as Chinese\nmight seem totally different from our own. In fact, these two languages as\nwell as all other human languages are nearly identical. The differences that\nseem all important to us are relatively minor. (Jonathan Kaye 1989: 54).", "century. Some scholars also have reason to believe that the language was used or somehow came in contact with groups using the Algonquian languages of the Northeast to Midwest, with which Mobilian Jargon shares a number of words, such as papo(s) or papoš, meaning 'baby, child', which undeniably resembles the Narragansett word with the same meaning, pápūs. It is unknown how the crossover between the languages occurred; some possibilities include direct contact with Algonquian-speaking peoples in Virginia and North Carolina, or perhaps contact with French explorers using the Algonquian language at the time. Other Europeans also learned the language, but", "Humboldt and Duponceau's view of the exceptional nature of American languages against the claim of Hewitt, who was half Tuscarora and had studied the Iroquoian languages, that languages such as the Iroquois had grammatical rules and verbs just like European languages. Edward Sapir's morphological types Edward Sapir reacted to the prevailing view in Americanist linguistics which considered the languages of the Americas to belong to a single basic polysynthetic type, arguing instead that American indigenous languages were highly diverse and encompassed all known morphological types. He also built on the work of Leonard Bloomfield who in his 1914 work \"language\"", "was originally an affixal particle.\nSimilarities have long been noted between the verb conjugation systems of Uralic languages (e.g. that of Finnish) and Indo-European languages (e.g. those of Latin, Russian, and Lithuanian). Although it would not be uncommon for a language to borrow heavily from the vocabulary of another language (as in the cases of English from French, Persian from Arabic, and Korean from Chinese), it would be extremely unusual for a language to borrow its basic system of verb conjugation from another. Supporters of the existence of Indo-Uralic have thus used morphological arguments to support the Indo-Uralic thesis by, for", "At least one settlement appears to be mixed, the Alvastra pile-dwelling.\nIt is not known what language these early Scandinavians spoke, but towards the end of the 3rd millennium BCE, they were overrun by new tribes who many scholars think spoke Proto-Indo-European (or more exactly, the \"Pre-Germanic Indo-European\" dialect), the Corded Ware culture (earlier known as the Battle-Axe culture). The genetic history of Europe connects the people carrying the language with the Yamnaya culture emanating from present day Ukraine, using Haplogroup R1a as an important genetic marker. This new people advanced up to Uppland and the Oslofjord, and they probably provided", "Amerind languages Background The idea that all the languages of the Americas are related goes back to the 19th century when early linguists such as Peter Stephen DuPonceau and Wilhelm von Humboldt noticed that the languages of the Americas seemed to be very different from the better known European languages, yet seemingly also quite similar to each other. When studies of American Indian languages began in earnest in the early 20th century linguists quickly realized that the indigenous languages were in fact not all that similar, but had a diversity much greater than among the languages of Europe. After a", "languages have been used to communicate and have evolved in a natural way, whereas Esperanto was designed by L. L. Zamenhof selecting elements from natural languages, not grown from natural fluctuations in vocabulary and syntax. Some natural languages have become naturally \"standardized\" by children's natural tendency to correct for illogical grammatical structures in their parents' speech, which can be seen in the development of pidgin languages into creole languages (as explained by Steven Pinker in The Language Instinct), but this is not the case in many languages, including constructed languages such as Esperanto, where strict rules are in place as", "a doctrine of evolutionary polygenism based on the ideas of the linguist August Schleicher, in which several different language groups had arisen separately from speechless prehuman Urmenschen (German: proto-humans), which themselves had evolved from simian ancestors. These separate languages had completed the transition from animals to man, and, under the influence of each main branch of languages, humans had evolved – in a kind of Lamarckian use-inheritance – as separate species, which could be subdivided into races. From this, Haeckel drew the implication that languages with the most potential yield the human races with the most potential, led by the", "genetic relationship to any of the world's other language families that is generally accepted by linguists at the present time. There is general agreement that it is not closely related to the other language families of North America. The more credible proposals on the external relations of Eskimo–Aleut all concern one or more of the language families of northern Eurasia, such as Chukotko-Kamchatkan just across the Bering Strait. One of the first such proposals was made by the pioneering Danish linguist Rasmus Rask in 1818, upon noticing similarities between Greenlandic and Finnish. Perhaps the most fully developed such proposal to", "Ido language History The idea of a universal second language is not new, and constructed languages are not a recent phenomenon. The first known constructed language was Lingua Ignota, created in the 12th century. But the idea did not catch on in large numbers until the language Volapük was created in 1879. Volapük was popular for some time and apparently had a few thousand users, but was later eclipsed by the popularity of Esperanto, which arose in 1887. Several other languages such as Latino sine Flexione and Idiom Neutral had also been put forward. It was during this time that", "and facilitate the use of the language.\nIn 2009, UNESCO's Atlas of the World's Languages in Danger declared Manx an extinct language, despite the presence of hundreds of speakers on the Isle of Man. Since then, UNESCO's classification of the language has changed to \"critically endangered\".\nIn the 2011 census, 1,823 out of 80,398 Isle of Man residents, or 2.27% of the population, claimed to have knowledge of Manx, an increase of 134 people from the 2001 census. These were spread roughly uniformly over the island: in Douglas 566 people professed an ability to speak, read or write Manx; 179 in Peel,", "language isolates (e.g. Karuk, Esselen).\" Of the remainder, most are Uto-Aztecan or Athapaskan languages. Larger groupings have been proposed. The Hokan superstock has the greatest time depth and has been most difficult to demonstrate; Penutian is somewhat less controversial.\nThere is evidence suggestive that speakers of the Chumashan languages and Yukian languages, and possibly languages of southern Baja California such as Waikuri, were in California prior to the arrival of Penutian languages from the north and Uto-Aztecan from the east, perhaps predating even the Hokan languages. Wiyot and Yurok are distantly related to Algonquian languages in a larger grouping called Algic.", "Oto-Manguean languages Inclusion in macro-family hypotheses Some early classifications such as that by Brinton, considered that Oto-Manguean languages might be related to Chinese, because like Chinese the languages were tonal and mostly monosyllabic. This idea was quickly abandoned as it was discovered that tonal languages are common, and advances in the historical study of Chinese were made (including the discovery that Old Chinese was non-tonal). Edward Sapir included Subtiaba–Tlapanec in his Hokan phylum, but didn't classify the other Oto-Manguean languages in his famous 1929 classification. In his 1960 classification, Joseph Greenberg considered Oto-Manguean so aberrant from other Native American languages", "cognate languages, mainly expounded the languages that were better known to them, namely Greek, Latin and all German dialects. Other languages attracted much less of their attention. Yet it is strange that out of all other languages Slavonic takes the last place in their works. They would rather base their conclusions on the Zend language or Lithuanian or Celtic then on the rich and flourishing language of the tribe occupying the Eastern part of Europe. This phenomenon is hard to explain: they are either unable to lean the Slavonic language (yet they could indeed learn a language which was not", "namely a consequence of objectively high lexical and grammatical similarities between the languages themselves (e.g., Iberian Spanish and Iberian Portuguese), whereas the former is a property of one or more persons and is determined by subjective or intersubjective factors such as the respective languages' prevalence in the life history (including family upbringing, educational setting, and ambient culture) of the person or persons. Outcomes Research has found that the development of competence in the native language serves as a foundation of proficiency that can be transposed to the second language — the common underlying proficiency hypothesis. Cummins' work sought to overcome", "commonly expressed as \"the ability to form words that are equivalent to whole sentences in other languages\". The distinction between synthetic languages and polysynthetic languages is therefore relative: the place of one language largely depends on its relation to other languages displaying similar characteristics on the same scale.\nMany Amerindian languages are polysynthetic; indeed, most of the world's polysynthetic languages are native to North America. Inuktitut is one example, for instance the word-phrase: tavvakiqutiqarpiit roughly translates to \"Do you have any tobacco for sale?\". However, it is a common misconception that polysynthetic morphology is universal among Amerindian languages. Chinook and Shoshone,", "Timucua language Linguistic relations Timucua is an isolate, not demonstrably related genetically to any of the languages spoken in North America, nor does it show evidence of large amounts of lexical borrowings from them. The primary published hypotheses for relationships are with the Muskogean languages (Swanton (1929), Crawford (1988), and Broadwell (2015), and with various South American families (including Cariban, Arawakan, Chibchan languages, and Warao) Granberry (1993). These hypotheses have not been widely accepted. Phonology Timucua was written by Franciscan missionaries in the 17th century based on Spanish orthography. The reconstruction of the sounds is thus based on interpreting", "work Auraicept na n-Éces claims that Fénius Farsaid visited Shinar after the confusion of tongues, and he and his scholars studied the various languages for ten years, taking the best features of each to create in Bérla tóbaide (\"the selected language\"), which he named Goídelc—the Irish language. This appears to be the first mention of the concept of a constructed language in literature.\nThe earliest non-natural languages were considered less \"constructed\" than \"super-natural\", mystical, or divinely inspired. The Lingua Ignota, recorded in the 12th century by St. Hildegard of Bingen is an example, and apparently the first entirely artificial language. ", "between the languages concerned. Linguistic interference can occur between languages that are genetically closely related, between languages that are distantly related (like English and French, which are distantly related Indo-European languages) and between languages that have no genetic relationship.\nOne theory concerning genetic relationships among languages is monogenesis – the idea that all known languages, with the exceptions of creoles, pidgins and sign languages, are descendant from a single ancestral language. Visual representation A common visual representation of a language family is given by a genetic language tree. The tree model is sometimes termed a dendrogram or phylogeny. The family tree shows", "been a place of great linguistic diversity, with many language families with no recoverable linguistic links to each other, much like western North America prior to European colonisation.\nDiscussion of hypothetical languages spoken in the European Neolithic is divided into two topics, Indo-European languages and \"Pre-Indo-European\" languages.\nEarly Indo-European languages are usually assumed to have reached Danubian (and maybe Central) Europe in the Chalcolithic or early Bronze Age, e.g. with the Corded Ware or Beaker cultures (see also Kurgan hypothesis for related discussions). The Anatolian hypothesis postulates arrival of Indo-European languages with the early Neolithic. Old European hydronymy is taken by Hans" ]
Why does my phone echo sometimes?
[ "issues with the line. there is noise on the line when you call. when you hang up an phone it makes a new connection and this time no issue with the connection. \n\nit can be either the person you call or your phone line causing this issue", "They could also be talking to you on speaker phone, so your friend's phone's microphone picks up your voice that it's creating. Happens to me all the time." ]
[ "Phantom vibration syndrome Phantom vibration syndrome or phantom ringing syndrome is the perception that one's mobile phone is vibrating or ringing when it is not ringing. Other terms for this concept include ringxiety (a portmanteau of ring and anxiety), fauxcellarm (a portmanteau of \"faux\" /fo͜ʊ/ meaning \"fake\" or \"false\" and \"cellphone\" and \"alarm\" pronounced similarly to \"false alarm\") and phonetom (a portmanteau of phone and phantom). According to Dr. Michael Rothberg, the term is not a syndrome, but is better characterised as a tactile hallucination since the brain perceives a sensation that is not actually present. WebMD published an", "its actual ringing. The ringing can generate a string of anxieties, characterized by thoughts associated with having to speak, perform and converse. Sufferers may perceive the other end as threatening or intimidating. Anxiety may be triggered by concerns that the caller may bear bad or upsetting news, or be a prank caller.\nFear of making calls may be associated with concerns about finding an appropriate time to call, in fear of being a nuisance. A sufferer calling a household or office in which they know several people may be concerned at the prospect of failing to recognize the voice of the", "effect is subtle, because it arises solely from the overtones of a single strike of the bell, rather than from separate instruments or voices.", "a signal due to the presence of another. This happens because the original neural activity caused by the first signal is reduced by the neural activity of the other sound.\nCombination tones are products of a signal and a masker. This happens when the two sounds interact causing new sound, which can be more audible than the original signal. This is caused by the non linear distortion that happens in the ear. For example, the combination tone of two maskers can be a better masker than the two original maskers alone.\nThe sounds interact in many ways depending on the difference in", "not heard, because it is masked by the \ntransient, an effect called temporal masking. Thus only the (anti-causal) echo before the transient is heard, and the phenomenon is called pre-echo.\nThis phenomenon occurs as a compression artifact in audio compression algorithms that use Fourier-related transforms, such as MP3, AAC, and Vorbis. Similar phenomena Other phenomena have similar symptoms to ringing, but are otherwise distinct in their causes. In cases where these cause circular artifacts around point sources, these may be referred to as \"rings\" due to the round shape (formally, an annulus), which is unrelated to the \"ringing\" (oscillatory decay) frequency", "G.165 G.165 is an ITU-T standard for echo cancellers. It is primarily used in telephony. Echo can occur on telephone lines when a user's voice is reflected back to them from further down the line. This can be distracting for the user and even make conversation unintelligible. Echo can also interfere with data transmission. The standard was released for usage in 1993, it was superseded by the G.168.", "I know the excitement that happens when you've got a hit - the telephone rings off the hook, and everybody wants a piece of you. But none of that was happening.\"", "were also discovered, particularly when using the flash. Antenna Shortly after the iPhone 4 was launched, some consumers reported that signal strength of the phone was reduced when touching the lower left edge of the phone, bridging one of the two locations which separates the two antennas, resulting in dropped calls in some areas with lower signal reception. In response, Apple issued a statement advising that customers should \"avoid gripping [the phone] in the lower left corner\" when making or receiving a call.\nAs a consequence of this problem, it was reported on July 2, 2010 that several iPhone 4 users", "article on phantom vibration syndrome with Rothberg as a source. Several other articles have been published recently, including in NPR, Bustle, CBS News, and Psychology Today. \nPhantom ringing may be experienced while taking a shower, watching television, or using a noisy device. Humans are particularly sensitive to auditory tones between 1,000 and 6,000 hertz, and basic mobile phone ringtones often fall within this range. Phantom vibrations develop after carrying a cell phone set to use vibrating alerts. Researcher Michelle Drouin found that almost 9 of 10 undergraduates at her college experienced phantom vibrations. History In the comic strip Dilbert,", "mobile phones\nThe attackers texted such messages as \"When you are feeling down... bash a Christian or Catholic and lift up\". and \"I've got a slut with me bro, come to Punchbowl\".", "was inundated with phone calls, leading her to assume that \"something must be wrong, somebody must be hurt\"; she later said she was \"excited that some light is being shone on [the song].\"\nThe song was premiered on AOL Music on November 18, 2005 (see 2005 in music), ahead of the December release of the film and of the soundtrack album The Chronicles of Narnia: The Lion, the Witch and the Wardrobe, on which it is featured. It was subsequently released as a radio single in some parts of Asia in early 2006 (see 2006 in music).\nOn February 28, 2010, Morissette", " \nTypically, a call is caused by the person's movement changing the shape of the pocket in a person's clothing in such a way that a small amount of pressure is applied to some of the buttons, or in the case of a touch screen phone, a call can also be caused by the screen of the phone facing the person's body and a small amount of perspiration creating sufficient conduction through their clothing such that the capacitive touch screen detects their clothing as if it were a touch from the user's finger.\nThe keypad lock feature found on most mobile", "it brings out a different feeling when it's absolutely blaring at you. I love that sound.\"", "Bump (application) Functionality Bump sends contact information, photos and files to another device over the internet. Before activating the transfer, each user confirms what he or she wants to send to the other user. To initiate a transfer, two people physically bump their phones together. A screen appears on both users' smartphone displays, allowing them to confirm what they want to send to each other. When two users bump their phones, software on the phones send a variety of sensor data to an algorithm running on Bump servers, which includes the location of the phone, accelerometer readings, IP address, and", "is a big plus but closing the phone with only one hand is a problem as there are no mechanics to help you do this. The speaker made a nice impression as it's loud and clear, but the sound during a call is not that good, and the vibrating alert is too weak. We're glad that there is a music player but it lacks advanced functionality and is quite uncomfortable, unlike the Radio which has an easy to use interface.\"", "– was something we puzzled over. Why, if everything is like it is, do so many things seem ersatz, phoney. But it's not phoney if you know it's phoney, as Truman Capote said of Holly Golightly \"she's not a phoney because she's a real phoney\".\nIn 1986 King toured in the US with a band called Mechanic Preachers.\nKing has written music for TV and film, notably title music for the BBC's Pandora's Box, Scrutiny and Westminster Daily. He co-wrote and produced songs featured on TV and the soundtracks of major movies such as The Karate Kid (1984), The Manchurian Candidate", "the wind, Chitty Chitty Bang Bang, and killer bees. (The first two have been explained by Gina's childhood exposure to horror movies.) In order to avoid being assaulted, Gina says she pretends to talk on the phone while walking through a parking lot, and if Joe is not home she will keep her cellular phone under her pillow, and turns on the TV (which cannot be visible from any window or someone might want to steal it) so it sounds as if people are talking if she is home alone.\nThough Jackson and Allred will admit to occasionally exaggerating their own", "and even purses? Whether PVS is the result of physical nerve damage, a mental health issue, or both, this growing phenomenon seems to indicate that we may have crossed a line in this 'always on' society.\"\nThe first study of the phenomenon was conducted in 2007 by a researcher who coined the term ringxiety to describe it. In 2012, the term phantom vibration syndrome was chosen as the Australian Macquarie Dictionary's word of the year. Causes The cause of phantom vibrations is not known. Preliminary research suggests it is related to over-involvement with one's cell phone. Vibrations typically begin occurring after", "think it's just buzzing and humming noises, so again...it's not for everybody.\"", "Echo In audio signal processing and acoustics, echo is a reflection of sound that arrives at the listener with a delay after the direct sound. The delay is directly proportional to the distance of the reflecting surface from the source and the listener. Typical examples are the echo produced by the bottom of a well, by a building, or by the walls of an enclosed room and an empty room. A true echo is a single reflection of the sound source.\nThe word echo derives from the Greek ἠχώ (ēchō), itself from ἦχος (ēchos), \"sound\". Echo in the folk story of", "up the recipient's phone line. If this is a landline, the recipient may have difficulty in disconnecting the call in order to use the phone, as networks sometimes define a timeout period between the recipient hanging up and the call actually being cleared.\nAccidental calls are often cited as being one of the more annoying consequences of cell phone usage. Given the haphazard nature of inadvertent dialing, most actual misconnections do not result from the selection of random numbers. Instead, pocket dialing frequently triggers the \"recently dialed\" and \"contact\" lists that are contained within modern cell phones. The caller is frequently", "cause of noise is due to the exocytosis of neurotransmitters from the synaptic terminals that provide input to a given neuron. This occurrence happens in the background while a cell is at resting membrane potential. Since it is happening in the background, the release is not due to a signal, but is random. This unpredictability adds to the synaptic noise level.\nSynaptic noise shows up as miniature postsynaptic current, which is observed without any presynaptic input. These spontaneous currents are due to randomly released neurotransmitter vesicles. This is caused by the stochastic \"opening of intracellular Ca²⁺ stores, synaptic Ca²⁺-channel noise, spontaneous", "jingles, which by their very nature are continually repeated over a period of weeks or months.\nA study published in the International Journal of Conflict Management found that one's response to an annoyance, at least when the perceived cause is another person, escalate to more extreme levels as they go unresolved. It also found that one was more likely to blame the party who was causing the annoyance in the study, rather than one's self, for the annoyance as it escalated.\nPsychological warfare can involve creating annoyances to distract and wear down the resistance of the target. For example, in 1993, the", "to panic alarms are slow. MIDI In a MIDI instrument when the note-off message for a played note is not received, the note will sound on endlessly, and also has the potential to rise in amplitude enough to damage the speakers or other components in the sound system. Hitting the panic button will send a note-off command to all keys, stopping any notes that were still playing.", "Broadcast System. These tones have become infamous, and can be considered both frightening and annoying by viewers; in fact, the two tones, which form approximately the interval of a just major second at an unusually high pitch, were chosen specifically for their ability to draw attention, due to their unpleasantness on the human ear. The SAME header is equally known for its shrillness, which many have found to be startling. The \"two-tone\" system is no longer required as of 1998, and is to be used only for audio alerts before EAS messages. Like the EBS, the attention signal is followed", "time. And oft-times I get lost. And people that are around me a lot know that when they see me smiling, they know I'm lost and I'm trying to get back. But it makes it much more interesting because then you do things that surprise yourself. And after you hear the recording, it makes you a little bit happy too because you say, \"Oh, I didn't know I could do THAT!", "calls.”\nThe anonymous artist has himself described the albums he has made as \"phone work\" or \"absurdist\" art rather than the less sophisticated label of \"prank phone calls\", and has also said, \"They may be dumb, but they're not stupid\". Those on the receiving end of a Longmont Potion Castle call are often left confused and/or extremely angry, as the calls frequently involve complaints about noise, requests for money or offers to \"whoop\" somebody. However his calls are rarely very mean-spirited in nature. His recordings combine prank calls with sound collages and his own musical compositions, the majority of which", "can cause a partial loss of low frequency information, making the resulting sound somewhat \"tinny.\" This negative effect can be heard on any stereo speaker system, but makes headphone listening particularly un-natural sounding. This is because the lead vocalist or performer's audio waveform would be attempting to partially cancel itself inside the listener's head, confusing the brain's audio positioning sense.\nDue to complicated interaction of phase and frequency it is difficult to predict exactly how the reduction from two channels to one will affect the sound of a particular instrument. Therefore mono sound from a true mono mix is", "phone starts ringing in across the room, in one of the backpacks. When he finally hangs up, the ringing stops. Eventually, the all clear is given.\nRyder fails to convince Katie to meet him, and Jake points out that it is strange for Ryder to be revealing things to an online person that he has not told his own friends. Ryder later sings \"Everybody Hurts\", and tells the glee club that he was molested by his babysitter when he was eleven years old. Two of the guys in the club, Sam and Artie, fail to understand why this was a traumatic", "to get along with somebody like that, then at the end of the night they exchanged numbers. The whole song is ‘Why didn’t you call me? Don’t leave me brokenhearted.’ She’s never really felt like this, she’s confused, she’s anxious. You think this guy might be a jerk, but then at the very end you figure out why he didn’t call.\" The 'cheerio' part in the song came about when Claude Kelly wanted to add a little personality to the song: he asked Amy, what would she say if she was pacing around her apartment waiting for a guy to" ]
what are the differences between parliamentary systems and the powers of a prime minister versus a president?
[ "The exact details vary from country to country, but basically the Prime Minister (or Chancellor, or similar term in other countries) is the head of *government*, while the President (or, in the case of countries like the UK, which are constitutional monarchies, the Monarch) is head of *state*. The US President combines both roles, but -- if things work the way they're designed to work -- his powers are limited by Congress as part of the system of \"checks and balances\", which also involve the courts in the three branches of government and the separation of powers.\n\nUsually, the PM is the leader of the largest party represented in Parliament -- so one of the elected representatives. He also chairs the Cabinet, which is also usually composed of elected representatives. From an American perspective, this means that much of the Executive branch overlaps with the Legislative branch.\n\nThe PM chairs the Cabinet, which implements laws and also formulates official government policy, so the Prime Minister pretty much sets the agenda. However, most things the PM and Cabinet do is subject to debates and votes in Parliament, which includes the opposition.\n\nThe role of a President is often ceremonial; and in a modern constitutional monarchy, the role of the monarch is also ceremonial. The British monarch, for example, has pretty much no say at all in the political system. In theory, the British Queen could refuse to sign an Act of Parliament into law; in practice, this would provoke a constitutional crisis and probably spell the end of the British monarchy. She does, though, represent Britain internationally, and holds some important posts, such as Head of the Commonwealth of Nations, which is a very useful platform for about 50 countries to discuss issues of mutual interest.\n\nIn a republic, the President might have a few actual powers. This might be emergency powers, such taking charge temporarily if the government collapses. The German President, for example, reviews all legislation he is asked to sign, and can refer it back to Parliament if he believes the proper procedure was not followed, or to the Constitutional Court if he believes it is not compatible with the constitution. The French President has more wide-reaching powers, and is allowed to actually direct government policy if (and only if) the majority of the Assembly sides with him.", "**Similarities between the Aus and US political systems:**\n\nBoth systems have 2 houses of representatives that have to be voted in, one based on population size (e.g., roughly 1 rep per million) and one house based on states (e.g., 4 per state) Nb: these example numbers are bullshit I plucked from thin air. Do not repeat them thinking they are real, they're not even alt facts. \n\nAll legislation must be passed through both houses.\n\nBoth have an independent judiciary. \n\n**Differences:**\n\nThe Prime Minister is the leader of the majority party. The President is semi-directly chosen by the people. \n\n*Major difference right here*\nThe government in Australia is drawn from the representatives selected by the people, *including the Prime Minister*. In the US the President choses who fills the roles of their government, but they can't be from the representatives. This is what people are talking about with the executive branch being separate in the US. Australia merges the executive and legislative. The US have a third group of government bureaucracy that Australia does not. \n\nAustralia's election cycle is less fixed. The PM can call for an early election in certain situations. The US has fixed terms. Other minor differences in election times and how long positions are held for. \n\nThe party's are less partisan in the US (yes, you read that right). From what I've been told (and may be wrong) this is particularly true of Aus. Labor party where voting against the party is basically not allowed. Australia also has more minor parties than the US. \n\n**With respect to the leaders**\n\nUS president is the head of state. Aus PM is not (although for all intents and purposes, they are) the Queen is. \n\nThe President is voted in semi-indirectly via the collegiate system. The PM is not voted in directly. Instead the PM is the leader of the party. \n\nOne of the quirks of being drawn from the party is the PM is responsible for a small electorate seat as well as the nation. The President is only responsible for the nation. \n\nUS has a 2-term/8-year limit. THere's no limit on the Aus PM. \n\nThe President may be impeached by Congress. The Aus PM can be kicked out by their own party or by the Queen. \n\nUS president can veto a law (which can be over-ridden by the upper and lower houses). \n\nBecause the executive branch is separated in the US, the president cannot enter a new law to be passed. He can only work within pre-exiting laws (which is what the executive orders are, they saying how the government intends to act. This is also why half of Trumps will be overturned, they'll be found unlawful). The Aus PM can and does involve themselves in making new laws. \n\nThe PM appoints people to the highest courts. The President appoints people that then need to be approved by congress. \n\nSimilarly for the executive branch. That's the people like Minister of Defence or Foreign Affairs. The PM picks them from the house of representatives and that's it. The President must have them ratified by congress.", "Within the limitations of their own countries I know the prime minister of the U.K. Is more powerful than the president of the USA. The US system has checks and balances installed into every aspect of the us government where as the PM as the leader of the legislature can combine them with their executive powers. In short the US president is more powerful internationally due to the might of the us's economy and military etc, but in terms of getting things done within their own country a Westminster prime minister is more powerful." ]
[ "President can be countered by the strong support/opposition of the parties. With a proportionally elected House, a President may strong-arm certain political issues.\nA Prime-Minister is never elected, but is a 'derivative' of the general election. In most cases, the power of the government is not split among different sections of the government (of President, Senate and House) and power is found with just the House. A Prime-Minister can be seen more as a manager than as a straight-out leader. Nations with district elections (such as the UK) and nations with proportionally elected representatives (such as Spain) can have a Prime-Minister.", "with parliamentary systems where the power of the monarch is also greatly circumscribed. In parliamentary systems the head of government, most often titled prime minister, exercises the most real political power. Semi-presidential systems have a president as an active head of state, but also have a head of government with important powers.\nThe rules for appointing the president and the leader of the government, in some republics permit the appointment of a president and a prime minister who have opposing political convictions: in France, when the members of the ruling cabinet and the president come from opposing political factions, this situation", "Third, the executive branch of government is led by the Prime Minister who must be able to command a majority in the House of Commons. The Cabinet of Ministers is appointed by the Prime Minister to lead the main departments of state, such as the Treasury, the Foreign Office, the Department of Health and the Department of Education. Officially the \"head of state\" is the monarch, but all prerogative power is exercised by the Prime Minister, subject to judicial review. Fourth, as the UK matured as a modern democracy, an extensive system of civil servants, and public service institutions developed", "the executive branch of government is led by the Prime Minister who must be able to command a majority in the House of Commons. The Cabinet of Ministers is appointed by the Prime Minister to lead the main departments of state, such as the Treasury, the Foreign Office, the Department of Health and the Department of Education. Officially the \"head of state\" is the monarch, but all prerogative power is exercised by the Prime Minister, subject to judicial review. Fourth, as the UK matured as a modern democracy, an extensive system of civil servants, and public service institutions developed to", "system, the president may have significant day-to-day power. For example, in France, when their party controls the majority of seats in the National Assembly, the president can operate closely with the parliament and prime minister, and work towards a common agenda. When the National Assembly is controlled by their opponents, however, the president can find themselves marginalized with the opposition party prime minister exercising most of the power. Though the prime minister remains an appointee of the president, the president must obey the rules of parliament, and select a leader from the house's majority holding party. Thus, sometimes the president", "while others use the word for any elected legislative body. Parliaments usually consist of chambers or houses, and are usually either bicameral or unicameral although more complex models exist, or have existed (see Tricameralism).\nIn some parliamentary systems, the prime minister is a member of the parliament (e.g. in the United Kingdom), whereas in others they are not (e.g. in the Netherlands). They are commonly the leader of the majority party in the lower house of parliament, but only hold the office as long as the \"confidence of the house\" is maintained. If members of the lower house lose faith in", "always from both legislative houses, the cabinet being responsible to both. Executive power is exercised by the prime minister and cabinet, all of whom are sworn into the Privy Council of the United Kingdom, and become Ministers of the Crown. The current Prime Minister is Boris Johnson, who has been in office since 24 July 2019. Johnson is also the leader of the Conservative Party. For elections to the House of Commons, the UK is divided into 650 constituencies, each electing a single member of parliament (MP) by simple plurality. General elections are called by the monarch when the prime", "Prime Minister of the United Kingdom Authority The Prime Minister is the head of the United Kingdom government. As such, the modern Prime Minister leads the Cabinet (the Executive). In addition, the Prime Minister leads a major political party and generally commands a majority in the House of Commons (the lower House of the legislature). The incumbent wields both significant legislative and executive powers. Under the British system, there is a unity of powers rather than separation. In the House of Commons, the Prime Minister guides the law-making process with the goal of enacting the legislative agenda of their political", "the Constitution, the powers of both Houses are nearly equal, with the consent of both Houses needed to pass legislation. The difference mostly relates to taxation legislation. In practice, by convention, the person who can control a majority of votes in the lower house is invited by the Governor-General to form the Government. In practice that means that the leader of the party (or coalition of parties) with a majority of members in the House becomes the Prime Minister, who then can nominate other elected members of the government party in both the House and the Senate to become ministers", "position of prime minister, the UK's head of government, belongs to the person most likely to command the confidence of the House of Commons; this individual is typically the leader of the political party or coalition of parties that holds the largest number of seats in that chamber. The prime minister chooses a cabinet and its members are formally appointed by the monarch to form Her Majesty's Government. By convention, the monarch respects the prime minister's decisions of government.\nThe cabinet is traditionally drawn from members of the prime minister's party or coalition and mostly from the House of Commons but", "Westminster system Operation The pattern of executive functions within a Westminster System is quite complex. In essence, the head of state, usually a monarch or president, is a ceremonial figurehead who is the theoretical, nominal or de jure source of executive power within the system. In practice, such a figure does not actively exercise executive powers, even though executive authority may be exercised in their name.\nThe head of government, usually called the prime minister or premier, will ideally have the support of a majority in the responsible house, and must in any case be able to ensure the existence of", "that, though, the president is a primus inter pares, having no power above and beyond the other six councillors. United Kingdom The term \"prime minister\" can be compared to \"primary minister\" or \"first minister\". Because of this, the prime ministers of many countries are traditionally considered to be \"first among equals\" – they are the chairman or \"head\" of a Cabinet rather than holding an office that is de jure superior to that of ministers.\nThe Prime Minister of the United Kingdom has frequently been described as \"first among equals\". In the UK, the executive is the Cabinet, and during", "Government of the United Kingdom Government in Parliament A key principle of the British Constitution is that the government is responsible to Parliament. This is called responsible government.\nThe United Kingdom is a constitutional monarchy in which the reigning monarch (that is, the king or queen who is the head of state at any given time) does not make any open political decisions. All political decisions are taken by the government and Parliament. This constitutional state of affairs is the result of a long history of constraining and reducing the political power of the monarch, beginning with Magna Carta in 1215.\nParliament", "the position largely ceremonial; most political power is thus vested in the Prime Minister, Greece's head of government. The position is filled by the current leader of the political party that can obtain a vote of confidence by the Parliament. The President of the Republic formally appoints the Prime Minister and, on his recommendation, appoints and dismisses the other members of the Cabinet.\nLegislative powers are exercised by a 300-member elective unicameral Parliament. Statutes passed by the Parliament are promulgated by the President of the Republic. Parliamentary elections are held every four years, but the President of the Republic is obliged", "head of state and represents the unity of the people, elected every five years, indirectly by the parliament through a secret ballot by a two-thirds majority of all deputies. The head of state invested primarily with representative responsibilities and powers. The president has the power to return draft legislation to the parliament for reconsideration and has a role in foreign affairs and certain official appointments. The Prime Minister serves as the head of government elected by the parliament. Ministers are nominated by the Prime Minister, and then confirmed by the parliament. The head of government exercises executive power of the", "republican head of state is the president of Israel, which holds no reserve powers whatsoever. The least ceremonial powers held by the president are to appoint the prime minister, to approve the dissolution of the Knesset made by the prime minister, and to pardon criminals or to commute their sentence. Executive model Some parliamentary republics (like South Africa, Botswana and Myanmar) have fused the roles of the head of state with the head of government (like in a presidential system), while having the sole executive officer, often called a president, being dependent on the Parliament's confidence to rule (like in", "a parliamentary system). While also being the leading symbol of the nation, the president in this system acts mostly as a prime minister, since the incumbent must be a member of the legislature at the time of the election, answer question sessions in Parliament, avoid motions of no confidence, etc. Semi-presidential systems Semi-presidential systems combine features of presidential and parliamentary systems, notably (in the president-parliamentary subtype) a requirement that the government be answerable to both the president and the legislature. The constitution of the Fifth French Republic provides for a prime minister who is chosen by the president, but who", "authority, even though the Prime Minister of the United Kingdom and the Cabinet effectively implement executive powers. In a parliamentary republic like India, the President is the de jure executive, even though executive powers are essentially instituted by the Prime Minister of India and the Council of Ministers. In Israel, however, executive power is vested de jure and de facto in the cabinet, and the President of Israel is de jure and de facto a ceremonial figurehead.\nAs an example, the Prime Minister and Cabinet (as the de facto executive body in the system) generally must seek the permission of the", "or political group that has the majority in the National Assembly.\nThe prime minister has a secondary role in the executive branch, when he or she is from the same party as the president, as the head of the executive is constitutionally the President. However, when there is cohabitation (i.e., when the president is of one party while another party controls the National Assembly) the prime minister's importance is enhanced because the president has little power to be exercised by himself or herself alone. Requirements The constitution does not expressly outline any direct requirement for this position. The only litmus is", "Politics of the United Kingdom Executive Executive power in the United Kingdom is exercised by the Sovereign, Queen Elizabeth II, via Her Majesty's Government and the devolved national authorities - the Scottish Government, the Welsh Assembly Government and the Northern Ireland Executive. The United Kingdom Government The monarch appoints a Prime Minister as the head of Her Majesty's Government in the United Kingdom, guided by the strict convention that the Prime Minister should be the member of the House of Commons most likely to be able to form a Government with the support of that House. In practice, this", "powers. The President and the Cabinet are two different authorities of the Region: in matters within its competence, the Cabinet has the power to vote to give its approval.", "by an independent Central Election Commission that includes members from all major political parties. Parties must register with the commission prior to participating in a national election. Normally, the prime minister-elect is the leader of the party receiving the most votes in parliamentary elections, although this is not always the case.\nUnlike the prime minister, presidential domestic power is more limited. The directly elected president serves as head of state and commander-in-chief of the armed forces, and has the authority to return a bill for further debate, although the parliament can override the presidential veto by a simple majority vote. Political", "within the government are either Members of Parliament or peers in the House of Lords.\nAs in some other parliamentary systems of government (especially those based upon the Westminster System), the executive (called \"the government\") is drawn from and is answerable to Parliament - a successful vote of no confidence will force the government either to resign or to seek a parliamentary dissolution and a general election. In practice, members of parliament of all major parties are strictly controlled by whips who try to ensure they vote according to party policy. If the government has a large majority, then they are", "principle of parliamentary sovereignty, and the American presidential model, which has its roots in the principle of separation of powers. For example, according to John Hart, using the American example to explain the accumulation of power in the hands of the British PM is flawed and that changing dynamics of the British executive can only be studied in Britain’s own historical and structural sense.\nMoreover, it should also be noted that the power that a Prime Minister has over his or her Cabinet colleagues is directly proportional to the amount of support that they have with their political parties and this", "appointing the person most likely to command the support of the House—normally the leader of the largest party in the lower house, although the system allows a coalition of two or more parties. This has not happened in the Canadian federal parliament but has occurred in Canadian provinces. The leader of the second-largest party (or in the case of a coalition, the largest party out of government) usually becomes the Leader of the Official Opposition. Moreover, the prime minister is, by unwritten convention, a member of the House of Commons, rather than of the Senate. Only two prime ministers governed", "over by a speaker; that for the Senate is a member of that house appointed by the Governor General, as advised by the prime minister, while the equivalent for the House of Commons is a member of parliament, who is elected by the other members of that body. In general, the powers of the latter are greater than those of the former. Following the British model, the upper chamber is essentially self-regulating, but the lower chamber is controlled by the chair, in a majoritarian model that gives great power and authority to the chair. In 1991, however, the powers of", "Executive (government) Presidents In a presidential system, the leader of the executive is both the head of state and head of government. In a parliamentary system, a cabinet minister responsible to the legislature is the head of government, while the head of state is usually a largely ceremonial monarch or president.", "Ministers. At the same time, the Prime Minister and Ministers are also Members of Parliament (MPs).\nFollowing constitutional reforms in 1991, the office of President was transformed from an appointed to an elected post. Thus, both the President and MPs are elected to their posts by the citizens of Singapore in separate elections. Appointment of Cabinet The President appoints as Prime Minister an MP who, in his judgment, is likely to command the confidence of the majority of the MPs. In practice, the Prime Minister is usually the leader of the political party holding the majority of the seats in Parliament.\nThe", "capital.\nFurthermore, executive power in the EU isn't concentrated in a single institution. It becomes clearer under the Lisbon Treaty with the division of the European Council as a distinct institution with a fixed President. This arrangement has been compared to the dual executive system found in the French republic where there is a President (the Council President) and Prime Minister (the Commission President). However, unlike the French model, the Council President does not hold formal powers such as the ability to directly appoint and sack the other, or the ability to dissolve Parliament. Hence while the Council President may have", "These powers include appointing the head of the executive (Prime Minister), serving as Commander-in-Chief of the Armed Forces and declaring a state of emergency and war. Executive branch The executive power of the federal government is vested in the federal cabinet. The Prime Minister is the head of government. They head the federal Cabinet, consisting of ministers appointed on the Prime Minister's suggestion. The Prime Minister is elected for a full term of 4 years and can only be dismissed by parliament electing a successor in a vote of no confidence. Legislative branch The main body of the legislative branch" ]
Why does inbreeding cause the offspring to have a significantly lower IQ than average? What is the science behind it?
[ "take it that a human body has 2 sets of genes.\n\nWhen a baby is made, half the genes are from the mother and other half is from the father.\n\nThese genes make proteins which help our body work. However, there are occasionally some errors in the genes which ends up making defective/too much/too little proteins which give rise to diseases. \n\nSome of these diseases require 2 faulty set of genes in order to manifest. So if daddy has a defective gene but mommy contributes a normal set, the disease does not manifest clinically (or is milder).\n\nIf there are many generations of inbreeding, the set of defective genes are kept within the same family tree; there is no new genetic input from a different family and thus the probability of having a child with 2 sets of defective genes increase. This increases the risk of diseases, out of which some may feature a lower IQ/brain malformations.", "Everyone has a few bad genes. Luckily, we have two copies of each gene, and most of the time you need to bad ones to have a problem.\n\nWhen you have kids, both parents bring their bad genes to the table. Since they are likely to be *different* bad genes, their offspring likely won't have any problems.\n\nBut when the parents are related, they are more likely to have the same bad genes, meaning the kids are more likely to get to copies. This can lead to a number of genetic disorders, including those that impact mental development.\n\nThere is some confirmation bias in play, too. inbreeding is more likely to be noted when it results in a problem, and would go unnoticed otherwise.\n\nAlso, having kids with a cousin, or even a sibling isn't that likely to be a problem. It takes multiple generations of inbreeding for genetic problems to become endemic. Societies where that happens tend to be remote and undeveloped. The people might seem \"stupid\" when they are merely different or less educated." ]
[ "is an estimate of the percent of homozygous alleles in the overall genome. The more biologically related the parents are, the greater the coefficient of inbreeding, since their genomes have many similarities already. This overall homozygosity becomes an issue when there are deleterious recessive alleles in the gene pool of the family. By pairing chromosomes of similar genomes, the chance for these recessive alleles to pair and become homozygous greatly increases, leading to offspring with autosomal recessive disorders.\nInbreeding is especially problematic in small populations where the genetic variation is already limited. By inbreeding, individuals are further decreasing genetic variation by", "effect. Due to their reduced phenotypic expression and their consequent reduced selection, recessive genes are, more often than not, detrimental phenotypes by causing the organism to be less fit to its natural environment.\nAnother mechanism responsible for inbreeding depression is the fitness advantage of heterozygosity, which is known as overdominance. This can lead to reduced fitness of a population with many homozygous genotypes, even if they are not deleterious or recessive. Here, even the dominant alleles result in reduced fitness if present homozygously (see also hybrid vigour).\nCurrently, it is not known which of the two mechanisms is more prevalent in nature.", "the probability that any such deleterious allele is inherited from the common ancestor through both parents is increased dramatically. It should also be noted that for each homozygous recessive individual formed there is an equal chance of producing a homozygous dominant individual — one completely devoid of the harmful allele. Contrary to common belief, inbreeding does not in itself alter allele frequencies, but rather increases the relative proportion of homozygotes to heterozygotes; however, because the increased proportion of deleterious homozygotes exposes the allele to natural selection, in the long run its frequency decreases more rapidly in inbred populations. In", "Kingdom, the United States, and the Netherlands. Additionally, researchers have shown that naturalistic changes in IQ occur in individuals at variable times. Influence of parents genes that are not inherited Kong reports that, \"Nurture has a genetic component, i.e. alleles in the parents affect the parents' phenotypes and through that influence the outcomes of the child.\" These results were obtained through a meta-analysis of educational attainment and polygenic scores of non-transmitted alleles. Although the study deals with educational attainment and not IQ, these two are strongly linked. Spatial ability component of IQ Spatial ability has been shown to be", "pass on their genetic makeup onto their offspring and therefore the frequency of this advantageous trait or gene increases within that population. \nThe same may be true for the opposite as well. If an individual is born with a genetic makeup that makes them less suited for their environment, they may have less of a chance of surviving and passing on their genes and therefore may see these disadvantageous traits decrease in frequency. This is one example of how reproductive success as well as biological fitness is a main component of the theory of Natural Selection and Evolution. Evolutionary trade-offs", "generations. Genetic drift causes changes in allele frequency from random sampling due to offspring number variance in a finite population size, with small populations experiencing larger per generation fluctuations in frequency than large populations. There is also a theory that second adaptation mechanism exists – niche construction According to extended evolutionary synthesis adaptation occur due to natural selection, environmental induction, non-genetic inheritance, learning and cultural transmission. An allele at a particular locus may also confer some fitness effect for an individual carrying that allele, on which natural selection acts. Beneficial alleles tend to increase in frequency, while deleterious alleles tend", "improbable, but Flynn's discovery of the Flynn effect showed that in spite of high heritability environmental factors could cause considerable disparities in IQ between generations of the same population, showing that the existence of such an x-factor was not only possible but real.\nJensen has also argued that heritability of traits rises with age as the genetic potential of individuals becomes expressed. He sees this as related to the fact that the IQ gap between white and black test takers has been shown to appear gradually, with the gap widening as cohorts reach adulthood. This he sees as a further argument", "from one parent by dominant (usually wild-type) alleles from the other (see Complementation (genetics)). It attributes the poor performance of inbred strains to the expression of homozygous deleterious recessive alleles. The genetic overdominance hypothesis states that some combinations of alleles (which can be obtained by crossing two inbred strains) are especially advantageous when paired in a heterozygous individual. This hypothesis is commonly invoked to explain the persistence of some alleles (most famously the Sickle cell trait allele) that are harmful in homozygotes. In normal circumstances, such harmful alleles would be removed from a population through the process of natural selection.", "adolescence, which Jensen claimed was before the genotypic aspect of IQ had become fully manifested. Finally, Jensen suggests that heterosis may have enhanced the IQ level of the mixed race children in the study.", "revealed that as inbreeding increases, meiosis becomes more important (the coefficient increases), while syngamy becomes less important. The overall role of reproduction [the product of the previous two coefficients—r²] remains the same. This increase in b² is particularly relevant for selection because it means that the selection truncation of the Phenotypic variance is offset to a lesser extent during a sequence of selections when accompanied by inbreeding (which is frequently the case). Genetic drift and selection The previous sections treated dispersion as an \"assistant\" to selection, and it became apparent that the two work well together. In quantitative genetics, selection", "twins indicated that genetic influences in themselves largely override previously shared environmental influences. The birth order does not seem to have any effect on fertility.\nOther studies, however, show that this effect can be balanced by the child’s own attitudes that result from personal experiences, religiosity, education, etc. So, although the mother’s preference of family size may influence that of the children through early adulthood,²³ the child’s own attitudes then take over and influence fertility decisions. Marriage and cohabitation The effect of cohabitation on fertility varies across countries.\nIn the US cohabitation is generally associated with lower fertility. However, another study", "manifestation of intelligence, the role of genetics had been shown to increase in importance with age. In particular, the effect of the family environment shared by all children in a family, while important in early childhood, became quite small (zero in some studies) by late adolescence. Why this occurs is unclear. One possibility is that people with different genes tend to seek out different environments that reinforce the effects of those genes. Nonetheless, there were several important environmental factors which were known to affect IQ, such as having received very poor or interrupted schooling. Interventions However, regarding interventions such as", "done on children or adolescents. They argued that heritability increases during childhood and adolescence, and even increases greatly between 16–20 years of age and adulthood, so one should be cautious drawing conclusions regarding the role of genetics from studies where the participants are not adults. Furthermore, the studies typically did not examine if IQ gains due to adoption were on the general intelligence factor (g). When the studies by Capron and Duyme were re-examined, IQ gains from being adopted into high SES homes were on non-g factors. By contrast, the adopted children's g mainly depended on their biological parents SES,", "counterintuitive from an evolutionary perspective because closely related parents have a higher probability of having offspring homozygous for deleterious recessive mutations, although closer parental kinship can also decrease the likelihood of immunological incompatibility between mother and offspring, for example in rhesus factor blood type. The study confirmed that the offspring of first and second cousins died younger and reproduced less.", "dominance hypothesis is the major explanation of inbreeding decline and [of] the high yield of hybrids. There is little statistical evidence for contributions from overdominance and epistasis. But whether the best hybrids are getting an extra boost from overdominance or favorable epistatic contributions remains an open question.\" Genetic and epigenetic bases Since the early 1900s, two competing genetic hypotheses, not necessarily mutually exclusive, have been developed to explain hybrid vigor. More recently, an epigenetic component of hybrid vigor has also been established.\nThe genetic dominance hypothesis attributes the superiority of hybrids to the masking of expression of undesirable (deleterious) recessive alleles", "relations to inbreeding and crossbreeding, the role of inbreeding and outbreeding in evolution, and the value of inbreeding and outbreeding in plant and animal improvement. East and Jones explicitly considered inbreeding and outbreeding in man, their effect on the individual, and the intermingling of races and review the national stamina literature. In Inbreeding and Outbreeding: Their Genetic and Sociological Significance, East proposed the theory that inbreeding in a genetically diverse stock caused increased homozygosity. Believing with the Drosophila workers that most mutations were recessive and deleterious, East concluded that the increased homozygosity caused by inbreeding should generally be accompanied by", "and colleagues reported that first borns scored higher on conservatism, conscientiousness and achievement orientation, and later borns higher on rebelliousness, openness, and agreeableness. The authors argued that the effect emerges most clearly from studies within families. Results are weak at best, when individuals from different families are compared. The reason is that genetic effects are stronger than birth order effects. Recent studies also support the claim that only children are not markedly different from their peers with siblings. Scientists have found that they share many characteristics with firstborn children including being conscientious as well as parent-oriented.\nIn her review of the", "with children's IQ scores, but such correlations may be mediated by genetic as well as (or instead of) environmental factors. But how much of that variance in IQ results from differences between families, as contrasted with the varying experiences of different children in the same family? Recent twin and adoption studies suggest that while the effect of the shared family environment is substantial in early childhood, it becomes quite small by late adolescence. These findings suggest that differences in the life styles of families whatever their importance may be for many aspects of children's lives make little long-term difference for", "proportion variance in IQ than among higher SES populations. Such effects are predicted by the bioecological hypothesis – that genotypes are transformed into phenotypes through nonadditive synergistic effects of the environment. Nisbett et al. (2012) suggest that high SES individuals are more likely to be able to develop their full biological potential, whereas low SES individuals are likely to be hindered in their development by adverse environmental conditions. The same review also points out that adoption studies generally are biased towards including only high and high middle SES adoptive families, meaning that they will tend to overestimate average", "much higher chance of being homozygous at any loci inherited from the paternal copies of each of their parents' genomes than would an individual with unrelated maternal and paternal grandfathers (each diploid individual inherits one copy of their genome from their mother and one from their father). \nHigh homozygosity (low heterozygosity) reduces fitness because it exposes the phenotypic effects of recessive alleles at homozygous sites. Selection can favour the maintenance of alleles which reduce the fitness of homozygotes, the textbook example being the sickle-cell beta-globin allele, which is maintained at high frequencies in populations where malaria is endemic", "increasing homozygosity in the genomes of their offspring. Thus, the likelihood of deleterious recessive alleles to pair is significantly higher in a small inbreeding population than in a larger inbreeding population.\nThe fitness consequences of consanguineous mating have been studied since their scientific recognition by Charles Darwin in 1839. Some of the most harmful effects known from such breeding includes its effects on the mortality rate as well as on the general health of the offspring. Within the past several decades, there have been many studies to support such debilitating effects on the human organism. Specifically, inbreeding has been found", "a portion of the differences in average IQ between races. These factors are not mutually exclusive with one another, and some may, in fact, contribute directly to others. Furthermore, the relationship between genetics and environmental factors may be complicated. For example, the differences in socioeconomic environment for a child may be due to differences in genetic IQ for the parents, and the differences in average brain size between races could be the result of nutritional factors. All recent reviews agree that some environmental factors that are unequally distributed between racial groups have been shown to affect intelligence in ways that", "partially account for an increase in IQ.\nRecently, however, the longstanding belief that breastfeeding causes an increase in the IQ of offspring was challenged in a 2006 paper published in the British Medical Journal. The results indicated that mother's IQ, not breastfeeding, explained the differences in the IQ scores of offspring measured between ages 5 and 14. The results of this meta-analysis argued that prior studies had not controlled for the mother's IQ. Since mother's IQ was predictive of whether a child was breastfed, the study concluded that \"breast feeding [itself] has little or no effect on intelligence in children.\" Instead,", "the largest part of ability is inherited, with genetics explaining around 0.6 of the variance. This means the opposite effect, that education affects ability, is likely small. Twin Studies An effective way to understand the genetic and environmental influences in behaviour is to use a Twin study. Johnson, Mcgue and Iacono investigated how factors that were present at age 11 influenced the change in grades to age 17 in pairs of twins. Using the Minnesota Twin Family Study, they investigated the genetic and environmental influences on intelligence and school performance. The results of the study found that around 70%", "was high in high-SES families, but much lower in low-SES families. In the US, this has been replicated in infants, children, adolescents, and adults. Outside the US, studies show no link between heritability and SES. Some effects may even reverse sign outside the US.\nDickens and Flynn (2001) have argued that genes for high IQ initiate an environment-shaping feedback cycle, with genetic effects causing bright children to seek out more stimulating environments that then further increase their IQ. In Dickens' model, environment effects are modeled as decaying over time. In this model, the Flynn effect can be explained by an increase", "galaxies\" have a high, positive correlation—yet that correlation does not indicate that Gould’s age increased because the Mexican population increased. More specifically, a high, positive correlation between the intelligence quotients of a parent and a child can be presumed either as evidence that IQ is genetically inherited, or that IQ is inherited through social and environmental factors. Moreover, because the data from IQ tests can be applied to arguing the logical validity of either proposition—genetic inheritance and environmental inheritance—the psychometric data have no inherent value.\nGould pointed out that if the genetic heritability of IQ were demonstrable within a given racial", "consequently less reproduction. This may be followed by increased inbreeding and reduced genetic variability in the gene pool, following the bottleneck effect.\nWhen inbreeding depression occurs, the population experiences reduced fitness because deleterious recessive genes can manifest in the population. In small populations where genetic variability is low, individuals are more genetically similar. When the genomes of mating pairs are more similar, recessive traits appear more often in offspring. The more related two individuals are in the breeding pair, the more deleterious homozygous genes the offspring will likely have which can greatly lower fitness in the offspring. These secondary impacts of", "stronger predictor of children's test scores than any other than any other family characteristics, including socio economic status. Maternal IQ predicted around 10% of the variance, with the only other consistent predictor being ‘home scale scores’, which measured the intellectual stimulation of the home environment, and predicted around 2% of the variance. The paper argues that the inherited genetic traits are more important than environment when predicting academic success. This effect, however, could arise either because of inherited genetic traits, or because more intelligent parents place greater emphasis on academic achievement, meaning it is unclear how much influence genes have.\nTo", "well is counterproductive to any function of protecting the closer relative and the health of its offspring (in a context where predation and starvation are significant factors, as opposed to a rich welfare state). Genetic sexual attraction theory is also incompatible with the theory of smell being a significant factor in avoiding inbreeding. Birth defects and inbreeding The increase in frequency of birth defects often attributed to inbreeding results directly from an increase in the frequency of homozygous alleles inherited by the offspring of inbred couples. This leads to an increase in homozygous allele frequency within a population, and results", "as the opposite of inbreeding depression although differences in these two concepts can be seen in evolutionary considerations such as the role of genetic variation or the effects of genetic drift in small populations on these concepts. Inbreeding depression occurs when related parents have children with traits that negatively influence their fitness largely due to homozygosity. In such instances, outcrossing should result in heterosis.\nNot all outcrosses result in heterosis. For example, when a hybrid inherits traits from its parents that are not fully compatible, fitness can be reduced. This is a form of outbreeding depression. Dominance versus" ]
Why is it that after waking from a bad dream, even though I am awake and aware that the dream was not real, I am still irrationally freaked out and disturbed by the events of the dream for a good amount of time?
[ "If you are having a scary dream your body may start producing Adrenaline, or other hormones that help you deal with stressful situations.\n\n\nEven though you have woken up, those hormones are still active in your system and the heightened sense of awareness sticks around until your hormone levels return to normal." ]
[ "a dream or following a lucid dream (one in which the dreamer has been aware of dreaming). Particularly, if the false awakening follows a lucid dream, the false awakening may turn into a \"pre-lucid dream\", that is, one in which the dreamer may start to wonder if they are really awake and may or may not come to the correct conclusion. In a study by Harvard psychologist Deirdre Barrett, 2,000 dreams from 200 subjects were examined and it was found that false awakenings and lucidity were significantly more likely to occur within the same dream or within different dreams of", "while dreaming is a specific state of sleep in which enhanced brain activity has been shown to occur, theorizing the primary consciousness could be active during dreaming. Indeed, during dreams we are consciously aware of our surroundings, and assuredly have a certain perception and emotion throughout the course of the dream, suggesting that at least part of the primary consciousness is activated during the dream. Dream A dream has all features of primary consciousness but is produced in the brain without external stimulation. Unlike the waking state, the brain cannot recognize its own condition; that it is in the midst", "sleep, people who are awakened report only vague and sketchy thoughts, and their experiences do not cohere into a continuous narrative. During dream sleep, in contrast, people who are awakened report rich and detailed experiences in which events form a continuous progression, which may however be interrupted by bizarre or fantastic intrusions. Thought processes during the dream state frequently show a high level of irrationality. Both dream and non-dream states are associated with severe disruption of memory: it usually disappears in seconds during the non-dream state, and in minutes after awakening from a dream unless actively", "their own bedroom. A pre-lucid dream may ensue. More commonly, dreamers will believe they have awakened, and then either wake up for real in their own bed or \"fall back asleep\" in the dream.\nA common false awakening is a \"late for work\" scenario. A person may \"wake up\" in a typical room, with most things looking normal, and realize he or she overslept and missed the start time at work or school. Clocks, if found in the dream, will show time indicating that fact. The resulting panic is often strong enough to jar the person awake for real (much like", "we experience when awake may also be experienced when we are asleep, while there is at that time not one of them true, I supposed that all the objects (presentations) that had ever entered into my mind when awake, had in them no more truth than the illusions of my dreams. But immediately upon this I observed that, whilst I thus wished to think that all was false, it was absolutely necessary that I, who thus thought, should be something; And as I observed that this truth, I think, therefore I am, was so certain and of such evidence that", "unaware that we know. In popular culture Films like Waking Life (2001), Paprika (2006), Inception (2010), Lucid Dream (2017) and 118 (2019) refer to lucid dreaming. Risks Though lucid dreaming can be beneficial to a number of aspects of life, some risks have been suggested. Those who have never had a lucid dream may not understand what is happening when they experience it for the first time. Individuals who experience lucid dreams could begin to feel isolated from others due to feeling different. It could become more difficult over time to wake up from a lucid dream. Someone struggling with", "Allan Hobson and Robert McCarley propose that dreams are caused by the random firing of neurons in the cerebral cortex during the REM period. Neatly, this theory helps explain the irrationality of the mind during REM periods, as, according to this theory, the forebrain then creates a story in an attempt to reconcile and make sense of the nonsensical sensory information presented to it. This would explain the odd nature of many dreams.\nUsing antidepressants, acetaminophen, ibuprofen, or alcoholic beverages is thought to potentially suppress dreams, whereas melatonin may have the ability to encourage them. Insomnia Insomnia is a general term", "leads the dreamer to mistake the dream for reality. Damage to this area also results in the inability to distinguish dreams from reality during waking state.", "actually being seen in the dream. According to Carl Jung's principle of compensation, the reason that there is latent content in dreams is that the unconscious is making up for the limitations of the conscious mind. Since the conscious mind cannot be aware of all things at once, the latent content allows for these hidden away thoughts to be unlocked. Psychoanalysts use the knowledge of the process of dreamwork to analyze dreams. In other words, the clinician will study the manifest content to understand what the latent content is trying to say. Process According to", "certain mental illnesses could find it hard to be able to tell the difference between reality and the actual dream.\nLong term risks with lucid dreaming have not been extensively studied.\nSome people experience something like Sleep Paralysis, it is in a state in between dreaming and waking, where you can’t move, where you’re aware that you are awake, and yet still may be experiencing hallucinations from your dream. A report in the journal Consciousness and Cognition identifies three common types of hallucinations. An intruder that is in the room with you, a crushing feeling on your chest or back, and", "because it would be absurd to deny that one is awake.\nThe dream hypothesis is also used to develop other philosophical concepts, such as Valberg's personal horizon: what this world would be internal to if this were all a dream.", "could be that the higher threshold for sensory interruption during REM sleep allows the brain to travel further along unrealistic and peculiar trains of thought.\nSome dreaming can take place during non-REM sleep. “Light sleepers” can experience dreaming during stage 2 non-REM sleep, whereas “deep sleepers”, upon awakening in the same stage, are more likely to report “thinking” but not “dreaming”. Certain scientific efforts to assess the uniquely bizarre nature of dreams experienced while asleep were forced to conclude that waking thought could be just as bizarre, especially in conditions of sensory deprivation. Because of non-REM dreaming, some sleep researchers have", "the same night. False awakenings often preceded lucidity as a cue, but they could also follow the realization of lucidity, often losing it in the process. Realism and unrealism Certain aspects of life may be dramatized or out of place in false awakenings. Things may seem wrong: details, like the painting on a wall, not being able to talk or difficulty reading (reportedly, reading in lucid dreams is often difficult or impossible,) In some experiences, the subject's senses are heightened, or changed. Repetition Because the mind still dreams after a false awakening, there may be more than one false", "(Although a dream may seem reliably to predict the future, it will not necessarily come true; one must place one's trust in God.) Rabbi Samuel bar Nahmani said in the name of Rabbi Jonathan that a person is shown in a dream only what is suggested by the person's own thoughts (while awake), as Daniel 2:29 says, \"As for you, Oh King, your thoughts came into your mind upon your bed,\" and Daniel 2:30 says, \"That you may know the thoughts of the heart.\" When Samuel had a bad dream, he used to quote Zechariah 10:2, \"The dreams speak falsely.\"", "is still true that one does not see, hear, or experience sense perception in the normal way, then the faculty of sense, he reasons, must be affected in some different way.\nUltimately, Aristotle concludes that dreaming is due to residual movements of the sensory organs. Some dreams, he says, may even be caused by indigestion:\nWe must suppose that, like the little eddies which are formed in rivers, so the movements are each a continuous process, often remaining like what they were when first started, but often, too, broken, into other forms by collisions with obstacles. This gives the reason why no", "on Wittgenstein's question as to whether it really mattered if people who tell dreams \"really had these images while they slept, or whether it merely seems so to them on waking\". He argues that the sentence \"I am asleep\" is a senseless form of words; that dreams cannot exist independently of the waking impression; and that scepticism based on dreaming \"comes from confusing the historical and dream telling senses...[of]...the past tense\". (page 120). In the chapter: \"Do I Know I Am Awake ?\" he argues that we do not have to say: \"I know that I am awake\" simply", "hypothesis which proposes that dreams are simply the side effects of the neural activity in the brain that produces beta brain waves during REM sleep that are associated with wakefulness. According to this hypothesis, neurons fire periodically during sleep in the lower brain levels and thus send random signals to the cortex. The cortex then synthesizes a dream in reaction to these signals in order to try to make sense of why the brain is sending them. However, the hypothesis does not state that dreams are meaningless, it just downplays the role that emotional factors play in determining dreams. Research", "that we needed a well-confirmed, empirical theory of dreams before we could say whether\ndreams were like experiences or not. Threat Simulation Theory Revonsuo's threat simulation theory claims that much or all of dream experience is \"specialized in the simulation of threatening events\", for the evolutionary purpose of rehearsing fight or flight situations to better prepare for such instances in waking life (similar to a \"fire drill\"). According to Revonsuo, empiricial research supports this theory by showing the recurrence of threatening situations in dreaming: of all of the emotions experienced in dreaming, \"fear [is] the most common and anger the next", "that a dream is a sixtieth part of prophecy. Rabbi Hanan taught that even if the Master of Dreams (an angel, in a dream that truly foretells the future) tells a person that on the next day the person will die, the person should not desist from prayer, for as Ecclesiastes 5:6 says, \"For in the multitude of dreams are vanities and also many words, but fear God.\" (Although a dream may seem reliably to predict the future, it will not necessarily come true; one must place one's trust in God.) Rabbi Samuel bar Nahmani said in the name of", "between dream yoga and illusory body. The more we think of illusory body, the more dreams we will have. We will see them as dreams, rather than mistaking them for real life. We can do many things in dreams which we are unable to do while awake.\nYuthok et al. (1997: p. 230) states that:\nPeople who have practised dream yoga have been able to visit teachers they missed and travel to lands they never managed to get to in the waking state. The dream state is a very pure state of mind.\nAccording to contemporary Dzogchen teachers Namkhai Norbu, Lopön Tenzin Namdak and", "multitude of dreams are vanities and also many words, but fear God.\" (Although a dream may seem reliably to predict the future, it will not necessarily come true; one must place one's trust in God.) Rabbi Samuel bar Nahmani said in the name of Rabbi Jonathan that a person is shown in a dream only what is suggested by the person's own thoughts (while awake), as Daniel 2:29 says, \"As for you, Oh King, your thoughts came into your mind upon your bed,\" and Daniel 2:30 says, \"That you may know the thoughts of the heart.\" When Samuel had a", "While describing this state of dreaming, Eeden said, 'you are completely aware of your surroundings and are able to direct your actions freely, yet the sleep is stimulating and uninterrupted.' Ancient Early references to the phenomenon are found in ancient Greek writing. For example, the philosopher Aristotle wrote: 'often when one is asleep, there is something in consciousness which declares that what then presents itself is but a dream'. Meanwhile, the physician Galen of Pergamon used lucid dreams as a form of therapy. In addition, a letter written by Saint Augustine of Hippo in 415 AD tells the story", "also many words, but fear God.\" (Although a dream may seem reliably to predict the future, it will not necessarily come true; one must place one's trust in God.) Rabbi Samuel bar Nahmani said in the name of Rabbi Jonathan that a person is shown in a dream only what is suggested by the person's own thoughts (while awake), as Daniel 2:29 says, \"As for you, Oh King, your thoughts came into your mind upon your bed,\" and Daniel 2:30 says, \"That you may know the thoughts of the heart.\" When Samuel had a bad dream, he used to quote", "most imperative role in dream interpretation. In order to remain in a state of sleep, the unconscious mind has to detain negative thoughts and represent them in an edited form. Therefore, when one dreams the unconscious makes an effort to deal with conflict. It would enable one to begin to act on them. \nThere are four steps required to convert dreams from latent or unconscious thoughts to the manifest content. They are condensation, displacement, symbolism, and secondary revision. Ideas first go through a process of condensation that takes thoughts and turns them into a single image. Then, the true emotional", "results in an increased possibility of dream rebound occurring. In other words, when one tries to retain a heavy load of information before going to sleep, there is a high chance of that information manifesting itself within the dream. There is a greater degree of dream rebound in those with a higher cognitive load opposed to those whose load was absent. With the enhancement of a high cognitive load, ironic control theory states thought suppression is more likely to occur and lead to dream rebound. Dream rebound Dream rebound is when suppressed thoughts manifest themselves in one's dreams. Self-control is", "mention of a contemporary but indifferent experience, and d) an internal significant experience, such as a memory or train of thought, that is invariably represented in the dream by a mention of a recent but indifferent impression.\nOftentimes people experience external stimuli, such as an alarm clock or music, being distorted and incorporated into their dreams. Freud explained that this is because \"the mind is withdrawn from the external world during sleep, and it is unable to give it a correct interpretation ...\" He further explained that our mind wishes to continue sleeping, and therefore will try to suppress external stimuli,", "dreams are formulated and why nightmares occur with a high frequency. To LaBerge, a dream starts with an individual thought or scene, such as walking down a dimly lit street. Since dreams are not predetermined, the brain responds to the situation by either thinking a good thought or a bad thought, and the dream framework follows from there. Since the prominence of bad thoughts in dreams is higher than good, the dream will proceed to be a nightmare.\nThere is a view, possibly featured in the story A Christmas Carol, that eating cheese before sleep can cause nightmares, but there is", "a form of thought suppression and when one dreams, that suppressed item has a higher chance of appearing in the dream. For example, when an individual is attempting to quit smoking, they may dream about themselves smoking a cigarette. Emotion suppression has also been found to trigger dream rebound. Recurrence of emotional experiences act as presleep suggestions, ultimately leading to the suppressed thoughts presenting themselves within the dream. One effecting factor of dream rebound is the changes in the prefrontal lobes during rapid-eye movement sleep. Suppressed thoughts are more accessible during REM sleep, as a result of operating processes having", "from simply not thinking about something. Dream influence Dreams occur mainly during the rapid eye movement (REM) sleep and are composed of images, ideas, emotions, and sensations. Although more research needs to be done on this subject, dreams are said to be linked to the unconscious mind. Thought suppression has an influence on the subject matter of the unconscious mind and by trying to restrain particular thoughts, there is a high chance of them showing up in one's dreams. Ironic control theory Ironic control theory, also known as \"ironic process theory\", states that thought suppression \"leads to an increased occurrence", "content of dreams was in accordance with their beliefs and desires while awake. People were more likely to view a positive dream about a friend to be meaningful than a positive dream about someone they disliked, for example, and were more likely to view a negative dream about a person they disliked as meaningful than a negative dream about a person they liked. Jung Although not dismissing Freud's model of dream interpretation wholesale, Carl Jung believed Freud's notion of dreams as representations of unfulfilled wishes to be limited. Jung argued that Freud's procedure of collecting associations to a dream would" ]
What are some indicators for advancement in relationships?
[ "I'm a little confused as to what exactly you want to know. Are you talking about the stages of a romantic relationship, and if so are you asking for \"signals\" or are you asking for general stages, like hand-holding to kissing to sex?" ]
[ "predicted outcome value theory (Sunnafrank, 1986) propositions. Findings supported all hypotheses tested, and demonstrated that during initial conversations predicted outcome value is strongly and positively related to the amount of verbal communication, intimacy of communication content, nonverbal affiliation, liking and perceived similarity.\nMore recent research was designed to investigate positive and negative predictors of possible relationships by focusing on decisions to engage in future dates. Interpersonal attraction, homophily, and nonverbal immediacy have been linked to the predicted outcome value of relationships during initial encounters. This study investigates how these variables influence date decisions in a six-minute speed-dating experience. Results indicated interpersonal", "test which apparent relationships ... are valid and which are spurious correlations\". He states his unequivocal finding: \"When we do take such statistics into account and use appropriate techniques we find that the EKC does not exist (Perman and Stern 2003). Instead, we get a more realistic view of the effect of economic growth and technological changes on environmental quality. It seems that most indicators of environmental degradation are monotonically rising in income though the 'income elasticity' is less than one and is not a simple function of income alone. Time related effects reduce environmental impacts in countries at all", "Relationship aspect Relevance In order for communication processes within familiar or business relationships and especially inside of romantic relationships to succeed, the quality of the relationship aspect is of prime importance. According to Sigmund Freud, trust, empathy, and shared values, along with preconceptions or fears and wishes, determine the success of interpersonal communication by more than 80 percent.\nThe iceberg model states that the relationship aspect has a much greater impact on communication than the content level, but also that it often works subconsciously. Economic context The economic importance of the relationship aspect between employees and colleagues, or customers, or suppliers,", "choosing the outcomes of greatest interest to them in their decision-making. Similarly, people on the ground can have input into which indicators to use and how to operationalize them, choices of instruments and methods of data collection, and which existing sources of data may be used in tracking indicators. Growth The use of Theory of Change in planning and evaluation has increased exponentially among philanthropies, government agencies, international NGOs, the UN, and many other major organizations in both developed and developing countries. This has led to new areas of work, such as linking the Theory of Change approach to systems", "the real world to be.\nTrends and sequences are one of the major factors when evaluating a relationship. Interpersonal communication The value of SPT initially lies in the area of interpersonal communication. Scholars have been using the concepts and onion model to explore the development of counter-sex/romantic relationships, friendships, parent-child relationships, employer-employee relationships, and caregiver-patient relationships and beyond. Some of the key findings are described as follows.\nResearchers have found out that in parent-child relationships, information derived from the child's spontaneous disclosure in daily activities was most closely connected to generating and maintaining his/her trust in parents, indicating the importance of developing", "concluded that other events throughout the course of relationships can change the predicted outcome value, which he calls “surprising events,” such as betraying one another’s trust by “back stabbing” and that not all relationships turn out as originally predicted. However, in this study, it is apparent that initial impressions and interactions can determine the outcome of the relationship, which is the predicted outcome value theory. While the college freshmen had numerous opportunities to develop their relationships over the nine-week period, the first impressions made lasting impacts.", "their studies, participants were asked to rate their own interpersonal attributes as well as their partners. Participants often tended to view their partners in a more favorable manner than their partners viewed themselves. The authors suggested that a certain degree of idealization in one's partner is almost crucial for dating and marital satisfaction. If people view their partners in a more positive way, this can help maintain their confidence in the relationships, even after they have exhibited some doubt.\nOther research has examined how self-esteem may impact the quality of romantic relationships. In one study, couples completed various measures which assessed", "rewards which can be further explained by social exchange theory. Most self-disclosure occurs early in relational development, but more intimate self-disclosure occurs later. Social penetration theory Social penetration theory states that the development of a relationship is closely linked to systematic changes in communication. Relationships generally begin with the exchange of superficial information and gradually move on to more meaningful conversations. In order to develop a more intimate relationship, partners must increase the breadth and depth of their conversations. Breadth includes the variety of topics two people discuss and depth is the personal significance of these topics.\nAltman and Taylor use", "theories of Human Development have begun to see beyond purely financial measures of development, for example with measures such as medical care available, education, equality, and political freedom. One measure used is the Genuine Progress Indicator, which relates strongly to theories of distributive justice. Actual knowledge about what creates growth is largely unproven; however recent advances in econometrics and more accurate measurements in many countries is creating new knowledge by compensating for the effects of variables to determine probable causes out of merely correlational statistics.", "looked for evidence of this model in meta-analyses of time trends in measures of short-term and working memory, visuo-spatial ability, and ability-based emotional intelligence.\nWoodley of Menie authored a 2014 study arguing that the Flynn effect is, in part, a result of people becoming better at using simple rules for identifying solutions to IQ test items, rather than a true increase in g. In 2016 he authored a study which found a negative relationship between a population’s level of a polygenic score linked to educational attainment and fertility rates. A study he authored in 2017 reported that polygenic scores linked to", "task-based group acceptance (Joardar, 2011). It can be argued that a person with significant international experience will be perceived as having had the opportunity to learn how to build valuable relationships in a cross-cultural setting. Hence, international experience will have effects on initial relationship-based group acceptance as well. Meaning, this will make for a more positive expectancy violation, in the workplace especially. \nEVT is also used as a framework to analyze the negative impact of mind reading expectations on romantic relationships. In 2015, Wright and Roloff explained the idea of mind reading expectations (MRE) that romantic partners should clearly know", "the development of relationships, examining how interpersonal and intergroup sentiments facilitate or impair the development of meaningful relationships, and the effect that such relationships have on people's ability to manage their attention, reason well and make good decisions, and maintain one's wellbeing. Publications Ybarra has studied and written about general cognitive functioning being promoted by socializing, social network site use and wellbeing, cross cultural differences and group dynamics, and judgement and interpersonal processes. His research has received much national and international media coverage, and his research findings on older adults and cognitive functioning have been used in U.S. congressional hearings.", "a good measure of intrinsic interest. For example, one study found that the number of women already in a field predicts the stereotypes people have about that field. Related to this is another study which found a relation between the perceived sexism in a specific degree program and the expressed interest in the field amongst girls considering it. Still further studies have shown that there is a significant overlap between parent and teacher expectations around gender and STEM, and what these children express. For example, one study found that parents were less likely to think their daughters would be interested", "universities. The h-index became an important indicator of the productivity and impact of the work of a scientist. However, alternative author-level indicators has been proposed (see for example).\nAround the same time, interest of governments in evaluating research for the purpose of assessing the impact of science funding increased. As the investments in scientific research were included as part of the U.S. American Recovery and Reinvestment Act of 2009 (ARRA), a major economic stimulus package, programs like STAR METRICS were set up to assess if the positive impact on the economy would actually occur. Methods Methods of research include qualitative, quantitative", "these distal variables influence more proximal variables (e.g., prior experience, modeling, and social persuasions), which then result in high or low TSE. Prior experience Prior experience with technology is repeatedly found to be influential on technology related self efficacy beliefs. If an individual has had the opportunity to interact with new technologies and, more importantly, has had success with mastering new technologies then individuals are more likely to hold more positive beliefs for future performance. Modeling or participation in technological training Modeling or participation in technological training are also found to be significant predictors of technological self efficacy. Although different", "of growth and investment\". However, his empirical strategy limits its applicability to the understanding of the relationship between inequality and growth for several reasons. First, his regression analysis control for education, fertility, investment, and it therefore excludes, by construction, the important effect of inequality on growth via education, fertility, and investment. His findings simply imply that inequality has no direct effect on growth beyond the important indirect effects through the main channels proposed in the literature. Second his study analyzes the effect of inequality on the average growth rate in the following 10 years. However, existing theories suggest that the", "significant improvements in correlation.", "Future Orientation Index The Future Orientation Index was introduced by Tobias Preis, Helen Susannah Moat, H. Eugene Stanley and Steven Bishop using Google Trends to demonstrate that Google users from countries with a higher per capita GDP are more likely to search for information about the future than information about the past. The findings suggest there may be a link between online behaviour and real-world economic indicators. The authors of the study examined Google query logs made by Google users in 45 different countries in 2010 and calculated the ratio of the volume of searches for the coming year (‘2011’)", "from clinical interviews.\" She also argues that \"Documenting trends in young people’s self-reported traits and attitudes is empirical research, not a complaint or a stereotype.\"\nIn 2017, Twenge wrote an article in The Atlantic asking \"Have smartphones destroyed a generation?\" which presented findings from her new book iGen. Sarah Rose Cavanagh in Psychology Today disagreed with Twenge's negative view, arguing that Twenge had ignored data supporting positive findings, presented correlation as causation, over-generalized and not taken social contexts into account. Twenge responded to her critics in the same publication, citing a meta-analysis and controlled experiments that showed a negative effect of", "attraction and nonverbal immediacy significantly predict predicted outcome value, but not future date decisions. Featured research and theory development Michael Sunnafrank and Artemio Ramirez Jr., assistant professor of communication at Ohio State University, conducted research which was published in the Journal of Social and Personal Relationships in 2004 and also featured on ABC news. Sunnafrank and Ramirez studied 164 college freshmen over a nine-week period to determine the predicted outcome value of relationship development between strangers.\nThe study involved pairing two students of the same sex together the first day of class and introducing one another and then engaging in conversation", "effect has also been demonstrated for Subjective Well-Being by Bollen et al (2017), who used a large-scale Twitter network and longitudinal data on subjective well-being for each individual in the network to demonstrate that both a Friendship and a \"happiness\" paradox can occur in online social networks.", "concept of acceptance and rejection; concluding that levels of self-esteem can alter mating aspirations and mate choice.\nResearch by Brase & Guy (2004) looked specifically at factors affecting an individual's self-esteem with regards to mate value. It was found that factors such as age, sex and marital status were closely associated with an individual's estimate of own mate value. Consequently, individuals attempted to raise their perceived own mate value, demonstrating mate value to be a great predictor of self-esteem. Increased levels of received parental investment in childhood is also associated with increased self-reported mate value in adults, possibly mediated by increased", "be and what the optimal degree of social protection is. The indicators compiled in the Doing Business project allow such research to take place. Since the start of the project in November 2001, more than 3,000 academic papers have used one or more indicators constructed in Doing Business and the related background papers by its authors.\" Research and influence More than 3,000 academic papers have used data from the index. The effect of improving regulations on economic growth is claimed to be very strong. Moving from the worst one-fourth of nations to the best one-fourth implies a 2.3 percentage point", "Excellence theory Historical Development The excellence theory evolved from four approaches: goal attainment, systems, strategic constituencies, and competing values, with the competing values approach bridging the gap between strategic constituencies and organization’s goals by stating that an organization must integrate strategic constituencies’ values with its goals so that the organization attains the goals of most value to its strategic constituencies. Goal Attainment The goal-attainment approach states that organizations are effective when they meet their goals. In 1952, Cutlip and Center first described the concept of public relations management. In 1954, Drucker proposed management by objectives approach, which warned that managers", "looking out onto natural settings, on connection to nature.”\nIn 2011, Cervinka, Roderer, and Hefler conducted three studies in which they were looking at the relationships and correlations between psychological well-being and connectedness to nature. The results of these studies showed that there was a very low correlation between connectedness to nature and subjective well-being, meaning that the results from the Mayer and Frantz study in 2004 could not be replicated. According to Cervinka et al., the CNS only correlated with meaningfulness, suggesting that it measures something along the lines of one’s experience with sense of meaning and purpose in", "measures (the GDI and the GEM) are applied year after year, debate has arisen over whether or not they have been as influential in promoting gender-sensitive development as was hoped when they were first created. Some of the major criticisms of both measures includes that they are highly specialized and difficult to interpret, often misinterpreted, suffer from large data gaps, do not provide accurate comparisons across countries, and try to combine too many development factors into a single measure. The concern then arises that if these indices are not well informed, then their numbers might hide more than they reveal.\nIn", "companies. The survey yielded a 23% response rate with 3.2 companies listed per response. An important caveat the authors express is the fact that through their research, they can claim a correlation, not a causal link between their findings and the success of companies. Impact Built to Last has influenced many executives and entrepreneurs since it was originally published, including Red Hat. Co-author Jim Collins became a \"superstar\" among M.B.A.'s and used his share of the profits to \"set up his own research center in Boulder, Colo., staffed with a team of grad students who tackle multiyear research projects aimed", "the bottom. They continued to find that the flaw was in the question the information was based upon. They found their research shouldn't be founded upon the question of \"How are people mobile\" but on \"how do people attain their statuses\". Peter Blau and Otis Duncan continued to conduct a landmark research study to provide answers to their new question.\nThere are two similar working models in regards to status attainment theory. As Haller & Portes (1973) noted there is the Blau and Duncan's (1967) model which focuses on status transmission, that there is some direct effect of parental influence. However,", "change interventions, how social technologies can predict behavior, wearable sensors, and the relationship between online and offline behavior. He has received grants to study how social media and mobile technologies can be used to predict and change behaviors in the areas of health and medicine, consumer behavior, cybersecurity, and crime.\nYoung has implemented social technologies to address issues related to HIV, drug use prevention, and how to get people to repeat healthy behaviors (e.g., adhere to a medication regimen or exercise routine). As of 2016, he has conducted studies in the United States, Peru, and South Africa, and among homeless youth,", "a link between online behaviour and real-world economic indicators. The authors of the study examined Google search queries made by Internet users in 45 different countries in 2010 and calculated the ratio of the volume of searches for the coming year (‘2011’) to the volume of searches for the previous year (‘2009’), which they call the ‘future orientation index’. They compared the future orientation index to the per capita GDP of each country and found a strong tendency for countries in which Google users enquire more about the future to exhibit a higher GDP. The results hint that there may" ]
Why can't modern houses be economically independent with solar + battery+ a little backup generator just incase?
[ "A) You need a large array of solar powers to provide full coverage to the home (large initial cost, requires a lot of surface area, potentially takes away from the visual appeal of the home)\n\nB) until very recently, there hasn't really been any cost-effective battery solution for homes (Tesla Powerwall is helping to change this)\n\nC) Most people who live in developed countries don't have to worry about power outages because they are extremely rare.\n\nIn these countries, it doesn't make sense to install solar panels just as an emergency backup... you would only do the install if your intention was to go off-grid so you don't have to pay a monthly electric utility bill (and/or because you can sell excess electricity back to the grid / power company to potentially earn money).", "You can indeed live off the grid, with no connection to the power company. This does add a fairly significant cost to the upfront price to build the home. In addition, there are maintenance and upkeep ongoing costs.\n\nThe way the current numbers work out it's rarely beneficial from an economic standpoint to cut off all ties to the power grid but some people do it for reasons other than money.", "Costs and technology and maintenance. Solars panels have only recently gotten down to a price level that, in some areas, can make it worthwhile for consumers to own. Batteries, however, are still catching up. Even with the new Tesla Powerwalls, I've seen it calculated that, at best, the cost of storing electricity comes down to $0.12 per kWh. Which is the ideal case, but it will be more. Since the average US consumer pays about $0.11 per kWh, the math doesn't add up. Add in the cost of the solar per kWh, and it probably makes more since for most people to only have the solar panels and sell back the excess electricity back to the grid." ]
[ "small size and often roof-mounted solar panels, as their customized builds lend themselves toward rooftop photovoltaics. Especially with the continuously decreasing price of solar panels and batteries, tiny homes are examples of existing and commercially proven alternative off-grid housing. Off-grid solar electrical system Each space and house will have their own energy consumption profile and generation demand. Consequently, they must size their power equipment accordingly. To size battery systems to store captured energy or grid supplied energy to be used during times without power production from the rooftop solar, such as when there is inadequate insolation, you will need to", "issue because photovoltaic solar panels can only generate electricity during daylight hours and thermal solar installations can only store energy for up to 10 hours, leaving a window in which the state's energy production must be generated from other sources (natural gas, coal, and nuclear). To remedy this, different sorts of power storage solutions have been proposed such as batteries, compressed air, and ice generation.\nIn April 2018, The San Diego Union Tribune reported that Recurrent Energy (a subsidiary of Canadian Solar) had proposed the world's largest battery, a 350 MW system, be installed alongside the proposed Crimson Solar Project.", "occurs when system owners aim to use more of their solar power than what they export, by means of timed appliances, turning on appliances when the sun is out, energy management systems and battery storage. Commercial buildings that use power during the day can get a high return on their investment.\nA 2015 study found that PV was more economical than grid supply if all the PV electricity was used on site and none was exported to the grid. For residential and commercial installations, improving energy efficiency is a lower cost option than PV.", "and play” PV microinverter. A recent review article found that careful system design would enable such systems to meet all technical, though not all safety requirements. There are several companies selling plug and play solar systems available on the web, but there is a concern that if people install their own it will reduce the enormous employment advantage solar has over fossil fuels.\nCommon battery technologies used in today's home PV systems include, the valve regulated lead-acid battery– a modified version of the conventional lead–acid battery, nickel–cadmium and lithium-ion batteries. Lead-acid batteries are currently the predominant technology used in small-scale, residential", "batteries.\nCurrently, foldable solar panels are coming down in price to the point that almost anyone can deploy one while at the beach, biking, hiking, or at any outdoor location and charge their cellphone, tablet, computer etc. As advances in the technology continue to be made, new products will be able to be expand into third world countries faster than ever before. Recently, billionaire Elon Musk unveiled a new battery system that may allow off-grid systems that rely solely on solar power to recharge them to be deployed anywhere on the planet, thus possibly ending the need for strictly grid-based energy", "solar generation generating companies must rapidly increase power output around the time of sunset to compensate for the loss of solar generation, a major concern for grid operators where there is rapid growth of photovoltaics. Storage can fix these issues if it can be implemented. Flywheels have shown to provide excellent frequency regulation. Short term use batteries, at a large enough scale of use, can help to flatten the duck curve and prevent generator use fluctuation and can help to maintain voltage profile. However, cost is a major limiting factor for energy storage as each technique is expensive to produce", "panels which offer efficiencies up to 18%.\nThe other type of portable solar chargers are those with wheels which enable them to be transported from one place to another and be used by a lot of people. They are semi-public, considering the fact that are used publicly but not permanently installed. A good example of this kind of portable solar charger is the Strawberry Mini device.\nThe solar charger industry has been plagued by companies mass-producing low efficiency solar chargers that don't meet the consumer's expectations. This in turn has made it hard for new solar charger companies to gain the trust", "solar is intermittent due to day/night cycles and unpredictable weather. How much of a special challenge solar power is in any given electric utility varies significantly. In a summer peak utility, solar is well matched to daytime cooling demands. In winter peak utilities, solar displaces other forms of generation, reducing their capacity factors.\nIn an electricity system without grid energy storage, generation from stored fuels (coal, biomass, natural gas, nuclear) must go up and down in reaction to the rise and fall of solar electricity (see load following power plant). While hydroelectric and natural gas plants can quickly respond to changes", "recharge the batteries must be generated from renewable or clean sources such as wind, solar, hydroelectric, or nuclear power for PEVs to have almost none or zero well-to-wheel emissions. 2014 update In September 2014 the UCS published an updated analysis of its 2012 report. The 2014 analysis found that 60% of Americans, up from 45% in 2009, live in regions where an all-electric car produce fewer CO\n2 equivalent emissions per mile than the most efficient hybrid. The UCS study found several reasons for the improvement. First, electric utilities have adopted cleaner sources of electricity to their mix between the two", "is due to the high amount of clean energy in the grid during the day, much of which is attributable to California's extensive use of utility grade solar systems. This overlap would devalue a more powerful home solar system, as the energy it would displace from the grid would be largely solar generated.\nHousing affordability is also a concern with this measure. The requirement of photovoltaic panels on new homes is expected to make them less affordable, an area where California already struggles greatly - with the only state less affordable being Hawaii. The CEC released data showing that the system", "the conventional systems in sales in 2012. Cost Most home fuel cells are comparable to residential solar energy photovoltaic systems on a dollar per watt-installed basis. Some natural gas driven home fuel cells can generate eight times more energy per year than the same size solar installation, even in the best solar locations. For example, a 5 kW home fuel cell produces about 80 MWh of annual combined electricity and heat, compared to approximately 10MWh generated by a 5 kW solar system. However, these systems are not directly comparable because solar power is a renewable resource with basically no operating cost while", "energy. The resulting technology has been commercialized and is being used for storing food products and vaccines. Solar direct-drive refrigerators don't require batteries, instead using thermal energy to solar power. These refrigerators are increasingly being used to store vaccines in remote areas. Use Solar-powered refrigerators and other solar appliances are commonly used by individuals living off-the-grid. They provide a means for keeping food safe and preserved while avoiding a connection to utility-provided power. Solar refrigerators are also used in cottages and camps as an alternative to absorption refrigerators, as they can be safely left running year-round. Other uses include", "supply more electric vehicles, eventually reaching an equilibrium with about 1/3 of power coming from distributed energy and 2/3 from utilities. Battery storage is one of the ways to mitigate the increasing duck curve, particularly in California. Return on investment calculations A May 2015 article in Forbes magazine calculated that using a Tesla Powerwall 1 model combined with solar panels in a home would cost 30 cents/kWh for electricity if a home remains connected to the grid (the article acknowledges that the Tesla battery could make economic sense in applications that are entirely off-grid). US consumers got electricity from the", "power grids, including the installation of more than 200,000 smart transformers, which will make it possible for power companies to replace units before they fail. Utilities will also install more than 850 sensors that will cover all of the electric grid in the contiguous United States, making it possible for grid operators to better monitor grid conditions and allowing them to take advantage of intermittent renewable energy, such as wind and solar power. Utilities will install nearly 700 automated substations, which will make it possible for power companies to respond faster and more effectively to restore service when bad weather", "commonly known has led to an expansion in the solar PV industry worldwide. Thousands of jobs have been created through this form of subsidy. However it can produce a bubble effect which can burst when the FIT is removed. It has also increased the ability for localised production and embedded generation reducing transmission losses through power lines. Hybrid systems A rooftop photovoltaic power station (either on-grid or off-grid) can be used in conjunction with other power components like diesel generators, wind turbines, batteries etc. These solar hybrid power systems may be capable of providing a continuous source of power. Advantages", "of rooftop solar or other types of distributed generation systems still rely on the grid to receive electricity from utilities at night or when their systems cannot generate sufficient power.\nA 2014 report funded by the Institute for Electric Innovation claims that net metering in California produces excessively large subsidies for typical residential rooftop solar photovoltaic (PV) facilities. These subsidies must then be paid for by other residential customers, most of whom are less affluent than the rooftop solar PV customers. In addition, the report points out that most of these large subsidies go to the solar leasing companies, which accounted", "lights. A particularly interesting application would be for health systems in countries where motorized vehicles are not overly abundant. Solar cells could be used to provide the power to refrigerate medications in coolers during transport.\nSolar cells could also provide power to lighthouses, buoys, or even battleships out in the ocean. Industrial companies could use them to power telecommunications systems or monitoring and control systems along pipelines or other system.\nIf the solar cells could be produced on a large scale and be cost effective then entire power stations could be built in order to provide power to", "back to the grid, in 2015. As a result, residential solar installations fell as homeowners could no longer justify the costs because the payback time of the rooftop solar system made it cost-prohibitive. Two successor programs - customer grid supply (CGS) and customer self-supply - have proved less successful than net-metering did in promoting the growth of the industry. HECO has made connecting to the grid more difficult, leading to layoffs among the solar installation industry. In 2014, there were over 40,000 rooftop systems, over 10 percent of customers. A proposed grid interconnection between Oahu and Maui would have", "of consumers. Solar companies are starting to offer high-efficiency solar chargers. When it comes to permanently installed public solar chargers, Strawberry energy Company from Serbia has invented and developed the first public solar charger for mobile devices, Strawberry Tree. Due to a built in rechargeable battery which stores energy, it can function without sunshine or at night. Other companies such as Voltaic Systems, Poweradd and others have started to push better products onto the market as well.\nPortable solar power is being utilized in developing countries to power lighting as opposed to utilizing kerosene lamps which are responsible for respiratory infections,", "stations are added to the grid.\nEach distributed generation resource has its own integration issues. Solar PV and wind power both have intermittent and unpredictable generation, so they create many stability issues for voltage and frequency. These voltage issues affect mechanical grid equipment, such as load tap changers, which respond too often and wear out much more quickly than utilities anticipated. Also, without any form of energy storage during times of high solar generation, companies must rapidly increase generation around the time of sunset to compensate for the loss of solar generation. This high ramp rate produces what the industry", "the region is unreliable, the local generation system can be used to power important equipment.\nBattery-to-grid can also spare the use of fossil fuel power plants to supply energy during peak loads on the public electric grid. Regions that charge based on time of use metering may benefit by using stored battery power during prime time. Environmentally friendly Local generation can be from an environmentally friendly source such as pico hydro, solar panels or a wind turbine. Individuals can choose to install their own system if an environmentally friendly mains provider is not available in their location. Small scale start", "as and when produced. Hence power drawl from the grid which is an assured power supply without much power cuts nowadays, serves as cheaper back up source when grid power consumption is limited to lower slab rate by using solar power during the day time. The maximum power generation of solar panels during the sunny daytime is complementary with the enhanced residential electricity consumption during the hot/summer days due to higher use of cooling appliances such as fans, refrigerators, air conditioners, desert coolers, etc. It would discourage the Discoms to extract higher electricity charges selectively from its consumers. There is", "certain range, it is often a viable option to include battery storage in order to optimize solar's contribution to the overall generation of the hybrid system.\nThe best business cases for diesel reduction with solar and wind energy can normally be found in remote locations because these sites are often not connected to the grid and transport of diesel over long distances is expensive. Many of these applications can be found in the mining sector and on islands \nIn 2015, a case-study conducted in seven countries concluded that in all cases generating costs can be reduced by hybridising mini-grids and", "secure and increase US power generating capacity, enabling unused electricity to be sent back to the grids without having to add new power plants and transmission lines. Putting a home fuel cell system into homes has the potential to get people off-the-grid, play a significant role in energy efficiency, and reduce US dependence on foreign energy imports.", "provide a lucrative option due to the low cost and sustainable economic and environmental nature. As an example, the energy cost of solar PV decreased from $4/W to $0.55–$0.65/W between 2007 and 2016. Energy Storage Because of the intermittent nature of renewable energy sources, generators, fuel cells, or batteries are required to ensure the reliability of Mini-grid Renewable Energy Systems (MRES). Otherwise, communities relying on real-time generation experience power outages when renewable generation is not possible. Due to fluctuation in load demand, the energy storage system must be able to meet the peak demand, which can entail large and expensive", "are much greater they also have many disadvantages. In many cases some solar cells have some advantages over a biohybrid solar cell. For one, traditional solar cells produce more power than those currently being achieved by biohybrid cells. The lifespan of biohybrid solar cells is also really short, lasting from a few weeks to nine months. The durability of the cells prove to be an issue, compared to current solar cells can work for many years.", "in the 2013 World Energy Outlook, mini-grids represent the most cost effective way to provide universal electricity access to these populations. Due to new technology innovations that have resulted in declining costs both for mini-grids and energy generation sources, specifically solar and wind power, mini-grids have the potential to electrify remote areas that would otherwise remain outside of a grid connection. Mini-grids are a cost effective and timely solution for more isolated areas in which connection to the main electric grid is unavailable, and represent a practical option for meeting the energy demand in Sub‐Saharan Africa, South and East Asia,", "consumers to use reusable battery technology, The BETTERY brand reduces the volume of batteries that are thrown away in the U.S. every year. Approximately 90 percent of portable batteries manufactured in the US are alkaline dry cells with a global annual production exceeding 10 billion units. Today, the majority of these batteries end up in landfills.\nEach BETTERY reusable battery can be swapped and reused up to a thousand times before it is recycled back into the manufacturing stream. Consumers can use the BETTERY kiosk to drop off traditional single-use batteries, where they will be recycled. The contents of recycled batteries", "interconnected, not the other way around, as some utilities suggest. This is because wind and solar plants help grid operators handle major outages and contingencies elsewhere in the system, since they generate power in smaller increments that are less damaging than unexpected outages from large plants\".\nAccording to a 2011 projection by the International Energy Agency, solar power generators may produce most of the world's electricity within 50 years, with wind power, hydroelectricity and biomass plants supplying much of the remaining generation. \"Photovoltaic and concentrated solar power together can become the major source of electricity.\" Renewable technologies can enhance energy security", "they want to do this is because the utilities maintain that their role in generating plants, transmitting and distributing electricity through distribution lines, and other fixed costs remain unchanged. They argue that solar customers are not financially contributing to those fixed costs." ]
If we are 70% H2O, why are we considered Carbon based?
[ "The chemistry that keeps us going is based on carbon-chain molecules. \n\nWe do use water for some reactions but most of it is just solvent for molecules to float around and react in. \n\nIt's somewhat like why we say tea is a plant-based beverage even though it's mostly water. The interesting part isn't the water.", "That would be kind of like calling a computer \"metal and fiberglass based\".\n\nThe semiconductor chips that make a computer a computer are a small fraction of its total mass, but they are where the action is. Everything else is there to allow those chips to do their thing." ]
[ "evidence for the existence of a carbon-12 resonance. The only way Hoyle could find that would produce an abundance of both carbon and oxygen is through a triple alpha process with a carbon-12 resonance near 7.68 MeV.\nHoyle went to nuclear physicist William Alfred Fowler's lab at Caltech and said that there had to be a resonance of 7.68 MeV in the carbon-12 nucleus. (There had been reports of an excited state at about 7.5 MeV.) Fred Hoyle's audacity in doing this is remarkable, and initially the nuclear physicists in the lab were skeptical. Finally, a junior physicist, Ward Whaling, fresh from Rice", "a remarkably precise and totally unexpected relation exists among all the parameters of the Standard Model of particle physics, the bare cosmological constant and unknown physics.\" Carbon and oxygen An older example is the Hoyle state, the third-lowest energy state of the carbon-12 nucleus, with an energy of 7.656 MeV above the ground level. According to one calculation, if the state's energy level was lower than 7.3 or greater than 7.9 MeV, insufficient carbon would exist to support life. Furthermore, to explain the universe's abundance of carbon, the Hoyle state must be further tuned to a value between 7.596 and", "development of free oxygen through photosynthesis, ammonia was oxidised to molecular nitrogen which has come to form four-fifths of the Earth's atmosphere. Carbon is also classed as an atmophile because it forms very strong multiple bonds with oxygen in carbon monoxide (slowly oxidised in the atmosphere) and carbon dioxide. The latter is the fourth-largest constituent of the Earth's atmosphere, while carbon monoxide occurs naturally in volcanoes and has a residence time in the atmosphere of a few months.\nHydrogen, which occurs in the compound water, is also classed as an atmophile. Water is classified as a volatile, because most of it", "carbon that comprises our bodies contains carbon-14 at almost the same concentration as the atmosphere. The rates of disintegration of potassium-40 and carbon-14 in the normal adult body are comparable (a few thousand disintegrated nuclei per second). The beta-decays from external (environmental) radiocarbon contribute approximately 0.01 mSv/year (1 mrem/year) to each person's dose of ionizing radiation. This is small compared to the doses from potassium-40 (0.39 mSv/year) and radon (variable).\nCarbon-14 can be used as a radioactive tracer in medicine. In the initial variant of the urea breath test, a diagnostic test for Helicobacter pylori, urea labeled with approximately 37 kBq", "Carbon profiling Embodied carbon emissions Embodied carbon emissions relate to the amount of carbon dioxide emitted into the atmosphere from creating and maintaining the materials that form a building, e.g. the carbon dioxide released from the baking of bricks or smelting of iron. These emissions can also be considered to be Upfront Carbon Emissions, or UCE. “Embodied carbon refers to the carbon footprint associated with building materials, from cradle to grave,\" and can be quantified as a part of environmental impact using Life Cycle Assessment (LCA).\nIn the Carbon Profiling Model these emissions are measured as Embodied Carbon Efficiency (ECE), measured", "carbon dioxide, some carbon dioxide is incorporated in their metabolism. Notably pyruvate carboxylase consumes carbon dioxide (as bicarbonate ions) as part of gluconeogenesis, and carbon dioxide is consumed in various anaplerotic reactions. Carbon isotope discrimination Some carboxylases, particularly RuBisCO, preferentially bind the lighter carbon stable isotope carbon-12 over the heavier carbon-13. This is known as carbon isotope discrimination and results in carbon-12 to carbon-13 ratios in the plant that are higher than in the free air. Measurement of this ratio is important in the evaluation of water use efficiency in plants, and also in assessing the possible or likely sources", "from biomass will have a relatively high level of carbon-14, while a product made from petrochemicals will have no carbon-14. The percentage of renewable carbon in a material (solid or liquid) can be measured with an accelerator mass spectrometer.\nThere is an important difference between biodegradability and biobased content. A bioplastic such as high-density polyethylene (HDPE) can be 100% biobased (i.e. contain 100% renewable carbon), yet be non-biodegradable. These bioplastics such as HDPE nonetheless play an important role in greenhouse gas abatement, particularly when they are combusted for energy production. The biobased component of these bioplastics is considered carbon-neutral since their", "Carbon is well known for the unusually wide variety of molecules that can be formed around it. Carbon is the fourth most abundant element in the universe and the energy required to make or break a bond is at just the appropriate level for building molecules which are not only stable, but also reactive. The fact that carbon atoms bond readily to other carbon atoms allows for the building of extremely long and complex molecules.\nThe presence of liquid water is an assumed requirement, as it is a common molecule and provides an excellent environment for the formation of complicated carbon-based", "events that give off large amounts of carbon dioxide can reduce local concentrations of carbon-14 and give inaccurate dates. The releases of carbon dioxide into the biosphere as a consequence of industrialization have also depressed the proportion of carbon-14 by a few percent; conversely, the amount of carbon-14 was increased by above-ground nuclear bomb tests that were conducted into the early 1960s. Also, an increase in the solar wind or the Earth's magnetic field above the current value would depress the amount of carbon-14 created in the atmosphere. Fission track dating method This involves inspection of a polished slice of", "causes enrichment of carbon-12, so that substances that originate from living organisms have a higher carbon-12 content. Due to the kinetic isotope effect, chemical reactions can happen faster with lighter isotopes, so that photosynthesis fixes lighter carbon-12 faster than carbon-13. Also lighter isotopes diffuse across a biological membrane faster. Enrichment in carbon 13 is measured by delta ¹³C(o/oo) = [(¹³C/¹²C)sample/(¹³C/¹²C)standard - 1] * 1000.\nThe common standard for carbon is Cretaceous Peedee formation belemnite. Stereoisomers Complex molecules, in particular those containing carbon can be in the form of stereoisomers. With abiotic processes they would be expected to be equally likely, but", "Carbon dioxide equivalent Carbon dioxide equivalent (CDE) and equivalent carbon dioxide (CO\n2e and CO\n2eq) are two related but distinct measures for describing how much global warming a given type and amount of greenhouse gas may cause, using the functionally equivalent amount or concentration of carbon dioxide (CO\n2) as the reference.", "key intermediate of the Miller-Urey experiment as well.\nThe combinatorial power of carbon is manifested in the composition of the molecular populations detected in circum- and interstellar media (see the Astrochemistry.net web site). The number and the complexity of carbon-containing molecules are significantly higher than those of inorganic compounds, presumably all over the Universe. One of the most abundant C-containing three-atoms molecule observed in space is hydrogen cyanide (HCN). The chemistry of HCN has thus attracted attention in Origin of Life studies since the earliest times, and the laboratory synthesis of adenine from HCN under presumptive prebiotic conditions was reported", "suggested that a tax of hundreds or even thousands of dollars per ton would be needed to drive carbon emissions to zero.\nEstimates of the SCC are highly uncertain. The wide range of estimates is explained mostly by underlying uncertainties in the science of climate change (e.g., the climate sensitivity, which is a measure of the amount of global warming expected for a doubling in the atmospheric concentration of CO\n₂), different choices of discount rate, different valuations of economic and non-economic impacts, treatment of equity, and how potential catastrophic impacts are estimated. One specific issue arises over coming to a consensus", "energy and to build body structures. \"Fixed carbon\", \"reduced carbon\", and \"organic carbon\" are equivalent terms for various organic compounds. Net vs gross CO2 fixation It is estimated that approximately 258 billion tons of carbon dioxide are converted by photosynthesis annually. The majority of the fixation occurs in marine environments, especially areas of high nutrients. The gross amount of carbon dioxide fixed is much larger since approximately 40% is consumed by respiration following photosynthesis. Given the scale of this process, it is understandable that RuBisCO is the most abundant protein on Earth. Overview of pathways Six", "Total Carbon Total Carbon is an analytical measurement for carbon content. This measurement commonly found in environmental and pharmaceutical analysis.", "carbon are radicals, carbenes, carbocations, carbanions, arynes, and carbynes.", "the beta particles is higher than those of tritium they are still quite low in energy. For instance the walls of a glass bottle are able to absorb it. Carbon-14 is made by the np reaction of nitrogen-14 with neutrons. It is generated in the atmosphere by the action of cosmic rays on nitrogen. Also a large amount was generated by the neutrons from the air bursts during nuclear weapons testing conducted in the 20th century. The specific activity of atmospheric carbon increased as a result of the nuclear testing but due to the exchange of carbon between the air", "(CO) and Hydrogen cyanide (HCN) from existing CO₂ and N₂ in the atmosphere. CO and HCN were precursor molecules of the essential biomolecules, proteins, lipids, nucleotides and sugars. However, atmospheric oxygen levels increased considerably, and it was then necessary for cells to have control over the reduction and oxidation of such small molecules in order to build and break down cells when necessary, without the inevitable oxidation (breaking down) of everything. Transition metal ions, due to their multiple oxidation states, were the only elements capable of controlling the oxidation states of such molecules, and thus were selected for. Condensation and", "of graphite or diamond. Carbon's most common isotope at 98.9% is ¹²C, with six protons and six neutrons. ¹³C is also stable, with six protons and seven neutrons, at 1.1%. Trace amounts of ¹⁴C also occur naturally but this isotope is radioactive and decays with a half life of 5730 years; it is used for radiocarbon dating. Other isotopes of carbon have also been synthesised. Carbon forms covalent bonds with other non-metals with an oxidation state of −4, −2, +2 or +4.\nCarbon is the fourth most abundant element in the universe by mass after hydrogen, helium and oxygen and is", "supposedly the strongest requirements, like Japan for example—if you look at its actual emissions, its actual fossil fuel use, you see that their CO2 emissions actually increased even though they were supposed to decrease. Because their coal use increased and they used offsets to meet their objective. Offsets don’t help significantly. That’s why the approach that Copenhagen is using to specify goals for emission reductions and then to allow offsets to accomplish much of that reduction is really a fake. And that has to be exposed. Otherwise, just like in the Kyoto Protocol, we’ll realize 10 years later, oops, it", "the electronegativity values are similar. In carbon monoxide (CO, isoelectronic with dinitrogen) the oxygen 2s orbital is much lower in energy than the carbon 2s orbital and therefore the degree of mixing is low. The electron configuration 1σ²1σ*²2σ²2σ*²1π⁴3σ² is identical to that of nitrogen. The g and u subscripts no longer apply because the molecule lacks a center of symmetry.\nIn hydrogen fluoride (HF), the hydrogen 1s orbital can mix with fluorine 2pz orbital to form a sigma bond because experimentally the energy of 1s of hydrogen is comparable with 2p of fluorine. The HF electron configuration 1σ²2σ²3σ²1π⁴", "Fractionation of carbon isotopes in oxygenic photosynthesis Carbon isotope measurement Carbon on Earth naturally occurs in two stable isotopes, with 98.9% in the form of ¹²C and 1.1% in ¹³C. The ratio between these isotopes varies in biological organisms due to metabolic processes that selectively use one carbon isotope over the other, or \"fractionate\" carbon through kinetic or thermodynamic effects. Oxygenic photosynthesis takes place in plants and microorganisms through different chemical pathways, so various forms of organic material reflect different ratios of ¹³C isotopes. Understanding these variations in carbon fractionation across species is applied in isotope geochemistry and ecological isotope", "R. Biswas et al.\nMP8, OP8, SC4, BC-8 and (9,0) carbon allotropes belong to the second group - they are hypothetically quasi-stable at the high pressure. BC-8 carbon is not only a superdense allotrope but also one of the oldest hypothetical carbon structure - initially it was proposed in 1984 in the work R. Biswas et al. The MP8 structure proposed in the work J. Sun et al., is almost two times denser than diamond - its density is as high as 7.06 g/cm³ and it is the highest value reported so far. Band gaps All hypothetical superdense carbon allotropes have", "the nature of biochemistry. The likelihood that life throughout the universe is probably carbon-based is suggested by the fact that carbon is one of the most abundant of the higher elements. Only two of the natural atoms, carbon and silicon, are known to serve as the backbones of molecules sufficiently large to carry biological information. As the structural basis for life, one of carbon's important features is that unlike silicon, it can readily engage in the formation of chemical bonds with many other atoms, thereby allowing for the chemical versatility required to conduct the reactions of biological metabolism and propagation.\nThought", "Carbon-based life Characteristics Carbon is capable of forming a vast number of compounds, more than any other element, with almost ten million compounds described to date, and yet that number is but a fraction of the number of theoretically possible compounds under standard conditions. For this reason, carbon has often been referred to as the \"king of the elements\". The enormous diversity of carbon-containing compounds, known as organic compounds, has led to a distinction between them and compounds that do not contain carbon, known as inorganic compounds. The branch of chemistry that studies organic compounds is known as organic chemistry.\nCarbon", "is the 15th most abundant element in the Earth's crust, and the fourth most abundant element in the universe by mass, after hydrogen, helium, and oxygen. Carbon's widespread abundance, its ability to form stable bonds with numerous other elements, and its unusual ability to form polymers at the temperatures commonly encountered on Earth enables it to serve as a common element of all known living organisms. In a 2018 study, carbon was found to compose approximately 550 billion tons of all life on Earth. It is the second most abundant element in the human body by mass (about 18.5%) after", "nuclear test list) dramatically increased the amount of carbon-14 in the atmosphere and subsequently in the biosphere; after the tests ended, the atmospheric concentration of the isotope began to decrease, as radioactive CO2 was fixed into plant and animal tissue, and dissolved in the oceans.\nOne side-effect of the change in atmospheric carbon-14 is that this has enabled some options (e.g., bomb-pulse dating) for determining the birth year of an individual, in particular, the amount of carbon-14 in tooth enamel, or the carbon-14 concentration in the lens of the eye.\nIn 2019, Scientific American reported that carbon-14 from nuclear bomb testing has", "the second most abundant element in the human body by mass after oxygen, the third most abundant by number of atoms. There are an almost infinite number of compounds that contain carbon due to carbon's ability to form long stable chains of C — C bonds. The simplest carbon-containing molecules are the hydrocarbons, which contain carbon and hydrogen, although they sometimes contain other elements in functional groups. Hydrocarbons are used as fossil fuels and to manufacture plastics and petrochemicals. All organic compounds, those essential for life, contain at least one atom of carbon. When combined with oxygen and hydrogen, carbon can", "to the way the gas-phase organozinc monomer [(η⁵\n–C\n₅(CH\n₃)\n₅)Zn(CH\n₃)], having the same ligands bound to a zinc(II) centre (Zn²⁺\n) satisfies the 18 electron rule on the metal.\nChemist Dean Tantillo from the University of California, Davis, commented to Science News that \"[i]t's super important that people realize that, although we're taught carbon can only have four friends, carbon can be associated with more than four atoms\" and added that the \"carbon isn't making six bonds in the sense that we usually think of a carbon-carbon bond as a two-electron bond.\" Moritz Malischewski, who carried out the work with Konrad Seppelt, commented on", "each occupied by one electron from carbon and one from oxygen, forming (polar) covalent bonds with a reverse C→O polarization, since oxygen is more electronegative than carbon. In the free carbon monoxide, a net negative charge δ– remains at the carbon end and the molecule has a small dipole moment of 0.122 D.\nThe molecule is therefore asymmetric: oxygen has more electron density than carbon, and is also slightly positively charged compared to carbon being negative. By contrast, the isoelectronic dinitrogen molecule has no dipole moment.\nCarbon monoxide has a computed fractional bond order of 2.6, indicating that the \"third\" bond is important" ]
Why do we have speed limits rather than a speed range?
[ "Because that's the top speed you can safely do, assuming ideal conditions (at least that's the premise).\n\nWhen it's raining, snowing, cold or dark, this changes it from being ideal conditions. It's not safe to drive at that speed any more. Worse it is, the slower you need to go, especially if your visibility is impaired.\n\nToo much variation in the weather to set a \"minimum speed\".\n\nNot sure about you are, but here there is a 5% tolerance on our 100kph speed limit - 105 before they'll ping you. (which quite funnily is, in mph, equating to 63mph in a 60)", "The speed limit is the maximum allowable speed. [In areas that low speeds have been identified to be of particular hazard a minimum speed posting is made](_URL_0_) This is not particularly common because it is rare that slower speeds present a significant risk to others if people maintain the rule of slower traffic keeping to the right....or the alternate rule enforced in some states of Left lane for passing only. In any case vehicles traveling far below the speed limit can be cited for impeding the flow of traffic...even if a minimum speed sign is not posted.", "So the highway I commute on is regularly empty at night, and standard speed limits apply so it's a 55mph zone. During my commute I regularly come to a complete stop.\n\nSo the speed range should be 0-55mph right? How is that any better than a speed limit? On smaller roads people regularly have to stop when making left turns to yield to oncoming traffic, that may require traffic behind them to stop, so zero mph needs to be legal on all streets." ]
[ "grounds and drivers are expected to not cause unnecessary obstruction by driving unusually slowly. Justification According to the government, speed limits are used to help achieve appropriate traffic speeds for safety, and environmental and accessibility reasons. The Department for Transport state that \"speed limits play a fundamental role\" in the effective management of traffic speeds in relation to the safety of both drivers and all other road users. Safety The 30 mph (48 km/h) speed limit in built-up areas was introduced in 1934 in response to high casualty levels. The 70 mph (112 km/h) limit on previously unrestricted roads was introduced in 1965", "have minimum speed limits, usually where slow speeds can impede traffic flow or be dangerous. The use of minimum speed limits is not as common as maximum speed limits, since the risks of speed are less common at lower speeds. In some jurisdictions, laws requiring a minimum speed are primarily centered around red-light districts or similar areas, where they may colloquially be referred to as kerb crawling laws. Variable speed limits In Germany, the first known experiments with variable speed limit signs took place in 1965 on a 30 kilometer stretch of German motorway, the A8 between Munich and the border", "Speed limit Road speed limits are used in most countries to set the legal maximum or minimum speed at which road vehicles may travel on a given stretch of road. In the US they have been set to protect the public and regulate unreasonable behavior. Speed limits are generally indicated on a traffic sign reflecting the maximum or minimum permitted expressed as kilometres per hour (km/h) and/or miles per hour (mph). Speed limits are commonly set by the legislative bodies of national or provincial governments and enforced by national or regional police and judicial authorities. Speed limits may also be", "motorways. Justification Speed limits are set primarily to balance road traffic safety concerns with the effect on travel time and mobility. Speed limits are also sometimes used to reduce consumption of fuel or in response to environmental concerns (e.g. to reduce vehicle emissions or fuel use). Some speed limits have also been initiated to reduce gas-oil imports during the 1973 oil crisis. Fuel efficiency Fuel efficiency sometimes affects speed limit selection. The United States instituted a National Maximum Speed Law of 55 mph (89 km/h), as part of the Emergency Highway Energy Conservation Act, in response to the 1973 oil crisis to", "the limit. Special speed limits In some countries, speed limits may apply to certain classes of vehicles or special conditions such as night-time. Usually, these speed limits will be reduced from the normal limit for safety reasons. Speed limit derestriction In some countries, derestriction signs are used to mark where a speed zone ends. The speed limit beyond the sign is the prevailing limit for the general area; for example, the sign might be used to show the end of an urban area. In the United Kingdom, the sign means that the national speed limit applies (60 mph on open roads", "all drivers admit to exceeding speed limits\". DfT guidance makes it clear that setting speed limits in isolation, or setting ones that are \"unrealistically low\" may be ineffective and lead to disrespect for the speed limit. Bath and North East Somerset Council say that speed limits on their own do not necessarily reduce traffic speeds and should be supported by enforcement to target \"irresponsible drivers\" or traffic calming. 20 mph speed limits and zones The Department for Transport encourages the use of either '20 mph speed limits' or '20 mph speed limit zones' in urban situations where vulnerable road users are at", "now increasingly use speed guns, automated in-vehicle systems and automated roadside traffic cameras. Some vehicle categories have various lower maximum limits enforced by speed limiters.\nEver since they have been introduced, speed limits have been controversial. They are both opposed or supported from various sources; including motoring advocacy groups, anti-motoring groups and others who either consider them to be irrelevant, set too low or set too high. Fixed speed limits Speed limit road signs are used to inform road users where speed limits other than the applicable national speed limit apply. Variable speed limits Variable speed limits are used on", "consumption and carbon emissions. Some cities have reduced limits to as little as 30 km/h (19 mph) for both safety and efficiency reasons. However, some research indicates that changes in the speed limit may not always alter average vehicle speed. Regulations Most jurisdictions use the metric speed unit of kilometers per hour, while others, such as the United States and the United Kingdom, use speed limits given in miles per hour. Although there have been discussions about a switch to using metric units in countries' other systems (see Metrication in the United Kingdom and Metrication in the United States), there are currently", "Speed limits by country Overview The following tables show various jurisdictions' default speed limits (where applicable) that apply to different types of vehicles travelling on three different types of road. Actual speed limits may range beyond these values. Speeds are listed in kilometers per hour unless otherwise stated. The enforcement tolerance is specified in km/h or percentage above the stated limit. For the United Kingdom and the United States, the speed limit is listed in miles per hour. Germany, with its Autobahns, is the only country without a general speed limit on its highways. The Isle of Man is the", "the words SPEED LIMIT and the values in black on a white background. The U.S. Federal Highway Administration's Manual on Uniform Traffic Control Devices provides guidelines for the appearance of speed limit signs. In Alaska and California, speed limits are often labeled MAXIMUM SPEED instead. In Oregon, most speed limit signs just say SPEED and the number. Canada has similar signs bearing the legend MAXIMUM expressed in km/h. Maximum is used instead of Speed Limit because it has similar meanings in English and French. Australian signs are rectangular but have a red circle like the Vienna Convention signs. Minimum speed", "Road Works. These speed limits are purposely different from legal speed limits and always display a speed limit that ends in 5, for example 35 km/h (22 mph), 45 km/h (28 mph), etc. They are not legally binding on drivers but it is likely that in the event of a road traffic accident that the issue of if they were being complied with, would be taken into account. Road works speed limits The Manager of a City or County Council can reduce the speed limit on a road undergoing road works for a stated period of time by executive order under powers available to", "30 km/h limit. Most sections of numbered routes that are not part of expressways have a limit of 70 km/h. Many connecting main roads, longer roads and dual carriageways also have the speed limit increased to 70 km/h and 80 km/h for a few other connecting roads. Many roads with this speed limit are bypasses.\nNote that for safety reasons, the speed limit for buses, medium and heavy goods vehicles is 70 km/h for all roads with a general speed limit at or above 70 km/h.\nA speeding offence under 10 km/h over the speed limit is not usually enforced; many drivers in", "Road speed limits in the United Kingdom Road speed limits in the United Kingdom are used to define the maximum legal speed (which may be variable) for vehicles using public roads in the UK. Speed limits are one of the measures available to attempt to control traffic speeds, reduce negative environmental effects of traffic, increase fuel use efficiency and satisfy local community wishes. The speed limit in each location is indicated on a nearby traffic sign or by the presence of street lighting. Signs show speed limits in miles per hour (mph) or the national speed limit (NSL) sign may", "and 70 mph on dual carriageways and motorways). In New Zealand it means you are on an open road, but the maximum legal speed of 100 km/h still applies. On roads without general speed limits, such as the German Autobahn, a portion of the Stuart Highway, and rural areas on the Isle of Man, it means the end of all quantitative speed limits. Advisory speed limit Advisory speed limits may provide a safe suggested speed in an area, or warn of the maximum safe speed for dangerous curves. Technology Some European cars include in-vehicle systems that support drivers’ compliance with the speed", "him/her under the Road Traffic Act 2004. The reduced speed limits are typically 30, 50 or 90 km/h (19, 31 or 56 mph). These are different from Cautionary Speed Limits as they are binding on drivers and it is an offence to exceed a road works speed limit.", "On roads or lanes with a (general or posted) speed limit under 80 km/h, these vehicles must abide by this lower limit. Trucks and vehicles above 3.5 tons are required to have a speed limiting device to prevent them from speeding above 90 km/h (56 mph).\nCars and trucks pulling a trailer with a total (car+trailer) weight under 3.5 tons have an overall speed limit of 90 km/h (56 mph), and coaches equipped with seat belts, categorized as T100, have an overall speed limit of 100 km/h (62 mph). This following the same regulation as standing above. Light commercial vehicles under 3.5 tons", "driving which is usually dealt with by the courts. Operating speed limits Certain types and combinations of vehicles have operating speed limits that need to be obeyed if they are less than the posted speed limit. For example: Vehicles towing trailers or another vehicle with a rigid towing connection are limited to 90 km/h. If the towing connection is not rigid, such as a rope or strop, then the operating limit is 50 km/h, apart from disabled motorcycles. Signage New Zealand speed limit signs follow the European model of a number inside a red circle. Sometimes, the open road limit", "speed limits for all-purpose roads, but the R.A.C. would have preferred more flexibility for motorways. The Royal Society for the Prevention of Accidents suggested that a lower speed limit would be more appropriate for all-purpose roads and the Pedestrian's Association for Road Safety condemned the new limits as being too high, preferring 60 mph (97 km/h) limits for all roads. Castle's decision and acceptance of the RRL research at face value was controversial. Peter Walker's motion in Parliament to annul the speed limit on motorways was not adopted. 1973 oil crisis Due to the 1973 oil crisis, a temporary maximum national", "variable, or in some places unlimited, such as on most of the Autobahn in Germany.\nThe first numeric speed limit for automobiles was the 10 mph (16 km/h) limit introduced in the United Kingdom in 1861. The highest posted speed limit in the world is 160 km/h (99 mph), which applies to two motorways in the UAE.\nThere are several reasons to regulate speed on roads. It is often done to attempt to improve road traffic safety and reduce the number of casualties from traffic collisions. In the \"World report on road traffic injury prevention\", the World Health Organization (WHO) identified speed control as one of", "and 70 mph on Mountain Road, for safety reasons, was not pursued following consultation. Measured travel speeds on the island are relatively low.\nThe Indian states of Andhra Pradesh, Maharashtra, and Telangana also do not have speed limits. Roads formerly without speed limits Many roads without a maximum limit became permanently limited following the 1973 oil crisis. For example, Switzerland and Austria had no maximum restriction prior to 1973 on motorways and rural roads, but imposed a temporary 100 km/h (62 mph) maximum limit in response to higher fuel prices; the limit on motorways was increased to 130 km/h (81 mph) later in 1974.\nMontana and", "Driving in the United Kingdom Speed limits British roads are limited for most vehicles by the National Speed Limit. Road signs in the UK use imperial units, so speed limits are posted in miles per hour. Speed limits are the maximum speed at which certain drivers may legally drive on a road rather than a defined appropriate speed, and in some cases the nature of a road may dictate that one should drive significantly more slowly than the speed limit may allow. This restricts some vehicles by default to a speed of 30 mph in built up areas, and some", "sign. Compliance To be effective and applied by drivers, the speed limits need to be perceived as credible; they should be reasonable regarding factors such as the view ahead and the view to the right. Speed limits also need to conform to road infrastructure, education, and enforcement activity.\nIn the UK, in 2017 the average free flow speed for each vehicle type is correlated with the applicable speed limit for that \nroad type and for motorways and national speed limit single carriageway roads, the average free flow speed is below \nthe designated speed limit for each vehicle type, except motorcycles on", "conditions.\nPart-time variable speed limits may also be used outside schools. Minimum speed limits Rarely, minimum speed limits are used, such as through the Mersey Tunnels, to maintain free flow and safe passage through otherwise hazardous or enclosed areas. Circular blue signs with white numbers indicate the start of these limits, and similar signs with a red diagonal line indicate their end. Contrary to popular belief, there is no minimum speed limit on motorways, although certain classes of slow vehicles (as well as those of any class that cannot maintain 25 mph on the level whilst unladen) are prohibited on safety", "be used.\nThe national speed limit is 70 mph (112 km/h) on motorways, 70 mph (112 km/h) on dual carriageways, 60 mph (96 km/h) on single carriageways and generally 30 mph (48 km/h) in areas with street lighting (restricted roads). These limits may be changed by road signs and apply to cars, motorcycles, car-derived vans up to 2 tonnes maximum laden weight (MLW), and to motorhomes or motor caravans not more than 3.05 tonnes maximum unladen weight. Other classes of vehicles are subject to lower limits on some roads.\nEnforcement of UK road speed limits was traditionally done using police 'speed traps' set up and operated by the police who", "30 km/h zone 30 km/h zones (30 kilometres per hour zones) and the similar 20 mph zones (20 miles per hour zones) are forms of speed management used across areas of urban roads in some jurisdictions. The nominal maximum speed limits in these zones are 30 kilometres per hour (19 mph) and 20 miles per hour (32 km/h) respectively. Although these zones do have the nominal speed limit posted, speeds are generally ensured by the use of traffic calming (physical or psychological) measures, though limits with signs and lines only are increasingly used in the UK. Reasons for implementation These zones are generally introduced", "limiters as a manufacturer option, with a mind towards reducing fuel bills, maintenance costs and insurance premiums, as well as discouraging employees from abusing company vehicles, in addition to curbing speeding fines and bad publicity. These limiters are often set considerably lower than for passenger cars, typically at 56, 62, 68 or 70 mph (90, 100, 109 or 113 km/h) in the UK, with options for 75 and 81 km/h (47 and 50 mph) listed in countries where these speeds are legal. Often the fitting of a limiter is combined with a small warning sticker on the rear of the vehicle, stating its maximum speed, to discourage drivers", "2-laned sections are built to a standard that allows conversion to 4 lanes in the future.\nSpeed limits are normally 100 km/h (62.1 mph) , and a minimum speed of 50 km/h (31.1 mph) is also enforced. Vehicles unable to reach 50 km/h, such as tractors and mopeds, are forbidden from using the expressways. Speed limits may also be reduced temporarily (due to adverse driving conditions) or permanently (in accident-prone areas) as speed limit signs can be adjusted electronically.\nMany rest facilities such as parking areas (usually only with toilets or small shops) and service areas (usually with many more amenities such as restaurants and gas stations)", "especially subarterial roads in urban areas, have had 60 km/h limits posted on them. Queensland's Manual of Uniform Traffic Control Devices (Speed Controls) states that 60 km/h is the general minimum speed limit for traffic-carrying roads. The Northern Territory has retained the 60 km/h limit; however, 50 km/h is also a common speed limit (particularly in residential areas). Rural limits Outside of built up areas, a prima facie speed limit applied. In New South Wales and Victoria, speed limit was 50 miles per hour (80 km/h in New South Wales after metrication). In the 1970s however, most state speed limits were gradually replaced by absolute", "a roadside speed limit sign.\"\nIn the years since the repeal of the 55/65 mph National Maximum Speed Limit, speedometers on most cars, sport utility vehicles (SUV's) and some light trucks sold in the United States currently display a top speed of up to 160 miles per hour (260 km/h). In popular culture The number 55 became a popular shorthand for the 55 mph speed limit. For example, a hand with a pair of fives in Texas hold'em poker is referred to as a \"speed limit\". Rock musician Sammy Hagar released \"I Can't Drive 55\", a hit single protesting the rule. ", "speed limit signs in combination with variable message signs in the late 1960s. Officials can adjust the speed limit according to weather, traffic conditions, and construction. More typically, variable speed limits are used on remote stretches of highway in the United States in areas with extreme changes in driving conditions. For example, variable limits were introduced in October 2010 on a 52-mile (84 km) stretch of Interstate 80 in Wyoming, replacing the winter season speed reduction from 75 to 65 mph (121 to 105 km/h) that had been in place since 2008. This Variable Speed Limit system has been proven effective in terms" ]
After the Big Bang, how did the Universe form multiple galaxies and establish order from disorder?
[ "Simply put, gravity. And distubances in the uniformity of the universe, which caused there to be larger clumps than in other places.\n\nThe universe, at the very beginning, was all energy. But then the universe cooled as it expanded (much like an expansion valve in an airconditioning system makes happen.) \n\nThis cooling caused matter condensation on the order of quarks, leptons, bosons, that sort of thing... and their anti-matter counterparts.\n\nThese annihilated each other. For matter/anti-matter touching does that. Instant energy. Nothing left behind. \n\nBut for whatever reason the anti-matter did not outnumber the matter condensate, and so that's the universe we have today, a matter one.(To an outside observer, it might be the 'anti-matter' universe, for we simply label what we see from our perspective. But that's another discussion.)\n\nAnyway, that caused ripples and disparate distribution in the smoothness of the matter, and because matter has gravity and also an electromagnetic charge to it, this 'clumpiness' caused denser places than others. \n\nThese denser clumps of what later condensated into Hydrogen (H) became big enough to let there be light, as many large and in charge stars came to be born. These stars were also in bigger clumps, and so they became galaxies. Probably, possibly, just irregular globular cluster types rather than any spiral or such, at first.\n\nThen the stars, so heavy, so fast burning and blue, blew the hell up and spewed enriched guts (one of my favorite DeGrasse Tysonisims) and energy shockwaves all over the place, causing further disturbances in the smoothness of the universe. \n\nThese then shoved other clouds of matter, hydrogen laden, to be disturbed, form more stars, repeating the process. Eventually, these clouds of matter also came to have the other elements like silicon, gold, etc, that would allow rocky planets to form about these stars, all due to the over and over cycle of stars blowing up and making more of the heavier elements past Iron (Fe).\n\nAnd further, it caused more clumping of matter, and that into stars, but those stars were already centered around themselves and their clouds, so galaxies. And then galaxies ate/merged with other galaxies. And so on.\n\nBut it all, ALL can be traced back to gravity, energy, electromagnetics, and the lumpiness in the distribution of the matter of the universe. The chaos that begats some semblance of order. \n\nSpeaking of which, I don't find the universe to be very orderly, to be honest. It's about as chaotic as you can get, my opinion.", "This doesn't answer your question (it seems to have been answered quite nicely already anyway) but you should read Bill Bryson's History of Nearly Everything. It's so good/funny/helpful on this subject matter." ]
[ "galaxy, therefore, may have formed at the same time as most other galaxies. Contents Spectroscopic observations with ground-based telescopes have shown that I Zwicky 18 is almost exclusively composed of hydrogen and helium, the main ingredients created in the Big Bang. The galaxy's primordial makeup suggests that its rate of star formation has been much lower than that of other galaxies of similar age. The galaxy has been studied with most of NASA's telescopes, including the Spitzer Space Telescope, the Chandra X-ray Observatory, and the Far Ultraviolet Spectroscopic Explorer (FUSE). However, it remains a mystery why I Zwicky 18 formed", "proved conclusively that Andromeda Nebula and Triangulum among others, were entire galaxies outside our own, thus proving that Universe consists of multitude of galaxies.\nThe modern era of physical cosmology began in 1917, when Albert Einstein first applied his general theory of relativity to model the structure and dynamics of the Universe.", "not a clearly defined phrase. It could be defined as: \"The first major burst of star formation in a progenitor of a present day elliptical galaxy\"; \"The peak merging epoch of dark halos of the fragments which assemble to produce an average galaxy today\"; \"A still gaseous body before any star formation has taken place.\"; or \" an over-dense region of dark matter in the very early universe, destined to become gravitationally bound and to collapse.\" From the early universe... It is thought that the early universe began with a nearly uniform distribution (each particle an equal distance from the", "Galaxy groups and clusters Galaxy groups and clusters are the largest known gravitationally bound objects to have arisen thus far in the process of cosmic structure formation. They form the densest part of the large-scale structure of the Universe. In models for the gravitational formation of structure with cold dark matter, the smallest structures collapse first and eventually build the largest structures, clusters of galaxies. Clusters are then formed relatively recently between 10 billion years ago and now. Groups and clusters may contain ten to thousands of individual galaxies. The clusters themselves are often associated with larger, non-gravitationally bound, groups", "Structure formation Overview Under present models, the structure of the visible universe was formed in the following stages: Very early universe In this stage, some mechanism, such as cosmic inflation, was responsible for establishing the initial conditions of the universe: homogeneity, isotropy, and flatness. Cosmic inflation also would have amplified minute quantum fluctuations (pre-inflation) into slight density ripples of overdensity and underdensity (post-inflation). Growth of structure The early universe was dominated by radiation; in this case density fluctuations larger than the cosmic horizon grow proportional to the scale factor, as the gravitational potential fluctuations remain constant. Structures smaller than the", "one unit of Hubble time. Galaxy formation Scientists study photon diffusion damping (and CMB anisotropies in general) because of the insight the subject provides into the question, \"How did the universe come to be?\". Specifically, primordial anisotropies in the temperature and density of the universe are supposed to be the causes of later large-scale structure formation. Thus it was the amplification of small perturbations in the pre-recombination universe that grew into the galaxies and galaxy clusters of the present era. Diffusion damping made the universe isotropic within distances on the order of the Silk Scale. That this scale corresponds to", "the oscillatory universe or cyclic repetition interpretation of the Big Bang where the first cosmological event was the result of the collapse of a previous universe.\nAccording to one version of the Big Bang theory of cosmology, in the beginning the universe was infinitely dense. Such a description seems to be at odds with everything else in physics, and especially quantum mechanics and its uncertainty principle. It is not surprising, therefore, that quantum mechanics has given rise to an alternative version of the Big Bang theory. Also, if the universe is closed, this theory would predict that once this universe collapses", "cosmology.\nCarroll has also worked on the arrow of time problem. He and Jennifer Chen posit that the Big Bang is not a unique occurrence as a result of all of the matter and energy in the universe originating in a singularity at the beginning of time, but rather one of many cosmic inflation events resulting from quantum fluctuations of vacuum energy in a cold de Sitter space. They claim that the universe is infinitely old but never reaches thermodynamic equilibrium as entropy increases continuously without limit due to the decreasing matter and energy density attributable to recurrent cosmic inflation. They", "evolve into a smaller number of galaxies through mergers.\nClusters of galaxies consist of hundreds to thousands of galaxies bound together by gravity. Clusters of galaxies are often dominated by a single giant elliptical galaxy, known as the brightest cluster galaxy, which, over time, tidally destroys its satellite galaxies and adds their mass to its own.\nSuperclusters contain tens of thousands of galaxies, which are found in clusters, groups and sometimes individually. At the supercluster scale, galaxies are arranged into sheets and filaments surrounding vast empty voids. Above this scale, the Universe appears to be the same in all directions (isotropic and", "Big Bang has been regarded as the best theory of the origin and evolution of the cosmos. Before the late 1960s, many cosmologists thought the infinitely dense and physically paradoxical singularity at the starting time of Friedmann's cosmological model could be avoided by allowing for a universe which was contracting before entering the hot dense state, and starting to expand again. This was formalized as Richard Tolman's oscillating universe. In the sixties, Stephen Hawking and others demonstrated that this idea was unworkable, and the singularity is an essential feature of the physics described by Einstein's gravity. This led the majority", "to be considered (see Quantum gravity). Recent evidence suggests that this scenario is not likely but it has not been ruled out as measurements are only available over a short period of time and could reverse in the future.\nThis scenario allows the Big Bang to occur immediately after the Big Crunch of a preceding universe. If this happens repeatedly, it creates a cyclic model, which is also known as an oscillatory universe. The universe could then consist of an infinite sequence of finite universes, with each finite universe ending with a Big Crunch that is also the Big Bang of", "events generally result in much more massive galaxies. Consequently, astronomers seek to constrain the rate at which both minor and major mergers occur to better understand the formation of gigantic structures of gravitationally bound conglomerations of galaxies such as galactic groups and clusters. Early 20th century Prior to the 20th century, the notion that galaxies existed beyond our Milky Way was not well established. In fact, the idea was so controversial at the time that it led to what is now heralded as the \"Shapley-Curtis Great Debate\" aptly named after the astronomers Harlow Shapley and Heber Doust Curtis that debated", "this agreement a \"wobbly orthodoxy.\" Inhomogeneous universe While the universe began with homogeneously distributed matter, enormous structures have since coalesced over billions of years: hundreds of billions of stars inside of galaxies, clusters of galaxies, superclusters, and vast filaments of matter. These denser regions and the voids between them must, under general relativity, have some effect, as matter dictates how space-time curves. So the extra mass of galaxies and galaxy clusters (and dark matter, should particles of ever it be directly detected) must cause nearby space-time to curve more positively, and voids should have the opposite effect, causing space-time around", "Ellis at Caltech, Bianca M. Poggianti at the University of Padua, Amy Barger at the University of Hawaii's Institute for Astronomy, Harvey Butcher at ASTRON, and Ray M. Sharples and Ian Smail at Durham University. Results were published through 2000.\nThe collaboration sought answers to the differences in the origins of the various galaxy types — elliptical, lenticular, and spiral. The studies found that elliptical galaxies were the oldest and formed from the violent merger of other galaxies about two to three billion years after the Big Bang. Star formation in elliptical galaxies ceased about that time. On the other hand,", "number of elliptical galaxies are produced if the universe begins with only spiral galaxies. This idea remained controversial and widely debated for some time.\nFrom this work, the Toomre brothers identified the process of collision evolution as the Toomre sequence. The sequence begins with two well separated spiral galaxies and follows them through collisional disruption until they settle into a single elliptical galaxy. Awards and honors In 1993, Toomre received the Dirk Brouwer Award which recognizes \"outstanding contributions to the field of Dynamical Astronomy\".\nToomre was one of the 1984 recipients of the MacArthur Fellowship, popularly known as the \"Genius", "Big Bang, so in this way the universe would last forever, but would pass through phases of expansion (Big Bang) and contraction (Big Crunch). \nExperimental evidence in the late 1990s and early 2000s (namely the observation of distant supernovae as standard candles, and the well-resolved mapping of the cosmic microwave background) led to the conclusion that the expansion of the universe is not being slowed down by gravity but is instead accelerating. The 2011 Nobel Prize in Physics was awarded to researchers who contributed to making this discovery.", "many of the galaxies astronomers and scientists see today. Martin Haehnel, from Kavli Institute for Cosmology at the University of Cambridge, claims that the precursor to the Milky Way galaxy was actually a much smaller bright galaxy that had merged with dark galaxies nearby to form the Milky Way we currently see. Multiple scientists agree that dark galaxies are building blocks of modern galaxies. Sebastian Cantalupo of the University of California, Santa Cruz, agrees with this theory. He goes on to say, \"In our current theory of galaxy formation, we believe that big galaxies form from the merger of smaller", "expanding, not the bodies in space that were simply moving further outward and apart into an infinitely larger preexisting empty void. It was this interpretation that led to the concept of the expanding universe. The law states that the greater the distance between any two galaxies, the greater their relative speed of separation. This discovery later resulted in the formulation of the Big Bang model.\nIn 1931, Lemaître proposed in his \"hypothèse de l'atome primitif\" (hypothesis of the primeval atom) that the universe began with the \"explosion\" of the \"primeval atom\" — what was later called the Big Bang. Lemaître first", "lumpy distribution of galaxies and their clusters we see today—the large-scale structure of the universe. Dwarf galaxies are crucial to this theory, having been created by small-scale density fluctuations in the early universe; they have now become natural building blocks that form larger structures.", "for the universe from the earliest known periods through its subsequent large-scale evolution. Despite its success in explaining many observed features of the universe including galactic redshifts, the relative abundance of light elements such as hydrogen and helium, and the existence of a cosmic microwave background, there are several questions that remain unanswered. For example, the standard Big Bang model does not explain why the universe appears to be same in all directions, why it appears flat on very large distance scales, or why certain hypothesized particles such as magnetic monopoles are not observed in experiments.\nCurrently, the leading candidate for", "development of order in the universe, rooted in the asymmetric processes of expansion and cooling, project an ‘arrow of time’ . That is, the expanding universe is a sustained process which as it proceeds yields changes of state which do not appear, over the universe as a whole, to be reversible. The changes of state in a given system, and in the universe as a whole, can be earmarked by observable periodicities to yield the concept of time.\nGiven the challenges confronting humans in determining how the Universe may evolve over billions and trillions of our years, it is", "as galaxies age. According to modeling, this creates the possibility of a phase transition at which point a galaxy turns from a place that is essentially dead (with a few pockets of simple life) to one that is crowded with complex life forms.", "to look like it does today, the Universe would have to have started from very finely tuned, or \"special\" initial conditions at the Big Bang. Inflation theory largely resolves these problems as well, thus making a universe like ours much more likely in the context of Big Bang theory.\nNo physical field has yet been discovered that is responsible for this inflation. However such a field would be scalar and the first relativistic scalar field proven to exist, the Higgs field, was only discovered in 2012–2013 and is still being researched. So it is not seen as problematic that a field", "this expansion backwards in time predicts that the universe had almost zero size at a finite time in the past. This concept, initially known as the \"Primeval Atom\" by Lemaitre, was later elaborated into the modern Big Bang theory. If the universe had expanded at a constant rate in the past, the age of the universe now (i.e. the time since the Big Bang) is simply the inverse of the Hubble constant, often known as the Hubble time. For Big Bang models with zero cosmological constant and positive matter density, the actual age must be somewhat younger than this Hubble", "it will spawn another universe in an event similar to the Big Bang after a universal singularity is reached or a repulsive quantum force causes re-expansion.\nIn simple terms, this theory states that the universe will continuously repeat the cycle of a Big Bang, followed up with a Big Crunch. Big Slurp This theory posits that the universe currently exists in a false vacuum and that it could become a real vacuum at any moment.\nIn order to best understand the false vacuum collapse theory, one must first understand the Higgs field which permeates the universe. Much like an electromagnetic field, it", "known as Olbers' paradox. Olbers presented a technical paper in 1826 that attempted to answer this conundrum. The faulty premise, unknown in Olbers' time, was that the universe is not infinite, static, and homogeneous. The Big Bang cosmology replaced this model (expanding, finite, and inhomogeneous universe). However, modern astronomers supply reasonable explanations to answer this question. One of at least several explanations is that distant stars and galaxies are red shifted, which weakens their apparent light and makes the night sky dark. However, the weakening is not sufficient to actually explain Olbers' paradox. Many cosmologists think that the fact that", "be suggested. One was Lemaître's Big Bang, advocated and developed by George Gamow. The other model was Fred Hoyle's Steady State theory, in which new matter would be created as the galaxies moved away from each other. In this model, the universe is roughly the same at any point in time. It was actually Hoyle who coined the name of Lemaître's theory, referring to it as \"this 'big bang' idea\" during a radio broadcast on 28 March 1949, on the BBC Third Programme. It is popularly reported that Hoyle, who favored an alternative \"steady state\" cosmological model, intended this", "ESO 137-001 History The galaxy was discovered by Dr. Ming Sun in 2005. Galaxy's fate The stripping of gas is thought to have a significant effect on the galaxy's development, removing cold gas from the galaxy, shutting down the formation of new stars in the galaxy, and changing the appearance of inner spiral arms and bulges because of the effects of star formation.", "of cosmologists to accept the notion that the universe as currently described by the physics of general relativity has a finite age. However, due to a lack of a theory of quantum gravity, there is no way to say whether the singularity is an actual origin point for the universe, or whether the physical processes that govern the regime cause the universe to be effectively eternal in character.\nThrough the 1970s and 1980s, most cosmologists accepted the Big Bang, but several puzzles remained, including the non-discovery of anisotropies in the CMB, and occasional observations hinting at deviations from a black-body spectrum;", "at the centre, the faster the stars within the galaxy travelled.\nThis property helped them realise that a Supermassive black hole nucleus must be the reason for the galaxies in some way.\nThey saw that the clouds of gas before the galaxies compressed forming a black hole, the black hole would produce phenomenal amounts of energy which would force the rest of the galaxy away and form stars.\nSigma comes into use when the black hole gets heavier from the increased mass. The stars at the edge of the newly formed galaxy were revolving around at high speeds. The faster they were travelling," ]
can you explain the NFL lockout to me (what it is, why it happened, outcomes of it etc.) LI5
[ "Ok, im not a big expert but for some reason I'm not seeing most Reddit users as being highly into sports. So basically, just like with every other corporation we have owners (own the team), workers (players), investors (other corporations), and consumer (us). I will break it down as best I can that way. Like all businesses the owners make contracts with the workers. The owners also have a contract that goes over all these small contracts. This contract designates the big things, (percentage of profits, advertising, how long a season is.\n**Owners**- (Again, not certain on % but I am quite close). Before the end of the last big contract owners made about 46-48% of total money from the NFL while players made 54-52. The owners did not like this. They are the bosses. This is their investment. So for this negotiation they said they want a higher percentage. Also, each year we have a 16 game season with 4 preseason games. Another concession is that the owners wanted a 2 game preseason and an 18 game season.\n**Workers**- The players. Obviously like that they make over half. I mean come on, they are the talent. Without the talent, you have no team to keep making you (owner) money. So they aren't to happy that the owners want more. I believe they weren't for or against the season increase.\n**Investors**- These are corporations like Pepsi, or Coke, trying to buy advertising for their company. They want owners to have more money because then the owners might charge less for advertising rights at their stadiums (long shot, not gonna happen). Now the 18 game season, that is what they are interested in. They want this increase. 2 more real games is gold to them. More advertising= more business=more money. Also, corps with deals, such as Pepsi, who sell only their pop during games, make more money. A longer season means more money must be spent to keep their business longer.\n**Consumer**- This is really based on your feelings of football. If you really like it, a longer season is good. Now the profit % could affect us. We attend games. If the owners lose money, they are going to charge more for pretty much everything to make up for it. This is bad. Our only concession here is that if they lose money but get a longer season we might not see a big increase as 2 more regular games means 2 more games with a full set of seats, selling merchandise, food, etc.\nHope this helps. I haven't had a ton of time to see the final results. I just know it ended. If its not answered in the morning I will do some research and get you a final result. Hope this helped.", "One answer can be found in the other thread created here \n\n_URL_0_\n\nAs for the outcome, I haven't found much of a resource on what has been created but a few things like \n\nRookie Wage system has been set up so that draft picks will be paid a certain amount depending on where they were drafted. \n\nI also believe the rights of refusal which is a teams ability to choose three of the teams free agents and match any offer given to them. So for example, if Chad Ochocinco was a restricted free agent looking for a team, and the New England Patriots agreed with Chad that they'd pay him 30 million for 2 years, the Bengals could match the pay and keep Chad despite him wanting to play for the Patriots. \n\nOther outcomes include each team's salary cap for their players being 120 million. (the number might be wrong but that is one gist). \n\nThere are many more but those are the main ones I know of." ]
[ "accused the league of planning to lock them out all along rather than negotiate a new contract. The union contended that the lockout would jeopardize the safety of the players and the integrity of the game, citing the fact that none of the replacement officials would come from the top college divisions and thus would not have enough experience to adjust to the speed of the NFL game or enforce the various players' safety rules. The NFL denied these claims, saying that they negotiated in good faith.\nIn July 2012, the NFL Referees Association filed a complaint with the National Labor", "initially ruled for the players, declaring the lockout illegal because the players were no longer members of a union. The 8th Circuit Court of Appeals stayed the District Court's ruling, and the lockout continued pending a final determination in the appellate court. In July 2011, as court-ordered mediation continued between players and owners in New York, at the offices of the NFL’s lawyers, the 8th Circuit court announced that the Norris–La Guardia Act prohibited it from enjoining the lockout. The court stated in its decision that the ruling only applied to veteran players under contract, and not to unsigned rookies", "new collective bargaining agreement on July 21, but at the same time announced the cancellation of the game, citing the fact that the players would not have enough time in training camp to prepare before the game.\nThe NFL also had contingency plans to cancel and/or postpone regular season games (up to eight) if a labor agreement could not be reached by the start of the regular season. The league did not have to implement the plans, since the players association agreed to terms with the NFL shortly before the start of the season proper on July 25, ending the lockout.", "system ultimately was deemed illegal by the jury, and was ended in 1992. The lawsuit eventually led to the establishment of the current system, which involves the use of a salary cap. 2011 lockout However, in 2011, the league and the National Football League Players Association eventually failed to arrive at a consensus for the collective bargaining agreement (CBA), and eventually led to the lockout on March 12. The lockout threatened to cancel games, even though only the Pro Football Hall of Fame Game was cancelled. The lockout eventually ended on July 21 with a new CBA. Referee labor dispute", "rule was rescinded in 1932 after Chicago (now known as the Bears) and the Portsmouth Spartans finished tied for first in the standings, and the tiebreaker was not applicable as both their games had ended in ties, which forced the league to schedule a playoff game to settle the dispute.\nThe NFL Championship Game would become permanent in 1933 when the NFL divided into Eastern and Western divisions and standardized its schedule, with the \"greater weight to a later game\" tiebreaker being formally abolished.", "broke off on June 22, the lockout started nine days later. Teams were barred from making player transactions and holding workouts and meetings for the duration of the work stoppage. The Hofstra Labor and Employment Law Journal's Grant M. Hayden described the NBA's action as an \"offensive lockout\", in which an employer attempts to force its workers into a settlement that does not favor them. An early byproduct of the lockout was the exclusion of NBA players from the U.S. national team that played at the 1998 FIBA World Championship. USA Basketball, the governing body for the sport in the", "Lockout (industry) Causes A lockout is generally an attempt to enforce specific terms of employment upon a group of employees during a dispute. It is often used to force unionized workers to accept new conditions, such as lower wages. If the union is asking for higher wages, better benefits, or maintaining benefits, a manager may use the threat of a lockout - or an actual lockout - to convince the union to back down. Examples Far from all labour disputes involves lockouts (or strikes), but lockouts have been used on a large scale around the world during and after the", "Relations Board, accusing the league of unfair labor practices. Agreement On September 26, 2012, an agreement was reached between the NFL and the NFL Referees Association to end the lockout after mounting criticism of the NFL and the performance of the replacement officials. The agreement was assisted by the Federal Mediation and Conciliation Service, and was ratified by the NFL Referees Association. Carl Johnson, the NFL's former vice president of officiating, was announced as the league's first full-time, on-field game official on December 12, 2012.\nThe new eight-year agreement covers the 2012–2019 seasons and stipulates that current officials will retain their", "June 4, 2012, the NFL announced it would begin hiring replacement officials.\nOn September 26, 2012, an agreement was reached to end the lockout after increasing criticism of the NFL and the performance of the replacement officials. The contentious nature of the replacement officials' decision at the end of the Green Bay Packers–Seattle Seahawks game two days earlier was widely considered to have been the tipping point that finally led to an agreement. NFL Commissioner Roger Goodell acknowledged that the game \"may have pushed the parties further along\" in negotiations. NFL Draft The 2012 NFL Draft was held from April 26", "1998–99 NBA lockout Background Before 1998, there had been two lockouts in the previous three years: a labor dispute that lasted more than two months in 1995 and a brief work stoppage in 1996 that ended within three hours. However, on both occasions, the players and owners reached a deal before the start of the season, and before 1998, the NBA was the only major sports league in the United States that had never lost a game because of a work stoppage. A six-year CBA had been in place since September 1995, but it included a clause allowing NBA owners", "and the NFL had not yet come to terms on a new collective bargaining agreement, thus failing to resolve the labor dispute. Accordingly, the NFLPA informed the league and the clubs that the players had voted to have the NFLPA renounce its bargaining rights. After the renunciation of collective bargaining rights, quarterbacks Tom Brady, Peyton Manning, and Drew Brees joined seven other NFL players and filed an antitrust suit to enjoin the lockout.\nFollowing the settlement of the Brady et al. v. NFL antitrust suit on July 25, 2011, a majority of players signed union authorization cards approving the NFL Players", "or veteran free agents.\nAfter several months of negotiations, the longest lockout in league history ended on July 25, 2011 following a tentative litigation settlement which reclassified some league revenues for cap purposes. This settlement allowed team owners to keep a small percentage from being included in future salary caps. The settlement was conditional upon the NFLPA re-constituting as a union and incorporating the settlement terms into a new CBA. Players reported to training camps in July 2011, and voted to re-constitute the NFLPA as a union. After the vote tally was confirmed on July 31, 2011, the NFLPA began", "the 1995 lockout were the primary cause of another lockout that occurred just three seasons later. 1998–99 NBA lockout During the 1998–99 lockout, Falk was often described as the \"invisible hand\" that guided union negotiations. The NBPA President during the lockout, Patrick Ewing, was a client of Falk's. Falk was also the agent of \"nearly half\" of the union's 19-member negotiating committee, including Alonzo Mourning, Juwan Howard, and Dikembe Mutombo. Though his presence in negotiations was already assumed, Falk publicly stated in an October 31, 1998 The New York Times article that he would \"roll up his", "2011 NFL Draft Impact of labor situation Despite an ongoing labor dispute between league owners and players over a new collective bargaining agreement (CBA), a provision in the expired CBA ensured that this draft would still take place, despite the fact that the owners had imposed a lockout to prevent the start of the league year. Fans in attendance at the draft expressed their displeasure with the lockout by booing NFL commissioner Roger Goodell during the event and chanting \"We want football.\"\nDue to the labor situation and the lockout, franchises were not able to trade players for draft selections (trades", "Conciliation Service (FMCS) in February 2011. During mediation, players and owners agreed to extend the 2006 CBA by one week. The FMCS failed to mediate a settlement and the previous CBA expired on March 7, 2011. That same day, the NFLPA announced it was no longer a union. This allowed players to file individual antitrust cases, many of which challenged the legality of the impending lockout. Tom Brady of the New England Patriots and Peyton Manning of the Indianapolis Colts were two of the eight named plaintiffs in the action filed in Federal District Court in Minnesota.\nThe Federal District Court", "1998–99 NBA season Lockout The second lockout in the history of the NBA lasted from July 1, 1998, to January 20, 1999. NBA owners were seeking changes to the league's salary cap system and a ceiling on individual player salaries. The National Basketball Players Association opposed the owners' plans and wanted raises for players who earned the league's minimum salary.\nAs the labor dispute continued into September, the preseason was shortened to just two games instead of the normal eight, and training camps were postponed indefinitely. By October, it became the first time in NBA history that games were canceled due", "2004.\nWith no new agreement in hand when the contract expired on September 15, 2004, league commissioner Gary Bettman announced a lockout of the players union and closed the league's head office. The league vowed to install what it dubbed \"cost certainty\" for its teams, but the Players' Association countered that the move was little more than a euphemism for a salary cap, which the union initially said it would not accept. The lockout shut down the league for 310 days, the longest in sports history, as the NHL became the first professional sports league to lose an entire season. A", "of ESPN wrote that with the inexperienced replacement referees working the regular season, it is likely that games \"will be impacted not by a judgment call—which happens every week of every season—but by an official who either doesn't know all of the NFL's rules or misapplies them.\"\nAfter Week 2 of the regular season, the NFLPA sent a message to team owners urging them to end the lockout, making a reference to Goodell's power to fine players for illegal hits:\nIt is lost on us as to how you allow a Commissioner to cavalierly issue suspensions and fines in the name of", "of the 2010 season, a lockout occurred from March 11 to July 25. Jackson was one of the 10 plaintiffs in the Brady antitrust lawsuit against the NFL, which included star players such as Tom Brady, Peyton Manning, Drew Brees, and fellow 2010 holdout Logan Mankins. Initially, Adam Schefter of ESPN reported that Vincent Jackson wanted compensation in the form of $10 million or become an unrestricted free agent when the lockout was over. Jackson denied reports that he had asked for compensation, but on July 23 Jackson released his claim in the Brady v. NFL lawsuit. Jackson's decision to", "blamed on NFL coercion. One of the USFL's major points of contention in its antitrust lawsuit was that the NFL had allegedly conspired with the Big Three television networks to place the NFL on all three networks, preventing any competitor from gaining a contract. The jury rejected this claim. (The league, despite lack of support from the Big Three, nevertheless would have had options. The Fox network, which would eventually rise to become the fourth major network after buying NFL rights in the 1990s, was launching just as the USFL had planned to move to fall. For reasons unknown—possibilities include", "2012 NFL referee lockout Timeline In 2005, the NFL and NFL Referees Association agreed to a contract that would last through the 2011 season. In 2011, the officials' union had planned to exercise a contract clause to reopen negotiations a year early, but this failed to occur due to the 2011 NFL lockout.\nBy June 2012, the league and the officials' union had not yet come to terms on a new collective bargaining agreement, thus failing to resolve the labor dispute. On June 4, 2012, the NFL announced it would begin hiring replacement officials.\nAfter being locked out, the NFL Referees Association", "1995–96 NBA season 1995 NBA lockout The 1995 NBA lockout was the first lockout of four in the history of the NBA. When the previous collective bargaining agreement expired after the 1993–94 season, a no-strike, no-lockout agreement was made in October 1994, with a moratorium on signing or restructuring player contracts. That moratorium expired on June 15, 1995, one day after the NBA Finals concluded. The expansion draft (which was held on June 24) and the NBA draft (which was held on June 28) were allowed to take place, but all other league business, including trades, free-agent signings, contract", "their cancellation through January 14. As the lockout dragged on, NHL Commissioner Gary Bettman gave a self-imposed a deadline of January 11 to agree to terms on a new CBA or the entire season would be cancelled. As the deadline approached, Bettman and the head of the National Hockey League Players' Association (NHLPA), Donald Fehr, engaged in a 16-hour negotiation session that produced a tentative agreement to end the lockout. Both sides ratified the deal and a memorandum of understanding was signed on January 12. This officially ended the lockout and allowed training camps to open the following day.", "the Board with instructions to find that the lockout violated Section 8(a)(1) and (3) of the Act because it unlawfully targeted employees based on their union activity. With respect to the remedy, the Seventh Circuit directed the Board to consider whether the lockout coerced the employees into accepting the contract offer, thereby voiding the agreement. In 2006, the Supreme Court declined to hear Midwest Generation's appeal.\nIn March 2008, the Board accepted the Seventh Circuit's remand and ordered that the employees who were locked out be made whole for the period of the lockout. In addition,the Board remanded the case to", "having to opportunity to buy engraved bricks. Lockout On September 13, 2012, Buffalo Sabres owner Terrence Pegula, along with all 28 other league ownership groups (the League still collectively owns the Phoenix Coyotes), authorized NHL Commissioner Gary Bettman to lock-out the National Hockey League Players' Association (NHLPA) upon the expiration of the NHL Collective Bargaining Agreement (CBA) on September 15. The lockout ended at 4:45 am EST on January 6, 2013, lasting 113 days. The lockout reduced the regular season from 82 to 48 games. Beyond Blue and Gold During the abbreviated training camp the team released the first episodes in", "that the NHLPA planned on filing a \"disclaimer of interest\" (a quicker, less formal way to dissolve the player's union, compared with decertification)\nand, with collective bargaining no longer in effect, pursuing an antitrust lawsuit against the NHL. The NHL responded on December 14 by filing a class action suit with the U.S. District Court in New York seeking to establish that its lockout is legal. Included in the lawsuit was a request for all existing player contracts to be \"void and unenforceable\", should the NHLPA be dissolved, resulting in all NHL players becoming free agents. The league also filed an", "lockout cancelled seven games, cutting the season to nine games. After the lockout came to an end, the Lions finished 2–5. Despite this, a 4–5 record was good enough to qualify for the playoffs. They became the second team to qualify for the playoffs with a losing record. In the Wild Card Round, the Lions were routed 31–7 by the eventual Super Bowl champion Washington Redskins. In the following season, the Lions won 9 games in to capture the NFL Central division championship.\nOn December 31, 1983, the Lions faced the San Francisco 49ers in the NFC Divisional Round. After the", "out before November 8, 2008, which would have resulted in a termination of the CBA on March 1, 2011 if either side chose to exercise it. The team owners voted unanimously to opt out in May 2008. 2011 agreement Negotiations for a new CBA began in early 2010. Team owners and new NFL Commissioner Roger Goodell demanded a cutback in salaries and benefits under the cap system, promising to lockout the players if no new agreement was reached by March 1, 2011. The NFLPA rejected Goodell’s proposal, requesting to see all league and club financial records to determine what need,", "that had disrupted nearly all league activity during the 2011 offseason. The two clubs had set a deadline of July 22 to ratify a resolution in enough time to prepare for the game. The league and players did not ratify the agreement until July 25, forcing cancellation of the game.\nThe 2016 edition, which was scheduled to be played between the Green Bay Packers and the Indianapolis Colts, was canceled due to unsafe playing conditions. Mike Silver of NFL.com reported that on the morning of game day, it was discovered the logos at midfield and the end zones had been painted", "lockout involved referees, not players. In 2005, the NHL became the first major professional sports league in North America to cancel an entire season due to a lockout.\nIn September 2016, Long Island University became the first institution of higher education to use a lockout against its faculty members. Australia On 8 April 1998, stevedoring company Patrick Corporation sought to restructure its operations for productivity reasons. In an industrial watershed event, it sacked all its workers and imposed a lockout on wharves around Australia. \nOn 29 October 2011, Qantas declared a lockout of all domestic employees in the face of ongoing" ]
The world can't agree on standard units of measurement for anything except time. H ow come?
[ "They can and did. ISO standard units called the SI units. Most everyone doing serious business is using them for most everything and have been for a while, non-SI units are just used in day-to-day stuff because people have preferences and it's generally not worth it to, for example, force Canadians to actually measure their mass in kilograms.", "Aside from Liberia, the USA, and maybe one other country, we're pretty much all metric now.", "Y'all are just proving my point. Everyone agrees on seconds, minutes and hours but there are still some hold outs for other measurements." ]
[ "Time in physics The unit of measurement of time: the second In the International System of Units (SI), the unit of time is the second (symbol: ). It is a SI base unit, and it has been defined since 1967 as \"the duration of 9, 192, 631, 770 [cycles] of the radiation corresponding to the transition between the two hyperfine levels of the ground state of the caesium 133 atom\". This definition is based on the operation of a caesium atomic clock. These clocks became practical for use as primary reference standards after about 1955 and have been in", "spanning 10⁻²⁴ to 10²⁴, 48 decimal orders of magnitude which may be used in conjunction with the metric base unit of second. Metric units of time larger than the second are most commonly seen only in a few scientific contexts such as observational astronomy and materials science although this depends on author; for everyday usage and most other scientific contexts the common units of minutes (60 s), hours (3600 s or 3.6 ks), days (86 400 s), weeks, months, and years (of which there are a number of variations) are commonly used. Weeks, months and years are significantly variable units", "French Academy of Sciences' artefacts for length and mass were the only nascent units of the metric system that were defined in terms of formal standards. Other units based on them, except the litre proved to be short-lived. Pendulum clocks that could keep time in seconds had been in use for about 150 years, but their geometries were local to both latitude and altitude, so there was no standard of timekeeping. Nor had a unit of time been recognised as an essential base unit for the derivation of things like force and acceleration. Some quantities of electricity like charge", "a fermi. For large scales, megametre, gigametre, and larger are rarely used. Instead, non-metric units are used, such as the solar radius, astronomical units, light years, and parsecs; the astronomical unit is mentioned in the SI standards as an accepted non-SI unit. Time Prefixes for the SI standard unit second are most commonly encountered for quantities less than one second. For larger quantities, the system of minutes (60 seconds), hours (60 minutes) and days (24 hours) is accepted for use with the SI and more commonly used. When speaking of spans of time, the length of the day is usually", "sexagesimal orders of magnitude rather than decimal, i.e. a year is 12 months, and a minute is 60 seconds.\nThe smallest meaningful increment of time is the Planck time, the time light takes to traverse the Planck distance, many decimal orders of magnitude smaller than a second. The largest realized amount of time, given known scientific data, is the age of the universe, about 13.8 billion years - the time since the Big Bang as measured in the cosmic microwave background rest frame. Those amounts of time together span 60 decimal orders of magnitude. Metric prefixes are defined", "the prominent exception of the United States and, to a lesser extent, the United Kingdom. Thus a kilometre is 1000 metres, while a mile is 1,760 yards. Electrical units are decimalised worldwide. Common units of time remain undecimalised; although an attempt was made during the French revolution, this proved to be unsuccessful and was quickly abandoned. Europe Russia converted to a decimal currency under Tsar Peter the Great in 1704, with the ruble being equal to 100 kopeks, thus making the Russian ruble the world's first decimal currency.\nFrance introduced the franc in 1795 to replace the livre tournois, abolished during", "System of measurement History The French Revolution gave rise to the metric system, and this has spread around the world, replacing most customary units of measure. In most systems, length (distance), mass, and time are base quantities.\nLater science developments showed that either electric charge or electric current could be added to extend the set of base quantities by which many other metrological units could be easily defined. (However, electrical units are not necessary for such a set. Gaussian units, for example, have only length, mass, and time as base quantities, and the ampere is defined in terms of other units.)", "exactly the same as when they adopted in 1799.\nPrior to the 1870 conference, French politicians had feared that the world community might reject the existing metre as it was 0.03% (300 µm) shorter than its design length, ordering a new meridional measurement. They were eventually reassured when the German-born Swiss delegate Adolphe Hirsch said \"no serious scientist would in our day and age contemplate a metre deduced from the size of the earth\". When the conference was reconvened in 1875, it was proposed that new prototype metre and kilogram standards be manufactured to reproduce the values of the existing artifacts as", "current definition of the second, coupled with the current definition of the meter, is based on the special theory of relativity, which affirms our spacetime to be a Minkowski space. The definition of the second in mean solar time, however, is unchanged. World time While in theory, the concept of a single worldwide universal time-scale may have been conceived of many centuries ago, in practicality the technical ability to create and maintain such a time-scale did not become possible until the mid-19th century. The timescale adopted was Greenwich Mean Time, created in 1847. A few countries have replaced it with", "to Hoàng Phê (1988), the traditional system of units had at least two thước of different lengths before 1890, the thước ta (lit. \"our ruler\") or thước mộc (\"wooden ruler\"), equal to 0.425 metres (1 ft 4.7 in), and the thước đo vải (\"ruler for measuring cloth\"), equal to 0.645 metres (2 ft 1.4 in). According to historian Nguyễn Đình Đầu, the trường xích and điền xích were both equal to 0.4664 metres (1 ft 6.36 in), while according to Phan Thanh Hải, there were three main thước: the thước đo vải, from 0.6 to 0.65 metres (2 ft 0 in to 2 ft 2 in); the thước đo đất", "or places on the Earth, or arbitrarily on the length of some common object.\nIn the International System of Units (SI), the basic unit of length is the metre and is now defined in terms of the speed of light. The centimetre and the kilometre, derived from the metre, are also commonly used units. In U.S. customary units, English or Imperial system of units, commonly used units of length are the inch, the foot, the yard, and the mile.\nUnits used to denote distances in the vastness of space, as in astronomy, are much longer than those typically used on Earth and", "customary measurements) were a system of measurement introduced as a compromise between the metric system and traditional measurements. It was used in France from 1812 to 1839.\nA number of variations on the metric system have been in use. These include gravitational systems, the centimetre–gram–second systems (cgs) useful in science, the metre–tonne–second system (mts) once used in the USSR and the metre–kilogram–second system (mks).\nThe current international standard metric system is the International System of Units (Système international d'unités or SI) It is an mks system based on the metre, kilogram and second as well as the kelvin, ampere, candela, and mole.\nThe", "devices, and units of time were measured in degrees of arc. Conceptual units of time smaller than realizable on sundials were also used.\nThere are references to 'second' as part of a lunar month in the writings of natural philosophers of the Middle Ages, which were mathematical subdivisions that could not be measured mechanically. Fraction of solar day The earliest mechanical clocks which appeared starting in the 14th century had displays that divided the hour into halves, thirds, quarters and sometimes even 12 parts, but never by 60. In fact, the hour was not commonly understood to be the duration", "length dates back to the early civilisations of the Middle East (10000 BC – 8000 BC). Archeologists have been able to reconstruct the units of measure in use in Mesopotamia, India, the Jewish culture and many others. Archeological and other evidence shows that in many civilisations, the ratios between different units for the same quantity of measure were adjusted so that they were integer numbers. In many early cultures such as Ancient Egypt, multiples of 2, 3 and 5 were not always used—the Egyptian royal cubit being 28 fingers or 7 hands. In 2150 BC, the Akkadian emperor Naram-Sin rationalised the Babylonian", "system using the length of a pendulum as the base unit of length received the support of the British Parliament, championed by John Riggs Miller, but when the French overthrew their monarchy and decided to use the meridional definition of the metre as their base unit, Britain withdrew support. The French continued alone and created the foundations of what is now called the Système International d'Unités and is the measurement system for most of the world. 1799–1962 In 1799, the French created, and started to use, a new system with the metre and the kilogram as the units of length", "of larger units of time, not seconds, such as clock time in hours and minutes, velocity of a car in kilometers per hour or miles per hour, kilowatt hours of electricity usage, and speed of a turntable in rotations per minute. Timekeeping standards A set of atomic clocks throughout the world keeps time by consensus: the clocks \"vote\" on the correct time, and all voting clocks are steered to agree with the consensus, which is called International Atomic Time (TAI). TAI \"ticks\" atomic seconds.\nCivil time is defined to agree with the rotation of the earth. The international standard for timekeeping", "length as 250 cm. Surveyor's trade American surveyors use a decimal-based system of measurement devised by Edmund Gunter in 1620. The base unit is Gunter's chain of 66 feet (20 m) which is subdivided into 4 rods, each of 16.5 ft or 100 links of 0.66 feet. A link is abbreviated \"lk,\" and links \"lks\" in old deeds and land surveys done for the government. Time Time is an abstract measurement of elemental changes over a non spatial continuum. It is denoted by numbers and/or named periods such as hours, days, weeks, months and years. It is an apparently irreversible series", "to have local intercity or national standards for measurements include the Scottish law of 1641, and the British standard imperial system of 1824, which is still commonly used in the United Kingdom. At one time Imperial China had successfully standardised units for volume throughout its territory, but by 1936 official investigations uncovered 53 values for the chi varying from 200 millimetres to 1250 millimetres; 32 values of the cheng, between 500 millilitres and 8 litres; and 36 different tsin ranging from 300 grams to 2500 grams. However, revolutionary France was to produce the definitive International System of Units which has come to be used by most", "can be measured using the Planck constant and time, meaning that the S.I. units of length and time can be related to the mass along with the Planck constant, finally eliminating the need for usage of the platinum-iridium cylinder held at the International Bureau of Weights and Measures (B.I.P.M.) in Paris for the realisation of the S.I. unit of the kilogramme.\nOn 16 November 2018, at a meeting of the General Conference on Weights and Measures in Versailles, France, 60 countries' representatives voted to reform S.I. units permanently. The kilogramme will forthwith be defined using the Planck constant. Later years Kibble", "other countries, but its use is nearly universal today. One aspect of measurement decimalisation was the introduction of metric prefixes to derive bigger and smaller sizes from base unit names. Examples include kilo for 1000, hecto for 100, centi for 1/100 and milli for 1/1000. The list of metric prefixes has expanded in modern times to encompass a wider range of measurements. \nWhile the common units of time, minute, hour, day, month and year, are not decimalised, there have been proposals for decimalisation of the time of day and decimal calendar systems. Astronomers use a decimalised Julian day number to", "History of the metre Universal measure The standard measures of length in Europe diverged from one another after the fall of the Carolingian Empire (around 888): while measures could be standardized within a given jurisdiction (which was often little more than a single market town), there were numerous variations of measure between regions. Indeed, as the measures were often used as the basis for taxation (of cloth, for example), the use of a particular measure was associated with the sovereignty of a given ruler and often dictated by law.\nNevertheless, with the increasing scientific activity of the 17th century came calls", "significant figures. Other units In addition to those catalogued above, there are literally hundreds of other units of measure in both the imperial and the US customary system of measurement – many are specific to a particular industry of application. Such units could, in theory, be replaced by general units of the same dimension, for example the barrel (42 US gallons, 34.97 imperial gallons or 159.0 litres) used in the oil industry has the dimension of volume and could be replaced by the gallon, cubic metre or litre.\nThe definitions of potential difference (volt), electric current (ampere), electrical resistance (ohm) were", "that there was some definition based on some standard. Eventually cubits and strides gave way to \"customary units\" to meet the needs of merchants and scientists.\nIn the metric system and other recent systems, a single basic unit is used for each base quantity. Often secondary units (multiples and submultiples) are derived from the basic units by multiplying by powers of ten, i.e. by simply moving the decimal point. Thus the basic metric unit of length is the metre; a distance of 1 m is 1,000 millimetres, or 0.001 kilometres. Current practice Metrication is complete or nearly complete in almost all countries. US customary", "scale. Since the published circulars are definitive, better estimates do not create another version of TAI; it is instead considered to be creating a better realisation of Terrestrial Time (TT). History Early atomic time scales consisted of quartz clocks with frequencies calibrated by a single atomic clock; the atomic clocks were not operated continuously. Atomic timekeeping services started experimentally in 1955, using the first caesium atomic clock at the National Physical Laboratory, UK (NPL). It was used as a basis for calibrating the quartz clocks at the Royal Greenwich Observatory and to establish a time scale, called Greenwich Atomic", "a set of base units: metre for length, kilogram for mass, second for time, ampere for electrical current, kelvin for temperature, candela for luminous intensity and mole for quantity. These, together with their derived units, can measure any physical quantity. Metric system may also refer to other systems of related base and derived units defined before the middle of the 20th century, some of which are still in limited use today.\nThe metric system was designed to have properties that make it easy to use and widely applicable, including units based on the natural world, decimal ratios, prefixes for multiples and", "recognised metric system. Metric units of mass, length, and electricity are widely used around the world for both everyday and scientific purposes. Converting prefixes The SI allows easy multiplication when switching among units having the same base but different prefixes. To convert from metres to centimetres it is only necessary to multiply the number of metres by 100, since there are 100 centimetres in a metre. Inversely, to switch from centimetres to metres one multiplies the number of centimetres by 0.01 or divide centimetres by 100. Length A ruler or rule is a tool used in, for example, geometry, technical", "a ruler that is one meter long in one frame of reference will not be one meter long in a reference frame that is moving relative to the first frame. This means the length of an object varies depending on the observer. Units In the physical sciences and engineering, when one speaks of units of length, the word length is synonymous with distance. There are several units that are used to measure length. Historically, units of length may have been derived from the lengths of human body parts, the distance traveled in a number of paces, the distance between landmarks", "The result is that there are a variety of different named units available to measure the same quantity (for example 10 millimetres = 1 centimetre, 100 centimetres = 1 metre, 1000 metres = 1 kilometre). Each unit and each prefix has a standard symbol (not abbreviation) associated with it.\nIn 1861, during discussions about standardising electrical units of measure, Charles Bright and Latimer Clark proposed that these units be named, not in relation to what they are used for, or common objects, but after eminent scientists; with the electrical units of resistance, potential difference and capacitance being named the ohm, volt", "to use the parsec, light years are also popularly used to gauge the expanses of interstellar and intergalactic space. Related units Distances between objects within a star system tend to be small fractions of a light year, and are usually expressed in astronomical units. However, smaller units of length can similarly be formed usefully by multiplying units of time by the speed of light. For example, the light-second, useful in astronomy, telecommunications and relativistic physics, is exactly 299792458 metres or ​¹⁄₃₁₅₅₇₆₀₀ of a light-year. Units such as the light-minute, light-hour and light-day are sometimes used in popular science publications. The", "into 10 tenths (décime). This hour was only briefly in official use, being repealed by the same 1795 legislation that first established the metric system.\nThe metric system bases its measurements of time upon the second, defined since 1952 in terms of the Earth's rotation in AD 1900. Its hours are a secondary unit computed as precisely 3,600 seconds. However, an hour of Coordinated Universal Time (UTC), used as the basis of most civil time, has lasted 3,601 seconds 27 times since 1972 in order to keep it within 0.9 seconds of universal time, which is based on measurements of the mean" ]
We all mostly skip or block ads. What makes companies still believe online ads like on youtube is worth investing?
[ "\"We\" is comprised of tech-savvy desktop/laptop users. Mobile users and most internet users don't use adblock, and their revenue makes it worthwhile.", "Adding to /r/CatboyMac, only SOME OF YOU block ads. And MANY of you skip them. But the part of the population with the most money to spend often doesn't fit within this group.\n\nEven if you do the latter, a well-crafted ad still can accomplish its purpose even if all it does is get a few seconds on YouTube before you kill it.\n\nIt could show a specific symbol, sometimes not even a logo, such as the construction site and fast-talkin' he-man narrator that is associated with most ads for Ford trucks, or it could be a tiny snatch of ba-da-da-DA-daaah music, or the dancing coloured Apple silhouettes, or it could be some celebrity that you see later on the same full-version ad on TV where you don't skip it.\n\nAds often do more than push a specific product. They reinforce a brand, and continuously raise awareness, and if they can do that in even a few seconds (or much better if you watch the whole duration), they're worth the money even if they don't reach a sizeable percentage of the target population.", "Youtube revives [1 billion](_URL_2_) UNIQUE page visits a month.\n\nAdBlock [(The most popular Chrome adblocking app)](_URL_1_) has only 15 million users.\n\nEven if we ASSUME that the rest of the adbock apps on chrome increase this number by 10 million, then multiply this amount by 4 for the different browsers (IE, Firefox, Safari, Google Ultron), then you still have an aggregate 900 million unique Non-AdBlocking Youtube visitors each month. I'm also willing to bet that close to 95% of those viewers use Youtube more than once a month. This is enough traffic to give youtube, at least, a yearly [$5.6 billion in ad revenue](_URL_0_)\n\nEven so, in 2012, adblocking apps across the board only cost google [$887 milion](_URL_3_), while they also managed to generate $50 billion in ad revenue. Clearly, the amount of money lost is not as great as one might expect.\n\nedit: grammer; speling, and muh phrasing." ]
[ "Advertising revenue Overview There are a variety of methods and providers which individuals and online organizations can use in order to earn monetary income in the form of advertisements accompanying their website or digital media content. Digital technology giants such as Google, Facebook, YouTube, Amazon, and Microsoft allow website owners and content creators to engage in partnerships and display advertisements with their online media; these owners and creators can subsequently receive a share of the advertising revenue. Individuals and organizations can earn significant income through advertising revenue. In 2018, it was reported that major YouTube content creators such as Jake", "free information, and be attracted to the corporation as a result.\nAdvertising on popular web pages can be lucrative, and e-commerce, which is the sale of products and services directly via the Web, continues to grow. Online advertising is a form of marketing and advertising which uses the Internet to deliver promotional marketing messages to consumers. It includes email marketing, search engine marketing (SEM), social media marketing, many types of display advertising (including web banner advertising), and mobile advertising. In 2011, Internet advertising revenues in the United States surpassed those of cable television and nearly exceeded those of broadcast television.", "interests encourages consumers to click on search ads instead of unpaid search results, which are often less relevant. For the online user, Sponsored Search Advertisement offers highly relevant search results which are based on the consumer’s own queries and, thus, they are considered less intrusive than banner advertisements or pop-ups advertising. In addition, Sponsored Search Advertisement reduces online user search costs and increases the accessibility to useful information within a limited time frame. Consequently, Sponsored Search Advertisement has become an important element of online users browsing and information searching experiences on the Web. Search advertising is an alternative to SEO", "solely on advertising revenue, offering everything from coupons to free Internet access. At the turn of the 21st century, a number of websites, including the search engine Google, started a change in online advertising by emphasizing contextually relevant ads based on an individual's browsing interests. This has led to a plethora of similar efforts and an increasing trend of interactive advertising.\nThe share of advertising spending relative to GDP has changed little across large changes in media. For example, in the US in 1925, the main advertising media were newspapers, magazines, signs on streetcars, and outdoor posters. Advertising spending as a", "goods, both online and offline. Given the prevalence of advertising-supported information goods online, it is important to understand how online advertising works. Economists have spent much effort in trying to quantify the returns to online advertising. One especially interesting aspect of online advertising is its ability to target customers using fine demographic and behavioral data. This ability potentially affects the ability of new and small firms to gain exposure to customers and to grow. However, targeted advertising is also controversial because it sometimes uses private data about individuals obtained through third-party sources. Quantifying the costs and benefits of using this", "which acted as middlemen between these two groups (publishers and advertisers). Each time a (believed to be) valid Web user clicks on an ad, the advertiser pays the advertising network, which in turn pays the publisher a share of this money. This revenue-sharing system is seen as an incentive for click fraud.\nThe largest of the advertising networks, Google's AdWords/AdSense and Yahoo! Search Marketing, act in a dual role, since they are also publishers themselves (on their search engines). According to critics, this complex relationship may create a conflict of interest. This is because these companies lose money to undetected click", "success of any business. In the case of customer to customer marketing, advertising often relates to online auctions and listings. As opposed to the pricey costs to advertise in media such as newspapers and magazines, products are already being promoted and publicized once users decide to officially put them on the internet. Potential buyers will become aware of products or services by conducting searches on the websites. Aside from possible fees and commissions imposed by the auction or listing site, advertising in this market does not require a substantial amount of money. Advantages Customer to Customer C2C marketing has become", "earns revenue from the advertising company, keeping 32% of the revenue while passing on 68% to the participating website. As of January 2018, online advertising accounted for 84% of Alphabet Inc.’s revenue. Google's advertising system provides significant revenue both for itself and for individuals and smaller companies who are actively participating as partners in Google's network. YouTube Another online advertising giant owned by Alphabet Inc. is video sharing website YouTube. In 2006, Google bought YouTube for $1.65 billion. In 2015, Bloomberg estimated YouTube to be worth approximately $70 billion, with over 30 million average daily visitors. YouTube content creators who", "new technology and internet businesses which find extremely innovative ways of generating revenues, often ways which seemed not to be possible. As a result, technology-based businesses are constantly updating their revenue models in order to remain competitive. \nAdvertising can be seen as a component of the revenue model, however, when the business is advertising its own products, this would result as a cost for the business which is the exact opposite of revenue. On the other hand, advertising can lead to an increase in sales thus revenue over a period of time. For the majority of businesses which will add", "reporters feel unable to cross. While larger media companies have relied on attracting their own advertisers online, many online intermediaries such as Google Ads now exist, which effectively has meant that small online media companies can get some revenues without having to have dedicated facilities—although the requirements of platforms like Facebook for video content, and the power to change news feeds without consultation do compromise editorial autonomy. In addition, the media organization concerned can no longer exert strong control over what advertisements are shown, nor can it benefit from accessing full audience data to strengthen its own revenue prospects. Journalist", "adopt.\nSocial advertisement targets audiences' demographics based on customers browsing histories. This helped companies understand users' interests and target a specific group of users. Whether it is location or personal interest, different categories of companies can make the consumers on social media rely heavily on their advertisements. This is one of the reasons why social advertising has grown over time. Targeting their audience to real life stakeholders generally increase the attention of the advertised deal which brings up more profits for companies. Subsequently, the psychological effects that social media gives off to its users play a huge role in advertisement", "paid for advertising in this way is less than the old method and so the earning potential for them is reduced.\nProgrammatic is not without its drawbacks however as without the appropriate management adverts can appear against unsavoury content or inappropriate news topics. This issue became front-page news in Feb 2017 when advertisers on YouTube were found to be showing on terror group websites and fake news sites. As a result, a number of major advertisers paused all of their online advertising until they could put the appropriate measures in place to prevent this occurring again.", "2004, online advertisement yearly represented between $500 million and $2 billion markets, which in 2005 increased to well over $6 billion-a-year. The larger online advertising companies report annual revenues in excess of $50 million each. In the beginning of this development such companies distributed their ads in a broadcast-like manner, i.e. they were not streamlined towards individual users’ interests. Some of these ads were served directly on Web sites as banner ads, but dedicated programs, called adware, soon emerged. Adware were used to display ads through pop-up windows without depending on any Internet access or Web pages. The birth of", "use their subscriber payment mechanisms such as SMS, declining market growth. Alternate business models involve offering free videos in the 'tube' style of websites with advertising funding. For the cost of viewing an ad, users can get free video clips.\nVerizon Wireless and Sprint Nextel Corporation announced as late as 2008 that they would allow some adult content to be viewed on their networks, while working to prevent access to this content by children. There have been expectations for some time that these companies will overcome age-verification, political, and religious challenges that have become a barrier to this market, to", "sites are businesses which need funding to provide their platforms. So they accept that advertising is the way the platforms are funded and therefore accept it, as necessary. However this does not mean the consumers may not feel negatively too excessive and annoying advertising, which could in turn reduce reciprocity to the message or damage their connection with the brand. Savulescu's question, however, is a reminder to businesses that they should respect the forums as a place of peer to peer conversations and social leisure and ensure their presence in these forums is not over bearing or intrusive. The use", "information and advertisements to boost their sales. Managers invest in social media to foster relationships and interact with customers. This is an ethical way for managers to send messages about their advertisements and products to their consumers.\nSince social media marketing first came to be, strategists and markets have been getting smarter and more careful with the way they go about collecting information and distributing advertisements. With the presence of data collecting companies, there is no longer a need to target specific audiences. This can be seen as a large ethical gray area. For many users, this is a", "money in the marketing online, they can use their financial resources in improving other aspects of their businesses. The companies receive advertising space instead of cash for their stock.\nMedia for equity funding fills a gap in funding which exists after a new company has spent its initial seed money, and hasn't yet grown enough to attract large venture capitalists. The company uses the advertising to increase its customer base, thereby increasing the value of its stock. The start-up company makes money directly, and the media company can sell the stock at a profit.\nThis method of funding new and small", "live streams. Twitch streamers who grow their channels sufficiently can become Twitch Affiliates and Twitch Partners, thereby expanding their revenue avenues. Twitch Partners can earn a share of the revenue from advertisements played to their live audiences and are allowed to \"determine the length and frequency of mid-roll advertisements.\" Microsoft In 2018, Microsoft represented approximately 4% of the estimated $111 billion of the U.S. online advertising market. Microsoft owns search engine Bing, which constitutes over 6% of Internet searches, and social media site LinkedIn. Microsoft earns advertising revenue through programs such as Bing Ads. Businesses and individuals can pay to", "Revenue sharing In business Revenue sharing in Internet marketing is also known as cost per sale, in which the cost of advertising is determined by the revenue generated as a result of the advertisement itself. This method accounts for about 80% of affiliate marketing programs, primarily dominated by online retailers such as Amazon and eBay.\nWeb-based companies such as Helium, HubPages, Infobarrel, and Squidoo also practice a form of revenue sharing, in which a company invites writers to create content for a website in exchange for a share of its advertising revenue, giving the authors the possibility of ongoing income from", "reported that they \"didn't like\" advertising and trusted their closest friends nearly twice as much as sales messages’ (Instead Articles, 2015). Sponsored content is a form of advertising brands use to strengthen credibility, but the tactic has not been very successful. The introduction of social media advertising has blurred the line between earned and paid approaches of media (Instead Articles, 2015). A campaign, which used owned assets within its strategy, was Coca-Cola. Featuring smaller 250 ml Coke cans, which came in limited edition range of colours, which could be collected and shared. The campaign had a connected system of", "many companies (including Google, Mozilla, and Canonical) have moved towards an economic model of advertising-supported software. For instance, the open-source application AdBlock Plus gets paid by Google for letting whitelisted Acceptable Ads bypassing the browser ad remover. As another example is SourceForge, an open-source project service provider, has the revenue model of advertising banner sales on their website. In 2006, SourceForge reported quarterly takings of $6.5 million and $23 million in 2009. Selling of optional proprietary extensions Some companies sell proprietary but optional extensions, modules, plugins or add-ons to an open-source software product. This approach is a variant of the", "continuing growth where other companies in the medium have had to downsize or close down completely. Due to ad filtering, the advertisements that have been common in video game journalism websites are becoming less viable. Websites such as Giant Bomb, ScrewAttack, and Penny-Arcade have received praise for their success in their paid subscription models. In addition, as print-based gaming journalism was superseded by web-based gaming journalism, large gaming journalism websites such as IGN and GameSpot are now under threat from YouTube celebrities and video game players creating their own live-streaming channels on Twitch. \nThis is the reality of the current", "occupation on the web, it is essential, and easy, to capture their attention this way. Other website methods include interesting web features such as engaging landing pages.\nMany online marketing strategies also use social media such as Facebook and LinkedIn to begin campaigns, share-able features and event host events. Other companies run competitions or discounts based on encouraging users to share or create content related to their product. Viral videos are an incredibly popular form of guerrilla marketing in which companies film entertaining or surprising videos that internet users are likely to share and enjoy, that subtly advertise their service or", "slow ... When the average user can be sure to see them we truly don’t know because we’re just going to be very data-driven and user feedback-driven on making that decision\". Facebook told TechCrunch that the advertisements' placement in the inbox depends on factors such as thread count, phone screen size, and pixel density. In a TechCrunch editorial by Devin Coldewey, he described the ads as \"huge\" in the space they occupy, \"intolerable\" in the way they appear in the user interface, and \"irrelevant\" due to the lack of context. Coldewey finished by writing \"Advertising is how things get paid", "a new and effective form of advertising, it allows consumers to try out the content before they actually install it. This type of marketing can also really attract the attention of users like casual players. These advertising blur the lines between game and advertising, and provide players with a richer experience that allows them to spend their precious time interacting with advertising.\nThis kind of advertisement is not only interesting, but also brings some benefits to marketers. As this kind of in-gaming mobile marketing can create more effective conversion rates because they are interactive and have faster conversion speeds than general", "Soda that encourages consumers to participate in the label design themselves.\nThis trend has given rise to several online platforms that host user-generated advertising competitions on behalf of a company. Founded in 2007, Zooppa has launched ad competitions for brands such as Google, Nike, Hershey's, General Mills, Microsoft, NBC Universal, Zinio, and Mini Cooper. Crowdsourcing remains controversial, as the long-term impact on the advertising industry is still unclear. Global advertising Advertising has gone through five major stages of development: domestic, export, international, multi-national, and global. For global advertisers, there are four, potentially competing, business objectives that must be balanced when developing", "content such as items, maps, and expanded customization options. Some games, such as id Software's Quake Live, also use in-game advertising to provide income for free-to-play games. In addition to making in-game items available for purchase, EA integrates in-game advertising into its games. In August 2007, EA completed a deal with Massive Incorporated, which lets Massive update and change in-game advertising in real-time within EA games. Independent game developer Edmund McMillen has claimed that he makes most of his money from sponsors by placing advertisements into the introduction of a game and the game's title screen. Comparison with traditional model", "value to a product or service that will be purchased by a customer, advertising is often a component of their business plan. Expenditure for this particular component is forecasted as it can generate greater revenues over periods of time.", "It is easier to detect youth marketing in phone apps because they tend to pop up as little advertisement banners and users are having to close the ad because it is disruptive when playing.\nAccording to the director of Saatchi & Saatchi Interactive, \"[the internet] is a medium for advertisers that is unprecedented... there's probably no other product or service that we can think of that is like it in terms of capturing kids' interest.\" Advertisers reach the young demographic by eliciting personal information. It's as easy as getting them to fill out quick, simple surveys prior to playing these games.", "can also be done through advertising strategies that are both paid and organic, but more natural to the world of marketing such as social media advertising, SEO focused content, and even webinars. More awareness leads to more candidates and further growth of a given company's talent pipeline.\nThe second main source of value is from increasing the rate at which job seekers apply for jobs, or conversion rates. For example, if 5% of your career site visitors currently apply for a job, and you increase that number to 10% by having more compelling content on your careers site, then" ]
Can someone explain what quantum suicide and quantum immortality are?
[ "One cat goes into a box, this cat is [Schrödinger's cat](_URL_1_). \n\nTo make a long story short....\n\n > He proposed a scenario with a cat in a sealed box, wherein the cat's life or death depended on the state of a subatomic particle. According to Schrödinger, the Copenhagen interpretation implies that the cat remains both alive and dead (to the universe outside the box) until the box is opened.\n\nThe reason \"the cat's life or death depended on the state of a subatomic particle,\" is because of the [Copenhagen interpretation](_URL_0_) of Quantum Mechanics. Frankly, I can't explain this like you're a 5 year old. It's hard, mathy shit. But a non-explanation is...\n\n > It holds that quantum mechanics does not yield a description of an objective reality but deals only with probabilities... According to the interpretation, the act of measurement causes the set of probabilities to immediately and randomly assume only one of the possible values.\n\nSo, how are these related? The cat in the box only dies when the state of the subatomic particle is known to you. Until then, it's both alive and dead.\n\n\nWhy is this important? Because another theory says every possible outcome happens in one universe or another. This means every time you open the box, the universe \"splits.\" In one universe, the cat dies. In another, the cat lives.\n\nSo if you repeat the experiment a billion times, in *one* universe, you've got an immortal cat. Perhaps that cat's consciousness is, in itself, immortal in its own universe. I mean, living a billion times seems pretty unlikely, right? That's more of a philosophical position than scientific one, though.", "Some people think that when something happens, new versions of reality are made, one for each possible outcome of the thing happening. For example, you flip a coin. In one universe, the coin comes up heads. In another universe it comes up tails. Now say you decide to kill yourself. You get a gun and point it at your head and pull the trigger. In one universe, it goes off and you die. In another, the gun jams and you live. Since the only universe you are alive in is the one where you live, you experience that universe. Therefore, according to you, you do not die. This happens every time you have a chance of dying. According to you, you can never die.", "The game Alan Wake has a video titled [Quantum Suicide](_URL_2_). It's more about quantum immortality and I'm not sure it'll explain anymore but it's pretty cool to watch and make you think." ]
[ "Quantum suicide and immortality In quantum mechanics, quantum suicide is a thought experiment, originally published independently by Hans Moravec in 1987 and Bruno Marchal in 1988 and independently developed further by Max Tegmark in 1998. It attempts to distinguish between the Copenhagen interpretation of quantum mechanics and the Everett many-worlds interpretation by means of a variation of the Schrödinger's cat thought experiment, from the cat's point of view. Quantum immortality refers to the subjective experience of surviving quantum suicide regardless of the odds.\nKeith Lynch recalls that Hugh Everett took great delight in paradoxes such as the unexpected hanging. Everett did", "not mention quantum suicide or quantum immortality in writing, but his work was intended as a solution to the paradoxes of quantum mechanics. Lynch said \"Everett firmly believed that his many-worlds theory guaranteed him immortality: his consciousness, he argued, is bound at each branching to follow whatever path does not lead to death\"; Tegmark explains, however, that life and death situations do not normally hinge upon a sequence of binary quantum events like those in the thought experiment. Thought experiment The quantum suicide thought experiment involves the same apparatus as Schrödinger's cat – a box which kills the occupant in", "the assumption is false.\"\nPhysicist Sean M. Carroll, another proponent of the many-worlds interpretation, states regarding quantum suicide that neither experiences nor rewards should be thought of as being shared between future versions of oneself, as they become distinct persons when the world splits. He further states that one cannot pick out some future versions of oneself as \"really you\" over others, and that quantum suicide still cuts off the existence of some of these future selves, which would be worth objecting to just as if there were a single world.", "worth living; it is a choice that implicitly declares that life is \"too much.\" Suicide offers the most basic \"way out\" of absurdity: the immediate termination of the self and its place in the universe.\nThe absurd encounter can also arouse a \"leap of faith,\" a term derived from one of Kierkegaard's early pseudonyms, Johannes de Silentio (although the term was not used by Kierkegaard himself), where one believes that there is more than the rational life (aesthetic or ethical). To take a \"leap of faith,\" one must act with the \"virtue of the absurd\" (as Johannes de Silentio put it),", "Digital immortality Digital immortality (or \"virtual immortality\") is the hypothetical concept of storing (or transferring) a person's personality in more durable media, i.e., a computer. The result might look like an avatar behaving, reacting, and thinking like a person on the basis of that person's digital archive. After the death of the individual, this avatar could remain static or continue to learn and develop autonomously.\nA considerable portion of transhumanists and singularitarians place great hope into the belief that they may become immortal by the year 2045, by creating one or many non-biological functional copies of their brains, thereby leaving their", "\"immortality\" turns out to be flawed; it cannot properly repair brain damage, as the \"mind\" is made of electrical signals and not just flesh and protein. The trauma from the traffic accident has resulted in him suffering constant pain and a lack of mental clarity. The husband, now an unstoppable killing machine, proceeds to stalk his wife across the country while slowly descending into madness and the return from death causing him to mutate at a rapid pace.\nRachael and her boyfriend Ben Shadway track the reanimated Eric to his secret country hideaway in the hope of killing him before he", "of them, continues to exist through all of their superpositions where the outcome of the experiment is that they live. In other words, we may say that a version of the experimenter survives all iterations of the experiment, whichever its number. Since the superpositions where a version of the experimenter lives occur by quantum necessity (again, under the many-worlds interpretation), it follows that their survival, after any realizable number of iterations, is physically necessary; hence, the notion of quantum immortality.\nA version of the experimenter surviving stands in stark contrast to the implications of the Copenhagen interpretation, according to which, although", "and Lu's second explanation for the persistent belief in immortality elixirs. They suggest that in some cases a body did not decompose because the deceased had died from mercury or arsenic poisoning, which is forensically known to often preserve a corpse from decay. For a believer in Daoist immortality drugs, even when an elixir-taker had unmistakably died, if the corpse was comparatively undecomposed, that could be interpreted as proof that the adept had become a xian immortal, as well as evidence for the alchemical elixir's efficacy. (1974: 298).\nTerminal incorruptibility was an ancient Chinese belief associated with jade, gold, and cinnabar.", "Quantum mind The quantum mind or quantum consciousness is a group of hypotheses which proposes that classical mechanics cannot explain consciousness. It posits that quantum mechanical phenomena, such as quantum entanglement and superposition, may play an important part in the brain's function and could form the basis for an explanation of consciousness.\nAssertions that consciousness is somehow quantum-mechanical can overlap with quantum mysticism, a pseudoscientific movement that involves assigning supernatural characteristics to various quantum phenomena such as nonlocality and the observer effect. History Eugene Wigner developed the idea that quantum mechanics has something to do with the workings of the mind.", "who the terrorists are. However, much of the book is about the characters and interactions of the people whose minds have been subjected to what is suggested to be quantum entanglement. Not all of them are good people. After one of them dies, the quantum entanglement gets stronger rather than weaker. Critical reaction Critical reaction varied, especially regarding the book's ending. Writing in the Globe and Mail, Michael Matheson simultaneously criticized the ending as utopian and described it as \"chilling\". Leo Graziani considered it optimistic. Alex Good called it \"cybertopian\" In the Toronto Star. TV adaption In 2014, Sawyer was", "fed by persistent rumors of an Elixir of Immortality, he becomes an apprentice of a mysterious physician and alchemist. However, instead of listening to the Alchemist's compassionate counsel and warnings, Burgner is driven by feverish greed to murder him; in this way, he acquires the Elixir while he is still spiritually unprepared, and is cursed thereby. This is the starting-point of a journey through the centuries: while Burgner can physically die, the Elixir enables him to retain the full memory of his previous lives as he repeatedly reincarnates into a variety of different circumstances. It also bestows upon him a", "Quantum Deadline Plot Prior to the events of the contemporary-set novel, journalist Daedalus Howell's intern has committed suicide by jumping off the Golden Gate Bridge, an event for which the character feels responsible and that has sullied his professional reputation. Forced to work for a second-rate blog, Howell is still trying to clear his conscious and his byline five years later. Then he and Jude, a lost 11-year-old thief, happen to both witness a murder in a discount men's suit shop. When they re-meet during the investigation, the boy claims to know Howell but from a parallel universe. He proves", "collapsed; thus, if the experimenter is already dead, there is a 0% chance of survival for any further iterations. However, if the many-worlds interpretation is true, a superposition of the live experimenter necessarily exists (as also does the one who dies). Now, barring the possibility of life after death, after every iteration only one of the two experimenter superpositions – the live one – is capable of having any sort of conscious experience. Putting aside the philosophical problems associated with individual identity and its persistence, we may assert that, under the many-worlds interpretation, the experimenter, or at least a version", "committing pre-emptive superpower suicide out of a misplaced fear of their own declining power.\"", "most famous examples of the undead. Science fiction Immortality can be achieved in fiction through scientifically plausible means. Extraterrestrial life might be immortal or it might be able to give immortality to humans. Immortality is also achieved in many examples by replacing the mortal human body by machines. Regeneration There are many examples of immortality in fiction where a character is vulnerable to death and injury in the normal way but possesses an extraordinary capacity for recovery.\nThe long-running British science-fiction series Doctor Who focuses on a character called the Doctor, a member of the alien Time Lord race, who", "was that suicide denotes all behavior that seeks and finds the solution to an existential problem by making an attempt on the life of the subject. Another worker in the field of suicidology was Joseph H. Davis. The definition he gave for suicide was a suicide is a fatal willful self-inflicted life-threatening act without apparent desire to live; implicit are two basic components lethality and intent. Albert Camus also did some work in this field. He believed that whether one can live or chooses to live is the only truly serious philosophical problem. He also claimed that man created a", "\"Zongo in de Kongo\" (\"Zongo in the Kongo\") (1970) gives him immortality as well. Still many fortune tellers predict his death and in \"De Ring van Petatje\" (\"Petatje's Ring\"), \"De Dood van Pietje\" (\"Pietje's Death\") (1986–1987) and \"Zilveren Tranen\" (\"Silver Tears\") (2002) the Grim Reaper tries to kill him. Geeraard the Devil also tries to get Nero's soul. Youth In \"De Zwarte Voeten\" (\"The Black Feet\") (1951) Nero claims that his mother was from Brussels and his father a Pole. Since he's drunk when saying this it's not clear whether he is being serious. According to \"De Juwelen van Gaga-Pan\"", "of conditional immortality reconciles the ancient Hebrew view that humans are mortal with the Christian view that the saved will live forever.\nBelief in forms of conditionalism became a current in Protestantism beginning with the Reformation, but it was only adopted as a formal doctrinal tenet by denominations such as early Unitarians, the churches of the English Dissenting Academies, then Seventh-day Adventists, Christadelphians, the Bible Students and Jehovah's Witnesses.\nMortalist writers, such as Thomas Hobbes in Leviathan, have often argued that the doctrine of natural (or innate) immortality stems not from Hebrew thought as presented in the Bible, but rather from pagan", "by futurists such as Ray Kurzweil. Religious The belief in an afterlife is a fundamental tenet of most religions, including Hinduism, Buddhism, Jainism, Sikhism, Christianity, Zoroastrianism, Islam, Judaism, and the Bahá'í Faith; however, the concept of an immortal soul is not. The \"soul\" itself has different meanings and is not used in the same way in different religions and different denominations of a religion. For example, various branches of Christianity have disagreeing views on the soul's immortality and its relation to the body. Alchemy Alchemists strive to solve the mystery of immortality with the Philosopher's Stone and elixir of life.", "of the soul that had remained in the body does not pass on to the next world, but will rather exist in a non-corporeal form capable of being resurrected by another wizard, as stated in Half-Blood Prince. If all of someone's Horcruxes are destroyed, then the soul's only anchor in the material world would be the body, the destruction of which would then cause final death. The creation of Horcruxes is considered the darkest of all magic.\nThis method was chosen by Voldemort to attain immortality. The concept is introduced in Harry Potter and the Half-Blood Prince. Rowling uses Horace Slughorn's", "In non-exponential decay The term \"half-life\" is almost exclusively used for decay processes that are exponential (such as radioactive decay or the other examples above), or approximately exponential (such as biological half-life discussed below). In a decay process that is not even close to exponential, the half-life will change dramatically while the decay is happening. In this situation it is generally uncommon to talk about half-life in the first place, but sometimes people will describe the decay in terms of its \"first half-life\", \"second half-life\", etc., where the first half-life is defined as the time required for decay from the", "lead some to view suicide as their only option.", "They believe through the application of alchemical processes, the physical body can be maintained through infinity, not dying by any natural diseases, only finding an end through physical destruction of the body. Theoretically if one could stay out of harm's way one could live forever. Physical immortality Physical immortality is a state of life that allows a person to avoid death and maintain conscious thought. It can mean the unending existence of a person from a physical source other than organic life, such as a computer. Active pursuit of physical immortality can either be based on scientific trends, such as", "and creative writing.\nThe author also puts forward the idea that death is not the end, and that whatever someone was or wished to be in life, he or she continues to be in death, within the restraints that death imposes. For example, a mathematician would continue perfecting his math, an inventor would keep inventing new things, and a psychic would continue to practice using their powers.\nNot only can Harry speak to the dead (thus earning him their eternal admiration, almost amounting to worship), but he can also form a bond with them which allows them a degree of control over", "spiritual immortality in the form of reincarnation or a world of the dead.", "Immortality (Pearl Jam song) Lyrics The lyrical interpretation of \"Immortality\" can be disputed, as many feel it may be about Nirvana frontman Kurt Cobain's death, although vocalist Eddie Vedder has denied this. He stated:\nNo, that was written when we were on tour in Atlanta. It's not about Kurt. Nothing on the album was written directly about Kurt, and I don't feel like talking about him, because it [might be seen] as exploitation. But I think there might be some things in the lyrics that you could read into and maybe will answer some questions or help you understand the pressures", "the victim himself, which he knows will produce this result. Basically he saw suicide as an external and constraining social fact independent of individual psychopathology. In David J. Mayo's definition there were four elements to suicide. The first element: A suicide has taken place only if a death has occurred. The second element: The death must be of one's own doing. The third element: The agency of suicide can be active or passive and, lastly, it implies intentionally ending one's own life. Sigmund Freud and Karl Menninger had similar views on suicide. Their definition of suicide had three", "\"immortality\" through a process now described as mind uploading:\nThe ultimate solution [for immortality] is pure science fiction. In fact, the rationale for implementing the interim solution is largely based upon two articles of faith. The first is the perfectly reasonable proposition that science will continue to grow – if not at its present exponential rate, at least linearly. The second, requiring a good deal more optimism, is the belief that Homo sapiens, during this critical phase of his natural history, will not destroy himself and his planet. We shall assume that developments in neurobiology, bioengineering and related disciplines… will ultimately provide", "and no resultant injuries, regardless of the degree of injury or lethality of method. Suicide Attempt, Type II Suicide Attempt, Type II is a suicide attempt with some degree of suicidal intent and resultant injuries. Suicide A suicide is a self-inflicted death with evidence (either explicit or implicit) of intent to die. The term completed suicide has also been used synonymously, but is generally believed to be redundant and potentially pejorative, and, as such, is not recommended. Controversy over use of \"commit\" and \"committed\" According to Fairbairn, \"The most common way of speaking about suicide is to talk of its", "an object of great power to sustain life, such as the Philosopher's Stone or Horcruxes. If one were to possess the three Deathly Hallows, it is fabled that they would possess the tools to become the \"master of death\". However, it is hinted that to be a true \"master of death\" is to be willing to accept that death is inevitable. Other methods of extending life include drinking unicorn blood, which will keep a person alive even if death is imminent, but at the terrible price of being cursed forever. Being magical can contribute to one's longevity, as there are" ]