question
stringlengths 1
296
| answers
sequence | ctxs
sequence |
---|---|---|
What's the deal with John Scott? | [
"John Scott was an NHL (Hockey) player for the Arizona Coyotes, he is an enforcer (someone who only really fights) and isn’t all that talented. He has only 5 goals and 6 assists in his 285 games played. This year the NHL made the all star game up to a fan vote, Coyotes fans decided to all vote for John Scott for the heck of it. Once he was up on the leaderboards, /r/hockey really got a hold of it and absolutely brigaded the vote to get him in the game. After a lot of the media picked up on the story it became almost a meme to get him in the game. At first Scott asked the fans to stop voting for him and vote for some of his more deserving fans, but once it was clear that he would be in the game he went with it and had a lot of fun with the whole thing. He was the number one most voted player and to try and circumvent his playing in the game the NHL reached out to the Arizona Coyotes and ‘forced/asked’ them to trade Scott away. John was then traded away to the Montreal Canadiens, which everyone knew was a shitty trade and it was to get him out of the game. \n\nMontreal then sent him down to the AHL (assumingly as per request by the NHL) to try and disqualify him from playing in the All-Star game.\nThe media and /r/hockey really got upset and made it a huge deal, lambasting the NHL for this move. The NHL admitted defeat and announced that he would be the captain for one of the four NHL all star teams. A few nights before the all star game, Scott sat down and gave a really touching interview to the NHL players tribune where be basically said that he loved the game and never wanted to just be an enforcer. Practically all of the coaches and players around the league spoke out in support of John. Tonight they played the games and despite being in a 3 on 3, where faster players usually strive, Scott scored two goals and his team won the championship. The fans were given 3 options to vote for MVP and despite none of them being Scott, they all wrote him in and even though his name wasn’t even on the ballot, Scott was announced MVP.\nThe reason for the hate is that some people view him as a joke candidate and that he shouldn't even have been in the game.",
"It's a complicated story, but short version: fans as a joke voted in literally the worst player in the NHL to the All Star game. The league hates it, tries many methods to get him out of the game but they all fail. They do some mean stuff to him too. \n \nHe goes to the game as the captain of his team and actually plays well, the fans love him and he's named MVP. He's a hero to people as the underdog who showed them all.",
"long story short, fans voted him into the game, NHL didnt like it, orchestrated a trade to not make him go, people get pissed out, damage control comes out and hes in the all start game again"
] | [
"Wendell Scott Background Scott was born in Danville, Virginia. From boyhood, he wanted to be his own boss. In Danville, two industries dominated the local economy: cotton mills and tobacco-processing plants. Scott vowed to avoid that sort of boss-dominated life. \"That mill's too much like a prison,\" he told a friend. \"You go in and they lock a gate behind you and you can't get out until you've done your time.\" (This quotation and those that follow are from Hard Driving.) He began learning auto mechanics from his father, who worked as a driver and mechanic for two well-to-do white",
"Robert E. Scott charmed me by his fine personality and manners, but he was the leading Whig.\" Conway admired Scott for opposing the \"fire eaters\" as well as for publicly predicting that secession would end in ruin.\nDespite not personally fighting for the Confederacy, Scott was killed by Union deserters when he confronted them for abusing his land.\nHis son R. Taylor Scott, likewise became a Virginia lawyer, serving in the Confederate army during the Civil War and later as Attorney General of Virginia.",
"Scott, calling him \"a captain and leader.\" During his senior year, Scott led the team with 127 tackles and 5.5 sacks; earning first-team All-Gateway conference honors.\nKill touted Scott's abilities to several NFL teams but only the Baltimore Ravens sent out a scout to assess Scott. The scout was impressed by Scott and three days following the 2002 NFL Draft, after going undrafted, Scott signed a contract with the Ravens.\nScott later returned to Southern Illinois in 2005 to finish his academic studies, graduating with a degree in economics. Scott later became a first-ballot member of the Southern Illinois' Hall of Fame.",
"James Scott (footballer, born 2000) Career Scott made his senior debut for Motherwell on 21 April 2018, as a late substitute away to Ross County in the Scottish Premiership. He had already played for the club's under-20 team in the Scottish Challenge Cup, making his first appearances aged 15.\nOn 15 February 2019, he signed a new contract, keeping him at Motherwell until 2022. He started his first game on 24 February, in a 4–1 defeat against Celtic. During that match Scott failed to return the ball to the opposition after an injured player had received treatment, and instead took a",
"Rashawn Scott College career Scott played at Miami (FL) from 2011 to 2015. During his career, he had 91 receptions for 1,241 yards and 8 touchdowns. Professional career Scott was signed by the Miami Dolphins as an undrafted free agent after the 2016 NFL Draft On September 3, 2016, he was released by the Dolphins as part of final roster cuts and was signed to the practice squad the next day. He was promoted to the active roster on November 30, 2016.\nScott started the 2017 season on the physically unable to perform list after suffering a foot injury in the",
"signed with the Pericos de Puebla of the Mexican League for 2015. He played in 28 games with them, hitting .292 with seven homers and 27 RBI. Toronto Blue Jays Scott signed with the Toronto Blue Jays on a minor league deal on May 15, 2015, and was assigned to the Triple-A Buffalo Bisons. He was released on August 13 after batting .240 in 52 games. Personal life Scott enjoys hunting and is a firearms enthusiast. He is a supporter of greater personal responsibility and smaller government.\nIn 2010, during the dispute regarding President Obama's birth certificate, Scott said that Obama",
"University overseas education program. He has traveled and spoken nationally and internationally. He has traveled throughout South America, Europe, China, Japan, Australia, Thailand, The Philippines, Angola, the Congo, and Nigeria. Scott also served as a consultant to Gulf Oil in Africa.\nScott figured prominently in five federal desegregation cases (in the Boston School case as a Court Appointed Expert). He currently serves on the Regional and Local Council of the Boy Scouts of America. He has been awarded the Paul Revere Patriots Award by the governor of the Commonwealth of Massachusetts, the Silver Beaver Award for distinguished service to the Boy",
"lot of anger in me about what happened (with Woods) and it all came out.\" It is estimated he earned $12 million working for Woods.\nWith Williams as his caddie, Scott finished runner-up at the 2012 Open Championship, having led by four strokes with four holes to play before bogeying them all to lose the title by one stroke to Ernie Els. The following year Scott won the Masters, defeating Ángel Cabrera on the second playoff hole. It was Scott's first major championship and the first time that an Australian golfer had won the Masters.\nIn September 2017, Williams announced that he",
"State Scott's statewide involvements included the Pennsylvania Air Pollution Commission, Pennsylvania Roadside Council, the Garden Club Federation of Pennsylvania, and acted as conservation advisor to the Highway Department on vegetation management. National Scott spent time in the White House in 1962 and 1965 where she attended the Conference on Conservation and the Conference on National Beauty. She also worked with governmental agencies such as Department of Environmental Resources and the Department of Agriculture. She was president of the American Nature Study Society and a founder of the Right of Way Resources of America. Relationship to Rachel Carson Due to her",
"long hours, and \"squeezed in his service as a national guardsman\". Scott's family considered it to be an honor to serve in the military. He continued the tradition set up by the three generations of his predecessors: his great-great-great grandfather, his grandfather and his father. An evangelical Christian Scott finished law school, and planned to run for district attorney's office after coming home from Iraq. Meeting and adoption Scott Southworth was deployed to Iraq in 2003. His deployment was to last 13 months. On September 6, 2003, half-way into his deployment Capt. Southworth with his unit visited an orphanage named",
"spent parts of the 2006 NFL season on the rosters of the Houston Texans, Miami Dolphins and New York Jets. He finished his NFL career on the practice squad of the Seattle Seahawks. In three NFL regular seasons, Scott played in eleven regular season games and started two of them.",
"Scott had 13 fumble recoveries in his career. On special teams, he gained 1,357 yards and a touchdown returning punts, and 137 yards on six kickoff returns. Scott played for the Redskins the final 3 years of his career.\nIn the late 1980s, NFL Films named Scott as the Dolphins All-Time Neutralizer sponsored by Tums. He was inducted into the Georgia-Florida Hall of Fame in 1998. The Professional Football Researchers Association named Scott to the PRFA Hall of Very Good Class of 2007 \nScott was one of only three living Super Bowl MVPs who did not attend Super Bowl",
"Republican National Convention, Indiana Republican State Convention and numerous venues across the United States. For seven years, he served as a talk show host on WRKO, Boston, Massachusetts, and at other radio outlets WPLZ, Richmond, Virginia, and WHNC, Henderson, North Carolina.\nScott continues to be an active political figure, especially due to his prominent role in watershed desegregation cases like the Boston Desegregation Case of 1974. Desegregation activism Scott played a prominent role in numerous cases involving the desegregation of U.S. public schools, including the Morgan v. Hennigan Boston desegregation case of 1974. As the Associate Dean of the School of",
"Connor Scott Career Scott attended Henry B. Plant High School in Tampa, Florida, where he played four years of varsity baseball. In 2018, his senior year, he struggled with a hamstring injury, forcing him to miss three weeks. In 20 games, he batted .526 with five home runs, along with pitching to a 3–0 win-loss record and a 2.13 earned run average in 23 innings. He committed to attend the University of Florida to play college baseball for the Florida Gators.\nThe Miami Marlins selected Scott with the 13th overall pick in the 2018 MLB draft. He signed for a $4,038,200",
"matters, Scott advocated increased salaries for public officials, economic development measures, and heavy punishments for persistent criminals. While he desired a tax code that would preclude the need for the state to borrow money, he encouraged legislators to keep taxes as low as possible. He also urged them to convert the militia into a youth army. The General Assembly routinely ignored his calls for reform but did pass a measure he advocated that allowed debtors a one-year stay on collection of their debts if they provided both bond and security.\nScott frequently clashed with the legislature, including once when the Senate",
"the symptoms of CTE that he suffers from. He credits CBD with significantly improving his quality of life since he first started medicating with it in February 2016.\nMarshall has spoken publicly in support of cannabis as an effective treatment option for mitigating the symptoms of head trauma-related health issues. He also says it can serve as a safer alternative to the pain-relieving opioid drugs that many NFL players become addicted to. Marshall has stated that the NFL should make allowances for the use of cannabis products as a medical treatment for players.\nMarshall served as a keynote speaker",
"Scott has received include the Colorado Association of Homebuilders' Award for Government Service, the Legislator of the Year Award from the Colorado Wildlife Federation, the Golden Bulldog Award from Watchdogs of the Treasury, the National Security Leadership Award from the American Security Council, the Sound Dollar Award from the Free Congress Foundation, the Spirit of Free Enterprise Award from the U.S. Chamber of Commerce, the Hero of the Taxpayer Award from The Americans for Tax Reform, the Taxfighter Award from the National Tax Limitation Committee and the Friend of Farm Bureau award from the American Farm Bureau Federation.\nMcInnis once employed",
"Scott Schutt Scott Schutt was a player in the National Football League for the Cincinnati Bengals in 1987. During his brief NFL career as a linebacker, Schutt played in three games and scored two points on a safety. He played at the collegiate level at North Dakota State University. Biography Schutt was born Scott Joseph Schutt on August 31, 1963 in Prairie du Sac, Wisconsin.",
"Trent Scott College career Scott played five seasons for the Tigers, redshirting his sophomore season due to injury. Over the course of his entire college career, Scott gave up only three sacks. As a senior, Scott did not allow a single sack and tallied with 39 pancake blocks and 32 knockdowns and was named first team All-SWAC. He graduated with a degree in Sports Management as a junior and was working on a master's degree in Sports Administration during his senior season. Professional career Scott was signed by Los Angeles Chargers as undrafted free agent in April 2018. He was",
"cut from the 53-man roster at the end of training camp and subsequently signed to the Chargers' practice squad on September 2. Scott was promoted to the Chargers active roster on September 15. Scott made his NFL debut on September 23 against the Los Angeles Rams. He made his first career start at left tackle on October 7 against the Oakland Raiders in place of an injured Russell Okung. In his rookie season, Scott played in nine games with one start.",
"Darrell C. Scott Early life According to his statements at a rally for President Trump, Scott aspired as a child to be a drug dealer and pimp; Scott sold drugs, used cocaine, stole automobiles and took his fathers 9mm pistol to school at age 16 and was expelled for it. While in his 20s, Scott became a born again Christian after being inspired by his wife who was born again months earlier, after a neighbor had urged her to attend church.\nIn 2004, Scott received an honorary doctorate from St. Thomas Christian College (now University), a school without accreditation from",
"Chris Scott (offensive lineman) Pittsburgh Steelers Scott was drafted by the Pittsburgh Steelers in the fifth round, 151st overall, in the 2010 NFL Draft. He played in two games for the Pittsburgh Steelers in 2011 before being cut by the team on October 5, 2011 and re-signed to the practice squad. He signed a future contract with the team on January 10, 2012, but was released on August 31, 2012. Green Bay Packers Scott was signed to the Green Bay Packers' practice squad on September 3, 2012, but was released by the team on October 23, 2012. Tampa Bay Buccaneers",
"as Bruce Springsteen, the Max Weinberg 7 and Friends.\nWeinberg was a member of the board of trustees of the Monmouth Conservation Foundation and won a conservation award in 2002. Nevertheless, during 2002 and 2003 he got into a prolonged local controversy over his plans to subdivide a portion of his 65-acre (26 ha) Middletown Township, New Jersey property into lots for new homes. Some of his neighbors strongly protested the move, and they and some in the press accused him of hypocrisy; Weinberg defended himself by saying the conservation foundation was not against all development, just thoughtless development. A scaled-down version",
"and he did a great job. He's a heck of a back, no question about it. He was breaking tackles, and that's not only a difference-maker but a morale-changer.\" He ran for 174 yards, which broke the school record for rushing in a bowl game previously set by Lu Gambino in the 1948 Gator Bowl. Scott also became just the seventh Maryland player to surpass the 1,000-yard single-season rushing benchmark. Earlier in the season, Scott set that mark as one of his goals, and he adorned his room with the statistics of the Terrapins who accomplished that feat in the past,",
"Brad Scott (American football) Career Scott came to South Carolina after 11 years as an assistant at Florida State under Bobby Bowden, the last four as offensive coordinator. While at Florida State, he helped develop Heisman Trophy winner Charlie Ward, as well as the \"Fast Break\" offense that netted the Seminoles a national title in 1993.\nIn his first year at South Carolina, he led the Gamecocks to a 6–5 regular season. Despite a 4–4 record in Southeastern Conference play, Scott's Gamecocks routed Clemson 33–7 in the last game of the season. That earned them a berth in",
"receiving yards and five touchdowns. After the season, Scott decided to forgo his senior year and enter the 2017 NFL Draft. Professional career Scott signed with the Los Angeles Chargers as an undrafted free agent following the 2017 NFL Draft and was reunited with former Clemson Tigers teammate Mike Williams. He was waived on September 2, 2017 and was signed to the Chargers' practice squad the next day. He signed a reserve/future contract with the Chargers on January 2, 2018.\nOn September 1, 2018, Scott was placed on injured reserve.\nOn August 31, 2019, Scott was waived by the Chargers and was",
"Wayne Scott Wayne Scott is a politician from the U.S. state of Oregon. He was a member of the Oregon House of Representatives for the Republican Party until 2009, representing House District 39, which includes the communities of Barlow, Beavercreek, Canby, Mulino and Oregon City. He was House Minority Leader for the 2007 legislative session. He announced his retirement as minority leader in August 2007. He has remained active in supporting Republican candidates in the state.",
"Jaleel Scott College career Scott was recruited to play for Maryland but did not qualify academically. He played for three years at Ellsworth Community College and had 45 receptions, 668 yards, nine touchdowns in 2015. Scott had 23 receptions for 283 yards and five touchdowns after transferring to New Mexico State in 2016. The following year, he recorded 1,079 yards and nine touchdowns on 76 receptions. He was a first-team all-conference selection and had a one-handed touchdown catch against Arizona State. Professional career Scott was drafted by the Baltimore Ravens in the fourth round, 132nd overall pick, of the 2018",
"Vardry McBee Vardry McBee (June 19, 1775 – January 23, 1864) was a saddlemaker, merchant, farmer, entrepreneur and philanthropist who has frequently been called the father of Greenville, South Carolina. Youth McBee, the youngest of ten children, was born to an impecunious Revolutionary War officer in the Spartanburg District of South Carolina and reared in Thicketty. After working on his parents farm as a teenager, in 1794, he was apprenticed to his brother-in-law, a saddler and postmaster in Lincolnton, North Carolina. Briefly a clerk at a grocery in Charleston, South Carolina, and a pioneer farmer with his parents in",
"Darrion Scott College career Scott attended and played college football at Ohio State University. As a junior, he was named first-team All-Big Ten by conference coaches and was a member of the Ohio State Buckeyes team that won the 2002 BCS National Championship Game. Minnesota Vikings Scott was drafted by the Minnesota Vikings in the third round of the 2004 NFL Draft. After spending a season as a backup he became a full-time starter in 2005. He led the team in sacks 2006 with 5.5. In 2007, he played in only four games due to an injury. Washington Redskins"
] |
Why do we close our eyes when we kiss? | [
"When kissing, your eyes don't have much function, so closing them allows you to enhance your other senses that are more involved in the kiss:\n\n- taste of the other person\n\n- their smell\n\n- their caresses (touch)\n\nAlso, I personally think it just feels awkward when kissing with eyes open - so that might be a cultural thing.",
"I think it's also difficult for my eyes to focus on something that close anyway.",
"look at yourself closeup on your phone's front facing camera. Yeah, you dont want to see that.",
"we close our eyes so we can see each other with our hearts",
"Why, are there some cultures that just stare at each other when kissing?",
"there is no scientific reason.\n\nim pretty sure its just awkward to stare at the other person while making out.",
"> 1. You wouldn’t want to see what you look like while kissing, so neither would your partner;\n\n > 2. Your brain can’t make your tongue swirl around if your eyes are moving at the same time. It’s the same principle as trying to pat your head while using your other hand to go in circles over your belly;\n\n > 3. It’s weird enough to kiss with your eyes open, but even weirder to make moaning sounds;\n\n > 4. It’s bad for your eyeballs to look that close at anything;\n\n > 5. For females, it ruins everything if you’re fantasizing about Brad Pitt when you’re staring at something closer to Steve Buscemi;\n\n > 6. For males, if you’re kissing in the middle of intercourse, with your eyes closed it’s easier to imagine baseball;\n\n > 7. With your eyes open, your lover’s nose looks bigger than the Chrysler Building\n\nCredit for this list belongs to [this blog](_URL_0_). (It was too funny not to share)",
"When you kiss and your face is that close to the other person's, I believe it strains the eyes and you close to be more comfortable. Like: \"I don't need to look right now, it adds no value just stain lemme close and be truly comfortable.\""
] | [
"William Cane notes that kissing in Western society is often a romantic act and describes a few of its attributes:\nIt's not hard to tell when two people are in love. Maybe they're trying to hide it from the world, still they cannot conceal their inner excitement. Men will give themselves away by a certain excited trembling in the muscles of the lower jaw upon seeing their beloved. Women will often turn pale immediately of seeing their lover and then get slightly red in the face as their sweetheart draws near. This is the effect of physical closeness upon two people",
"in, causing the loved one's skin or hair to be suctioned against the nose and upper lip. A common misconception is that the practice arose so that Inuit could kiss without their mouths freezing together. Rather, it is a non-erotic but intimate greeting used by people who, when they meet outside, often have little except their nose and eyes exposed. \nThe greeting was described in reports of a group of Alaska Native people touring the United States with entrepreneur Miner W. Bruce in the 1890s: \"Mr. Bruce yesterday instructed Kerlungner and Wearner that in this country they should not rub",
"for emotion and passion to be passed from one partner to another, without involving the eyes of those around them like other public displays of affection would.\nHowever, it has been argued that the act of kissing a persons forehead is not romantic. Instead such an act is purely neutral and should not be used when trying to transfer feelings of emotion, lust, love, or so on. It's been said to lack certain qualities that make other kisses more romantic and therefore should not be thought of as a gesture for expressing non-platonic love. It is even stated that the kiss",
"by stating, \"Let's just do this\", Lowe said Jewel agreed to do the scene. Lowe stated: \"But as we approached the kissing moment it became strained and it's never good when you can't trust that your fellow actor is on the same page... I pecked her on the lips; her mouth scrunched closed like you would do if someone was going to stick something unwanted into it, which I was not intending. I sort of moved my head from side to side to make it look real, like there was at least a dollop of energy or passion. 'Cut', said",
"some viewers. Also, William Shatner recalls in Star Trek Memories that NBC insisted their lips never touch (the technique of turning their heads away from the camera was used to conceal this). However, Nichelle Nichols insists in her autobiography Beyond Uhura (written in 1994 after Shatner's book) that the kiss was real, even during takes in which her head obscures their lips.\nWhen NBC executives learned of the kiss they became concerned it would anger TV stations in the Deep South. Earlier in 1968, NBC had expressed similar concern over a musical sequence in a Petula Clark special in which she",
"the lips between both men and women is a common form of greeting. In South and Eastern Asia, it might often be a greeting between women, however, between men, it is unusual. Kissing a baby on the cheeks is a common form of affection. Most kisses between men and women are on the cheeks and not on the lips unless they are romantically involved. And sexual forms of kissing between lovers encompass the whole range of global practices. Kissing in films The first romantic kiss on screen was in American silent films in 1896, beginning with the film The Kiss.",
"custom, while in others a kiss on each cheek is the norm, or even three or four kisses on alternating cheeks. In the United States, an air kiss is becoming more common. This involves kissing in the air near the cheek, with the cheeks touching or not. After a first date, it is common for the couple to give each other a quick kiss on the cheek (or lips where that is the norm) on parting, to indicate that a good time was had and perhaps to indicate an interest in another meeting.\nA symbolic kiss is frequent in Western cultures.",
"\"It is through kisses that a knowledge of life and happiness first comes to us. Runeberg says that the angels rejoice over the first kiss exchanged by lovers,\" and can keep one feeling young: \"It carries life with it; it even bestows the gift of eternal youth.\" The importance of the lover's kiss can also be significant, he notes: \"In the case of lovers a kiss is everything; that is the reason why a man stakes his all for a kiss,\" and \"man craves for it as his noblest reward.\"\nAs a result, kissing as an expression of love is contained",
"them over from New York to Los Angeles to stay at the Chateau Marmont so they could write the song. Taking a cue from \"Baby I Need Your Loving\" by The Four Tops that was then rising in the charts, Mann and Weil decided to write a ballad. Mann wrote the melody first, and came up with the opening line \"You never close your eyes anymore when I kiss your lips\", influenced by a line from the song \"I Love How You Love Me\" that was co-written by Mann - \"I love how your eyes close whenever you kiss me\".",
"my heart,\none by one \"tonguemaking,\" one by one.\nWhen my sweet precious, my heart, had lain down too,\neach of them in turn kissing with the tongue, each in turn.\nKissing is described in the surviving ancient Egyptian love poetry from the New Kingdom, found on papyri excavated at Deir el-Medina:\nFinally I will drink life from your lips \nand wake up from this ever lasting sleep.\nThe wisdom of the earth in a kiss \nand everything else in your eyes.\nI kiss her before everyone \nthat they all may see my love.\nAnd when her lips are pressed to mine \nI am made drunk and need",
"kissing each other.",
"actions, feelings that had been considered strictly private. Since Pearl Harbor, Americans had felt that the Japanese were \"sneaky\", claiming that \"if Japanese kissed in private, they should do it in public too.\" Non-sexual kisses In some Western cultures it is considered good luck to kiss someone on Christmas or on New Year's Eve, especially beneath a sprig of mistletoe. Newlyweds usually kiss at the end of a wedding ceremony.\nFemale friends and relations and close acquaintances commonly offer reciprocal kisses on the cheek as a greeting or farewell.\nWhere cheek kissing is used, in some countries a single kiss is the",
"is kiss, because when two guys kiss it's like a bomb going off in the straight world. Our kisses are louder than bombs.\" Spencer admits that he has fallen in love with India but is terrified because he's losing control. But he also feels safe, like he's home. India tells him that wherever they are, as long as they are together they're home. They kiss, and with each kiss they call out a target that their kiss has destroyed like a bomb, finally declaring that they will blow up the whole straight world. Critical response FAQs was generally poorly received",
"kiss is by clinking their glasses. An ancient Christian tradition explains that the clinking sound scares the devil away and the couple kisses in his absence. Another tradition is to ring bells placed at the tables by the wedding party. A ring of the bell signals the bride and groom to kiss. Kissing songs Child and teenage culture includes a number of simple songs about kissing, love and romance, with some revolving around heartbreak and others focussing on enduring love. One of the most famous songs is a children’s song often used to tease other children who are thought to",
"loving couples.\nCheek kissing between adults, when it occurs at all, is most often done between two people who know each other well, such as between relatives or close friends. In this case, a short hug (generally only upper-body contact) or handshake may accompany the kiss. Likewise, hugs are common but not required. A hug alone may also suffice in both of these situations, and is much more common. Particularly in the southeastern United States (Southern), elderly women may be cheek kissed by younger men as a gesture of affection and respect.\nIn Québec, cheek kissing is referred to in the vernacular",
"cheek kissing is a universal form of greeting between a man and a woman or two women.\nIt is not necessary to know a person well or be intimate with them to kiss them on the cheek. When introduced to someone new by a mutual acquaintance in social settings, it is customary to greet him or her with a cheek kiss if the person being introduced to them is a member of the opposite sex or if a woman is introduced to another woman. If the person is a complete stranger, i.e. self-introductions, no kissing is done. A cheek kiss",
"that they were \"just kissing\"",
"but that she herself was not. \"I feel much safer with girls, so I felt more comfortable kissing [Seyfried] than kissing any of the other people that I had to kiss\", she said. Seyfried's uneasiness in the scene caused \"giggling fits\" between takes. Seyfried said that neither of them wanted to do the kiss because they felt it was just for promotional purposes. She agreed with Fox that she was uneasy about acting out the scene. \"It was my first time doing a real kissing scene with a woman\", she stated. \"It is just weird. It is a woman. With",
"Are You Gonna Kiss Me or Not Content \"Are You Gonna Kiss Me or Not\" is a country love song. In the first verse, the song's male narrator describes sitting with his love interest and talking, and being caught off guard when she says to him 'are you gonna kiss me or not?' In the second verse he describes the kiss favorably, and decides to take a chance and ask for her hand in marriage. The song's bridge describes the events of the couple getting married, and him lifting up her veil before asking her 'are you gonna kiss me",
"kiss she sees her entire future with her lover. The ballad \"Where Are You Now\" talks about wanting to know where a previous love is, and what that person is up to, so that she can finally let them go and find closure. Lines on \"Can't Make You Love Me\", a Europop song, state that fancy cars and money pale in comparison to true love, with Spears singing: \"I'm just a girl with a crush on you.\" The mid-tempo, synth-backed \"When Your Eyes Say It\", written by songwriter Diane Warren, combines a string section with a loping hip hop beat,",
"way to work realizes that the world is kissing and that the act is totally contagious if one looks around.",
"have boatloads of chemistry with someone else.\" On the kiss itself, Dohring noted, \"It was so funny, as an actor, to kiss this girl. I was all nervous beforehand. But you have to just let it go for the scene. It was so fun to watch [later when it aired],\" adding that \"a lot of that emotion was real for me.\" The song \"Momentary Thing\" by band Something Happens plays during Veronica and Logan's first kiss.\nSeries creator Rob Thomas, was not content with the kiss scene, writing that it was not how he envisioned it. \"I wasn't actually pleased with",
"seconds. This type of \"kiss\" has given H. temminkii the common name of kissing gourami has been considered an intraspecific aggressive behavior also known as \"mouth fight\" due to the contraction of the jaw muscles. However, it is not completely confirmed that it is an aggressive behavior and is rather understood as a ritualized form of aggression. Ecosystem roles Helostoma temminkii can become the host tosome parasitic algal species. These algae are able to survive under kissing gourami skin and look like color spots. Some hypothesis affirm that these algae communities receive some nutrients required for photosynthesis from the H.",
"time stops and everyone is frozen except the two of them. As they finish their kiss, a tear is shown rolling into the girl's eye. At this point everything begins moving forward again. She walks away from Cook to her plane and he stares after her. Chart performance \"Come Back to Me\" debuted at number 49 on the Billboard Pop 100 chart issued April 9, 2009. It also debuted and peaked at number 63 on the Billboard Hot 100 for the chart dated April 18, 2009 due to high digital downloads and airplay after David Cook performed the song on",
"interview with the Library of Congress. She went on to say, \"I felt he was very strong, he was just holding me tight, and I'm not sure I -- about the kiss because, you know, it was just somebody really celebrating. But it wasn't a romantic event. It was just an event of thank God the war is over kind of thing,\" adding that \"it wasn't my choice to be kissed. The guy just came over and kissed or grabbed.\" \"I did not see him approaching, and before I know it I was in this tight grip,\" Friedman told CBS",
"as \"Tender Kisses\" in appearance and the general look of sadness. One scene focuses on a man, unconscious, who has a door on his chest indicating the door to his heart. A woman standing over him has a window on her chest and reaches into the window to retrieve and flower and places it into the doorway on the man's chest.",
"to escape through an closed door. But behind the door are two women standing. He is placed in a chair, while the two women are teasing and trying to seduce him. In the end, the man is seen smiling, with lipstick kiss-marks all over his head.",
"I Wanna Make You Close Your Eyes Content This song is a country ballad, in which the song's male narrator tells his lover that he \"want[s] to make [her] close [her] eyes\" (i.e., he wants to feel sexual arousal to the point that she closes her eyes to savor it).\nBentley said of the song, \"One of the best compliments I can get is when a guy comes up to me and says that one of my songs helped him out at home...maybe helped him smooth something over with his girlfriend or wife. That's the goal with this one.\" Critical",
"America for male friends to hug (as well as slap each other on the back) in a joyous greeting. A similar hug, usually accompanied by a kiss on the cheek, is also becoming a custom among Western women at meeting or parting. In Portugal and Brazil, it is common, mostly among males, to finish letters and emails with Um abraço or Abraço followed by the sender's signature. Similar formulas may be used in oral communication. In the Roman Catholic rite of the Holy Mass a hug may be substituted for a kiss or handshake during the kiss of peace",
"Kissing on the Mouth Plot Ellen is sleeping with her ex-boyfriend while trying to ignore the fact that he's looking for more than just sex. Her roommate, Patrick, isn't helping matters with his secretive and jealous behavior."
] |
Why does the US tip food delivery drivers? | [
"I tip them because they went outside and brought me something when I didn't want to. \n\nMy family growing up did too the mailman every Christmas.",
"How do you understand tipping waiters, but not delivery drivers? A waiter didn't cook your food either.",
"I work as a delivery driver and it's for 3 main reasons\n1: GAS (gas is expensive. When you are driving 6 hours a day gas goes by pretty quickly.\n2: We usually get payed shit as an hourly wage. Tips make up a little more than half of my income\n3: The wear and tear on the car adds up pretty quickly. Often those tips are used (at least in my case) for repairs on the car. \n\nAlso drivers usually remember houses. If you tip well and are fast to get to the door, il probably hit that house first on a triple/quadruple (route permitting). But if the customer is rude and takes 5 minutes to get to the front desk I'm more likely to get it on the way back, so other people's food isn't getting cold. Your delivery time can be largely up to you. \nI don't get offended by no-tippers, there's not really anything wrong with not tipping since it's purely a cultural thing, but the couple bucks really does make a difference.",
"In many places, jobs that are considered \"tip jobs\" make less money than minimum wage, due to taxes being higher for a lot of tip jobs. There's a couple of ways a company and the IRS (Internal Revenue Service) work together to handle tips:\n-tips are reported, meaning any money made from a tip is reported to the business, and the business reports it to the IRS. The IRS then taxes the employee based on the minimum wage, plus tips earned;\n-tips aren't reported, but the IRS assumes an average hourly amount made from tips, and taxes based on that total amount;\n-tips are made \"under the table\", where the business doesn't report tips. An example of a job in this category would be a golf course. The cart people aren't considered a tipping position, but will often times receive a tip.\n\nI personally don't know the case for food delivery drivers, but one can assume it's likely one of the first two. If it's the second one, not tipping the driver would result in the driver losing money, as they're taxed higher whether they receive a tip or not.\n\nI can't speak for all companies, but I'm also pretty sure a lot of food delivery drivers pay for their own gas, so tipping really helps out with that.",
"I tip delivery drivers because the food place will not compensate the driver for: Gas, Mileage, insurance, wear and tear of the vehicle, or etc. I usually tip a few bucks, normally just over the price of a gallon of gas. My reasoning behind the amount is that unless their car is really bad gas mileage, atleast they got their gas money out of me for the delivery. I used to live in a bad neighborhood, so I'd tip atleast 2 gallons worth of cash additional, because they were taking a risk getting my food to me. Now that i'm in a nicer neighborhood, it's not as much of a risk that they'll get mugged, and the area I now live in has open carry laws, so they can carry a weapon if they're nervous about delivery to me.",
"They drive their own personal vehicle to bring our lazy asses food. They risk their life in traffic, people die on roads everyday it could happen to anyone, to top it off you don't make enough money being a food delivery driver what do you do if your car break down? Nothing because you've been a food delivery driver and can't afford to fix it",
"Thanks all :) Really helped me see why.\n\nJust a few points. I do tip when I go to the US. I dont really know why all the time, but I do tip, and I was always taught (by parents) that its 10% for poor service, 15% for average and 20% for good, depending on your location. So please dont take my question as an admission I dont tip. \n\nAs for why I understand waitstaff, a few things to consider. For me, waitstaff talk to you, ask how you are doing, chat a bit, work hard on busy days, often comp something if service is slow, or something is wrong. That, to me, is how they earn their tip. Even a shitty waiter has some level of interaction besides bringing your food to the table. Hence tip. I dont think it should be necessary, but it is, so fine. \n\nI didnt realize that (thanks /u/Campo531) that pizza and takeout guys also work in the kitchen. Thats not a thing where I am from. And while some places here do have their drivers use their own cars, they get gas money and stuff IN ADDITION to their pay. Another factor I didnt think of. \n\nIn that case, yes, I now see why they are tipped. I still wouldnt call them driving being tip worthy, if that makes sense, because thats what they are paid to do, but I will tip, because I am aware of the culture of them not getting paid enough.\n\nThe garbage men and postmen tipping is weird to me even more so. But ok, I can get on board with that. \n\nThank you all.",
"In European countries, people that work in food, delivery, etc. typically receive better pay than in America (maybe a few more bucks, in euros obviously) and receive benefits like siesta. American workers that have \"tip jobs\" don't get paid very much and don't have a siesta. Anyway, they go to people's houses that could be on the other end of the town just to give them food they're too lazy to get. It's just common decency to compensate them a little more for their gas, time and energy.",
"Service industry. If someone does any type of service for you they get a tip. Thats how I look at it and how I was taught. I've tipped my trash man after big trash days, postman gets a tip every christmas along with cookies, pizza guys for bringing me my pie, repairmen, so forth and so on. A tip is never technically necessary hence the reason its called a tip. It simply shows appreciation and thankfulness for the particular service provided. Don't be cheeky.",
"Fun fact: Tipping in the US is only \"mandatory\" because during the prohabition times, restaurant owners reliesed they could pay less if the waiters took tips. Before this, tipping was seen as a bribe and waiters could lose their jobs if they were seen accepting tips.",
"Over 20 years ago I used to deliver pizza part time. We got 50 cents a delivery and minimum wage. We had to use our own car and pay for our own gas. \n\nSo yea, tip your fucking pizza guy you Jerk.",
"They make barely enough to get by. I figure a little extra weed money would be appreciated.",
"Just like servers and bartenders in most states, they work for less than minimum wage + tips"
] | [
"food in a commercial kitchen, then wrap and label the food and load it into a food warmer. In 2012, under pressure from food truck owners and supporters, including the University of Chicago Law School, regulations were changed to allow on-board cooking, however, controversially, food trucks are required to park 200 feet away from any restaurant, which virtually eliminates busy downtown locations.\nIn the US, specialized food truck outfitters offer comprehensive start-up services that can include concept development, training, and business support, in addition to outfitted trucks. In the US, food trucks are a $1.2 billion industry. By 2017, the",
"and are unique in their mobilitiy but also in their locations.Food trucks are found in cities, towns, and universities all over the United States and Canada although they have a longer history in places like Portland where there was little laws preventing them or Los Angeles where immigrants carried on traditions. Other spaces for these vendors became fairly recent in places like Montreal where trucks and cultural spaces were previously regulated. Although often overlooked because they may not always supply the most ‘healthy’ food, they help combat food insecurity by supplying food to communities that either have no other means",
"sites, factories, and other blue-collar locations. In big cities of the U.S. the food truck traditionally provided a means for the on-the-go person to grab a quick bite at a low cost. Food trucks are not only sought out for their affordability but as well for their nostalgia; and their popularity continues to rise.\nThe 2000s and 2010s, the economic changes caused by the Great Recession, technological factors, and street food being \"hip\" or \"chic\" have combined to increase the number of food trucks in the United States. The construction business was drying up, leading to a surplus of food trucks,",
"deliver meals from restaurants—Amazon’s Prime Now, and Instacart, usually allow customers to add a gratuity, but the companies were counting the tips toward regular payment. Torres characterized the practice as exploiting “an underclass of independent contractors”, and hopes City Council can ban the practice altogether. Vox noted the gig economy is in need of regulation for the estimated fifty-seven million workers (in the U.S.) who have little protection, and few if any benefits. Torres’ bill would compel these companies to be transparent about the practice “by explicitly stating it in their terms of service or by sending a notification as",
"throughout the city's downtown area\", which critics have called an \"anti-competitive\" rule for food truck operators. Health concerns Food trucks have unique health risks compared to regular land-based restaurants when it comes to food safety and the prevention of foodborne illness. Most food trucks do not have access to adequate clean and hot water necessary to wash hands or to rinse off vegetables, as required by most health codes or regulations.\nIn June 2017, The Boston Globe reviewed the 2016 city health records and found that food trucks had been cited for violations 200 times, with half of the violations being",
"Pig Stand Number 21. By 1988, 51% of McDonald's turnover was being generated by drive-throughs, with 31% of all US take-out turnover being generated by them by 1990.\nFood delivery - Some take-out businesses offer prepared food for delivery, which usually involves contacting a local restaurant by telephone or online. In countries including Australia, Canada, India, Brazil, Japan, much of the European Union and the United States, food can be ordered online from a menu, then picked up by the customer or delivered by the restaurant or a third party delivery service. The industry has kept pace with technological developments since",
"local government. Mexico Although street food in Mexico is unregulated, food trucks are becoming increasingly popular as of 2013 and owners have created an association to pursue the professionalization and expansion of this commercial sector. In addition to the food trucks catering on the streets, there are regular bazaars organized to introduce their products to the consumers.\nIn response to this popularity the Local Authorities have issued a series of special regulations to incorporate them to legal schemes that would help to order this commerce form. as new food truck business model emerged, some local bodybuilders begin to make food trucks",
"is mainly the place where the engineers eat because they are contributors (prices are less expansive for them). For those bringing food from their flat, you can warm up there; there are ovens and stovetops.\n- Fast food and supermarkets: Finally, there is an area next to the IUT Louis Pasteur with fast food like Mac Donald, Mezzo di Pasta or supermarkets (Liddl, Intermarché).",
"and chefs from high-end restaurants were being laid off. For experienced cooks suddenly without work, the food truck seemed a clear choice, and a smaller financial investment than a brick-and-mortar restaurant.\nOnce more commonplace in American coastal big cities like New York and LA, gourmet food trucks are now to be found as well in the suburbs, and in small towns across the country. Food trucks are also being hired for special events, like weddings, movie shoots, and corporate gatherings, and also to carry advertising promoting companies and brands. Gourmet trucks A modern-day food truck is not simply an ordinary taco",
"In a number of service jobs, such as food service, golf caddying, and valet parking jobs, workers in some countries are paid mostly or entirely with tips.\nThe use of tipping is a strategy on the part of the owners or managers to align the interests of the service workers with those of the owners or managers; the service workers have an incentive to provide good customer service (thus benefiting the company's business), because this makes it more likely that they will get a good tip.\nThe issue of tipping is sometimes discussed in connection with the principal–agent theory. \"Examples of principals",
"to boost the local economy but it will also allow vendors to safely and securely provide food to the community.However food trucks are not just an American or Western phenomenon, they are part of a phenomenon that has been quite common in much of the Global South. Food vending in the Global South slightly differs as food vending enables many to simply survive, hang on, and cope with urban towns. It also allows them to develop networks and strategies to get by in these towns by forming relationships with commercial and small-holder irrigation farmers. Food delivery services are another way",
"the USOS, most of the food aboard is vacuum sealed in plastic bags; cans are rare because they are heavy and expensive to transport. Preserved food is not highly regarded by the crew and taste is reduced in microgravity, so efforts are taken to make the food more palatable, including using more spices than in regular cooking. The crew looks forward to the arrival of any ships from Earth as they bring fresh fruit and vegetables. Care is taken that foods do not create crumbs, and liquid condiments are preferred over solid to avoid contaminating station equipment. Each crew member",
"Deliveroo History and basic operations The company Deliveroo, headquartered in London, was founded in 2013 by Will Shu and Greg Orlowski, both Americans. The company makes money by charging restaurants a commission fee, as well as by charging customers a fee per order. It operates in two hundred cities in the UK, and in the Netherlands, France, Germany, Belgium, Ireland, Spain, Italy, Australia, Singapore, United Arab Emirates, Kuwait and Hong Kong.\nOrders are placed through its app or website and then self-employed bicycle or motorcycle couriers transport orders from restaurants to customers.\nIn November 2017 Deliveroo introduced Deliveroo Plus, a subscription service",
"Busboys are not traditionally tipped directly in the United States, but restaurants may employ \"tip pooling\" or \"tip sharing\" arrangements, in which a portion of servers' tips are shared with other restaurant service staff.\nIn the United States, tip sharing may be either voluntary, where waitstaff give a portion of their tips to coworkers as they see fit, or mandatory, where the employer sets a formula by which tips must be shared with coworkers such as bussers and bartenders. Federal Department of Labor regulations do not allow restaurants to include managers in tip sharing, and inclusion of \"back of the house\"",
"rate of the country. And it helps the growth of an industry by ensuring the availability of raw materials.\nTraders from outside the country will have to come in contact with internal traders, because it is not easy to come directly into another country and get the required products. Wholesale trade Wholesalers play a major role in working of domestic trade. One could even say that it is the backbone of the domestic market. A wholesaler is directly in contact with the manufacturers but in indirect contact with the consumers. A wholesaler generally deals with one type of industry. e.g.",
"to significant improvements in the safety of the food supply chain in the United States and around the world.",
"meals prepared by different cooks to prevent food poisoning outbreaks from incapacitating the entire crew, a rule subsequently implemented by the Federal Aviation Administration.",
"as donuts, hamburgers, chili and chips, as well as ethnic food. Some people prefer to stop at snack vans when travelling, due to the low price, rather than stop at a motorway service station where prices can be extremely high.\nWith the British street food industry growing 20% year-on-year, the increase in popularity of having a mobile food van at events has been substantial. Many people are finding that their business has become more successful when they switch to mobile. This is due to festivals and upcoming street food events having a extreme high demand for takeaway food.",
"and it became trendy to eat street food from food trucks. Now days they are all over Brazil, workplaces, schools, colleges, office buildings, industrial parks, workshops: that is, any place where there is potential demand for regular meals or snacks. Canada In Canada, food trucks, also commonly known as cantines (French for cafeteria) in Quebec, are present across the country, serving a wide variety of cuisines, including anything from grilled cheese sandwiches to Mexican. France Pizza trucks are common in Marseille and southern France since the 1960s, and food trucks are common at outdoor markets, but American-style trucks selling restaurant-quality",
"supply chain from slave ships in Asian waters to leading producers and retailers. Costco has published a statement saying it has had a supplier code of conduct since 1999 which does not allow this practice, and that independent auditors check for violations regularly. International locations and other centers Warehouses outside the U.S. are similar to those in the US. Layout, signage, and even parking lot markings are generally identical to warehouses in the US. Food court menus are tailored to international tastes, with meat pies on offer in Australia, poutine in Canada, seafood-topped pizza in Asian and Mexican locations, clam",
"interest in efficient transportation of parts across borders, as supply chains in the North American market frequently cross the US-Canadian and US-Mexico boundaries. Supply chain security efforts to enhance the security of the supply chain by such activities as credentialing of participants in the supply chain, screening and validating of the contents of cargo being shipped, and advance notification of the contents to the destination country.\nAn AIAG initiative in customs and supply chain security seeks to address the issue of supply chain security by forming a centralized Web-based to identify the movement of finished goods, parts and materials through the",
"and the media such as the New York Times, Wall Street Journal and Miami Herald in the U.S. and Clarín in Argentina.\nThe company was recognized by the Association of Independent Information Professionals for providing access to trade data with a pay-as-you-go pricing option useful to independent information professionals.\nIts flagship product is data on the waterborne trade between the U.S. and its 240 distinct geographic markets. Sourced from maritime bills of lading, this data covers the details of transactions including cargo descriptions, ports of departure and arrival, and shipping lines, as well as the names of importing companies and foreign",
"deliver to their customers. The service is available via its websites and mobile applications. Customers order food by entering their postcodes on the site and browsing for food from a list of restaurants. They can create meals by browsing restaurant menus and selecting items they want to order before entering an address and proceeding to the checkout. Restaurants receive these orders and then deliver to customers. Food panda sends out an SMS to confirm orders and their estimated delivery time. Online ordering Foodpanda accepts orders via its websites and mobile applications. It connects customers with restaurants that offer food delivery",
"— a box in which crews may place unwanted food and take anything they might desire. Predictably, swap boxes tend to fill up with foods that people tend not to like, get too much of, or food few want to carry. Typical finds in swap boxes include sunflower seeds and apple cider mix, however on occasion much more valuable goods can be found, such as peanut butter, ritz crackers, et cetera. Some crews will have an unofficial organization system where one person will eat food the others don't like, cutting down on food waste.\nWith several exceptions, staffed camps accept garbage",
"stagecoach. It illustrated the demand for timely deliveries across the nation, a concept that continued to evolve with the railroads, automobiles and interstate highways and which has emerged into today's courier industry.\nThe courier industry in United States is a $59 billion industry, with 90% of the business shared by DHL, FedEx, UPS and USA Couriers. On the other hand, regional and/or local courier and delivery services were highly diversified and tended to be smaller operations; the top 50 firms accounted for just a third of the sector's revenues. USPS is mail or packages delivered by the government and are the",
"Food truck A food truck is a large motorized vehicle, such as a van or trailer, equipped to cook, prepare, serve, and/or sell food. Some, including ice cream trucks, sell frozen or prepackaged food; others have on-board kitchens and prepare food from scratch, or they heat up food that was prepared in a bricks and mortar commercial kitchen. Sandwiches, hamburgers, french fries, and other regional fast food fare is common. In recent years, associated with the pop-up restaurant phenomenon, food trucks offering gourmet cuisine and a variety of specialties and ethnic menus have become particularly popular. Food trucks may also",
"Statistics It is estimated by food industry research firm Technomics that approximately 225 million meals are eaten away from home each day in the U.S. This includes both restaurant and non-commercial eating places. The International Foodservice Distributors Association estimates that food service distributors in the U.S., as a daily average, deliver approximately 27 million cases of food and other products.\nFood service distribution companies can range in size from a one-truck operation to larger corporations. There are many independent broadline food service distribution companies that service chain and multi-unit restaurants based on master distribution agreements with national food service groups.",
"dining segment, while street food trucks continue to dominate in the US.\nTypical dishes include tacos or burritos prepared with Korean barbecue, such as kalbi or spicy chicken, and American foods such as french fries with kimchi.",
"market is growing and in the 2000s it began constructing facilities in border areas in order to facilitate export to the United States.\nMuch of the push to develop foreign markets for Pascual Boing products has come from competition inside Mexico from multinational companies. Pascual Boing has accused makers such as Coca-Cola and Pepsi of monopolistic practices aimed at excluding the Mexican bottlers from retail venues such as small groceries, school cafeterias and public events. Pascual Boing used to have a fifty percent share in Mexico but this has shrunk to fifteen percent. Today, Coca-Cola and its bottlers control over 75%",
"in the low capital requirement, but also in the flexibility of hours, with minimal constraints to locale. Street foods predominantly reflect local culture and flavor. Food trucks appeal to consumers in that they are often an inexpensive means of attaining quick meals. Location and word of mouth promotion has been credited for their widening success. Also, in Asia food trucks are finally starting to hit the streets. Australia Food trucks are available across Australia, and are covered as a popular trend in the media. An Australian national online directory, Where The Truck, lists some 170 food trucks. Belgium Chip trucks"
] |
How do non-English speaking nations deal with a vast majority of information only being found in English? | [
"French programmer here.\nI know for a fact that there is way more doc about most technologies in english than in french, so I (and almost every other french programmer I've ever met) learned how to **read and understand** english.\nEmphasis on \"read and understand\" because I am pretty sure my pronunciation is like torture to a native english speaker.",
"There are lots of guides and stuff in our language. English speaking people can't find them, because they don't know what to look for, but if you know what you want to find, you will find it.",
"As a Spaniard I am native from a Spanish speaking country, and not precisely the one with the bigger percentage of people understanding english, so I think I can answer properly.\n\nFor starters, most people understand a little amount of English words because of their wide usage, just as it happens in the other direction (most english speaking people know some Spanish words). Usually it's totally worthless, since those are unconnected words and sometimes they don't even mean the same as in English (or, more commonly, only one of the possible meanings are used, sometimes not even the most common).\n\nAn example is rock, a word mainly meaning a stone, but for most Spanish only a kind of music (and unlike metal, most people don't know the main meaning of the word \"rock\", even being close to the Spanish 'roca').\n\nThen, it depends on your area of expertise. People that work online, in tech stuff or whose work involve marketing may know English easily than accountants or plumbers. Even for most positions English is required, meaning some areas are filled with people that at least has a basic understanding of English.\n\nEnglish is a mandatory subject in school since a couple or three decades ago, so that's another factor towards fixing this matter (previously it was French). Also we have translators, loads of them, we even have entire economic sectors where translating from English is pivotal, like the book editing and movie dubbing markets.\n\nI would say that the existence of a lingua franca different from your mother tongue is more an opportunity than an issue, if you handle the cultural assimilation that it usually implies (with foreign traditions invading through adoption by imitation of what's on movies, for example)",
"Well, don't forget that English is a pretty popular world language, and is generally the language of international business. Many countries teach their students English as a second language, especially in Europe. If you are American, you can travel to any of European countries and most likely never need to learn Spanish, Italian, German, etc. (Sometimes, understandably, to their chagrin/annoyance) \nAdditionally, any html text can be translated. I have an old Italian friend who was an exchange student, and all of his italian facebook posts are translated to english automatically. Sometimes things get lost in translation, but technical language gets by just fine. \nFinally, to address your example: any electronics/tech I've ever purchased usually either comes with a multi-language troubleshooting guide, or a link to follow online that displays instructions in most languages.",
"They learn English, or find a translator. \n\nHence why we Americans are a bunch of lazy jerks about learning other languages. If everyone is learning ours, what incentive do we have learn another?"
] | [
"Geographical distribution of English speakers The article provides details and data regarding the geographical distribution of all English speakers, regardless of the legislative status of the countries where it's spoken. The English language is one of the most widely spoken languages of the world, and it's widely used in the international communication as lingua franca. Many international organizations use English as their official language.",
"Languages used on the Internet Slightly over half of the homepages of the most visited websites on the World Wide Web are in English, with varying amounts of information available in many other languages. Other top languages, according to W3Techs, are Russian, German, Spanish, French, Japanese, Portuguese, Italian, and Persian. \nOf the more than 7,000 existing languages, only a few hundred are recognized as being in use for Web pages on the World Wide Web. Languages used There is debate over the most-used languages on the Internet. A 2009 UNESCO report monitoring the languages of websites for 12 years, from",
"to access public information. One noteworthy exception among the world's democracies is Canada where only citizens and residents are entitled to submit access to information requests. Despite this, a major practical obstacle to the universal exercise of the right to access information is due to the obligation to submit the requests in the official language of the country which may hamper the exercise of the right to know for people that does not have a command of a country's official language.\nIn the EU, according to the treaties the right to access documents and the right to appeal to the European",
"of Spanish to those information technology contents developed in other languages, and so people who speak other languages can have access to contents that are only available in Spanish. This service permits translation of texts and text files, as well as web pages, from Spanish to Catalan, French, Galician, English or Portuguese and vice versa. The pairs of language percentages used are as follows: English–Spanish, 23.47% of the total; Spanish–Catalan, 21.12%; Spanish–English, 13.64%; Portuguese–Spanish, 12.63%; Spanish–Portuguese, 10.39%; Catalan–Spanish, 6.48%; Spanish–French, 6.24%, and French–Spanish, 6.03%. Publications Since 1998, the Instituto Cervantes has published the annual El español en el mundo",
"to publish organizational documents in their personal, primary languages, when English is a secondary language.",
"very uncertain, with most scholars concluding that the United States still has more speakers of English than India.\nModern English, sometimes described as the first global lingua franca, is also regarded as the first world language. English is the world's most widely used language in newspaper publishing, book publishing, international telecommunications, scientific publishing, international trade, mass entertainment, and diplomacy. English is, by international treaty, the basis for the required controlled natural languages Seaspeak and Airspeak, used as international languages of seafaring and aviation. English used to have parity with French and German in scientific research, but now it dominates that field.",
"an international and intra-national language. In 1988, at a Teachers of English to Speakers of Other Languages (TESOL) conference in Honolulu, Hawaii, the International Committee of the Study of World Englishes (ICWE) was formed. In 1992, the ICWE formally launched the International Association for World Englishes (IAWE) at a conference of \"World Englishes Today\", at the University of Illinois, USA. There is now an academic journal devoted to the study of this topic, titled World Englishes.\nCurrently, there are approximately 75 territories where English is spoken either as a first language (L1) or as an unofficial or institutionalized second language (L2)",
"Language Report The Language Report (or, strictly, the language report) was an account of the state and use of the English language published by the Oxford University Press (OUP) in 2003. It was compiled by lexicographer Susie Dent, best known for her regular appearances on the television word game Countdown, and was an annual publication until 2007. The 2003 report The first Language Report, described by the OUP as \"a frontline account of what we’re saying and how we’re saying it\", reviewed, among other things, changes in the use of English since 1903, how new words come about, the language",
"Language Board, on the basis of an analysis of the Office for National Statistics Longitudinal Study, estimated there were 110,000 Welsh-speaking people in England, and another thousand in Scotland and Northern Ireland. In the 2011 Census, 8,248 people in England gave Welsh in answer to the question \"What is your main language?\" The Office for National Statistics subsequently published a census glossary of terms to support the release of results from the census, including their definition of \"main language\" as referring to \"first or preferred language\" (though that wording was not in the census questionnaire itself). The wards in England",
"countries around the world, and English is the most commonly used language in the sciences with Science Citation Index reporting as early as 1997 that 95% of its articles were written in English, even though only half of them came from authors in English-speaking countries.\nIn publishing, English literature predominates considerably with 28 percent of all books published in the world [leclerc 2011] and 30 percent of web content in 2011 (down from 50 percent in 2000).\nThis increasing use of the English language globally has had a large impact on many other languages, leading to language shift and even language death,",
"language is spoken in any quarter of the globe ...\"\nThomas Carlyle wrote two essays in Fraser's Magazine in 1832 in review of Croker's edition; his essay on 'Biography' in issue 27 was followed by 'Boswell's Life of Johnson' in issue 28. Carlyle wanted more than facts from histories and biographies \"The thing I want to see is not Redbook Lists and Court Calendars, and Parliamentary Registers, but the LIFE OF MAN in England: what men did, thought, suffered, enjoyed; the form, especially the spirit, of their terrestrial existence, its outward environment, its inward principle; how and what it was; whence it",
"Language Spoken at Home Data published The published data varies in the amount of detail provided each year. \nIn 2000 and 1990, language spoken was a part of Summary File 3. For the 2000 census, data was published for 30 languages, chosen for their nationwide distribution, and 10 language groupings (see list below). Data from households which report languages other than the 30 are reported under the language groupings. Thus, languages which are widespread in certain areas of the country but not nationally get put together, even in block level data. Lithuanian, and Welsh are simply \"Other Indo-European languages,\" Yoruba",
"grammar rules and a dictionary to a complete stranger, and they'll be able to look up the words and write a coherent reply back\". Many people did indeed do this in order to recruit more Esperanto speakers.\nAt the time, in the early 1900s, there was no major world language that could be used \"anywhere\" and it was difficult to get accurate information about foreign countries. On top of that, things like stamp collecting were popular hobbies for children. In the modern day, most Esperanto speakers talk to each other through the internet — which is just the modern version of",
"generations. It may be safely said, that the literature now extant in that language is of far greater value than all the literature which three hundred years ago was extant in all the languages of the world together.\nThe question now before us is simply whether, when it is in our power to teach this language, we shall teach languages, by which, by universal confession, there are not books on any subject which deserve to be compared to our own; whether, when we can teach European science, we shall teach systems which, by universal confession, whenever they differ from those of",
"of a language's native speakers\", and \"the standards of good usage change, however slowly.\"\nDictionaries are not always accurate guides to \"good usage\". \"Despite occasional usage notes, lexicographers generally disclaim any intent to guide writers and editors on the thorny points of English usage.\" History According to Jeremy Butterfield, \"The first person we know of who made usage refer to language was Daniel Defoe, at the end of the seventeenth century\". Defoe proposed the creation of a language society of 36 individuals who would set prescriptive language rules for the approximately six million English speakers.",
"Evan Davis.\nIn 2019 McCulloch's first book, Because Internet: Understanding the New Rules of Language, was published by Riverhead Books. The book explores the history of online communication in English as well as the linguistic trends which have emerged within it over the years, as well as the effect such communication might have on the English language as a whole. The book received critical acclaim from The New York Times.",
"Spanish, demonstrating the limited accessibility of certain technical documents to speakers of languages other than English, perhaps partly as a result of English as the lingua franca. Finally, when discussing English as a lingua franca it is noteworthy to mention what some researchers call \"untranslatable\" words and what that means for technical translation. Such words or phrases are composed of concepts that are not easily translated from one language to another. A word is considered \"untranslatable\" when there is either no direct corresponding word in the target language, requiring the word to be described or when important cultural connotations from",
"Living Language History Living Language was originally developed in 1946 by foreign language education experts to teach overseas-bound service personnel and diplomats. In recent years, the imprint has expanded its publishing program to include audio-only CD courses, online-based courses and comprehensive language learning kits for adults and children. Languages Offered Living Language offers 28 languages, including 27 oral and one sign language, that are: Arabic, Chinese, Croatian, Czech, Dothraki, Dutch, English, Persian, French, German, Greek, Hebrew, Hindi, Hungarian, Irish, Italian, Japanese, Korean, Polish, Portuguese, Russian, Spanish, Swahili, Swedish, Tagalog, Thai, Turkish, Vietnamese and American Sign Language.",
"How to Really Talk About Books You Haven't Read, a guide to books and literary erudition, was released in October 2008. The paperback edition was given the name Who's Afraid of Jane Austen?: How to Really Talk About Books You Haven't Read. The Language Wars The Language Wars: A History of Proper English was published in February 2011. It is \"a detailed narrative of the attempts ... to make rules about how we speak and write\" and \"a historical guide to the sometimes splenetic battles that have been fought over English down the centuries\". Craig Brown called it a book",
"Matters), International English in its Sociolinguistic Contexts: Towards a Socially Sensitive Pedagogy (with Wendy Bokhorst-Heng, 2008, Frances Taylor) and Teaching English as an International Language: Rethinking Goals and Approaches (2002, Oxford University Press, Winner of the Ben Warren International Book Award for outstanding teacher education materials). Her articles appeared in such journals as the Annual Review of Applied Linguistics, Harvard Educational Review, English Language Teaching, International Journal of Applied Linguistics, Journal of Second Language Writing, System, TESOL Quarterly and World Englishes. She has published many chapters in edited books and given plenary talks at various international conferences, including the Asian",
"a possibility to read it in their own languages and to have their own opinion. And only in Russia it can do only those who not only know English language, but also has the ability to get the «Testimony»: this book is in the \"Lenin Library\", probably exists in other major libraries. At the same time the number of interested in the question is incomparably greater than those who have access to these centers of culture...\n\n \nWe've seen our task in the opportunity to make up their minds about Volkov's book to everyone who speak the same language with us,",
"most popular languages for translation: from Russian into English and from English into Russian, from Spanish into English and from English into Spanish, from French into English and from English into French, from Arabic into English and from English into Arabic, from German into English and from English into German, from Italian into English and from English into Italian, from Chinese into English and from English into Chinese, from Japanese into English and from English into Japanese, from Korean into English and from English into Korean, from Greek into English and from English into Greek.\n ",
"A History of the English-Speaking Peoples A History of the English-Speaking Peoples is a four-volume history of Britain and its former colonies and possessions throughout the world, written by Winston Churchill, covering the period from Caesar's invasions of Britain (55 BC) to the beginning of the First World War (1914). It was started in 1937 and finally published 1956–58, delayed several times by war and his work on other texts. The volumes have been abridged into a single-volume, concise edition. Related works The BBC produced a series of twenty-six fifty-minute plays loosely based around Churchill's work and entitled Churchill's People",
"and Cymdeithas yr Iaith Gymraeg (Welsh Language Society). The language is used in the bilingual Welsh Assembly and entered on its records, with English translation. The high costs of translation from English to Welsh have proved controversial. Technically it is not supposed to be used in the British Parliament as it is referred to as a \"foreign language\" and is effectively banned as disruptive behaviour, but several Speakers (most notably George Thomas, 1st Viscount Tonypandy, himself born in Wales, near Tonypandy) spoke some Welsh within longer English-language speeches.\nWelsh as a first language is largely concentrated in the less urban north",
"and 5000 teachers. English is the most popular language being studied, followed by Spanish, French, Chinese, and Japanese. The site offers more than 100 languages, including endangered ones such as South African Xhosa.",
"the Party and society, except the Proles — the working-class of Oceania — to exclusively communicate in Newspeak, by A.D. 2050; during that 66-year transition, the usage of Oldspeak (Standard English) shall remain interspersed among Newspeak conversations.\nNewspeak is also a constructed language, of planned phonology, grammar, and vocabulary, like Basic English, which Orwell promoted (1942–44) during the Second World War (1939–45), and later rejected in the essay \"Politics and the English Language\" (1946), wherein he criticizes the bad usage of English in his day: dying metaphors, pretentious diction, and high-flown rhetoric, which produce the meaningless words of doublespeak, the product",
"language of India. English is also widely used in media and literature, and the number of English language books published annually in India is the third largest in the world after the US and UK. However English is rarely spoken as a first language, numbering only around a couple hundred-thousand people, and less than 5% of the population speak fluent English in India. David Crystal claimed in 2004 that, combining native and non-native speakers, India now has more people who speak or understand English than any other country in the world, but the number of English speakers in India is",
"by giving them access to the government in their native languages. In countries that do not formally designate an official language, a de facto national language usually evolves. English is the most common official language, with recognized status in 51 countries. Arabic, French, and Spanish are also widely recognized.\nAn official language that is also an indigenous language is called endoglossic, one that is not indigenous is exoglossic. An instance is Nigeria which has three endoglossic official languages. By this the country aims to protect the indigenous languages although at the same time recognising the English language as its lingua franca.",
"The Least You Should Know About English The Least You Should Know about English (ISBN 978-1285443539) is a non-fiction book by Paige Wilson and Teresa Ferster Glazier that focuses on students improving their basic spelling, grammar, and writing. It has been used in classrooms for over 35 years and, as of 2019, is in its twelfth edition.",
"One of his major areas of interest is the subject of synchronicity. Encyclopedia of Conversational English Jargocki founded the website in November 2013. From the welcome page: \"We hope that the Encyclopedia of Conversational English will become a standard reference and/or text for students and teachers of English as a Second Language, both in the United States and around the world. In a sense, the Encyclopedia may be viewed as a time capsule describing the language and culture of the United States and Great Britain as they have existed in the last 15-20 years.\"\nCurrently, the project comprises two volumes, Communication"
] |
How do talk shows get guests? | [
"Generally neither side exchanges money. Its a tit for tat situation, the celeb gets to promote something and the show gets a guest. For the major shows usually the publicist for the movie or the celeb will contact the show to book an appearance. For smaller shows or really in demand stars the show will contact the representatives of the celeb and try to book them.",
"Talk shows have someone who books guests. They have connections and contacts and they either call them or they get called. Like others said before, the people who promote movies call the booking person for the talk show. A comic's manager will call the show or vice-versa. Ellen has people reach out to the latest yodeler to book them, etc.",
"Guests are paid, but not much. If they are a member of SAG/AFTRA, they must be paid the minimum agreed by union contract which is somewhere around $750. They will also have hotel, transportation and food provided, plus a gift basket."
] | [
"talk shows involve giving prizes to audience members. The use of warm-ups dates back before television to radio shows.",
"Talk show A talk show or chat show is a television programming or radio programming genre in which one person (or group of people) discusses various topics put forth by a talk show host.\nUsually, guests consist of a group of people who are learned (such as current affairs experts or pundits) or who have experience with whatever issue is being discussed on the show for that episode. Other times, a single guest such as a celebrity or expert discusses their work or area of expertise with a host or co-hosts. A call-in show takes live phone calls from callers",
"celebrities each program, although the program is generally hosted by the same compere. Talk shows evolved in tandem with the Japanese variety show and it is very common for talk shows to borrow variety elements, typically by having celebrity guests attempt some kind of amusingly incongruous activity. Often, one of the guests will be a gaijin tarento (foreign talent) in order to provide comedy or to comment on matters related to Western culture. Comedic material is commonly written and rehearsed before tapings with or without a live audience.\nKorean and Taiwanese talk shows have used the panel format similar to Japanese",
"voice chat ability of guests in the show. It allows guests to listen to the show in streaming audio if they have not phoned in (the stream is automatically muted when the software senses a voice connection from the same user), or to set a flag indicating they wish to be unmuted (that is, allowed to speak \"on the air\") if they have phoned in. It allows both host and guests to chat via text-message to each other, and to see who is currently and no longer connected to the show. History TalkShoe was launched in May 2006 by Dave",
"five hosts interview one or two featured celebrity guests; most of these interviews are conducted at the set's roundtable. Musical performances are also occasionally included.\nThe show also regularly has a cooking segment two to four times each week, with two of the panelists - rotating between any combination of Chen, Underwood, Gilbert, or Osbourne - assisting in the preparation of the featured recipes with the guest chef. Product giveaways are also done once per week, as part of a segment showcasing fashion/beauty products and electronics that are given away to studio audience members for attending the show, and are often",
"To Talk For The Sake Of Talking To Talk For The Sake Of Talking (Hablar por hablar in Spanish, Parlar per parlar in Catalan) is a nighttime radio talk show broadcast by Cadena SER in Spain and Radio Caracol in Colombia.\nThe show was created by Gemma Nierga for Radio Barcelona in 1989. In its 2007 spring season, it had an audience average of 604,000 listeners.\nThe program receives telephone calls from listeners who express their problems or opinions and receive advice and feedback.",
"Talk Soup Guest hosts and guest stars The show has had number of guest hosts sitting in the soup chair over the years including Roseanne Barr, Brad Garrett, Juliette Lewis, Patrick Warburton, Sarah Silverman, Suzanne Somers, Jon Hamm, Julia Sweeney, Kevin Nealon, Robert McRay, David Brenner, Jennifer Love Hewitt, Jerry Springer, Adam Carolla, Dr. Drew Pinsky, Jimmy Kimmel, Tom Arnold, Catherine O'Hara, David Spade, Donna D'Errico, Richard Lewis, George Hamilton, Wayne Brady, Rolonda Watts, French Stewart, Sally Jesse Raphael, and Kato Kaelin.\nCelebrities who appeared in sketches and walk-on appearances include Eric Idle, David Duchovny, Danny Aiello, Montel Williams, Adam West,",
"Be My Guest (talk show) Format The Chinese name of the show means that the host and the guest chat, while eating at a restaurant. The venue of the interview is different every time based on the choice of the interviewer. The food are usually featured as a quick interruption between the conversations. Many of the episodes feature fusion cuisine.",
"listening at home, in their cars, in their gardens, etc. Sometimes, guests are already seated but are often introduced and enter from backstage. There have been many notable talk show hosts; in many cases, the shows have made their hosts famous. History Talk shows have been broadcast on television since the earliest days of the medium. Joe Franklin, an American radio and television personality, hosted the first television talk show. The show began in 1951 on WJZ-TV (later WABC-TV) and moved to WOR-TV (later WWOR-TV) from 1962 to 1993.\nNBC's The Tonight Show is the world's longest-running talk show; having debuted",
"talk style shows. Viewers could also fax or go online with partner CompuServe to post their comments on the show's topic in a custom chatroom. Comments from faxes and CompuServe were often incorporated into the show. What made the show interactive is that the host would allow panelist and audience members to respond to the fax and online comments. Also, the show partnered with MCI and American University in Washington, D.C. to have students and professors provide comments and questions via desktop video technology. During the first year, Talkback Live went on a 50-city tour. The show became",
"While they enjoy the coffee, the show presents a number of pre-recorded clips of what each celebrity thinks of his/her colleague. In this, they answer questions such as the date they first met each other, their views on each other's talents, etc.\nTo-date, the show has invited celebrities from a variety of different fields ranging from music, TV, cinema to sports and politics.",
"Talk It Out Talk It Out With Jodi Leib is an entertainment program in the nature of on-going special variety, news, music, or comedy featuring celebrity interviews, documentary biographies, live performance, music videos, movies, audience interactivity, and website social networking broadcast over television, satellite, internet, and audio/video media. Inception Talk It Out began after the Columbine high school massacre as a way to create dialogue and community through music and television.\nDedicated to exposing the positive and inspiring leadership qualities at the core of today's popular artists, Jodi Leib began hosting Talk It Out on local cable in Los Angeles and",
"entertaining ninety minutes, sharing their opinions and experiences with each other. The program is primarily divided into three segments. In the first segment, named \"Like What,\" ten questions related to a number of topics are directed at each celebrity, and the answers given by each are often compared with one another. In the second, \"Hard Talk,\" the hosts pose a number of tough questions to the celebrities, mostly related to their own experience in the field, and give them the opportunity to respond to criticisms. In the final segment, \"Match It,\" coffee together with refreshments are served at the celebrities.",
"host to reassure them that she will try to find a home in another neighborhood that meets the buyers' desired criteria. She usually asks the buyers to list some of the features they want in their new home, in order to give her a better idea of what to look for.\nIn a voice-over, the host briefly describes the neighborhood of the property she is about to show, then tells the viewer the square footage and asking price of the home. She meets her clients at the property for sale, then sends them in to tour the house. After they have",
"night's guests appear on stage simultaneously. Guests do not walk on stage from the wings but emerge from the back of the studio and walk through the audience rows. As is more typical in British talk shows, the host sits to the left of the guests, a reversal of the traditional American layout. Corden also does not sit behind a desk, unlike other late night hosts, but in a swivel chair. Episodes Tom Hanks and Mila Kunis were Corden's first guests on March 23, 2015, for the debut episode featuring Corden and Hanks acting and singing their way through a",
"The Dinner Party (talk show) Concept The concept for the show originated in a dinner party that Alfano held at her home for several friends from the creative community in Chicago. That dinner resulted in lively conversations, and The Dinner Party was created as an attempt to replicate that experience with a public audience. Alfano specifically chooses guests from differing creative fields to discuss the commonalities between their work. The show's tagline is \"The best conversations happen over dinner.\" Alfano is the creator, executive producer, and host of the show.\nThe audience is encouraged to participate in these conversations during the",
"Talk Shows USA Talk Shows USA is a talk radio syndicator owned by Skip Joeckel. Talk Shows USA primarily distributes independently produced talk radio programs to individual stations and other radio networks (the company discourages people from calling it a \"network\" in and of itself).",
"Hear Me Out (TV series) Background Hear Me Out is an infotainment TV talk show. Six notable guests from various sectors are invited to the programme to discuss about their work, and hear their insights into our life and times.",
"Frank Skinner's Opinionated Format The show is a studio based light hearted talk show focussing on events of the past week, with a large amount of audience participation while also featuring supporting film clips. Skinner first opens the show on his own, and in the opening piece outlines what the general themes of the night's show will be. The two celebrity guests then enter the studio, and it proceeds to discuss those topics in more detail, with Skinner guiding the discussion and inviting questions and comment from the audience, some of whom are pre-selected to talk about a specific topic.",
"talk about their encounters with celebrities. Callers are encouraged to talk about who they met, how and where they met them, and what they were like when they met; were they nice to them, or did they give them \"the brush\"... hence the name of the segment. This segment, however, was not always on Tuesday night due to other topics. Spoony's Bulging Sack In this segment, The Spoonman reads and replies to off-topic emails and emails regarding previous topics that are received throughout the week. Get It off Your Chest Get It off Your Chest was an occasional segment",
"show. Both the live audience and those watching the internet broadcast of show are allowed to use Twitter to ask questions of the guests. Audience members who have their questions \"picked\" win prizes.\nGuests in attendance at the live show are also share in the culinary experience; the audience is served the same appetizer and entrée as Alfano and her guests, in addition to wine samplings and Vosges chocolate.\nPrevious guests have included international violinist Rachel Barton Pine, rapper Dessa, Sound Opinions’ Jim DeRogatis, NPR’s Peter Sagal, Saturday Night Live alums Tim Kazurinsky and Nora Dunn, Project Runway’s Peach Carr, James Beard",
"their guests move around to chat, often congregating around the bar. The second part of the meeting features a shorter talk by an Owl which, because of its purposeful inconsequence, is nicknamed “The Waste Paper Basket”. A second musical item closes the evening.\nBy convention, speakers are requested to avoid such references to religion, sexual matters and party politics that may give offence; English is the only language used for the addresses. If possible, the delivery should be what one of our great former presidents referred to as “A light touch with something behind it”. The speaker is not subjected to",
"Open Your Heart (talk show) Concept A person asks the production to invite another person on the set to \"make an important statement\".\nThe guest has no idea of the reason for his invitation, nor of the person who wishes to speak to him, before entering the set.\nAt that moment, the two persons (the inviter and the guest) are separated by a \"curtain\" and can only see themselves through two television screens. This allows the guest to know the person who wanted to meet him.\nA discussion then starts between the two persons. The inviter exposes what he has to say, and",
"Nanben Da (talk show) Overview The show features three or four guests and two anchors, the core idea is to get them to share their nostalgic memories besides funny and interesting moments. The guests are actors, musicians, newsreaders, TV stars, stunt masters, comedians, dancers and more. The show has five segments.",
"We the People (Indian TV series) Show format We the People is a debate show on current affairs. A six- to eight-person panel is invited for each discussion. A panel typically consists of politicians, social scientists, academicians, social workers and celebrities, depending on the topic. The live audience often poses questions directly to panelists and are occasionally asked for a snap poll to weigh in on an argument.\nThe show encompasses a wide variety of topics and is not limited to political issues. Awards and accolades We The People won the 14th Asian Television Award for Best Talk Show for the",
"The Talk (talk show) Format The Talk has a format similar in style to ABC's The View. The opening segment of the broadcast is known as \"Everybody Talks\" and usually runs a combined 12 to 25 minutes over multiple segments, depending on the number of stories featured and the number of guests. It is followed by topical discussion segments, involves the five-female host panel discussing current news items, typically focusing on tabloid headlines, offbeat stories, and celebrity news. The program also actively incorporates social media to allow viewers to provide their opinions on the stories discussed through Twitter",
"general discussion between the hosts and guests, the show also features pre-recorded filmed inserts, and some role-play of the guests' suggested solution with James Acaster in the studio. Production Hypothetical was devised by Widdicombe with Matthew Crosby and Tom Craine, who also act as writers. The initial idea of the show was pitched via a WhatsApp conversation, and subsequently developed by London-based Hat Trick Productions and commissioned as a UKTV Original for Dave by Richard Watsham, UKTV’s director of commissioning and Steve North, genre general manager for entertainment and comedy, in July 2018. Joe McVey was announced as executive producer",
"Zapeando Format Zapeando is a live chat where its host and its collaborators talk about the most highlighted moments of the television, as well as the spaces more and less loved by viewers, the best videos and video edits, the mistakes of other hosts, remembering old people who had success on television or the most talked-about commercials. In addition, the format supports introducing guests to some programmes that help to chat about some TV moments (called momentazos, big moments) or simply talk about their most recent works. History In late August 2013, it was announced that laSexta and Globomedia were",
"Tout le monde en parle (French talk show) Format During its first season (1998–1999), the show took the form of societal debates; it was in September 1999 that it was re-formatted into a talk-show.\nThe show features guests who are making news at the moment, including actors, writers, singers, politicians and athletes. Guests discuss their life and engage in thematic interviews. The show gradually acquired a provocative reputation, notably since the host does not hesitate to ask political guests questions about their private and sexual lives.\nWith Thierry Ardisson as the main host, he was first accompanied by Laurent Ruquier and Linda",
"Kevin Pollak's Chat Show Format The show typically opens with Pollak at the table speaking directly to the viewers, which can consist of a simple introduction, an anecdote, a joke, this portion also includes sidebars with head writer, Jaime Fox, and side kick, Samm Levine. The majority of the show is taken up with long-form interview segments, typically with actors, writers or comics. Initial episodes would feature 2 hour-long interviews, but subsequent shows typically feature one guest per episode, averaging two hours in length. There are also a number of \"games\" Pollak plays with his guests, created by Jaime. "
] |
why do lights twinkle at a distance? | [
"The air layers, although clear, are of different densities which causes the sintilation effect. Humidity can increase the flickering. (And don't rule out palm fronds moving with the breeze that may lie between the light source and your view) ;)"
] | [
"However, lights are often reported in areas without geological conditions favourable to these phenomena. Refraction Neuroscientist Jack Pettigrew has suggested that the Min Min lights are a form of Fata Morgana mirage, which causes remote lights or objects to appear above the horizon. This can result in an object which is normally below the horizon being visible. Some also say it is because of the heat in the deserty area along with the refraction of light. In popular culture The Min Min lights appear in the first episode of the second season of the Australian web television series Wolf Creek.\nThe",
"Light characteristic A light characteristic is a graphic and text description of a navigational light sequence or colour displayed on a nautical chart or in a Light List with the chart symbol for a lighthouse, lightvessel, buoy or sea mark with a light on it. The graphic indicates how the real light may be identified when looking at its actual light output type or sequence. Different lights use different colours, frequencies and light patterns, so mariners can identify which light they are seeing. Fixed light A fixed light, abbreviated \"F\", is a continuous and steady light. Flashing light A flashing",
"from upward-directed or incompletely shielded sources, or after reflection from the ground or other surfaces, is partially scattered back toward the ground, producing a diffuse glow that can be seen from large distances. Skyglow from artificial lights is most often noticed as a glowing dome of light over cities and towns, yet is pervasive throughout the developed world. Causes Light used for all purposes in the outdoor environment contributes to skyglow, by sometimes avoidable aspects such as poor shielding of fixtures, and through at least partially unavoidable aspects such as unshielded signage and reflection from intentionally illuminated surfaces. Some of",
"or closed might be seen as a sign with \"flashing lights\". However, the lights are not actually flashing. The lights have been programmed to blink rapidly at their own individual pace. Perceived as a whole, the sign flashes. Perceived individually, the lights turn off and on at designated times. Another example of this would be a brick house: As a whole, it is viewed as a standing structure. However, it is actually composed of many smaller parts, which are individual bricks. People tend to see things from a holistic point of view rather than breaking it down into sub units.\nIn",
"refraction from car headlights on a nearby highway, U.S. Route 74. Reprinting a 1950 long-exposure photograph of the light, the newspaper stated that a bend on the highway was the cause of the phenomenon, noting both that amber and red lights had been seen close to the main light when viewed through a telescope (corresponding to truck turn and brake signals) and that the light had been rarely seen since highway widening in the late 1960s eliminated the bend. Refuting the stories of some locals, who claimed that the light had still appeared while the highway was closed for a",
"Light beam Visible light beams From the side, a beam of light is only visible if part of the light is scattered by objects: tiny particles like dust, water droplets (mist, fog, rain), hail, snow, or smoke, or larger objects such as birds. If there are many objects in the light path, then it appears as a continuous beam, but if there are only a few objects, then the light is visible as a few individual bright points. In any case, this scattering of light from a beam, and the resultant visibility of a light beam from the side, is",
"a brighter light during short time intervals. These instants of bright light are arranged to create a light characteristic or pattern specific to a lighthouse. For example, the Scheveningen Lighthouse flashes are alternately 2.5 and 7.5 seconds. Some lights have sectors of a particular color (usually formed by colored panes in the lantern) to distinguish safe water areas from dangerous shoals. Modern lighthouses often have unique reflectors or Racon transponders so the radar signature of the light is also unique. Components While lighthouse buildings differ depending on the location and purpose, they tend to have common components.\nA light station comprises the",
"in fluctuations not only with light output but color temperature as well, which may pose problems for photography and people who are sensitive to the flicker. Even among persons not sensitive to light flicker, a stroboscopic effect can be noticed, where something spinning at just the right speed may appear stationary if illuminated solely by a single fluorescent lamp. This effect is eliminated by paired lamps operating on a lead-lag ballast. Unlike a true strobe lamp, the light level drops in appreciable time and so substantial \"blurring\" of the moving part would be evident.\nIn some circumstances, fluorescent lamps operated at",
"Twinkle bulb Incandescent The original twinkle bulbs were C7½ and some C9¼ incandescent light bulbs with a bimetallic strip. Once the bulb warms up, the strip pulls slightly away from the contact, opening and interrupting the parallel circuit through the bulb and turning it off. The bulb then cools, allowing the strip to bend back and make contact again. This repeats at semi-random intervals ranging from several to less than half a second, and they may appear to speed up and slow down in a \"cycle\". Different bulbs may behave differently, even if purchased in the",
"of lights, so that the object appears to be in motion. This is used for things such as snowflakes falling, Santa Claus waving, a peace dove flapping its wings, or train wheels rolling.",
"the light encounters the subject from many angles in the same way that it does with a conventional flash with soft box. This has the effect of further softening any shadows.\nRing flashes are also popular in portrait and fashion photography because they soften the shadows created by other, off-axis lights, and create interesting circular highlights in a model's eyes. Ring Lights are also often used in the beauty and cosmetic industry, mostly by make-up artists. This is due to the lightweight and compact features of a ring light that make it suitable for freelance beauty and make-up artists. \nRing flashes",
"get a glimpse of the mysterious light. Appearance Aficionados say the best chances for spotting the light occur after dark when parked on Oklahoma East 50 Road, four miles south of the three-state junction of Kansas, Missouri and Oklahoma in Ottawa County, Oklahoma and looking to the west. One must sit very silently. The light has been seen in backyards of the area and has been spotted both near to and far away from sightseers. Its color is also not consistent: some eyewitnesses report a greenish glow while others describe it as orange, red, yellow, or even blue. It is",
"Light pillar Formation Since they are caused by the interaction of light with ice crystals, light pillars belong to the family of halos. The crystals responsible for light pillars usually consist of flat, hexagonal plates, which tend to orient themselves more or less horizontally as they fall through the air. Each flake acts as a tiny mirror which reflects light sources which are directly above or below it, and the presence of flakes at a spread of altitudes causes the reflection to be elongated vertically into a column. The larger and more numerous the crystals, the more pronounced this effect",
"Sunbeam A sunbeam, in meteorological optics, is a beam of sunlight that appears to radiate from the Sun's position. Shining through openings in clouds or between other objects such as mountains and buildings, these beams of particle-scattered sunlight are separated by darker shadowed volumes. Despite converging toward (or radiating from) the light source, the beams are essentially parallel shafts of directly sunlit particles separated by shadowed ones. Their apparent convergence in the sky is a visual illusion from linear perspective. This illusion also causes the apparent convergence of the otherwise parallel lines of a long straight road or hallway at",
"the extent that it once was, as newer fixtures and PAR lamps have created easier ways to produce the effect. Followspot The followspot (also called a spotlight, trackspot, lime (uk), or dome) is a lighting instrument that is moved during a performance by an operator or by DMX control to provide emphasis or extra illumination and usually to follow a specific performer moving around the stage. Follow spots are commonly used in musical theater and opera to highlight the stars of a performance, but may be used in dramas as well. They are also used in sports venues, as well",
"if a beam of light is split and sent in two opposite directions around a closed path on a revolving platform with mirrors on its perimeter, and then the beams are recombined, they will exhibit interference effects. From this result Sagnac concluded that light propagates at a speed independent of the speed of the source. The motion of the earth through space had no apparent effect on the speed of the light beam, no matter how the platform was turned. The effect had been observed earlier (by Harress in 1911), but Sagnac was the first to correctly identify the cause.\nThis",
"lenses, and louvers, visors and back panels are also useful in areas where sunlight would diminish the contrast and visibility of a signal face.\nTypical applications for these signals were skewed intersections, specific multi-lane control, left-turn pocket signals or other areas where complex traffic situations existed. Conventional lighting systems Conventional traffic signal lighting, still common in some areas, utilizes a standard light bulb. Typically, a 67, 69, or 115 watt medium-base (household lamp in the US) light bulb provides the illumination. Light then bounces off a mirrored glass or polished aluminium reflector bowl, and out through a polycarbonate plastic or glass",
"the viewpoint of the observer), this intrinsic brightness is usually close to its maximum. At a phase angle of zero degrees, all shadows disappear and the object is fully illuminated. When phase angles approach zero, there is a sudden increase in apparent brightness, and this sudden increase is referred to as the opposition surge.\nThe effect is particularly pronounced on regolith surfaces of airless bodies in the solar system. The usual major cause of the effect is that a surface's small pores and pits that would otherwise be in shadow at other incidence angles become lit up when the observer is",
"by staring at a fixed single point of light (ground light or a star) in a totally dark and featureless background. The reason why this visual illusion occurs is because of very small movements of the eyes. In conditions with poor visual cues accompanied by a single source of light, these eye movements are interpreted by the brain as movement of the object being viewed. This illusion can cause a misperception that such a light is on a collision course with the aircraft.\nPlanets or stars in the night sky can often cause the illusion to occur. ",
"High-mast lighting High-mast lighting is a tall pole with lighting attached to the top pointing towards the ground, usually but not always used to light a highway or recreational field. It is used at sites requiring lighting over a large area. The pole that the lighting is mounted on is generally at least 30 m (98 ft) tall (under this height it is referred to as conventional lighting system), while the lighting consists of a luminaire ring surrounding the pole with one or several independent lighting fixtures mounted around it. Most units have four, six or eight lights in the ring, with",
"a range in the U.S. and a transit in Britain. Ranges can be used to precisely align a vessel within a narrow channel such as a river. With landmarks of a range illuminated with a set of fixed lighthouses, nighttime navigation is possible.\nSuch paired lighthouses are called range lights in the U.S. and leading lights in the United Kingdom. The closer light is referred to as the beacon or front range; the further light is called the rear range. The rear range light is almost always taller than the front.\nWhen a vessel is on the correct course, the two",
"in the Inner Harbor area. In the 1850s the Brewerton Channel was constructed, but it headed straight out of the harbor to the mouth of the river. Therefore, the range lights never marked a specific channel. Complaints about the visibility and usefulness of the lights were common.\nIn the 1870s the construction of the main Craighill Channel made the lights obsolete, since it ran in a different direction and had its own range lights. Therefore, the North Point lights were abandoned in 1873. When the Craighill Channel Cutoff was constructed in the 1880s, it was initially planned to adapt the North",
"intermediate level of light intensity. A viewer located in the penumbra region will see the light source, but it is partially blocked by the object casting the shadow.\nIf there is more than one light source, there will be several shadows, with the overlapping parts darker, and various combinations of brightnesses or even colors. The more diffuse the lighting is, the softer and more indistinct the shadow outlines become, until they disappear. The lighting of an overcast sky produces few visible shadows.\nThe absence of diffusing atmospheric effects in the vacuum of outer space produces shadows that are stark and sharply delineated",
"intensity light that emits brief omnidirectional flashes (concentrating the light in time rather than direction). These lights are similar to obstruction lights used to warn aircraft of tall structures. Recent innovations are \"Vega Lights\", and initial experiments with light-emitting diode (LED) panels. Laser light Experimental installations of laser lights, either at high power to provide a \"line of light\" in the sky or, utilising low power, aimed towards mariners have identified problems of increased complexity in installation and maintenance, and high power requirements. Light characteristics In any of these designs an observer, rather than seeing a continuous weak light, sees",
"Light echo A light echo is a physical phenomenon caused by light reflected off surfaces distant from the source, and arriving at the observer with a delay relative to this distance. The phenomenon is analogous to an echo of sound, but due to the much faster speed of light, it mostly only manifests itself over astronomical distances.\nFor example, a light echo is produced when a sudden flash from a nova is reflected off a cosmic dust cloud, and arrives at the viewer after a longer duration than it otherwise would have taken with a direct path. Because of their geometries,",
"Doubling Point Light Description and history The Doubling Point Light is located on the lower Kennebec River, at a point where the normally south-flowing river makes a sharp turn to the east, followed by a turn back to the south. The light is set at the inside corner of the first of these turns, on the west side of Arrowsic Island, roughly opposite the mouth of Winnegance Creek. The light station includes a tower, keeper's house, shed, and oil house. The tower is an octagonal wood frame structure, finished in wooden shingles, with an iron walkway around",
"longer than when viewed and illuminated straight on. Thus, as the angle of incidence becomes steeper, the fringes will also appear to move and change. A zero degree angle of incidence is usually the most desirable angle, both for lighting and viewing. Unfortunately, this is usually impossible to achieve with the naked eye. Many interferometers use beamsplitters to obtain such an angle. Because the results are relative to the wavelength of the light, accuracy can also be increased by using light of shorter wavelengths, although the 632 nm line from a helium–neon laser is often used as the standard.\nNo surface is",
"the light at any point in the image is the sum of the light from the object (object beam) and the second beam (reference beam). If the object moves in the direction of viewing, the distance travelled by the object beam changes, its phase changes, and therefore the amplitude of the combined beams changes. When the second speckle pattern is subtracted from the first, fringes are obtained which represent contours of displacement along the viewing direction (out-of-plane displacement). These are not interference fringes, and are sometimes referred to as 'correlation' fringes since they map out areas",
"ring of light, with a dark hole in the center. This corkscrew of light, with darkness at the center, is called an optical vortex. The vortex is given a number, called the topological charge, according to how many twists the light does in one wavelength. The number is always an integer, and can be positive or negative, depending on the direction of the twist. The higher the number of the twist, the faster the light is spinning around the axis. \nThis spinning carries orbital angular momentum with the wave train, and will induce torque on an electric dipole. Orbital angular",
"beam, or \"hot spot\") of a few degrees corresponds to a spot light, useful for searching for distant objects; beam widths of 20 degrees or more are described as flood lights, suitable for lighting a wide nearby area. Typically even a flashlight beam with a small hot spot will have some light visible as \"spill\" around the spot."
] |
the numbering of army divisions / battalions / etc. | [
"The numbers are basically just ways for different units to differentiate themselves. The numbers in themselves have no meaning. \nThere have not been 100 Screaming Eagle divisions before what there is today. \nImagine a new school, with 8 different classrooms. The first class in each classroom gets to come up with a number that will forever differentiate that classroom from the others...And that's how all the cool numbers came to be."
] | [
"In modern times, most military forces have standardized their divisional structures. This does not mean that divisions are equal in size or structure from country to country, but divisions have, in most cases, come to be units of 10,000 to 20,000 soldiers with enough organic support to be capable of independent operations. Usually, the direct organization of the division consists of one to four brigades or battle groups of its primary combat arm, along with a brigade or regiment of combat support (usually artillery) and a number of direct-reporting battalions for necessary specialized support tasks, such as intelligence, logistics, reconnaissance,",
"10 x 15 kilometres. Division A division (diviis) is a large military unit led by a general that is subordinate to an infantry brigade. The division is bigger than a brigade (brigaad) but smaller than a corps (korpus). There are currently no divisions among the Estonian Ground Force infantry units.\nIt usually consists of 20,000 to 35,000 soldiers, and is further subdivided into brigades. A division is composed of two to four brigades 5000 to 8750 soldiers each, as well as a division leader (diviisiiülem) who is usually a major general (kindralmajor). His second in command is a brigadier general (brigaadikindral)",
"Army comprised the 15th–20th divisions, with the 44th–61st brigades. The third comprised the 21st–26th divisions, with the 62nd–79th brigades. The fourth and fifth were the Pals battalions of the 30th–35th divisions, with the 89th–106th brigades and the 37th–42nd divisions, with the 110th–136th brigades. The last New Army was the sixth, comprising the 36th–41st divisions, with the 107th–124th brigades. Infantry brigade composition At the start of the First World War French, Russian and German divisions consisted of two brigades each of which were made up of two regiments. Each regiment had three battalions, except the Russians which had four, which meant",
"Corps Operational formation In many armies, a corps is a battlefield formation composed of two or more divisions, and typically commanded by a lieutenant general. During World War I and World War II, due to the large scale of combat, multiple corps were combined into armies which then formed into army groups. In Western armies with numbered corps, the number is often indicated in Roman numerals (e.g., VII Corps). Australia The Australian and New Zealand Army Corps was raised in 1914, consisting of Australian and New Zealand troops, who went on to fight at Gallipoli in 1915. In early 1916,",
"numbered corps (XI through XIX) each consisted of three divisions, also assigned by state boundaries, of the newly established (but rarely funded) Organized Reserve. By 1925, in the face of steady Coolidge Administration and congressional budget cutting, the United States Army only had three active regular divisions nationwide; the remainder of its divisions, both regular and reserve components, only existed on paper.\nThe amended National Defense Act also grouped three corps areas into an \"army level\" mobilization organization whose boundaries were also identical for the two \"type\" armies located within them. For example, First, Second, and Third Corps Areas, and the",
"when classifying by size or number of troops, it also means (and more frequently so) in common and less precise military usage - any significant grouping of combat troops / i.e. army (usually corps size or larger; including Army or Army Group as per defined by most international military forces). National Revolutionary Army By the end of the Second Sino-Japanese War, the National Revolutionary Army had organized 40 army groups. These were roughly equivalent to a field army in other militaries.",
"three and four, and a variable number of divisions, also between three and four. A battle is influenced at the Field Army level by transferring divisions and reinforcements from one corps to another to increase the pressure on the enemy at a critical point. Field armies are controlled by a general or lieutenant general. Formations A particular army can be named or numbered to distinguish it from military land forces in general. For example, the First United States Army and the Army of Northern Virginia. In the British Army it is normal to spell out the ordinal number of an",
"Army (later replaced by Third Army), allotted the 15th Airborne Division, refused the designation, and the adjutant general replaced it by constituting the 108th Airborne Division, which fell within that component's list of infantry and airborne divisional numbers. Thus the final tally of divisions formed after World War II appears to have been the 19th, 21st, and 22d Armored Divisions; the 80th, 84th, 100th and 108th Airborne Divisions; and the 76th, 77th, 79th, 81st, 83rd, 85th, 87th, 89th, 90th, 91st, 94th, 95th, 96th, 97th, 98th, 102nd, 103rd, and 104th Infantry Divisions. \nA major problem in forming divisions and other",
"52nd Infantry Division (German Empire) The 52nd Infantry Division (52.Infanterie-Division) was a division of the Imperial German Army during World War I. The division was formed on March 6, 1915, from units taken from other divisions or newly raised. The division was initially mixed, with two infantry regiments from the Grand Duchy of Baden, one infantry regiment from Prussian Saxony, and Prussian and Baden support units (cavalry, artillery, engineers, and service and support units). While the infantry regiments and the divisional cavalry squadron were regular army units, the rest of the division was made up of reserve units",
"functional titles, using their nationality in \"combined\" forces (e.g., Eighth US Army, Third ROK Army, British Army of the Rhine). These were in their turn formed into army groups, these being the largest field organization handled by a single commander in modern warfare. Army groups included between 400,000 and 1,500,000 troops. Army groups received Arabic numeral designations and national designations when combined.\nThese examples illustrate a standard that holds true all over the world and throughout military history, namely that higher rank generally implies command of larger units in a nested system of ranks and commands. The specific size of a",
"Ten divisions were raised from the regular army, eleven from the first-line territorial army and twelve from the second-line territorial army. Five others were created during the war.\nThe 1939 infantry division had a theoretical establishment of 13,863 men. By 1944, the strength had risen to 18,347 men. This increase in manpower resulted mainly from the increased establishment of a division's subunits and formations; except for certain specialist supporting services, the overall structure remained substantially the same throughout the war. A 1944 division typically was made up of three infantry brigades; a Medium Machine Gun (MMG) battalion (with 36 Vickers machine",
"four Saxon divisions and two Württemberg divisions), and six divisions in the Bavarian Army.\nThese divisions were all mobilized in August 1914. They were reorganized, receiving engineer companies and other support units from their corps, and giving up most of their cavalry to form cavalry divisions. Reserve divisions were also formed, Landwehr brigades were aggregated into divisions, and other divisions were formed from replacement (Ersatz) units. As World War I progressed, additional divisions were formed, and by wars' end, 251 divisions had been formed or reformed in the German Army's structure. Regiment The regiment was the basic combat unit as well",
"armies. In the continental system, the division is the functional army unit, and its commander is the administrator of every aspect of the formation: his staff train and administer the soldiers, officers, and commanders of the division's subordinate units. Generally, divisions are garrisoned together and share the same installations: thus, in divisional administration, a battalion commanding officer is just another officer in a chain of command. Soldiers and officers are transferred in and out of divisions as required.\nSome regiments recruited from specific geographical areas, and usually incorporated the place name into the regimental name. In other cases, regiments would recruit",
"the Second World War, on the doubling of the Territorial Army, the second line duplicate of the 50th (Northumbrian) Infantry Division was numbered as the 23rd Division, after the Kitchener's army predecessor (as were the attached brigade, the 69th and 70th), not the 63rd, that division number and subsidiary brigades were not reused in the War.",
"Service\".\nThose recruited into the New Army were used to form complete battalions under existing British Army Regiments. These new battalions had titles of the form \"xxth (Service) Battalion, <regiment name>\". The first New Army divisions were first used in August 1915 at Suvla Bay during the Gallipoli Campaign and also the Battle of Loos in the autumn of 1915, and they were sorely tested in the Battle of the Somme. The initial BEF—a single army of five regular divisions in August 1914, two armies comprising 16 divisions by the end of the 1914 when the Territorials had been deployed—had grown",
"44th Infantry Division (Wehrmacht) Organization The unit was established on 1 April 1938 shortly after the annexation of Austria from elements of the Austrian army.\nThe organisation followed the typical structure of a pre-war infantry division, with 3 infantry regiments of 3 battalions each, an artillery regiment of 3 battalions, and antitank, reconnaissance, pioneer, signals battalions and division services. The usual establishment called for around 15.000 men.\nIn January 1940 the Feldersatz Battalion was detached and became the 3rd battalion, 443rd infantry regiment, 164th infantry division, part of the 7th Wave of 14 divisions. The German Army continued to expand, in February",
"8th Ersatz Division (German Empire) Formation The division was formed on mobilization with 14 brigade replacement battalions. Each brigade replacement battalion was numbered after its parent infantry brigade, and was formed with two companies taken from the replacement battalion of each of the brigade's two infantry regiments. In two cases, a brigade replacement battalion drew from three regiments. Thus, collectively, the 12 brigade replacement battalions represented troop contributions from 30 different infantry regiments. Four brigade replacement battalions were from the Kingdom of Württemberg; two were from the Grand Duchy of Hesse; four were from the Prussian Rhine Province; two were",
"2nd Division (Norway) Overview The term \"division\" in the Norwegian Army in 1940 did not mean the same as a division in British terms (a tactical formation consisting of two or more manoeuvre (infantry or armour) brigades with command and staff units and supporting troops). The only Norwegian division living up to this in 1940 was the 6th Division at Narvik fielding two brigades (6 and 7 Brigades).\nIn the 1940 Norwegian Army the term Division signified a geographical area of military responsibility. The division was, in pre-war planning, supposed to field one brigade and one or more local defence battalions",
"46th Infantry Division (United Kingdom) 1939−1940 Throughout the spring and summer of 1939, the Territorial Army (TA) was ordered to be doubled in size, as the threat of a European war with Nazi Germany was increasing. As a result, the 46th Infantry Division came into existence in April 1939 as the 2nd Line duplicate of the 49th (West Riding) Infantry Division, although the headquarters of 46th Division did not assume command until 2 October 1939, slightly less than a month after the Second World War began. The division's first General Officer Commanding (GOC) was Major-General Algernon Lee Ransome. Like its",
"consisted of more than a thousand division-sized units at any one time, and the number of rifle divisions raised during the Great Patriotic War is estimated at 2,000. Nazi Germany had hundreds of numbered and/or named divisions, while the United States employed up to 91 divisions.\nA notable change to divisional structures during the war was completion of the shift from square divisions (composed of two brigades each with two regiments) to triangular divisions (composed of three regiments with no brigade level) that many European nations started using in World War I. This was done to increase flexibility and pare",
"1st Infantry Division (Wehrmacht) History Originally formed as the beginning of Germany's first wave of rearmament, the division was first given the title of Artillerieführer I and only later called Wehrgauleitung Königsberg. These names were an effort to cover Germany's expansion of infantry divisions from seven to twenty-one. The division's infantry regiments were built up from the 1.(Preussisches) Infanterie-Regiment of the 1.Division of the Reichswehr and originally consisted of recruits from East Prussia. The unit's Prussian heritage is represented by the Hohenzollern coat of arms that served as the divisional insignia. Upon the official revelation of the Wehrmacht in October",
"brigades each. Each brigade was to have approximately 3,600 officers and enlisted men organized into three regiments and, with three such brigades, each division was to total about 11,000 officers and men. Thus the division was to be about the same size as the division of 1861, but army corps were to be larger. The division staff initially was to have an adjutant general, quartermaster, commissary, surgeon, inspector general and engineer, with an ordnance officer added later. The brigade staff was identical except that no inspector general or ordnance officer was authorized.\nGeneral Order 46 of May 16, 1898 assigned commanding",
"and the Army Academy, the forerunner to the Führungsakademie der Bundeswehr in Hamburg. In total of twelve armoured and infantry divisions were to be established by 1959, as planned in Army Structure I. To achieve this goal existing units were split approximately every six months. However the creation of all twelve divisions did not take place until 1965. At the end of 1958 the strength of the army was about 100,000 men. The army was equipped at first with American material, such as the M-47 Patton main battle tank. Three corps commands were formed beginning in 1957: the I Corps,",
"Army of the Mississippi 1862 The first army was created on February 23, 1862, with Maj. Gen. John Pope in command. At its creation, the army consisted of 2 divisions of infantry for service along the Mississippi River. When General Pope began to move against New Madrid, Missouri, the army was expanded with units from neighboring military districts. The army now totaled 5 divisions commanded respectively by David S. Stanley, Schuyler Hamilton, John M. Palmer, Eleazar A. Paine and Joseph B. Plummer. Gordon Granger commanded the Cavalry Division of two regiments and Napoleon B. Buford commanded",
"the regiment. For example, The North Saskatchewan Regiment is the only battalion in the administrative regiment of the same name. When there is more than one battalion, they are distinguished by numbers, subsidiary titles or both. In Britain, every infantry battalion bears a number, even if it is the only remaining battalion in the regiment (in that case it is the 1st Battalion, with the exception of The Irish Regiment of Canada, which has a 2nd Battalion only). Until after the Second World War, every regiment had at least two battalions. Traditionally, the regular battalions were the 1st and 2nd",
"Large regiment A large regiment is a multi-battalion infantry formation of the British Army. First formed in the 1960s, large regiments are the result of the amalgamation of three or more existing single-battalion regiments, and perpetuate the traditions of each of the predecessor units. Genesis of the large regiment The idea of the \"large regiment\" originated in 1962. Speaking in the House of Commons on 8 March, the Minister of War, John Profumo, stated that there was not going to be a further extensive reorganisation of army units. However, talking of the need to increase flexibility in the services, he",
"prestige and regimental spirit developed since October 1945, it would be undesirable to have the regular units the highest numbered, without battle honours or colours, and with precedence after Militia units. Consideration was given to whether the battalions might be designated as separate regiments. For example, the 65th Battalion might have become the 1st Infantry Battalion, City of Sydney's Own Regiment under one proposal or the 1st Battalion, King George VI's Australian Rifle Regiment under another. Instead, the decision was taken to number the units sequentially as part of one large regiment and so on 23 November 1948 the 65th,",
"be two regular and two heavy infantry divisions Frontier Corps operates under a separate command, but its units are often parceled out to the Army. The Corps in the region, the XII Corps, usually has 2 infantry divisions, it has received from what can be gleaned from open sources two additional divisions, one from Multan; the 14th, and another from Kashmir; the 23rd.",
"3 divisions. The divisions were of unequal strength, according to the importance of the district in which they were recruited. In event of war, each division would mobilize 2 or 3 regiments of infantry (of 3 battalions), 3 or 4 squadrons of cavalry, a battalion of field artillery (of 3 batteries), a battalion of heavy artillery, a sapper company, a telegraph company, a medical company and a company of train. Each regimental district also forms one battalion of landvarn (of 6 companies), and the other arms would form landvarn units in the same proportion. The total peace strength was 118,500",
"39th Division (United Kingdom) History The division was formed as part of the fifth wave (K5) of divisions in the New Army; it did not have a regional title, but was composed primarily of recruits from the Midlands, London, and the south of England. Several of its battalions had been raised by local communities, and were named for their towns or industries. After training and home service, it deployed to the Western Front in early 1916, and fought in the Battle of the Somme. The following year, it saw action at the Third Battle of Ypres, and in 1918 took"
] |
What is the purpose of body hair? | [
"I've posted this on other questions about body hair before, but here goes. There's a pretty common misconception that everything that evolves has to have evolved for a reason. That's not really how it works. Giraffes didn't evolve long necks because they needed to reach higher in the trees for food. Evolution doesn't make decisions like that. Certain traits were kept around because they were beneficial to individuals in a species this is true; however, there are certain traits which exist in the population that have no benefit at all. They are only there because they didn't really create a survival disadvantage or advantage. Evolution had no reason to get rid of it or keep it around. So some people have it and some people don't. Body hair is like this in some populations.",
"_URL_0_ \n\nBasically, we used to have fur, kept us warm etc, but evolution hasn't needed for us to get rid of it completely. Why we don't *still* have most of our fur is actually a better question - I'm curious what advantage *less* hair gave us during evolution. \n\nGoosebumps are another vestigial trait. On animals with fur, goosebumps are the body's way of raising the hair, which can be used to make the animal appear larger, scaring off predators. Also used to trap more air in the fur, acting as insulation, when it's cold. That's why you get goosebumps when you get cold or are scared. That part of your brain is still there, but the fur isn't."
] | [
"Hairstyle A hairstyle, hairdo, or haircut refers to the styling of hair, usually on the human scalp. Sometimes, this could also mean an editing of facial or body hair. The fashioning of hair can be considered an aspect of personal grooming, fashion, and cosmetics, although practical, cultural, and popular considerations also influence some hairstyles. \nThe oldest known depiction of hair styling is hair braiding which dates back about 30,000 years. In history, women's hair was often elaborately and carefully dressed in special ways. From the time of the Roman Empire until the Middle Ages, most women grew their hair as",
"Hair prosthesis A hair prosthesis (or cranial prosthesis) is a custom-made wig specifically designed for patients who have lost their hair as a result of medical conditions or treatments, such as alopecia areata, alopecia totalis, trichotillomania, chemotherapy, or any other clinical disease or treatment resulting in hair loss. The terminology is used when applying for medical insurance or tax deduction status. \nDoctors have been prescribing these prostheses since the 1950s. Cranial prostheses also help to protect disease-weakened immune systems from the sun, and to regulate body temperature.\nCranial hair prostheses have advanced due to technology. A cranial hair prosthesis is",
"34 years of age, with numbers still rising.\nSalons that cater to the grooming needs of men have opened up all over the world and offer services in a masculine environment that fights the age-old stigma that waxing and shaving below the neck is just for women. Grooming through the ages Historically, body hair has been associated with virility, power and attractiveness but the removal of body hair by men is not just a modern-day fad. In fact, hair removal has a traceable history that stretches as far back as ancient Egypt, where men and women would shave their bodies, heads",
"bone development).\nScientists also view the ability to grow very long hair as a result of sexual selection, since long and healthy hair is a sign of fertility and youth. An evolutionary biology explanation for this attraction is that hair length and quality can act as a cue to youth and health, signifying a woman's reproductive potential. As hair grows slowly, long hair may reveal 2–3 years of a person's health status, nutrition, age and reproductive fitness. Malnutrition, and deficiencies in minerals and vitamins due to starvation, cause loss of hair or changes in hair color (e.g. dark hair turning reddish).",
"was aimed at creating a sense of beauty. \"A woman with long thick hair demonstrated the life force, the multiplying power of profusion, prosperity...a green thumb for raising bountiful farms and many healthy children\", wrote Sylvia Ardyn Boone, an anthropologist specializing in the Mende culture of Sierra Leone.\nIn Yoruba culture in West Africa, people braided their hair to send messages to the gods. The hair is the most elevated part of the body and was therefore considered a portal for spirits to pass through to the soul. Because of the cultural and spiritual importance of hair for Africans, the",
"done in the United States and the diaspora for convenience and of course influence from western beauty standards. For young girls, hair is not just something to play with, it is something that is laden with messages, and it has the power to dictate how others treat you, and in turn, how you feel about yourself. As Rooks (1996) affirms, “Hair in 1976 spoke to racial identity politics as well as bonding between African American women. Its style could lead to acceptance or rejection from certain groups and social classes, and its styling could provide the possibility of a career”",
"on life, although this might not be due to chemical changes but instead emotional changes due to the implications of the procedure. Body strength and muscle mass can decrease. Bone structure becomes softer and more slender. Body hair may sometimes decrease and is less coarse. Skin is softer and pores are noticeably absent. Castration prevents male pattern baldness if it is done before hair is lost. However, castration will not restore hair growth after hair has already been lost due to male pattern baldness.\nHistorically, many eunuchs who additionally underwent a penectomy reportedly suffered from urinary incontinence associated with the removal",
"sweat so it can support the growth of odor-causing bacteria.\nBesides, trimming or removing body hair has long been popular among athletes because it can provide a slight competitive edge. For swimmers, cyclists and track stars, body hair can slow them down by causing drag or minimal wind resistance. Wrestlers remove hair so their opponents will have less to grab onto while fighting for a win. Methods of body grooming When it comes to hair on the face and body, there now exists much variation in how and what a man will groom. It's a personal choice and very individual. Shaving",
"Hairstyles are markers and signifiers of social class, age, marital status, racial identification, political beliefs, and attitudes about gender.\nSome people may cover their hair totally or partially for cultural or religious reasons. Notable examples of head covering include women in Islam who wear the hijab, married women in Haredi Judaism who wear the sheitel, married Himba men who cover their hair except when in mourning, Tuareg men who wear a veil, and baptized men and women in Sikhism who wear the dastar. Paleolithic The oldest known reproduction of hair braiding lies back about 30,000 years: the Venus of Willendorf, now",
"decorative ornaments that, while they may have clasps to affix them to the hair, are used solely for appearance and do not aid in keeping the hair in place. In India for example, the Gajra (flower garland) is common there are heaps on hairstyles. Gender At most times in most cultures, men have worn their hair in styles that are different from women's. American sociologist Rose Weitz once wrote that the most widespread cultural rule about hair is that women's hair must differ from men's hair. An exception is the men and women living in the Orinoco-Amazon Basin, where traditionally",
"crime. Long lustrous female hair is generally rated attractive by both men and women across cultures. The prevalence of trichophilia (hair partialism or fetishism) is 7% in the population, and very long hair is a common subject of devotion in this group. Biological significance Humans, horses, orangutans and lions are among the few species that may grow their head hair or manes very long. Humans are believed to have lost their fur 2.5–3 million years ago as hominids when transitioning from a forest habitat to the open savanna, as an effect of natural selection, since this development made it possible",
"as most donors are from Russia or Northern Europe, where there is a smaller portion of hair donors to the market.\nRemy human hair is considered to be the best quality of human hair because the cuticles are kept intact and not stripped away. The preserved cuticles are also aligned in a unidirectional manner, which decreases tangling and matting. It has been carefully separated after collecting from the hair donor to ensure all the cuticles are of the same length.",
"(ponytail) in a variety of ways. They set their hair in waves and curls using wet clay, which they dried in the sun and then combed out, or else by using a jelly made of quince seeds soaked in water, or curling tongs and curling irons of various kinds. Roman Empire and Middle Ages Between 27 BC and 102 AD, in Imperial Rome, women wore their hair in complicated styles: a mass of curls on top, or in rows of waves, drawn back into ringlets or braids. Eventually noblewomen's hairstyles grew so complex that they required daily attention from several",
"guidelines of cleanliness. Removal of underarm hair was part of a collection of hygienic or cosmetic practices recommended by Muhammad (570-632) as consistent with fitra for both women and men and has since usually been regarded as a requirement by most Muslims. In much of the Western world, some men also choose to remove their underarm hair for aesthetic reasons.\nMany competitive swimmers remove nearly all of their body hair, including their underarm hair, believing it makes their bodies more streamlined during races. Many male bodybuilders and professional wrestlers also remove their body hair for cosmetic purposes.\nSeneca the Younger suggests it",
"Good hair Usage and scholarship Although many hair stylists or beauticians would define \"good hair\" to mean \"healthy hair\", the phrase is rarely used in this manner within informal African-American circles. Instead it is used metaphorically to characterize beauty and acceptance. These standards vary for African-American men and women. Historical view of \"natural hair\" In her 2009 article, \"Hairitage: Women Writing Race in Children's Literature\", the literary critic Dianne Johnson notes an early 1900s advertisement:\nOnce upon a time there lived a Good Fairy whose daily thoughts were of pretty little boys and girls and of beautiful women and handsome men",
"Hairdresser Ancient hairdressing Hairdressing as an occupation dates back thousands of years. Ancient art drawings and paintings have been discovered depicting people working on another person's hair. Greek writers Aristophanes and Homer both mention hairdressing in their writings. In Africa, it was believed in some cultures that a person's spirit occupied his or her hair, giving hairdressers high status within these communities. The status of hairdressing encouraged many to develop their skills, and close relationships were built between hairdressers and their clients. Hours would be spent washing, combing, oiling, styling and ornamenting their hair. Men would work specifically on men,",
"according to some hadiths regarding the rules of awrah, women are required to grow hair long, long enough that it would cover the breasts or as much awrah parts of the body when they're being buried, because she lacks clothes and long hair would be used as a covering instead.\nSome Muslims are also opposed to men having long hair as it is also important in Islam to have clear differences (in appearance) between sexes. And generally these cultures encourage women to have long hair and men to have short hair. The Taliban in Afghanistan viewed long hair for men as",
"hair was considered desirable (by Botticelli for one), and visitors to Venice reported that ladies sat out in the sun on their terraces with their hair spread out around large circular disks worn like hats, attempting to bleach it in the sun. Chemical methods were also used. Women's footwear Women from the 14th century wore laced ankle-boots, which were often lined with fur. Later in the 15th century, women also wore \"poulaines\". They used pattens to protect their tight shoes. Shirt, doublet, and hose The basic costume of men in this period consisted of a shirt, doublet, and hose,",
"hair.\"",
"different from a regular wig. Cranial hair prosthesis is done in several steps that include the taking of the cranial perimeter mold to achieve a perfect fit. The mold is done at the base where the hair is attached. The base is made using a hypoallergenic fabric because people having chemotherapy are usually very sensitive to any material, and their scalp is prone to allergies. The same is done when applying the hair to the base. The technique used to attach the hair is focused on avoiding that the knotting touches the scalp.",
"their effect on appearance. Although societal interest in appearance has a long history, this particular branch of psychology came into its own during the 1960s and has gained momentum as messages associating physical attractiveness with success and happiness grow more prevalent.\nThe psychology of hair thinning is a complex issue. Hair is considered an essential part of overall identity: especially for women, for whom it often represents femininity and attractiveness. Men typically associate a full head of hair with youth and vigor. Although they may be aware of pattern baldness in their family, many are uncomfortable talking about the issue. Hair",
"Psychological significance Anthropologists speculate that the functional significance of long head hair may be adornment, a by-product of secondary natural selection once other androgenic/somatic hair (body hair) had largely been lost. Another possibility is that long head hair is a result of Fisherian runaway sexual selection, where long lustrous hair is a visible marker for a healthy individual. For some groups or individuals, however, short hair is the selected trait.\nBy seven to nine months, infants can tell the sexes apart based on hair length, voice pitch, and faces. Cultural meaning Ways of life often viewed as more rigid, such as",
"natural hair in the organic era, has been encouraged by the awareness of the harmful effects of relaxers on the scalp: Itches, red patches, burns, broken hairs or worse: alopecia. However, among black women, 98% have had their hair straightened at least once in their lives, and relaxers have represented no less than 70% of the cosmetic purchases carried out by the population. In the 1980s–1990s, hair straightening was mainstreamed.\nDuring the 1970s–1980s, the ′Jheri curl′, another technique to loosen tightly curled hair, became fashionable in the African American community, popularized especially by some celebrities such as Michael Jackson, seen in",
"the foundation of the integrations and further damages the hair. It is best to shampoo the hair in a top down motion.\n*An important factor concerning the care of true, raw (remy, virgin) human hair extensions, since this hair has had absolutely no processes, chemical or steam done, is that these extensions are simply human hair and can be simply shampooed or washed as much as desired.",
"detergent, and water together and shake them up, then you get a mixture that can help to remove stains. Chemistry Human hair is composed largely of keratin protein, which has a negative ionic charge, giving hair a negative ionic charge as well. As chemistry dictates, oppositely charged compounds attract and compounds with the same charge repel each other. Most hair dyes are positively charged, helping them attach to the negative sites in hair and contributing to a better bond between the dye and the hair.\nUnfortunately, like hair, human skin is made of keratin and contains sites with a negative charge,",
"began to use butter, kerosene, and bacon grease and combs meant for livestock to style their hair.\nThe concept of good hair arose in the time leading up to the abolition of slavery in the United States. Slaves who worked in the home didn't wear headscarves as field laborers did and, as they were often children of a white man in the family that owned them, they were more likely to have straight hair than kinky or curly. To straighten their hair, black women would often use a mixture of lye, which could burn their skin. In New Orleans, Louisiana, in",
"it is the elders who style the all of the hair in one's family and it is important for the others to learn how to do so. The tradition of braiding and styling hair is so sacred that there are actually a lot of rules and guidelines for it including: when and where to style, differences based on gender, different rituals and customs.\nIt is the loss of this instrument [the African comb], all the more valuable that it is essential to the nappy hair care, which was going to dissociate Black people from the nature of their own hair, considered",
"with great attention to detail, and studies show it is not necessarily associated with poor hygiene. More recent studies reveal that head lice actually thrive in clean hair. In this way, hair washing as a term may be a bit misleading, as what is necessary in healthy hair production and maintenance is often simply cleaning the surface of the scalp skin, the way the skin all over the body requires cleaning for good hygiene.\nThe sebaceous glands in human skin produce sebum, which is composed primarily of fatty acids. Sebum acts to protect hair and skin, and can inhibit",
"and dermal papilla cells have been discovered in hair follicles. Research on these follicular cells may lead to successes in treating baldness through hair multiplication (HM), also known as hair cloning.",
"have unusual hair mineral contents. These uses are often controversial, and the American Medical Association states, \"The AMA opposes chemical analysis of the hair as a determinant of the need for medical therapy and supports informing the American public and appropriate governmental agencies of this unproven practice and its potential for health care fraud.\"\nA recent review of scientific literature by Dr Kempson highlighted analysis of metals/minerals in hair can be applied in large population studies for researching epidemiology and groups of chronically exposed populations, however any attempt to provide a diagnosis based on hair for an individual is not possible."
] |
Why is laundry lint almost always greyish blue? | [
"All of the individual colors of the clothes that are in there mix up and make a darkish mess, just like if you mixed a bunch of paint colors together. \n\nSometimes if something is shedding a lot of fibers, like a towel, or if you have a lot of similarly colored clothes, then that can influence the color of the lint."
] | [
"Lint (material) Dryer lint Dryer lint is lint generated by the drying of clothes in a clothes dryer; it typically accumulates on a dryer screen. Underwriters Laboratories recommends cleaning the lint filter after every cycle for safety and energy efficiency. Failure to clean the lint filter is the leading cause of home clothes dryer fires. Navel lint Navel lint (also known by names such as navel fluff, belly button lint, belly button fluff, and dip lint) is an accumulation of fluffy fibers in the navel cavity. Many people find that, at the beginning and end of the day, a small",
"or \"Laundry blue\" is a suspension of synthetic ultramarine (or the chemically different prussian blue) that is used for this purpose when washing white clothes. Also often found in make up such as mascaras or eye shadows. Large quantities are used in the manufacture of paper, and especially for producing a kind of pale blue writing paper which was popular in Britain. During World War I, the RAF painted the outer roundels with a color made from Ultramarine Blue. This became BS 108(381C) Aircraft Blue. It was replaced in the 1960s by a new color made on Phthalocyanine Blue, BS110(381C)",
"also become yellow over time, but this is eliminated by bleaching, either with liquid bleach, or by the traditional method of hanging the linens in the sun to let the sunlight bleach out the discoloration.\nHousehold linens are stored near the area where they are used, when possible, for convenience. Otherwise, bed and kitchen and dining linens may be stored together in a linen closet or cupboard. There are many methods of folding linens for storage. For formal occasions, table linens may be ironed before use. Traditionally, table linens could be starched while ironing, to decrease wrinkling and retain a smooth,",
"Bluing (fabric) Uses White fabrics acquire a slight color cast after use (usually grey or yellow). Since blue and yellow are complementary colors in the subtractive color model of color perception, adding a trace of blue color to the slightly off-white color of these fabrics makes them appear whiter. Laundry detergents may also use fluorescing agents to similar effect. Many white fabrics are blued during manufacturing. Bluing is not permanent and rinses out over time leaving dingy or yellowed whites. A commercial bluing product allows the consumer to add the bluing back into the fabric to restore whiteness.\nOn the",
"linen-like weave wherein individual threads can stand out for several centimeters. This latter is as dark as the binding of the third printing (while lacking the yellow cast), but the coloring is so uneven that it might be mistaken as soiled even when clean. Soiling on the other variants, on the other hand, is immediately apparent.\nThe textblock's paper stock for the \"oatmeal\" variant is brighter than the others. This is most apparent when comparing the text block edges of the three variants. It is known from owner inscriptions that this lighter variant appeared no later than 1946, and that the",
"same principle, bluing is sometimes used by white-haired people in a blue rinse.\nBluing has other miscellaneous household uses, including as an ingredient in rock crystal \"gardens\" (whereby a porous item is placed in a salt solution, the solution then precipitating out as crystals), and to improve the appearance of swimming-pool water. In Australia it was used as a folk remedy to relieve the itching of mosquito and sand fly bites.\nLaundry bluing is made of a colloid of ferric ferrocyanide (blue iron salt, also referred to as \"Prussian blue\") in water. \nBlue colorings have been added to rinse water for centuries,",
"dyed cloth, the brown color remains after the mud is washed off. Finally, the yellow n'gallama dye is removed from the unpainted parts of the cloth by applying soap or bleach, rendering the finished cloth white.\nAfter long use, the very dark brown color turns a variety of rich tones of brown, while the unpainted underside of the fabric retains a pale russet color. Variants and modern production Around Mopti and Djenné, a simpler method is used by artists considered to be of inferior skill. The cloth is dyed yellow in wolo solution, made from the leaves of Terminalia avicennoides, and",
"Other fabrics are stretched by mechanical forces during production, and can shrink slightly when heated (though to a lesser degree than wool). Some clothes are \"pre-shrunk\" to avoid this problem.\nAnother common problem is color bleeding. For example, washing a red shirt with white underwear can result in pink underwear. Often only similar colors are washed together to avoid this problem, which is lessened by cold water and repeated washings. Sometimes this blending of colors is seen as a selling point, as with madras cloth.\nLaundry symbols are included on many clothes to help consumers avoid these problems.\nSynthetic fibers in laundry can",
"makes yellow, copper sulphate mordant makes green while ferrous sulphate/iron mordant creates a greyed look. Other mordants are chrome and tin. The final step combined the dye with the yarn and simmered for over an hour after which the dyed yarn was removed, rinsed and left to dry.\nSome red inclusions, found in some blankets, may be made made of wool fabric and were used by the Salish weavers in the last quarter of the 1800s. Strips were torn from imported blankets or other materials and used in weaving. It is likely that the introduction of these foreign materials into the",
"heat, which causes the rest of the uncooked starch in glue to swell/gelatinize. This gelatinizing makes the glue a fast and strong adhesive for corrugated board production. Clothing starch Clothing or laundry starch is a liquid prepared by mixing a vegetable starch in water (earlier preparations also had to be boiled), and is used in the laundering of clothes. Starch was widely used in Europe in the 16th and 17th centuries to stiffen the wide collars and ruffs of fine linen which surrounded the necks of the well-to-do. During the 19th and early 20th century it was stylish to",
"and thick brown, it can be soaked in a light solution of persimmon at second time instead of water. Or it can get black color if it is soaked in iron oxide solution at second time. So the color of garot depends on the catalyzer—limewater, iron oxide solution, vinegar—, water, and the amount of sunshine. Advantages of garot Garot has come into the spotlight as healthful and convenient clothing. It has moth proof, waterproof, antimicrobial properties. Also Gal-ot prevents putrefaction, so it doesn't rot if stored in damp conditions. The thick, dense wave can help protect against sharp environmental hazards,",
"they are applied to light blond hair. Darker hair (medium brown to black) would need to be bleached in order for these pigment applications to take to the hair desirably. Some types of fair hair may also take vivid colors more fully after bleaching. Gold, yellow and orange undertones in hair that has not been lightened enough can muddy the final hair color, especially with pink, blue and green dyes. Although some alternative colors are semi-permanent, such as blue and purple, it could take several months to fully wash the color from bleached or pre-lightened hair. Adverse effects Hair coloring",
"the tannins in the starch diffuse into the water, which is changed several times. The overall soaking time depends on the amount of tannins in the paste.\nThe now-tannin-free starch-water suspension should have an off-white colour. This starch is allowed to completely settle at the bottom of the vat, the water drained away and the paste collected in trays to dry. The dried starch cake is then pulverized and packaged for sale. Dotorimuk is also commercially available in powdered form, which must be mixed with water, boiled until pudding-like in consistency, then set in a flat dish. Serving Like other muk,",
"white hairs will blend in sufficiently not to be noticeable, but as they become more widespread, there will come a point where a semi-permanent alone will not be enough. The move to 100% permanent color can be delayed by using a semi-permanent as a base color, with permanent highlights.\nSemi-permanent hair color cannot lighten hair. Hair can only be lightened using chemical lighteners, such as bleach. Bleaching is always permanent because it removes the natural pigment.\n\"Rinses\" are a form of temporary hair color, usually applied to hair during a shampoo and washed out again the next time the hair is",
"(to flush out residual iron gall compounds), water, diluted ammonia (if needed to flush out residual colour dye stains), then finally water are often recommended.\nThe colour dye in these modern iron gall formulas functions as a temporary colourant to make these inks clearly visible whilst writing. The ferro-gallic compounds through a gradual oxidation process cause an observable gradual colour change to grey/black whilst these inks completely dry and makes the writing waterproof. The colour-changing property of the ink also depends on the properties of the used paper. In general, the darkening process will progress more quickly and visibly on papers",
"dyed slightly blue. However, because blue and yellow are complementary colors in the subtractive color model of color perception, adding a trace of blue color to yellowed fabrics visually cancels out the yellow color cast making the fabric appear very white.\nLike other bluing agents, the product can be used for other purposes as well. This includes dyeing hair, dyeing pets, dyeing denim jeans and is sometimes used by white-haired people in a blue rinse.",
"a brand of soap in those countries, characteristically green in colour and available both in the form of larger rectangular 155g blocks for laundry and other household purposes and in the smaller rounded 125g size as toilet soap, where it used the same \"walking baby\" trademark as the laundry powder and was marketed as a pure, mild product. It was suddenly discontinued by the manufacturers in about 2009 to the disapproval of its faithful customer base.\nThe Fairy brand has expanded further from the soap-based products, and is now also used on automatic dishwashing products; the latest being \"Fairy",
"removes just the dye). Acetone and nail polish remover are not considered effective; laundry detergent may sometimes work as may moist cigarette ash rubbed into the stained area. Plant-based dyes Henna is an orange dye commonly used as a deposit-only hair color whose active component, lawsone, binds to keratin. It is therefore considered semi-permanent to permanent, depending on a person's hair type. Most people will achieve a permanent color from henna, especially after the second dye. With repeated use the orange color builds up into red and then auburn. While \"natural\" henna is generally a red color, variations exist.",
"Pacific Northwest region of the United States and Canada. Like P. aztecorum, the caps of the South African species P. natalensis also bleach to nearly white when dried. The closely related P. baeocystis also bleaches in color to white when dry. Found in northwest North America from British Columbia to Washington and Oregon, P. baeocystis has thinner cheilocystidia than P. aztecorum (typically measuring 20–32 by 4.4–6 μm) and its pleurocystidia, when present, are found only near the gill edge. P. quebecensis, known only from Quebec, Canada, has pleurocystidia measuring 12–25 by 5–10 μm. Although the phylogeny of the species comprising section Aztecorum is not known with certainty, Guzmán",
"color. It is turned over to allow the opposite side to dry. After that, it should be soaked in water and be dried again under the sunshine. It needs to be dried and soaked in water twice a day for 7 to 10 days. The longer it stays in the sun, the deeper the color it has. In this procedure, you will get dark brown color basically. If the color should be lighter than brown, it is better to add some water in persimmon juice and soak the fabric in it at first time. If the color should be dark",
"the single is already dyed this technique allows it to be plied without ruining the color scheme. This technique also allows the spinner to try to match up thick and thin spots in the yarn, thus making for a smoother end product. Washing If the lanolin is unwanted, and has not already been washed out, this is done now. The skein is tied in six points and steeped overnight in detergent, it is rinsed and air-dried, and re-skeined.\nUnless the lanolin is to be left in the cloth as a water repellent. When washing a skein it works well to let",
"Glen plaid Glen plaid (short for Glen Urquhart plaid) or Glenurquhart check is a woollen fabric with a woven twill design of small and large checks. It is usually made of black/grey and white, or with more muted colours, particularly with two dark and two light stripes alternate with four dark and four light stripes which creates a crossing pattern of irregular checks. Glen plaid as a woven pattern may be extended to cotton shirting and other non-woollen fabrics. Name The name is taken from the valley of Glenurquhart in Inverness-shire, Scotland, where the checked wool was first",
"odor reminiscent of rotting eggs due to their sulfuric nature. Caution Hair dye strippers contain chemical irritants. Avoid direct skin contact and use in well-ventilated areas.",
"room fill. Textiles Textile fragments consisted primarily of cotton yarns that were in natural shades, from white to dark brown, but others were colored in deep reds and two shades of blue. Other centers at this time revealed that dying cotton was not uncommon as yellow, red, bright emerald green and orange dyed textile remains have been found in such Preceramic sites as Huaca Prieta, Los Gavilanes, La Galgada and Asia (Peru).\nAs well, two objects were found with an inlay of dark blue stone, resembling lapis lazuli. Other items recovered during excavation work include mats, looped bags, nets, wood and",
"and therefore more natural looking; they are gentler on hair and therefore safer, especially for damaged hair; and they wash out over time (typically 20 to 28 shampoos), so root regrowth is less noticeable and if a change of color is desired, it is easier to achieve. Demi-permanent hair colors are not permanent but the darker shades in particular may persist longer than indicated on the packet. Semi-permanent Semi-permanent hair coloring involves little or no developer, hydrogen peroxide or ammonia, and is thus less damaging to hair strands. The reduced amount of developer, whether peroxide or ammonia, means that hair",
"bleaching in the sun. Once dry, the leaves are rolled and tied into bundles in preparation for weaving. The long dried leaves are then slit into thin strips for weaving. In the 19th century, young women would start their own mats or complete ones started by older sisters. Today, it is more common for mats to be woven by a group of women working in a fale lalaga (weaving house). The decorative red feathers were originally from Samoan or Fijian collared lory birds, called \"sega,\" but more modern examples use dyed chicken feathers. Etymology The Samoan language orthography is not",
"performed some experiments with the scorching of linen, and found that a scorch mark is only produced by direct contact with the hot object – thus producing an all-or-nothing discoloration with no graduation of color as is found in the shroud.\nAccording to Fanti and Moroni, after comparing the histograms of 256 different grey levels, it was found that the image obtained with a bas-relief has grey values included between 60 and 256 levels, but it is much contrasted with wide areas of white saturation (levels included between 245 and 256) and lacks of intermediate grey levels (levels included between 160",
"UK, British Standard BS 245, in Germany, DIN 51632). Turpentine substitute can be used for general cleaning but is not recommended for paint thinning as it may adversely affect drying times due to the less volatile components; while it may be used for brush cleaning its heavier components may leave an oily residue.\nIn Australia, white spirit is normally sold under the generic name of Shellite (a trademark of Shell Australia), and is composed of C₆ to C₁₀ straight alkanes, classing it as light pure naphtha. It is used for fuel and cleaning. Use White Spirit is a petroleum distillate used as",
"blue worsted wool fabric with polyester pin stripes. When dyed, the wool yarns are dyed blue, whereas the polyester yarns remain white.\nCross dyeing is commonly used with piece or fabric dyed materials. However, the same concept is applicable to yarn and product dyeing. For example, silk fabric embroidered with white yarn can be embroidered prior to dyeing and product dyed when an order is placed. Product dyeing Product dyeing, also known as garment dyeing, is the process of dyeing products such as hosiery, sweaters, and carpet after they have been produced. This stage of dyeing is suitable when all components",
"gives a sort of plumage color patterns: On an extended black background, this condition causes the entire surface of the body an even shade of light slaty blue, which is the typical phenotype known as '\"self-blue\"'.\nOn a red/brown color plumage background, lavender gene degrades color to beige, like in some Pekin Bantams as in the picture set aside. On the color background of the Belgian Bearded d'Uccle Bantams, frequently referred to as the \"Mille Fleur\" in the United States, lavender causes the pattern known as \"porcelain\". The resulting \"porcelain\" pattern is beige with each feather tipped with a V-shaped of"
] |
So what exactly IS Separation of Church and State? | [
"> all generally saying that the wording is vague in the actual document\n\nIt is vague because of separation of church and state is a principle, not an explicit law. The closest thing to law in the US is the 1st Amendment that prevents the government from endorsing a religion.\n\n > It means the government can't enforce/endorse any religion and no religion can control the government\n\nThis is probably the closest to what the 1st Amendment says. Note that some people believe it only applies to different forms of Christianity or belief in gods, and not theistic beliefs are not covered.\n\n > The government can't endorse the church but the church can influence the government\n\nThis is where a lot of people get confused. Most churches are also non-profit organizations and must follow the rules of non-profits in order to qualify for the tax exemptions. Many of those rules limit political activity. Churches are free to try to influence the government as much as the like, they would just lose their non-profit status.\n\n > Churches are allowed to do whatever and the government can't stop them\n\nOnly to the same degree as any other organization. Most of a church's special status comes from being a non-profit and are things any non-profits can do as well. Legally speaking, there is almost no difference between a church and the Kiwanis or an archery club, they follow most of the same rules for non-profits.\n\nDiscrimination laws are often applied more loosely to non-profits, because their mission is often affiliated with a specific group. The Sons of Norway are allowed to reject non-Norwegians, becasue that is what they are all about. Any religiously affiliated group can claim the entirity of their religion to be part of their mission, and use that as the basis of discrimination. But again, that is about being a non-profit, not a religious organization.",
"> **Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof;** or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.\n\nThat's it."
] | [
"Separation of church and state in the United States \"Separation of church and state\" is paraphrased from Thomas Jefferson and used by others in expressing an understanding of the intent and function of the Establishment Clause and Free Exercise Clause of the First Amendment to the United States Constitution which reads: \"Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof...\"\nThe phrase \"separation between church & state\" is generally traced to a January 1, 1802, letter by Thomas Jefferson, addressed to the Danbury Baptist Association in Connecticut, and published in a Massachusetts newspaper. Jefferson",
"are not observed and kept distinct. Confusion of the two leads directly to various evils: either church or state becomes an oppressive power, or both do; the church loses its reason for existence...\"\nFurthermore, the LCA acknowledges \"The church as such has no special power to legislate on any political question or problem. Nor has it the right to endeavour to exert political pressure, for instance, by forming a political party or by lobbying or by instructing its members how they must vote in political elections or referendums. Its members must act together with all members of society to do what",
"Decree on Separation of Church and State The Decree on Separation of Church from State and School from Church (Russian: Декрет об отделении церкви от государства и школы от церкви) is a legal act adopted by the Council of People's Commissars of the Russian Soviet Federative Socialist Republic on January 20 (February 2), 1918 came into force on January 23 (February 5) of the same year, on the day of official publication. It installed the secular nature of the state power, proclaimed the freedom of conscience and religion; religious organizations were deprived of any property rights and the rights of",
"powers of the legislative or executive branches. Under the separation of powers doctrine, no branch of government may exercise a power of government assigned exclusively to another branch. The purpose of separating powers among the branches of government is to avoid concentration of governmental power in the hands of a new and to give the various branches the ability to check actions by the other branches.\nIn reviewing the validity of state laws, the courts are limited to determining whether the law violates any provision of the constitution. The courts may invalidate a law that violates individual rights, such as the",
"Church government The Reformed Churches have a Presbyterian - Synodal system of church government. The church consists of the Eastern Regional Synod, the Bushweld Synod, the Northwest Synod, the Regional Synod of Free State and KwaZulu-Natal, the Southern Regional Synod, and the Randvaal Regional Synod. \nCriticism that the churches in the RCSA have abandoned the principle that Christ is the only Head of the church, exists. The impression that some of the churches have abandoned the principles from the Reformation has been discussed at the \"GKSA Forum\". Since Christ reigns through his Word and Spirit (see Heidelberg",
"which Karibjanian refused to do.\nIn an October 19, 2010, debate at the Widener University School of Law in Wilmington, O'Donnell challenged Coons on the topic of the separation of church and state, asking, \"Where in the Constitution is separation of church and state?\" After laughter from the audience, Coons responded, \"The First Amendment establishes the separation and the fact that the federal government shall not establish any religion, and decisional law by the Supreme Court over many, many decades clarifies and enshrines that there is a separation of church and state that our courts and laws must respect.\" O'Donnell replied,",
"a fundamental distinction between the supreme jurisdiction in ecclesiastical matters (Kirchenhoheit or jus circa sacra), which it conceives as inherent in the power of the state in respect of every religious communion, and the ecclesiastical power (Kirchengewalt or jus in sacra) inherent in the church, but in some cases vested in the state by tacit or expressed consent of the ecclesiastical body. The theory was of importance because, by distinguishing church from state while preserving the essential supremacy of the latter, it prepared the way for the principle of toleration. It was put into practice to a certain extent in",
"and State are distinct and separate institutions, both being accountable to the Lord Jesus Christ who has received all authority in heaven and earth from the Father; (2) the mutually helpful relationship between Church and State does not imply subordination of one to the other in its own sphere; and, in particular, the civil authorities have no jurisdiction or authoritative control in the spiritual affairs of Christ's Church. (3) In maintaining these Scriptural principles, and the ideal of a united Christian Church in a Christian nation, the Church does not regard the involvement of the State in matters concerning religion",
"as led by a head of state, typically a president; a legislative branch that enacts, amends, or repeals laws as led by a unicameral or bicameral legislature; and a judiciary branch that interprets and applies the law as led by a supreme court.\nDivided governments are seen by different groups as a benefit or as an undesirable product of said separations. Those in favor of divided government believe that the separations encourage more policing of those in power by the opposition, as well as limiting spending and the expansion of undesirable laws. Opponents, however, argue that divided governments become lethargic, leading",
"law on the separation of Church and State. This law was heavily supported by Combes, who had been strictly enforcing the 1901 voluntary association law and the 1904 law on religious congregations' freedom of teaching. On 10 February 1905, the Chamber declared that \"the attitude of the Vatican\" had rendered the separation of Church and State inevitable and the law of the separation of church and state was passed in December 1905. The Church was badly hurt and lost half its priests. In the long run, however, it gained autonomy; ever after, the State no longer had a voice",
"to them.\" \nIn Lemon v. Kurtzman, 403 U.S. 602 (1971), the court determined that a Pennsylvania state policy of reimbursing the salaries and related costs of teachers of secular subjects in private religious schools violated the Establishment Clause. The court's decision argued that the separation of church and state could never be absolute: \"Our prior holdings do not call for total separation between church and state; total separation is not possible in an absolute sense. Some relationship between government and religious organizations is inevitable,\" the court wrote. \"Judicial caveats against entanglement must recognize that the line of separation, far from",
"the Separation of the Church from the State and the School from the Church\" also determined the relationship between school and church. \"School shall be separated from church,\" the Decree said. \"The teaching of religious doctrines in all the state and public, as well as private educational institutions where general subjects are taught shall not be permitted. Citizens may teach and be taught religion in private.\"\nPatriarch Tikhon of Moscow excommunicated the Soviet leadership on January 19, 1918 (Julian Calendar) for conducting this campaign. In retaliation the regime arrested and killed dozens of bishops, thousands of the lower clergy and monastics,",
"& Benevolence teams. One church The ICOC holds that the Bible teaches the existence of a single universal church. One implication of this doctrine is that, while Christians may separate themselves into different, disunified churches (as opposed to just geographically separated congregations), it is not actually biblically right to do so. While no one claims to know who exactly is part of \"the universal church\" and who is not, the ICOC believes that anyone who follows the plan of salvation as laid out in the scriptures is added by God to his \"One Universal Church\".\nThis is consistent with their",
"even though they have a right to be protected by the State, are subject to the supervision of the State and must not form a separate State within the State.\nThis supervision was arranged by the Senate of Frankfurt, which re-established the previously existing Lutheran consistory. According to Article 36, it was made up of two Lutheran senators, the Lutheran chief pastor (titled senior), two other Lutheran pastors and a jurist. With the exception of marital issues, which were taken over by the municipal court, the jurisdiction of the church continued to abide by the rules set forth in 1728. Article",
"Christian state stands in contrast to a secular state, an atheist state, or another religious state, such as a Jewish state, or an Islamic state. Though many Christian states have turned secular and adopted the separation of Church and state, church organizations still have much influence in the institutions of these nations, including hospitals and schools with government funding. History By 301 AD, the Kingdom of Armenia became the first state to declare Christianity as its official religion following the conversion of the Royal House of the Arsacids in Armenia. The Armenian Apostolic Church is the world's oldest national church.",
"a church should operate under a mixed government, with elements of monarchy (Jesus Christ is king and head of the church), democracy (congregational governance) and aristocracy (rule by officers). The authority given to the congregation includes choosing its own officers, admitting new church members, public censure, excommunication, and restoration to church fellowship. Church officers The two offices are elder and deacon. Furthermore, there were two types of elders: ministers (who could hold the title of pastor or teacher depending on their specific roles) and lay elders (called ruling elders). Both pastors and teachers can administer sacraments and execute church discipline,",
"legal right to secede from the PKN without losing its property and church during a transition period of 10 years. Seven congregations have so far decided to form the Continued Reformed Churches in the Netherlands. Two congregations have joined one of the other smaller Reformed churches in the Netherlands. Some minorities within congregations that joined the PKN decided to leave the church and associated themselves individually with one of the other Reformed churches.\nSome congregations and members in the Dutch Reformed Church did not agree with the merger and have separated. They have organized themselves in the Restored Reformed Church. Estimations",
"respect of church government: - proponents of this polity point to the biblical norm of churches being individually autonomous.",
"nations in the role of religion and faith. Firstly, the United Kingdom has an established church in two of the four nations of the country; the Anglican Church of England, which the head of state is the head of the church in one, and the Presbyterian Church of Scotland who plays a notable role of the other. The United States on the other hand requires a strict separation of church and state, as stated in the First Amendment.\nAnother sizable difference between the U.S. and the UK is the piety of followers, as the UK much more secular than the U.S.",
"denominational differences to the point of being narrowly exclusive\", similar to sectarianism).\nProtestant leaders differ greatly from the views of the leaders of the Roman Catholic Church and the Eastern Orthodox Church, the two largest Christian denominations. Each church makes mutually exclusive claims for itself to be the direct continuation of the Church founded by Jesus Christ, from whom other denominations later broke away. These churches, and a few others, reject denominationalism.\nHistorically, Catholics would label members of certain Christian churches (also certain non-Christian religions) by the names of their founders, either actual or purported. Such supposed founders were referred to as",
"identifiable standard among such congregations. Non-denominational congregations may establish a functional denomination by means of mutual recognition of or accountability to other congregations and leaders with commonly held doctrine, policy and worship without formalizing external direction or oversight in such matters. Some non-denominational churches explicitly reject the idea of a formalized denominational structure as a matter of principle, holding that each congregation must be autonomous.\nNon-denominational is generally used to refer to one of two forms of independence: political or theological. That is, the independence may come about because of a religious disagreement or political disagreement. This causes some confusion in",
"in 2012. The issue of separation of church and state in Norway has been increasingly controversial, as many people believe it is time to change this, to reflect the growing diversity in the population. A part of this is the evolution of the public school subject Christianity, a required subject since 1739. Even the state's loss in a battle at the European Court of Human Rights at Strasbourg in 2007 did not settle the matter. As of 1 January 2017, the Church of Norway is a separate legal entity, and no longer a branch of the civil service.\nThrough the Council",
"for this move. However, this constitution allowed member states to define their own referendum laws.\nIt is also specified that the member state which secedes forfeits any rights to political and legal continuity of the federation. This means that the seceding state (in this case the Republic of Montenegro) had to apply for membership to all major international institutions, such as the United Nations and be recognized by the international community, and that the remaining state (in this case the Republic of Serbia) became the full successor to the state union. No state objected to recognizing a newly formed state prior",
"Church union United churches A united church is the result of a merger of churches of various denominations. One of the first of these occurred in 1817, when Lutheran and Reformed churches in Prussia merged into the Prussian Union. \nThe nineteenth century saw a number of unions between churches of the same tradition. For example, the United Secession Church in Scotland was formed in 1820 by a union of various churches which had seceded from the established Church of Scotland. All these were Presbyterian in both doctrine and practice. \nIn the twentieth century many churches merged as a result of",
"individuals of any Christian denomination, is viewed as a sacrament. A sacramental marriage, once consummated, cannot be dissolved except by death. The church recognises certain conditions, such as freedom of consent, as required for any marriage to be valid; In addition, the church sets specific rules and norms, known as canonical form, that Catholics must follow.\nThe church does not recognise divorce as ending a valid marriage and allows state-recognised divorce only as a means of protecting the property and well being of the spouses and any children. However, consideration of particular cases by the competent ecclesiastical tribunal can lead to",
"to the Catholic Church alone precisely because it refers to the mark of unity that we profess in the symbols of the faith (I believe... in the 'one' Church); and this 'one' Church subsists in the Catholic Church.\"\nThe Catholic Church teaches that only corporate bodies of Christians led by bishops with valid holy orders can be recognized as \"churches\" in the proper sense. In Catholic documents, communities without such bishops are formally called ecclesial communities. Orthodox tradition The term orthodox is generally used to distinguish the faith or beliefs of the \"true Church\" from other doctrines which disagree, traditionally referred",
"Continental Reformed church Forms of government In contrast to the episcopal polity of the Anglican and many Lutheran and Methodist churches, continental Reformed churches are ruled by assemblies of \"elders\" or ordained officers. This is usually called Synodal government by the continental Reformed, but is essentially the same as presbyterian polity, with the elders forming the consistory, the regional governing body known as the classis, and the highest court of appeal being the general synod.\nThe Reformed Church in Hungary, its sister church in Romania, the Hungarian Reformed Church in America, and the Polish Reformed Church are the only continental",
"Church claims that title and considers the Eastern Orthodox Church to be in schism, while the Eastern Orthodox Church also claims that title and holds the view that the Catholic Church is schismatic. Some Protestant Churches believe that they also represent the One Holy Catholic and Apostolic Church and consider the Catholic and Orthodox Churches to be in error, while others do not expect a union of all Christian churches on earth. See also One true church and Great Apostasy.\nSchisms are particularly prevalent among Anabaptists, to the extent that divisions over even minute details of doctrine and theology are",
"acknowledged by the State. Where Church and State are not separated, the State aids in investigating these offences, as well as in executing the canonically rendered decisions of the Church.\nAs to the civil offences of ecclesiastics, ecclesiastical jurisdiction carries with it no secular consequences, though the Church is free to punish such offences by ecclesiastical penalties. According to the Papal Bull \"Apostolicae Sedis moderationi\" (12 October 1869), those persons fall under the excommunication reserved to the pope speciali modo, who directly or indirectly hinder the exercise of ecclesiastical jurisdiction in the external forum or in the internal forum, as well",
"Christian states, the official Christian national church is likely to have certain residual state functions in relation to state occasions and ceremonial. Examples include Scotland (Church of Scotland) and Sweden (Church of Sweden). A national church typically has a monopoly on official state recognition, although unusually Finland has two national churches (the Evangelical Lutheran Church of Finland and the Finnish Orthodox Church), both recognised under civil law as joint official churches of the nation."
] |
Why can't my $199 laptop play stutter-free 1080p if my $30 Chromecast can play the same media just fine? | [
"Your Chromecast is designed to do one thing- decode video. So it has dedicated silicon to decode videos. Your laptop is designed as a general purpose computer. Its processor is way better at pretty much anything that isn't decoding videos. Also, your $199 laptop has a hard drive, a screen, and a battery which all add considerably to the cost, so it's not quite fair to compare a laptop to a Chromecast on price.",
"Your $199 laptop is meant to utilize its resources to do many things, like browse the web, play games, send emails, download and upload files, watch videos, play music, and other things that computers do, even do multiple things at once. The CPU is designed to be able to do those things, and is not specific to any single task.\n\nYour $30 Chromecast has a chip inside of it that is meant to do one thing, which is decode video. Since the processor is designed to do one thing, it is very inexpensive to produce and sell.",
"Any modern Intel Celeron processor has a on-die GPU that has dedicated hardware decoding blocks like a Chromecast. The most recent Celeron line has an HD4000 based GPU which has a hardware decode engine (called the *MFX* or *multi format codec engine*) for MPEG, WMV, and H.264 codecs.\n\nIf your $199 Celeron laptop wasn't playing videos properly, it was likely due to a misconfiguration by the manufacturer of the laptop.\n\n_URL_0_\n\n > The integrated video decoder supports all popular codecs such as MPEG2, H.264, VC1, VP8 and MVC and is suitable for resolutions up to 4K up to 100 Mbit/s. The user can connect up to two displays via HDMI 1.4 (max. 1920 x 1080) or DisplayPort 1.2 (max. 2560 x 1600). Another new feature is the support for Wireless Display and Quick Sync, Intel's fast and power efficient H-264 hardware encoder.",
"Your laptop CPU is like a 4-wheel-drive car. It can go just about anywhere and do just about anything with *decent* speed.\n\nA graphics chip is like a bullet train. It does exactly one thing - go forwards along a track really, really fast (or, for the graphics chip, play video). However, if you want to go somewhere that is not on or near the track (playing video), it's useless.\n\nExpensive computers have both good CPUs (good cars) and good graphics cards (good bullet trains), so they are good at everything.\n\nThe Chromecast has a very weak CPU (because all it needs to do is let you select what media to feed to the graphics chip) but an adequate graphics chip.\n\nThe silicon is physically different. CPUs provide some very general purpose instructions which you can string together to perform any computation (this is, vaguely, what Turing-complete means.) Graphics cards provide a more limited set of instructions that do things related to video very well and very fast, but you cannot (necessarily) use them to do other computations in a sane way.",
"In a $199 laptop, you are guaranteed that every component is of the shittiest possible quality. Just...don't expect much.",
"Look at which flash extensions your browser is using, if they use pepper flash update them or use a browser with an extension that doesn't use Pepper flash. \n_URL_1_",
"The processor is not the problem. If you are running windows there is probably a ton of junk running in the background when the computer starts. Google how to turn all that crap off. Then make sure you are using VLC to play the media. Are you streaming the media from another source or is the 1080p file directly on your laptop? Updating the wireless driver could help if your streaming over wireless. With computers, if something isnt working then you can make it work by tweaking stuff.",
"Your chromecast is stutterfree? Because I have two and I stopped trying because thats mainly been my experience.",
"There's not information in your post for anyone to know why. There shouldn't be any problem (assuming this laptop is newer than four years old), as the integrated graphics in your processor has hardware H.264 decoding, so should play 1080p video fine.\n\nI would think that the currently installed drivers are outdated, or the factory Windows install is full of pre-installed crapware that's hogging resources.",
"Everyone is telling you only about the processor being designed for decoding. It may be more efficient, but you also have an extremely low end processor. I have a mid-low end amd and video plays just fine. For Intel pentium should work, but a mid range i3 would be well over the minimum."
] | [
"course will not function. To be perfectly clear, a Pandaboard es will not play any low quality video, so 1080p output via the HDMI is certainly and proven not possible.\nDue to PowerVR making the driver unavailable, and withholding the documentation on the GPU hardware, the only alternative is the difficult and inefficient reverse engineering method to develop a GPU driver. An effort was started in July 2012, but as of June 2013 there is no visible progress.\nThe Linaro Linux project had a Linux x11 software floating point GPU driver available, but all current efforts with ARM Linux seem to be",
"(DVD to XviD MPEG4) or the MainConcept H.264 Encoder performed 18% to nearly 24% slower in our standard benchmark scenarios\". Other commonly used applications, including Photoshop and WinRAR, also performed worse under Vista.\nMany low-to-mid-end machines that come with Windows Vista pre-installed suffer from exceptionally slow performance with the default Vista settings that come pre-loaded, and laptop manufacturers have offered to \"downgrade\" laptops to Windows XP—for a price. However, this \"price\" is unnecessary, as Microsoft allows users of Windows Vista and Windows 7 to freely \"downgrade\" their software by installing XP and then phoning a Microsoft representative for a new product",
"CPU would probably not be able to play back video, while others had disagreed. Other companies had announced plans for games, a photo editor, and blogging tools. Criticism Initial reaction to the Foleo in the trade press was mixed, with reviewers such as Tim Bajarin, Gizmodo, and Slashgear giving the device positive reviews, while other analysts noted that subnotebooks had never found a large market. Leslie Fiering, a vice president of research group Gartner stated that Palm has \"created a device that's not quite pocketable, but it's not quite full function, either\". Users on forums and news sites have mocked",
"output 500i in PAL regions.\nVisually, native 1080p produces a sharper and clearer picture compared to upscaled 1080p. Though only a handful of games available have the native resolution of 1080p, all games on the Xbox 360 and PlayStation 3 can be upscaled up to this resolution. Xbox 360 and PlayStation 3 games are labeled with the output resolution on the back of their packaging, although on Xbox 360 this indicates the resolution it will upscale to, not the native resolution of the game.\nGenerally, PC games are only limited by the display's resolution size. Drivers are capable of supporting very high",
"available free of charge for both macOS and Windows operating systems. There are some other free player applications that rely on the QuickTime framework, providing features not available in the basic QuickTime Player. For example, iTunes can export audio in WAV, AIFF, MP3, AAC, and Apple Lossless. In addition, macOS has a simple AppleScript that can be used to play a movie in full-screen mode, but since version 7.2 full-screen viewing is now supported in the non-Pro version. PictureViewer PictureViewer is a component of QuickTime for Microsoft Windows and the Mac OS 8 and Mac OS 9 operating systems. It",
"accurate with fast action, because it progressively scans frames, instead of the 1080i, which uses interlaced fields and thus might degrade the resolution of fast images.\n720p is used more for Internet distribution of high-definition video, because computer monitors progressively scan; 720p video has lower storage-decoding requirements than either the 1080i or the 1080p. This is also the medium for high-definition broadcasts around the world and 1080p is used for Blu-ray movies. HD on the World Wide Web/HD streaming A number of online video streaming/on demand and digital download services offer HD video, among them YouTube, Vimeo, Hulu, Amazon Video On",
"or spreadsheet software difficult. (Modern game consoles solve this problem by pre-filtering the 480i video to a lower resolution. For example, Final Fantasy XII suffers from flicker when the filter is turned off, but stabilizes once filtering is restored. The computers of the 1980s lacked sufficient power to run similar filtering software.)\nThe advantage of a 720 × 480i overscanned computer was an easy interface with interlaced TV production, leading to the development of Newtek's Video Toaster. This device allowed Amigas to be used for CGI creation in various news departments (example: weather overlays), drama programs such as NBC's seaQuest, The",
"Meyer disagreed with that performance assessment after running Jolicloud on a Nokia Booklet 3G in order to take advantage of that device's unusual 720p screen resolution. He wrote that the device's \"lousy Atom Z530 processor...really struggles under Windows 7 Starter Edition [but] flies on Jolicloud....I'm struggling to think of a rival Linux distro that can be so easily picked up and run by an average user\".\nIn Ars Technica, Ryan Paul wrote that \"there are a lot of good ideas on display in Jolicloud [now Joli OS] 1.0, but the nascent product still feels incomplete\". He saw no reason for Linux",
"a higher CPU clock. As with PS4 \"Slim\", this model also features support for USB 3.1, Bluetooth 4.0 and 5.0 GHz Wi-Fi. The PS4 Pro also includes 1 GB of DDR3 memory that is used to swap out non-gaming applications that run in the background, allowing games to utilize an additional 512 MB of the console's GDDR5 memory. Although capable of streaming 4K video, the PS4 Pro does not support Ultra HD Blu-ray.\nGames marketed by Sony as PS4 Pro Enhanced have specific optimizations when played on this model, such as 4K resolution graphics and/or higher performance. For games not specifically optimized, an option",
"because it does not guarantee the set is capable of rendering digital video at all frame rates encoded in source files with 1920 X 1080 pixel resolution. Most notably, a \"Full HD\" set is not guaranteed to support the 1080p24 format, leading to consumer confusion. DigitalEurope (formerly EICTA) maintains the HD ready 1080p logo program that requires the certified TV sets to support 1080p24, 1080p50, and 1080p60, without overscan/underscan and picture distortion. Computer monitors Most widescreen cathode-ray tube (CRT) and liquid-crystal display (LCD) monitors can natively display 1080p content. For example, widescreen WUXGA monitors support 1920x1200 resolution, which can",
"lower the resolution (from 1920×1080 to 960×540) of video signals outputs that are not protected by HDCP. Additionally, Microsoft maintains a global revocation list for devices that have been compromised. This list is distributed to PCs over the Internet using normal update mechanisms. The only effect on a revoked driver's functionality is that high-level protected content will not play; all other functionality, including low-definition playback, is retained. Hardware requirements and performance Around the time of its release, Microsoft stated, \"nearly all PCs on the market today will run Windows Vista,\" and most PCs sold after 2005 are capable of running",
"on the end user experience is largely the same as if they were logged on to a local PC. It is less effective at delivering multimedia, in part because the audio and video are not synchronized, so in circumstances where there is increasing latency, there is a proportional decrease in the quality of the end user experience. All protocols, it should be noted, are negatively impacted by increasing latency between the end user’s access device and the blade PC. One of the biggest challenges the blade PC vendors have experienced is how to minimize the impact of latency and deliver",
"display imagery at 1080p when docked. PlayStation 4 is able to display in 4K, though strictly only for displaying pictures.",
"supported up to eight players on a split screen, something that would have ordinarily caused slowdown to the point of unplayability on contemporary gaming hardware.",
"resolutions, depending on the chipset of the video card. Many game engines support resolutions of 5760×1080 or 5760×1200 (typically achieved with three 1080p displays in a multi-monitor setup) and nearly all will display 1080p at minimum. 1440p and 4K are typically supported resolutions for PC gaming as well.\nCurrently all consoles, Nintendo's Wii U and Nintendo Switch, Microsoft's Xbox One, and Sony's PlayStation 4 display games 1080p natively. The Nintendo Switch is an unusual case, due to its hybrid nature as both a home console and a handheld: the built-in screen displays games at 720p maximum, but the console can natively",
"struggling to run smoothly on Nintendo's platform – at a 720p resolution with a framerate of 23fps, and revealed that they are not allowed to release a game that is running below 30fps, but \"finding that extra 25% frame time is currently looking impossible\". In the official Forums he adds that the Wii U's market share was not worth the effort of porting. He explained that there was a possibility the game would be pushed for the Nintendo Switch, then known as the project NX. On 21 July 2015, Slightly Mad Studios informed the Nintendo Life news outlet that the",
"or sending the player the entire world state, which results in faster display for the player under the same bandwidth constraints, but exposes that data to interception or manipulation—a trade-off between security and efficiency.\nWhen game servers were restricted by limited available resources such as storage, memory, internal bandwidth, and computational capacity due to the technologies available and the cost of the hardware, coupled with internet connections that were slow, it was believed to be necessary to compromise on security for optimization to minimize the impact on the end-user. Today however, with the increased speed and power of multi-core computers, lower-priced",
"U.S. dollars and used on any laptop with sufficient computing power and memory, while the Pioneer DVJ players retail for around US$2500. Even a basic component-based setup can cost far more than a top-of-the-line laptop, software, and storage—especially if a sufficient computer already exists and thus doesn't have to be bought new. In addition, with this method, videos can then be manipulated to have more effects, different audio tracks, or even be completely different from the original.\nComputer-based systems can only run reliably on very powerful computers with the latest graphics cards, anything less can lead to lowered video quality, skips,",
"that can run on a console without a modchip installed, and also without the need of the PS2 Independence Exploit or any other software modification.\nHowever, players who were using HD Advance 2.0 retail pressed discs (CD or DVD) to format a Maxtor hard disk with 80 GB capacity and subsequently use the disc to play PS2 games from the HDD were reported experiencing a strange problem. HD Loader versions up to 0.7c boot up perfectly via the Independence Exploit but subsequent versions of HD Loader from 0.8 onwards freezes on the splash screen and refuses to start up if formatted",
"and Flash ROM) was doubled from 32 MB to 64 MB, part of which now acting as a cache, also improving the web browser's performance. PSP-3000 In comparison with the PSP-2000, the 3000, marketed in PAL areas as \"PSP Slim & Lite\" or \"PSP Brite\", has an improved LCD screen with an increased color range, five times the contrast ratio, a halved pixel response time, new sub-pixel structure, and anti-reflective technology to reduce outdoor glare. The disc tray, logos, and buttons were all redesigned, and a microphone was added. Games could now be outputted in either component or composite video using the",
"used is checkerboard rendering, wherein the console only renders portions of a scene using a checkerboard pattern, and then uses algorithms to fill in the non-rendered segments. The checkerboarded screen can then be smoothed using an anti-aliasing filter. Hermen Hulst of Guerrilla Games explained that PS4 Pro could render something \"perceptively so close [to 4K] that you wouldn't be able to see the difference\".\nPS4 Pro supports Remote Play, Share Play, and streaming at up to 1080p resolution at 60 frames per second, as well as capturing screenshots at 2160p, and 1080p video at 30 frames per second.\nIn late-2017, Sony issued",
"photo slideshow options and several music visualizations. Furthermore, the PlayStation 3 is able to play Blu-ray Disc and DVD movies as well as audio CDs out of the box, and also capable of adopting streaming media services such as Netflix.\nFor a web browser, the PS3 uses the NetFront browser, although unlike its successor PS4 which uses the same modern Webkit core as Safari from Apple, the PS3 web browser receives a low score in HTML5 compliance testing. However, unlike the PS4, the PS3 is able to play Adobe Flash, including full-screen flash.\nEarly versions of the PlayStation 3 system software also",
"criticized the ability to use these converters, as players with them often populate the top of the competitive ranking ladders. Though Blizzard has appealed to Sony and Microsoft to either prevent such converters, or to detect when such converters are used as to be able to segregate players into servers based on this, disabled players have spoken out against such action, as many need to use such converters to play the game on consoles lacking the ability to use a normal controller.\nAfter a year from its release, journalists observed that the player community was becoming more toxic, disrupting the enjoyment",
"rendered at a native 1080p on the PlayStation 4, and 4K on the Pro model.\nCrucially, the game runs at 60 frames per second on both consoles, fixing an issue with the original release of WipEout HD, that would occasionally drop the frame rate to 45fps. Loading times from the WipEout HD were also reduced. WipEout Omega Collection holds a solid 60fps even when processing two environments in the two-player split-screen mode. \nCreative Vault Studios and its partners outfitted WipEout Omega Collection with new hi-res textures and geometry, more striking colors, and added completely new effects like heat haze, and",
"its compact design does not permit it to use the Model 4's passive cooling.\nThe 4P's video display has solid, fully formed text characters. This results from the fact that its 9-inch screen has the same 640x240 resolution as the desktop's 12-inch screen, producing a greater density of pixels.\nTandy discontinued the 4P by spring 1985, stating that \"even though you won't find a more enthusiastic and devoted group of owners than our Model 4P folks, transportables just weren't moving well for any company that also sold a desktop version\". The best-selling transportables at this time were those of the Kaypro line by Non-Linear",
"DTS X.\nXbox One S additionally supports 2160p (4K resolution) video output, and high dynamic range (HDR) color using HDR10 (with a future update to add Dolby Vision HDR support for streaming video). 4K video can be played from supported streaming services and Ultra HD Blu-ray Disc, Games are upscaled from 1080p resolution, and are not rendered at 4K. The GPU on Xbox One S has a higher clock speed and ESRAM bandwidth than the original model, which can provide some performance improvements on games with dynamic resolution scaling or uncapped frame rates.\nThe console can monitor its internal temperature and adjust",
"the author is referring to the 720p HDTV format. However, in some cases it is incorrectly presented as an actual alternative format to 720p. No proposed or existing broadcast standard permits 720 interlaced lines in a video frame at any frame rate. Comparison with 1080i Progressive scanning reduces the need to prevent flicker by anti-aliasing single high contrast horizontal lines. It is also easier to perform high-quality 50↔60 Hz conversion and slow-motion clips with progressive video.\nA 720p60 (720p at 59.94 Hz) video has advantage over 480i and 1080i60 (29.97/30 frame/s, 59.94/60 Hz) in that it comparably reduces the number of 3:2 artifacts introduced",
"avoid crashing in the presence of SVC or 1080p50 (and higher resolution) packets. SVC enables forward compatibility with 1080p50 and 1080p60 broadcasting for older MPEG-4 AVC receivers, so they will only recognize baseline SVC stream coded at a lower resolution or frame rate (such as 720p60 or 1080i60) and will gracefully ignore additional packets, while newer hardware will be able to decode full-resolution signal (such as 1080p60).\nIn June 2016, EBU announced the \"Advanced 1080p\" format which will include UHD Phase A features such as high-dynamic-range video (using PQ and HLG) at 10 and 12 bit color and BT.2020 color",
"The game's native resolution became 720p, compared to the original 585p in the original Xbox 360 version, with an increased use of bloom lighting effect. Eurogamer commented that the game \"has the visual edge, not just thanks to its massively increased resolution but also through the accomplished use of the RSX's pixel shaders.\"\nAs a trade off for increased resolution, the amount of on-screen action has been reduced in the PS3 version to keep the game running at an acceptable speed. Eurogamer pointed out that there are fewer enemies spawned at one time in the PS3 version of the game, and",
"and 480p modes. This makes these releases look significantly better on progressive displays such as LCD TVs. The fast moving sprites in NES and SNES games generally create a significant amount of interlace artifacts on such displays that the 480p option resolves. However Hanabi Mega Drive titles still run in 50 Hz with the usual PAL conversion problems, despite not been released in PAL.\nInitially, some PAL Virtual Console games would not display correctly on high-definition televisions when connected via the component lead. However, starting with an update on April 13, 2007, certain newly added games, such as Punch-Out!!, support the \"Wii"
] |
Why are senses numbed when we are sick? | [
"The food part of it is that most of our sense of taste is actually our sense of smell. If your nose is all blocked up you won't be able to smell, and so most of your sense of taste is gone too. \n\nThe nicotine part of it is probably more psychological. You've learned from experience that smoking will make you feel awful if you're sick so you're conditioned to not want to do it when you're sick. Plus you're less likely to notice how bad the withdrawal symptoms are if you're already feeling bad for other reasons."
] | [
"Haptic memory Haptic memory is the form of sensory memory specific to touch stimuli. Haptic memory is used regularly when assessing the necessary forces for gripping and interacting with familiar objects. It may also influence one's interactions with novel objects of an apparently similar size and density. Similar to visual iconic memory, traces of haptically acquired information are short lived and prone to decay after approximately two seconds. Haptic memory is best for stimuli applied to areas of the skin that are more sensitive to touch. Haptics involves at least two subsystems; cutaneous, or everything skin related, and kinesthetic, or",
"of haptic sensitivity Haptic sensitivity can be impaired by a multitude of diseases and disorders, predominantly relating to skin injuries (incisions, burns, etc) and nerve lesions (through injury or impaired circulation). Additionally, loss of sensitivity (neuropathy) may be caused by metabolic, toxic and/or immunologic factors. Examples of medical conditions that can cause neuropathies are diabetes mellitus, chronic kidney disease, thyroid dysfunction (hyper- and hypothyroidism) as well as hepatitis, liver cirrhosis and alcohol dependency.\nLoss of the sense of touch is a catastrophic deficit that can impair walking and other skilled actions such as holding objects or using tools. Haptic therapy Immersive",
"as leprosy or shingles, or poisoning by toxins such as heavy metals. Many cases have no cause that can be identified, and are referred to as idiopathic. It is also possible for nerves to lose function temporarily, resulting in numbness as stiffness—common causes include mechanical pressure, a drop in temperature, or chemical interactions with local anesthetic drugs such as lidocaine.\nPhysical damage to the spinal cord may result in loss of sensation or movement. If an injury to the spine produces nothing worse than swelling, the symptoms may be transient, but if nerve fibers in the spine are",
"transmit information of discriminative touch, pressure, vibration, and conscious proprioception originating from spinal levels C2 through S5. These fibers are pushed in towards the posterior median sulcus to form the gracile fasciculus and the cuneate fasciculus of the posterior column–medial lemniscus pathway.\nIf the dorsal root of a spinal nerve were severed it would lead to numbness in certain areas of the body.",
"The presence of the tone resulted in a significant number (22%) of respondents reporting feeling uneasy or sorrowful, getting chills down the spine or nervous feelings of revulsion or fear.\nIn presenting the evidence to the British Association for the Advancement of Science, Professor Richard Wiseman said \"These results suggest that low frequency sound can cause people to have unusual experiences even though they cannot consciously detect infrasound. Some scientists have suggested that this level of sound may be present at some allegedly haunted sites and so cause people to have odd sensations that they attribute to a ghost—our findings support",
"information needed for taste, smell, sight and the ability to hear. The spinal nerves allow for the sensory and motor signals to be received, which provide a normal feeling and function for the arms and legs. Clinical significance In the event that the brain strikes the inside of the skull, there is a risk of a minor traumatic brain injury (concussion). This type of injury can alter brain function, cause memory loss, headaches an or nausea. A minor traumatic brain injury can be followed by post concussion syndrome. As there are a number of structures in the cranial cavity a",
"experienced within one or both ears are the most common given during the hypnotic retrieval of memories. Experiencers have compared these sensations to the insertions of long needles and to having a high powered laser aimed into the ear.\nThe insertion of long needle-like objects into the nasal passages is also common in reported abductions, and always allegedly performed without the aid of a speculum. This is quite unlike typical earthly medicine where a speculum would be used to allow doctors to see what they're doing. John G. Miller asserts \"We [terrestrial medical practitioners] certainly do not 'blindly' insert long objects",
"of the parts of the body. Neurologists test this sense by telling patients to close their eyes and touch their own nose with the tip of a finger. Assuming proper proprioceptive function, at no time will the person lose awareness of where the hand actually is, even though it is not being detected by any of the other senses. Proprioception and touch are related in subtle ways, and their impairment results in surprising and deep deficits in perception and action. Pain Nociception (physiological pain) signals nerve-damage or damage to tissue. The three types of pain receptors are cutaneous (skin), somatic",
" Paresthesia is a sensation of tingling, pricking, or numbness of the skin that may result from nerve damage and may be permanent or temporary. Balance and acceleration Balance, equilibrioception, or vestibular sense is the sense that allows an organism to sense body movement, direction, and acceleration, and to attain and maintain postural equilibrium and balance. The organ of equilibrioception is the vestibular labyrinthine system found in both of the inner ears. In technical terms, this organ is responsible for two senses of angular momentum acceleration and linear acceleration (which also senses gravity), but they are known together as equilibrioception.\nThe",
"form of synesthesia where individuals feel the same sensation that another person feels (such as touch). For instance, when such a synesthete observes someone being tapped on their shoulder, the synesthete involuntarily feels a tap on their own shoulder as well. People with this type of synesthesia have been shown to have higher empathy levels compared to the general population. This may be related to the so-called mirror neurons present in the motor areas of the brain, which have also been linked to empathy. Lexical-gustatory synesthesia This is another form of synesthesia where certain tastes are experienced when hearing words.",
"sensory integrative dysfunction experience problems with their sense of touch, smell, hearing, taste, sight, body coordination, and movement against gravity. Along with this might possibly be difficulties in movement, coordination and sensing where one's body is in a given space. According to proponents of sensory integration therapy, sensory integrative dysfunction is a common disorder for individuals with neurological learning disabilities such as an autism spectrum disorder, attention deficit hyperactivity disorder, and sensory modulation dysfunction.\nAyres' approach has proliferated among therapy and educational professionals over the past several decades. It has been met with some resistance within the occupational therapy profession and",
"feeling of numbness or a tingling, pain rarely occurs in the hand. Complaints of pain tend to be more common in the arm, up to and including the elbow area, which is probably the most common site of pain in an ulnar neuropathy. Pathophysiology In regards to the pathophysiology of ulnar neuropathy:the axon, and myelin can be affected. Within the axon, fascicles to individual muscles could be involved, with subsequent motor unit loss and amplitude decrease. Conduction block means impaired transmission via a part of the nerve. Conduction block can mean myelin damage to the involved area, slowing of conduction",
"which can be used to infer a higher level of information. The results of receiving and processing these cues are collectively known as the sense of touch, and are the subject of research in the fields of psychology, cognitive science, and neurobiology.\nThe word \"haptic\" can refer explicitly to active exploration of an environment (particularly in experimental psychology and physiology), but is often used to refer to the whole of the somesthetic experience. Somatosensory system The somatosensory system assimilates many kinds of information from the environment: temperature, texture, pressure, proprioception, and pain. The signals vary for each of these",
"inability to taste is called ageusia. Olfactory Smells in the external world activate hair receptors in nostrils. These receptors then send signals to the olfactory bulb, which is located at the base of the brain. Anosmia is the inability to smell. Somatosensory Somatosensory sensations occur when receptors detect changes on one's skin or within one's body. Cutaneous sensations Sensations on the skin are detected by cutaneous receptors. These receptors may feel sensations such as pain, tickle, cold, hot, soft, and rough. Mechanoreceptors detect light pressure (e.g., caress), vibration, and texture, nociceptors detect strong pressure (e.g., pain), and thermoreceptors detect temperature.\nFor",
"General sense (anatomy) In medicine and anatomy, the general senses are the senses which are perceived due to receptors scattered throughout the body such as touch, temperature, and hunger, rather than tied to a specific structure, as the special senses vision or hearing are. Often, the general senses are associated with a specific drive; that is, the sensation will cause a change in behavior meant to reduce the sensation.",
"a distortion or lack of taste. If there is suspicion of a change in the sense of smell, each nostril is tested with substances of known odors such as coffee or soap. Intensely smelling substances, for example ammonia, may lead to the activation of pain receptors (nociceptors) of the trigeminal nerve that are located in the nasal cavity and this can confound olfactory testing. Vision (II) The optic nerve (II) transmits visual information.\nDamage to the optic nerve (II) affects specific aspects of vision that depend on the location of the lesion. A person may not be able to see",
"coordination, causing them to seem clumsy or unsteady. Other sensory deficits include problems with hearing, smell, taste, or touch. Tinnitus, a ringing or roaring in the ears, may occur. A person with damage to the part of the brain that processes taste or smell may perceive a persistent bitter taste or noxious smell. Damage to the part of the brain that controls the sense of touch may cause a TBI patient to develop persistent skin tingling, itching, or pain. These conditions are rare and difficult to treat. Emotional and behavioral problems TBI may cause emotional or behavioral problems and changes",
"how other senses react. As participants watched a rubber hand be stroked, their hand was also stroked in a similar fashion, allowing the individual to attribute their own sensation to what they were watching rather than what was happening to their own body. Therefore, when the rubber hand was then manipulated, for example hitting it with a hammer, the participant feels an immediate shock and pain as they fear that it is their own hand that is in danger. This serves as evidence that the visual system is capable of not only manipulating where an individual perceives another sense to",
"with prolonged cocaine use. However, formication may also be the result of normal hormonal changes such as menopause, or disorders such as peripheral neuropathy, high fevers, Lyme disease, skin cancer, and more. Gustatory This type of hallucination is the perception of taste without a stimulus. These hallucinations, which are typically strange or unpleasant, are relatively common among individuals who have certain types of focal epilepsy, especially temporal lobe epilepsy. The regions of the brain responsible for gustatory hallucination in this case are the insula and the superior bank of the sylvian fissure. General somatic sensations General somatic sensations of a",
"Saccular acoustic sensitivity Effects Saccular acoustic sensitivity has a variety physiological as well as mental/emotional effects. Physical Effects Perhaps the most observable physical response is goose bumps. A similar effect is the manifestation of chills. Some sounds have been known to cause reflexive muscle movements like a twitch or even a jump. Since these physical effects are easily recorded and are linked consistently with strong emotion, they have been used in several types of psychological studies. Mental/Emotional Effects Certain sounds, such as fingernails drawn down a blackboard, cause strong feelings of aversion or even fear in most humans. A",
"the body adds efferent signal information and leads to a more fluid perception of body transfer. When information from one form of signal (e.g. touch) does not match the signals from another sense (e.g. vision), the body still attempts to integrate this information. Specifically the rubber hand illusion is associated with activity in the multisensory areas, most notably the ventral premotor cortex. However, it remains to be demonstrated that this illusion does not simply reflect the dominant role of vision and that the premotor activity does not reflect a visual representation of an object near the hand. Drug-induced enhancement With",
"taste (gustatory system), or if it is caused by a neurological or psychiatric disorder. Phantosmia usually goes away on its own, though this can sometimes be gradual and occur over several years. When caused by an illness (e.g., sinusitis), it should go away when the illness resolves. If the problem persists or causes significant discomfort, a doctor might recommend nasal saline drops, antidepressant or anticonvulsant medications, anesthesia to parts of the nose, or in very rare circumstances, surgical procedures to remove the olfactory nerves or bulbs. Symptoms Other olfactory disorders such as hyposmia and anosmia have been found to be",
"Nociception Nociception (also nocioception or nociperception, from Latin nocere 'to harm or hurt') is the sensory nervous system's response to certain harmful or potentially harmful stimuli. In nociception, intense chemical (e.g., chili powder in the eyes), mechanical (e.g., cutting, crushing), or thermal (heat and cold) stimulation of sensory nerve cells called nociceptors produces a signal that travels along a chain of nerve fibers via the spinal cord to the brain. Nociception triggers a variety of physiological and behavioral responses and usually results in a subjective experience of pain in sentient beings. Detection of noxious stimuli Potentially damaging mechanical, thermal, and",
"of the ability to feel extremes of hot or cold, especially in the hands. Each patient experiences a different combination of symptoms. These symptoms typically vary depending on the extent and, often more critically, to the location of the syrinx within the spinal cord.\nSyrinxes usually result from lesions that partially obstruct CSF flow. At least ½ of syrinxes occur in patients with congenital abnormalities of the craniocervical junction (e.g. herniation of cerebellar tissue into the spinal canal, called Chiari malformation), brain (e.g. encephalocele), or spinal cord (e.g. myelomeningocele—see Congenital Neurologic Anomalies: Brain Anomalies). For unknown reasons, these congenital abnormalities often",
"drug, and may result in persons with lesions in the insula reporting that their bodies have forgotten the urge to use, according to this study. Subjective certainty in ecstatic seizures A common quality in mystical experiences is a strong feeling of certainty which cannot be expressed in words. Fabienne Picard proposes a neurological explanation for this subjective certainty, based on clinical research of epilepsy. \nAccording to Picard, this feeling of certainty may be caused by a dysfunction of the anterior insula, a part of the brain which is involved in interoception, self-reflection, and in avoiding uncertainty about the internal representations",
"all involve two key components.\nFirst, nociception is required. This is the ability to detect noxious stimuli which evoke a reflex response that rapidly moves the entire animal, or the affected part of its body, away from the source of the stimulus. The concept of nociception does not imply any adverse, subjective \"feeling\" – it is a reflex action. An example in humans would be the rapid withdrawal of a finger that has touched something hot – the withdrawal occurs before any sensation of pain is actually experienced.\nThe second component is the experience of \"pain\" itself, or suffering – the internal,",
"Syringomyelia Signs and symptoms Syringomyelia causes a wide variety of neuropathic symptoms, due to damage to the spinal cord. Patients may experience severe chronic pain, abnormal sensations and loss of sensation, particularly in the hands. Some patients experience paralysis or paresis, temporarily or permanently. A syrinx may also cause disruptions in the parasympathetic and sympathetic nervous systems, leading to abnormal body temperature or sweating, bowel control issues, or other problems. If the syrinx is higher up in the spinal cord or affecting the brainstem, as in syringobulbia, vocal cord paralysis, ipsilateral tongue wasting, trigeminal nerve sensory loss, and other signs",
"modalities including taste, hearing, smell, heat sensation, volume control, and vision. They can also regulate internal functions of our body including, but not limited to, osmotic pressure in cells, blood pressure in veins and arteries, micturition, and heart electrophysiology and contractility. In addition to these functionalities, stretch-activated ion channels have also been found to be involved with balance and proprioceptive sensation.\nChannels that have traditionally been known as just “voltage-“ or “ligand-gated” have also been found to be mechanically sensitive as well. Channels exhibit mechanical sensitivity as a general property. However, mechanical stress affects various types of channels in different",
"because of \"blunt trauma\", such as coup-contrecoup damage, meningitis, and tumors of the frontal lobe of the brain. These injuries often lead to a reduced ability to taste and smell. Lesions of the olfactory nerve do not lead to a reduced ability to sense pain from the nasal epithelium. This is because pain from the nasal epithelium is not carried to the central nervous system by the olfactory nerve - it is carried to the central nervous system by the trigeminal nerve. Aging and smell A decrease in the ability to smell is a normal consequence of human",
"incapacitate a person. Less powerful sound waves can cause humans to experience nausea or discomfort. The use of these frequencies to incapacitate persons has occurred both in anti-citizen special operation and crowd control settings.\nThe possibility of a device that produces frequency that causes vibration of the eyeballs—and therefore distortion of vision—was suggested by paranormal researcher Vic Tandy in the 1990s while attempting to demystify a \"haunting\" in his laboratory in Coventry. This \"spook\" was characterised by a feeling of unease and vague glimpses of a grey apparition. Some detective work implicated a newly installed extractor fan that,"
] |
Who/What Is Boko Haram? | [
"A terrorist group in Nigeria. Just like ISIS in Syria, the Taliban in Afghanistan and Pakistan, and al-Shabaab in Somalia, their goal is to take control away from the national government and form their own Islamist government."
] | [
"Boko Haram Name The group's name has always been Jamā'atu Ahli is-Sunnah lid-Da'wati wal-Jihād (جماعة أهل السنة للدعوة والجهاد), meaning \"Group of the People of Sunnah for Dawa and Jihad\". It is also known as Wilayat Garb Ifrqiya, meaning \"West African Province\", since March 2015 after becoming part of the Islamic State.\nThe name \"Boko Haram\" is usually translated as \"Western education is forbidden\". Haram is from the Arabic حَرَام (ḥarām, \"forbidden\"); and the Hausa word boko (the first vowel is long, the second pronounced in a low tone), meaning \"fake\", which is used to refer to secular Western education. Boko",
"Chibok ambush Background The Salafi jihadist Boko Haram movement launched an insurgency against the Nigerian government following a unsuccessful uprising in 2009. Supported by several other Jihadist groups such as al-Qaeda, the group uses raids, assaults, and ambushes to terrorize its civilian opponents and destabilize the government with the ultimate goal of establishing an Islamic state in northern Nigeria. Boko Haram considers all \"Western or secular ideas [...] heretical and worthy of attack\", and thus often targets Western-influenced schools. Its most infamous attack in this regard was the abduction of 276 female students in Chibok on 14 April 2014.\nDue to",
"2015 Chad suicide bombings Boko Haram Boko Haram is a Salafist jihadi Islamic extremist organization with origins in the West African country of Nigeria. The group's primary goal is the takeover of the Nigerian government in order to establish a theocracy under strict Islamic law. While Boko Haram participate in a wide range of terrorist activities including suicide bombings, and massacres, the group is widely known for the kidnapping of women and young girls, most notably the Chibok kidnappings. Due to an ever-increasing amount of activity in and outside the borders of Nigeria, Boko Haram was officially designated as an",
"its militant attacks. The group is predominantly active in the former territory of the Bornu Empire, now the Borno State in northern Nigeria. Boko Haram launched its first terror attack in 2011, and has since been in a constant war with the Nigerian government. Boko Haram is particularly vicious against Nigerian Christians, who they see as infidels living in their proposed Islamist state. The militant group had wiped out multiple villages leading up to the Borno Massacre. The violence became so widespread that on May 14, 2013, Nigerian President Goodluck Jonathan declared a state of emergency in Northern Nigeria and",
"Battle of Kodunga Background Boko Haram is an Islamic militant group, who pledges allegiance to the Islamic State of Iraq and the Levant. Boko Haram has long been carrying out attacks in Nigeria, and elsewhere in Northern Africa. Past estimates have stated that Nigeria held the highest number of terrorist attacks in 2013.\nIn September, 2014, \"authoritative\" military reports say that Boko Haram fighters attempted to capture the town of Kodunga, a small village 40 miles north of Maiduguri. Nigerian infantry successfully repelled the attack through a combined assault of ground soldiers and aerial attacks. 100 Boko Haram fighters were",
"June 2014 Borno State attacks Background Boko Haram is an Islamic terrorist group opposed to the Westernization of Nigeria, which they have stated is the root cause of criminal behaviour in the country. Thousands of people have been killed in attacks perpetrated by the group, and the federal government declared a state of emergency in May 2013 in Borno State in its fight against the insurgency. The resulting crackdown, however, has failed to stabilise the country.\nBoko Haram's attacks have intensified in 2014. In February, the group killed more than 100 Christian men in the villages of Doron Baga and Izghe.",
"has been labeled as infidels by Islamist group Boko Haram, due to their willingness to work with the Nigerian government.\nResearchers have identified Izala as a fundamentalist group which shares many theological views with the deadly Boko Haram. It has been accused of being responsible for violent protests. The rise of Izala in the 1980s heralded the radicalization of Northern Nigerian society. The organisation is generously sponsored by Saudi Arabia, and is responsible for stirring sectarian hate against Shia and Sufi Muslims in Nigeria.",
"Niger and northern Cameroon. In the 2009–2018 period, more than 27 000 people have been killed in the fighting in the countries around Lake Chad. Boko Haram consists of two factions, one is led by Abubakar Shekau and it uses suicide bombings and kill civilians indiscriminately. The other is named Islamic State West Africa Province and it generally attacks military and government installations. Somalia and the Horn of Africa Al-Shabaab is a militant jihadist terrorist group based in East Africa, which emerged in 2006 as the youth wing of the Islamic Courts Union. A number of foreign jihadists have gone",
"Chibok schoolgirls kidnapping Background The terrorist group Boko Haram wants to institute an Islamic caliphate in Nigeria and is in particular opposed to western-style modern education, which they say lures people away from following Islamic teaching as a way of life. By 2014, tens of thousands of people had been killed in attacks perpetrated by the group, and the Nigerian federal government declared a state of emergency in May 2013 in Borno, Yobe and Adamawa states in its fight against the insurgency. The resulting crackdown led to the capture or killing of hundreds of Boko Haram members, with the remainder",
"The Nigerian government claims that Boko Haram is \"the West Africa branch of the world-wide Al-Qaida movement\" with connections to al-Shabaab in Somalia and AQIM in Mali. The Nigerian government denies having committed human rights abuses in the conflict, and therefore oppose U.S. restrictions on arms sales, which they see as being based on the U.S. mis-application of the Leahy Law due to concerns over human rights in Nigeria. The U.S. had supplied the Nigerian army with trucks and equipment but had blocked the sale of Cobra helicopters. In November 2014 the U.S. State department again refused to supply Cobras,",
"Haram has also been translated as \"Western influence is a sin\" and \"Westernization is sacrilege\". Until the death of its founder Mohammed Yusuf, the group was also reportedly known as Yusifiyya. Northern Nigerians have commonly dismissed Western education as ilimin boko (\"fake education\") and secular schools as makaranta boko. Ideology Boko Haram was founded upon the principles of the Salafism advocating Sharia law. It developed into a Jihadist group in 2009. The movement is diffuse, and fighters associated with it follow the Salafi doctrine. Their beliefs tend to be centered on strict adherence to Wahhibism, which is an extremely strict",
"Starting in late January 2015, a coalition of military forces from Nigeria, Chad, Cameroon, and Niger began a counter-insurgency campaign against Boko Haram. On 4 February 2015, the Chad Army killed over 200 Boko Haram militants. Soon afterwards, Boko Haram launched an attack on the Cameroonian town of Fotokol, killing 81 civilians, 13 Chadian soldiers and 6 Cameroonian soldiers. On 17 February 2015 the Nigerian military retook Monguno in a coordinated air and ground assault.\nOn 7 March 2015, Boko Haram's leader Abubakar Shekau pledged allegiance to the Islamic State of Iraq and the Levant (ISIL) via an audio",
"to announce Boko Haram's terms for negotiation, i.e. the release of all imprisoned members. The increased sophistication of the group led observers to speculate that Boko Haram was affiliated with Al-Qaeda in the Islamic Maghreb (AQIM), which was active in Niger.\nBoko Haram has maintained a steady rate of attacks since 2011, striking a wide range of targets, multiple times per week. They have attacked politicians, religious leaders, security forces and civilian targets. The tactic of suicide bombing, used in the two attacks in the capital on the police and UN headquarters, was new to Nigeria. In Africa as a whole,",
"in the forested areas. May 2014 Massacre On May 06, 2014, around 200 people were killed when insurgents, dressed in military uniforms, attacked Gamboru, a town in the state of Borno and on the Nigeria-Cameroon border. The attackers stormed into the town when some of the residents were fast asleep and set ablaze houses while shooting at residents who tried to escape from the fire. Boko Haram Boko Haram is an Islamist terrorist movement in Nigeria that is seeking to impose sharia law upon the entire country. Founded by Mohammed Yousuf, the group commonly bombs government buildings and churches in",
"Yobe State school shooting Background The Boko Haram (sometimes referred to as the Nigerian Taliban) was founded in 2002 to seek the establishment of an Islamic state and fight against the Westernization of Nigeria, which the group maintains is the root cause of criminal behaviour in that country. From 2009 to 2013, violence linked to the Boko Haram insurgency resulted in 3,600 deaths, including 1,600 civilians. In mid-May 2013, Nigeria declared a state of emergency in Adamawa, Borno, and Yobe States, as it aimed to end the Boko Haram insurgency. The resulting crackdown has led to the capture or killing",
"international terrorist organization by the United States. In 2015, Boko Haram declared its allegiance to the Islamic State in Iraq and the Levant. The group was accepted as a member of the wider caliphate by official decree of the Caliph Abu Bakr al-Baghdadi. Use of women and children in suicide attacks Boko Haram in recent years has increasingly begun to use women and children as suicide bombers. Boko Haram typically uses kidnapped individuals as suicide attackers, coercing them into committing acts of terror either through indoctrination or under threat. In many cases, these women and children are drugged by Boko",
"2009 Boko Haram uprising Bauchi, Bauchi State On 26 July, more than 50 people were killed and several dozen were injured in Bauchi when a gun-battle erupted as a police station was attacked by 70 Nigerian Boko Haram sect members who possessed grenades and guns. One government soldier and 32 Boko Haram militants were killed in the aftermath of the initial attack. The government claimed that 39 militants had been killed, and confirmed the death of a soldier. The attack was initiated by Boko Haram after their leaders were detained by the police. Security forces retaliated by raiding the neighbourhoods",
"2011 Damaturu attacks Background Boko Haram have become more proficient in carrying out attacks since a 2009 clash with security forces that led to the death of its leader Ustaz Mohammed Yusuf, Since then it has either claimed or been blamed for numerous attacks on Nigerian government and civilian targets. Most attacks have been the predominantly Muslim north of Nigeria, though the group's name has been called out in other bombings such as in the capital city of Abuja. The group itself has since factionalised with some allied to Al Qaeda in the Islamic Maghreb and some expecting terms of",
"This announcement came days after an attack by Boko Haram that left 18 dead in northern Nigeria. United States responses In 2012, the U.S. Department of State had an internal debate on whether to place Boko Haram on its list of FTOs (Foreign Terrorist Organizations). The Bureau of Counterterrorism leaned towards designation while the Bureau of African Affairs urged caution. Officials from the Justice Department, the FBI, the CIA, and a number of members of Congress urged the State Department to designate Boko Haram as an FTO. The Nigerian government voiced its opposition to an FTO designation, citing concerns that",
"which has become one of the UN's deadliest international missions. Boko Haram spillover Having cooperated and trained alongside AQIM in the Sahel since 2006, the Nigerian Islamist group Boko Haram began expanding into Chad and Niger in 2014 after successfully seizing territory in the insurgency in Nigeria. By then controlling a significant area around Lake Chad, a coalition of Western African countries launched an offensive against the group in January 2015. The group eventually departed its alliance with al-Qaeda, pledging allegiance to ISIL in March 2015. By the end of 2015 Boko Haram had been largely pushed to retreat into",
"Nation Under Siege Nation Under Siege, also known as Boko Haram, is a 2013 Nollywood film that was directed by Pascal Amanfo and executive produced by Double D. Synopsis The film's premise follows counter terrorist expert that is trying to stop a group of Islamic terrorists that are terrorizing and slaughtering Nigerians. Reception The film received some controversy over Majid Michel, a Ghanian actor, portraying a Nigerian terrorist, and for its depiction of Islamic terrorism, which resulted in the movie getting banned in Ghana. Film theaters in Nigeria also declined to screen the film for the same reasons and Amanfo",
"being underemployed. Boko Haram targets individuals or organizations who encourage lifestyles believed to follow western culture, like the US or Europe. One targeted attack was on women who were attacked while attending school, leading to roughly 250 girls being kidnapped.\nThe Boko Haram are responsible for roughly 10,000 deaths since 2011 and roughly 2.6 million displaced Nigerians. Nigeria's economy suffered when attacks held by the Boko Haram began on local businesses, government buildings, and local facilities such as schools and churches. Local businesses began to migrate south as a result of being attacked or due to fear of the Boko Haram.",
"it would raise Boko Haram's stature and have implications for humanitarian aid in the region where Boko Haram operated. Twenty academic experts on Nigeria signed a letter to the State Department urging it not to designate Boko Haram as an FTO, saying that it would hinder NGO efforts in the region and might legitimize the Nigerian Army's human rights abuses in its efforts to fight Boko Haram.\nThe U.S. State Department designated Boko Haram and its offshoot Ansaru as terrorist organizations in November 2013, citing Boko Haram's links with AQIM and its responsibility for \"thousands of deaths in northeast and central",
"wider religious warfare. He called on citizens to question the strategic intentions of the perpetrators, and said that counterterrorism policy must address those strategic intentions.\nDiscussing Boko Haram and its strategy to incite retaliatory sectarian violence, Azazi said, \"Have we thought of what their ultimate intentions are? Why will somebody go on to bomb Christians on a Christmas Day? Look at the ultimate intentions. Do they want to really raise tempers elsewhere?\" Boko Haram terms Nigeria an \"enemy of Islam\" and seeks the disintegration of Nigeria as a country.\nRather than pursue counterterrorism solutions that would require mass policing of the",
"multiplies its activities on Twitter especially via their smartphones, as well as through YouTube news channels. Most tweets and comments of the group's supporters denounce the Nigerian government and call for support for Boko Haram movement. The tweets are written in Arabic at first and then translated and passed on in English and French, which reflect the group's desire to place itself in the context of what it sees as global jihad. In a recent study conducted in 2015, researchers have shown how Boko Haram related tweets include rejection of the movement by non-members of the organisation. Alternative narratives Van",
"refers to his group by its previous name of Jamatu Ahlis Sunna Lidawatti wal Jihad.\nOn 23 August 2016, the Nigerian Army announced it conducted an overnight air-operation that was 'very successful' in killing the leadership of Boko Haram. Among those presumed killed was Abubakar Shekau, he died in an aerial bombardment in Taye village. The Nigerian Army claims that the disputed Boko Haram leader died from injuries to his shoulders while he was performing prayer.\nOn 28 August, the Nigerian president Muhammadu Buhari, retracted the military's statement and claimed that the Boko Haram leader was 'wounded' but not killed in the",
"Ansaru Ideology Unlike Boko Haram, whose ideology is focused on Nigeria, Ansaru is more internationally orientated. Its beliefs are closely aligned to those of al-Qaeda. Furthermore, the group has vowed to restore the \"dignity of Muslims in black Africa\" by reviving the Sokoto Caliphate. The group was also critical of Boko Haram's indiscriminate killing of civilians, with Ansaru commander Khalid Barnawi claiming that his followers would not kill innocent non-Muslims or security officials, except in \"self defense\" and that the group would defend the interests of Islam and Muslims not just in Nigeria but the whole of Africa.\nAnsaru's motto is",
"international attention.\nThe U.S. Bureau of Counterterrorism provides the following summary of Boko Haram's 2013 foreign operations:\nIn February 2013, Boko Haram was responsible for kidnapping seven French tourists in the far north of Cameroon. In November 2013, Boko Haram members kidnapped a French priest in Cameroon. In December 2013, Boko Haram gunmen reportedly attacked civilians in several areas of northern Cameroon. Security forces from Chad and Niger also reportedly partook in skirmishes against suspected Boko Haram members along Nigeria's borders. In 2013, the group also kidnapped eight French citizens in northern Cameroon and obtained ransom payments for their release.\nBoko Haram has",
"banana republic\". However, on 8 January 2012 the president would announce that Boko Haram had in reality infiltrated both the army and the police, as well as the executive, parliamentary and legislative branches of government. Boko Haram's spokesman also claimed responsibility for the killing outside his home in Maiduguri of the politician Abba Anas Ibn Umar Garbai, the younger brother of the Shehu of Borno, who was the second most prominent Muslim in the country after the Sultan of Sokoto. He added: \"We are doing what we are doing to fight injustice, if they stop their satanic ways of doing",
"the outskirts of Maiduguri city.\nOn 22 March 2017, the Nigerian Department of State Services (DSS) announced that a suspected member of Boko Haram had been arrested in northeastern Yobe State. The suspect confessed details of a plot to attack the American and British embassies, and other western targets in Abuja. The DSS also later announced that between 25 and 26 March 2017, five suspected members of Boko Haram had been arrested, thus thwarting the plot.\nOn 2 April 2017, the Nigerian military began what it said was its \"final offensive\" to retake Boko Haram's last strongholds.\nOn 17 May 2017, the Nigerian"
] |
How are reflections of camera men/women avoided in films? | [
"In the editing process, ideally once the movie has what they call \"picture lock, (meaning all the cuts are in place but the special effects havent been done yet) they find each surface where there are reflections and paint them out.\n\nOne common way of doing this is by \"clean plating,\" which is when visual effects artists find a frame of the shot where there are reflections and nothing is blocking them like characters or props or whatever, then paint out the thing being reflected, then use that \"cleaned up\" frame and move JUST the cleaned up bit through the rest of the shot. Most of the time this means then adding another instance of the original shot containing just the things blocking the reflecty thing so it all looks seamless. \n\nSorry about the formatting/brevity. On mobile and I figured this was a good enough explanation for r/ELI5"
] | [
"as a marginalized subject . Additionally, film critics admire its use of mirrors as a way to show Kahlo's unique point of view . Awards The film was honored with the Gran Coral as the Best Picture of the 1984 Havana Film Festival of New Latin American Cinema (NCLA), and Ofelia Medina, in the role of Frida, received a Coral as the Best Actress.",
"stage machinery, pyrotechnics, substitution splices, and dissolves. The mirror sequence in the film is based on a routine that had long been popular in music halls. The effect was not produced with a real mirror, which would have reflected the studio windows and the camera; instead, there were two actors on the set, one of whom mimicked the other's gestures from the opposite side of the imaginary \"glass.\" The comedian Max Linder revived the mirror routine in his 1921 film Seven Years Bad Luck. Release The film's original title is Les Hallucinations du baron de Münchausen; it is also known",
"Union Maids Production Like many of her other films, Julia Reichert used a collaborative, nonhierarchical model of filmmaking during the production of Union Maids. She and James Klein shot the documentary on video rather than film. This allowed them longer interviews with their subjects, which also allowed the three women to better shape their interviews, and thus their contributions to and representation in the film. Shooting on video also allowed Reichert and Klein to use student cinematographers, as they could watch the video live and give real-time direction without wasting expensive film stock.",
"correspond to the spouting water, reminiscent of gargoyle fountains. Each face is cropped so that no hair and usually no ears are visible. Since there is no tripod designed for cameras turned on their sides, an adjustable barber/dentist's chair was used to minimize the need for the movement of the state-of-the-art camera during filming. Nonetheless, in some case, digital manipulation was necessary to properly simulate puckering in the exact proper location on the video. Many of the faces had to be stretched in order to get the mouths properly positioned. Additionally, each video was color-corrected for brightness, contrast",
"film, such as the \"moving camera, composition, editing, lighting, and all varieties of sound.\" While acknowledging the value in inserting positive representations of women in film, some critics asserted that real change would only come about from reconsidering the role of film in society, often from a semiotic point of view.\nClaire Johnston put forth the idea that women's cinema can function as \"counter cinema.\" Through consciousness of the means of production and opposition of sexist ideologies, films made by women have the potential to posit an alternative to traditional Hollywood films. Initially, the attempt to show \"real\" women was",
"see is different from what the actor sees, because the camera is not right behind the actor, but the position of the actor is often chosen so that his or her image is nicely framed in the mirror for the camera.\nAlthough the name of the effect refers to a woman, Venus, the effect is more general. The effect is seen with an animal apparently looking at itself in a mirror in The Lady and the Unicorn (French: La Dame à la licorne) tapestries, where the unicorn appears to be gazing at its own reflection as it kneels on the ground.\nBertamini",
"conceal their individual identities. The film is unique in that the viewer is able to see the filmmakers but not the subjects themselves. The interactions between the Weathermen and filmmakers raise many questions about the role of documentary film and the contrived nature of its set-ups. This is apparent at several points in the film where the Weathermen express concern over the filmmakers catching their faces on camera, or complain about the artificiality of the overall conversation taking place. In fact, de Antonio describes going out and burning a pile of possible incriminating film negatives following the filming (Rosenthal, 1978).",
"These viewers were able to understand some of the techniques, such as ellipses of time; however, more complex techniques, like shot/reverse shot were more difficult for them to understand.\nSome filmmaking techniques derive meaning through past experiences or ideologies that influence the way viewers see certain images or sequence of images. An example of this would be how camera angles can affect our perception of what is occurring on screen. Low angle shots in which the camera is pointed up at a subject tend to make the subject appear more powerful or stronger. While high angle shots can make a subject",
"moves the camera and fails to utilize even moderately interesting angles or setups.\" He calls it an example of \"the no-budget theory of filmmaking,\" which makes The Astounding She-Monster \"dull\" and \"tedious\" as \"the various players meander through the same exact woods, using the same exact camera setups.\"\nFor British critic Phil Hardy, \"The only point of interest in this clumsily directed, silly film is its misogynistic attitude toward women in its association of female beauty with evil, and unconventional independence with male fears of castration. The point is even more forceful for being so unselfconsciously expressed in [Frank] Hall's wooden",
"prints on composite panel. He then hand paints around the image with custom mixed layers of paint before multi layers of epoxy resin and automotive finish are applied to the top, achieving a mirror like reflective surface. Cameras of Cinema Similar to Guns of Cinema, the Cameras of Cinema series expresses Georgopoulos' affinity for the film and television industry as he photographed a number of motion picture and television cameras which were used to make Titanic, Star Wars, Michael Jackson's Thriller music video, James Bond, Kill Bill, and Apocalypto, among others. Sculpture Identity also plays a role in a series",
"a device which Dunn improved upon over the years, which explains why foreground and background are both in focus even though the lenses and film stock used in 1941 could not allow for such depth of field.\nBut Toland hated this technique, since he felt he was \"duping,\" (i.e. a copy of a copy) thereby lowering the quality of his shots. Thus other shots (like the shot of Susan Alexander Kane's bedroom after her suicide attempt, with a glass in the foreground and Kane entering the room in the background) were in-camera composites, meaning the film was exposed twice—another technique that",
"Schmeerguntz Photography Nelson and Wiley decided to make a film before they had a subject in mind. Nelson had the idea while looking at the sink in her house and thinking about the contrast between how she actually spent her time and how images in media suggested people spend their time. Neither had worked with a camera before, so Nelson's husband Robert spent half an hour showing them how to operate one.\nThey shot footage of dirty or grimy objects around the house. As they were filming, they came to observe a contrast between the unpleasantness of their subjects and the",
"On the Thank You Bonus DVD, the last shot of the video features a woman looking at a mirror image of herself viewing her whole body while the mirror image drifts away. In another version, she is looking at a mirror image of her face, with water (possibly rain) dripping down the reflection of the mirror. Acoustic version Weiland and Stone Temple Pilots guitarist Dean DeLeo performed an impromptu acoustic version of \"Plush\" on the MTV show Headbangers Ball in 1992. The recording was originally only available on a CD single from the United Kingdom for their single, \"Creep\", and",
"shoot of Women Are Better Diplomats.\nThroughout the shoot, the film yielded mixed results as it was still very sensitive to different color temperatures caused by solar altitude at different times of day. Thus, outdoor shots were difficult to handle: A lawn in front of a castle appeared completely yellow, later brown, then bluish. The technology was not fully developed, and Agfa labs were virtually using the shooting of the film as testing grounds for their new stock, continually changing the formula throughout the shoot based upon unsatisfactory results, so that entire scenes had to be repeated once a new formula",
"The \"mise-en-scène\", along with the cinematography and editing of a film, influence the verisimilitude or believability of a film in the eyes of its viewers. The various elements of design help express a film's vision by generating a sense of time and space, as well as setting a mood, and sometimes suggesting a character's state of mind. \"Mise-en-scène\" also includes the composition, which consists of the positioning and movement of actors, as well as objects, in the shot. These are all the areas overseen by the director. One of the most important people that collaborates with the director is the",
"depth of focus.\nThere are even adapters that allow lenses from 35mm cine cameras to be used on smaller film and digital formats. Examples In the film The Rules of the Game (1939), a couple flirts in the foreground while the woman's husband enters in the background. Director Jean Renoir chose to keep the husband out-of-focus so that his presence is hinted, but not emphasized.",
"woman's jacket, Vermeer is able to create a balance between the two ends of his painting. The window that the curtain would cover is very similar to that in his painting Woman with a Water Jug.\nOn that same side of the wall, Vermeer displays a framed mirror. The black frame is most likely made of ebony, which indicates wealth and status. The fact that Vermeer uses a mirror is also distinctive. Vermeer associated the sense of reflection to portray the woman with vanity or feminine power. Also due to Vermeer's interest in certain Greek muses, he used the mirror to",
"are many other directorial trademarks throughout his films. From 1976's Salon Kitty onwards, mirrors play a large part in the set design. Sometimes he even goes as far as to begin a scene with a mirror shot, then pan over to the action being reflected, giving a disorienting feeling. His erotic films – especially The Key, Miranda and All Ladies Do It – often accentuate women's ample buttocks and pubic hair as well as underarm hair.\nBrass' films in the 1980s and early 1990s had mainly been adaptations of famous literary works usually in the erotic genre, namely The Key (La",
"the mirrors to see their reflection make the adjustments to their makeup/hair that they felt they needed. These actions made Hickox consider about the self-being presented in the public, and that that self may be different from the ones we truly are and what we truly believe. Nevertheless, the mirrors being photographed are unable to reflect as the mirror images are transformed into a sea of black by the scanning process. The reflection is no longer available. Dialogue, 2012 These works picture a young girl in different moments of her life. According to Hickox, these photos of a young female",
"as the fascination for reflections, an in-depth observation of details and an exquisite expression of the paint surface. Detailed reflections, as can be seen in the mirror in the background of Van Eyck’s ‘Portrait of Giovanni Arnolfini and his wife’ (1434), are also common in Møhlmann’s work. An example of this is the reflection in the Christmas ball in the painting ‘Holland’ (1985) where we can see the painter at work behind his easel as well as the window (with curtain) through which light enters.\nIn the speech Møhlmann gave in 2017 after receiving his royal decoration, he referred to the",
"then the wife, and then the husband, which then repeats to emphasize the triangular relationship between them.\nUse of contrasting shots is another example of the film techniques used in Rashomon. According to Donald Richie, the length of time of the shots of the wife and of the bandit are the same when the bandit is acting barbarically and the wife is hysterically crazy.\nRashomon had camera shots that were directly into the sun. Kurosawa wanted to use natural light, but it was too weak; they solved the problem by using a mirror to reflect the natural light. The result makes the",
"fact that a politician had accepted to be filmed in such privacy impressed many and was therefore seen as an historical feat: few other movies have had such access to a political figure before. Visuals It is rare for such emphasis be placed on attention to visual beauty in a documentary, especially a political one. This has brought much admiration for the work. It can be stated that Labrecque made it a point to show Landry as a human being with often very intimate, tight shots, breaking the standard of the news channel waist shot or talking heads type of",
"an expression on his face, while the camera pulls back to reveal that the negative room where Oakey, Wright, and Sulley were working in is yet another set (the camera can be seen in the mirror's reflection).\nFilmed on a cold, wet, winter night, it was shot on 35mm film instead of the cheaper video tape prevalent at the time. Susan Sulley claims that Steve Barron was heavily influenced by the cinematography of Ultravox's video for \"Vienna\" (directed by Russell Mulcahy earlier that year). Steve Barron was also influenced by François Truffaut and his film Day for Night, and because of",
"European culture of representation. Using a mirror, the artist directs the sun's rays toward the lens of a video camera that is filming him. The overexposure gradually deletes the recorded image. “Blinding the medium with light,” writes Gerz of this performance, and also: “P. ... is the man who resists being reproduced (...). ” Purple Cross for Absent Now (1979) At the Centre d’Art Contemporain in Geneva in 1979, two video cameras with monitors were installed, along with an elastic rope that divided the room into two halves. The sight lines of two monitors, together with that of the cord,",
"Mirror Mirror (film) Casting Roberts was the first to be cast, because very early on Tarsem Singh wanted an Evil Queen with whom audiences could relate. He stated that in the film, the queen is not evil, but rather insecure. He also suggested that the Queen's true ugliness may be revealed at the very end of the film. Originally Saoirse Ronan was considered for the role of Snow White but the age difference between her and Armie Hammer was too large (he was 25 and she was 17). Felicity Jones was offered the part but turned it down. Collins was",
"Spiegel ('the Mirror'), is a volunteer organisation, focusing on quality, as opposed to mainstream cinema, showing films by David Lynch, Peter Greenaway, Stanley Kubrick and Woody Allen, but also lesser known film directors. There are plans to use the glass walls as projection screens, projecting films from the inside, which can be viewed from the squares surrounding the building.",
"look, not only in mise-en-scène but even more so in photography, often recognisable from just a short clip; to create a surreal atmosphere of psychological unrest and a world out of balance, he frequently uses unusual camera angles, particularly low-angle shots, high-angle shots, and Dutch angles. Roger Ebert said that \"his world is always hallucinatory in its richness of detail\". Most of his movies are shot almost entirely with rectilinear ultra-wide-angle lenses with focal lengths of 28mm or less to achieve a distinctive style defined by extreme perspective distortion and extremely deep focus. Gilliam's long-time director of photography Nicola Pecorini",
"that this was only a test run - the real challenge, for $5,000, was to then replicate this feat without their subjects seeing the video camera. The players found this part of the challenge to be considerably more difficult, as it was tricky to film people without them knowing, and without a visible camera there was nothing to excuse their silly behavior and thus the inhibitions of their subjects were greater. Both groups even resorted to cheating at one point, by asking people to laugh for them and telling them they were on camera (simply asking for the laugh would",
"her camera angle, she discovered a similar effect to the refractive properties of the water. In the only self-portrait she produced since the 1970s, Self Portrait 1990, Imboden imperfectly lines up her profile in front of the mirror with a models face behind the mirror, creating a distorted portrait by combining two different views into one, reminiscent of the quality of space in a Cubist painting.\nThe smearing and scraping of the mirrors soon lead to generating a marred, scratched texture on their surface. Resembling the “hatching” technique in medieval printmaking, many of Imboden's images that illustrate this texture",
"in lighting due to natural daylight and strobe lights.\nThe film is primarily presented from the perspective of the character Dax and his camera, but Nourizadeh also obtained footage by providing the cast and extras with recording devices such as BlackBerrys and iPhones to capture events occurring outside of the perspective or knowledge of the cameraman. This resulted in hours of unusable footage that had to be observed by Nourizadeh and his team to find segments that could be incorporated into the final film. Nourizadeh stated \"when you have real material being shot by real people, it then kind of feels"
] |
If masturbation is healthy, what are the health benefits? | [
"- Reduced risk of developing prostade cancer (if male)\n- Reduced stress levels (as a result of endorphin release)\n- Slightly reduced blood pressure (as a result of the physical exertion)",
"There are anti-prostate-cancer benefits, but these and other benefits are specific to number of times you ejaculate per week/month. Whether that happens by masturbation or not isn't of concern to those studies."
] | [
"health Full of interviews from sex educators, religious figures, and psychologists, the documentary offers often contrasting opinions about the health benefits both physically and psychologically of masturbation. Among those interviewed who belief masturbation could be harmful is Alexander Rhodes, the founder of a popular Reddit masturbation abstinence group called NoFap. The movie also includes health findings associated with a Cambridge Study that link masturbation to prostate cance. \nThese perspectives are contrasted with sex-positive statements from notable sex educators who speak in favor of the health benefits of masturbation. The film also references a medical study written in JAMA indicating that",
"poor health, an individual may be able to experience some desire but does not have the motivation or strength to have sex. Physical and mental well-being is crucial to successful and satisfying sexual expression. Chronic disorders like cardiovascular disease, diabetes, arthritis, enlarged prostates (in men), Parkinson's disease, and cancer can have negative influence over sexual desire, sexual functioning, and sexual response. In the case of diabetes, especially in men, there have been conflicting findings of the effect of the disease on sexual desire. Some studies have found that diabetic men have shown lower levels of sexual desire than healthy, age-matched",
"physical ills, Baker continues, Reich in fact found that the healthy person needs less sexual activity and that the orgasm has a function to maintain health only for the healthy person.",
"social well-being in relation to sexuality. It requires a positive and respectful approach to sexuality and sexual relationships, as well as the possibility of having pleasurable and safe sexual experiences, free of coercion, discrimination and violence.\" Reproductive health Within the framework of the World Health Organization's (WHO) definition of health as a state of complete physical, mental and social well-being, and not merely the absence of disease or infirmity, reproductive health, or sexual health/hygiene, addresses the reproductive processes, functions and system at all stages of life. Reproductive health, therefore, implies that people are able to have a responsible, satisfying",
"as in orgasm and lead to satisfaction, a reduction of the internal stimulation from hormones would make the required external stimulation stronger and also more specific, as weaker signals involve narrower ranges of other brain functions in their loops. These scientists therefore argue that the biological (as opposed to sociological) effect of reduced testosterone is to make it more difficult and not easier to use masturbation without pornography or other socially acceptable substitutes to manage remaining sex drive in a former offender, and that many community persons (both male and female) find that a lower initial arousal makes it more",
"Due to such changes in sensation, people are encouraged to explore their bodies to discover what areas are pleasurable. Masturbation is a useful way to learn about the body's new responses.\nTests exist to measure how much sensation a person has retained in the genitals after an injury, which are used to tailor treatment or rehabilitation. Sensory testing helps people learn to recognize the sensations associated with arousal and orgasm. Injured people who are able to achieve orgasms from stimulation to the genitals may need stimulation for a longer time or at a greater intensity. Sex toys such as vibrators are",
"Greece, require it. Also, heterosexual behavior can have reproductive effect, but has no social adaptive value in monks or nuns. Cosmetic surgery has no biological value, but can be highly valued by society, while taking sleeping medication may have a biologically adaptive effect, but may not be socially adaptive in ascetic cultures. People can eat because they are hungry (biological adaptation), or because they like good food or want to enjoy the company of others (social adaptation). They can have sex to fulfill their sexual and reproductive needs (biological adaptation), or to fulfill their love, have children to bear their",
"sex impacts the health of individuals. In such circumstances, where there are health impacts resulting from certain sexual activities, there is the question of whether individuals have an ethical responsibility to the public at large for their behavior. Such concerns might involve the regular periodic testing for sexually transmitted diseases, disclosure of infection with sexually transmitted diseases, responsibility for taking safer sex precautions, ethics of sex without using contraception, leading to an increased level of unplanned pregnancies and unwanted children, and just what amount of personal care an individual needs to take in order to meet his or her requisite",
"Concerning Specific Forms of Masturbation The way people masturbate indicative of sexual potency Reich's work with patients at the clinic was often related to problems of diminished sexual potency, or impotence. He therefore decided to look closer at such factors as (1) where do they masturbate? (2) when do they masturbate? (3) with what materials do they masturbate? (4) with what fantasies do they masturbate? (5) how often do they masturbate? (6) in what bodily posture do they masturbate, and is that posture related to any childhood event or events? and (7) with what furniture do they masturbate, and what",
"masturbation. Sexual intercourse also generates a 25–45% increase in ejaculate volume, mainly by increased prostate secretion.\nThis intercourse advantage is even greater for men with oligospermia.\nHowever, the single factor or factors for the intercourse advantage have not yet been isolated. It cannot be explained by presence of visual perception of physical attractiveness alone during stimulation, although there may be a slight correlation. Neither do any substantial fluctuations in sex hormones explain the intercourse advantage. It is hypothesized that sexual intercourse subdues an inhibition from the central nervous system, but what, in turn, is the subduing factor is still not completely known.",
"Studies have been conducted that indicate increasing levels of alcohol intoxication produce a significant degradation in male masturbatory effectiveness (MME). This degradation was measured by measuring blood alcohol concentration (BAC) and ejaculation latency. Alcohol intoxication can decrease sexual arousal, decrease pleasureability and intensity of orgasm, and increase difficulty in attaining orgasm. In women In women, the effects of alcohol on libido in the literature are mixed. Some women report that alcohol increases sexual arousal and desire, however, some studies show alcohol lower the physiological signs of arousal. A 2016 study found that alcohol negatively affected how positive the sexual experience",
"medical consensus is that there is no harm from normal masturbation practices. According to the Merck Manual of Diagnosis and Therapy, \"It is considered abnormal only when it inhibits partner-oriented behavior, is done in public, or is sufficiently compulsive to cause distress.\" In the US, masturbation was a diagnosable psychological condition until DSM II (1968). The American Medical Association declared masturbation as normal by consensus in 1972. Masturbation does not deplete one's body of energy or produce premature ejaculation.\nIntroductory psychology textbook authors Coon, Mitterer and Martini passingly mentioning NoFap, speak of pornography as a \"supernormal stimulus\" but use the model",
"incontinence. Efforts to increase the time between urination, known as bladder training, is recommended in those with urge incontinence. Both these may be used in those with mixed incontinence.\nSmall vaginal cones of increasing weight may be used to help with exercise. They seem to be better than no active treatment in women with stress urinary incontinence, and have similar effects to training of pelvic floor muscles or electrostimulation.\nBiofeedback uses measuring devices to help the patient become aware of his or her body's functioning. By using electronic devices or diaries to track when the bladder and urethral muscles contract, the patient",
"at a talk at Harvard University. \"Though the connections between brains and sperm were 'not awesome, they're there and highly significant,' Miller said. All things held equal, good sperm and good brains go together.\"\nRegarding diet, malnutrition or an unhealthy diet can lead to e.g. Zinc deficiency, lowering sperm quality.\nSperm quality is better in the afternoon than in the morning. Adrenaline-levels are higher during awakening (~06.00 to noon), which may contribute similarly to general stress.\nLack of exercise, as well as excessive exercise, are minor factors. In professional sports, semen quality parameters tend to decrease as training requirements increase. The effect",
"of many medications.\nMenopause may involve loss of hormones supporting sexuality and genital functionality. Vaginal and clitoral atrophy and dryness affects up to 50%–60% of postmenopausal women. Testosterone levels in men fall as they age. Sexual dysfunction overall becomes more likely with poor physical and emotional health. \"Negative experiences in sexual relationships and overall well-being\" are associated with sexual dysfunction. Shifts in research The function or functions of the human female orgasm have been debated among researchers. Because male orgasms that expel sperm from the body into the vagina during sexual intercourse may result in conception, researchers have several hypotheses about",
"desire is so overwhelming one might perform masturbation but in that case it will be like eating the flesh of a pig to survive from major hunger or starvation when no other food is available.\nMasturbation, like any form of sex in which seminal or vaginal fluids have been released, breaks one's fast if performed during the daylight hours and requires a major ablution if any seminal or vaginal fluids were released. According to Sheikh Hamed Al-Ali: \"Masturbation during the daytime of Ramadan breaks the fast, based on the Hadith that a fasting Muslim gives up eating, drinking, and sexual desire",
"Diagnostiek der Zielsziekten in voorlezingen voor studenten, artsen en juristen Aetiology. Medical examination Wijsman mentions a couple possible causes for mental illnesses. Important are inborn or obtained predispositions for functional or anatomical changes in the brain. Life or work circumstances can stimulate these predisposition or can exhaust the brain. Exhausting the brain can evolve in nutritional disturbance in the brain, which can lead to functional or anatomical changes. According to the book, even masturbating can contribute to mental illnesses, because this should irritate the nervous system and therefore could stimulate a predisposition.\nA remarkable comment about these predispositions is that men",
"consumption are steps in the right direction. Consequently, while abstinence may be the optimal outcome for some people, skills for drinking in a way that will minimize harm can be considered if abstinence is not viewed as realistic, attainable, or attractive. For example, blood alcohol concentration level estimation training enables people to set limits for moderate goals that are unique to their gender, weight, and time spent drinking. Teaching practical strategies for reaching these limits, such as spacing one's drinks, pacing oneself, alternating alcoholic and non-alcoholic drinks, consuming food before drinking and drinking for promote success.",
"aspects of individualized and gendered sexuality. Health consequences Sexual objectification is said to primarily impact the psychological health of women. It is said to negatively affect young women by instilling shame, doubt and anxiety within them through body spectatoring and policing. These effects are said to potentially lead to even more serious negative mental health complexities, such as depression and sexual dysfunction.\nGender inequalities can create health inequalities. For instance, women live longer than men but are considered to be sick five times as frequently as men. Men experience higher rates of fatal illnesses as well as being more",
"intimacy prompts them to engage with sexual stimuli, which leads to an experience of sexual desire and psychological sexual arousal. Psychological sexual arousal also has an effect on physiological mechanisms; Goldey and van Anders showed that sexual cognitions impact hormone levels in women, such that sexual thoughts result in a rapid increase in testosterone in women who were not using hormonal contraception. In terms of brain activation, researchers have suggested that amygdala responses are not solely determined by level of self-reported sexual arousal; Hamann and colleagues found that women self-reported higher sexual arousal than men, but experienced lower levels of",
"to overall health and a marker of quality of life. Sexual desire has also been attributed to good health, good sexual functioning, positive sexual self-esteem, and a skillful partner. Physicians may find that sexually active life expectancy can be used as an incentive for patients to become (and stay) healthy. Institutional settings such as residential care facilities should focus on offering an accepting environment for sexually active older people. Barriers preventing sex Although people generalize that older adults do not participate in sex often, research shows that older people enjoy participating in a variety of sexual activities. Barriers, both physically",
"highest concerns relating to sexuality. Male fertility is reduced after SCI, due to a combination of problems with erections, ejaculation, and quality of the semen. As with other types of sexual response, ejaculation can be psychogenic or reflexogenic, and the level of injury affects a man's ability to experience each type. As many as 95% of men with SCI have problems with ejaculation (anejaculation), possibly due to impaired coordination of input from different parts of the nervous system. Erection, orgasm, and ejaculation can each occur independently, although the ability to ejaculate seems linked to the quality of the erection, and",
"natural menopause. Adverse effect on sexuality Oophorectomy substantially impairs sexuality. Substantially more women who had both an oophorectomy and a hysterectomy reported libido loss, difficulty with sexual arousal, and vaginal dryness than those who had a less invasive procedure (either hysterectomy alone or an alternative procedure), and hormone replacement therapy was not found to improve these symptoms. In addition, oophorectomy greatly reduces testosterone levels, which are associated with a greater sense of sexual desire in women. However, at least one study has shown that psychological factors, such as relationship satisfaction, are still the best predictor of sexual activity following",
"exercise, can contribute towards urinary complaints. \nParsons is a urologic oncologist.",
"lack of sexual desire in men is because of loss of libido, low testosterone. There are also psychological factors such as anxiety, and depression.\nThe ejaculation disorder has three types: retrograde ejaculation, retarded ejaculation, premature ejaculation. The erectile dysfunction is a disability to have and maintain an erection during intercourse. Psychological aspects Sexuality in humans generates profound emotional and psychological responses. Some theorists identify sexuality as the central source of human personality. Psychological studies of sexuality focus on psychological influences that affect sexual behavior and experiences. Early psychological analyses were carried out by Sigmund Freud, who believed in a psychoanalytic approach.",
"the dosage of estrogen or adding a progestogen raises the libido of some transgender women.\nSpontaneous and morning erections decrease significantly in frequency, although some patients who have had an orchiectomy still experience morning erections. Voluntary erections may or may not be possible, depending on the amount of hormones and/or antiandrogens being taken.\nManaging long-term hormonal regimens have not been studied and are difficult to estimate because research on the long-term use of hormonal therapy has not been noted. However, it is possible to speculate the outcomes of these therapies on transgender people based on the knowledge of the current effects of",
"erection, or a lack of sexual excitement and pleasure in sexual activity.\nThere may be physiological origins to these disorders, such as decreased blood flow or lack of vaginal lubrication. Chronic disease can also contribute, as well as the nature of the relationship between the partners.\nAdditionally, the condition postorgasm illness syndrome (POIS) may cause symptoms when aroused, including adrenergic-type presentation; rapid breathing, paraesthesia, palpitations, headaches, aphasia, nausea, itchy eyes, fever, muscle pain and weakness and fatigue.\nFrom the onset of arousal, symptoms can persist for up to a week in patients.\nThe aetiology of this condition is unknown, however it is believed to",
"heart rate, blood pressure, and erection, are often discordant with self-reported subjective perceptions of arousal. This inconsistency suggests that psychological, or cognitive aspects, also have a strong effect on sexual arousal. The cognitive aspects of sexual arousal in men are not completely known, but it does involve the appraisal and evaluation of the stimulus, categorization of the stimulus as sexual, and an affective response. Research suggests that cognitive factors, such as sexual motivation, perceived gender role expectations, and sexual attitudes, contribute to sex differences observed in subjective sexual arousal. Specifically, while watching heterosexual erotic videos, men are more influenced by",
"to manage remaining vestiges of sex drive by masturbating without the use of pornography or to otherwise get by with more socially and legally acceptable substitutes for desires that it would be unacceptable to act on. These neurologists also cite that many people, both men and women, find that higher levels of initial sexual arousal make it easier to masturbate to orgasm without the preferred type of external stimuli, as predicted by the hypothesis. Music In Europe, when women were not permitted to sing in church or cathedral choirs in the Roman Catholic Church, boys were castrated to develop a",
"and that they can be used to enable women to exercise it. Men on Porn There is debate on whether the consumption of porn among men is good for their well being, though in a study of over 300 men aged 18 to 73 97% report that they have watched porn, with 94% reporting having done so in the last 6 months and 82% reporting doing so in a manner they would consider \"regularly\".\nMen of all ages report an overall positive experience with porn, though younger men express greater negative than older men- which researchers speculate is because porn skews"
] |
If Nazi war criminals were given (somewhat) fair trials at Nuremberg then why wasn't Osama Bin Laden given one? | [
"Because he shot at the people trying to capture him, and was killed in the firefight. There's no reason to believe he wouldn't have been given a trial had this not happened.",
"He and those around him were fighting back, and so it was more important to capture him dead than to risk soldiers dying trying to subdue him alive.",
"Pretty much impossible to take him alive. The nazis surrendered and went to court. OBL spent a decade on the run, hiding with armed guards."
] | [
"the goings-on as far as Jews were concerned. Hitler said each man should take care of his business and mine was U-boats and the Navy.\" Nuremberg war crimes trials Following the war, Dönitz was held as a prisoner of war by the Allies. He was indicted as a major war criminal at the Nuremberg Trials on three counts. One: conspiracy to commit crimes against peace, war crimes, and crimes against humanity. Two: planning, initiating, and waging wars of aggression. Three: crimes against the laws of war. Dönitz was found not guilty on count one of the indictment, but guilty on",
"crimes, crimes against peace, war crimes and crimes against humanity, in violation of international laws governing warfare.\nOn his arrival in Nuremberg, Hess was reluctant to give up some of his possessions, including samples of food he said had been poisoned by the British; he proposed to use these for his defence during the trial. The commandant of the facility, Colonel Burton C. Andrus of the United States Army, advised him that he would be allowed no special treatment; the samples were sealed and confiscated. Hess's diaries indicate that he did not acknowledge the validity of the court and felt the",
"expert at the European Council on Foreign Relations, if bin Laden was hors de combat (as his daughter is said to have alleged) that would have been a violation of Protocol I of the Geneva Conventions.\nFormer Nuremberg prosecutor Benjamin B. Ferencz stated it was unclear if bin Laden's killing was justified self-defense or premeditated illegal assassination, and that \"killing a captive who poses no immediate threat is a crime under military law as well as all other law,\" a view also held by legal scholar Philippe Sands.\nThe UN Security Council released a statement applauding the news of bin Laden's death,",
"March 1945 and was arrested by American troops in May. During the Nuremberg Trials, Weichs was said to be implicated in war crimes committed while suppressing the partisans. He was removed from the US Army's Hostages Trial for medical reasons without having been judged or sentenced.",
"War crimes trial Nuremberg trials On October 18, 1945, the chief prosecutors lodged an indictment with the tribunal charging 24 individuals with a variety of crimes and atrocities, including the deliberate instigation of aggressive wars, extermination of racial and religious groups, murder and mistreatment of prisoners of war, and the murder, mistreatment, and deportation of hundreds of thousands of inhabitants of countries occupied by Germany during the war.\nAmong the accused were the Nationalist Socialist leaders Hermann Göring and Rudolf Hess, the diplomat Joachim von Ribbentrop, the munitions maker Gustav Krupp von Bohlen und Halbach, Marshal Wilhelm Keitel, Grand Admiral Erich",
"scanty legal protection they had theretofore had. He also knew, for it was part of the same law, of the sinister provisions for the confiscation of property upon death of the Jewish owners, by the police. ...\nConceding that the defendant did not know of the ultimate mass murders in the concentration camps and by the Einsatzgruppen, he knew the policies of the SS and, in part, its crimes. Nevertheless he accepted its insignia, its rank, its honors, and its contacts with the high figures of the Nazi regime. These were of no small significance in Nazi Germany. For that price",
"only charges that could be brought were war crimes and crimes against citizens of the Allied countries. \"Crimes against humanity\" and \"crimes against peace\", which featured in the later trials at Nuremberg, were not among the charges at Lüneburg. Charges The official charges were grouped into crimes committed at Auschwitz and Belsen and were as follows:\nAt Bergen-Belsen, Germany, between 1st October, 1942, and 30th April, 1945, when members of the staff of Bergen-Belsen Concentration Camp responsible for the well-being of the persons interned there, in violation of the law and usages of war, were together concerned as parties to the",
"hide during the final evacuation of the camp. Stutthof trials The well known Nuremberg Trials were only concerned with concentration camps as evidence for war crimes and crimes against humanity committed by the Third Reich leadership. Several lesser known trials followed against the staff of various concentration camps. Poland held four trials in Gdańsk against former guards and kapos of Stutthof, charging them with crimes of war and crimes against humanity.\nThe first trial was held from April 25 to May 31, 1946 against 30 ex-officials and prisoner-guards of the camp. The Soviet/Polish Special Criminal Court found all of them guilty",
"could be guilty, it was explained to the guards they were too uneducated to understand, and it would be clear later. They were also told that all things authorized by Adolf Hitler were legal. Baretzki claimed not to believe these assurances and considered going into hiding when he went to Romania on leave in 1943. He did not do so because, according to him, he feared repercussions against his family. According to Rebecca Wittmann, Baretzki's admission that he knew that the mass murder of Jews was illegal sealed his conviction.\nAt his trial, Baretzki described how he treated inmates who had",
"he saw them as the root of all of Germany's ills and the violence associated with communism. Osama bin Laden found it moral to kill all Christians and Jews because he saw Islam as under attack by Western and US influence, accusing the US and Israel of forming a Crusader-Zionist alliance to destroy Islam, and considering US troops in Saudi Arabia infidels in the land of Islam's two holiest sites. He therefore considered non-Muslims and Shiite Muslims evil people intent on destroying Islamic purity and therefore heretic.\nGiven his mixed record of efforts to give the Cuban people free-of-charge healthcare and",
"such as Alfons Rebane and Alfrēds Riekstiņš escaped to the United Kingdom and Sweden and participated in Allied intelligence operations in aid of the Forest Brothers.\nWhile the Waffen-SS was found guilty of war crimes and other atrocities and declared a criminal organization after the war, the Nuremberg Trials explicitly excluded conscripts in the following terms:\nThe Tribunal declares to be criminal within the meaning of the Charter the group composed of those persons who had been officially accepted as members of the SS as enumerated in the preceding paragraph, who became or remained members of the organization with knowledge that it",
"lot of it depends on whether you believe Osama bin Laden is a combatant in a war or a suspect in a mass murder.\" In the latter case, \"you would ... be able to kill a suspect [only] if they represented an immediate threat\".\nHolder testified that bin Laden made no attempt to surrender, and \"even if he had there would be a good basis on the part of those very brave Navy SEAL team members to do what they did in order to protect themselves and the other people who were in that building.\" According to Anthony Dworkin, an international law",
"Douglas T. Bates Jr., an artillery officer and lawyer from Centerville, Tennessee. Proceedings Unlike the International Military Trials in Nuremberg that prosecuted the major Nazi war criminals under the jurisdiction of the four Allied Occupying Powers, the Dachau tribunals were held exclusively by the United States military between November 1945 and August 1948. The proceedings were similar to the 12 post-1946 Nuremberg trials that were also conducted solely by the United States.\nAll the hearings were held within Dachau because it was, at the time, the best known of the Nazi concentration camps and it would act as a backdrop for",
"said the following regarding Adolf Hitler and the Holocaust (as translated by MEMRI):\nThroughout history, Allah has imposed upon the Jews people who would punish them for their corruption ... The last punishment was carried out by Hitler. By means of all the things he did to them – even though they exaggerated this issue – he managed to put them in their place. This was divine punishment for them ... Allah Willing, the next time will be at the hand of the believers. Apostasy Al-Qaradawi says that apostasy – Muslims leaving Islam – is a grave danger to the Muslim",
"Judgment at Nuremberg Plot Judgment at Nuremberg centers on a military tribunal convened in Nuremberg, Germany, in which four German judges and prosecutors stand accused of crimes against humanity for their involvement in atrocities committed under the Nazi regime. Judge Dan Haywood (Spencer Tracy) is the chief trial judge of a three-judge panel that will hear and decide the case against the defendants. Haywood begins his examination by trying to learn how the defendant Ernst Janning (Burt Lancaster) could have sentenced so many people to death. Janning, it is revealed, is a well-educated and internationally respected jurist and legal scholar.",
"a war crimes tribunal and publicly executed in Washington D.C. on 10 November 1865. Some have questioned the charges against Wirz, his personal responsibility for the conditions at Camp Sumter, and the fairness of his post-war trial. In 1980, historian Morgan D. Peoples referred to Wirz as a \"scapegoat\" and his conviction remains controversial.\nThe war crimes trials following World War II were later observed featuring many of the phenomena and issues seen in Page's account of Wirz's trial, conviction, sentencing, and execution. The Nuremberg Criminal Court for war crimes (and subsidiary courts like the Dachau International Military Tribunal) prosecuted only",
"Jewish perpetrators in court, in a trial which began in October 1951. Two confirmed activists in the Zionist underground, Shalom Salah Shalom, a 19-year-old weapons expert, and Yosef Ibrahim Basri, a lawyer active in collecting intelligence material, were executed after being convicted of the bombings. Whilst their involvement in the underground movement and holdings of weapons caches were not disputed, both denied involvement in the bombings. Salah's testimony under torture indirectly allowed the Iraqi police to find large weapons caches of the Zionist underground in three synagogues (Mas'uda Shemtov, Hakham Haskal and Meir Tuweik) and in private homes, including 436",
"alive and let starved packs of dogs feed on them. He was known to hold large formations with the sole purpose of injecting Jews with strychnine. Transcripts of the Nuremberg Trials show Soviet prosecutors frequently questioning defendants accused of war crimes on the Eastern Front about their knowledge of the Dirlewanger Brigade. Occupation of Poland On 1 August 1940, the Dirlewanger was assigned to guard duties in the region of Lublin (site of a Nazi-established \"Jew reservation\" established under the Nisko Plan) in the General Government territory of occupied Poland. According to journalist and author, Matthew Cooper, \"wherever the Dirlewanger",
"Ulm Einsatzkommando trial The Ulm Einsatzkommando trial (1958) was the first major trial of Nazi crimes under West German law (rather than by an international or military tribunal). Ten suspects, former members of the Einsatzkommando Tilsit, were charged for their involvement in war crimes committed in Lithuania in 1941. All were convicted as accessories to mass murder and sentenced to various terms in prison, the chief perpetrators being held to be those from whom the orders had come down.\nIn light of the trial, Konrad Adenauer set up the Central Office of the State Justice Administrations for the Investigation of National",
"levels of the Reich leadership during the Nazi period. The only way that a Nazi criminal could be convicted of murder was to show that they were not following orders at the time and had acted on their initiative when killing someone. One courageous attorney, Fritz Bauer patiently gathered evidence on the guards of the Auschwitz death camp and about twenty were put trial in Frankfurt between 1963-1965 in what came to be known as the Frankfurt Auschwitz Trials. The men on trial in Frankfurt were tried only for murders and other crimes that they committed on their own initiative",
"a war crimes trial, in which a Nazi camp guard is prosecuted for atrocities against the Jewish prisoners.",
"been punishable by law at the time it was committed (specifically: by written law, Germany following civil law).\nRobert A. Taft, at the time a U.S. Senator from Ohio, asserted that the Nuremberg Trials following World War II were based on ex post facto law because the Allies did not negotiate the London Charter, which defined crimes against humanity and created the International Military Tribunal, until well after the acts charged. Others, including the International Military Tribunal, argued that the London Charter merely restated and provided jurisdiction to prosecute offenses that were already made unlawful by the Kellogg-Briand Pact, the Covenant",
"hand-grenades, 33 machine-guns, 97 machine-gun cartridges, 186 pistols. Shlomo Hillel, also once a member of the Iraqi Zionist underground, noted that the last words of the executed defendants were \"Long live the State of Israel\". The British Foreign Office noted in a file note \"Trial of Jews at Baghdad, 20 December 1951\" that they had “no reason to suppose that the trials were conducted in anything but a normal manner.”\nBaghdad police officers who gave evidence at the trial appear to have been convinced that the crimes were committed by Jewish agents, claiming that \"anyone studying the affair closely will see",
"a sentencing authority to lessen the penalty. Nuremberg Principle IV states:\nThe fact that a person acted pursuant to order of his Government or of a superior does not relieve him from responsibility under international law, provided a moral choice was in fact possible to him.\nDuring the Nuremberg Trials, Wilhelm Keitel, Alfred Jodl, and other defendants unsuccessfully used the defense. They contended that while they knew Adolf Hitler's orders were unlawful, or at least had reason to believe they were unlawful, their place was not to question, but to obey. They claimed they were compelled to do so by the Führerprinzip",
"Unlike many other critics of the Nuremberg Trials, Kranzbühler did not argue that the substantive indictments made at Nuremberg were unjustified because the extension of the punishable acts was expanded by introducing new laws that had not existed prior to Nuremberg. Rather, in defining the legitimacy of the indictments, Kranzbühler found it more useful to evaluate the laws and their likelihood of being reapplied by future courts, regardless of whether they were present prior to Nuremberg.\n1.In respect to the then new concept of conspiracy for the accomplishment of crime against peace, Kranzbühler did not take a clear position – perhaps",
"argued that the killing of Osama bin Laden was \"both illegal and morally dubious\". Biography Kai Ambos was born in Heidelberg. He studied Law and Political sciences at Freiburg i.B., Oxford and Munich, where he passed his Level I law exams in 1990. His doctorate, also received from Munich University, and supervised by Horst Schüler-Springorum , followed just two years later. His dissertation, subsequently published under the auspices of the Max Planck Institute, concerned problems of drug control in Colombia, Peru and Bolivia. On 27 October 1997 he received the \"Law",
"many committed by Jewish forces despite later apologia attempting to minimize such events. He writes, \"In truth ... the Jews committed far more atrocities than the Arabs and killed far more civilians and PoWs in deliberate acts of brutality in the course of 1948.\"\nThe character of the Arabic forces assaulting the Jewish communities is also described as having a highly ideological, Islamist nature. Morris views the 1948 bloodshed as having a broader sense of having a conflict between civilizations, with many soldiers seeing themselves as engaging in 'jihad'. However, he states that the disorganized, divided leadership of the Arabic forces",
"five times. Iraqi authorities then arrested 3 Jews, claiming they were Zionist activists, and sentenced two — Shalom Salah Shalom and Yosef Ibrahim Basri—to death. The third man, Yehuda Tajar, was sentenced to 10 years in prison. In May and June 1951, arms caches were discovered that allegedly belonged to the Zionist underground, allegedly supplied by the Yishuv after the Farhud of 1941. There has been much debate as to whether the bombs were planted by the Mossad to encourage Iraqi Jews to emigrate to Israel or if they were planted by Muslim extremists to help drive out the Jews.",
"of 80 and broadcast every day in Arabic, stressing the similarities between Islam and Nazism and supported by the activities of the Mufti of Jerusalem, Haj Amin al-Husayni (who broadcast pro-Nazi propaganda from Berlin). The Nazi regime also provided funding to the Egyptian Moslem Brotherhood, which began calling for boycotts of Jewish businesses in 1936.\n\nBernard Lewis also describes Nazi influence in the Arab world, including its impact on Michel Aflaq, the principal founder of Ba'athist thought (which later dominated Syria and Iraq).\n After the promulgation of the Nuremberg Laws, Hitler received telegrams of congratulation from all over the Arab and",
"previous conviction. Nuremberg War Crimes Trials (1945-46) In the wake of World War II, Horsky approached Robert Jackson, the chief prosecutor for the Nuremberg Trials, to collaborate on the cases. Jackson brought him on board, and Horsky was appointed to the temporary reserves of the Coast Guard so that he could have access to the confidential files pertinent to the case. Horsky helped manage the \"state side\" of the U.S. Government's prosecution in Germany, getting witnesses and affidavits while Jackson was abroad. Horsky went to Nuremberg for the sentencing phase and stayed there for several months helping to prosecute low-ranking"
] |
Why plastic is better to recycle than paper | [
"My understanding is that the problem with paper recycling is that the length of the fibers in the paper gets shorter with each pass through the system, so eventually they become useless. \n\nPlastic on the other hand, doesn't have fibers to shorten.",
"Another issue with recycling paper is that it takes toxic chemicals to clean the ink from used paper, cancelling the positive effect of recycling it. Also, the vast majority of paper products come from tree farms, where trees are grown for the purpose of being made into paper, and are NOT from deforestation. Also, plastic comes from non-renewable sources, and is thus much more reasonable to recycle than paper."
] | [
"new plastic material added in. The same piece of plastic can only be recycled about 2-3 times before its quality decreases to the point where it can no longer be used.\nRecently, the use of block copolymers as \"molecular stitches\" or \"macromolecular welding flux\" has been proposed to overcome the difficulties associated with phase separation during recycling.\nThe percentage of plastic that can be fully recycled, rather than downcycled or go to waste, can be increased when manufacturers of packaged goods minimize mixing of packaging materials and eliminate contaminants. The Association of Plastics Recyclers have issued a \"Design Guide for Recyclability\".\nThe use",
"the paper during the recycling process, allowing filtering out the film. If the coated paper is shredded prior to recycling, the degree of separation depends on the particular process. Some plastic coatings are water dispersible to aid recycling and repulping. Special recycling processes are available to help separate plastics. Some plastic coated papers are incinerated for heat or landfilled rather than recycled.\nMost plastic coated papers are not suited to composting. but do variously end up in compost bins, sometimes even legally so. In this case, the remains of the non-biodegradable plastics components form part",
"particular challenge in recycling because they are derived from polymers and monomers that often cannot be separated and returned to their virgin states. For this reason not all plastics can be recycled for re-use, in fact some estimates claim only 20% to 30% of plastics can be recycled at all. Fibre-reinforced plastics and their matrices share these disposal and environmental concerns. Investigation of safe disposal methods has led to two main variations involving the application of intense heat: in one binding agents are burned off - in the process recapturing some of the sunk material cost in the form of",
"and reprocessing the material into useful products, sometimes completely different in form from their original state. For instance, this could mean melting down soft drink bottles and then casting them as plastic chairs and tables. For some types of plastic, the same piece of plastic can only be recycled about 2-3 times before its quality decreases to the point where it can no longer be used. Physical recycling Some plastics are remelted to form new plastic objects; for example, PET water bottles can be converted into polyester destined for clothing. A disadvantage of this type of recycling is that the",
"of biodegradable plastics or plastics which can be organically recycled or can be composted in industrial composting is increasing for certain short-lived packaging applications. Methods Broadly, there are two major ways to recycle plastic: (1) mechanical recycling (\"chop and wash\"), where the plastic is washed, ground into powders and melted, and (2) chemical recycling, where the plastic is broken down into basic components.\nBefore recycling, most plastics are sorted according to their resin type. In the past, plastic reclaimers used the resin identification code (RIC), a method of categorization of polymer types, which was developed by the Society of the Plastics",
"amount for recycling. The resulting surplus of green glass from imported bottles may be exported to producing countries, or used locally in the growing diversity of secondary end uses for recycled glass. Paper All types of waste paper are recyclable, and recycled paper requires a lot less energy and fewer raw materials to produce than manufacturing it from scratch. However, paper cannot be recycled indefinitely, and the normal number of times it can be recycled is about six. 12.5 million tonnes of paper and cardboard are used annually in England. Plastic In the UK, the amount of post-consumer plastic being",
"aluminum and plastics from plastic barriers and other water products contributing to sustainable environmentally friendly practices. Autoclave bags can be separated after opening and the paper and plastic recycled separately.\nTo become more eco-friendly or environmentally friendly dental practices can purchase biodegradable products therefore allowing more waste associated with the running of the practice to be recycled. Shredding of paper documents and recycling shredded paper will contribute to sustainable practices.",
"break up into small pieces that can more easily enter the food chain by being consumed.\" Recycling In-plant scrap can often be recycled but post-consumer sorting and recycling is difficult. Bio-based polymers will contaminate the recycling of other more common polymers. While oxo-biodegradable plastic manufacturers claim that their bags are recyclable, many plastic film recyclers will not accept them, as there have been no long-term studies on the viability of recycled-content products with these additives. Further, the Biodegradable Plastics Institute (BPI) says that the formulation of additives in oxo films varies greatly, which introduces even more variability in the recycling",
"bags to hard industrial waste, and mixes the load in tumblers (large rotating drums resembling giant clothes dryers). The most obvious benefit to this method is that all plastic is recyclable, not just matching forms. However, criticism rises from the energy costs of rotating the drums, and heating the post-melt pipes. Distributed recycling For some waste plastics, technical devices called recyclebots enable a form of distributed recycling. Preliminary life-cycle analysis (LCA) indicates that such distributed recycling of HDPE to make filament of 3D printers in rural regions is energetically favorable to either using virgin resin or conventional recycling processes because",
"fact that in their semi-liquid state they are malleable, or have the property of plasticity. Plastics vary immensely in heat tolerance, hardness, and resiliency. Combined with this adaptability, the general uniformity of composition and lightness of plastics ensures their use in almost all industrial applications today. High performance plastics such as ETFE have become an ideal building material due to its high abrasion resistance and chemical inertness. Notable buildings that feature it include: the Beijing National Aquatics Center and the Eden Project biomes. Papers and membranes Building papers and membranes are used for many reasons in construction. One of the",
"a large fraction of which are ultimately recycled in paper recovery and recycling operations. Removal of toner from the pulp is not easy, and toner formulations to ease this step have been reported. Hydrolyzable, water-soluble, and caustic-soluble toner resins have been reported, but do not appear to enjoy widespread application. Most paper recycling facilities mix toner with other waste material, such as inks and resins, into a sludge with no commercial use.\nIn the UK, large compatible ink cartridge manufacturers like Jet Tec & Dubaria have implemented toner recycling programs in order to receive back empty cartridges for",
"downcycling of plastic, in which products such as plastic food packaging are often downcycled into lower quality products, and do not get recycled into the same plastic food packaging.\nThe quality of recyclate not only supports high-quality recycling, but it can also deliver significant environmental benefits by reducing, reusing and keeping products out of landfills. High-quality recycling can help support growth in the economy by maximizing the economic value of the waste material collected. Higher income levels from the sale of quality recyclates can return value which can be significant to local governments, households, and businesses. Pursuing high-quality recycling can also",
"they are oil-based, similar to other conventional plastics. These plastics are made to be more degradable through the use of different additives, which help them degrade when exposed to UV rays or other physical stressors. yet, biodegradation-promoting additives for polymers have been shown not to significantly increase biodegradation.\nAlthough biodegradable and degradable plastics have helped reduce plastic pollution, there are some drawbacks. One issue concerning both types of plastics is that they do not break down very efficiently in natural environments. There, degradable plastics that are oil-based may break down into smaller fractions, at which point they do not degrade further.\nA",
"plastic bags. An alternative to these policies would be to increase extended producer responsibility. In the US, under the Clinton presidency, the President's Council on Sustainable Development suggested EPR in order to target different participants in the cycle of a product's life. This can, however, make the product more expensive since the cost must be taken into consideration before being put on the market, which is why it is not widely used in the United States currently. Instead, there is banning or taxation of plastic bags, which puts the responsibility on the consumers. In the United States, EPR has not",
"a study from Clemson University, came to similar conclusions. Reduction, reuse and recycling Plastic shopping bags are in most cases not accepted by standard curbside recycling programs; though their composition is often identical to other accepted plastics, they pose problems for the single-stream recycling process, as most of the sorting equipment is designed for rigid plastics such as bottles, so plastic bags often end up clogging wheels or belts, or being confused as paper and contaminating the pulp produced later in the stream. Plastic bags are 100% recyclable. They need to be taken to a location that recycles plastic film,",
"melt or warp the material. Environmental issues Most plastic cups are designed for single uses and then disposal or recycling. A life cycle inventory of a comparison of paper and plastic shows environmental effects of both with no clear winner.\nProduction of 1 tonne (0.98 long tons; 1.1 short tons) of plastic cup emits 135 pounds (61 kg) of green house gases.\nThe choice between paper cups and plastic cups has to do with the life of the item after use. A paper cup may biodegrade faster than a Styrofoam cup or a plastic cup. In general cardboard or paper takes one to",
"for durable moderate life consumer goods such as electronics, furniture, and vehicles. In general, plastic is considered to be durable and non-biodegradable hence making them difficult to decompose for at least a few decades with some lasting over hundreds or thousands of years. Judging from the domestic environmental factors, even some degradable plastics may still exist for a considerable period of time due to their degradation rate which is also influenced by factors such as the exposure of UV, oxygen, and temperature, whereas biodegradable plastics require the need of adequate microorganisms. Therefore, the rate of degradation in landfills and terrestrial,",
"usually not used for disposable applications, unlike commodity plastics.\nSpecialty plastics are materials with unique characteristics, such as ultra-high strength, electrical conductivity, electro-fluorescence, high thermal stability, etc.\nThe dividing lines between the various types of plastics is not based on material but rather on their properties and applications. For example, polyethylene (PE) is a cheap, low friction polymer commonly used to make disposable bags for shopping and trash, and is considered a commodity plastic, whereas medium-density polyethylene (MDPE) is used for underground gas and water pipes, and another variety called ultra-high-molecular-weight polyethylene (UHMWPE) is an engineering plastic which is used extensively as",
"anhydride (ASA). In recent years, efforts have been devoted to develop environmentally friendly wet strength resins from renewable resources. Coatings Sometimes wet strength can be obtained by curtain coating a polymer onto a paper or paperboard. Laminating a plastic film is also a method of providing wet strength. Environmental considerations Recycling of wet strengthened paper requires higher intensity reworking conditions in the re-pulping process to break the fibre web. Some wet strength papers are not considered recyclable.",
"facilities are responsible for sorting and processing plastics, but have struggled to do so economically as of 2019.\nWhen different types of plastics are melted together, they tend to phase-separate, like oil and water, and set in these layers. The phase boundaries cause structural weakness in the resulting material, meaning that polymer blends are useful in only limited applications. The two most widely manufactured plastics, polypropylene and polyethylene, behave this way, which limits their utility for recycling. Each time plastic is recycled, additional virgin materials must be added to help improve the integrity of the material. So, even recycled plastic has",
"patch. In order to solve this problem, the employment of modern technologies and processes to reuse the waste plastic as a cheap substrate is under research. The goal is to bring this material from the waste stream back into the mainstream by developing processes which will create an economic demand for them.\nOne approach in the field involves the conversion of waste plastics (like LDPE, PET, and HDPE) into paramagnetic, conducting microspheres or into carbon nanomaterials by applying high temperatures and chemical vapor deposition.\nOn a molecular level, the treatment of polymers like polypropylene or thermoplastics with electron beams (doses around",
"harvested wood. As the recycling process causes the paper fibres to break down, each time paper is recycled its quality decreases. This means that either a higher percentage of new fibres must be added, or the paper down-cycled into lower quality products. Any writing or colouration of the paper must first be removed by deinking, which also removes fillers, clays, and fibre fragments.\nAlmost all paper can be recycled today, but some types are harder to recycle than others. Papers coated with plastic or aluminium foil, and papers that are waxed, pasted, or gummed are usually not recycled because the process",
"for later reuse in plastics extrusion. In the first stage, plastic objects to be recycled are fed to an electric motor-powered cutting chamber, which continually cuts the material in scissor-like fashion. The material is ground into all the smaller flakes until they became fine enough to fall through a mesh screen. In wet-granulation lines, water is continually sprayed in the cutting chamber to remove the debris and impurities, and acts as a lubricant of the steel blades; in dry-granulation lines, water is not present, but such technology generally produces output of lower quality than the wet technology. While the process",
"similar conclusions.\nEven though the bags are plastic, you typically cannot recycle them in your curbside recycling bin. The material frequently causes the equipment used at recycling plants to jam, thus having to pause the recycle machinery and slow down daily operations. However, plastic bags are 100% recyclable. To recycle them. you need to drop them off at a location that accepts plastic film. Usually, this means taking them back to the grocery store or another major retail store. Danger to children Thin, conformable plastic bags, especially dry cleaning bags, have the potential to cause suffocation. Because of this, about 25",
"used in the manufacturing of piping systems, both ones concerned with high purity and ones designed for strength and rigidity (e.g., those intended for use in potable plumbing, hydronic heating and cooling, and reclaimed water). This material is often chosen for its resistance to corrosion and chemical leaching, its resilience against most forms of physical damage, including impact and freezing, its environmental benefits, and its ability to be joined by heat fusion rather than gluing.\nMany plastic items for medical or laboratory use can be made from polypropylene because it can withstand the heat in an autoclave. Its heat resistance also",
"from renewable raw materials, and plastics made from petrochemicals containing biodegradable additives which enhance biodegradation. Environmental concerns Because plastic bags are so durable, this makes them a concern for the environment. They will not break down easily and as a result are very harmful to wildlife. Each year millions of discarded plastic shopping bags end up as plastic waste litter in the environment when improperly disposed of. The same properties that have made plastic bags so commercially successful and ubiquitous—namely their low weight and resistance to degradation—have also contributed to their proliferation in the environment. Due to their durability, plastic",
"three months for biodegradation, as the majority of the content, up to 95%, is made with wood chips. A plastic cup can take up to 90 years to biodegrade, depending on the type of plastic.\nPlastic cups are made with oil, which is not a renewable source. On the other hand, paper cups can be sourced from forests which fall under sustainable management.\nPlastic cups, especially those made with polystyrene, are also a possible health hazard as chemicals may leach into the beverage. This is more likely to happen with warm drinks (hot chocolate, tea and coffee) than with cold drinks.",
"to handle by hand at this temperature. This makes it ideal for small-scale modeling, part fabrication, repair of plastic objects, and rapid prototyping where heat resistance is not needed. Though softened PCL readily sticks to many other plastics when at higher temperature, if the surface is cooled, the stickiness can be minimized while still leaving the mass pliable. Biodegradation Firmicutes and proteobacteria can degrade PCL. Penicillium sp. strain 26-1 can degrade high density PCL; though not as quickly as thermotolerant Aspergillus sp. strain ST-01. Species of clostridium can degrade PCL under anaerobic conditions.",
"and preventing spoilage without using preservatives. Most packaging material used in aseptic packaging is made from plastics instead of metal or glass containers due to the relatively low cost of producing plastic material when compared to metal and glass. Plastics are lighter than metal or glass making them cheaper and easier to transport. Plastics also required much less energy to produce than metal and glass. These factors have made plastic the packaging material of choice for use in aseptic processing. Effects on food quality Aseptic processing preserves food quality through fast heat treatment followed by a short holding time and",
"soil, more studies are needed to understand the full impact and significance of airborne microplastics. Proposed solutions Some researchers have proposed incinerating plastics to use as energy, which is known as energy recovery. As opposed to losing the energy from plastics into the atmosphere in landfills, this process turns some of the plastics back into energy that can be used. However, as opposed to recycling, this method does not diminish the amount of plastic material that is produced. Therefore, recycling plastics is considered a more efficient solution.\nIncreasing education through recycling campaigns is another proposed solution for microplastic contamination. While this"
] |
How space and time are connected | [
"Ok, let me actually try to explain like you're five:\n\nRight now you are in a specific place, that could be noted with coordinates. In math class that's x, y, and z for length, width and height. So if someone asked \"Where's KristiiNicole?\" instead of saying \"In front of the computer\" you could say \"she's at (coordinates of x, y, and z).\" But, you weren't there 20 years ago. 20 years ago there was an oak tree where you are standing. So that oak tree and you share the same coordinates, but obviously you aren't in the same place right now, so we add coordinate t to the equation. So let's call those xyz coordinates 1, 2, and 3. KristiiNicole, you are at 1,2,3,2017, whereas in 1,2,3,1997 there was a tree.",
"You live in a 4 dimensional universe. Three dimensions are distance (spacial) and one is time (temporal). The speed of light (C) is the ratio of the distance in the temporal one, the one we call time, to the distance in the spacial ones, which we call distance. Every object exists as a unit velocity segment in this 4-space. Since a 4-space is hard to think about, let's simplify (ELI5!) by considering the spacial dimensions in terms of our motion. Now we only have one spacial dimension, the direction we are moving. Turning (for the time being) doesn't count. Next we graph our 2-space universe, with time on the vertical and distance on the horizontal. Every object is one unit from the origin on this graph, a quarter-circle. If a segment is aligned with the time direction (it's vertical), the object's spacial dimensions must be 0, this gives 0 speed in space and 1 second per second in time. If the velocity segment is oriented along the spacial dimension (horizontal) the object is moving at C, and since all segments are one unit long, it must be 0 in the temporal dimension. Thus photons move at the speed of light but do not experience changes in time. Gravity and other forces use energy to change the orientation of an object's velocity segment, accelerating it in space and shortening the time element or decelerating it in space and lengthening the time segment.",
"The weirdest thing about physics is that the speed of light in a given medium appears to be constant, no matter what direction you are moving in and at what speed. This is totally different from, for example, traffic, where the cars moving with you seem to be mostly stationary or only slightly faster or slower than you, but the cars travelling in the opposite direction fly by at incredible speed.\n\nSo imagine that you are driving side by side with another car at the same speed (terribly illustrated below), and you flash your headlights. When the other driver sees the flash, he flashes back in response. If you are both travelling at almost zero speed, the flash only needs to go almost straight side-to-side, a very short distance, to go between where you were when you flashed, where the other car was when receiving the flash, and where you ended up after the other car flashed back. But if you are travelling at an extremely high speed, the beam of light is zigzagging along the road, travelling much further before it gets back to you.\n\n [ ] > [ ] (slow)\n \\ /\n [ ]\n\n [ ] > > > > > [ ] (fast)\n ¯¯¯----___ ___----¯¯¯\n [ ]\n\nBut the illustration is what we see looking at things from above; from your perspective, the other car has always been right next to you, and the light just went back and forth between you. We know from experiments that the speed of the light did not change. And it's clear to you from all the road you've covered that the distance is more. So what gives? Well, speed is distance divided by time. So if distance is more, and speed is the same, time must be more as well. What you see is that the light went between your cars as usual, but everything outside has slowed down - the driver in the other car, or the pedestrians on the sidewalk, appear to be in slow motion.\n\nI don't think we have any idea *why* the speed of light is constant. But because speed is a relationship between distance and time, that constant means that changes in distance end up affecting time as well.",
"Time is just matter in motion. Without motion there is no time."
] | [
"is defined between two spacelike-separated events (or along a spacelike path), while the proper time is defined between two timelike-separated events (or along a timelike path).",
"The basic elements of spacetimes are events. In any given spacetime, an event is defined as a unique position at a unique time. A spacetime is the union of all events (in the same way that a line is the union of all of its points), formally organized into a manifold.\nThe Universe appears to be a smooth spacetime continuum consisting of three spatial dimensions and one temporal (time) dimension (an event in the spacetime of the physical Universe can therefore be identified by a set of four coordinates: (x, y, z, t) ). On the average, space is observed to",
"They are in fact the elements of motion and in their reality are inseparable from the universe of motion; they are elements in a continuum.\n— Space, Time and Deity [1920] Vol. I, p. 325\n Time makes Space distinct and Space makes Time distinct... Space or Time, may be regarded as supplying the element of diversity to the element of identity supplied by the other.\n— Space, Time and Deity [1920] Vol. I, p. 195\nAlexander absolutizes spacetime, and even speaks of it as a \"stuff\" of which things are made. At the same time he also says that spacetime can be called \"Motions\" –",
"several branches of physics and mathematics.\nIn 2006, Bars presented the theory that time does not have only one dimension (past/future), but has two separate dimensions instead.\nHumans normally perceive physical reality as four dimensional, i.e. three-dimensional space (up/down, back/forth and side-to-side), and one-dimensional time (past/future). Bars' theory proposes a six-dimensional universe, composed of four-dimensional space and two-dimensional time.\nPhysicist Joe Polchinski, at the Kavli Institute for Theoretical Physics at UC Santa Barbara, has said \"Itzhak Bars has a long history of finding new mathematical symmetries that might be useful in physics... This two-time idea seems to have some interesting mathematical properties.\" Quoted",
"themselves. An example is the physical pattern \"apple\", which instantiates the \"APPLE\" symbolic structure. Space and time GFO uses a theory of space and time which is inspired by the philosophy of Brentano. For time, time-intervals, called chronoids, are taken as primitive. Existentially dependent on these time-intervals are time-boundaries. Time-boundaries of different time-intervals may coincide. This notion of coincidence is equivalent to a formalization of time-based on the meets relation (due to Allen and Hayes).\nConnected three-dimensional parts of space are called \"topoids\". As chronoids, topoids may coincide at a two-dimensional boundary. This boundary may coincide with other (two-dimensional) boundaries at",
"Time–space compression Time–space compression (also known as space–time compression and time–space distantiation), articulated in 1989 by geographer David Harvey in The Condition of Postmodernity, it refers to anything that impacts time and space. Harvey's idea was rooted in Karl Marx's theory of the \"annihilation of time and space\". A similar idea was proposed by Elmar Alvater in an article in PROKLA in 1987 translated into English as \"Ecological and Economic Modalities of Time and Space\" and published in Capitalism Nature Socialism, 1(3) in 1989.\nTime–space compression often occurs as a result of technological innovations including technology of communication and economics. \nAccording",
"same time\" or not, and they can also disagree on the order of the two events (technically, these disagreements occur when the spacetime interval between the events is 'space-like', meaning that neither event lies in the future light cone of the other).\nIf one of the two events represents the sending of a signal from one location and the second event represents the reception of the same signal at another location, then as long as the signal is moving at the speed of light or slower, the mathematics of simultaneity ensures that all reference frames agree that the transmission-event happened before",
"without territorial contiguity. It is not purely electronic space...It is made up first of all of a technological infrastructure of information systems, telecommunications, and transportation lines\" (Castells, Manuel (2000): Grassrooting the Space of Flows, hg. von. James O. Wheeler, Yuko Aoyama und Barney Warf, London: Routledge, p.19). Theoretic Traditionally, the concept of space is considered a passive entity, while time is considered a separate and active entity. Space should not be disconnected from time, because space is a dynamic entity related to time. Castells rejected the contention that space will disappear upon the creation of the global city, because space",
"Spacetime Definitions Non-relativistic classical mechanics treats time as a universal quantity of measurement which is uniform throughout space and which is separate from space. Classical mechanics assumes that time has a constant rate of passage that is independent of the state of motion of an observer, or indeed of anything external. Furthermore, it assumes that space is Euclidean, which is to say, it assumes that space follows the geometry of common sense.\nIn the context of special relativity, time cannot be separated from the three dimensions of space, because the observed rate at which time passes for an object depends on",
"spacetime is 3-dimensional, call the space M. Now we are considering a circle in configuration space, which is the same thing as a single configuration on the space . To find out the number of times that the sign of the square root vanishes as one goes around the circle, it suffices to count the number of zeroes of the determinant on , because each time that a pair of eigenvalues changes sign there will be a zero. Notice that the eigenvalues come in pairs, as discussed for example in Supersymmetric Index Of Three-Dimensional Gauge Theory, and so whenever one",
"every pair is space-like separated), then is the future of , i. e.:\nSimilarly , the past of , is the same thing going forward in time.\nWhen there are no closed timelike curves, and are two different regions. When the time dimension closes up on itself everywhere so that it makes a circle, the future and the past of are the same and both include . The Cauchy surface is defined rigorously in terms of intersections with inextensible curves in order to deal with this case of circular time. An inextensible curve is a curve with no",
"allows for a cataloguing of time and the change that it brings within each piece. These different elements find themselves bound within determined space. These boundaries serve both to unite and separate. They are definite or subtle, encroaching and ignored, erased only to reappear, self-organizing itself into larger more stable wholes.",
"relativity, space and time are not modeled as separate entities but are instead unified to a four-dimensional spacetime, three spatial dimensions and one time dimension. In this framework, the phenomenon of gravity is viewed as a consequence of the geometry of spacetime.\nIn spite of the fact that the universe is well described by four-dimensional spacetime, there are several reasons why physicists consider theories in other dimensions. In some cases, by modeling spacetime in a different number of dimensions, a theory becomes more mathematically tractable, and one can perform calculations and gain general insights more easily. There are also situations where",
"starting point against finding similarities in a complex matrix is highlighted in particular in the different ways notes how NAP and WP analyse space and time. Typical WP views the world in sections: the universe is viewed as created ex nihilo (implying it had a definitive beginning and most likely with have a definitive end) and is depicted as violent (e.g. 'the big bang'). Moreover, time is broken up into 3 simple sections that all acts can fit within: past, present and future, all of which have definable boundaries that actions in reality can go up to and occasional cross.",
"Informal discussion Informally, an object in our space is simply connected if it consists of one piece and does not have any \"holes\" that pass all the way through it. For example, neither a doughnut nor a coffee cup (with handle) is simply connected, but a hollow rubber ball is simply connected. In two dimensions, a circle is not simply connected, but a disk and a line are. Spaces that are connected but not simply connected are called non-simply connected or multiply connected.\n\nThe definition only rules out handle-shaped holes. A sphere (or, equivalently, a rubber ball with a hollow center)",
"(which I would abandon only reluctantly) that space and time are completely different things, and that there is a \"true time\" (simultaneity thus would be independent of the location, in agreement with the circumstance that we can have the idea of infinitely great velocities), then it can be easily seen that this true time should be indicated by clocks at rest in the aether. However, if the relativity principle had general validity in nature, one wouldn't be in the position to determine, whether the reference system just used is the preferred one. Then one comes to the same results, as",
"of the universe (special relativity) Special relativity places space and time on equal footing, so that one considers the geometry of a unified spacetime instead of considering space and time separately. Minkowski geometry replaces Galilean geometry (which is the three-dimensional Euclidean space with time of Galilean relativity).\nIn relativity, rather than considering Euclidean, elliptic and hyperbolic geometries, the appropriate geometries to consider are Minkowski space, de Sitter space and anti-de Sitter space, corresponding to zero, positive and negative curvature respectively.\nHyperbolic geometry enters special relativity through rapidity, which stands in for velocity, and is expressed by a hyperbolic angle. The study of",
"merging into spacetime in Einstein's special relativity and general relativity. According to these theories, the concept of time depends on the spatial reference frame of the observer, and the human perception as well as the measurement by instruments such as clocks are different for observers in relative motion. For example, if a spaceship carrying a clock flies through space at (very nearly) the speed of light, its crew does not notice a change in the speed of time on board their vessel because everything traveling at the same speed slows down at the same rate (including the clock, the crew's",
"Complex spacetime In mathematics and mathematical physics, complex spacetime extends the traditional notion of spacetime described by real-valued space and time coordinates to complex-valued space and time coordinates. The notion is entirely mathematical with no physics implied, but should be seen as a tool, for instance, as exemplified by the Wick rotation. Mathematics The complexification of a real vector space results in a complex vector space (over the complex number field). To \"complexify\" a space means extending ordinary scalar multiplication of vectors by real numbers to scalar multiplication by complex numbers. For complexified inner product spaces, the complex inner product",
"Differential space–time code Differential space–time codes are ways of transmitting data in wireless communications. They are forms of space–time code that do not need to know the channel impairments at the receiver in order to be able to decode the signal. They are usually based on space–time block codes, and transmit one block-code from a set in response to a change in the input signal. The differences among the blocks in the set are designed to allow the receiver to extract the data with good reliability. The first differential space-time block code was disclosed by Vahid Tarokh and Hamid",
"other produce a mathematical concept of time that works sufficiently well for describing the everyday phenomena of most people's experience. In the late nineteenth century, physicists encountered problems with the classical understanding of time, in connection with the behavior of electricity and magnetism. Einstein resolved these problems by invoking a method of synchronizing clocks using the constant, finite speed of light as the maximum signal velocity. This led directly to the result that observers in motion relative to one another measure different elapsed times for the same event. Spacetime Time has historically been closely related with space, the two together",
"a graph with physical locations along the horizontal axis and time running vertically, with units of for time and ct for space. Light cones in this representation appear as lines at 45 degrees centered on the object, as light travels at per . On such a diagram, every possible future location of the object lies within the cone. Additionally, every space location has a future time, implying that an object may stay at any location in space indefinitely.\nAny single point on such a diagram is known as an event. Separate events are considered to be timelike separated if",
"views, which delineate with different shades a pure form of temporality, more original than its representations and spatializations, Marramao declares that the link time-space is inseparable and, also connecting to contemporary Physics, he asserts that the structure of Time possesses an aporetic and impure profile, compared to which the dimension of space is the formal reference necessary to think its paradoxes (Minima temporalia, 1990, new edition in 2005; Kairos: Towards an Ontology of Due Time, 1992, new edition in 2005).",
"a connected space requires more work to build structure. This makes them mathematically interesting as a notion of space, and offers a useful way of modeling physical and virtual information systems.",
"the laws of thermodynamics (we perceive time as flowing in the direction of increasing entropy).\nThe best-known treatment of time as a dimension is Poincaré and Einstein's special relativity (and extended to general relativity), which treats perceived space and time as components of a four-dimensional manifold, known as spacetime, and in the special, flat case as Minkowski space. Additional dimensions In physics, three dimensions of space and one of time is the accepted norm. However, there are theories that attempt to unify the four fundamental forces by introducing extra dimensions. Most notably, superstring theory requires 10 spacetime dimensions, and originates from",
"from a Euclidean perspective, with space as consisting of three dimensions, and time as consisting of one dimension, the \"fourth dimension\". By combining space and time into a single manifold called Minkowski space, physicists have simplified a large number of physical theories, as well as described in a more uniform way the workings of the Universe at both the supergalactic and subatomic levels.\nSpacetime events are not absolutely defined spatially and temporally but rather are known to be relative to the motion of an observer. Minkowski space approximates the Universe without gravity; the pseudo-Riemannian manifolds of general relativity describe spacetime with",
"about different things while using the same “space” word. Hence, Carnap characteristically argued that there had to be three separate notions of space. “Formal” space is space in the sense of mathematics: it is an abstract system of relations. “Intuitive” space is made of certain contents of intuition independent of single experiences. “Physical” space is made of actual spatial facts given in experience. The upshot is that those three kinds of “space” imply three different kinds of knowledge and thus three different kinds of investigations. It is interesting to note that it is in this dissertation that the main themes",
"of time. It is sometimes referred to as the \"block time\" or \"block universe\" theory due to its description of space-time as an unchanging four-dimensional \"block\", as opposed to the view of the world as a three-dimensional space modulated by the passage of time. The present In classical philosophy, time is divided into three distinct regions; the \"past\", the \"present\", and the \"future\". Using that representational model, the past is generally seen as being immutably fixed, and the future as at least partly undefined. As time passes, the moment that was once the present becomes part of the past; and",
"time is that over most of the progress coordinate space the coordinate only needs to be evaluated at fixed time intervals (rather than continuously) because the exact time-point at which interfaces other than the final interface are reached is no longer of importance.",
"the world line connecting them, and hence on the motion of the clock between the events. It is expressed as an integral over the world line. An accelerated clock will measure a smaller elapsed time between two events than that measured by a non-accelerated (inertial) clock between the same two events. The twin paradox is an example of this effect.\nIn terms of four-dimensional spacetime, proper time is analogous to arc length in three-dimensional (Euclidean) space. By convention, proper time is usually represented by the Greek letter τ (tau) to distinguish it from coordinate time represented by t.\nBy contrast, coordinate time"
] |
Why do our faces have certain expressions when we feel different emotions? | [
"It's still a very active area of behavioral research, but the best explanations seem to be along the lines that mammals of all sorts have reflexive communication, either through cries, body language, or pheremones. Human pheremone display and response is rather sedate, suggesting that we do with our faces what other creatures do with chemicals. Studies suggest that when people are unable to read facial cues, they distrust those people more than if those cues are obvious. The explanations as to why reflexive honesty is benificial are varied and not particularly scientific.",
"Communication.\n\nHumans are very social creatures, we've evolved numerous non-verbal mechanisms to convey information."
] | [
"means that the brain processes the other's facial and bodily expressions simultaneously.\nSubjects in these studies showed accuracy in judging emotions based on facial expression. This is because the face and the body are normally seen together in their natural proportions and the emotional signals from the face and body are well integrated.\nFor example, a lack of crinkles around the eyes suggests a potentially fake smile. At one point, researchers believed that making a genuine smile was nearly impossible to do on command. When you're smiling joyfully, they crinkle. When you're faking it, they don't. If someone's trying to look happy",
"others' facial expressions. Whether the emotion contained in someone's face is classified categorically or along dimensions of valence and arousal, the face provides reliable cues to one's subjective emotional state. As efficient as humans are in identifying and recognizing emotion in another's face, accuracy goes down considerably for most emotions, with the exception of happiness, when facial features are inverted (i.e., mouth placed above eyes and nose), suggesting that a primary means of facial perception includes the identification of spatial features that resemble a prototypical face, such that two eyes are placed above a nose which is above a mouth;",
"between verbal communication and facial expression of emotions in communication, conflicts and misunderstandings can arise.\nUsing the example of smiling, Rainer Krause shows in a (German) presentation the difference between a natural-looking and a phony smile, in which not the same muscles are involved. Significant in this regard is the fact that the muscles of the so-called “lower face” can be consciously controlled much easier than the muscles of the so-called “upper face”. And with a smile that seems spurious, certain muscles of the upper face are not involved. As the “most common emotions that you get to see”, Krause is",
"faces, reflecting the expressions on their own faces, which seems to help people better understand the other person's emotion. In addition, researchers have also suggested that the neural mechanisms that are activated when personally experiencing emotions are also activated when viewing another person experiencing the same emotions (mirror neurons). Pain seems to specifically activate a region known as the cingulate cortex, in addition to activation that is mentioned earlier. The temporal parietal junction, orbitofrontal cortex, and ventral striatum are also thought to play a role in the production of emotion.\nGenerally, empathic emotions (including sympathy), require the activation of top-down",
"revolved around the finding that certain emotions appeared to be universally recognized, even in cultures that were preliterate and could not have learned associations for facial expressions through media. Another classic study found that when participants contorted their facial muscles into distinct facial expressions (for example, disgust), they reported subjective and physiological experiences that matched the distinct facial expressions. His research findings led him to classify six emotions as basic: anger, disgust, fear, happiness, sadness and surprise. Later in his career, Ekman theorized that other universal emotions may exist beyond these six. In light of this, recent cross-cultural studies led",
"is not connected to an infant's reaction to that stimulus.\nThe recognition of faces is an important neurological mechanism that individuals in society use every day. Jeffrey and Rhodes write that faces \"convey a wealth of information that we use to guide our social interactions\". Emotions play a large role in our social interactions. The perception of a positive or negative emotion on a face affects the way that an individual perceives and processes that face. For example, a face that is perceived to have a negative emotion is processed in a less holistic manner than a face displaying a positive",
"by how things are named but by what we are told about them. Emotion Emotions are an important characteristic of the human species. An emotion is an abstract concept that is most easily observed by looking at facial expressions. Emotions and their relation to categorical perception are often studied using facial expressions. Faces contain a large amount of valuable information.\nEmotions are divided into categories because they are discrete from one another. Each emotion entails a separate and distinct set of reactions, consequences, and expressions. The feeling and expression of emotions is a natural occurrence, and, it is actually a universal",
"Developmental differences in solitary facial expressions Discrimination and expression Facial expressions are produced to express a reaction to a situation or event or to evoke a response from another individual or individuals. They are signals of emotion and social intent. People make faces in response to \"direct audience effects\" when they are watching sports, discussing politics, eating or smelling, in pain, and see or hear something humorous. While one may have the same emotional reaction to a particular situation, he or she is more likely to express this emotion via a facial expression if they are in a social situation.",
"looking at faces displaying emotions (especially those with fear facial expressions) compared to neutral faces there is increased activity in the right fusiform gyrus. This increased activity also correlates with increased amygdala activity in the same situations. The emotional processing effects observed in the fusiform gyrus are decreased in patients with amygdala lesions. This demonstrates possible connections between the amygdala and facial processing areas.\nAnother aspect that affects both the fusiform gyrus and the amygdala activation is the familiarity of faces. Having multiple regions that can be activated by similar face components indicates that facial processing is a complex process. Platek",
"are happy. If a person is crying, they are sad. Each emotion has a consistent and specific pattern of expressions, and that pattern of responses is only expressed during that emotion and not during other emotions. Facial emotional expressions are particularly salient stimuli for transferring important nonverbal signals to others. For that reason, emotional expressions are the best direct indicators of affective attitudes and dispositions. There is growing evidence that brain regions generally engaged in the processing of emotional information are also activated during the processing of facial emotions.\nSome theories of emotion take the stance that emotional expression is more",
"emotions is by a \"hardwired mechanism\". Additional evidence exists showing the verbal labels from cultures that may not have a label for a specific emotion but can still categorically perceive it as its own emotion, discrete and isolated from other emotions. The perception of emotions into categories has also been studied using the tracking of eye movements which showed an implicit response with no verbal requirement because the eye movement response required only the movement and no subsequent verbal response.\nThe categorical perception of emotions is sometimes a result of joint processing. Other factors may be involved in this perception. Emotional",
"brain pathways associated with facial expression; the first is voluntary expression. Voluntary expression travels from the primary motor cortex through the pyramidal tract, specifically the corticobulbar projections. The cortex is associated with display rules in emotion, which are social precepts that influence and modify expressions. Cortically related expressions are made consciously.\nThe second type of expression is emotional. These expressions originate from the extrapyramidal motor system, which involves subcortical nuclei. For this reason, genuine emotions are not associated with the cortex and are often displayed unconsciously. This is demonstrated in infants before the age of two; they display distress, disgust, interest,",
"emotional expressions through recognizing distinct facial expressions that are unique to each emotion. The second part of this training program trains individuals to read micro-expressions; a face elicits an emotion very quickly and the individual is prompted to report which emotion was seen. The Subtle Expression Training Tool (SETT) trains individuals to be able to recognize the subtle changes in a person's facial expression due to slight changes in emotional experiences. These subtle expressions can occur at the onset of emotions, or when an individual is actively suppressing the emotion. Appraisal model Appraisal models of emotion state that emotions are",
"any other formation of features does not immediately constitute a face and requires extra spatial manipulation to identify such features as resembling a face. Discrete versus dimensional views Research on the classification of perceived emotions has centered around the debate between two fundamentally distinct viewpoints. One side of the debate posits that emotions are separate and discrete entities whereas the other side suggests that emotions can be classified as values on the dimensions of valence (positive versus negative) and arousal (calm/soothing versus exciting/agitating). Psychologist Paul Ekman supported the discrete emotion perspective with his groundbreaking work comparing emotion perception and",
"in social situations. Humans have control over facial expressions both consciously and unconsciously: an intrinsic emotion program is generated as the result of a transaction with the world, which immediately results in an emotional response and usually a facial reaction. It is a well documented phenomenon that emotions have an effect on facial expression, but recent research has provided evidence that the opposite may also be true.\nThis notion would give rise to the belief that a person may not only control his emotion but in fact influence them as well. Emotional regulation focuses on providing the appropriate emotion in the",
"The role of facial expressions in emotional communication is often debated. While Darwin believed the face was the most preeminent medium of emotion expression, more recent scientific work challenges that theory. Furthermore, research also suggests that cultural contexts behave as cues when people are trying to interpret facial expressions. In everyday life, information from people's environments influences their understanding of what a facial expression means. According to research by Masuda et al. (2008), people can only attend to a small sample of the possible events in their complex and ever- changing environments, and increasing evidence suggests that",
"\"primary emotions\" which are grouped either positively or negatively and can then be combined to form more complex emotions, sometimes considered \"secondary emotions\", such as remorse, guilt, submission, and anticipation. Plutchik created the \"wheel of emotions\" to outline his theory. Culture Culture plays a significant role in emotion perception, most notably in facial perception. Although the features of the face convey important information, the upper (eyes/brow) and lower (mouth/nose) regions of the face have distinct qualities that can provide both consistent and conflicting information. As values, etiquette, and quality of social interactions vary across cultures, facial perception is believed",
"contempt. These emotions are recognized universally. These expressions are innate of develop through socialization.\nCultures have a variety of rules governing the social use of facial expression; for example, the Japanese discourage the display of negative emotions. Individuals may find it difficult to control facial expression, and the face may \"leak\" information about how they feel. Gaze People use eye contact to indicate threat, intimacy and interest. Eye contact is used to regulate turn-taking in conversation, and indicates how interested the listener (receiver) is in what the speaker is saying. Receivers make eye contact about 70–75 percent of the time, with",
"can account for the wide variability in emotional expression (e.g. crying when extremely happy; laughing when uncomfortable). Psychological construction models call into question the assumption that there are basic, discrete emotion expressions that are universally recognized. Many basic emotion studies use highly posed, stereotypical facial expressions as emotional signals such as a pout, which would indicate one is feeling sad. These facial expressions can be better understood as symbols of emotion rather than signals. While these symbols have undeniable emotional meaning and are consistently observed during day-day emotional behavior they do not have a 1-to-1 relationship a person's internal",
"as a result of special mechanisms, and each emotion has its own respective specific brain circuit. Moreover, the expression of each emotion has its own respective response, manifestation in face, voice, and body. The basic emotion view Ekman to create the Facial Action Coding System (FACS) and Facial Expression Awareness Compassion Emotions (F.A.C.E). FACS is a database of compiled facial expressions, wherein each facial movement is termed an action unit (AU). F.A.C.E explains how to become keen at observing emotion in the faces of others. It consists of the Micro Expression Training Tool (METT), which trains individuals to disambiguate between",
"the view that there are at least some universal facial expressions of emotion. Nevertheless, it is also important to note that in the study there were differences in the way in which participants across cultures rated emotion intensity.\nWhile there are said to be universally recognized facial expressions, Yueqin Huang and his colleagues performed research that looked at how a culture may apply different labels to certain expressions of emotions. Huang et al. (2001) in particular compared Chinese versus American perceptions of facial emotion expressions. They found that the Chinese participants were not as skilled as the American participants at perceiving",
"the quality of his emotional experience.\" In other words, a person's facial expression can act as a cause of an emotional state, rather than an effect; instead of smiling because they feel happy, a person can make themselves feel happy by smiling.\nIn 2006, Tiffany Ito and her colleagues conducted two studies to investigate if changes in facial expression can trigger changes in racial bias. The explicit goal of the studies was to determine \"whether facial feedback can modulate implicit racial bias as assessed by the Implicit Association Test (IAT).\" Participants were surreptitiously induced to smile through holding a pencil in",
"anger, contempt, surprise, and fear. Infants' displays of these emotions indicate that they are not cortically related. Similarly, blind children also display emotions, proving that they are subconscious rather than learned. Other subcortical facial expressions include the \"knit brow\" during concentration, raised eyebrows when listening attentively, and short \"punctuation\" expressions to add emphasis during speech. People can be unaware that they are producing these expressions. Neural mechanisms in face perception The amygdala plays an important role in facial recognition. Functional imaging studies have found that when shown pictures of faces, there is a large increase in the activity of the",
"of the brain suggests that cognitive and affective-expressive forms of communication and self-reflection have distinct neural bases. Clinical findings have long suggested that verbalizations are often very incoherent when the individual is trying to put into words something deeply emotional. Identification of words naming emotions (happy, neutral, sad) was found to be faster than identification of corresponding facial expressions. Recognition of face expressions was more difficult to suppress in favor of the recognition of words than vice versa, the two conditions presenting different patterns of brain activation. These experimental results suggest that reading and recognition of face expressions are stimulus-dependent",
"emotion-specific facial expressions. These expressions are often the same from culture to culture and are often reproduced by observers, which facilitates the observers' own understanding of the emotion and/or situation. There are six universal emotions: happiness, sadness, fear, surprise, disgust and anger.\nNonverbal communication cues are often subconscious and difficult to control. Deliberate regulation of emotion and nonverbal expression is often imperfect. Nonverbal gestures and facial expressions are also generally better understood by people observing the gestures, expressions, etc., and not by the person experiencing them first hand.\nCommunicating using physical touch has the unique ability of conveying affective information upon",
"cultural backgrounds who were shown a series of faces and asked to sort them into piles in which every face showed the same emotion. Fixation on different features of the face leads to disparate reading of emotions. Asians' focus on the eyes lead to the perception of startled faces as surprise rather than fear. As a result, previous associations or customs of an individual can lead to different categorization or recognition of emotion. This particular difference in visual perception of emotion seems to suggest an attention bias mechanism for wishful seeing, since certain visual cues were attended to",
"mouth to feed. There is substantial and compelling evidence that supports mimicry of facial expressions occurs automatically. (Dimberg, Thumber, and Elmeched, 2000).\nEmotional Mimicry research finds that facial actions can automatically elicit feelings (Neumann and Strack, 2000). When a mood is being displayed is a happy mood, both high and low emotions are expressive and participants in study pass their moods from one to another.\nVerbal Mimicry research includes that a number of verbal tendencies are mimicked (Simner, 1971). Studies with infants demonstrated that newborns as young as 2–4 days old, will cry in response to another infants crying. ",
"research of Paul Ekman (1971) and Carroll Izard (1971) further explored the proposed universality of emotions, showing that the expression of emotions were recognized as communicating the same feelings in cultures found in Europe, North and South America, Asia, and Africa. Ekman (1971) and Izard (1971) both created sets of photographs displaying emotional expressions that were agreed upon by Americans. These photographs were then shown to people in other countries with the instructions to identify the emotion that best describes the face. The work of Ekman, and Izard, concluded that facial expressions were in fact universal, innate, and phylogenetically",
"expressions of emotion can be affected by emotional states among many factors. In accordance with attachment orientation Niedenthal has proposed that lower level cognitive processes of perception such as the timing of the perceived offset of facial expressions of emotion influence the perception of facial expressions of different emotions such as happiness, anger, fear, and sadness. Emotional response categorization Defined as: \"the mental grouping together of objects and events that elicit the same emotion, and the treatment of those objects and events as \"the same kind of thing\"\". Emotional response categorization enables an individual to choose an appropriate action in",
"emotions through the use of Wilsons’ idea of \"online\" and ‘’offline’’ embodiment in that embodiment is present when individuals respond to real emotion objects as well as when individuals represent the meanings of emotional symbols (e.g., words). Facial expressions and embodiment Niedenthal has demonstrated that mimicry plays a causal role in the processing of emotional expression. Consistent with the embodiment hypothesis; In her study participants that were free to mimic the expressions detected the change in emotional expression earlier and more efficiently for any facial expression than those who were prevented from mimicking the expressions. Further studies have shown that"
] |
How can they tell that a huge wildfire, burning hundreds of thousands of acres, was started by a single campfire, or dropped cigarette? | [
"Fire investigators can tell which directing fires burned. With that knowledge that can get pretty close to the point of origin. Once there, they do some investigating. \n\nI live in California and the Rim fire WAS suspected of being started by Marijuana growers. That's what the news said but fire officials have stated the origin is very steep and would not be a good place to grow weed. \n\nOne scientist has said it's possible the fire was ignited by a rock slide. Two rocks slamming into each other can cause sparks and it's been pretty dry up here.",
"Taking what cheekske said a little further. In a forest fire the fire builds intensity as it grows. The origin of the fire is not usually completely consumed. They know the direction the fire traveled. They follow it back. They find an area that its burned, but not burned completely out. \n\nWhat they found in the case of the rim fire was a campsite. A ring of rocks, next to a melted cooler and tent with a sleeping bag inside and basic camping gear. The area was covered in grass. The grass was burnt all around the area the campsite was built in. But the ladder fuel was still intact. The small trees that set the larger trees on fire were burnt but not consumed. The hunter didn't even grab his gun. \n\nThe investigators think the guy built his camp site on the grass and didn't even clear an area. When the fire started he tried to put it out, wasn't able to, then just ran down the hill to his vehicle and drove out.",
"It's not exactly an explanation of the cigarette, but it's a perfect example of what you're asking.\n\nI worked doing Wildlife restoration, much of which revolved around having to get rid of (burning) the brush that we removed from an area. So I had a fire of mostly buckthorn which had been dried out a few days. As I had my fire going there were embers popping out of the fire and being carried by the wind. Most of them would go out, but there was one that stuck in an old log and **smoldered**. \n\nI didn't notice it at first, but as time went on it spread further on the log and became almost difficult to extinguish. I was almost shitting my pants because I was under explicit orders not to let exactly that happen. I finally got it out, but if I wasn't looking for it, I would never have seen it.\n\nMoral of the story is that small fires aren't always visible and are patient. If you're not alert about what your fires are up to, a fire can spread faster than you want.\n\nI have a story of intentionally started fires moving faster than wanted, but that's not really on topic unless you want to hear it/see pictures.",
"I remember a small brush fire on a hill where I grew up was started in some guys back yard but the way the fire burned it formed a giant arrow on the hillside pointing directly at his house. The investigators figured that one out pretty quickly.",
"So Cerberus73, anything you wanna fess up about?",
"Rarely are things completely consumed (reduced), especially near the origin. Burn indicators point back to the origin pretty consistently, and in the \"area of confusion\" (where in a small patch, the burn indicators are less reliable), you start to comb through the remaining burned area for matches, cigarette filters, fireworks. Evidence samples can reveal the original fuel, after sent to a testing lab.\n\nEliminating causes helps too. Not near a road, or railroad, so not likely from a vehicle. No lightning detected/reported...\n\nFinding a burned up camp in your area of origin is a big \"Ding-Ding-Ding!\" (Sorry for the technical jargon, that means a likely cause)",
"How would you feel being the guy who caused all that wildlife to burn?"
] | [
"in lower areas. Few people lived in the area in 1950.\nSources vary on the origin of the fire but agree it was caused by human activity; one version faults an Imperial Oil surveying crew with starting a small blaze to protect their horses from biting insects. Other sources theorize that slash burning from agricultural clearing could have been the initial spark. The blaze started on 1 June 1950 and continued to burn throughout the summer and early fall until the end of October. The ignition point was north of Fort St. John, British Columbia, and the fire",
"popular Horsetail Falls, Wahclella Falls, Oneonta Gorge, and Eagle Creek Trails, among others. Cause On September 5, Oregon State Police announced that it had identified the person suspected of starting the wildfire, through the use of fireworks that were illegally set off, as a 15-year-old boy from Vancouver, Washington. A witness reported seeing a group of teenagers recording the fireworks being lit and thrown into Eagle Creek Canyon.\nIt was announced on September 8 that Oregon State Police had obtained cellphone video footage from one of the teenagers who had watched while a 15-year-old Vancouver boy threw a smoking firecracker, allegedly",
"Cave Creek Complex Wildfire The Cave Creek Complex Wildfire was the third largest forest fire in the state of Arizona to date, after the Rodeo-Chediski fire and Wallow Fire. History The fire started on June 21, 2005 by a lightning strike and scorched 243,950 acres (987.2 km²).\nWithin an hour, the fire had already burned from 2,000 to 10,000 acres (8.1 to 40.5 km²).\nWhen news agencies were covering the story, a FOX news affiliate captured video of the historic Cave Creek Mistress mine destroyed by the fire as soon as the fire touched it. The mine was a total loss.\nAlso in this fire,",
"to catch fire. The fire may continue into the 22nd century. The fire was contained in 1973, but was not extinguished. Had the fire not been contained, it would have eventually spread under the entirety of the Wyoming Valley. The fire burns between 200 feet (61 m) and 300 feet (91 m) underground at a temperature of approximately 1,000 °F (538 °C).\nThe creek flooded in September 1850. It was the most severe flood of the creek up to that time. In January 1996, 400 buildings along Solomon Creek flooded by it due to melting snow. This was one of numerous floods on that area",
"a wildfire are lightning, an eruption from a volcano, sparks from a rockfall, and spontaneous combustion. The most common man-made causes for wildfires include debris burning or other carelessness and arson. While not as common as arson or intentionally starting a fire, the improper disposal of a cigarette can cause a fire that could become uncontrollable. The most dominant cause of wildfires differs around the globe. Within the United States, the most common natural cause for wildfires has been found to be lightning strikes. Across the world, however, intentional ignition can be identified as the most common man-made cause for",
"population was decreasing prior to the wildfire, since a wildfire stimulates the development of roots. However, the wildfire also made the area vulnerable to an influx of nonnative grasses, that could threaten the native vegetation, and could potentially fuel another wildfire.\nLess than two years before the Strawberry Fire, a National Park Service archaeologist found a 134-year-old Winchester rifle leaning against a juniper tree near Strawberry Creek Campground. The tree was destroyed by the fire.",
"Painted Rock Elementary School, but was quickly extinguished.\nOn May 15, two teenagers were arrested and charged with arson for attempting to ignite two small brush fires, both of which were extinguished within minutes. Police had no evidence linking them to any of the actual major wildfires, and ultimately, no charges were filed against the suspects.\nDuring the evening of May 15, a brush fire broke out close to Interstate 805 in National City near 45th Street; it was extinguished in about an hour.\nAt 8:00 AM PDT on May 17, a brush fire was reported in a canyon area northwest of Santee",
"a rapid forward rate of spread (FROS) when burning through dense uninterrupted fuels. They can move as fast as 10.8 kilometres per hour (6.7 mph) in forests and 22 kilometres per hour (14 mph) in grasslands. Wildfires can advance tangential to the main front to form a flanking front, or burn in the opposite direction of the main front by backing. They may also spread by jumping or spotting as winds and vertical convection columns carry firebrands (hot wood embers) and other burning materials through the air over roads, rivers, and other barriers that may otherwise act as firebreaks. Torching and fires",
"spreading of a backyard fire in Spring Branch, Houston, Texas, a packaging warehouse burned down during a four-alarm fire which included exploding canisters of hazardous material. Nearly 200 firefighters were dispatched to the site over several hours. As of May 2016, the initial cause of the fire remains unknown.",
"an electrical wire, sparking the fire) and 2,000 acres (sparks from live fire catching dry vegetation near by).\nIn 2008, negligent campers left a fire smoldering at a Los Padres National Forest campsite immediately northeast of Hunter Liggett. The ensuing wildfire — subsequently called the \"Indians Fire\" after the campsite where it originated — consumed over 200,000 acres, 9,000 of which were on the northern end of the military installation. While battling the fire, over 3,000 firefighters from across the nation based at Fort Hunter Liggett near one of the newly established Tactical Training Bases.\nOn August 13, 2016, the Chimney Fire",
"there occurred independently or combined with other fires started soon thereafter, including one started by a locomotive in Dodson, Oregon. Other accounts cite lightning as the genesis of the fire as well as careless campers and berry pickers, hunters, and loggers cutting slash. The fire spread rapidly, extending from Bridal Veil, Oregon to Cascade Locks, Oregon before burning debris carried across the Columbia River to Washington. It traveled 30 miles (48 km) in 36 hours and destroyed 238,920 acres (967 km²) of timber, about 12 billion board feet (28,000,000 m³), in Clark, Cowlitz and Skamania counties. Extent of damage",
"that the fire was sparked by a discarded cigarette.",
"explains that the fires appear to be the work of an arsonist (\"one of our advertising booklets was mailed back to us anonymously\") who draws an \"X\" across each business which he or she sets ablaze. The next is indicated as \"ACME FUR COMPANY\" and the cut-out letters \"WHEN?\". One of the board members (unbilled Edward Van Sloan) exclaims, \"Arson! Arson! Every time you investigators get up a tree, you cry firebug\". To which the apple-chewing Digby responds, \"Better get Tom Fletcher back, boys\". As the members discuss details, Grayson describes it as \"the biggest campaign of crime ever aimed",
"The investigators found no evidence of arson, or of an electrical fire, since the generator had not been installed. Instead, they identified spontaneous combustion as the most likely cause. Earlier on the day the fire started, a linseed oil finish was being applied to the \"magnificent\" oak and walnut interior cabinets and woodwork. Workers had previously been rebuked for carelessness with the flammable finishing materials. The fire probably started in oil-soaked cotton rags, in the ground floor dining room, below the library and Jack London's work room. Some of the windows had not yet been installed, allowing free air flow",
"cause of the blaze was sparks from electric power lines. 30 mph gusts of wind apparently toppled trees which tumbled into electrical lines at two locations, creating sparks that fell onto and ignited the dry grass and leaf litter below. The fire was exacerbated by the outflow of Tropical Storm Lee in conjunction with exceptional drought. The fire quickly spread, engulfing 400 homes. Multiple areas and locales were evacuated, including the Bastrop Animal Shelter, Bastrop State Park (more than half of which was burned), and other communities affected by the fire. By 7:30 PM on September 5, 2011, the fire had",
"It is not believed to have touched the ground, but was pushed into a nearby eucalyptus tree by the strong prevailing wind.\nBurning gumleaves fell to the ground and ignited grass, from which the fire grew extremely rapidly in the hot, dry and windy conditions. Over 230 firefighters, with 43 appliances and two water bombing aircraft, worked to contain the fire which burnt 770 ha (1,900 acres). The fire destroyed one house, two haysheds, three tractors, the Coleraine Avenue of Honour, and 200 km (120 mi) of fences, as well as injuring livestock, but firefighters were able to save six other homes, including that",
"fire was contained by the evening of June 5. It had burned a total of 1,127 acres (456 ha).",
"wildfires in China and in the Mediterranean Basin. In Australia, the source of wildfires can be traced to both lightning strikes and human activities such as machinery sparks and cast-away cigarette butts.\" Wildfires have a rapid forward rate of spread (FROS) when burning through dense, uninterrupted fuels. They can move as fast as 10.8 kilometers per hour (6.7 mph) in forests and 22 kilometers per hour (14 mph) in grasslands. Wildfires can advance tangential to the main front to form a flanking front, or burn in the opposite direction of the main front by backing.\nWildfires may also spread by jumping",
"than a traditional campfire because it allows the fire to be picked up and moved should the need arise.",
"due to inhalation of superheated products of combustion. Craven, who served as a squad boss during the fire, was a veteran firefighter in his thirteenth fire season with the Forest Service. Weaver, Johnson and FitzPatrick were all in their first season. The incident was the deadliest wildland firefighting disaster in the US since the 1994 South Canyon Fire in Colorado, which killed 14 firefighters.\nThe Thirtymile Fire went on to burn an area of 9,324 acres (38 km²) before it was declared fully contained on July 23. Over 1,000 firefighters were brought in to fight the fire. Suppression of the Thirtymile Fire",
"in its firefighting efforts beginning with the 2016 fire season.\nIn 2014, an international campaign was organized in South Africa's Kruger National Park to validate fire detection products including the new VIIRS active fire data. In advance of that campaign, the Meraka Institute of the Council for Scientific and Industrial Research in Pretoria, South Africa, an early adopter of the VIIRS 375m fire product, put it to use during several large wildfires in Kruger.\nThe demand for timely, high-quality fire information has increased in recent years. Wildfires in the United States burn an average of 7 million acres of land each year.",
"the burn. Reports confirm that the fires began in the settlements of small farmers, with planned burns lit in order to prepare the land for new crops.\nSmoke lingered over Boa Vista and the interior for several days, causing numerous respiratory problems and eye infections. In order to prevent a recurrence, fire brigades were created, formed from firefighters and technicians who taught the farmers and producers to prepare fields for cultivation in such a way that if fire is used, it is not allowed to spread. The 21st century: unemployment and corruption scandals The Millennium Portal, a monument to mark the",
"campfires, graziers, sawmillers and land clearing.\nPrior to 13 January 1939, many fires were already burning. Some of the fires started as early as December 1938, but most of them started in the first week of January 1939. Some of these fires could not be extinguished. Others were left unattended or, as Judge Stretton wrote, the fires were allowed to burn “under control”, as it was falsely and dangerously called. Most of the fires, Stretton declared, with almost biblical gravity, were lit by the \"hand of man\".\nStretton's Royal Commission has been described as one of the most significant inquiries in the",
"wildfires, while checking residences for pets or livestock.",
"cause of the fire was not very clear at first; any small ignition could have turned into a major firestorm in the conditions present. Later and widely believed Chinese reports state that the fire was started \"when an untrained 18-year-old worker accidentally ignited gas spilled from his brush cutter.\" According to Harrison Salisbury, the roots of the disaster lay in excessive cutting down of trees without any effort to let the forest regrow, which triggered multiple fires in the region. Whatever the causes were, the resulting firestorm quickly gained momentum, fueled by high winds in the region. Workers reported their",
"fire: the whole feather stick is then placed into the waiting kindling to start the campfire.",
"the sparks from smouldering embers were carried by strong local winds. The fire began to grow after the embers landed on nearby vegetation and the wind began to move the flames in several directions at the same time. Soon, many homes in the neighborhoods of Hiller Highlands, Buckingham Place, and many others were threatened by the flames and fire crews began to scramble to put out the flames. The fire raged out of control until around 5 pm, when cooler temperatures and decreasing wind speeds slowed the progression of the fire. During the course of the event, the fire became",
"blaze was started by contractors cutting steel wire with a torch. On February 4, 2009, Gary Dennis Hunt, 51, of Indiana pleaded no contest in Long Beach Superior Court to a charge of recklessly starting a brush fire in relation to the wildfire. Hunt agreed to pay at least $5 million in restitution, but the full amount he will pay would be decided at a later hearing. Sentencing was set for May 28, 2009, when he was expected to be sentenced to three years of imprisonment.",
"fire Another fire in Creek County during the same time period, this time near the community of Mannford, Oklahoma, about 20 miles (32 km) west of Tulsa, burned nearly 100 square miles (260 km²). A fire department spokesperson said that it was the largest wildfire in recent state history.",
"the show were that the fire started in the roof space where the storeroom was located and had already spread across the main nightclub roof space area before those inside were aware of it. Furthermore, there were reports that the lamp room adjacent to the store had had several instances in preceding weeks of smouldering, smoking and sparking of the electrical installations within, which could conceivably have been the original ignition source. If this is true, the original finding of \"probable arson\" is in doubt.\nAlso, if true, it mirrors events decades earlier in the fatal Henderson's Department Store Fire in"
] |
Why people are saying insurance rate premiums are set to triple next year due to Obamacare? | [
"I'm not sure how we can answer a claim without any information about it. I haven't seen any evidence to suggest the average insurance rates will triple (for anecdote mine is going up a few percent, and I work for a massive company, I doubt I'm out of the ordinary).\n\n > it seems like it's just making a bunch of laws that are going to make things more complicated and I don't get penalizing the poor for not being able to afford coverage, but this all seems ridiculous. What's up?\n\nPoor people aren't penalized if they can't afford coverage."
] | [
"premiums; PolitiFact found that the claim was false. Premiums rose by as much at 105 percent, down to \"a slightly smaller increase of about 76 percent. ... Holding’s claim that \"we’re all paying 100 percent more\" was especially misleading because only 2 to 5 percent of people are affected by premium increases on the Affordable Care Act’s individual market. Holding cherry-picked the smallest market for insurance and suggested that everyone was suffering that way.\"",
"A September 2017 report by the (CBO) found that ACA enrollment at health care exchanges would be lower in 2018 and future years than its previous forecasts due to the Trump administration's undermining of the ACA. A 2019 study found that enrollment into the ACA during the Trump administration's first year was nearly 30% lower than during 2016. The CBO found that insurance premiums would rise sharply in 2018 due to the Trump administration's refusal to commit to continuing paying ACA subsidies, which added uncertainty to the insurance market and led insurers to raise premiums for fear they will not",
"health insurance premium for single coverage would be $6,400 and family coverage would be $15,500 in 2016. The annual rate of increase in premiums has generally slowed after 2000, as part of the trend of lower annual healthcare cost increases.\nThe Federal Government subsidizes the employer-based market by an estimated $250 billion per year (about $1,612 per person covered in the employer market), by excluding health insurance premiums from employee income. This subsidy encourages people to buy more extensive coverage (which places upward pressure on average premiums), while also encouraging more young, healthy people to enroll (which places downward pressure on",
"$200 billion increase in the budget deficit over a decade. CBO also estimated that initially up to one million fewer would have health insurance coverage, although more might have it in the long run as the subsidies expand. CBO expected the exchanges to remain stable (e.g., no \"death spiral\") as the premiums would increase and prices would stabilize at the higher (non-CSR) level.\nPresident Trump's argument that the CSR payments were a \"bailout\" for insurance companies and therefore should be stopped, actually results in the government paying more to insurance companies ($200B over a decade) due to increases in the premium",
"CBO estimated that although projected premiums in 2016 would be lower by $100 per person for small and large business health insurance plans with the Affordable Care Act than without, individual plans would be higher by $1,900 with the bill.\nThe first open enrollment period of the Affordable Care Act began in October 2013. Prior to this period, access to healthcare and insurance coverage trends were worsening on a national level. A large, national survey of American adults found that after the act's first two enrollment periods, self-reported coverage, health, and access to care improved significantly. Furthermore, insurance coverage for low-income",
"Health insurance in the United States Enrollment and the uninsured Gallup issued a report in July 2014 stating that the uninsured rate for adults 18 and over declined from 18% in 2013 to 13.4% by in 2014, largely because there were new coverage options and market reforms under the Affordable Care Act. Rand Corporation had similar findings. Trends in private coverage The proportion of non-elderly individuals with employer-sponsored cover fell from 66% in 2000 to 56% in 2010, then stabilized following the passage of the Affordable Care Act. Employees who worked part-time (less than 30 hours a week) were less",
"customers dropped their insurance policies. Consequently, the remaining risk pool became sicker and thus more expensive to insure; and, in turn, prices were forced up and pushed more people out of the market.\nIn response to the outrage from politicians and consumers, Anthem postponed the rate increase until May 1, 2010.\nSenator Dianne Feinstein of California proposed giving the Federal government of the United States authority to block insurance premium hikes that it considers to be \"unjustified\". Reclassifying expenses On 17 March 2010, WellPoint announced it was reclassifying some of its administrative costs as medical care costs in order to meet loss",
"rate, among adults aged 18–64. As of December 2016 there were 32 states (including Washington DC) that had adopted the Medicaid extension, while 19 states had not.\nBy 2017, nearly 70% of those on the exchanges could purchase insurance for less than $75 per month after subsidies, which rose to offset significant pre-subsidy price increases in the exchange markets. Healthcare premium cost increases in the employer market continued to lessen. For example, healthcare premiums for those covered by employers rose by 69% from 2000 to 2005, but only 27% from 2010 to 2015, with only a 3% increase from 2015 to",
"was slower to recover due to budget cuts.\nPresident Obama followed with the 2010 Patient Protection and Affordable Care Act (ACA), commonly referred to as \"Obamacare\". By 2016, the law covered approximately 24 million people with health insurance via a combination of state healthcare exchanges and an extension of Medicaid. It lowered the rate of those without health insurance from approximately 16% in 2010 to 9% by 2015. Throughout his tenure, healthcare costs continued to moderate. For example, healthcare premiums for those covered by employers rose by 69% from 2000 to 2005, but only 27% from 2010 to 2015.\nBy 2017, nearly",
"Act. However, according to a study by the Kaiser Family Foundation, the after-subsidy premium costs to those with insurance coverage via the Affordable Care Act's exchanges did not change significantly on average from 2016 to 2017, as increases in the subsidies offset pre-subsidy insurance premium increases. For example, after-subsidy costs for a popular \"silver plan\" remained around $200/month in 2016 and 2017. An estimated 70% of persons on the exchanges could purchase a plan for $75/month after subsidies. Further, in the employer market, health insurance premium cost increases from 2015-2016 were an estimated 3% on average, low by historical standards.",
"Patient Protection and Affordable Care Act Health Insurance Rate Review Program The Patient Protection and Affordable Care Act (ACA) established the health insurance rate review program in order to protect consumers from unreasonable rate increases. Through this program, proposed premium increases in the small group and individual markets that are above a threshold amount (ten percent or more, as of February 2014) are reviewed by states or the federal government to determine whether the increases are reasonable. Background Health insurance premiums have risen steadily from 2000 to 2009 and have outpaced general inflation and wages. A number of factors",
"May 2018 that the repeal of the individual mandate would increase the number of uninsured by eight million and that individual healthcare insurance premiums increased by 10% between 2017 and 2018.\nTrump repeatedly expressed a desire to \"let Obamacare fail\", and the Trump administration has undermined Obamacare through various actions. The open enrollment period was cut from twelve weeks to six, the advertising budget for enrollment was cut by 90%, and organizations helping people shop for coverage got 39% less money. The administration ordered HHS regional directors not to participate in state open enrollment events, as they had in previous years.",
"losses.\nIn response, the company may increase premiums. However, higher prices cause rational non-smoking customers to cancel their insurance. The higher prices combined with their lower risk of mortality make life insurance uneconomic for non-smokers. This can exacerbate the adverse selection problem. As more smokers take out life insurance policies and increase the insurer's mortality rate, its prices will continue to rise, which in turn will mean fewer non-smokers will purchase insurance. Eventually, the higher prices will push out all non-smokers and the insurer will also be unwilling to sell to smokers. No more interactions will take place, and the",
"of nearly $200 billion in the budget deficit over a decade, as the premium tax credit subsidies would rise along with premium prices. CBO also estimated that initially up to one million fewer would have health insurance coverage, although more might have it in the long-run as the subsidies expand. CBO expected the exchanges to remain stable (i.e., no \"death spiral\" before or after Trump's action) as the premiums would increase and prices would stabilize at the higher (non-CSR) level.\nCBO estimated that of the 12 million with private insurance via the ACA exchanges in 2017, about 10 million receive premium",
"to affordable insurance during tax year 2009 and had to pay an income tax penalty instead.\nComparing the first half of 2007 to the first half of 2009, spending from the state's Health Safety Net Fund dropped 38–40% as more people became insured, before increasing in later years. The Fund—which replaced the Uncompensated Care Pool or Free Care—pays for medically necessary health care for those who do not have health insurance. According to the DHCFP in a report dated September 2011, \"Total Health Safety Net (HSN) payments increased by 7% in the first six months of Health Safety Net fiscal year",
"keep premiums from rising for everyone, it is necessary for healthier people to pay into the insurance pools to balance out the cost of these higher cost individuals.\nArguing against requiring individuals to buy coverage, the Cato Institute has asserted that the Massachusetts law forcing everyone to buy insurance has increased costs: \"Premiums are growing 21 to 46 percent faster than the national average, in part because Massachusetts' individual mandate has effectively outlawed affordable health plans.\" They say that \"the mandate gives politicians enormous power to dictate the content of every American's health plan – a power that health care",
"median number of insurers was 4.0 in 2016, 5.0 in 2015, and 4.0 in 2014.\nFurther, the CBO reported in January 2017 that it expected enrollment in the exchanges to rise from 10 million during 2017 to 13 million by 2027, assuming laws in place at the end of the Obama administration were continued. Following a 2015 CBO report that reached a similar conclusion, Paul Krugman wrote: \"But the truth is that this report is much, much closer to what supporters of reform have said than it is to the scare stories of the critics—no death spirals, no job-killing, major gains",
"uninsured by 24 million by 2028, but savings of $337 billion over ten years. In 2018, most of the reduction would be caused by the elimination of the penalties for the individual mandate, both directly and indirectly. Later reductions would be due to reductions in Medicaid enrollment, elimination of the individual mandate penalty, subsidy reduction, and higher costs for some persons. By 2016 the CBO estimates that the average amount paid for medical insurance would decrease by about 10%. That results from increased prices for older patients and reduced credits which is predicted to increase the proportion of younger people",
"continue to have the highest insurance rate in the nation.\" In June 2011, a Boston Globe review concluded that the healthcare overhaul \"has, after five years, worked as well as or better than expected.\" A study by the fiscally conservative Beacon Hill Institute was of the view that the reform was \"responsible for a dramatic increase in health care spending,\" however.\nIn 2012, the Blue Cross Foundation of Massachusetts funded and released research that showed that the 2006 law and its subsequent amendments – simply in terms of measuring the state-budget effect on the uncompensated care pool and funding subsidized insurance",
"denying at a public event that insurers were cancelling insurance. Rather, they were signing customers up “with new plans that are compliant with ACA.” He insisted that under five percent of the population would lose their insurance under Obamacare and that most would “get a much better deal in the healthcare exchange - good price and much better benefits than what they were paying before.” He added that young people are “probably going to get a real good deal” under Obamacare.\nKind voted against the 2017 Republican health-care bill. \"I thought it was a bad piece of legislation,” he said, “both",
"have contributed to rising premiums including increases in spending on hospital and physician services, changes in the benefits covered by health insurance policies, and changes in the demographics of insured individuals. Even before the passage of the ACA, many states already had existing health insurance rate review programs to review proposed increases in insurance premiums. However, there was marked variation between the states' programs. Namely, there was variation in the review processes as well as the market segments (i.e. individual, small group) for which the review processes were applied. The type of information that was made available to the",
"These adjust with premium increases to limit after-subsidy premium payments by ACA enrollees to a fixed percentage of income. Based on President Trump's threats to end the CSR payments during early 2017, several insurers and actuarial groups estimated this resulted in a 20 percentage point or more increase in premiums for the 2018 plan year. In other words, premium increases expected to be 10% or less in 2018 became 28–40% instead.\nThe CBO reported in August 2017 (prior to President Trump's decision) that ending the CSR payments might increase ACA premiums by 20 percentage points or more, with a resulting increase",
"2016 review of the ACA published in JAMA, Barack Obama himself wrote that from 2010 through 2014 mean annual growth in real per-enrollee Medicare spending was negative, down from a mean of 4.7% per year from 2000 through 2005 and 2.4% per year from 2006 to 2010; similarly, mean real per-enrollee growth in private insurance spending was 1.1% per year over the period, compared with a mean of 6.5% from 2000 through 2005 and 3.4% from 2005 to 2010. Health outcomes Insurance coverage helps save lives, by encouraging early detection and prevention of dangerous medical conditions. According to a 2014",
"because removing the mandate encourages younger and typically healthier persons to opt out of health insurance on the ACA exchanges, increasing premiums for the remainder. The non-group insurance market (which includes the ACA exchanges) would continue to be stable (i.e., no \"death spiral\"). CBO estimated this would reduce government spending for healthcare subsidies to lower income persons by up to $338 billion in total during the 2018–2027 period compared to the prior law baseline. Trump stated in an interview with The New York Times in December 2017: \"I believe we can do health care in a bipartisan way, because we've",
"A scenario where prices rise, due to an unfavorable mix of customers from the insurer's perspective, resulting in fewer customers and fewer insurers in the marketplace, further raising prices, has been called a \"death spiral.\" During 2017, the median number of insurers offering plans on the ACA exchanges in each state was 3.0, meaning half the states had more and half had fewer insurers. There were five states with one insurer in 2017; 13 states with two; 11 states with three; and the remainder had four insurers or more. Wisconsin had the most, with 15 insurers in the marketplace. The",
"result, total Federal outlays for health insurance premiums in 2014 would be on the order of $1.3 trillion to $1.4 trillion. Those costs would be approximately offset by revenues and savings from several sources: premium payments collected from individuals through their tax returns; revenue raised by replacing the current tax exclusion for health insurance with an income tax deduction; new tax payments by employers to the Federal government; Federal savings on Medicaid and SCHIP; and state maintenance-of-effort payments of their savings from Medicaid and SCHIP ... For the years after 2014, we anticipate that the fiscal impact would improve gradually,",
"should be stopped, actually results in the government paying more to insurance companies ($200B over a decade) due to increases in the premiums and related premium tax credit subsidies. Journalist Sarah Kliff therefore described Trump's argument as \"completely incoherent.\" Murray—Alexander Individual Market Stabilization Bill Senator Lamar Alexander and Senator Patty Murray reached a compromise to amend the Affordable Care Act to fund cost-sharing reductions. The plan will also provide more flexibility for state waivers, allow a new \"Copper Plan\" or catastrophic coverage for all, allow interstate insurance compacts, and redirect consumer fees to states for outreach.",
"which are still cheaper than the newly increased premiums, exacerbating the problem. The cycle continues until none of the remaining sick can justify or even afford paying the premiums. The individual health insurance policy group then goes out of existence. Since the original size of the group was small in relation to the total subscriber base, the event is inconsequential to the insurer. Motivation In most US states, it is illegal for health insurers to individually re-underwrite a subscriber (re-evaluate their health risk and increase their premium) after the subscriber files a claim under the policy, unless the subscriber withheld",
"ratios under 80 percent to be subject to rate review.\nIn terms of efficacy of the rate review program, those in the insurance industry argue that rate increases are the result, not the driver, of rising healthcare costs, and that insurance companies' administrative costs and profits equal just 4 percent of national health expenditures. Rather than having regulators focus on restricting insurance rate increases, they say, government and others should make greater efforts to control underlying health spending, such as the outlays for hospital and physician services. Furthermore, insurers have raised the possibility that, if they are forced to accept rate",
"the Patient Protection and Affordable Care Act, also known as the \"ACA\" or \"Obamacare\". According to the United States Census Bureau, in 2012 there were 45.6 million people in the US (14.8% of the under-65 population) who were without health insurance. Following the implementation of major ACA provisions in 2013, this figure fell by 18.3 million or 40%, to 27.3 million by 2016 or 8.6% of the under-65 population.\nHowever, under President Trump these gains in healthcare coverage have begun to reverse. The Commonwealth Fund estimated in May 2018 that the number of uninsured increased by 4 million from early 2016"
] |
How a touch screen works | [
"There are two basic types of touchscreen. Resistive and Capacitive.\n\nResistive screens are the old type that you'll find on early smartphones and low-end touchscreens and devices. These are the ones that require pressure to work, don't (usually) do mutitouch and can use any old stylus.\n\nResistive screens are made up of a sort of sandwich. The outer two layers are a conductive material, with a heap of lines. On one layer the lines run vertically, and on the other they run horizontally. Between the layers is a sheet of nonconductive material that has a bunch of little holes where the lines cross over. When you push down, the holes allow the conductive materials to touch. The screen knows which vertical line touched which horizontal line, so it can figue out where you touched on the screen. \n\nCapacitive touchscreens, on the other hand, are the ones that you'll see in newer phones such as the iPhone. They are more expensive, but they are generally easier to use, as they require no pressure to use. They work by running a very small current across the screen and measuring the capacitance. Because we conduct electricity, a light touch on the screen changes the capacity, and the device can measure this change and calculate where exactly your finger is. \n\nBecause they require a change in conductivity to work, capacitive screens only work with things that conduct electricity. That's why they work with your finger, but not with your gloves.\n\nTL;DR: Two types, one's a sandwich, the other gives you an electric shock."
] | [
"such as scrolling by moving one's finger along an edge.\nIt uses a two-layer grid of electrodes to measure finger movement: one layer has vertical electrode strips that handle vertical movement, and the other layer has horizontal electrode strips to handle horizontal movements. Touchscreen A touchscreen is a device embedded into the screen of the TV monitor, or system LCD monitor screens of laptop computers. Users interact with the device by physically pressing items shown on the screen, either with their fingers or some helping tool.\nSeveral technologies can be used to detect touch. Resistive and capacitive touchscreens have conductive materials embedded",
"in the glass and detect the position of the touch by measuring changes in electric current. Infrared controllers project a grid of infrared beams inserted into the frame surrounding the monitor screen itself, and detect where an object intercepts the beams.\nModern touchscreens could be used in conjunction with stylus pointing devices, while those powered by infrared do not require physical touch, but just recognize the movement of hand and fingers in some minimum range distance from the real screen.\nTouchscreens are becoming popular with the introduction of palmtop computers like those sold by the Palm, Inc. hardware manufacturer, some high range",
"Virtual touch screen A virtual touch screen (VTS) is a user interface system that augments virtual objects into reality either through a projector or optical display using sensors to track a person's interaction with the object. For instance, using a display and a rear projector system a person could create images that look three-dimensional and appear to float in midair. Some systems utilize an optical head-mounted display to augment the virtual objects onto the transparent display utilizing sensors to determine visual and physical interactions with the virtual objects projected. Development During a 2009 study at Korea Electronics Technology Institute,",
"Touchscreen A touchscreen, or touch screen, is a both input and output device and normally layered on the top of an electronic visual display of an information processing system. A user can give input or control the information processing system through simple or multi-touch gestures by touching the screen with a special stylus or one or more fingers. Some touchscreens use ordinary or specially coated gloves to work while others may only work using a special stylus or pen. The user can use the touchscreen to react to what is displayed and, if the software allows, to control how it",
"use this technology. Optical imaging Optical touchscreens are a relatively modern development in touchscreen technology, in which two or more image sensors are placed around the edges (mostly the corners) of the screen. Infrared backlights are placed in the camera's field of view on the opposite side of the screen. A touch blocks some lights from the cameras, and the location and size of the touching object can be calculated (see visual hull). This technology is growing in popularity due to its scalability, versatility, and affordability for larger touchscreens. Dispersive signal technology Introduced in 2002 by 3M, this system detects",
"pass over the touchscreen panel. When the panel is touched, a portion of the wave is absorbed. The change in ultrasonic waves is processed by the controller to determine the position of the touch event. Surface acoustic wave touchscreen panels can be damaged by outside elements. Contaminants on the surface can also interfere with the functionality of the touchscreen. Capacitive A capacitive touchscreen panel consists of an insulator, such as glass, coated with a transparent conductor, such as indium tin oxide (ITO). As the human body is also an electrical conductor, touching the surface of the screen results in a",
"a virtual touch screen system was built using the touch point tracking technique based on the time of flight (TOF) camera and the Kalman filter. To address the widespread problem in conventional virtual touch screen systems (i.e. responding sensitively to even the slightest hand movement and failing to recognize the touch point accurately), the study had applied the Kalman filter tracking technique to predict and track the touch point consecutively. Being forecast and recognized, the predicted touch point was bound to exist all the time, but an abrupt movement of touch point was likely to be recognized only insensitively. A",
"is displayed; for example, zooming to increase the text size.\nThe touchscreen enables the user to interact directly with what is displayed, rather than using a mouse, touchpad, or other such devices (other than a stylus, which is optional for most modern touchscreens).\nTouchscreens are common in devices such as game consoles, personal computers, electronic voting machines, and point-of-sale (POS) systems. They can also be attached to computers or, as terminals, to networks. They play a prominent role in the design of digital appliances such as personal digital assistants (PDAs) and some e-readers. Touchscreens are also important in educational settings such as",
"light sensitive sensors behind the touch surface detect the light passing through the touch surface. This sequence allows the computer to align the touch surface with the display; however, it has the disadvantage of having tiny fiber-sized \"dead spots\" in the resistive touch surface where the light sensors are present. The \"dead spots\" are so small that touches in that area are still presented to the computer properly.\nAnother system involves having a light sensor built into the projector and facing the screen. As the projector generates its calibration image (a process called \"training\"), it detects the change in light reflected",
"use a panel that carries an electrical charge. When a finger touches the screen, the touch disrupts the panel's electrical field. The disruption is registered as a computer event (gesture) and may be sent to the software, which may then initiates a response to the gesture event.\nIn the past few years, several companies have released products that use multi-touch. In an attempt to make the expensive technology more accessible, hobbyists have also published methods of constructing DIY touchscreens. Multi-touch gestures Multi-touch touchscreen gestures enable predefined motions to interact with the device and software. An increasing number of devices like smartphones,",
"touch and slide to move up or down on the screen. The motion of the select box on the screen is viewport-controlled where moving the finger up moves the view of the content up. This is unlike direct content manipulation interfaces, where moving the finger up moves the content up, equivalent to moving the viewport down the list. \nThe Zune Pad allows the user to coast after flicking the list and to accelerate through the list with repeated flicks, unlike direct content manipulation interfaces in which a touch immediately grabs and stops the onscreen content. The user can thus move",
"to this technology is that a touch at any one position on the surface generates a sound wave in the substrate which then produces a unique combined signal as measured by three or more tiny transducers attached to the edges of the touchscreen. The digitized signal is compared to a list corresponding to every position on the surface, determining the touch location. A moving touch is tracked by rapid repetition of this process. Extraneous and ambient sounds are ignored since they do not match any stored sound profile. The technology differs from other sound-based technologies by using a simple look-up",
"identified by a small hand icon (\"hand tool\") on the document, which can then be dragged by clicking on it and moving the mouse as if sliding a large sheet of paper. When this feature is implemented on a touchscreen it is called kinetic scrolling. Touch-screens often use inertial scrolling, in which the scrolling motion of an object continues in a decaying fashion after release of the touch, simulating the appearance of an object with inertia. An early implementation of such behavior was in the \"Star7\" PDA of Sun Microsystems ca. 1991–1992.\nScrolling can be controlled in other software-dependent ways by",
"along top and bottom. A voltage is applied to one layer, and sensed by the other. When an object, such as a fingertip or stylus tip, presses down onto the outer surface, the two layers touch to become connected at that point. The panel then behaves as a pair of voltage dividers, one axis at a time. By rapidly switching between each layer, the position of pressure on the screen can be detected.\nResistive touch is used in restaurants, factories and hospitals due to its high tolerance for liquids and contaminants. A major benefit of resistive-touch technology is its low cost.",
"from contact with nearly any object (finger, stylus/pen, palm) resistive touchscreens are a type of \"passive\" technology. \nFor example, during operation of a four-wire touchscreen, a uniform, unidirectional voltage gradient is applied to the first sheet. When the two sheets are pressed together, the second sheet measures the voltage as distance along the first sheet, providing the X coordinate. When this contact coordinate has been acquired, the voltage gradient is applied to the second sheet to ascertain the Y coordinate. These operations occur within a few milliseconds, registering the exact touch location as contact is made, provided the screen has",
"distortion of the screen's electrostatic field, measurable as a change in capacitance. Different technologies may be used to determine the location of the touch. The location is then sent to the controller for processing. Touchscreens that use silver instead of ITO exist, as ITO causes several environmental problems due to the use of Indium.\nUnlike a resistive touchscreen, some capacitive touchscreens cannot be used to detect a finger through electrically insulating material, such as gloves. This disadvantage especially affects usability in consumer electronics, such as touch tablet PCs and capacitive smartphones in cold weather when people may be wearing gloves.",
"computers by touching through a stylus pen, yet they do not respond directly to a user's touch. Touchscreens Touchscreen allow users to directly interact with computers by touching the screen with a finger. It is natural for humans to point to objects in order to show a preference or a selection. Touchscreens allow users to take this natural action and use it to interact with computers. Problems may arise due to inaccuracy: people attempt to make a selection, but due to incorrect calibration, the computer does not accurately process the touch. Human signaling New developments in hands-on computing have led",
"a benefit of multi-touch: several people can orient themselves on different sides of the surface to interact with an application simultaneously. Object recognition refers to the device's ability to recognize the presence and orientation of tagged objects placed on top of it.\nThe technology allows non-digital objects to be used as input devices. In one example, a normal paint brush was used to create a digital painting in the software. This is made possible by the fact that, in using cameras for input, the system does not rely on restrictive properties required of conventional touchscreen or touchpad devices such as the",
"a touch by using sensors to measure the piezoelectricity in the glass. Complex algorithms interpret this information and provide the actual location of the touch. The technology is unaffected by dust and other outside elements, including scratches. Since there is no need for additional elements on screen, it also claims to provide excellent optical clarity. Any object can be used to generate touch events, including gloved fingers. A downside is that after the initial touch, the system cannot detect a motionless finger. However, for the same reason, resting objects do not disrupt touch recognition. Acoustic pulse recognition The key",
"the touch. A major benefit of such a system is that it can detect essentially any opaque object including a finger, gloved finger, stylus or pen. It is generally used in outdoor applications and POS systems which cannot rely on a conductor (such as a bare finger) to activate the touchscreen. Unlike capacitive touchscreens, infrared touchscreens do not require any patterning on the glass which increases durability and optical clarity of the overall system. Infrared touchscreens are sensitive to dirt and dust that can interfere with the infrared beams, and suffer from parallax in curved surfaces and accidental press when",
"Resistive touchscreen Description and operation There are two different types of metallic layers. The first type is called matrix, in which striped electrodes on substrates such as glass or plastic face each other. The second type is called analogue which consists of transparent electrodes without any patterning facing each other. As of 2011 analogue offered lowered production costs. When contact is made to the surface of the touchscreen, the two sheets are pressed together. On these two sheets there are horizontal and vertical lines that, when pushed together, register the precise location of the touch. Because the touchscreen senses input",
"Tixel Tixel or tactile pixel is a technology allowing for feel and touch with screens, simulations of wetness and texture, achieved using vibration and electrical fields. Senseg, a company from Finland, is developing \"E-Sense\" technology with tixels, allowing for the touch and feel of screen images. The technology is also being considered to adapt flat screen for the use of blind people.",
"have office locations in London, California and Singapore. MultiTaction also build unique collaboration software especially designed for multi-touch screens such as MT Canvus and MT Showcase. Implementations Multi-touch has been implemented in several different ways, depending on the size and type of interface. The most popular form are mobile devices, tablets, touchtables and walls. Both touchtables and touch walls project an image through acrylic or glass, and then back-light the image with LEDs.\nTouch surfaces can also be made pressure-sensitive by the addition of a pressure-sensitive coating that flexes differently depending on how firmly it is pressed, altering the reflection.\nHandheld technologies",
"the user hovers a finger over the screen while searching for the item to be selected. Infrared acrylic projection A translucent acrylic sheet is used as a rear-projection screen to display information. The edges of the acrylic sheet are illuminated by infrared LEDs, and infrared cameras are focused on the back of the sheet. Objects placed on the sheet are detectable by the cameras. When the sheet is touched by the user, the deformation results in leakage of infrared light which peaks at the points of maximum pressure, indicating the user's touch location. Microsoft's PixelSense tablets",
"where the 3D visualization and physical interaction with the objects is necessary, such as teaching students introductory calculus.\nVirtual touch screen technology can also be applied to turn non-touch displays into interactive, touch-capable surfaces using a Kinect sensor in combination with a projector. This type of application allows virtual touch technology to enhance personal display usage as well as better communication and presentation of data to be used in education or business settings.\nIn medical practices, virtual touch interaction has been applied to allow users to view and manipulate digital data such as 3D images used in medical scans, allowing medical staff",
"movies such as Star Wars and particularly in the Star Trek television franchise. This display is unique in that it can detect a user's touch by sensing movements in the air. The device then provides haptic feedback to the user by sending an ultrasonic air blast in return. In Intel's demonstration of this technology, the display was showcased representing a touchless, responsive piano. A possible implementation for this technology would be interactive displays in public kiosks; because this type of display does not require a user to physically touch a screen, it ensures that bacteria and",
"onscreen icons or trigger actions (e.g., playing a digital video) by touching the screen. Many touchscreen-enabled devices can display a virtual QWERTY or numeric keyboard on the screen, to enable the user to type words or numbers.\nA multifunctional monitor (MFM) is a flat-panel display that has additional video inputs (more than a typical LCD monitor) and is designed to be used with a variety of external video sources, such as VGA input, HDMI input from a VHS VCR or video game console and, in some cases, a USB input or card reader for viewing digital photos). In many instances, an",
"manufacturers. Display manufacturers and chip manufacturers have acknowledged the trend toward acceptance of touchscreens as a user interface component and have begun to integrate touchscreens into the fundamental design of their products. History Eric Johnson, of the Royal Radar Establishment, located in Malvern, England, described his work on capacitive touchscreens in a short article published in 1965 and then more fully—with photographs and diagrams—in an article published in 1967. The application of touch technology for air traffic control was described in an article published in 1968. Frank Beck and Bent Stumpe, engineers from CERN (European Organization for Nuclear Research),",
"screen as an input method. Items can be selected or moved with a finger, and finger gestures may be used to convey commands. The screen will need frequent cleaning due to image degradation from fingerprints. Tablet screens A combination of a monitor with a graphics tablet. Such devices are typically unresponsive to touch without the use of one or more special tools' pressure. Newer models however are now able to detect touch from any pressure and often have the ability to detect tilt and rotation as well.\nTouch and tablet screens are used on LCDs as a substitute for the light",
"of 320 x 400 pixel. The touchscreen is designed for a bare finger, or multiple fingers for multi-touch sensing. An accelerometer allows the orientation of the screen to change between portrait and landscape mode. There is a proximity sensor which deactivates the display and touchscreen when the device is brought near the face during a call.\nThere is a slide-out 4-row QWERTY keyboard. \nThe microphone is located on the slide-out keyboard. Buttons On the left side of the device, there is a volume button. On the upper right side, there is a power button. On the top side, there is a"
] |
NFL "placement refs" | [
"The are *replacement* referees.\n\nThe NFL is having a labor dispute with the referee's union. They can't agree on a contract, to the NFL is moving forward with different refs.\n\nIt is controversial, because a lot of people are concerned the replacements aren't qualified, and it will mess up games.\n\nMost of them are college football referees."
] | [
"judge then become the lead/front positions. The umpire, in his traditional position in the middle of the field, usually stays stationary until the returner and the other players pass him. Eight-official system In four games in the 2010 preseason, the NFL experimented with an eighth official, a deep judge, in the defensive backfield opposite the back judge. The primary responsibility for this new position is the action of receivers, and it allowed the NFL to adjust coverage after the umpire was moved to the offensive backfield. The experiment was continued for 12 games in the 2011 preseason, and was then",
"press box above the field, on the play and then announces the final result over the wireless microphone.\nIn addition to the general equipment listed above, the referee also carries a coin to conduct the pregame (and if necessary, overtime) coin toss. Umpire The umpire (U) stands behind the defensive line and linebackers (except as described below for the NFL), observing the blocks by the offensive line and defenders trying to ward off those blocks, looking for holding or illegal blocks. Prior to the snap, he counts all offensive players.\nDuring passing plays, he moves forward towards the line of scrimmage as",
"punter to direct the nearest sideline official to the spot where the ball went out of bounds.\nIn college football, the NFL and other professional leagues, and in some high school games, the referee announces penalties and the numbers of the players committing them (college and professional), and clarifies complex and/or unusual rulings over a wireless microphone to both fans and the media.\nDuring instant replay reviews in the NFL, the referee confers with the NFL's replay center in New York, which makes the final ruling. In college football, the referee confers with a replay official, who is stationed in the",
"35 feet (11 m)-per-minute.\nOne bleacher section behind the north end zone, called the \"Bull Pen\", is the designated fan section for the hometeam. The fans in the Bull Pen interact directly with the action on the field, helping to create and implement fan traditions, songs, chants, and other elements of the game-day experience for spectators all over the stadium. Fans in the Bull Pen are encouraged to stand throughout the game, sing, cheer, and otherwise support the team in an enthusiastic manner.\nIn 2011, Reliant updated their logo and therefore had to update their signage all over the stadium.\nIn December 2012, it",
"used almost exclusively by West Coast Offense-based teams in occasional third down passing situations, and goal-line situations. In the early 2010s, the pro set almost completely disappeared from the NFL, however in the late 2010s it has been used once again as an occasional goal line and passing downs formation by West Coast Offense-based teams.",
"the defensive end then they are typically a run player. One of the outside linebackers is usually called into either blitz or pass coverage to make up for the missing DB. In the NFL and college football, this alignment is used mainly in short yardage situations or near the goal line. It is commonly used in high school football.",
"on the offensive line; and a head linesman, who supervises placement of the down box and line-to-gain chains. The crew may also consist of a line judge, back judge, field judge and side judge, in the order listed: i.e. a crew of five officials has a referee, umpire, head linesman, line judge and back judge.\nOfficials are selected by the teams in advance or appointed by the governing league. While the majority of officials at lower levels only officiate games on a part-time basis, the NFL is implementing a new system where seven officials will become full-time employees of the league,",
"the sideline on his side of field, judging the action of nearby running backs, receivers and defenders. He rules on pass interference, illegal blocks downfield, and incomplete passes. He also counts defensive players. During field goal attempts he serves as a second umpire, except in the NFL, where he is the lone official positioned behind the defensive line, as the umpire remains in the offensive backfield. \nIn college football, the side judge is responsible for either the game clock or the play clock, which are operated by an assistant under his direction.\nFor the NFL, this was the seventh official, added",
"NFL began play, only three officials (referee, umpire, and head linesman) were used. The field judge was added in 1929 and the back judge in 1947. In response to scrambling quarterbacks (Fran Tarkenton in particular), the line judge was added in 1965 to watch the opposite side of the line of scrimmage. The side judge was added for 1978, when the NFL implemented new rules to open up the passing game. In 2017, the NFL renamed the head linesman to down judge.\nThe practice of having the referee announce penalties or clarify complex and/or unusual rulings over a wireless microphone started",
"be inducted into the Pro Football Hall of Fame from those Charger teams. Pre-Coryell NFL The pro set was the default NFL scheme prior to Don Coryell. It was generally a running offense that used play action fakes to set up deep passing attempts when defenses stacked up vs the running game. On pass plays, it provided one or even two backs to help protect the quarterback.\nThe pro set features a TE, 2 WRs, and a Halfback and fullback, often split behind the QB. While QBs can take snaps from under center or from the shotgun position, QBs generally take",
"in 1978. Back judge The back judge (B or BJ) stands deep behind the defensive secondary in the middle of the field, judging the action of nearby running backs, receivers (primarily the tight ends) and nearby defenders. Like the Side Judge and the Field Judge, he rules on pass interference, illegal blocks downfield, and incomplete passes. He covers the area in the middle of the field between himself and the umpire. He has the final say regarding the legality of kicks not made from scrimmage (kickoffs). The back judge is also responsible for ruling a \"delay of game\" infraction if",
"running backs, receivers and defenders. He rules on pass interference, illegal blocks downfield, and incomplete passes. He is also responsible for counting defensive players. He has sometimes been the official timekeeper, and in a number of leagues will run the game clock on a six-man crew.\nWith the back judge, he rules whether field goal attempts are successful.\nFor the NFL, this was the fourth official, added in 1929. Side judge The side judge (S or SJ) works downfield behind the defensive secondary on the same sideline as the head linesman or down judge. Like the field judge, he makes decisions near",
"Pro Football Focus Pro Football Focus (also written as ProFootballFocus, and often referred to by its initials, PFF) is a website that focuses on thorough analysis of the National Football League (NFL) and NCAA Division-I football in the United States. PFF produces 0-100 Player Grades and a range of advanced statistics for teams and players by watching, charting and grading every player on every play in every game both at the NFL and FBS level. History PFF was founded by Neil Hornsby in the United Kingdom. Dissatisfied with some limitations of standard statistics, Hornsby began grading players in 2004. The",
"vote on the top offensive player, defensive player, and coach on each of the National Football League conferences, rather than the NFL as a whole.\nThe annual NFL 101 Awards, is the nation's oldest awards event dedicated exclusively to professional football.\nThe awards are handed out at an annual event in Kansas City, Missouri, and all proceeds from the 101 Awards benefit the Kansas City Chiefs Charities.",
"Kansas City Committee of 101 awards The Kansas City Committee of 101 was founded by Jack Wheeler. The name was chosen because the membership was limited to 101 Kansas City Chiefs fans and cost $1,000 annually (over $6,550 adjusted for inflation). The group began presenting its annual NFL awards in 1969. They started as NFL and AFL Awards. After the 1970 AFL-NFL merger, however, they have been awarded to the top AFC and NFC players and coaches. The \"Committee of 101\" is a national media committee of 101 sportswriters and sportscasters, who cover the NFL, and are asked to",
"All NFL teams also honored Upshaw with a video tribute and a replica of the uniform patch painted onto the field during the opening weekend. Originally, the patch on the field and the video tribute were only going to be done in Oakland at the Raiders' home opener against the Denver Broncos as Upshaw played his entire 15-year Hall of Fame career with the Raiders, and at Giants Stadium, when the Giants and Redskins opened the NFL season on September 4. All players wore the same patch during Week One, and later changed to a smaller helmet decal. The Raiders",
"NFL pros to provide a learning experience to improve participant play and provide recruitment opportunities. The annual camp is held at Sandstoner Park, in Potsdam, New York which is close to Brian's hometown of Gouverneur.",
"checking e-mail, identifying players to scout at the NFL Scouting Combine, gameplanning for the next game, and running practice. During the game, the player can motivate and discuss strategy with the team, which can affect the motivated player's reception. The career is 30 years long from 2006 to 2036. Teams and stadiums The game consists of the usual 32 teams with their usual stadiums. Unlike NFL Head Coach 09, however, Aloha Stadium is not in NFL Head Coach. Reception The game received positive reviews. IGN gave the game a 7.2/10, praising the NFL Films score, though commenting about the Madden",
"Above Replacement, DYAR) and Adjusted Line Yards (ALY). In 2005, the site began to cross-publish many of its columns on FOXsports.com. In 2005, Football Outsiders also took over publication of Pro Football Prospectus, a book giving a preview of the upcoming NFL season. In 2009, the annual was renamed Football Outsiders Almanac.\nCurrently, the site has incorporated the 1986-2016 NFL seasons into their statistics. Key Metrics Football Outsiders has devised a series of proprietary formulas to calculate different advanced metrics. DVOA DVOA (Defense-adjusted Value Over Average) calculates a team's success based on the down-and-distance of each play during the",
"2017 Pro Bowl Side events Commissioner Roger Goodell announced that the 2017 Pro Bowl would be a \"week-long celebration for football and our fans\"; a number of family-oriented side events was held at the Walt Disney World Resort and its ESPN Wide World of Sports Complex, including practices, a 5K run, youth events, and player appearances.\nOn December 12, 2016, the NFL announced that it would hold a series of skills competitions during Pro Bowl week at the Wide World of Sports Complex, known as the Pro Bowl Skills Showdown. Game format On June 1, 2016, the NFL confirmed that the",
"endorsements on behalf of the National Dairy Council.\nTeam Services works with NFL PLAYERS, the licensing and marketing subsidiary of the NFL Players Association, to identify and secure a variety of NFL players to represent the National Dairy Council’s (NDC) Children’s Nutrition and Fitness Initiative in schools across the country. NDC has used many familiar faces throughout the years that span several NFL teams. NFL Players can often be seen in schools across the country, highlighted on school marketing materials that grace the walls of classrooms and school cafeterias. PNC Bank Team Services also serves as the marketing firm for PNC",
"season, usually on the back page. It included mugshots of staff members, along with their picks for upcoming NFL games and their records so far in the season. Below that was a narrative, normally written by the sports editor, that commented on the staff members' progress in The Picks and used double entendres and plain-old raunch to describe them and their personalities. The Picks drew the fire of university administration for years, and was eventually eliminated in the early 2000s.\nThe CT is now based in VCU's Student Media Center, 817 W. Broad St., Richmond. In 2008, the paper received a",
"schools and in multi-purpose stadiums where facilities are used for multiple sports. When these or H-shaped goal posts are used in football, the lower portions of the posts are covered with several inches of heavy foam padding to protect the safety of the players. Decoration Most professional and collegiate teams have their logo, team name, or both painted on the surface of the end zone, with team colors filling the background. Many championship and bowl games at college and professional level are commemorated by the names of the opposing teams each being painted in one of the opposite end zones.",
"Pro Bowl would return to its previous, conference-based format for 2017, after three years of using a draft-based format with players selected by designated captains. The captains were former NFL players Jerome Bettis, Tony Gonzalez, Ray Lewis, and Charles Woodson. AFC rosters The following players were selected to represent the AFC: NFC rosters The following players were selected to represent the NFC: Broadcasting The game was televised nationally by ESPN and broadcast via radio by Westwood One.",
"west side bleachers accommodate the visiting team. Press box and loges The press box is located on the east side of the stadium. The press box is divided into three separate sections. One section is for the announcer and scoreboard controller. The other two sections are enclosed rooms for the teams to call plays down to the field for football. On top of the press box is a video section that can accommodate up to five cameras for television broadcasts. There are also two loges, one on each side of the press box. Each loge can hold up to 40",
"up a sign reading: \"From the Super Bowl to the toilet bowl. Thanks, Ray.\" Fans also chanted \"Ray must go!\" during the 1991 and 92 seasons. In 1992, the team fell further to a 6-10 record, leading a combative Handley to trade verbal darts with both the media and his players.\nHis relationship with the defensive players was also strained, particularly when he tapped Rod Rust to be the defensive coordinator in 1992. The defense was not thrilled about Rust's hiring, especially knowing that the veteran coach was coming off a 1-15 mark as head coach of the New England Patriots",
"NFL Scoreboard NFL Scoreboard is a weekly in-season program on the NFL Network. It is a studio show hosted by Fran Charles, with analysis from former National Football League center Jamie Dukes.\nThe program begins every Sunday at 4 p.m. Eastern time and airs, in more or less a continuous loop, until the conclusion of NBC Sunday Night Football at approximately 11:30 p.m. ET.\nNFL Scoreboard consists of score updates, analysis, limited game highlights, and extensive postgame comments from players and coaches.\nThis program was once the last part of Red Zone. That show consists of game updates presented with text and graphics",
"Training camp (National Football League) Organized team activities Recently the NFL has let teams have off-season training sessions, officially called \"organized team activities\" (OTAs). Many teams use the OTAs to help develop players and make them better. These training sessions are in late May and early June. The OTAs are the only practices between the end of the previous season and the start of training camp. Players new to the NFL attend seminars and lectures organized by the NFL from mid-June to mid-July. For veteran players, they use the off-time to sponsor football camps for children, golf outings for charity,",
"fined a game check by the National Football League.\nCorrente was named as referee for the AFC Championship Game on January 19, 2014 in Denver between the Broncos and New England Patriots.\nHe was the referee of the January 18, 2015 NFC championship game between the Seattle Seahawks and the Green Bay Packers.\nCorrente's 2019 NFL officiating crew consists of umpire Bill Schuster, down judge Dana McKenzie, line judge Tim Podraza, field judge Anthony Jeffries, side judge Boris Cheek, back judge Todd Prukop, replay official Charles Stewart, and replay assistant Robert Lu.",
"between plays, extra-wide sideline borders, wind-direction stripes on the goal post uprights, the referee's microphone, headsets in the quarterback's helmet for hearing plays, and the Dallas Cowboys Cheerleaders. While leading the league's Competition Committee, he oversaw rule changes such as using overtime in the regular season, putting the official time on the scoreboard, moving goalposts from the front of the end zone to the back, and protecting quarterbacks through the in-the-grasp rule. Schramm's desire for a more comprehensive scouting combine led to the annual offseason NFL Scouting Combine in Indianapolis. Don Shula said of Schramm, \"I truly"
] |
Why does it seem Conservatives don't want to go green? | [
"There are three major issues conservatives take with environmentalism:\n\nFirst, it's going to be a cost. And when it comes to cost of regulation, that's going to mean one of two things: loss of jobs, or increased prices. And before someone says \"OMG if they just took less profit they could keep prices the same and not fire anyone\" they won't, and so they won't.\n\nSecond is the belief in our ability to avert any oncoming damage. This isn't about \"they're dumb and think the environment can't be damaged\" or \"they're dumb and think God will protect us.\" They believe in the power of innovation, and in the drive of the free market.\n\nFinally, and most importantly, they are philosophically opposed to top-down regulations. They're fine going green on an individual level, as a personal choice. Aside from a few douchebros out there, I don't know any Conservatives who deride the choice to buy a hybrid or electric car, or install solar panels on your house. What they object to is *themselves* having the option taken away.\n\nAnd what's funny is that they push back against it, hard. In many ways they treat it the way a little kid treats being told not to do something. So, instead of buying a truck because they need a truck, it becomes a symbol of defiance and individuality, of manhood, and non-conformity.",
"What it really boils down to is this: conservation costs money. What this really means is: most companies will not use environmentally friendly technologies of their own accord, simply because they are more expensive. So, in order to force them to do so, you have to create powerful regulatory bodies, and in doing so you violate some of the core principles of the conservative platform.\n\nSo, the real issue is simply that conservatives value the short-to-medium term economy, as well as the fundamental infallibility of the free market, over the long-term climate consequences.",
"Cost Benefit Analysis doesn't get thrown out the window because you're scared for \"mother Earth.\"",
"**eli5: It really depends on the type of conservative.... And how loud their segment is at any given time in history. There have been many times that types of conservatives have fought for protecting the environment. Right now, government spending and regulations are being portrayed as a moral wrong by the conservatives with the loudest voices.**\n\nIt really depends on the type of conservative.... And how loud there segment is at any given time in history.\n\nFiscal Conservative-Primarily concerned with reducing government spending and government debt.\n\nSocial Conservative-Primarily concerned with morality and traditional values. At times this group has been dominated by the \"religious right\" and at other times it has been dominated by \"War Hawks\" wanting to globally ensure a future for democracy. \n\nLibertarian conservative-True Libertarians are concerned with liberty; this movement is currently melded with concerns of morality and liberty. This segment has been taken over by Neo-Cons pushing their own agendas.\n\nHistorically, there have been many times that types of conservatives have fought for protecting the environment. Nixon formed the EPA. The Boy Scouts of America preach conservation. **Both these examples are social conservatives at work; valuing the land is a moral imperative.** \n\nCurrently, you have neo-cons and fiscal conservatives with a majority of power. They want to \"starve the beast.\" Grover Norquist, the no-taxes pledge guy is quoted as saying: \"My goal is to cut government in half in twenty-five years, to get it down to the size where we can drown it in the bathtub.\" Yes, he is advocating to kill the United States in its current form."
] | [
"conservative voters to become suspicious of green politics and so interest in green conservatism waned.\nIn 2004 the conservative Family First Party aired a television advertisement labelling The Australian Greens as the Extreme Greens. Since then, the continuously increasing anti-conservative dominance within The Greens has led to this label receiving broader use in the media.\nConsequently, green conservatives are entering political parties other than The Greens instead. New Zealand The Conservative Party of New Zealand has an environmental policy focused around actions within the country that can help the local environment rather than being tied to international agreements.",
"many members of the Republican Party have been criticized for being anti-environmentalist and promoting climate change denial in opposition to the general scientific consensus, making them unique even among other worldwide conservative parties.\nGreen conservatism manifested itself as a movement in groups such as ConservAmerica, which seeks to strengthen the Republican Party's stance on environmental issues and support efforts to conserve natural resources and protect human and environmental health. Social policies The Republican Party is generally associated with social conservative policies, although it does have dissenting centrist and libertarian factions. The social conservatives want laws that uphold their traditional values, such",
"parliament before, but performed strongly in several polls, some even showing them above the threshold which would give them a sizable delegation in parliament. The Greens did not declare support for either the red–green or non-socialist blocs, but the Conservative Party considered the Greens to be well on the left side of the political spectrum. As their showings in polling rose, they began to face criticism for highly radical proposals. Nonetheless, the environmentally oriented Liberal and Socialist Left parties expressed worry that the Greens could become a spoiler by taking votes from them.\nThe Conservative Party's image branding of its leader",
"Party, the Conservative Party and the Liberal Democrats – have an official policy of republicanism. However, there are a number of individual politicians who favour abolition of the monarchy (see above). Tony Benn of the Labour Party introduced a Commonwealth of Britain Bill in Parliament in 1991. Jeremy Corbyn, who became leader of the Labour Party in 2015, is a republican, but has stated that he will not seek to abolish the monarchy whilst he remains leader.\nThe Green Party of England and Wales, with one MP in the 2017–2022 Parliament, has an official policy of republicanism. The Irish republican",
"the Republicans offered a home to those who favored retaining greenbacks, so many looked to create a third party that would address their concerns. Greenbackers drew support from the growing labor movement in the nation's Eastern cities, as well as from Western and Southern farmers who had been harmed by deflation. Beyond their support for a larger money supply, they also favored an eight-hour work day, safety regulations in factories, and an end to child labor. As one author put it, they \"anticipated by almost fifty years the progressive legislation of the first quarter of the twentieth century\".\nIn 1876, various",
"say that Green Party fundraising (for candidates' campaigns and for the party itself) still tends to rely on relatively small contributions and that Greens generally decry not only the rise of the Super PACs, but also the big-money system, which some Greens criticize as plutocracy.\nSome Greens feel that the Green Party's position should be simply to follow the laws and regulations of campaign finance. Other Greens argue that it would injure the Green Party not to practice a principled stand against the anti-democratic influence of money in the political process. Candidates for office, like Jill Stein, the 2012 and 2016",
"in Australia, New Zealand and the United States.\nA New Zealand website, The Watermelon, uses the term proudly, stating that it is \"green on the outside and liberal on the inside\", while also citing \"socialist political leanings\", reflecting the use of the term \"liberal\" to describe the left wing in many English-speaking countries. Red Greens are often considered \"fundies\" or \"fundamentalist greens\", a term usually associated with deep ecology even though the German Green Party \"fundi\" faction included eco-socialists, and eco-socialists in other Green Parties, like Derek Wall, have been described in the press as fundies.\nEco-socialists also criticise bureaucratic and elite",
"were reluctant to have Greens participate in the election system at all because they deemed the campaign finance system inherently corrupt. Other Greens felt strongly that the Green Party should develop in the electoral arena and many of these Greens felt that adopting an alternative model of campaign finance, emphasizing self-imposed contribution limits, would present a wholesome and attractive contrast to the odious campaign finance practices of the money-dominated major parties.\nOver the years, some state Green parties have come to place less emphasis on the principle of self-imposed limits than they did in the past. Nevertheless, it is safe to",
"Republican Party's stance on environmental issues and support efforts to conserve natural resources and protect human and environmental health.\nThe Independent Greens of Virginia (or Indy Greens) call themselves \"common sense conservatives\". The party, over the last decade, has run many conservative greens for local, state, and federal office. In 2004, the party gave its ballot line to Constitution Party nominee Michael Peroutka for president, and in 2008, once again placed the Constitution Party nominee Chuck Baldwin on the ballot as its presidential candidate. The Indy Greens call for balancing the federal budget and paying off the federal debt.\nThe Republican",
"they received 41% of the votes, more than SPÖ and ÖVP combined. The Greens attract left-liberal intellectuals and voters from 18-30. Some insist on characterizing the Greens as leftists because they are perceived to be anti-capitalist and certainly employ anti-corporate rhetoric and less business friendly policies. However, this labeling confuses the differences between the Greens—who place a great deal of faith in local markets and direct democracy—and left-Socialists and Communists who tend to favor centralization and planned economies and economic class issues. \nThe Green Party suffered internal strife and fissure in 2017 and failed to meet the 4% threshold",
"Green party Definitions There are distinctions between \"green\" parties and \"Green\" parties. Any party, faction, or politician may be labeled \"green\" if it emphasizes environmental causes. Indeed, the term may even be used as a verb: it is not uncommon to hear of \"greening\" a party or a candidate.\nIn contrast, formally organized Green parties may follow a coherent ideology that includes not only environmentalism, but often also other concerns such as social justice, consensus decision-making and nonviolence. Greens believe that these issues are inherently related to one another as a foundation for world peace. The best-known statement of the above",
"conservative because I believe in more freedom and I believe in less government. I think that we are endowed by our Creator, not by politicians, not by government, not by bureaucrats, with inalienable rights, including the pursuit of happiness. If you believe that, what could be more central to the pursuit of happiness than choosing the person that you love, that you have the right to marry?\"\nIn February 2013, Mehlman helped organize an amicus curiae brief to the Supreme Court in the case of California Proposition 8 signed by dozens of prominent socially moderate Republicans, including Jon Huntsman, Jr., Meg",
"however, Labour and their coalition partner, the Jim Anderton-led Progressive Coalition, opted to rely on support from United Future, a party with conservative Christian overtones, shutting the Greens out of power.\nAlthough the Greens no longer had any input into the budget, they maintained a close working relationship with the government, and the Greens remained involved in the legislation process. Often the government needed to rely on Green votes in the House to pass legislation not approved by United Future, a conservative family-values party. The government won praise from political commentators for juggling the two diametrically-opposed parties.\nWhile the moratorium on genetic",
"groups who have increased their focus on green issues since the fall of communism. Fred L. Smith Jr., President of the Competitive Enterprise Institute think-tank, exemplifies the conservative critique of left Greens, attacking the \"pantheism\" of the Green movement and conflating \"eco-paganism\" with eco-socialism. Like many conservative critics, Smith uses the term 'eco-socialism' to attack non-socialist environmentalists for advocating restrictions on the market-based solutions to ecological problems. He nevertheless wrongly claims that eco-socialists endorse \"the Malthusian view of the relationship between man and nature\", and states that Al Gore, a former Democratic Party Vice President of the United States and",
"shape the debate\". Greens The Australian Greens party is a strong proponent for an Australian republic, and this is reflected in the Greens 'Constitutional Reform & Democracy' policy. In the Senate, the Greens proposed legislation to hold a plebiscite on the republic at the 2010 federal election. Democrats The Australian Democrats, formerly Australia's third party, strongly supported a move towards a republic through a system of an elected Head of State through popular voting. However, the party was deregistered in 2015 due to a decline in membership.",
"away from the Republican Party. On the other hand, the fertility advantage of conservative over liberal white voters is significant and rising, thus the Republicans are poised to win a larger share of the white vote - especially over the very long run of 50 to 100 years. \nAccording to London-based scholar Eric Kaufmann, the high birth rates of religious fundamentalists as against seculars and moderates has contributed to an increase in religious fundamentalism and decrease of moderate religion within religious groups, as in Israel, the US and the Muslim Middle East. Kaufmann, armed with empirical from a number of",
"expressed disappointment at his remarks. United States One of the first uses of the term green conservatism was by former United States Republican House Speaker Newt Gingrich, in a debate on environmental issues with John Kerry. Around this time, the green conservative movement was sometimes referred to as the crunchy con movement, a term popularized by National Review magazine and the writings of Rod Dreher.\nIn the United States, the Republican Party is generally considered as the conservative party. Green conservatism manifested itself as a movement in groups such as ConservAmerica and the American Conservation Coalition, which seek to strengthen the",
"to the Greens, who support an agenda that is anti-growth, and opposed to free trade. However, Liberal Reform does not reject co-operation with groups, organisations and parties that share the party's aims, and in opposing the use of the term 'progressive alliance' in the motion, it stated that it believes in “working with those on all sides of politics who share goals with us to achieve them”. Organisation and structure Liberal Reform is run by a Board which is elected by the membership of Liberal Reform and two co-Chairs who are chosen from within the Board itself. In addition Liberal",
"Green Party in Northern Ireland Policies The Green Party has four key values: social justice, environmental sustainability, grassroots democracy and non-violence. It is considered to be more to the left than most parties in Northern Ireland.\nThe Green Party has been involved in several major campaigns since entering the Northern Ireland Assembly, including clean rivers and anti-nuclear campaigns, opposition to fracking, and fighting the austerity agenda. It has also campaigned against the development of incinerators at Belfast North Foreshore and Lough Neagh, and against proposals to extend the airport runway at George Best Belfast City Airport.\nThe Green Party campaigns not just",
"where nationalists are going to sweep to a majority. Plaid gets less votes than the Conservatives.\" He was backed on this point by Sir Wyn Roberts who agreed devolution would not break up the UK. Further support came from Alan Clark and Stephen Dorrell.\n\nAt a press conference held at the Yes for Wales Campaign, Pedley again argued Conservatives to vote Yes and warned that the party would face oblivion in Wales if it did not take advantage of the opportunity and denounced talk of a Conservative boycott of the Assembly. \n\"If we don't get it right, I think people like",
"Cruddas indicated that voters in England and Wales did not support an anti-austerity platform, concluding: \"the Tories did not win despite austerity, but because of it\".\nThe 2017 UK general election was held almost three years earlier than scheduled under the Fixed-term Parliaments Act 2011 in an attempt to increase the Government's majority to facilitate the Brexit process. The Conservative Party manifesto pledged to eliminate the deficit by the \"middle of the next decade\", an aim which the Institute for Fiscal Studies (IFS) said would \"likely require more spending cuts or tax rises even beyond the end of the next parliament\".",
"to abortion, euthanasia and capital punishment); it differs from The Greens by being less supportive of immigration and restrictions on state powers in criminal justice issues, not focusing on gay and lesbian rights, and having a differing view on feminism.\nWhile having never gained seats in federal or state legislatures in Germany, it made a name for itself by its involvement in the opposition to a Czech nuclear reactor in Temelin, across the border from Bavaria. It led an initiative for a popular referendum to abolish the Bavarian Senate (that state's upper house) which was successful. The party won a seat",
"Green Left, that was founded in June 2005. Its members held some influential positions within the party, including both the former Principal Speakers Siân Berry and Dr. Derek Wall, himself an eco-socialist and Marxist academic. In Europe, some Green left political parties combine traditional social-democratic values such as a desire for greater economic equality and workers rights with demands for environmental protection, such as the Nordic Green Left.\nWell-known socialist Bolivian President Evo Morales has traced environmental degradation to consumerism. He has said: \"The Earth does not have enough for the North to live better and better, but it does have",
"Party, and in 1985 the Green Party. In 1990, the Green Party split into three parties, with Lord remaining a member of the Green Party of England and Wales.\nLord is a campaigner for basic income, writing in 1993 that: \"I'm afraid I cannot retire from Green politics until the significance of the Basic Income is understood and taken for granted on all sides: it will enable us to emerge from recession without returning to indiscriminate economic growth that will destroy itself, and us with it.\" In 2003, he published a book, A Citizens' Income: A Foundation for a Sustainable World,",
"a love of place and heritage.\nBright Blue, a liberal conservative think tank launched the Green Conservatism project to create conservative support for policies that address climate change. Australia The first significant Green conservative in Australia was Prime Minister Malcolm Fraser. During his time in office (1975-1983) he legislated significant environmental-protection laws for the Great Barrier Reef while leader of the centre-right Liberal Party as early as the 1970s.\nAustralian politics became more polemical around the year 2000. Once an uneasy alliance between the Australian Labor Party (the traditional opposition to the Liberal Party) and The Greens had formed, it caused many",
"the name Republicans for Environmental Protection in 1995. Our mission is to educate the public and elected officials on conservative approaches to today’s environmental, energy, and conservation challenges.\"\nREP's slogan, \"Conservation is Conservative\", is based on the traditional conservative philosophy of writers and thinkers such as British statesman Edmund Burke, President Theodore Roosevelt, and authors Russell Kirk, author of The Conservative Mind: From Burke to Eliot, and Richard Weaver, author of Ideas Have Consequences. REP argues in its literature that conservation and responsible environmental stewardship are core conservative values that necessarily extend from concepts such as prudence, personal responsibility, thrift and",
"often stated that green bans had a great impact on both herself and her philosophy. Subsequently, she brought back the idea of green bans as well as the terminology \"green\" to Germany, and established the German Green Party in 1979. This is regarded as the point at which the word \"green\" was first applied to politics in Europe. Petra Kelly acknowledged that Australian green bans broadened the possibilities of the environmental movement as well as gave it a new dimension, and they made it possible to involve a much broader range of the population in environmental groups",
"such a political direction. \" Policies Despite its support for environmental causes, such as reforestation and reductions in carbon emissions, the Green Party also advocates some free-market policies, such as the privatisation of state-owned enterprises. It supports an extension in individual rights as well as greater separation of church and state, including a gradual removal of all state funding for religious institutions. Like the vast majority of Romanian political parties, it is supportive of European integration.\nIt is the Romanian party that is most supportive of LGBT rights, supporting same-sex marriage and civil partnerships, as well as measures to reduce homophobia",
"as Conservative candidates. Greening, however, said she was not planning to stand for re-election. Personal life In June 2016, Greening revealed on Twitter that she was in a \"happy same-sex relationship\". Referring to the EU membership referendum, she added: \"I campaigned for Stronger In but sometimes you're better off out!\" Greening was previously in a relationship with Mark Clarke, a former Conservative parliamentary candidate for Tooting who was expelled from the party for his involvement in a bullying scandal of young members.",
"The Green Party were also anticipated to be likely members of the coalition government on the basis of agreed points of view on many issues covered by the Mullingar Accord.\nThis move is rumoured to have caused some tension in the parliamentary party, as some members would prefer not to be aligned with any party in advance of an election. The election result did not return a sufficient number of seats for the Alliance for Change to occupy government, even with the support of the Green Party. Rabbitte himself commented on the election result: \"This leaves Mr. Ahern in the driving"
] |
Why can't cigarette companies remove the many dangerous chemicals in their products? | [
"It is a myth that cigarette companies add dangerous chemicals to the tobacco. It is a myth that additives make cigarettes unhealthy. It is a myth that additives make cigarettes addictive. \n\nTOBACCO is what makes cigarettes unhealthy and addictive. Additive-free cigarettes are not healthier in any way, and may in fact be less healthy, since the additives generally make cigarettes burn more slowly presumably resulting in people smoking less of them throughout the day. \n\nThe \"dangerous chemicals\" in cigarettes are from the tobacco itself. Burning plant matter and inhaling the smoke causes cancer, not the additives.",
"The short version is that tobacco naturally contains carcinogens and creates tar when burned. If you want to chew, snuff, or smoke tobacco then this is what you deal with."
] | [
"their scheme to defraud by denying the adverse health effects of smoking, denying the addictiveness of nicotine, denying their manipulation of the nicotine content of cigarettes, and denying that their marketing targeted youth as new smokers. The companies also suppressed and destroyed information related to the dangers of smoking in order to maximize their profits and enhance the market for cigarettes. Complaint On September 22, 1999, the United States Department of Justice brought a lawsuit against nine cigarette manufacturers and two tobacco industry trade associations in the United States District Court of the District of Columbia (\"District Court\"). The",
"and medical settings). \"Modified risk\" products \"Modified risk\" nicotine products, alternate nicotine products that are implied to be less harmful, are an old strategy. These products are used to discourage quitting, by offering unwilling smokers an alternative to quitting, and implying that using the alternate product will reduce the hazards of smoking. \"Modified risk\" products also attract new smokers.\nMany \"modified risk\" nicotine products are actually just as risky as the products they were marketed against. As the long-term harms of cigarette smoking emerge after ~20 years of use, claims of reduced long-term harms for a new product cannot immediately be",
"the American Legislative Exchange Council (ALEC) has lobbied against the sale of plain packaged cigarettes—citing lack of evidence. Tobacco organisations instead posit plain packaging will ease the ability of illegal tobacco manufacturers to replicate legitimate products—resulting in higher incidences of illicit trade. While no other countries have implemented plain packaging yet, time will tell if this move will have positive or negative consequences in reducing youth and adult smoking. Links to organized crime Numerous reports, have forged links between the illegal tobacco trade and organised crime groups, whom are attracted by high consumer demand, high potential profits, and relatively low",
"any tobacco or nicotine-containing product, and companies that sell them have a responsibility to ensure they aren’t enticing youth use. When companies market these products using imagery that misleads a child into thinking they’re things they’ve consumed before, like a juice box or candy, that can create an imminent risk of harm to a child who may confuse the product for something safe and familiar,\" said FDA Commissioner Scott Gottlieb.\nNicotine toxicity is of concern when e-cigarette solutions are swallowed intentionally by adults as a suicidal overdose. Seizures or convulsions are known potential side effects of nicotine toxicity and have been",
"e-cigarettes manufacturing standards are variable standards, and many as a result are probably more toxic than nicotine replacement products. The UK National Health Service noted that the toxic chemicals found by the FDA were at levels one-thousandth that of cigarette smoke, and that while there is no certainty that these small traces are harmless, initial test results are reassuring. While there is variability in the ingredients and concentrations of ingredients in e-cigarette liquids, tobacco smoke contains thousands of chemicals, most of which are not understood and many of which are known to be harmful. Carcinogenicity Concerns about the carcinogenicity of",
"CEH launched legal actions against more than 60 companies for failing to warn consumers about exposure from e-cigarettes to nicotine and/or to formaldehyde and acetaldehyde, as required by California law. In one legal settlement with CEH, the e-cigarette company Sapphire Vapor agreed to legally binding restrictions on sales and marketing to teens and prohibitions on the use of unverified health claims in their marketing.\nCEH has long worked for strong federal rules to protect children and families from harmful chemicals. In March 2015, as Congress was developing new federal rules for regulating toxic chemicals, CEH and other health and environmental advocacy",
"also promoted \"modified risk\" nicotine products, falsely implied to be less harmful, such as roasted, \"filter\", menthol, and ventilated (\"light\") cigarettes. These products were used to discourage quitting, by offering unwilling smokers an alternative to quitting, and implying that using the alternate product would reduce the hazards of smoking. \"Modified risk\" products also attract new smokers.\nIt is now known that these products are not less harmful. Filter cigarettes became near-universal, but smokers suffered just as much illness and death. Initially, efforts were made to develop filters that actually reduced harms; as it became obvious that this was not economically possible,",
"2018, the US FDA issued 12 warning letters to online retailers that were selling misleadingly labeled and/or advertised e-liquids resembling kid-friendly food products such as candy and cookies.\nOn October 12, 2018, the US FDA sent letters to 21 e-cigarette companies, including the manufacturers and importers of Vuse Alto, myblu, Myle, Rubi and STIG, seeking information about whether more than 40 products – including some flavored e-cigarette products – are being illegally marketed and outside the agency's current compliance policy. These new actions build on those taken by the FDA in recent weeks as part of its Youth Tobacco Prevention Plan",
"public a product found to contain toxic substances like faeces, asbestos and dead flies.\nThe harm arising from this amalgam of contaminants sits on top of any baseline hazard ascribed to commercial tobacco products. With the sales of illicit cigarettes in Turkey, for example, exceeding 16.2 billion cigarettes per year, Turkish Prime Minister Erdogan labeled counterfeit tobacco as \"more dangerous than terrorism\". Military items According to a U.S. Senate committee report in 2012 and reported by ABC News, \"counterfeit electronic parts from China are 'flooding' into critical U.S. military systems, including special operations helicopters and surveillance planes, and are putting the",
"addiction among youth.\nIn October 2012, the World Medical Association released a statement which stated, \"Due to the lack of rigorous chemical and animal studies, as well as clinical trials on commercially available e-cigarettes, neither their value as therapeutic aids for smoking cessation nor their safety as cigarette replacements is established. Lack of product testing does not permit the conclusion that e-cigarettes do not produce any harmful products even if they produce fewer dangerous substances than conventional cigarettes.\" Australia The Therapeutic Goods Administration (TGA) of Australia has stated that, \"the quality and safety of electronic cigarettes is not known\" due to",
"tobacco cigarettes are not found in electronic cigarettes\". A 2016 review stated, \"Despite widespread promotion that e-cigarettes are safer than regular cigarettes due to less tar production, there are multiple chemicals found in these products. These include nicotine, formaldehyde, acetaldehyde, lead, acetone, copper, and cadmium. These compounds can be addictive and/or carcinogenic. For example, formaldehyde is an International Agency for Research on Cancer group 1 carcinogen.\" The makers and marketers of such products frequently assert that the products they offer are a safe substitute to smoking, especially because they do not generate carcinogenic smoke. Despite this, \"no studies have been",
"Toxicity stated \"The Committees were concerned over the potential for non-smokers including children and young people, who would not otherwise start to smoke cigarettes, to take up using these products as they are not without risk.\" Compared to not using heat-not-burn tobacco products, there is an increase in risk for non-smokers who begin using them. It is possible that these products could appeal to non-smokers, especially since they are available in various flavors. A growing body of evidence shows that never-users of tobacco products, especially children and adolescents, could be susceptible to new products and that this could result in",
"including the WHO.\nThe WHO FCTC Protocol on the Elimination of the Illicit Trade in Tobacco products states in article 8, section 12 that tobacco tracking and regulation “shall not be performed by or delegated to the tobacco industry”.\nCritics of the tobacco industry say Codentify is simply not good enough, “because it focuses too much on production and does not store product codes or track them.”\nHeavy criticism has also been launched at the factory-level keys the system uses to provide unique verification codes for the product. Since these secret keys are stored on company and government servers, abuse of privileges on",
"fewer harmful chemicals than a traditional cigarette.",
"Critics argue that the outright banning of dangerous products by government regulation is inferior to keeping the products while innovating ways to prevent the lethal effects. They argue that the product benefits are too important to ignore; instead of banning the products, ways should be found to eliminate risks to those who work with the products.\nSome criticisms were subsequently discredited. An example is the discredited suggestion by Dixy Lee Ray and others that the Space Shuttle Challenger disintegrated because the maker of O-ring putty was pressured by the EPA into ceasing production of asbestos-laden putty. However, the putty used in",
"use of young, attractive models; lifestyle claims; and celebrities. Other claims made in e-cigarette advertising have been used in the past by traditional cigarette brands (such as having fewer carcinogens, lower risk of tobacco-related disease) or by smokeless tobacco products (such as the ability to use them where smoking is prohibited). However, under the deeming rule that was published in May 2016, after August 8, 2016, e-cigarette manufacturers cannot make modified risk claims (although this provision has been challenged in pending lawsuits).\nThe use of‐cigarettes or heat-not-burn tobacco products is heavily effected by the marketing approaches of tobacco companies, is an",
"lead to \"testicular toxicity and human reproductive dysfunction.\" Other health problems from their exposure to chemicals include \"acute systemic poisoning, nausea, dermatitis, fatigue and abnormalities in liver and kidney function\", farmers and their family are exposed to toxic chemicals when the farm worker leaves the field and has contact with family members wearing contaminated clothes. Corporate support for mitigation of toxic chemical exposure Corporations can show social responsibility by removing products from the market and introducing similar alternatives that can benefit vulnerable groups. For instance, \"Kaiser Permanente, a major medical supply purchaser, has a policy to avoid chemicals associated with",
"the only people who should handle these products.\nAs part of ongoing efforts to protect youth from the dangers of nicotine and tobacco products, the US FDA and the Federal Trade Commission announced on May 1, 2018, they issued 13 warning letters to manufacturers, distributors, and retailers for selling e-liquids used in e-cigarettes with labeling and/or advertising that cause them to resemble kid-friendly food products, such as juice boxes, candy or cookies, some of them with cartoon-like imagery. Several of the companies receiving warning letters were also cited for illegally selling the products to minors. \"No child should be using any",
"settlement called on the companies to sell avgas \"with the lowest concentration of lead approved for aviation use that is commercially available,\" and required them to post warning signs around airports. E-cigarettes, chemical policy reform, BPA (2015-2016) In February 2015, CEH sent legal notices to nearly 40 companies it alleged were selling e-cigarettes without warning labels, as required by California law. In September of that year, the group released a report showing that the majority of the 97 e-cigarette products it tested could expose users to one or both of the cancer-causing chemicals formaldehyde and acetaldehyde. A test on one",
"thousands of chemicals placed on the market before 1981. There were 100,106 chemicals in use in the EU in 1981, when the last survey was performed. Of these only 3,000 have been tested and over 800 are known to be carcinogenic, mutagenic or toxic to reproduction. These are listed in the Annex 1 of the Dangerous Substances Directive (now Annex VI of the CLP Regulation).\nContinued use of many toxic chemicals is sometimes justified because \"at very low levels they are not a concern to health\". However, many of these substances may bioaccumulate in the human body, thus reaching dangerous concentrations.",
"retailers to work with the manufacturing base to substitute or remove potentially harmful substances from products. The list of harmful substances is continuously growing and requires organizations to constantly monitor any announcements and additions to the REACH scope. This can be done on the European Chemicals Agency's website. Registration A requirement is to collect, collate and submit data to the European Chemicals Agency (ECHA) on the hazardous properties of all substances (except Polymers and non-isolated intermediates) manufactured or imported into the EU in quantities above 1 tonne per year. Certain substances of high concern, such as carcinogenic, mutagenic and reproductive",
"Tobacconist Regulations Some tobacco shop owners in the US are concerned about the 2016 Food and Drug Administration (FDA) regulations for electronic cigarettes. The 2010 FDA regulations caused some inconveniences for local tobacco shops in Cullman, Alabama, US. The US Family Smoking Prevention and Tobacco Control Act, has restricted marketing, particularly to minors; prohibited flavored cigarettes (excluding menthol); removed descriptions including \"light,\" \"mild,\" and \"low-tar\" from cigarette packs; and made larger the dimensions of warning labels on smokeless tobacco. Anyone under the age of 19 are not allowed to entry any US self-service tobacco shop, even if going with an",
"which are also used as antiseptics. It could not distinguish between drugs released by manufacturers as opposed to the pharmaceutical industry. It also found that an estimated 250 million pounds of pharmaceuticals and contaminated packaging were discarded by hospitals and long-term care facilities. The series of articles led to a hearing conducted by the U.S. Senate Subcommittee on Transportation Safety, Infrastructure Security, and Water Quality. This hearing was designed to address the levels of pharmaceutical contaminants in U.S. drinking water. This was the first time that pharmaceutical companies were questioned about their waste disposal methods. \"No federal regulations or laws",
"the BATA spokesman said. \"The issue with illegal tobacco is that 100 per cent of the profits go to the pockets of criminals while 70 per cent of the legal product sale goes to taxpayers through tobacco excise and tax.\" Trick in cigarette names In 2012, an anti-smoking campaigner had accused Australian tobacco companies of \"sexing up\" their brand names to make them more appealing in the wake of plain packaging laws.\nAustralian Council on Smoking and Health president Mike Daube said manufacturers were introducing dozens of extended brand \"descriptors\" to meet the December 1 deadline for all products to be",
"branded to suggest that it is less harmful or addictive (\"mild\", \"light\", \"low-tar\", \"filtered\" etc.) is, in terms of health effects, meaningless. Recapturing former smokers Companies have also sought to recapture people who have successfully broken a nicotine dependency. Ex-smokers tend to view these attempts very negatively, and their existence has frequently been denied. Methods discussed in industry documents include price drops, increasing acceptance of smoking by nonsmokers, making products more socially acceptable, and making \"healthier\" cigarettes (scare quotes in original). Economics As tobacco companies keep spending money on marketing until it stops being profitable, marginal changes in marketing typically",
"known harmful effect in smokers. Safety In the United States, pharmaceuticals must be proven safe and effective to the satisfaction of the FDA before they can be marketed, whereas dietary supplements must be proven unsafe before regulatory action can be taken. A number of orthomolecular supplements are available in the US in pharmaceutical versions that are sometimes quite similar in strength and general content, or in other countries are regulated as pharmaceuticals. The US regulations also have provisions to recognize a general level of safety for established nutrients that can forgo new drug safety tests. Proponents of orthomolecular medicine argue",
"and Health stated in 2016 that \"unless and until independent evidence shows that IQOS and similar products are substantially less harmful than smoking then these products should be regulated in the same way as other tobacco products.\" Tobacco control activist Stanton Glantz stated that the US FDA should halt new tobacco products until tobacco companies stop selling traditional cigarettes. It is recommended that indoor-smoking bans for traditional cigarettes be extended to heat-not-burn tobacco products. It is recommended that marketing of these products, and claims being made about them, should be regulated.\nAdvertisement for the IQOS product itself is not regulated under",
"sites to searches on key words such as chemical names and terms like psychedelic or hallucinogen. Widespread discussion of consumptive use and the sources for the chemicals in public forums also drew the attention of the media and authorities.\nIn 2004, the US Drug Enforcement Administration raided and shut down several Internet-based research chemical vendors in an operation called Web Tryp. With help from the authorities in India and China, two chemical manufacturers were also closed. Many other internet-based vendors promptly stopped doing business, even though their products were still legal throughout much of the world.\nMost substances that were sold as",
"remain to be explored scientifically. There is no reason to presume that because a product comes from nature it must be safe: the existence of powerful natural poisons like atropine and nicotine shows this to be untrue. Further, the high standards applied to conventional medicines do not always apply to plant medicines, and dose can vary widely depending on the growth conditions of plants: older plants may be much more toxic than young ones, for instance.\nPharmacologically active plant extracts can interact with conventional drugs, both because they may provide an increased dose of similar compounds, and because some phytochemicals interfere",
"combustible forms, without abstaining completely from tobacco and nicotine. Some of these measures include switching to safer (lower tar) cigarettes, switching to snus or dipping tobacco, or using a non-tobacco nicotine delivery systems. In recent years, the growing use of electronic cigarettes for smoking cessation, whose long-term safety remains uncertain, has sparked an ongoing controversy among medical and public health between those who seek to restrict and discourage all use until more is known and those who see them as a useful approach for harm reduction, whose risks are most unlikely to equal those of smoking tobacco. \"Their usefulness in"
] |
Why do we get "chills" when something extremely moving or pleasing happens? | [
"Your brain is run on chemicals, when fun stuff happens fun chemicals are released, they make you feel good and also give you chills.\n\nTo artificially experience this feeling I recommend taking amphetamines. Ecstasy, Meth, Speed, they'll all give you some serious chills."
] | [
"response are mediated by the reward system and sympathetic nervous system, respectively. The stimuli that produce this response are unique to each individual.\nFrisson is of short duration, lasting only a few seconds. Typical stimuli include loud passages of music and passages—such as appoggiaturas and sudden modulation—that violate some level of musical expectation. During a frisson, a sensation of chills or tingling felt on the skin of the lower back, shoulders, neck, and/or arms. The sensation of chills is sometimes experienced as a series of 'waves' moving up the back in rapid succession and commonly described as \"shivers up the spine\".",
"that people who experience 'chills' while listening to music have a higher volume of fibres connecting their auditory cortex to areas associated with emotional processing.",
"The presence of the tone resulted in a significant number (22%) of respondents reporting feeling uneasy or sorrowful, getting chills down the spine or nervous feelings of revulsion or fear.\nIn presenting the evidence to the British Association for the Advancement of Science, Professor Richard Wiseman said \"These results suggest that low frequency sound can cause people to have unusual experiences even though they cannot consciously detect infrasound. Some scientists have suggested that this level of sound may be present at some allegedly haunted sites and so cause people to have odd sensations that they attribute to a ghost—our findings support",
"Saccular acoustic sensitivity Effects Saccular acoustic sensitivity has a variety physiological as well as mental/emotional effects. Physical Effects Perhaps the most observable physical response is goose bumps. A similar effect is the manifestation of chills. Some sounds have been known to cause reflexive muscle movements like a twitch or even a jump. Since these physical effects are easily recorded and are linked consistently with strong emotion, they have been used in several types of psychological studies. Mental/Emotional Effects Certain sounds, such as fingernails drawn down a blackboard, cause strong feelings of aversion or even fear in most humans. A",
"The Tingler Plot A pathologist, Dr. Warren Chapin (Price), discovers that the tingling of the spine in states of extreme fear is due to the growth of a creature that every human being seems to have, called a \"tingler\", a parasite attached to the human spine. It curls up, feeds and grows stronger when its host is afraid, effectively crushing the person's spine if curled up long enough. The host can weaken the creature and stop its curling by screaming.\nMovie theater owner Oliver Higgins (Coolidge), who shows exclusively silent films, is an acquaintance of Dr. Chapin. Higgins's wife Martha (Evelyn),",
"the pattern of overall frontal EEG activity. Overall frontal region activity increased as affective musical stimuli became more intense.\nMusic is able to create an incredibly pleasurable experience that can be described as \"chills\". Blood and Zatorre (2001) used PET to measure changes in cerebral blood flow while participants listened to music that they knew to give them the \"chills\" or any sort of intensely pleasant emotional response. They found that as these chills increase, many changes in cerebral blood flow are seen in brain regions such as the amygdala, orbitofrontal cortex, ventral striatum, midbrain, and the ventral medial prefrontal",
"shall relieve it becomes inevitable\".\nTitchener rejected the telepathic explanation. He instead suggested that when a subject experienced the feeling that they were being watched and turned to check, a second person who already had the subject in their field of vision might notice the subject starting to turn their head, and shift their gaze to the subject. From the subject's perspective, they have turned their head and can now see a person looking directly at them, from which they may incorrectly assume that the person had been staring at them all along. Titchener attributed the \"tingling\" effect to the subject",
"threat, when in reality, it may not. Physical Physical symptoms include dry mouth, tremors, tightening in the chest, rapid breathing, sweating of the palms, nausea and irregular heart beat. Causes Ancraophobia is never present at birth. The fear of wind most often arises as a result of a negative experience in the person's past. This experience may or may not be recalled in the conscious mind of the person but this has been imprinted on the subconscious mind. Most often an ancraophobic person experienced a situation where the wind was blowing heavily and they found themselves afraid that the wind",
"low of a credibility to elicit change and the change of beliefs or emotion then causes surprise. Physiological responses The physiological response of surprise falls under the category of the startle response. The main function of surprise or the startle response is to interrupt an ongoing action and reorient attention to a new, possibly significant event. There is an automatic redirection of focus to the new stimuli and, for a brief moment, this causes tenseness in the muscles, especially the neck muscles. Studies show that this response happens extremely fast, with information (in this case a loud noise) reaching the",
"cause severe nausea and then forced to watch violent acts. This renders him unable to perform any violent acts without inducing similar nausea. Unintentionally, he also forms an aversion to classical music.\nSome general examples that involve the classical conditioning theory in action include, in a lot of cases, advertising. This is a tactic used in order to elicit a response. Advertising on game shows is one of many examples. With the exciting and positive environment of a game show, the viewer may then start to generate an exciting response to the advertisement because of the association with the environment. Another",
"new predicts surprise, but the appraisal of the coping mechanism predicts the response beyond surprise, such as confusion or interest. Familiarity As individuals become more accustomed to particular types of surprise, over time the level of surprise will decrease in intensity. This does not necessarily mean that an individual, for instance, will not be surprised during the jump scene of a scary movie, it implies that the individual may expect the jump scene due to familiarity with scary movies, thus lowering the level of surprise. The EVT model helps to support this claim because as individuals become more accustomed",
"waves. Ancraophobia is also related to terms like aeroacrophobia, which is the fear of open high places, and anemophobia which is the fear of air drafts. Symptoms The level of fear as well as other symptoms will vary between individuals. There are four general types of symptoms: psychological, physical, mental and emotional. Psychological Psychological symptoms include extreme anxiety when exposed to wind, feelings that the wind may harm or hurt the individual, and a compulsion to avoid encountering wind. The fear of wind is caused by the mind over-estimating the danger caused by wind, believing that wind presents an actual",
"can with propriety be called so, every impression seems to agitate the person, and gives him or her an unnatural degree of mental restlessness. People walking up and down the room, a slight noise in the same, the moving of a table, the shutting a door suddenly, a slight excess of heat or of cold, too much light, or too little light, all destroy constant attention in such patients, inasmuch as it is easily excited by every impression.\nCrichton noted that \"…they have a particular name for the state of their nerves, which is expressive enough of their feelings. They say",
"danger, yet these same people will be afraid, possibly terrified to the point of incapacitation, and many do not know why. Classical conditioning Claustrophobia results as the mind comes to connect confinement with danger. It often comes as a consequence of a traumatic childhood experience, although the onset can come at any point in an individual's life. Such an experience can occur multiple times, or only once, to make a permanent impression on the mind. The majority of claustrophobic participants in an experiment done by Lars-Göran Öst reported that their phobia had been \"acquired as a result of a conditioning",
"to a stimuli they find disturbing or fear inducing until it no longer provokes an emotional response. The stimuli can range from commonly feared situations and objects, such as heights or speaking publicly, to seemingly mundane objects and places that have become distressing through a traumatic experience. If someone is exposed to a traumatic experience it is common that being exposed to reminders, including memories, of the event will trigger anxiety attacks, emotional distress and flashbacks. A common mechanism to deal with these potential triggers is to avoid thinking about them and to avoid situations where they may be",
"intense perceptual disturbance such as visions of insects, snakes, or rats. These may be hallucinations or illusions related to the environment, e.g., patterns on the wallpaper or in the peripheral vision that the patient falsely perceives as a resemblance to the morphology of an insect, and are also associated with tactile hallucinations such as sensations of something crawling on the subject—a phenomenon known as formication. Delirium tremens usually includes extremely intense feelings of \"impending doom\". Severe anxiety and feelings of imminent death are common DT symptoms.\nDT can sometimes be associated with severe, uncontrollable tremors of the extremities and secondary symptoms",
"Wow and flutter measurement Audible effects Wow and flutter are particularly audible on music with oboe, string, guitar, flute, brass, or piano solo playing. While wow is perceived clearly as pitch variation, flutter can alter the sound of the music differently, making it sound ‘cracked’ or ‘ugly’. A recorded 1 kHz tone with a small amount of flutter (around 0.1%) can sound fine in a ‘dead’ listening room, but in a reverberant room constant fluctuations will often be clearly heard. These are the result of the current tone ‘beating’ with its echo, which since it originated slightly earlier, has a slightly",
"life's work after meeting Marianne Moore. Bishop once said:\nHave you ever noticed how you can learn more about other people-more about how they feel, how it would feel to be them-by hearing them cough or make one of those inner noises, than by watching them for hours? Sometimes if another person hiccups, particularly if you haven't been paying much attention to him, why do you get a sudden sensation as if you were inside him-you know how he feels in the little aspects he never mentions, aspects which are, really, indescribable to another person and must be realized by that",
"breathing, whispering, or repetitive tapping noises, can precipitate feelings of anger and disgust, in the absence of any previously learned associations that might otherwise explain those reactions.\nThere are plentiful anecdotal reports by those who claim to have both misophonia and ASMR at multiple web-based user-interaction and discussion locations. Common to these reports is the experience of ASMR to some sounds, and misophonia in response to others. Comparison with frisson The tingling sensation that characterizes ASMR has been compared and contrasted to frisson.\nThe French word 'frisson' signifies a brief sensation usually reported as pleasurable and often expressed as an overwhelming emotional",
"nonlinearities in sounds make them more frightening.",
"is now used to describe a psychological fear, but Westphal's original description included many symptoms of dizziness and imbalance not included in the modern psychiatric definition. Unlike people who feel anxious in crowds because they feel something bad will happen, people with CSD may dislike crowds because all the movement leads to a sensation of dizziness.",
"hormone that speeds up heart rate, metabolism, and body temperature in the presence of extreme stress. Then the sympathetic nervous system also causes the piloerection reflex, which makes the muscles attached to the base of each hair follicle contract and force the hair up. Music Canadian researchers have suggested that when humans are moved by music their brains behave as if reacting to delicious food, psychoactive drugs, or money. The pleasure experience is driven by the chemical dopamine, which produces physical effects known as \"chills\" that cause changes in heart rate, breathing, temperature and the skin's electrical conductance. The",
"warmer weather, and this increases the number of opportunities for criminals. Another is that high temperatures cause a physiological response that increases people's irritability, and therefore their likeliness to escalate perceived slights into violence. There is some research detailing that changes in the weather can affect the behavior of children.",
"comes to seem an affectation\"",
"may be much more anxious than another. There is a direct relationship between the activation of the amygdala and the level of anxiety the subject feels.\nFeelings of anxiety start with a catalyst – an environmental stimulus that provokes stress. This can include various smells, sights, and internal sensations that result in anxiety. The amygdala reacts to this stimuli by preparing to either stand and fight or to turn and run. This response is triggered by the release of adrenaline into the bloodstream. Consequently, blood sugar rises, becoming immediately available to the muscles for quick energy. Shaking may occur in an",
"is argued that fear prompts a state of arousal in the amygdala, which increases the rate of a hypothesised \"internal clock.\" This could be the result of an evolved defensive mechanism triggered by a threatening situation. Other emotional states Research has suggested the feeling of awe has the ability to expand one's perceptions of time availability. Awe can be characterized as an experience of immense perceptual vastness that coincides with an increase in focus. Consequently, it is conceivable that one's temporal perception would slow down when experiencing awe. The perception of another persons' emotions can also change our sense of",
"Sleeper effect The sleeper effect is a psychological phenomenon that relates to persuasion. It is a delayed increase of the effect of a message that is accompanied by a discounting cue. The sleeper effect When people are exposed normally to a persuasive message (such as an engaging or persuasive television advertisement), their attitudes toward the advocacy of the message display a significant increase.\nOver time, however, their newly formed attitudes seem to gravitate back toward the opinion held prior to receiving the message, almost as if they were never exposed to the communication. This pattern of normal decay in attitudes",
"unexpected, or unlikely events cause more intense emotional reaction. Research suggests that people are unhappy with randomness and chaos and that they automatically think of ways to make sense of an event when it is surprising or unexpected. This is related to immune neglect in that when these unwanted acts of randomness occur people become upset and try to find meaning or to cope with the event. The way that people try to make sense of the situation can be considered a coping strategy made by the body. This idea differs from immune neglect due to the fact that this",
"negative external events temporarily increase or decrease feelings of SWB, but as time passes people tend to become habituated to their circumstances and have a tendency to return to a personal SWB \"setpoint\" or baseline level.\nThe hedonic treadmill theory originally proposed that most people return to a neutral level of SWB (i.e. neither happy nor unhappy) as they habituate to events. However, subsequent research has shown that for most people, the baseline level of SWB is at least mildly positive, as most people tend to report being at least somewhat happy in general and tend to experience positive mood when",
"region of the brain that is responsible for producing pleasure cognition. Since music-induced euphoria can occur without the sensation of tingling or piloerection, the authors of one review hypothesized that the emotional response to music during a frisson evokes a sympathetic response that is experienced as a tingling sensation."
] |
A teacake was launched into space, why didn't it burn up or melt on re-entry? | [
"Re entry is something that's only needed if you get into orbit. Orbit is when you're moving around the planet so fast that you're falling at the same speed the Earth's surface is curving away from you so you stay up there. That's why they still describe orbit as being in freefall. To do that you need to be going fast. Like multiple km per *second*.\n\nWhat that tea cake did was go straight up and straight back down again. Nowhere near as much speed involved. So you don't need to do the be-your-own-meteor re entry part to slow back down."
] | [
"being sucked into ventilation intakes in the capsule. In addition, a candy bar included in the food supply melted from high cabin temperatures (up to 102 °F). By the end of the second orbit, he informed Mercury Control that most of the food was a mess and he would avoid touching it for the rest of the flight aside from taking a xylose capsule.\nWith each orbit sunrise, Carpenter also saw the \"fireflies\", though he observed them to be more like snowflakes. He also noted that the particles did not seem to be truly luminous, and varied in size, brightness, and color.",
"reported that the explosion was caused by the liquid oxygen that is used as propellant turning so cold that it solidified and ignited with carbon composite helium vessels. Though not considered an unsuccessful flight, the rocket explosion sent the company into a four-month launch hiatus while it worked out what went wrong. SpaceX returned to flight in January 2017.\nOn 28 June 2019, SpaceX announced that it had lost contact with three of the 60 satellites making up the Starlink megaconstellation. The dysfunctional satellites' orbits are expected to slowly decay until they disintegrate in the atmosphere. However, the rate of failure",
"difficult. Few spectators knew that the bag was being filled with highly combustible hydrogen, the same gas implicated in the Hindenburg disaster. The safer alternative, helium, was not available to them as most of the world's supply was in Texas and the United States made use of most of the production.\nAt around 4:00 a.m. the gigantic balloon was filled with hydrogen. Without warning and from some undetermined cause, the stiff fabric went up in flames. According to witnesses, a spark appeared on the top of the bag and quickly enveloped the balloon. It burned very fast. Fortunately, the gondola",
"was burning. Blanchard began to descend rapidly, but the balloon, caught in the wind, continued to move off from the pleasure gardens even as it went down. Some spectators thought these events were part of the show and applauded and shouted their approval. The balloon had not risen very high and, although the escaping gas was burning, the gas within the balloon maintained sufficient lift for a while to prevent the craft plummeting directly to the ground. By rapidly shedding ballast Blanchard was able to slow the descent. Most reports say she appeared to be calm during the descent, but",
"burned up over the Indian Ocean or the Pacific Ocean depending on launch profile. The sealing action of the tank plumbing and lack of pressure relief systems on the external tank helped it break up in the lower atmosphere. After the foam burned away during re-entry, the heat caused a pressure buildup in the remaining liquid oxygen and hydrogen until the tank exploded. This ensured that any pieces that fell back to Earth were small. Ascent tracking The Shuttle was monitored throughout its ascent for short range tracking (10 seconds before liftoff through 57 seconds after), medium range (7",
"each day. Re-entry Before reentry, the spacecraft still carried about 7.51 tonnes of highly toxic hydrazine and nitrogen tetroxide on board. This was mostly fuel for the spacecraft's upper stage. These compounds, with melting points of 2 °C and −11.2 °C, are normally kept in liquid form and were expected to burn out during re-entry. NASA veteran James Oberg said the hydrazine and nitrogen tetroxide \"could freeze before ultimately entering\", thus contaminating the impact area. He also stated that if Fobos-Grunt is not salvaged, it may be the most dangerous object to fall from orbit. Meanwhile, the head of Roscosmos said the",
"if it had that the risk would be extremely small. These speculations have led many to believe that Operation Burnt Frost was in response to China's ASAT test on 11 January 2007 and to fear this would begin another “space race”.\nHowever, unnamed U.S. officials continued to deny that the shooting down of the satellite was in response to China's ASAT test one year prior, or that they were trying to protect classified satellite technology. To promote transparency, the U.S. delegation to the Committee on the Peaceful Uses of Outer Space stated that after the operation concluded, the special modifications made",
"installed in a spring-loaded wall fixture with a solder-based restraint. When the solder melted by high heat, the spring would either break the globe or launch it out of the bracket, allowing the extinguishing agent to be automatically dispersed into the fire. A well-known brand was the \"Red Comet,\" which was variously manufactured with other fire-fighting equipment in the Denver, Colorado area by the Red Comet Manufacturing Company from its founding in 1919 until manufacturing operations were closed in the early 1980s. Refrigerants Prior to the Montreal Protocol, large quantities of carbon tetrachloride were used to produce the",
"of a cornstarch-based powder on June 27, 2015, initiated the Formosa Fun Coast explosion in Taiwan, despite warnings on the packaging indicating that the material is flammable.",
"to fly for a few seconds before disintegrating due to aerodynamic forces. The capsule was thrown off and survived the explosion, transmitting data until it was destroyed on impact. Later it was revealed that the capsule could have landed intact if it had software to deploy its parachutes in case of a launch mishap. The problem was discovered to be a failed 2-foot-long steel strut purchased from a supplier to hold a helium pressure vessel that broke free due to the force of acceleration. This caused a breach and allowed high-pressure helium to escape into the low-pressure propellant tank, causing",
"that was with Orange was unable to locate the research pod which had been launched with the rocket. Although Orange was visible from Hawaii it was not the great spectacle Teak had been. The light from the blast was visible for about 5 minutes. The explosion had also been slightly obscured to the crew at Johnston Island by cloud coverage. The blast from Orange did not cause the large communication interruption that Teak had caused, but some commercial flights to Hawaii were said to have lost contact with air traffic controllers for a short period of time. Surface tests Of",
"descent due to the hydrogen gradually leaking away. After a while, the slow burning fuse would release a bung in a can of mineral oil; as the oil slowly dripped out, the balloon's payload would lighten, arresting its descent. The same slow-burning fuse was also used to release the balloon's weapon.\nThere were a number of payload designs designated: wire, beer, jelly, socks, lemon and jam. Wire About half of the Outward balloons carried the wire payload.\nIn the case of the wire payload, the slow burning fuse would burn through the cord that held the trailing wire. The trailing wire consisted",
"the Glatton led to the ignition of the magazine and then to the ignition of the cordite in it and so caused the explosion.\"\nAs a precaution, Gorgon's lagging was stripped out and replaced with silicate wool, revealing the real cause. Part of the cork was missing and folded newspapers were found in the empty space which were left there by the dockyard workers during construction. Furthermore, a number of rivets were entirely missing which meant that 0.5 inches (12.7 mm) holes were present, which could have allowed the hot ashes to ignite the newspapers. The forced-draught pressure in the boiler room",
"spectators. Flying missiles broke the legs of an adjacent sphere which later BLEVE'd. Three further spheres toppled due to the collapse of support legs which were not adequately fire protected. These vessels ruptured but did not explode. A number of petrol and crude oil tanks also caught fire. The conflagration took 48 hours to bring under control. This incident resulted in the deaths of 18 people, the injury of 81 and extensive damage to the site. The explosion During the 6AM to 2PM shift at the factory, workers were required to take a routine sample from each of the LPG",
"Oil Supervisor and Oil Lab were blamed early on even though they were not transferring fuel at the time. One Main Top Watch (a Boiler Technician) triggered the halon fire suppression system as he exited the space. Unfortunately the standard procedure was to wait 30 minutes after Halon had been triggered to re-enter the space. When the crew re entered the space was still hot and reignited the fire. Three explosions rocked the ship and the crew went into General Quarters. Amid explosions and extreme heat, volunteers from the crew entered enclosed spaces to extinguish the fires and preserve",
"of exploding cakes. “The exploding cake calls out for lightness, freedom, and the refusal of manipulation,” reads a line from the pair’s official description of the project. “It’s always nice to explode things,” Gissinger has said. “It’s somehow happy.”\nIn 2009, Gissinger won a Silver Medal from the Society of Publication Designers for photographs commissioned by Martha Stewart Living magazine. The title of the article was “Exemplary Eggs.”",
"and attempted to extinguish the flames, but suddenly the fire erupted violently, engulfing the \"spaceship,\" and he was forced to retreat as others on stage also began to flee. The fire grew and spread quickly and intensively as children, dancers, stagehands, and audience members fled towards the exits to escape the heat, smoke, and melting plastic. Within less than a minute, the entire set was engulfed in flames. Children were removed from the ferris wheel, which was a part of the scenery. The only one who failed to get out was Thamires. Leonilson, Xuxa's bodyguard, came back to remove her.\nThough",
"Mattingly, the crew transferred the samples Young and Duke had collected on the surface into the CSM for transfer to Earth. After transfers were completed, the crew would sleep before jettisoning the empty lunar module ascent stage the next day, when it was to be crashed intentionally into the lunar surface.\nThe next day, after final checks were completed, the expended LM ascent stage was jettisoned. Because of a failure by the crew to activate a certain switch in the LM before sealing it off, it initially tumbled after separation and did not execute the rocket burn necessary for the craft's",
"ignition sequence, due to a senior console operator manually triggering a cutoff in the countdown. It was later determined that the console operator, monitoring the hydrogen gas concentration in the Space Shuttle's aft compartment, where the three SSMEs are located, was fooled by the gas detector's purge cycle, which generated a dangerously high, but spurious, reading in the last seconds of the countdown. Special cargo In 2001, Coin World reported the revelation (via a FOIA document request) that the Mint had struck 39 examples of the 2000 Sacagawea dollar in gold in June 1999 at the West Point Mint.",
"rushed to her assistance and attempts were made to save her, she had either died instantly, from a broken neck, or at most ten minutes later.\nThe most likely cause of the accident seemed to be that the fireworks attached to her balloon had been knocked out of position by a tree as she ascended; possibly the balloon was heavily loaded and failed to rise quickly enough. When she had lit the fuses the fireworks headed towards the balloon instead of away from it; one of them burned a hole in the fabric, igniting the gas. One man reportedly spotted the",
"1 crew in a launch pad test spread so rapidly because the capsule was pressurized with pure O\n₂ but at slightly more than atmospheric pressure, instead of the ¹⁄₃ normal pressure that would be used in a mission.\nLiquid oxygen spills, if allowed to soak into organic matter, such as wood, petrochemicals, and asphalt can cause these materials to detonate unpredictably on subsequent mechanical impact.",
"at the time. Because of the delay in this process, meltdown progressed, depositing most of the melted fuel at the bottom of the reactor vessel.\nThe heat and pressure of the melting reactors, caused a reaction between the nuclear fuel metal cladding and the remaining water producing explosive hydrogen gas. As workers struggled to cool and shut down the reactors, several hydrogen-air chemical explosions occurred. Concerns about the repeated small explosions, the atmospheric venting of radioactive gasses, and the possibility of larger explosions led to a 20 km (12 mi)-radius evacuation around the plant. During the early days of the accident workers were",
"of chocolate at the end was broken off, the canvas detonator was pulled, and, after a delay of seven seconds, the bomb would explode.\nTo kill a member of the British royal family, the bar would have had to be smuggled into the residence by the saboteurs themselves or smuggled into a box that would have been taken into Buckingham Palace palace from an ordinary source. None of the saboteurs got close enough to London to carry out the Nazi plan. These ingenious objects got no further than four explosive cans of peas, which were found on German agents who landed",
"when the rocket briefly entered outer space in a four-minute suborbital flight before parachuting to earth, as planned, with the ashes still inside. The ashes were subsequently launched on a Falcon 1 rocket, on August 3, 2008, into what was intended to be a low Earth orbit; however, the rocket failed two minutes after launch. The rest of Doohan's ashes were scattered over Puget Sound in Washington. On May 22, 2012, a small urn containing some of Doohan's remains in ash form was flown into space aboard the Falcon 9 rocket as part of COTS Demo Flight 2. Legacy Scotty's",
"a smoke screen was created over Sand Island. Due to interest in Hawaii, it was announced on August 11 that there would be a nuclear test sometime between 10 PM and 6 AM.\nThe rocket carrying the warhead was launched at 11:27 from Johnston Island and traveled south. Like Teak, the flight lasted 3 minutes and was detonated at 11:30 PM about 41 kilometers (25 mi) south of Johnston Island at an altitude of about 43 kilometers (27 mi).The trajectory of Orange was a major success after the incident with Teak being detonated directly over the island. The recovery crew for the pod",
"stating the official cause as \"explosion (inflammation) of material soaked in liquid oxygen as a result of unauthorized actions of one of the members of the ground crew\". However, less than a year later on 23 July 1981 after a second disaster of the same cause was narrowly avoided it was discovered that a design flaw in the fuel filters of the rocket were likely the cause of the 1980 disaster, although it was impossible to confirm which type of filters were used in the rocket that exploded. The catalytically active lead solder on the filters would cause an explosion",
"gases streamed out of the joint in a visible blowtorch-like plume that burned into the external hydrogen tank. At about 73 seconds, the adjacent SRB strut gave way and the vehicle quickly disintegrated.\nInitially, Boisjoly was relieved when the flight lifted off, as his investigations had predicted that the SRB would explode before lift-off. However, seventy-three seconds later, he witnessed the shuttle disaster on television. Later career After President Ronald Reagan ordered a presidential commission to review the disaster, Boisjoly was one of the witnesses called. He gave accounts of how and why he felt the O-rings had failed, and argued",
"an explosion occurred and the oxygen from the cylinder ignited sending flames up to 15 feet (4.6 m) into the main operating theatre. The theatre was immediately evacuated due to the risk of the cylinder exploding but Thomas remained behind and went into the anaesthetic room to remove the bottle of ether stored there. She then attempted to close the valve on the oxygen cylinder and found it would close so she did so thus preventing any explosion.\nLater investigation concluded that the likely cause of the explosion was piece of grit in the valve which as the porter tightened the",
"bubbles in Aero bars to collapse due to the chocolate melting.\nIn August 1993, a factory worker at Nestlé UK's factory in York was injured by machinery used to produce mint-flavoured Aero bars. He had leaned into the chocolate mixer to clean excess chocolate from the sides, and then fell, and became caught in the paddles which started up automatically, causing severe injuries. Nestlé were later fined for failing to ensure worker safety by not isolating the power to the Aero mixer.\nIn 1997, Unilever sued Nestlé, stating that Nestlé infringed Unilever's patent for aerated chocolate ice cream products.\nIn 2004, three workers",
"power. The arcing caused one of the four liquefied petroleum gas bottles supplying the burners to rupture, and a fire subsequently started.\nTwo of the passengers jumped from the balloon to avoid the fire, falling ten metres to their deaths below. As the fire intensified, it caused the air inside the balloon to heat and force it to rise. Eventually, the conductor wire on the power line snapped, sending the balloon shooting upwards. The fire soon engulfed the whole balloon, and 150 metres in the air, the envelope disintegrated, causing the balloon to fall towards the ground, with the wreckage landing in"
] |
Why do most (if not all) ancient religion have a flood story? | [
"Humans, especially humans that are hunter-gatherers or pastoralists, tend to live near rivers; and peoples of these types tend to have very narrow horizons for what \"the whole world\" encompasses (limited primarily by the practicality of traveling long distances). That being the case, it should come as no surprise that \"the whole world flooding\" would be a common trope among diverse cultures' various folklore and mythology, without any such event having actually occurred on a *global* scale.",
"People tend to live around bodies of water for survival reasons. Land near bodies of water correlate quite a bit with land subject to flooding. Sooner or later a lot of people in most any civilization are going to find their houses under the water line for a bit.\n\nFlooding isn't necessarily bad, though. The Egyptians relied on flooding since time immemorial to renew their arable land and the flooding of the Nile took on a religious importance.",
"I read that the proto religions were influenced by the fact that a lot of people lived around the coasts and water ways, in addition when the ice dams began to break down 10,000 years ago massive amounts of water flooded into the seas raising sea levels by a decent amount suddenly which certainly would of been shocking, likely would of created tidal waves I assume. Factor in also the retreat of the massive ice sheets covering much of the north. It is easy how these factors -may- have influenced religions. \n\n_URL_0_",
"People forget that ancient people weren't scattered around the globe like we are today. A global flood is obviously impossible, but humans didn't know about the parts of the globe that they hadn't discovered. \n\nA huge flood could have wiped out a large portion of an ancient society. The survivors would have told that story... About the flooding of their whole world... And it would have been retold and altered and retold and altered... Until the story of a flood that destroyed a society was a global flood that destroyed everything.",
"Just for clarification, in Islam, it's local flood."
] | [
"a global flood actually occurred. Comparative mythology The flood myth originated in Mesopotamia. The Mesopotamian story has three distinct versions, the Sumerian Epic of Ziusudra, (the oldest, dating from about 1600 BCE), and as episodes in two Babylonian epics, those of Atrahasis and Gilgamesh. Summary Noah was a righteous man and walked with God. Seeing that the earth was corrupt and filled with violence, God instructed Noah to build an ark in which he, his sons, and their wives, together with male and female of all living creatures, would be saved from the waters. Noah entered the ark in his",
"flood tale \"point by point and in the same order\", even when the story permits other alternatives.\nThe earliest written flood myth is found in the Mesopotamian Epic of Atrahasis and Epic of Gilgamesh texts. The Encyclopædia Britannica says \"These mythologies are the source of such features of the biblical Flood story as the building and provisioning of the ark, its flotation, and the subsidence of the waters, as well as the part played by the human protagonist.\" The Encyclopedia Judaica adds that there is a strong suggestion that \"an intermediate agent was active. The people most likely to have fulfilled",
"happened at the dawn of history, they give the impression that the myths themselves must come from very primitive origins, but the myth of the global flood that destroys all life only begins to appear in the Old Babylonian period (20th–16th centuries BCE). The reasons for this emergence of the typical Mesopotamian flood myth may have been bound up with the specific circumstances of the end of the Third Dynasty of Ur around 2004 BCE and the restoration of order by the First Dynasty of Isin.\nThere are nine known versions of the Mesopotamian flood story, each more or less adapted",
"Sumerian version of the flood story (ETCSL 1.7.4), the causes of the flood are unclear because the portion of the tablet recording the beginning of the story has been destroyed. Somehow, a mortal known as Ziusudra manages to survive the flood, likely through the help of the god Enki. The tablet begins in the middle of the description of the flood. The flood lasts for seven days and seven nights before it subsides. Then, Utu, the god of the Sun, emerges. Ziusudra opens a window in the side of the boat and falls down prostrate before the god. Next, he",
"them life and the ability to bear children. Flood myth Cultures around the world tell stories about a great flood. In many cases, the flood leaves only one survivor or group of survivors. For example, both the Babylonian Epic of Gilgamesh and the Hebrew Bible tell of a global flood that wiped out humanity and of a man who saved the Earth's species by taking them aboard a boat. Similar stories of a single flood survivor appear in Hindu mythology as well as Greek, Norse mythology and Aztec mythology. Human cannibalism Human cannibalism features in the myths, folklore, and legends",
"Flood myth A flood myth or deluge myth is a narrative in which a great flood, usually sent by a deity or deities, destroys civilization, often in an act of divine retribution. Parallels are often drawn between the flood waters of these myths and the primaeval waters found in certain creation myths, as the flood waters are described as a measure for the cleansing of humanity, in preparation for rebirth. Most flood myths also contain a culture hero, who \"represents the human craving for life\".\nThe flood myth motif is found among many cultures as seen in the Mesopotamian flood stories,",
"for example). Many of the modern myths included obviously Christian references such as the murder of Abel by Cain as the reason. In Mesoamerican myth the flood was but one of several destructions of the creation — usually the first of three or four cataclysmic events, although there is some evidence that the Aztecs considered the flood to be the fourth.\nIn many Mesoamerican flood myths, especially recorded among the Nahua (Aztec), peoples tell that there were no survivors of the flood and creation had to start from scratch, while other accounts relate that current humans are descended from a small",
"a fish and warns the ancestor Manu about a coming flood. He tells Manu to put all the creatures of the earth into a boat. Unlike the Biblical and Mesopotamian floods, however, this flood is not a unique event brought on by a divine choice; instead, it's one of the destructions and recreations of the universe that happen at regular intervals in Hindu mythology. The Patriarchs The Patriarchs in Hebrew bible are Abraham, his son Isaac, and Isaac's son Jacob, also named Israel, the ancestor of the Israelites. These three figures are referred to collectively as the patriarchs of Judaism,",
"Great flood and procreation The Great Flood theme, in which a flood almost wipes out the entire human race followed by the procreation of a brother and sister pair to repopulate the earth, is a popular mythological theme in China. Chen Jianxian (1996) said that this theme was one of the more popular legends which was still being told by more than 40 ethnics in China. There is a possibility that the myth is newer than the other Chinese great flood mythologies, because the oldest recorded sources about this myth were from Six Dynasties, save that the oral tradition maybe",
"has been the inspiration for the flood mythology\" (Ryan and Pitman, 1998). The marine incursion, caused by the rising level of the Mediterranean, apparently occurred around 7,600 years ago. It remains an active subject of debate among geologists, with subsequent evidence discovered to both support and refute the existence of the flood, while the theory that it is the basis of later flood myths is not proven.\n \nPersian Gulf Flood (24,000 to 14,000 years ago, or 12000 to 10000 years ago)\nFlooding of this area scattered peoples to both sides of the gulf depression, it was an area fed by four",
"similar religious and cultural relevance to their religion. Much as Jews and Christians, ancient Sumerians divided the world between pre-flood and post-flood eras, the former being a time where the gods walked the earth and humans were immortal. After the flood, humans ceased to be immortal and the gods distanced themselves. The Biblical flood In the Christian Bible and Hebrew Torah, the antediluvian period begins with the Fall of the first man and woman, according to Genesis and ends with the destruction of all life on the earth except those saved with Noah in the ark (Noah and his wife,",
"Gilgamesh, the bustle of humanity disturbs the gods, who decide to send a flood. Warned by one of the gods, a man named Utnapishtim builds a boat and takes his family and animals inside. After the flood, Utnapishtim sends a dove, then a swallow, then a raven to check whether the waters have subsided. After exiting the boat, Utnapishtim offers a sacrifice to the gods, who smell \"the sweet savour\" and repent their choice to send the flood.\nAnother ancient flood myth is the Hindu story of Matsya the fish. According to this story, the god Vishnu takes the form of",
"every living thing but not its blood, and that God would never again destroy all life by a flood. The flood and the creation narrative The flood is a reversal and renewal of God's creation of the world. In Genesis 1 God separates the \"waters above the earth\" from those below so that dry land can appear as a home for living things, but in the flood story the \"windows of heaven\" and \"fountains of the deep\" are opened so that the world is returned to the watery chaos of the time before creation. Even the sequence of flood events",
"of watery chaos by flooding the Earth because of humanity's misdeeds and then remake it using the microcosm of Noah's ark. Thus, the flood was no ordinary overflow but a reversal of Creation. The narrative discusses the evil of mankind that moved God to destroy the world by the way of the flood, the preparation of the ark for certain animals, Noah, and his family, and God's guarantee (the Noahic Covenant) for the continued existence of life under the promise that he would never send another flood. After the flood After the flood, Noah offered burnt offerings to God, who",
"Smith translated the first Babylonian account of a great flood. Further discoveries produced several versions of the Mesopotamian flood myth, with the account closest to that in Genesis found in a 700 BC Babylonian copy of the Epic of Gilgamesh. The known versions of the Mesopotamian flood myths have as their protagonists Atrahasis (in the 18th century BC Atrahasis Epic), Ziusudra (in the 17th century BC Sumerian Flood Story), and Utnapishtim (in the 7th century BC Gilgamesh flood myth). The Sumerian King List relies on the flood motif to divide its history into preflood (antediluvian) and postflood periods. The preflood kings",
"360 BC, Timaeus describes a flood myth similar to the earlier versions. In it, the Bronze race of humans angers the high god Zeus with their constant warring. Zeus decides to punish humanity with a flood. The Titan Prometheus, who had created humans from clay, tells the secret plan to Deucalion, advising him to build an ark in order to be saved. After nine nights and days, the water starts receding and the ark lands on a mountain. Historicity A world-wide deluge, such as described in Genesis, is incompatible with modern scientific understanding of natural history, especially geology and paleontology.\n\nIn",
"destroyed by a flood, mauled by wild animals and smashed by their own tools and utensils. Maya flood myths recorded by Diego de Landa and in the Chilam Balam of Chumayel holds that the only survivors of the flood were the four Bacabs who took their places as upholders of the four corners of the sky.\nIn Mesoamerican myth a variety of reasons are given for the occurrence of the flood: either the world was simply very old and needed to be renewed; the humans had neglected their duty to adore the gods; or they were punished for a transgression (cannibalism,",
"the flood usually results from natural causes rather than \"universal punishment for human sin\". Another distinct motif of the myth of the Great Flood of China is an emphasis on the heroic and praiseworthy efforts to mitigate the disaster; flooding is alleviated by constructing dikes and dams (such as the efforts of Gun), digging canals (as devised by Yu the Great), widening or deepening existing channels, and teaching these skills to others.\nAnother key motif is the development of civilization and bettering the human situation despite the disaster of the deluge. During the course of fighting, surviving, and eventually getting the",
"Great Flood (China) The Great Flood of Gun-Yu (traditional Chinese: 鯀禹治水), also known as the Gun-Yu myth, was a major flood event in ancient China that allegedly continued for at least two generations, which resulted in great population displacements among other disasters, such as storms and famine. People left their homes to live on the high hills and mounts, or nest on the trees. According to mythological and historical sources, it is traditionally dated to the third millennium BCE, or about 2300-2200 BC, during the reign of Emperor Yao. \nHowever, archaeological evidence of an outburst flood on",
"Genesis flood narrative The Genesis flood narrative is a flood myth found in the Tanakh (chapters 6–9 in the Book of Genesis). The story tells of God's decision to return the Earth to its pre-creation state of watery chaos and then remake it in a reversal of creation. The narrative has very strong similarities to parts of the Epic of Gilgamesh which predates the Book of Genesis.\nA global flood as described in this myth is inconsistent with the physical findings of geology and paleontology. A branch of creationism known as flood geology is a pseudoscientific attempt to argue that such",
"the Lord, Lot's wife looked back at the city, and she became a pillar of salt.\nIn Abrahamic religions, Sodom and Gomorrah have become synonymous with impenitent sin, and their fall with a proverbial manifestation of divine retribution. Flood narrative The Genesis flood narrative has similarities to ancient flood stories told worldwide. One of the closest parallels is the Mesopotamian myth of a world flood, recorded in The Epic of Gilgamesh. In the Hebrew Bible flood story (Genesis 6:5-22), God decides to flood the world and start over, due to mankind's sinfulness. However, God sees that a man named Noah was",
"Flood Mythology of China The Flood Mythology of China, or Great Flood of China (Chinese: 大洪水; pinyin: Dà Hóngshuǐ; also known as Chinese: 洪水; pinyin: Hóngshuǐ) is a deluge theme which happened in China. Derk Bodde (1961) stated that \"from all mythological themes in ancient Chinese, the earliest and so far most pervasive is about flood.\" The mythology also has shared characteristics with other Great Floods all over the world, although it also has unique characteristics or different focuses. Lu Yilu (2002) groups all versions of great flood into three themes: \"the heroes controls the flood; \"brother-sister marriage to repopulating",
"history of the founding of both the Xia dynasty and the Zhou dynasty, it is also one of the main flood motifs in Chinese mythology, and it is a major source of allusion in Classical Chinese poetry. Overview The story of the Great Flood plays a dramatic role in Chinese mythology, and its various versions present a number of examples of the flood myth motif around the world. Flood narratives in Chinese mythology share certain common features, despite being somewhat lacking in internal consistency as well as incorporating various magical transformations and divine or semi-divine interventions like Nüwa. For example,",
"learn that the gods have decided to send a flood to destroy mankind. The god Enki (lord of the underworld sea of fresh water and Sumerian equivalent of Babylonian god Ea) warns Ziusudra, the ruler of Shuruppak, to build a large boat; the passage describing the directions for the boat is also lost. When the tablet resumes, it is describing the flood. A terrible storm raged for seven days, \"the huge boat had been tossed about on the great waters,\" then Utu (Sun) appears and Ziusudra opens a window, prostrates himself, and sacrifices an ox and a sheep. After another",
"to the Babylonian word for an oblong boat (ṭubbû), especially given that \"v\" and \"b\" are the same letter in Hebrew: bet (ב).\nHowever, the causes for God/gods having sent the flood differ. In the Hebrew myth the flood comes as God's judgment on a wicked humanity. In the Babylonian Epic of Gilgamesh, the reasons are not given and the flood appears to be the result of the caprice of the gods. In the Atrahasis version of the Babylonian flood story, the flood was sent by the gods to reduce human over-population, and after the flood, other measures were introduced to",
"Antediluvian The antediluvian (alternatively pre-diluvian or pre-flood period) is the time period referred to in the Bible between the fall of humans and the Genesis flood narrative in the biblical cosmology. The narrative takes up chapters 1–6 (excluding the flood narrative) of the Book of Genesis. The term found its way into early geology and science until the late Victorian era. Colloquially, the term is used to refer to any ancient and murky period. Precedents The Sumerian flood myth is the direct mythological antecessor to the biblical flood myth as well as other Near Eastern flood stories, and reflects a",
"authors suggest that this flood may have been the basis for the later myth, and contributed to the transition of cultures. They further argue that the timing is further evidence for the identification of the Xia with the Erlitou culture.\nHowever, no evidence of contemporaneous widespread flooding in the North China Plain has yet been found.",
"a seed of gourd or pumpkin or his own tooth and told them that there would be a great flood. All the humans perished except the brother and sister who hid themselves inside the gourd. To repopulate the earth, they married each other after receiving an \"agreement sign from the heaven\" (which is different depends on the sources). Some versions said that the sister gave birth to a gourd; both cut the gourd into pieces and each pieces became the ancestors of different tribes, and so on. There are other similar versions as written below.\nOnce upon a time, a farmer",
"lived) have been lost. In Wales the flood-myth is elaborated in the story of Dwyfan and Dwyfach, who saved people and animals from the great deluge caused by the monster Avanc living in Llyn Llion (possibly Bala Lake). Its Irish counterpart as told in the Lebor Gabála Érenn only links up with the Biblical story of Noah's flood.\nThe theme relates to the classical story of the warrior Marcus Curtius, who was said to have thrown himself in the Lacus Curtius near the Forum Romanum in order to stop a chasm made by the river Tiber. A similar story was told",
"mythical era before the great deluge.\nA Sumerian document known as the Instructions of Shuruppak, dated by Kramer to about 2600 BCE, refers in a later version to Ziusudra. Kramer stated Ziusudra had become a \"venerable figure in literary tradition\" by the 3rd millennium BCE. Legacy Other flood myths with many similarities to the Sumerian story are the story of the Dravida king Manu in the Matsya Purana, the Utnapishtim episode in the Epic of Gilgamesh and the Genesis flood narrative found in the Bible. The ancient Greeks have two similar myths from a later date: The Deucalion and Zeus' flooding"
] |
How do weather services calculate things like wind chill and "Real Feel?" | [
"To add on to IAmDanimal's comment:\n\nThe reason wind makes things colder is that moving air is better at heat transfer than still air. The magnitude of this effect is dependent on the temperature of the air and the speed at which the air is moving.",
"Wind Chill = 35.74 + 0.6215T – 35.75(V^0.16) + 0.4275T(V^0.16)\n\nT is the air temperature in degrees Fahrenheit, and V is the wind speed in miles per hour.\n\nFYI, that was less than a minute of Googling.\n\n'RealFeel' is Accuweather's own version of how they calculate what it 'feels like' outside. There is also a 'heat index', which is what other weather services use for the 'feels like' temperature. [Here](_URL_0_)'s a link to the formula."
] | [
"they are used to protect life and property. Forecasts based on temperature and precipitation are important to agriculture, and therefore to commodity traders within stock markets. Temperature forecasts are used by utility companies to estimate demand over coming days. On an everyday basis, people use weather forecasts to determine what to wear. Since outdoor activities are severely curtailed by heavy rain, snow, and wind chill, forecasts can be used to plan activities around these events, and to plan ahead and survive them. Aviation meteorology Aviation meteorology deals with the impact of weather on air traffic management. It is important for",
"aviation weather forecasts in both the terminal and en-route environment, marine safety, water and power management, off-shore oil drilling, construction industry and leisure industry. The strength of nowcasting lies in the fact that it provides location-specific forecasts of storm initiation, growth, movement and dissipation, which allows for specific preparation for a certain weather event by people in a specific location. Research The short term forecast is as old as weather forecasting itself. During the nineteenth century, the first modern meteorologists were using extrapolation methods for predicting the movement of low pressure systems and anticyclones on surface maps. The researchers subsequently",
"features that allow pilots in the area be better informed of weather at the airport. Both of them provide accurate and up-to-date weather information. There are three lighted wind socks that show wind directions and approximate speed. Also, an Automated Weather Observation System (AWOS) was installed in 2007 and records weather data such as “wind speed, wind gusts, wind direction, variable wind direction, temperature, dew point, altimeter setting, density altitude, visibility, variable visibility, precipitation, sky condition, and cloud height”. The AWOS data can be heard in an aircraft if the pilot tunes into 119.825 on the",
"the NWS winter weather watch/warning/outlook program. These forecasts are for the contiguous United States (CONUS) and issued from September 15 to May 15 each cold season. Graphical forecasts are issued twice daily at 0900 UTC and 2100 UTC (4AM/PM EST respectively), although updates may be warranted by rapidly changing conditions.\nThe Winter Weather Desk issues probabilistic heavy snow and icing guidance products for the next three days. The forecasts represent the probability that freezing rain or combined snow/sleet accumulations will meet specific criteria within a 24-hour period. These products are issued in probabilistic form to better represent the forecast",
"7 pm that evening through 7 am the following morning. So, in short, today's forecasted low is most likely tomorrow's low temperature. Specialist forecasting There are a number of sectors with their own specific needs for weather forecasts and specialist services are provided to these users. Air traffic Because the aviation industry is especially sensitive to the weather, accurate weather forecasting is essential. Fog or exceptionally low ceilings can prevent many aircraft from landing and taking off. Turbulence and icing are also significant in-flight hazards. Thunderstorms are a problem for all aircraft because of severe turbulence due to their updrafts and outflow",
"a particular country. Examples include the United Kingdom's Met Office which issues a \"seasonal forecast\". in May/June of the number of tropical storms for the upcoming Atlantic hurricane season, while the Philippine Atmospheric, Geophysical and Astronomical Service tries to predict how many tropical cyclones will move into its area of responsibility. United States National Oceanic and Atmospheric Administration In August 1998, the United States Climate Prediction Center in conjunction with the National Hurricane Center and the Hurricane Research Division issued a tropical cyclone outlook, which accurately predicted that there would be an above-normal number of tropical storms and hurricanes in",
"Kellerhals. They have a staff of 47, no revenues and annual expenditures of CHF 16 million. Federal Office of Meteorology and Climatology MeteoSwiss issues weather forecasts and warnings in the event of bad weather conditions. It gives information on the dangers to disaster protection units, the media and the general public. MeteoSwiss also operates telemetry ground stations, rainfall radars and remote sensing instruments at over 700 locations. Weather models use this data to calculate forecasts up to ten days in advance. As a federal office with an autonomous budget (\"FLAG office\"), MeteoSwiss sells customised forecasts to businesses and private individuals.",
"Transportation forecasting Transportation forecasting is the attempt of estimating the number of vehicles or people that will use a specific transportation facility in the future. For instance, a forecast may estimate the number of vehicles on a planned road or bridge, the ridership on a railway line, the number of passengers visiting an airport, or the number of ships calling on a seaport. Traffic forecasting begins with the collection of data on current traffic. This traffic data is combined with other known data, such as population, employment, trip rates, travel costs, etc., to develop a traffic demand model for the",
"special observations if weather conditions change rapidly and cross aviation operation thresholds. They generally report all the parameters of the AWOS-III, while also having the additional capabilities of reporting temperature and dew point in degrees Fahrenheit, present weather, icing, lightning, sea level pressure and precipitation accumulation.\nBesides serving aviation needs, ASOS serves as a primary climatological observing network in the United States, making up the first-order network of climate stations. Because of this, not every ASOS is located at an airport; for example, one of these units is located at Belvedere Castle in Central Park, New York City; another is located",
"forecasts are available for up to 5 days, while daily forecasts are available for up to 16 days. Searching The OpenWeatherMap geocoding system allows users to select cities by name, country, zip-code or geographic coordinates. It is possible to search by part of city name. To make searching result more accurate city name and country should be divided by comma. Maps OpenWeatherMap service provides lots of weather maps including Precipitation, Clouds, Pressure, Temperature, Wind and many others. Maps can be connected to mobile applications and web sites. Weather maps can be connected as layers to the wide range of maps",
"at the Blue Hill Observatory near Boston, Massachusetts. Automated Weather Sensor System (AWSS) The FAA has converted all Automated Weather Sensor System (AWSS) units to AWOS IIIP/T units. There are no AWSS systems remaining in the National Airspace System (NAS). Observing equipment Automated airport weather stations use a variety of sophisticated equipment to observe the weather. Wind speed and direction A majority of older automated airport weather stations are equipped with a mechanical wind vane and cup system to measure wind speed and direction. This system is simple in design: the wind spins three horizontally turned cups around the",
"the tropical weather season which runs from May 15 – November 30, the WPC has several other routine duties pertaining to tropical weather forecasting. Through 2008, WPC provided track forecast guidance to the NHC whenever there is a tropical cyclone in the Atlantic Ocean basin west of 60W longitude. As required, this guidance is provided to the NHC four times daily for use in the tropical cyclone package issued by the NHC at 0300 UTC, 0900 UTC, 1500 UTC and 2100 UTC. The WPC participates in the Hurricane Hotline call with the NHC and other forecast offices and government agencies",
"Low-level windshear alert system A low-level windshear alert system (LLWAS) measures average surface wind speed and direction using a network of remote sensor stations, situated near runways and along approach or departure corridors at an airport. Wind shear is the generic term for wind differences over an operationally short distance (in relation to flight) which encompass meteorological phenomena including gust fronts, microbursts, vertical shear, and derechos. Background LLWAS compares results over its operating area to determine whether calm, steady winds, wind shifts (in relation to runways), wind gusts, divergent winds, sustained divergent winds (indicative of shear), or strong and sustained",
"routine weather report while the international authority for the code form, the WMO, holds the definition to be aerodrome routine meteorological report. The National Oceanic and Atmospheric Administration (part of the United States Department of Commerce) and the United Kingdom's Met Office both employ the definition used by the FAA. METAR is also known as Meteorological Terminal Aviation Routine Weather Report or Meteorological Aerodrome Report. Origin METARs typically come from airports or permanent weather observation stations. Reports are generated once an hour or half-hour, but if conditions change significantly, a report known as a special (SPECI) may be issued. Some",
"or individual possessions; the local offices handle responsibility of composing and disseminating forecasts and weather alerts to areas within their region of service. Some of the products that are only issued by the WFOs are severe thunderstorm and tornado warnings, flood, flash flood, and winter weather watches and warnings, some aviation products, and local forecast grids. The forecasts issued by a WFO are available on their individual pages within the Weather.gov website, which can be accessed through either forecast landing pages (which identify the office that disseminates the weather data) or via the alert map featured on the main page",
"divergent winds (indicative of microbursts) are observed. A LLWAS master station polls each remote station every system cycle (nominally every ten seconds) and provides prevailing airport wind averages, runway specific winds, gusts, may set new wind shear alerts or microburst alerts and reset countdown timers of elapsed time since the last alert. By airline rules, pilots must avoid microbursts if warnings are issued by an automated wind shear detection system, and must wait until a safe time interval passes, to assure departure or landing conditions are safe for the performance of the airframe. Pilots may decide whether to land (or",
"to the weather forecasting mission and heritage that the agency prides itself in.",
"weather derivative evaluation. Typical terms for an HDD contract could be: for the November to March period, for each day when the daily mean temperature falls below a reference point (65 degrees Fahrenheit in the U.S., or, 18 degrees Celsius outside the U.S.), a cumulative count is kept of the daily departures from the reference temperature. Such an accumulation can be the basis for a derivative contract which might be structured as an option (call or put) or as a \"swap\" that is an agreement to pay or to receive payment. History The first weather derivative deal was in",
"THE HIGHEST HEAT INDEX READINGS WILL BE FELT BETWEEN 1 PM AND 6\n PM WEDNESDAY AND THURSDAY AFTERNOONS.\n\n* HEAT INDEX READINGS AROUND 110 DEGREES CAN BE A VERY DANGEROUS\n SITUATION IF PRECAUTIONS ARE NOT TAKEN. HEAT IS THE NUMBER ONE\n WEATHER KILLER. HEAT RELATED ILLNESSES ARE LIKELY IN THESE\n CONDITIONS FOR ALL PEOPLE WITH PROLONGED EXPOSURE TO THE HEAT.\n YOUNG CHILDREN...ELDERLY PEOPLE...THOSE WITH ILLNESSES OR HEART\n CONDITIONS...AND THOSE WHO WORK OUTDOORS ARE ESPECIALLY AT RISK.\n\nPRECAUTIONARY/PREPAREDNESS ACTIONS...\n\nAN EXCESSIVE HEAT WATCH MEANS THAT A PROLONGED PERIOD OF HOT\nTEMPERATURES IS EXPECTED. THE COMBINATION OF HOT TEMPERATURES AND\nHIGH",
"Weather ship A weather ship, or ocean station vessel, was a ship stationed in the ocean for surface and upper air meteorological observations for use in weather forecasting. They were primarily located in the north Atlantic and north Pacific oceans, reporting via radio. The vessels aided in search and rescue operations, supported transatlantic flights, acted as research platforms for oceanographers, monitored marine pollution, and aided weather forecasting by weather forecasters and in computerized atmospheric models. Research vessels remain heavily used in oceanography, including physical oceanography and the integration of meteorological and climatological data in Earth system science.\nThe idea of a",
"as weather station M (\"Mike\"), which was removed from operation on January 1, 2010. Weather observations from ships continue from a fleet of voluntary merchant vessels in routine commercial operation. Function The primary purpose of an ocean weather vessel was to take surface and upper air weather measurements, and report them via radio at the synoptic hours of 0000, 0600, 1200, and 1800 Universal Coordinated Time (UTC). Weather ships also reported observations from merchant vessels, which were reported by radio back to their country of origin using a code based on the 16-kilometer (9.9 mi) square in the ocean within which",
"the use of Numerical Weather Prediction products. The International desk routinely hosts visitors from Central and South America and the Caribbean. Visiting meteorologists train, and also generate forecasts for their own national centers, and assist WPC forecasters with QPF related to tropical cyclones in Central America and the Caribbean.",
"by coastal stations in various countries.\nIn the United States, fax weather products are prepared by a number of offices, branches, and agencies within the National Weather Service (NWS) of the National Oceanic and Atmospheric Administration (NOAA). \nTropical and hurricane products come from the Tropical Analysis and Forecast Branch, part of the Tropical Prediction Center/National Hurricane Center. They are broadcast over US Coast Guard communication stations NMG, in New Orleans, LA, and NMC, the Pacific master station on Point Reyes, CA. After Hurricane Katrina damaged NMG, the Boston Coast Guard station NMF added a limited schedule of tropical warning charts. NMG",
"National Weather Service Baltimore/Washington The National Weather Service Baltimore/Washington is a local office of the National Weather Service responsible for monitoring weather conditions in 44 counties in eastern West Virginia, northern and central Virginia, the majority of the state of Maryland, as well as the city of Washington, D.C. Although labeled as the NWS Baltimore/Washington, its actual location is off Old Ox Road (Virginia State Route 606) in the Dulles section of Sterling, Virginia, adjacent to Washington Dulles International Airport.\nThe NWS Baltimore/Washington currently employs about 25 people including meteorologists, support personnel, and management staff, working rotating shifts 24 hours a",
"such as ASOS, the FAA allows federal dollars to be used for the installation of certified weather stations at airports. The airport observations are then transmitted worldwide using the METAR observing code. METAR reports typically come from airports or permanent weather observation stations. Reports are generated once an hour; however, if conditions change significantly, they may be updated in special reports called SPECIs. Example of a METAR surface weather observation METAR LBBG 041600Z 12003MPS 090V150 1400 R04/P1500N R22/P1500U +SN BKN022 OVC050 M04/M07 Q1020 NOSIG 9949//91=\nPersonal weather stations, maintained by citizens rather than government officials, do not use METAR code. Software",
"ROFOR ROFOR is a format for reporting weather information. ROFOR is an abbreviation for \"Route Forecast\". As the name suggests is the weather forecast of the route of any aircraft which will be flying through the route. ROFOR contains various information regarding date and time of forecast, direction and speed of the wind, aerodrome icao code for which the forecast is made, cloud levels and freezing (Icing) levels, turbulence and vertical wind shear information. Example here is an example of ROFOR report:-\n\nROFOR 060300Z 0606/0612 KT VIDP 12580 2AC120 4CI300 7///180 403028 27010 405020 28015 407015 30020 410010 33025 523306 631209",
"the Midwest.\nIn the three days following the September 11 attacks on the World Trade Center in New York City, when no commercial aircraft flew in the United States, climate scientists measured the daily temperature range over 5000 weather stations across the USA. The results showed a 1 ° Celsius change in the average daily temperature range for those days of the year, thus showing contrails do have a significant impact on climate. Potential ways of reducing the impact of contrails on our climate include reducing the maximum cruising altitude of aircraft so high-altitude contrails can not form. Cruising at lower",
"National Weather Service operates a weather station at the airport, with a temperature gauge between the center and eastern runways. The airport has served as Seattle's official weather recording location since 1945. Highways The site of Sea–Tac was chosen partly due to its location along State Route 99, approximately midway between Seattle and Tacoma. Interstate 5 and Interstate 405 also converge near the airport, with an easy connection to the airport via State Route 518 and the Airport Expressway. State Route 509 runs to the west of the airport, connecting the area to West Seattle. The airport is the largest",
"The Shipping Forecast is produced by the Met Office and broadcast on BBC Radio 4, for those traversing the seas around the British Isles. Weather forecasting and warnings The Met Office issues Severe Weather Warnings for the United Kingdom through the National Severe Weather Warning Service (NSWWS). These warn of weather events that may affect transport infrastructure and endanger people's lives. In March 2008, the system was improved and a new stage of warning was introduced, the 'Advisory'.\nIn September 2015 the Met Office established a \"name our storms\" project, the aim is to provide a single authoritative naming system",
"Outside air temperature In aviation terminology, the outside air temperature (OAT) or static air temperature (SAT) refers to the temperature of the air around an aircraft, but unaffected by the passage of the aircraft through it. Aviation usage The outside air temperature is used in many calculations pertaining to flight planning, some of them being takeoff performance, density altitude, cruise performance and go-around performance. In most texts, the abbreviation, \"OAT\" is used."
] |
Why in American Sign Language is the R sign an X, and the X sign a lower case R to the person signing? | [
"R is a much more common letter than x. The sign for r is much easier or more fluid to make than the sign for x. (At least for me. My finger spelling is still pretty clumsy and slow.)"
] | [
"through movies, television, and the Internet.\nWhen asked about distinctive features of their signing, Black Deaf signers tended to identify a number of idioms borrowed from AAVE. Some were literal translations, such as I FEEL YOU or GIRL PLEASE, which are signed the standard way but have meanings different from their literal interpretation. Other loan words modified existing signs, such as STOP TRIPPING, which took the bent-v handshape of TRIP and moved it up to the head to indicate a new meaning of \"stop imagining things\".",
"that are often called sign ‘idioms’: are often just ordinary signs that are difficult to translate into English.\" When compared to the sign \"Succeed,\" which is made with two movements, the sign \"At last\" is one sharp movement and has historically been called an ASL idiom for the very reason of its non-translatability. But Battison purports that because the \"two signs are made differently (they) have different meanings...they are two separate signs.\" By \"misusing\" the term idiom in application to American Sign Language, the result is an \"obscure\" understanding of how \"the language really works and it make(s)",
"linking r, that is, /r/ at the end of a word is deleted even when the following word starts with a vowel, so that \"Mister Adams\" is pronounced [mɪstə(ʔ)ˈædəmz]. In a few such accents, intervocalic /r/ is deleted before an unstressed syllable even within a word when the following syllable begins with a vowel. In such accents, pronunciations like [kæəˈlaːnə] for Carolina, or [bɛːˈʌp] for \"bear up\" are heard. This pronunciation also occurs in AAE. This also occurred for many older non-rhotic Southern speakers.\nTypically, even non-rhotic modern varieties of American English do pronounce the /r/ in /ɜr/ (as in",
"them. On its own this sign means 'person'; in a compound sign following a verb, it is a suffix for the performer of the action, as in 'drive-er' and 'teach-er'. However, it cannot generally be used to translate English '-er', as it is used with a much more limited set of verbs. It is very similar to the '-ulo' suffix in Esperanto, meaning 'person' by itself and '-related person' when combined with other words.\nAn ASL prefix, (touching the chin), is used with number signs to indicate 'years old'. The prefix completely assimilates with the initial handshape of the number. For",
"such as pronouns, determiners, plain verbs, and nouns, tend to be less likely to be produced outside the typical signing space. The selection of two-handed signs over one-handed signs was found to have systematic constraints on their production. When the sign could be produced with one or two hands, Black signers often produced the variant that matched the handedness of the following sign; if the following sign was two-handed, they were more likely to produce a two-handed variant, while if the following sign was one-handed, they were more likely to produce the one-handed variant. The use of innovative one-handed forms,",
"sign is the last in a sequence of single-digit integers where quantities of fingers denote the numbers 1 through 5, and then the thumb touches each finger in turn to denote 6 (pinky finger), 7 (ring finger), 8 (middle finger), and finally 9 (index finger). When shaken from left to right the sign for the number 9 becomes the number 19.\nIn Plains Indian Sign Language the gesture signifies the number 3 when held a bit lower than the signs used to represent the sun. Regional forms of finger counting used in China also employ the raised middle, ring and pinky",
"sign variants, while signs produced at the head cause signers to favor non-lowered forms. Syntax Unlike ASL, BASL allows for the frequent use of syntactic repetition. In a study conducted by McCaskill, of 26 signers (13 Black and 13 White), Black signers had 57 instances of repetition compared to 19 from White signers, and of those 19 instances, 18 were made by a single signer. The use of repetition by BASL signers is considered to be pragmatic rather than as a way to clarify meaning.\nA study in 2004 by Melanie Metzger and Susan Mather found that Black male signers used",
"modern-day American Sign Language (ASL) the gesture can mean many different things depending on how it is applied. The pinching action of the thumb-and-forefinger frequently represents something small. For example, the sign for \"housefly\" is made by making the gesture mimic a fly buzzing around. In ASL the gesture can also communicate a selection of some sort: When moved from one side to the other as if picking something up and placing it down, it means \"appoint\". When the joined thumb and forefinger of the gesture are placed into a hole made by the opposite hand, it means \"vote\". The",
"location phonemes. Locations in American Sign Language American Sign Language uses 12 locations excluding the hands themselves: the whole face/head; the forehead or brow; the eyes or nose; the mouth or chin; the temple, cheek or ear (side of the head); the neck; the trunk (shoulders to waist); the upper arm; the elbow or forearm, the back of the wrist, and the inside of the wrist. In addition, in asymmetric two-handed signs, the dominant hand makes contact with the non-dominant hand, which then serves as the location of the sign. A sign may also be articulated in neutral space, which",
"V sign The V sign is a hand gesture in which the index and middle fingers are raised and parted to make a V shape while the other fingers are clenched. It has various meanings, depending on the circumstances and how it is presented.\nWhen displayed with the palm inward toward the signer, it has been an offensive gesture in some Commonwealth nations since at least 1900. The more widespread use as a victory sign (\"V for Victory\"), with the back of the hand toward the signer (U+270C ✌ VICTORY HAND in Unicode), was introduced in January 1941 as part of",
"use of initials with base signs to distinguish from English synonyms. SEE-II is available in books and other materials. SEE-II includes roughly 4,000 signs, 70 of which are common word endings or markers. In comparison to Signed English, SEE-II involves more advanced motoric and cognitive functions. Handshapes Handshapes are one of the four components of a sign and convey a large amount of information about each sign. The two types of signs are static and dynamic. Dynamic signs involve hand movement and the handshape can remain the same or can change from one handshape to another. Usually only the handshapes",
"Africa and some of the Middle Eastern countries including Iraq and Iran where the sign is equivalent to giving the middle finger.\nIn Germany, France, and Hungary, the gesture can simply indicate the number one, in the right context.\nThe thumbs up gesture is used on the logo of Thums Up, a popular brand of cola from India. Starting in 2007, the thumbs-up also appeared on India's one-rupee coin.\nIn the United States, American Sign Language users use a single thumb up tilted slightly and rapidly left and right to indicate the number ten (10). When held stationary and thrust toward another person",
"not signing word endings and \"function words\", most likely because they slow down the pace and distort the phrasing of the teacher's natural speech. The result is a kind of \"Pidgin Sign English\" which lacks the grammatical complexity of both English and American Sign Language. Major approaches There have been many different approaches to manually coding oral languages. Some consist of fingerspelling everything, a technique sometimes known in English as the \"Rochester method\" after Rochester School for the Deaf in New York where it was used from 1878 until the 1940s. While most MCLs are slower than spoken or sign",
"and even what stage a relationship is in. Background Origination of the term \"tie sign\" has been attributed to Desmond Morris, an English zoologist and author, by at least one source. However, Erving Goffman is also credited with employing the term in 1959, almost two decades earlier. Usage Nearly anything can be a tie sign, whether it is an action or an object, depending on the context in which it is observed. The majority of the time, the term tie sign is directed toward relational couples, but it can also apply to groups like families and friends. Additionally, \"name-dropping\" is",
"for different purposes. It may be used to represent words from an oral language which have no sign equivalent, or for emphasis, clarification, or when teaching or learning a sign language.\nIn American Sign Language (ASL), more lexical items are fingerspelled in casual conversation than in formal or narrative signing. Different sign language speech communities use fingerspelling to a greater or lesser degree. At the high end of the scale, fingerspelling makes up about 8.7% of casual signing in ASL, and 10% of casual signing in Auslan. The proportion is higher in older signers, suggesting that the use of fingerspelling has",
"right.\nIn \"home position\", the fingers of the left hand rest along the gap between the two main rows of keys to the left of the asterisk (little finger on the \"S\" to forefinger on the \"H\" and \"R\"). These fingers are used to generate initial consonants. The fingers of the right hand lie in the corresponding position to the right of the asterisk (forefinger on \"FR\" to little finger on \"TS\"), and are used for final consonants. The thumbs produce the vowels.\nThe system is roughly phonetic; for example the word cat would be written by a single stroke expressing the",
"one person with the name sign in the local community. If a person moves to a new community where someone already has their name sign, then the newcomer is obligated to modify theirs. This is usually accomplished by compounding the hand shape, so that the first tap of the sign takes the initial of the person's first English name, and the second tap takes the initial of their last name. There are potentially thousands of such compound-initial signs.\nDescriptive name signs are not initialized, but rather use ASL classifiers. They tend to be assigned and used by",
"hold). ALIKE is signed by holding two 1 hands parallel, pointing outward, and bringing them together two or three times. The compound/blend AGREE starts as THINK ends: with the index finger touching the forehead (the final hold of that sign). In addition, the weak hand is already in place, in anticipation of the next part of the sign. Then the hand at the forehead is brought down parallel to the weak hand; it approaches but does not make actual contact, and there is no repetition. Affixes ASL, like other mature signed languages, makes extensive use of morphology. Many of ASL's",
"\"-a\" rather than \"-er\") is found in names containing a pronounced \"r\", e.g., \"Darren\", \"Barry\", etc. where in addition to the \"-er\", the \"r\"-sound is replaced by a \"zz\" so one gets \"Dazza\" from \"Darren\", \"Bazza\" from \"Barry\". Test Match Special The \"-er\" form was famously used on BBC radio's Test Match Special by Brian Johnston (1912–94), ex-Eton and New College, Oxford, who bestowed nicknames on his fellow commentators on test cricket: thus, Blowers for Henry Blofeld (who was known in Australia as \"Blofly\"), Aggers (Jonathan Agnew), Bearders (scorer Bill Frindall, known also as \"the Bearded Wonder\") and McGillers (Alan",
"right is the stop symbol (followed by a 2-unit bar), and reading the stop pattern right to left is the reverse stop symbol (followed by a 2-unit bar). Using FNC4 to encode high (128–255) characters The special symbol FNC4 (\"Function 4\"), present only in code sets A and B, can be used to encode all the Latin-1 (ISO-8859-1) characters in a Code 128 barcode. The feature is not widely supported and is not used in GS128. When a single FNC4 is present in a string, the following symbol is converted to ASCII as usual, and then 128 is",
"sign for \"elect\" is formed by making the signs for \"vote\" and \"appoint\" in succession. Fingerspelling In deaf culture, the sign of joined thumb and forefinger takes on various letters in different systems of fingerspelling. The American manual alphabet reserves it for the letter F, while in both Irish and French Sign Language it is the letter G. In fingerspellings that represent Cyrillic alphabetical systems, such as the Ukrainian manual alphabet, the gesture represents the vowel O and reflects that letter's shape. Similarly, the Korean manual alphabet uses the gesture for the Hangul letter \"ㅇ\", romanized as \"ng\" to reflect",
"(ⱱ) because the signs are similar.",
"'A' was moved from its normal position on the right (the natural position matching the handwriting of a right-handed writer) to the left, making a letter that seems to have been drawn the wrong way round. Writing for Print magazine, Paul Shaw described it as \"one of the most bizarre slab serif types of the 19th century.\" Barnes and Schwartz describe it as \"perverse [but] done with sureness and confidence.\"\nWithin a few years of their introduction the printer and social reformer Thomas Curson Hansard had described them as \"typographic monstrosities\":\nFashion and Fancy commonly frolic from one extreme to another. To",
"uses hands in his artwork to show how certain signs visually represent their meaning. Hands in chains or shackles can also represent the artist's struggles with being prohibited from signing in school or at home. \"Ameslan Prohibited\" This illustration by Betty G. Miller, which can be viewed here, is an example of resistance De'VIA. Ameslan is an old acronym for American Sign Language, which references the first few letters of each word: Ame(rican) S(ign) Lan(guage). The title references the act of not allowing Deaf people to sign. Through the shackling of hands, it conveys the message that denying Deaf people",
"Voiceless retroflex stop Transcription The symbol that represents this sound in the International Phonetic Alphabet is ⟨ʈ⟩. Like all the retroflex consonants, the IPA symbol is formed by adding a rightward-pointing hook extending from the bottom of tee (the letter used for the equivalent alveolar consonant). In many fonts lowercase tee already has a rightward-pointing hook, but ⟨ʈ⟩ is distinguished from ⟨t⟩ by extending the hook below the baseline.",
"active [the 'dominant' or 'strong' hand] and one hand is held static [the 'non-dominant' or 'weak' hand]). The non-dominant hand in asymmetric signs often functions as the location of the sign. Almost all simple signs in ASL are monosyllabic. Phonemes and features Signs consist of units smaller than the sign. These are often subdivided into parameters: handshapes with a particular orientation, that may perform some type of movement, in a particular location on the body or in the \"signing space\", and non-manual signals. These may include movement of the eyebrows, the cheeks, the nose, the head, the torso, and the",
"compared to the dominant, moving hand. Additionally, it is common for one hand in a two-handed sign to be dropped during informal conversations, a process referred to as weak drop.\nJust like words in spoken languages, coarticulation may cause signs to influence each other's form. Examples include the handshapes of neighboring signs becoming more similar to each other (assimilation) or weak drop (an instance of deletion).\nNative signers do not look at their conversation partner's hands. Instead, their eye gaze is fixated on the face. Because peripheral vision is not as focused as the center of the visual field, signs articulated near",
"is facing toward the person giving the sign, has long been an insulting gesture in England, and later in the rest of the United Kingdom, Ireland, Australia, South Africa, India, Pakistan and New Zealand. It is frequently used to signify defiance (especially to authority), contempt, or derision.\nAs an example of the V sign (palm inward) as an insult, on 1 November 1990, The Sun, a British tabloid, ran an article on its front page with the headline \"Up Yours, Delors\" next to a large hand making a V sign protruding from a Union Jack cuff. The Sun urged its readers",
"possessive pronoun, and an extended-thumb 'A' handshape is a reflexive pronoun; these may be combined with numeral signs to sign 'you two', 'us three', 'all of them', etc.\nIf the referent is not physically present, the speaker identifies the referent and then points to a location (the locus) in the sign space near their body. This locus can then be pointed at to refer to the referent. Theoretically, any number of loci may be set up, as long as the signer and recipient remember them all, but in practice, no more than eight loci are used.\nMeier 1990 demonstrates that only two",
"ask for it when at an espresso bar. Some sources state that expresso is an incorrect spelling, including Garner's Modern American Usage.\nWhile the 'expresso' spelling is recognized as mainstream usage in some American dictionaries, some cooking websites call the 'x' variant illegitimate. Oxford Dictionaries online states \"The spelling \"expresso\" is not used in the original Italian and is strictly incorrect, although it is common.\" The Oxford English Dictionary and Merriam-Webster call it a variant spelling. The Online Etymology Dictionary calls \"expresso\" a variant of \"espresso\". The Oxford Dictionary of American Usage and Style (2000) describes the spelling expresso as \"wrong\","
] |
Can someone explain what a self sustaining economy is? | [
"It's an economy that sustains its members without trading with other economies."
] | [
"Sustainable capitalism Sustainable capitalism is a conceptual form of capitalism based upon sustainable practices that seek to preserve humanity and the planet, while reducing externalities and bearing a resemblance of capitalist economic policy. A capitalistic economy must expand to survive and find new markets to support this expansion. Capitalist systems are often thought to be destructive to the environment as well as certain individuals without access to proper representation. However, sustainability provides quite the opposite; it implies not only a continuation, but a replenishing of resources. Sustainability is often thought of to be related to environmentalism, and sustainable capitalism",
"Sustainability organization Definition A sustainable system generally can be defined in environmental terminology as \"a living system which operates in a way that it does not use up resources more quickly than they can be naturally replenished; a sustainable economic system operates in a way so that expenditures are either equal or less than the income.\" Sustainable social systems maintain that all members are allowed to contribute, thereby synthesizing the final product. Corporate sustainability Corporate Sustainability refers to \"a company’s activities, voluntary by definition, demonstrating the inclusion of social and environmental concerns in business operations and in interactions",
"and ethical consumerism. Ways of living more sustainably can take many forms from reorganizing living conditions (e.g., ecovillages, eco-municipalities and sustainable cities), reappraising economic sectors (permaculture, green building, sustainable agriculture), or work practices (sustainable architecture), using science to develop new technologies (green technologies, renewable energy and sustainable fission and fusion power), or designing systems in a flexible and reversible manner, and adjusting individual lifestyles that conserve natural resources.\n\"The term 'sustainability' should be viewed as humanity's target goal of human-ecosystem equilibrium (homeostasis), while 'sustainable development' refers to the holistic approach and temporal processes that lead us to the end point of",
"and in many instances improves the socio-economic standing of its citizens through equity planning during the strategic economic development process. Fourth-wave economic development This wave is also called sustainable economic development, and includes strategies that enhance environmental quality and self-sufficiency. In this context, sustainability refers to the process economic developers employ to determine a balanced approach to development that take into consideration \"a full range of economic, environmental, and social characteristics that together comprise 'community,'\" or development that conciliates historically conflicting stakes: promotion of the economy, equitable distribution of economic growth, and the preservation of the natural environment. Fifth-wave economic",
"Workers' self-management Economic theory An economic system consisting of self-managed enterprises is sometimes referred to as a participatory economy, self-managed economy, or cooperative economy. This economic model is a major version of market socialism and decentralized planned economy, stemming from the notion that people should be able to participate in making the decisions that affect their well-being. The major proponents of self-managed market socialism in the 20th century include the economists Benjamin Ward, Jaroslav Vanek and Branko Horvat. The Ward–Vanek model of self-management involves the diffusion of entrepreneurial roles amongst all the partners of the enterprise.\nBranko Horvat notes that participation",
"resources, will continue to decline and will limit monetary capital success, lifting the value of natural resources and replacing the definition of prosperity. He proposes that sustainable capitalism would institute policies and regulations to protect natural resources in addition to investing back into the environment in attempt to reverse the degradation. Social aspects Social aspects of sustainable capitalism involve a positive reception toward climate change. Author Mohan Munasinghe explains that two specific ways that humans can respond to climate change are through adaptation and mitigation. First, adaptation is aimed at reducing the vulnerability of human and natural systems in the",
"will benefit current generations and future generations.\nSustainable management is needed because it is an important part of the ability to successfully maintain the quality of life on our planet. Sustainable management can be applied to all aspects of our lives. For example, the practices of a business should be sustainable if they wish to stay in businesses, because if the business is unsustainable, then by the definition of sustainability they will cease to be able to be in competition. Communities are in a need of sustainable management, because if the community is to prosper, then the management must",
"America's Independent Businesses (2006). Carbohydrate economy ILSR researches and analyzes the consequences of converting from an economy based on petrochemicals and industrial materials to a carbohydrate-based economy, based on plant matter materials. Their current focus is on the creation of a bioplastics future. Waste to Wealth Wa Foundation has said of ILSR, \"Removing citizens and neighborhoods from a dependent relationship on government is a conservative cause. But involving and empowering ordinary citizens in the decisions that affect their commonwealth is part of the classic liberal agenda. Thus, ILSR has remained important and respected regardless of the political and philosophical winds",
"Civilizing the Economy Reception and Reviews Noted business leader in sustainability, Ray Anderson wrote of the work:\nAs we humans puzzle our way to an understanding of how to live sustainably within Earth’s carrying capacity, Marvin Brown has provided a crucial piece of the puzzle. Civilizing the Economy is an important book because it expresses a keystone idea of the new economic system that must evolve if our species is to survive and live up to its potential.\nGeorges Enderle, John T. Ryan, Jr. Professor of International Business Ethics at Mendoza College of Business, University of Notre Dame, made the following comment",
"and products each day. By applying life cycle thinking, businesses can recognize the potential impacts of their choices. They consider how each design and manufacturing decision has an effect on the environment and how they can make it more sustainable. Businesses not only take into consideration how the product is made, but also how the product will be used and disposed of by the user. Companies try to have a more sustainable product by making products recyclable or reusable. They challenging part is balancing cost and sustainable choices. Life cycle thinking allows them to see",
"business's existence is to turn a profit. The profit motive functions according to rational choice theory, or the theory that individuals tend to pursue what is in their own best interests. Accordingly, businesses seek to benefit themselves and/or their shareholders by maximizing profit.\nIn capitalist theoretics, the profit motive is said to ensure that resources are being allocated efficiently. For instance, Austrian economist Henry Hazlitt explains: \"If there is no profit in making an article, it is a sign that the labor and capital devoted to its production are misdirected: the value of the resources that must be used up in",
"networks of such firms may prove essential to move beyond the problem of \"economic democracy in one firm.\"\nEconomic reconstruction also extends to the ways in which housing or communities and media are organized. By reducing dependency on the automobile, by linking work and residence, we can limit the problems creating by congestion, pollution and commuting (particularly those problems based on petroleum based automobile transportation.\nSome may argue that economic reconstruction can be reduced to socialism or economic democracy itself or perhaps principles found in various anarchist or radical writings. The problem, however, is that many of these plans lack",
"Regenerative economic theory Regenerative economics is an economic system that works to regenerate capital assets. A capital asset is an asset that provides goods and/or services that are required for, or contribute to, our well being. In standard economic theory, one can either “regenerate” one's capital assets or consume them until the point where the asset cannot produce a viable stream of goods and/or services. What sets regenerative economics apart from standard economic theory is that it takes into account and gives hard economic value to the principal or original capital assets — the earth and the sun. We cannot",
"maintains companies don't hire when they have an abundance of profits; they hire when they have an abundance of customers.\nThe middle-out economic framework is rooted in the scientific fact that economies are complex adaptive and eco-systemic. Economies are characterized by the same ‘circle of life’ like feedback loops found in natural eco-systems. Middle-out economics claims a fundamental law of capitalism must be “if workers have no money then businesses have no customers”. In this sense, it claims that the true “job creators” in a capitalistic economy are customers and not rich business people. It maintains that",
"They provide the foundations of markets by efficiently assigning, protecting, and altering property rights; securing contracts; and motivating specialization and exchange. Good institutions also encourage production by fostering saving, investment in human and physical capital, and development and adoption of useful knowledge. They maintain a sustainable rate of population growth and foster welfare-enhancing peace; the joint mobilization of resources; and beneficial policies, such as the provision of public goods. The quality of these institutional foundations of the economy and the polity is paramount in determining a society’s welfare. This is the case because individuals do not always recognize what will",
"management and transitions management. among others. Sustainability Sustainability in environmental resource management involves managing economic, social, and ecological systems both within and outside an organizational entity so it can sustain itself and the system it exists in. In context, sustainability implies that rather than competing for endless growth on a finite planet, development improves quality of life without necessarily consuming more resources. Sustainably managing environmental resources requires organizational change that instills sustainability values that portrays these values outwardly from all levels and reinforces them to surrounding stakeholders. The end result should be a symbiotic relationship between the sustaining organization, community,",
"Sustainable management Sustainable management takes the concepts from sustainability and synthesizes them with the concepts of management. Sustainability has three branches: the environment, the needs of present and future generations, and the economy. Using these branches, it creates the ability of a system to thrive by maintaining economic viability and also nourishing the needs of the present and future generations by limiting resource depletion. From this definition, sustainable management has been created to be defined as the application of sustainable practices in the categories of businesses, agriculture, society, environment, and personal life by managing them in a way that",
"Sustainable national income History The original concept of ´sustainability´ refers to an equilibrium relation between human activities and their physical surroundings and has a long tradition going back to the nineteenth century. The sustainable national income is based on a definition of sustainability in conformity with this. The original concept of sustainability is introduced in the international discussion by 1980 publication of “The World Conservation Strategy” of 1980\nSince the publication of “Our Common Future” in 1987 one has started to include in sustainability besides a sustainable use of the physical surroundings also elements that conflict with this, such as the",
"development.\nRegenerative design is interconnected with the approaches of systems thinking and with New Economy movement. The 'new economy' considers that the current economic system needs to be restructured. The theory is based on the assumption that people and the planet should come first, and that it is human well-being, not economic growth, which should be prioritized.\nWhereas the highest aim of sustainable development is to satisfy fundamental human needs today without compromising the possibility of future generations to satisfy theirs, the goal of regenerative design is to develop restorative systems that are dynamic and emergent, and are beneficial for humans and",
"completely located within society and society completely located within the environment. In other words, the economy is a subset of society and society is completely dependent upon the environment. This interdependence means that any sustainability-related issue must be considered holistically. \nOther inadequacies of the paradigm include the difficulties in measuring savings rates and the inherent problems in quantifying the many different attributes and functions of the biophysical world in monetary terms. By including all human and biophysical resources under the same heading of ‘capital’, the depleting of fossil fuels, reduction of biodiversity and so forth, are potentially compatible with sustainability.",
"applies sustainable principles to economic governance and social aspects of capitalism as well.\nThe importance of sustainable capitalism has been more recently recognized, but the concept is not new. Changes to the current economic model would have heavy social environmental and economic implications and require the efforts of individuals, as well as compliance of local, state and federal governments. Controversy surrounds the concept as it requires an increase in sustainable practices and a marked decrease in current consumptive behaviors.\nThis is a concept of capitalism described in Al Gore and David Blood’s manifesto for the Generation Investment Management to describe a long-term",
"economy', first articulated by Neva Goodwin and subsequently developed by Edgar S. Cahn, is helpful in explaining this further.\nThe core economy is made up of all the resources embedded in people's everyday lives – time, energy, wisdom, experience, knowledge and skills – and the relationships between them – love, empathy, watchfulness, care, reciprocity, teaching and learning. Similar to the role played by the operating system of a computer, the core economy is the basic, yet essential, platform upon which 'specialist programmes' in society, the market economy and public services run. Our specialised services dealing with crime, education, care, health and",
"considered the bedrock of society, which he felt were eroding as monetary economies de-legitimized them. The core economy as he defined it consists of social capital, and generates collective efficacy that's of critical importance to the core economy.\nCollective efficacy refers to the effectiveness of informal mechanisms by which residents themselves achieve public order. More specifically, this is the shared vision or fusion of shared willingness of residents to intervene and create social trust (the sense of engagement and ownership of public spaces), intervening in the lives of other residents to counter crime, increase voting, or encourage residents to recycle. These",
"political, economic and social structure which would mitigate current threats to the planet and society. According to their manifesto, sustainable capitalism would integrate the environmental, social and governance (ESG) aspects into risk assessment in attempt to limit externalities. Most of the ideas they list are related to economic changes, and social aspects, but strikingly few are explicitly related to any environmental policy change. Environmental aspects As explained by Bruce Ledewitz, sustainable capitalism is the adoption and development of sustainable practices that protect natural resources, instead of spending it as capital. Ledewitz claims that in traditional capitalism, “natural capital,” meaning natural",
"lacking any directive and continuity, are responsible for [the weakening of national economy].\n[...] An economic plan does not at all imply the suppression or even a narrowing of private initiative in the economic life. An economic plan means containing and applying discipline to individual economic forces while maintaining the role of private initiative. An economic plan means coordinating the efforts of individual economic organizations and empowering them, through association and the systematic contribution of the state as the true representative of the national community.\"",
"economic outcomes. From this perspective, modern-day capitalism can be seen as the practice of monocapitalism: the pursuit of growth in only one type of capital (economic), very often at the expense of all others (e.g., natural, human, social, constructed and intellectual).\nUnder the multicapitalistic view of things, an organization's performance is entirely positive if and only if its impacts on all vital capitals (i.e., ones that have been determined to be material to itself, its operations and its stakeholders) are sustainable. And once again, to be sustainable an organization's impacts on vital capitals must be in full compliance with",
"Sustainable living Sustainable living describes a lifestyle that attempts to reduce an individual's or society's use of the Earth's natural resources, and one's personal resources. It is often called as \"earth harmony living\" or \"net zero living\". Its practitioners often attempt to reduce their ecological footprint (including their carbon footprint) by altering their methods of transportation, energy consumption, and/or diet. Its proponents aim to conduct their lives in ways that are consistent with sustainability, naturally balanced, and respectful of humanity's symbiotic relationship with the Earth's natural ecology. The practice and general philosophy of ecological living closely follows the overall principles",
"to accumulate assets and have greater control over their livelihoods. Asset-based policies may be of use to households which depend on their own assets for their livelihood. To avoid inequality, the policies need to focus on creating an asset base for the poor. In order for the individuals, especially the poor, to have access to assets, it becomes necessary to broaden interest in public policies, public investments and public intervention. To be successful, an asset-based policy should overcome challenges such as initial inequality, unorganized sectors of the economy, imbalance in asset building and inadequate state effectiveness.\nTo have a sustainable development",
"economics, ecology, politics and culture. In the first conception, sustainable living can be described as living within the innate carrying capacities defined by these factors. In the second or Circles of Sustainability conception, sustainable living can be described as negotiating the relationships of needs within limits across all the interconnected domains of social life, including consequences for future human generations and non-human species.\nSustainable design and sustainable development are critical factors to sustainable living. Sustainable design encompasses the development of appropriate technology, which is a staple of sustainable living practices. Sustainable development in turn is the use of these technologies",
"of the circular flow of the economy come from the environment, and the waste must be absorbed by the larger ecosystem in which the economy exists.\nThis is not to say that the circular flow diagram isn't useful in understanding the basics of an economy, such as leakages and injections. However, it cannot be ignored that the economy intrinsically requires natural resources and the creation of waste that must be absorbed in some manner. The economy can only continuing churning if it has matter and energy to power it and the ability to absorb the waste it creates. This"
] |
Why do people have a midlife crisis? | [
"It's different for everybody, but it's basically about getting to a milestone in your life (half over, 1/3 over, 2/3 over) and realizing that you're unhappy with how things have gone. \n\nYou're not a rockstar, you're not famous or rich, and instead you drive three screaming children to soccer practice every day and live with a woman who would rather step on you than let you tinker in your garage on a rainy Saturday. On top of that, you're roped in and you have very little to look forward to.\n\nThis can be a scary and depressing realization for a lot of people (not just men) who think that their intended worth in life has been missed completely.",
"One of the main reasons is that a lot of significant things happen around age 40-60, which is when most people who experience a \"midlife crisis\" tend to experience it.\n\nCommon significant events include:\n\n* One's children leaving the home/getting married/having kids\n* Getting (or failing to get) a promotion one has been working towards for a long time\n* Losing one's job\n* Transitioning up the hierarchical food chain from more \"front-line\" duties into more administrative/managerial roles\n* Getting divorced after a long marriage\n* Symptoms of old age really starting to set in for the first time and/or becoming severe enough that they are impossible to ignore\n* One or both of one's parents dying\n* One or more of the people with whom one grew up dying (the average life expectancy maybe closer to 72 or so, but most people who hit 60 know of at least one close or former friend who has died before they hit 60 for whatever reason)\n\nAll of these things combine to produce a series of potentially very troublesome realizations:\n\n* If any dreams one may have had when they were younger have not been fulfilled by now, odds are increasingly good that they never will be\n* One is closer to the date of one's death than the date of one's birth\n* One simply cannot do many of the things one used to enjoy doing\n* Things that have given one's life meaning and purpose for the last few decades are changing and/or going away (e.g., getting divorced, kids leaving the house, etc.)\n\nIn short: a lot of things conspire to encourage one to take a long, hard look at one's life, and the results aren't always encouraging. Any of those things can lead to some pretty sleepless nights. Several of them? That's pretty damn tough. \n\nOf course, the literature has moved away from describing \"midlife crises\" as a real thing, as a lot of people experience some or all of the above things without describing themselves as having a \"midlife crisis,\" and the whole notion has its roots in Freudian concepts which don't have much credibility anymore. But to the extent that one is talking about the not-entirely-uncommon phenomenon of people kind of flipping out as they reach late middle-age, those are some of the reasons."
] | [
"describe the crisis that one undergoes during the Midlife Transition, rather than crises found in other developmental periods. The midlife crisis is a period in development that supposedly happens in middle age, and is characterized by making sudden and large changes, experiencing anxiety, and reevaluating oneself and one's choices. According to Levinson, the midlife crisis echoes the three developmental tasks within the midlife transition: ending the stage of early adulthood, initiating middle adulthood, and coping with sources of discord in one's life. Other developmental tasks that are addressed within this stage include becoming more individualized and constructive as opposed to",
"Loneliness Common causes People can experience loneliness for many reasons, and many life events may cause it, such as a lack of friendship relations during childhood and adolescence, or the physical absence of meaningful people around a person. At the same time, loneliness may be a symptom of another social or psychological problem, such as chronic depression.\nMany people experience loneliness for the first time when they are left alone as infants. It is also a very common, though normally temporary, consequence of a breakup, divorce, or loss of any important long-term relationship. In these cases, it may stem both from",
"uninvolved relatives or children, economic struggles can all add to the feeling of isolation. Among the elderly, childlessness can be a cause for social isolation. Whether their child is deceased or they didn't have children at all, the loneliness that comes from not having a child can cause social isolation. Retirement, the abrupt end of daily work relationships, the death of close friends or spouses can also contribute to social isolation. In the United States, Canada, and United Kingdom, a significant sector of the elderly who are in their 80s and 90s are brought to nursing homes if they show",
"Isolation plays an integral role in depression. For example, results from a cohort study of approximately 2,000 older adults aged 65 years and older from the New Haven Established Populations for the Epidemiological Study of the Elderly found that social engagement was associated with lower depression scores after adjustment for various demographic characteristics, physical activity and functional status. This proves that an increase in community based centers, should decrease mental illness in high poverty areas of the United States. Contaminated water Each year many children and adults die as a result of a lack of access to clean drinking water",
"dangerous neighbors.” Adapting to a new culture is stressful and this increase in stress leads to higher prevalence for depression. Gender As is true in Western societies, depression is more prevalent in women than in men in collective cultures. Some have hypothesized that this is due to their inferior positions in the culture, in which they may experience domestic violence, poverty, and inequality that can greatly contribute to depression. Moreover, research conducted in the United States, Chile and Spain found that cultural differences on the expectations of individuals based on gender varied across cultures and that resulted in different levels",
"as \"the ME generation,\" \"the age of narcissism\" and \"the pursuit of loneliness.\" The number of cases of emotional depression in the United States was believed to have doubled between 1970 and 1990.\n\"What you do is what you are\" was the common and unhealthy assumption. According to 'The Workaholic Syndrome', written by Judith K. Sprankle and Henry Ebel, \"By their sheer numbers and the consequently narrowing opportunities at every upward run of the organizational ladder, the baby-boomers have been compelled to do more, to move faster, to compete harder. They, in turn, have set the pace for other age groups.",
"theories of loneliness, as they may need to implement these perspectives into enhancing the lives of their patients. They are particularly problematic in old age due to the changes an individual goes through such as decreasing economic stability and resources, changes in family structures, reduced social communication and the death of a relative or spouse.\nThe most researched outcomes of loneliness are depression and cardiovascular health. Lonely individuals have found to have increased arterial stiffness, decreased blood circulation and associated with elevated blood pressure.\nSocial isolation and feelings of loneliness are also major risk factors for poor cognitive and physical health. A",
"loneliness; pain, depression, and fatigue often accompany serious illness and place people at risk for poor health and mortality. Physical health Chronic loneliness can be a serious, life-threatening health condition. It has been found to be associated with an increased risk of stroke and cardiovascular disease. Loneliness shows an increased incidence of high blood pressure, high cholesterol, and obesity.\nLoneliness is shown to increase the concentration of cortisol levels in the body. Prolonged, high cortisol levels can cause anxiety, depression, digestive problems, heart disease, sleep problems, and weight gain.\n″Loneliness has been associated with impaired cellular immunity as reflected in lower natural",
"Depression. People are beginning to fear the transformation of this generation into one referred to as a \"Lost Generation\" that is constantly looking for work and whose futures are closed off from \"good careers\". The stress of unemployment has also affected personal relationships, with many young adults separating from partners. Youth unemployment is about double overall unemployment.\nThe high unemployment rate, at 56% as of June 2013, is overstated. Subtracting students and young mothers not looking for jobs, the actual number is closer to 22%. From immigration to emigration Large-scale immigration continued throughout 2008 despite severe unemployment, but by 2011 the",
"times ignored in treatment. One study for example found that a greater number of chronic illnesses per individual were associated with feelings of loneliness. Some of the possible reasons for this listed are an inability to maintain independence as well as the chronic illness being a source of stress for the individual. A study of loneliness in adults over age 65 found that low levels of loneliness as well as high levels of familial support were associated with better outcomes of multiple chronic conditions such as hypertension and diabetes. There are some recent movements in the",
"individuals patch crises as they arise by constantly shifting their resources according to what is needed most imminently. Juggling further cements low-income individuals’ economic status and their place in the scarcity cycle.\nLow-income individuals frequently enter into the scarcity cycle because of poor planning for the future. Tunneling and decreased bandwidth causes individuals to focus on urgent tasks, needing attention with a time constraint, rather than important tasks, needing attention but without a time constraint. Urgent tasks cause many to use quick fixes, like loans, which have significant consequences. Without planning, and only addressing urgent tasks, low income individuals are",
"have a 15 to 30 year shorter lifetime compared with the general population.\nMajor depression can strike at virtually any time of life as a function of genetic and developmental pre-disposition in interaction with adverse life-events. Although common in the elderly, over the course of the last century, the average age for a first episode has fallen to ~30 years. However, depressive states (with subtly different characteristics) are now frequently identified in adolescents and even children. The differential diagnosis (and management) of depression in young populations requires considerable care and experience; for example, apparent depression in teenagers may later transpire to",
"that serious time shortages often came with poverty. As people started doing more at home to save or earn cash (producing food and clothing, repairing, painting apartments), time pressure damaged family life, so that lack of leisure time was a very widespread phenomenon among poor families.\nConcurrently, the state tended to neglect the problem: a 1983 work claims that social assistance fulfilled 14% of poor people's needs. Institutions were not proactively interested in bettering people's lives, while the poor had little awareness of their rights. Official ideology saw poverty as a marginal phenomenon caused by unusual life events and pathology, rather",
"risk of major depression is increased with neurological conditions such as stroke, Parkinson's disease, or multiple sclerosis, and during the first year after childbirth. It is also more common after cardiovascular illnesses, and is related more to those with a poor cardiac disease outcome than to a better one. Studies conflict on the prevalence of depression in the elderly, but most data suggest there is a reduction in this age group. Depressive disorders are more common in urban populations than in rural ones and the prevalence is increased in groups with poorer socioeconomic factors, e.g., homelessness. History The Ancient Greek",
"Late life depression Late life depression refers to a major depressive episode occurring for the first time in an older person (usually over 50 or 60 years of age). Concurrent medical problems and lower functional expectations of elderly patients often obscure the degree of impairment. Typically, elderly patients with depression do not report depressed mood, but instead present with less specific symptoms such as insomnia, anorexia, and fatigue. Elderly persons sometimes dismiss less severe depression as an acceptable response to life stress or a normal part of aging. Causes The exact changes in brain chemistry and function that cause either",
"than in rural population and, in general, the prevalence is higher in groups with adverse socio-economic factors (for example in homeless people)\nData on the relative prevalence of major depression among different ethnic groups have reached no clear consensus. However, the only known study to have covered dysthymia specifically found it to be more common in African and Mexican Americans than in European Americans.\nProjections indicate that depression may be the second leading cause of life lost after heart disease by 2020.\nIn 2016, a study found an \nassociation between hormonal contraception and depression.",
"Psychology (AAGP). As time has gone on the small group has turned into a very large group of people dedicated to the well being of the aging population. Loneliness in Elderly People Loneliness is an emotional response to the process of social isolation. It typically entails the feelings of anxiousness due to the lack of social connectedness or communication with others. Research has shown that loneliness has negative impacts on biological, cognitive and immune functioning. It is prevalent throughout all age groups from childhood to old age.\nNurses and other individuals who work in association with the elderly learn the various",
"and 60. The risk of major depression is increased with neurological conditions such as stroke, Parkinson's disease, or multiple sclerosis and during the first year after childbirth. The risk of major depression has also been related to environmental stressors faced by population groups such as war combatants or physicians in training.\nIt is also more common after cardiovascular illnesses, and is related more to a poor outcome than to a better one Studies conflict on the prevalence of depression in the elderly, but most data suggest there is a reduction in this age group. Depressive disorders are most common in urban",
"distinct group identifiable by their shared interests and values. Social, economic, or political changes can bring awareness to these shared interests and values for similarly-aged people who experience these events together, and thereby form a generational consciousness. These types of experiences can impact individuals' development at a young age and enable them to begin making their own interpretations of the world based on personal encounters that set them apart from other generations. Intergenerational living \"Both social isolation and loneliness in older men and women are associated with increased mortality, according to a 2012 Report by the National Academy of Sciences",
"education level, marital status, and socioeconomic status. To go along with this, four of the Big Five Personality Traits are substantially associated with life satisfaction, openness to experience is not associated. Having high levels of internal locus of control lead to higher reported levels of happiness.\nEven when happiness can be affected by external sources, it has high hedonic adaptation, some specific events such as an increase in income, disability, unemployment, and loss (bereavement) only have short-term (about a year) effects on a person's overall happiness and after a while happiness may return to levels similar to unaffected",
"their stress in a positive way. Seasonal effects A recent study analyzes time-dependent rhythms in happiness comparing life satisfaction by weekdays (weekend neurosis), days of the month (negative effects towards the end of the month) and year with gender and education and outlining the differences observed. Primarily within the winter months of the year, an onset of depression can affect us, which is called seasonal affective disorder (SAD). It is recurrent, beginning in the fall or winter months, and remitting in the spring or summer. It is said that those who experience this disorder usually have a history of major",
"in response to negative social outcomes and throughout the course of one's depression, with bereaved individuals often experiencing greater inflammation than non-greaving individuals.\nBoth one's risk of depression and inflammation levels have also been found to be higher in adults who experienced childhood adversity. Similarly, these individuals also face increased risk of autoimmune diseases, which are both indicative of greater inflammatory responses and risk factors for depression. As with the relationship between depression and inflammation as a whole, this relationship is thought to be bidirectional with both depression increasing one's risk of autoimmune disease and autoimmune disease increasing one's risk",
"Epidemiology of depression The epidemiology of depression has been studied across the world.\nDepression is a major cause of morbidity worldwide, as the epidemiology has shown. Lifetime prevalence estimates vary widely, from 3% in Japan to 17% in the US. Epidemiological data shows higher rates of depression in the Middle East, North Africa, South Asia and America than in other countries. Among the 10 countries studied, the number of people who would suffer from depression during their lives falls within an 8–12% range in most of them.\nIn North America, the probability of having a major depressive episode within any year-long period",
"one may see the world differently and experience social alienation, described as the self in exile.\nWhile the long term effects of extended periods of loneliness are little understood, it has been noted that people who are isolated or experience loneliness for a long period of time fall into a “ontological crisis” or “ontological insecurity,” where they are not sure if they or their surroundings exist, and if they do, exactly who or what they are, creating torment, suffering, and despair to the point of palpability within the thoughts of the person.\nIn children, a lack of social connections is directly linked",
"small fishing activities, farming practices, pastoralism and petty businesses. Stage four This occurs where birth and death rates are both low, leading to a total population stability. Death rates are low for a number of reasons, primarily lower rates of diseases and higher production of food. The birth rate is low because people have more opportunities to choose if they want children; this is made possible by improvements in contraception or women gaining more independence and work opportunities. The DTM is only a suggestion about the future population levels of a country, not a prediction.\nCountries that are at this stage",
"severe signs of social isolation. Other societies such as many in Southern Europe, Eastern Europe, East Asia, and also the Caribbean and South America, do not normally share the tendency towards admission to nursing homes, preferring instead to have children and extended-family of elderly parents take care of those elderly parents until their deaths. On the other hand, a report from Statistics Norway in 2016 stated that more than 30 percent of seniors over the age of 66 have two or fewer people to rely on should personal problems arise. Isolation among children and teens Middle school is a time",
"a profound effect on a person’s mental health. According to Alyssa Brown of the Washington D.C. Gallup, 31% of people living in poverty have reported at some point been diagnosed with depression compared with 15.8% of those not in poverty. Many people attribute their depression to unemployment, life stressors, and witnessing more violence. These are very relevant in the impoverished world.\nIt is uncertain whether poverty induces depression or depression causes poverty. What is certain is that the two are closely linked. A reason for this link could be due to the lack of support groups such as church community centers.",
"have a shorter life expectancy than those without depression, in part because depressed patients are at risk of dying of suicide. However, they also have a higher rate of dying from other causes, being more susceptible to medical conditions such as heart disease. Up to 60% of people who die of suicide have a mood disorder such as major depression, and the risk is especially high if a person has a marked sense of hopelessness or has both depression and borderline personality disorder. The lifetime risk of suicide associated with a diagnosis of major depression in the US is estimated",
"correlate with dramatically higher reported feelings of loneliness (as well as other negative health impacts). Mental health Loneliness has been linked with depression, and is thus a risk factor for suicide. Émile Durkheim has described loneliness, specifically the inability or unwillingness to live for others, i.e. for friendships or altruistic ideas, as the main reason for what he called egoistic suicide. In adults, loneliness is a major precipitant of depression and alcoholism. People who are socially isolated may report poor sleep quality, and thus have diminished restorative processes. Loneliness has also been linked with a schizoid character type in which",
"depression is about twice as common in women as in men, although it is unclear why this is so, and whether factors unaccounted for are contributing to this. The relative increase in occurrence is related to pubertal development rather than chronological age, reaches adult ratios between the ages of 15 and 18, and appears associated with psychosocial more than hormonal factors. Depression is a major cause of disability worldwide.\nPeople are most likely to develop their first depressive episode between the ages of 30 and 40, and there is a second, smaller peak of incidence between ages 50 and 60. The"
] |
how does the tablecloth trick work | [
"objects don't like to change direction/speed quickly without a fair amount of force. Especially heavy objects. The friction between the moving table cloth and the bottoms of the objects isn't enough to move the objects, as long as they're heavy enough and the tablecloth is moving fast enough.\n\ntips for doing it: make sure the objects are heavy with a smooth bottom. also make sure you snap the edge of the tablecloth downwards because it's easier to pull quickly in that direction and it makes sure you don't accidentally lift the tablecloth, which ruins the trick.\n\nedit: a smooth and non\\-stretchy tablecloth will also help."
] | [
"thick, fringed draperies in deep colours, including tablecloths reaching to the floor on any kind of table. Cultural References A popular \"magic trick\" involves pulling a loaded tablecloth away from a table but leaving the plates behind. This trick relies on inertia. It is known as a tablecloth pull or a tablecloth yank. Films with tablecloth scenes The Pacifier\nGhost Busters",
"hand marbled separately using the traditional technique of sprinkling the colours onto a viscous fluid prepared from Carragheen moss and manipulating a pattern in the paint using a stylus. The paper is carefully lowered onto the floating pattern and then lifted, rinsed and hung out to dry. Each pattern on each piece of paper must be controlled to check they are the same.",
"the artist's hands to product consistency and pliability. A thin straw is then inserted into the ball, and the artist begins to blow air into it, in order to slowly inflate it. Simultaneously, the artist pinches and pulls parts of the ball, by hand, or sometimes with tools such as tweezers, to produce limbs, and various shapes. Before the figure has completely cooled, colours, typically red or green, are added to the surface, and a wooden stick is inserted into the underside. The straw is then extracted, and the figure put on display for sale.",
"Parsemage is a surrealist and automatic method in the visual arts invented by Ithell Colquhoun in which dust from charcoal or colored chalk is scattered on the surface of water and then skimmed off by passing a stiff paper or cardboard just under the water's surface. Photomontage Photomontage is making of composite picture by cutting and joining a number of photographs. Sifflage Sifflage is the technique used by Jimmy Ernst in which liquid paint is blown to inspire or reveal an image. This is sometimes called \"soufflage\", but Ernst's name was \"sifflage\".\nThe result can be seen in his Echo Plasm.",
"this effect is done is with a rod that clips to the finger, and is hidden from view by the cloth. By simply moving his finger (generally his thumb), the magician can achieve an almost lifelike reaction from the ball. The ball and cloth have to be moved so the rod remains invisible through the performance. Considerable practice and stagecraft is required to make it appear that the cloth is being pulled about by the ball, as opposed to being under the magician's control.",
"ribbons, bits of colored or hand-made papers, photographs, etc., glued to a solid support or canvas. Coulage A coulage is a kind of automatic or involuntary sculpture made by pouring a molten material (such as metal, wax, chocolate or white chocolate) into cold water. As the material cools it takes on what appears to be a random (or aleatoric) form, though the physical properties of the materials involved may lead to a conglomeration of discs or spheres. The artist may use a variety of techniques to affect the outcome.\nThis technique is also used in the divination process known",
"Stand-up magicians, such as \"table-hoppers\" at restaurants, may need to use a Topit or other device to obtain a similar effect, due to their inability to lap. The magicians who utilize the trick of lapping are able to manipulate items on a surface to the edge. From there they can move the items so that it falls in their lap without the audience noticing. Notable magicians The magician Slydini was particularly noted for his lapping technique, which relied heavily on subtle misdirection.",
"Chink-a-chink Chink-a-chink is a simple close-up magic trick in which a variety of small objects, usually four, appear to magically transport themselves from location to location when covered by the performer's hands, until the items end up gathered together in the same place. Variations, especially the Sympathetic Coins, have been performed since the 1800s. Popular variations are Shadow Coins, Coins-n-Cards and Matrix. A variation using playing cards as the objects is known as Sympathetic Aces. Effect In the typical layout, the magician places four small objects on a table in a square, rectangular or diamond formation (although even a single",
"Spin art Techniques To create spin art, an artist initially decorates or drips paint onto a canvas. The canvas can be anything; however, the most common form of canvas is a small rectangular piece of cardboard. Before the paint on the canvas dries, the artist secures the canvas to a platform that can be rotated at high speed. Once the canvas is secure, the artist can then begin spinning the canvas. Most spinning platforms are electrical or battery operated, with more elaborate platforms enabling the artist to vary the rotational speed.\nAs the canvas rotates, centrifugal forces draw the wet",
"and two chairs. It is positioned under a tree with its branches stretching over the table. A maid is approaching the table carrying a tray in her hands. The light is reflected from the shiny objects on the table and from the white tablecloth. The artist has been partly inspired by the impressionists way of suggesting volumes and depth by using coloured lights and shadows, causing the table, the table setting and the foliage to dissolve in shimmering light reflexes. The painting was popular among contemporary Swedish artists of the time. Style Hanna Pauli had an education of the",
"Surtout de table A surtout de table is an ornamental centrepiece displayed on a formal dining table, \"a large centerpiece with mirrored plateaus and numerous candelabra and other possible display pieces on top\". In French surtout de table is the usual term for any type of centrepiece, but in English this \"tray\" type, along with the objects placed on it, is the usual meaning.\n \nEvolving from a simple plate or bowl on which to stand candlesticks and condiments, a surtout de table often took the form of a long galleried tray made of precious or gilded metals, on which a",
"poker tables The modern poker table is a form of card table which is often covered with baize (a type of felt) or speed cloth (a Teflon-coated fabric) to help the cards slide easily across the surface. It is either an actual table or a fold-out tabletop surface. Those used in professional televised poker feature \"pocketcams\" which can view a player's pocket, or hole cards. Such tables are usually fairly oval-shaped, with the players sitting around a curve of the table with a dealer facing them in an indented area of the table made specifically for the dealer. In amateur",
"or through a straw, fanning the colors, or carefully using a human hair to stir the colors. In the 19th century, the Kyoto-based Japanese suminagashi master Tokutaro Yagi developed an alternative method that employed a split piece of bamboo to gently stir the colors, resulting in concentric spiral designs. A sheet of washi paper is then carefully laid onto the water surface to capture the floating design. The paper, which is often made of kozo (paper mulberry), must be unsized and strong enough to withstand being immersed in water without tearing.\nAnother method of marbling more familiar to Europeans and Americans",
"painted on a long cloth, which could be unrolled across the stage by turning spools, created an illusion of movement and changing locales.",
"taking a hooked needle and plucking sections of the cloth. Then a thread is looped around each section twice. The thread is not knotted; tension is the only thing that holds the sections in place. The resulting dyed cloth is a water-like design. Because no knot is used, miura shibori is very easy to bind and unbind. Therefore, this technique is very often used. Kumo shibori Kumo shibori is a pleated and bound resist. This technique involves pleating sections of the cloth very finely and evenly. Then the cloth is bound in very close sections. The result is",
"which is touching the ground. Asrah levitation In Asrah levitation, an assistant lies down and is fully covered with a cloth. The assistant then appears to levitate beneath the cloth, before slowly floating down. As the magician pulls the cloth away, the assistant is seen to have vanished.\nThe trick uses a structure of thin wire that is placed over the assistant at the same time as the cloth. The wire structure can be raised while the assistant escapes unseen.\nThis illusion is credited to Servais Le Roy and was first performed with his wife as assistant in 1902. Balducci levitation The",
"Magician is then supposed to spray some of the cleaner on a paper towel and after a special moment happens in the movie the magician starts rubbing the screen with the paper towel. The clip has been digitally altered to look like the image is being torn and distorted like, as Penn puts it, \"a watercolor being rubbed with a wet sponge.\" The victim is supposed to be shocked into thinking that an over-the-counter cleanser can actually damage an image on a TV screen. This is not to be done for money, but just for laughs. This",
"Pounce (art) Pouncing is an art technique used for transferring an image from one surface to another. It is similar to tracing, and is useful for creating copies of a sketch outline to produce finished works.\nPouncing has been a common technique for centuries, used to create copies of portraits and other works that would be finished as oil paintings, engravings, and so on. The most common method involves laying semi-transparent paper over the original image, then tracing along the lines of the image by creating pricked marks on the top sheet of paper. This pounced drawing made of pricked holes",
"table, this was made possible. She lifted the table by rocking back on the heel of this foot. She made the \"spirit\" raps by striking a leg of the table with a free foot.\nA photograph, taken in the dark, of a small stool that was alleged to have levitated was revealed to be sitting on Palladino's head. After she saw this photo, the stool remained immobile on the floor. A plaster impression taken of a spirit hand matched Palladino's hand. She was caught using a hair to move a scale. In the dim light, her fist, wrapped in a handkerchief,",
"repeat the trick using transparent plastic cups, claiming that they will reveal how to perform the trick. However, as part of the joke, they do the trick so fast as to make it difficult to follow. They claim that this version of the cups and balls breaks all four rules of magic: not to tell the audience how a trick is done, not to repeat the same trick twice, not to show the audience the secret preparation, and the \"unwritten rule\" never to perform the cups and balls with clear plastic cups. They claim this version of the trick",
"by hand and then overlays them with graphite, paint or pastel, using drawing tools such as chopsticks. The surface of the image mimics the effect of water.",
"paint outwards, creating intricate designs. The artist can drip more paint onto the canvas while it is spinning, thus layering paints on top of each other, creating different effects. Using different colors, a skilled spin artist can blend colors together into subtle designs. At any point during this process, the artist can stop the spinning platform to view the canvas. Since the canvas is usually rotating at a high rate, it is difficult if not impossible to view the image on the canvas until the platform has stopped spinning, thus creating a sense of surprise and uncertainty during the creation",
"Table-turning Table-turning (also known as table-tapping, table-tipping or table-tilting) is a type of séance in which participants sit around a table, place their hands on it, and wait for rotations. The table was purportedly made to serve as a means of communicating with the spirits; the alphabet would be slowly spoken aloud and the table would tilt at the appropriate letter, thus spelling out words and sentences. The process is similar to that of a Ouija board. Scientists and skeptics consider table-turning to be the result of the ideomotor effect, or conscious trickery. History When the movement of Modern Spiritualism",
"critics. The technique is commonly used in persuasive speeches by political candidates to discredit their opponents and to make themselves seem more worthy.\nThe term originates from the magician's gimmick of \"stacking the deck\", which involves presenting a deck of cards that appears to have been randomly shuffled but which is, in fact, 'stacked' in a specific order. The magician knows the order and is able to control the outcome of the trick. In poker, cards can be stacked so that certain hands are dealt to certain players.\nThe phenomenon can be applied to any subject and has wide applications. Whenever a",
"magic-makers, including Auke van Dokkum of the Netherlands, François Danis of France and Jim Riser of the US. Professional magicians, however, generally prefer the traditional \"found objects\" (such as corks and bottle caps) to the artificial ones, reducing demand for the purpose-built sets. Description Chink-a-chink involves sleight of hand along with one extra object of whatever sort is being used. To start the trick, four of the objects are arranged on the table while the fifth is palmed. The magician places his hands over two of the objects on the table and performs some flourish to cover movement. During the",
"to John Mulholland:\nThe multiplicity of methods used to tip and raise tables in a séance is almost as great as the number of mediums performing the feat. One of the simplest was to slide the hands back until one or both of the medium's thumbs could catch hold of the table top. Another way was to exert no pressure on the table at all, and in the event that the sitter opposite the medium did press on the table, to permit the table to tip far enough away from him so that he could get the toe of one",
"itself, such as graphite, chalk, or charcoal, although freshly applied ink can be smudged, wet or dry, for some effects. For shading and blending, the artist can use a blending stump, tissue, a kneaded eraser, a fingertip, or any combination of them. A piece of chamois is useful for creating smooth textures, and for removing material to lighten the tone. Continuous tone can be achieved with graphite on a smooth surface without blending, but the technique is laborious, involving small circular or oval strokes with a somewhat blunt point.\nShading techniques that also introduce texture to the drawing include hatching and",
"square. Fixative is used to prevent pencil and crayon marks from smudging. Drafting tape is used to secure paper to drawing surface, and also to mask an area to keep it free of accidental marks, such as sprayed or spattered materials and washes. An easel or slanted table is used to keep the drawing surface in a suitable position, which is generally more horizontal than the position used in painting. Technique Almost all draftsmen use their hands and fingers to apply the media, with the exception of some handicapped individuals who draw with their mouth or feet.\nPrior to working on",
"wife as assistant in 1902. Method The trick uses a form made of thin wire that is hidden behind the couch and suspended from above on fine wires. When the assistant lies down on the couch the form is quickly moved on top of them while the cloth cover is being deployed with a flourish. The form is then raised while the assistant escapes through a trap in the couch or the couch is removed offstage by stagehands. The wires making up the form are thin enough that when the cloth is removed, they cannot easily be seen against a",
"the spoon, perhaps by heating it, reducing the amount of force that needed to be applied to bend it manually.\nDuring telepathic drawing demonstrations, Geller claimed the ability to read the minds of subjects as they draw a picture. Although in these demonstrations he cannot see the picture being drawn, he is sometimes present in the room, and on these occasions can see the subjects as they draw. Critics argue this may allow Geller to infer common shapes from pencil movement and sound, with the power of suggestion doing the rest.\nWatchmakers have noted that \"many supposedly broken watches had merely"
] |
In statistics, why can't you sample a group larger than 10% of the whole? | [
"there is a certain ratio of cost to reliability. in theory it would be best to make a study on the whole population. but since that is near impossible and at least very costly we use samples. and there is a certain minimum sample you need for the sake of accuracy. depending on the size of population, method of picking for sample and so on, you achieve a number that is the minimum. A bigger sample should be more accurate, the closer you get to the number of all of the population.. You will usually go with somewhere close to the minimum (not less, sometimes slightly more) because of cost.",
"When sampling a population, randomly choosing test subjects is important. As more subjects are tested, the probability of choosing the remaining subjects increases. \n\nFor example, let's say we have a population of 10,000 people. We won't sample the same person twice, so after a person has been chosen, they are removed from the pool of potential test subjects.\n\nEach person has a 1/10000, or 0.0001, chance of being the first test subject. \n\nAfter 999 people have been sampled, each person has 1/9001, or 0.000111, chance of being chosen.\n\nAfter 5000 people, or 50% of the population, has been sampled, the odds of being chosen become 1/5000, or 0.0002.\n\n0.0001 and 0.000111 are close enough to assume that the subjects are still chosen randomly, but 0.0002 is not. 10% of the population is the cutoff for the point where the probability of each subject being chosen is no longer random enough to draw conclusions.\n\n\nThe actual math behind the 10% number can be found in this paper: _URL_0_",
"Yes, the more you sample the more accurate.\n\nHowever this scales off really fast. Sampling 10000 people actually isnt that much more accurate than 1000 people, so its a waste of effort/cost to do so.",
"Stats teacher here. \n\nI would assume your teacher is talking about a population within the context of probability models and Bernoulli trials (if not s/he is mixing it up, because you can take a sample of more than 10%, but it is usually pointless). Bernoulli trials is probably what you are learning right now (especially if you are in AP stats) so she is right.\n\nYou need two rules for Bernoulli trials: it must only have two outcomes and the outcomes must be independent. \n\nWhen sampling a given population, if you take out more than 10% of the population, you are violating independence, and are no longer allowed to use the geometric model or binomial model. \n\nThe reason behind this is if you have a population of a million boxes of cereal and 40% are filled with a prize, when you open a box of cereal you have just removed one object from the population and now the probability has changed (because you now have 999,999 boxes and either one less prize box or no prize box). This raises or lowers the percentage of getting a prize in the next box (because you are counting without replacement). \n\nStatisticians don't really care about this as long as you only sample less than 10%. If you sample more than 10% of the boxes (meaning you opened more than 100,000 boxes of cereal) the probability has changed enough such that independence is violated. \n\ntl;dr: she is right if you are learning about Bernoulli trials she is wrong to say any form of sampling (though 10% is still a benchmark for good sampling, because sampling more like a census is problematic).",
"You can think of statistical tests like drawing cards from a card deck. Lets say that you care about whether or not a card is red. If I draw a card, and it is red, that reduces the chance that the next card I will draw is red, and if I draw a card that is black, that increases the chance of me getting a red card on the next draw. This is what is known as a non-independent event, because the results of one random event affects the result of the next.\n\nMany statistical tests rely on having the random events that they are sampling be independent, like flipping a coin. But this isn't the case in real life. However, it gets to be close enough to the case when you are sampling a small portion of the population. Imagine, instead of one 52 card deck, you had 1,000 52 card decks. The first card you draw has a 0.5 chance of being red, while the second has either 0.50000961557 or 0.49999038443 chance of being red, depending on what you drew. That small difference is almost irrelevant, so many statistical tests that rely on independent events work out fine."
] | [
"sample size is reasonably large. However, if the population is substantially skewed and the sample size is at most moderate, the approximation provided by the central limit theorem can be poor, and the resulting confidence interval will likely have the wrong coverage probability. Thus, when there is evidence of substantial skew in the data, it is common to transform the data to a symmetric distribution before constructing a confidence interval. If desired, the confidence interval can then be transformed back to the original scale using the inverse of the transformation that was applied to the data.\nData can also be transformed",
"since groups sizes typically follow an aggregated (right-skewed) distribution: most groups are small, few are large, and a very few are very large. \nStatistical measures of group size roughly fall into two categories. Statistical methods Due to the aggregated (right-skewed) distribution of group members among groups, the application of parametric statistics would be misleading. Another problem arises when analyzing crowding values. Crowding data consist of non-independent values, or ties, which show multiple and simultaneous changes due to a single biological event. (Say, all group members' crowding values change simultaneously whenever an individual joins or leaves.)\nReiczigel et al. (2008) discuss the",
"more controversial. Margin of error due to sampling Polls based on samples of populations are subject to sampling error which reflects the effects of chance and uncertainty in the sampling process. Sampling polls rely on the law of large numbers to measure the opinions of the whole population based only on a subset, and for this purpose the absolute size of the sample is important, but the percentage of the whole population is not important (unless it happens to be close to the sample size). The possible difference between the sample and whole population is often expressed as a margin",
"on the number of the participants (units or sample size) that are included in the study. For instance, to avoid having the sample size be too small to reject a null hypothesis, it is recommended that one specify a sufficient sample size from the beginning. It is advisable to define a small, medium and large effect size for each of a number of important statistical tests which are used to test the hypotheses.",
"of systematic errors or strong dependence in the data, or if the data follows a heavy-tailed distribution.\nSample sizes may be evaluated by the quality of the resulting estimates. For example, if a proportion is being estimated, one may wish to have the 95% confidence interval be less than 0.06 units wide. Alternatively, sample size may be assessed based on the power of a hypothesis test. For example, if we are comparing the support for a certain political candidate among women with the support for that candidate among men, we may wish to have 80% power to detect a difference",
"to simultaneously make each subgroup sample size proportional to subgroup size within the total population. For an efficient way to partition sampling resources among groups that vary in their means, variance and costs, see \"optimum allocation\".\nThe problem of stratified sampling in the case of unknown class priors (ratio of subpopulations in the entire population) can have deleterious effect on the performance of any analysis on the dataset, e.g. classification. In that regard, minimax sampling ratio can be used to make the dataset robust with respect to uncertainty in the underlying data generating process.\nCombining sub-strata to ensure adequate numbers can lead",
"level, .95), and high confidence (.999) a minimum sample size of 29 (per subgroup) is necessary.[1,5] For higher levels of competence and lower levels of accuracy and confidence, smaller samples sizes are necessary. Similarly, sample size can be estimated with reliability theory and the Spearman–Brown prophecy formula (applied to people instead of items). For a relatively low level of agreement (an average correlation of .25 between people, comparable to an average competence of .50) and a high degree of desired validity (.95 correlation between the estimated answers and the true answers), a study would require a minimum",
"are necessary to adjust samples to be representative of a population by weighting them as is common in opinion polling. Similarly, stratification requires knowledge of the relative sizes of different population strata which can be derived from census enumerations. In some countries, the census provides the official counts used to apportion the number of elected representatives to regions (sometimes controversially – e.g., Utah v. Evans). In many cases, a carefully chosen random sample can provide more accurate information than attempts to get a population census. Sampling A census is often construed as the opposite of a sample as its intent",
"the medians of all groups are equal, and the alternative hypothesis is that at least one population median of one group is different from the population median of at least one other group. Exact probability tables A large amount of computing resources is required to compute exact probabilities for the Kruskal–Wallis test. Existing software only provides exact probabilities for sample sizes less than about 30 participants. These software programs rely on asymptotic approximation for larger sample sizes.\nExact probability values for larger sample sizes are available. Spurrier (2003) published exact probability tables for samples as large as 45 participants. Meyer and",
"to use a subsample with size , first estimate a model using samples from weighted case control sampling, then collect another samples using local case-control sampling. Larger or smaller sample size It is possible to control the sample size by multiplying the acceptance probability with a constant . For a larger sample size, pick and adjust the acceptance probability to . For a smaller sample size, the same strategy applies. In cases where the number of samples desired is precise, a convenient alternative method is to uniformly downsample from a larger subsample selected by local case-control",
"sample If entire segments of the population are excluded from a sample, then there are no adjustments that can produce estimates that are representative of the entire population. But if some groups are underrepresented and the degree of underrepresentation can be quantified, then sample weights can correct the bias. However, the success of the correction is limited to the selection model chosen. If certain variables are missing the methods used to correct the bias could be inaccurate.\nFor example, a hypothetical population might include 10 million men and 10 million women. Suppose that a biased sample of 100 patients included 20",
"size in order to reduce the confidence interval of our estimate to a range that is acceptable for our purposes. Techniques similar to those employed in a traditional power analysis can be used to determine the sample size required for the width of a confidence interval to be less than a given value.\nMany statistical analyses involve the estimation of several unknown quantities. In simple cases, all but one of these quantities are nuisance parameters. In this setting, the only relevant power pertains to the single quantity that will undergo formal statistical inference. In some settings, particularly if the goals are",
"people has margin of sampling error of ±3% for the estimated percentage of the whole population.\nA 3% margin of error means that if the same procedure is used a large number of times, 95% of the time the true population average will be within the sample estimate plus or minus 3%. The margin of error can be reduced by using a larger sample, however if a pollster wishes to reduce the margin of error to 1% they would need a sample of around 10,000 people. In practice, pollsters need to balance the cost of a large sample against the reduction",
"Sample size determination Introduction Larger sample sizes generally lead to increased precision when estimating unknown parameters. For example, if we wish to know the proportion of a certain species of fish that is infected with a pathogen, we would generally have a more precise estimate of this proportion if we sampled and examined 200 rather than 100 fish. Several fundamental facts of mathematical statistics describe this phenomenon, including the law of large numbers and the central limit theorem.\nIn some situations, the increase in precision for larger sample sizes is minimal, or even non-existent. This can result from the presence",
"study are often needed. Larger sample sizes are needed because estimates of effect sizes in published work are often exaggerated due to publication bias and large sampling variability associated with small sample sizes in an original study. Further, using significance thresholds usually leads to inflated effects, because particularly with small sample sizes, only the largest effects will become significant. Sharing raw data in online repositories Online repositories where data, protocols, and findings can be stored and evaluated by the public seek to improve the integrity and reproducibility of research. Examples of such repositories include the Open Science Framework, Registry of",
"surrounding sample size and number of variants become exacerbated particularly when GWA studies consider variants of volume in the order of millions. Therefore, due to the current constraints in the curse of dimensionality, prior screening methods that decrease the number of loci to below the number of observations may be used before modelling disease risk. Hayes et al. states that population size must be >100,000 in order to achieve high accuracy under their model assumptions; the exception is the case where there is a small effective population size. Furthermore, ethnic specific GWA studies show that each group has varied detectability",
"about a certain topic, it would be impractical to ask all of them. However, if the team picks a random sample of about 1000 people, they can be fairly certain that the results given by this group are representative of what the larger group would have said if they had all been asked.\nThis confidence can actually be quantified by the central limit theorem and other mathematical results. Confidence is expressed as a probability of the true result (for the larger group) being within a certain range of the estimate (the figure for the smaller group). This is the",
"effectively making it a target value for the proportion nonconforming. This may be useful when simple process adjustments can consistently move the process mean, but in general, this makes it more challenging to judge whether a process is fully out of control or merely off-target (but otherwise in control). Adequate sample size Sampling requires some careful consideration. If the organization elects to use 100% inspection on a process, the production rate determines an appropriate sampling rate which in turn determines the sample size. If the organization elects to only inspect a fraction of units produced, the sample size",
"in sampling error and a sample size of around 500–1,000 is a typical compromise for political polls. (Note that to get complete responses it may be necessary to include thousands of additional participators.)\nAnother way to reduce the margin of error is to rely on poll averages. This makes the assumption that the procedure is similar enough between many different polls and uses the sample size of each poll to create a polling average. An example of a polling average can be found here: 2008 Presidential Election polling average. Another source of error stems from faulty demographic models by pollsters who",
"is by selecting smaller samples which hopefully represent the population being studied. This is a highly cost-effective way to get accurate information. Choosing a good sample sometimes requires complex statistical work to make sure the sample is, indeed, truly representative of the population under study. If conditions do not permit representative sampling but known benchmark statistics are known (possibly from earlier census data), it's still possible to generate accurate information by weighting the data to distort it back, so to speak, to compensate for the distortion caused by the unrepresentative sample. For example, suppose an area of Wellington has a",
"many contexts, the issue is less about determining if there is or is not a difference but rather with getting a more refined estimate of the population effect size. For example, if we were expecting a population correlation between intelligence and job performance of around 0.50, a sample size of 20 will give us approximately 80% power (alpha = 0.05, two-tail) to reject the null hypothesis of zero correlation. However, in doing this study we are probably more interested in knowing whether the correlation is 0.30 or 0.60 or 0.50. In this context we would need a much larger sample",
"sample population in reflecting the larger totality, and the error refers only to the discrepancy that may result from judging the whole on the basis of a much smaller number. This is only an \"error\" in the sense that it would automatically be corrected if the totality were itself assessed. The term has no real meaning outside of statistics.\nAccording to a differing view, a potential example of a sampling error in evolution is genetic drift; a change is a population’s allele frequencies due to chance. For example, the bottleneck effect; when natural disasters dramatically reduce the size of a population",
"This generalizing ability is dependent on the representativeness of the sample, as stated above. Each member of the population is termed an element. There are frequent difficulties one encounters while choosing a representative sample. One common error that results is selection bias. Selection bias results when the procedures used to select a sample result in over representation or under representation of some significant aspect of the population. For instance, if the population of interest consists of 75% females, and 25% males, and the sample consists of 40% females and 60% males, females are under represented while males are overrepresented. In",
"Sampling error In [statistics], sampling errors are incurred when the statistical characteristics of a population are estimated from a subset, or [sample (statistics)/sample], of that population. Since the sample does not include all members of the population, statistics on the sample, such as means and quartiles, generally differ from the characteristics of the entire population, which are known as parameters. For example, if one measures the height of a thousand individuals from a country of one million, the average height of the thousand is typically not the same as the average height of all one million people in the country.",
"estimate for P(t). Estimates are computed on the basis of sampling and the experimental text collection furnishes the samples needed for the estimation. Now we run into the main concern which is how do we treat two arbitrary but heterogeneous pieces of texts appropriately. Paragons like a chapter in a Science Magazine and an article from a sports newspaper as the other. They can be considered as two different samples since those aiming at different population. Conclusion The divergence from Randomness Model is based on the Bernoulli model and its limiting forms, the hypergeometric distribution, Bose-Einstein statistics and its limiting",
"where no new information is obtained from further data.\nSaturation point determines the sample size in qualitative research as it indicates that adequate data has been collected for a detailed analysis. However, there are no fixed sizes or standard tests that determine the required data for reaching saturation. For example, in many phenomenographic studies, theoretical saturation is often reached after 15 to 30 participants, whereas other methods may require far fewer, or greater, numbers. Example of theoretical sampling An example of theoretical sampling is best described by Glaser and Strauss in the 1960s. It is a memo from their research for",
"statistical problems associated with group size measures (calculating confidence intervals, two-sample tests, etc.) and offer a free statistical toolset (Flocker 1.1).",
"Sample maximum and minimum In statistics, the sample maximum and sample minimum, also called the largest observation and smallest observation, are the values of the greatest and least elements of a sample. They are basic summary statistics, used in descriptive statistics such as the five-number summary and Bowley's seven-figure summary and the associated box plot.\nThe minimum and the maximum value are the first and last order statistics (often denoted X₍₁₎ and X₍ₙ₎ respectively, for a sample size of n).\nIf the sample has outliers, they necessarily include the sample maximum or sample minimum, or both, depending on whether they are extremely",
"dividing by the number of members.\nHowever, for a large data set (over 100 points) from a symmetric population, the mean can be estimated reasonably efficiently relative to the best estimate by L-estimators. Using a single point, this is done by taking the median of the sample, with no calculations required (other than sorting); this yields an efficiency of 64% or better (for all n). Using two points, a simple estimate is the midhinge (the 25% trimmed mid-range), but a more efficient estimate is the 29% trimmed mid-range, that is, averaging the two values 29% of the way in from the",
"sampling procedure employed, and the sample size used. There is often considerable interest in whether the sampling distribution can be approximated by an asymptotic distribution, which corresponds to the limiting case either as the number of random samples of finite size, taken from an infinite population and used to produce the distribution, tends to infinity, or when just one equally-infinite-size \"sample\" is taken of that same population.\nFor example, consider a normal population with mean and variance . Assume we repeatedly take samples of a given size from this population and calculate the arithmetic mean for each sample –"
] |
Why does food taste better when you're really hungry? | [
"A lot of taste actually comes from smell, and when you're hungry your sense of smell improves. It's not apex predator levels of smelling, but try walking past a fast food joint or even through a supermarket when you haven't eaten for a while. That and increased salivation will make any food you eat better."
] | [
"not eat more than the others while having meals due to social desirability. Conversely, snacks are usually eaten alone. Hunger and satiety There are many physiological mechanisms that control starting and stopping a meal. The control of food intake is a physiologically complex, motivated behavioral system. Hormones such as cholecystokinin, bombesin, neurotensin, anorectin, calcitonin, enterostatin, leptin and corticotropin-releasing hormone have all been shown to suppress food intake. Initiation There are numerous signals given off that initiate hunger. There are environmental signals, signals from the gastrointestinal system, and metabolic signals that trigger hunger. The environmental signals come from the body's senses.",
"little, but the \"just right\" amount of saltiness, sweetness, or richness. The human body has evolved to favor foods delivering these tastes: the brain responds with a \"reward\" in the form of a jolt of endorphins, remembers what we did to get that reward, and makes us want to do it again, an effect run by dopamine, a neurotransmitter. Combinations of sugar, fat, and salt act synergistically, and are more rewarding than any one alone. In food product optimization, the goal is to include two or three of these nutrients at their bliss point.",
"An indication of unneeded food could also be over expenditure on certain types of consumption such as eating away from home. Not knowing how much to spend, or overspending one’s budget on eating out can be an symptom of a lack of self control. Experiment participants rated a new snack as significantly less healthy when it was described as very tasty compared to when they heard it was just slightly tasty. Without knowing anything else about a food, the mere suggestion of good taste triggers counteractive self-control and prompted them to devalue the temptation in the name of health. Further,",
"Tasty Foods Change the Brain\". In discussing Dr. Kessler's book \"The End of Overeating: Taking Control of the Insatiable American Appetite\", Civille commented to the people who want to lose weight to take a product in the mouth and think about what the sensory properties are; what is the smell, what is the taste, what are the aromatics, what are the textural characteristics. She proposes that if they think hard and long about what they actually perceive, they will be less inclined to just go with the joy ride of the kick of the food and through thinking about what",
"behaviour reinforcement. The rewarding qualities of food, including taste and smell, activate regions of the brain that are impaired in patients with anorexia nervosa (AN) and bulimia nervosa (BN), including the orbitofrontal cortex (OFC), anterior cingulate cortex (ACC), anteromedial temporal, and the insula.\nNormally, eating is pleasant when an individual is hungry and less pleasant when an individual is full. Neuronal activation in the OFC decreases when an individual is full, however there is a disturbance in this pathway in individuals with AN and BN. Thus, patients with AN have little response to food or a quick response to being full,",
"\"flavorful\" the food, the greater the effect on the body's setpoint or self-regulating system. So, accordingly, eating flavorful junkfood that is very high in flavor will increase the setpoint while taking 100-400 \"flavorless\" calories per day between meals will reduce the body's setpoint. Seth Roberts focused entirely on the psychology of the association by the brain with calories and familiar flavors and that effect on the setpoint. Book summary The book features short anecdotes from followers of the diet who had heard of it through Roberts' blog or The New York Times. Roberts' diet is based on the",
"nerves, etc.; temperature, detected by thermoreceptors; and \"coolness\" (such as of menthol) and \"hotness\" (pungency), through chemesthesis.\nAs taste senses both harmful and beneficial things, all basic tastes are classified as either aversive or appetitive, depending upon the effect the things they sense have on our bodies. Sweetness helps to identify energy-rich foods, while bitterness serves as a warning sign of poisons.\nAmong humans, taste perception begins to fade around 50 years of age because of loss of tongue papillae and a general decrease in saliva production. Humans can also have distortion of tastes through dysgeusia. Not all mammals share the same",
"innate appetites that are triggered automatically in the absence of certain nutrients, but learned behaviours, aversions to or preferences for certain foods as they become associated with experiences of malnutrition and illness. Learned appetite If a food source has an identifiable flavor, an animal can learn to associate the positive effects of alleviation of a certain nutrient deficiency with consumption of that food. This has been demonstrated in a variety of species: lambs offered free choice of various foods will compensate for phosphorus, sodium, and calcium deficiencies. Domestic fowl have demonstrated specific appetites for calcium, zinc, and phosphorus, thiamine, protein",
"is vitally important to maintaining the structures of the body’s systems, so the specific appetite leads to more eating, in a desperate attempt to satiate the specific appetite for protein in life.",
"food preferences and childhood experiences (like a mother's cooking). Physiological responses Comfort food are usually chosen because of previous experiences of happiness linked with it. For example, chocolate is held as a popular comfort food as it is follows the pleasurable sweetness and the positive association with gifts/rewards.\nThe time of day also play a role in consuming comfort foods. Most people tend to eat simply because \"it's lunch time\" and only 20% of the time is due to actual hunger Thermal comfort Thermal comfort is a satisfaction of the ambient air temperature and humidity. Psychologists devised a study to determine",
"from the food it follows. Medicines and tablets may also have a lingering aftertaste, as they can contain certain artificial flavor compounds, such as aspartame (artificial sweetener). Acquired taste An acquired taste often refers to an appreciation for a food or beverage that is unlikely to be enjoyed by a person who has not had substantial exposure to it, usually because of some unfamiliar aspect of the food or beverage, including bitterness, a strong or strange odor, taste, or appearance. Clinical significance Patients with Addison's disease, pituitary insufficiency, or cystic fibrosis sometimes have a hyper-sensitivity to the five primary tastes.",
"are learnt by association such as meal plate size and work by modulating the potency of the cues of the direct loop. The influence of these processes can exist without subjective awareness. \nThe cessation of a desire to eat after a meal \"satiation\" is likely to be due to different processes and cues. More palatable foods reduce the effects of such cues upon satiation causing a larger food intake. In contrast, unpalatability of certain foods can serve as a deterrent from feeding on those foods in the future. For example, the Variable Checkerspot butterfly contains iridoid compounds that are",
"appeal, there is no definitive scientific answer, both physiological and psychological factors are cited. Food manufacturers spend billions of dollars on research and development to create flavor profiles that trigger the human affinity for sugar, salt, and fat. Consumption results in pleasurable, likely addictive, effects in the brain. At the same time, massive marketing efforts are deployed, creating powerful brand loyalties that studies have shown will trump taste.\nIt is well-established that the poor eat more junk food overall than the more affluent, but the reasons for this are not clear. Few studies have focused on variations in food perception according",
"one's genes. Taste also has a social aspect attached to it, we rarely seek to enjoy food by ourselves since eating usually facilitates social interaction between people. Business meetings and home dinners are almost all of the time in company of others and companies need to take this into consideration.\nA Swedish company, City Gross, made great use of this when it opened it the spring of 2007. The Swedish food retail store delivered grocery bags to households containing bread, beverages, sandwich spread and fruits. Competition in the industry is known to be very high and most retailers used low prices",
"The feeling of hunger could be triggered by the smell and thought of food, the sight of a plate, or hearing someone talk about food. The signals from the stomach are initiated by the release of the peptide hormone ghrelin. Ghrelin is a hormone that increases appetite by signaling to the brain that a person is hungry.\nEnvironmental signals and ghrelin are not the only signals that initiate hunger, there are other metabolic signals as well. As time passes between meals, the body starts to take nutrients from long-term reservoirs. When the glucose levels of cells drop (glucoprivation), the body starts",
"the food and decrease their consumption. Eating less during a meal is usually interpreted as reaching satiety or \"getting full\", but experiments suggest that habituation also plays an important role. Many experiments with animals and humans have shown that providing variety in a meal increases the amount that is consumed in a meal, most likely because habituation is stimulus specific and because variety may introduce dishabituation effects. Food variety also slows the rate of habituation in children and may be an important contributing factor to the recent increases in obesity.\nWe also find that habituation is found in our",
"enjoyment of eating foods. Contrasts in textures, such as something crunchy in an otherwise smooth dish, may increase the appeal of eating it. Common examples include adding granola to yogurt, adding croutons to a salad or soup, and toasting bread to enhance its crunchiness for a smooth topping, such as jam or butter. Contrast in taste Another universal phenomenon regarding food is the appeal of contrast in taste and presentation. For example, such opposite flavors as sweetness and saltiness tend to go well together, as in kettle corn and nuts. Food preparation While many foods can be eaten raw, many",
"by partaking of dinner, but not to excess - for being filled to excess, even with bread on its own, gives rise to dissipation - rather, everyone receives a meal according to the varying condition of their bodies or their age. They do not serve dishes of different flavours, nor richer types of food, but feeding on bread and herbs seasoned with salt, they quench their burning thirst with a temperate kind of drink. Then, for either the sick, those advanced in age, or likewise those tired by a long journey, they provide some other pleasures of tastier food, for",
"taste perception are genetically based. If so, then sensations of aftertaste could also be affected by the activities of specific genes that affect an individual's perception of different foods. For example, the intensity of the aftertaste sensations \"nontasters\" experienced after caffeine consumption was found to diminish faster than the sensations \"tasters\" experienced. This may imply that because of their taste bud profiles, \"tasters\" may be more sensitive to the tastes of different foods, and thus experience a more persistent sensation of those foods' tastes. Processing in the cerebral cortex The primary taste perception areas in the cerebral cortex are located",
"correspond to moderate or strong taste intensities. It is the prolonged moderate or strong taste intensities that persist even after a food is no longer present in the mouth that describe aftertaste sensation.\nFoods that have distinct aftertastes are distinguished by their temporal profiles, or how long their tastes are perceived during and after consumption. A sample testing procedure to measure a food's temporal profile would entail first recording the time of onset for initial taste perception when the food is consumed, and then recording the time at which there is no longer any perceived taste. The difference between these two",
"smell. This further shows the importance of taste and the correlation between taste and any change in physiological state, whether it be good or bad. Because rats rely upon taste and pairing it with a reaction rather than relying on later responses that involve the gastrointestinal tract, taste avoidance is just as prevalent as taste aversion, though the two don't necessarily go hand in hand.",
"liking are two aspects of the same process, so rewards are usually wanted and liked to the same degree. However, wanting and liking also change independently under certain circumstances. For example, rats that do not eat after receiving dopamine (experiencing a loss of desire for food) act as though they still like food. In another example, activated self-stimulation electrodes in the lateral hypothalamus of rats increase appetite, but also cause more adverse reactions to tastes such as sugar and salt; apparently, the stimulation increases wanting but not liking. Such results demonstrate that our reward system includes independent processes of wanting",
"a fine art, and every dish is an explosion of tastes and textures that will leave you hungry for more.\"",
"is perceived, they might actually eat less. \"We used to have foods that we chewed for 15, 20 or 30 times before we swallowed; it took more work to eat.\" Today she says \"There is rarely a food out there, outside of a sweet chewy candy, you have to chew more than 12 times and it is gone; so, you're in for the next hit to get more pleasure.\" She directed the radio audience to the value of the texture experience in food and the connection it has in the overall satisfaction of the consumer. In conclusion, she suggested",
"might also avoid eating tangerines and clementines because they look similar to oranges, and might lead one to think that they are also dangerous.\nStimulus generalization operates in most facets of animal and human life far beyond food tastes and aversion. Trauma and negative reinforcement of all kinds create aversion of other negative reaction to generalizations from the adverse event or events. And like taste aversion, the generalization may or not be conscious. Stimulus generalization is a factor in most \"superstitious behavior\", racism and prejudice of all kinds. Compared with taste avoidance Although the terms \"taste avoidance\" and \"taste",
"bile, black bile, phlegm and blood.\n These humours contain qualities such as hot, cool, moist, dry, etc., which must also remain in balance. Foods can be heating, cooling, or generative of one humour. Some foods produce good juices and others bad juices and often times cooking and preparation of the foods can change or improve the juices of the foods. In addition, foods may be easy to assimilate (easy to pass through the body), easily excreted, nourishing or not nourishing. In Hippocratic medicine, the qualities in foods are analogous to the four humors in the body: too much of",
"to it. According to this model one's attitude towards eating a high calorie dessert food would likely become more positive during times when an individual is hungry, as the centers associated with the satiation property of food are now more active and contributing more influence to the attitude regarding consuming the dessert. The other contributing attitudes do not need to have been suppressed (though they can be) for the temporary change in attitude all that is required, is an increase in the output of one contributor.\nContinued or repeated activation of the same related objects to a given attitudinal object will",
"you eat of it the less you feel inclined to stop. In fact, to eat Durians is a new sensation worth a voyage to the East to experience. ... as producing a food of the most exquisite flavour it is unsurpassed.\nWallace described himself as being at first reluctant to try it because of the aroma, \"but in Borneo I found a ripe fruit on the ground, and, eating it out of doors, I at once became a confirmed Durian eater\". He cited one traveller from 1599: \"it is of such an excellent taste that it surpasses in flavour all other",
"a hunger stimulant. Leptin, a hormone produced by adipose tissue, acts as hunger suppressant. Psychological factors Two psychological processes appear to be involved in regulating short-term food intake: liking and wanting. Liking refers to the palatability or taste of the food, which is reduced by repeated consumption. Wanting is the motivation to consume the food, which is also reduced by repeated consumption of a food and may be due to change in memory-related processes. Wanting can be triggered by a variety of psychological processes. Thoughts of a food may intrude on consciousness and be elaborated on, for instance, as when",
"an individual who adaptationally learns a particular appetite behavior rather than an evolutionarily innate, hedonic appetite preference. Food variability A \"hedonic rating\" of foods reflects those individuals are more likely to eat even though they aren't hungry. For example, functional magnetic resonance imaging (fMRI) scanning suggests that fed rats show a high preference for a mixture of fat and carbohydrate in the form of potato chips compared to their standard chow or single macronutrient foods. When binge eating occurs without the presence of energy deprivation, researchers think it is due to frequent exposure to palatable food. Another study evaluated how"
] |
Why are most gun optics and telescopic optics circular, when if they were square you'd have a larger FOV? | [
"So that the lens magnifying what you're looking at doesn't distort the image. It evenly magnifies it so that whoever is aiming can still accurately gauge the size and shape of the target.",
"Because the means to make a square lens equally precisely isn't cheaper. Actually, to make a precision square lens, they make a round lens and then cut out the square part of it. If you have the extra money to spend, there are always bigger and better optics to buy; and they are cheaper than their square counterparts would be."
] | [
"ring (if a front ring is being used). Since the best key to determining center is the amount of light passing through the apertures, a narrow, dim ring of light can actually be more difficult to work with than a larger, brighter ring. The precise sizes are quite subjective, and depend on both shooter preference and ambient lighting, which is why target rifles come with easily replaceable front sight inserts, and adjustable aperture mechanisms. Front aperture size selection Front aperture size is a compromise between a tight enough aperture to clearly define the aiming point and a loose enough aperture",
"axis front tilt, here are the trade offs in choosing between a small degree of tilt (say less than 3) and a larger tilt: A small tilt causes a wider or fatter wedge but one that is far off axis from the cone of light seen by the lens. Conversely, a large tilt (say 10 degrees) makes the wedge more aligned with the lens view, but with a narrower wedge. Thus, a modest tilt is often, or even usually, the best starting point.\nSmall and medium format cameras have fixed bodies that do not allow for misalignment of the film and",
"best key to determining center is the amount of light passing through the apertures, a narrow, dim ring of light can actually be more difficult to work with than a larger, brighter ring.\nThe precise sizes of the employed components are quite subjective, and depend on both shooter preference and ambient lighting, which is why target rifles come with easily replaceable front sight inserts, and adjustable aperture mechanisms.",
"the plane of sharp focus as well as parallel to the film. With forward tilt, the plane of sharp focus tilts even more and the near and far limits of acceptable focus form a wedge shape (viewed from the side). Thus, the lens still sees a cone shaped portion of whatever is in front of it while the wedge of acceptable focus is now more closely aligned with this cone. Therefore, depending on the shape of the subject, a wider aperture can be used, lessening concerns about camera stability due to slow shutter speed and diffraction due to too-small aperture.\nTilting",
"has proven useful for scientific purposes because of its equidistant (equiangular) projection, in which distance along the radius of the circular image is proportional to zenith angle. Full-frame fisheye As fisheye lenses gained popularity in general photography, camera companies began manufacturing fisheye lenses that enlarged the image circle to cover the entire rectangular frame, called a \"full-frame fisheye\".\nThe picture angle produced by these lenses only measures 180 degrees when measured from corner to corner: these have a 180° diagonal angle of view, while the horizontal and vertical angles of view will be smaller; for an equisolid angle-type 15 mm full-frame fisheye,",
"at infinity. At finite distances eye movement perpendicular to the device will cause parallax movement in the reticle image in exact relationship to eye position in the cylindrical column of light created by the collimating optics. Firearm sights, such as some red dot sights, try to correct for this via not focusing the reticle at infinity, but instead at some finite distance, a designed target range where the reticle will show very little movement due to parallax. Some manufactures market reflector sight models they call \"parallax free,\" but this refers to an optical system that compensates for off axis spherical",
"the centre. A diaphragm too close to the image plane risks the diaphragm itself being recorded as a circular shape or at the very least causing diffraction patterns at small apertures. In most lens designs the aperture is positioned about midway between the front surface of the objective and the image plane. In some zoom lenses it is placed some distance away from the ideal location in order to accommodate the movement of floating lens elements needed to perform the zoom function.\nMost modern lenses for 35mm format rarely provide a stop smaller than f/22 because of the diffraction effects caused",
"it on an incorrect notion that the designer could not aim his pistol. However, Margolin's raised plane of sight is a deliberate design feature that increased the accuracy of the pistol. The bridge that made the rear sight stationary combined with the unusually high sights allows the shooter to hold the pistol lower and aligns barrel with the shoulder, giving the shooter an improvement in control in rapid fire competition. The high line of sight is a design feature that the Margolin's designs had in common with the famous AK-47. The AK-47, designed between 1946 and",
"the center. Two prism wedges which, when aligned result in no deviation of the light, are inserted into the light path of one of the two lenses. By rotating the prisms in opposite directions using a differential gear, a degree of horizontal displacement of the image can be achieved. A stereoscopic telemeter looks similar, but has two eyepieces and uses a different principle, based on binocular vision. Applications Optical rangefinders using this principle, while applicable to several purposes, were widely used for military purposes—determining the range of a target—and for photographic use, determining the distance of a subject to photograph",
"lens used. However, since wide-angle lenses have a wider field of view, they are generally used from closer, while telephoto lenses have a narrower field of view and are generally used from farther away. For example, if standing at a distance so that a normal lens captures someone's face, a shot with a wide-angle lens or telephoto lens from the same distance will have exactly the same linear perspective geometry on the face, though the wide-angle lens may fit the entire body into the shot, while the telephoto lens captures only the nose. However, crops of these three images with",
"are, rather, cylindrical on one side (the side facing the cylinder axis) and nearly flat on the other (the side facing the frame). This patent defined the open-chamber gun concept, however, and quickly led to the development of the tround. Triangular cartridge theory During the 1950s U.S. military experiments with feeding devices for machine guns found that triangular cartridge cases would stack into 50 percent less space than conventional round cartridge casings. Due to problems in reliably feeding a triangular cartridge from a magazine into a triangular chamber in a gun barrel, the concept was not further pursued. Tround",
"lenses magnify the subject more, apparently compressing distance and (when focused on the foreground) blurring the background because of their shallower depth of field. Wider lenses tend to magnify distance between objects while allowing greater depth of field.\nAnother result of using a wide-angle lens is a greater apparent perspective distortion when the camera is not aligned perpendicularly to the subject: parallel lines converge at the same rate as with a normal lens, but converge more due to the wider total field. For example, buildings appear to be falling backwards much more severely when the camera is pointed upward from ground",
"was also aimed at the plate, although at an angle. This arrangement has the advantage that both the lens and electron gun lie in front of the imaging plate, which allows the system to be compartmentalized in a box-shaped enclosure with the lens completely within the case.\nAs the electron gun is tilted compared to the screen, its image of the screen is not as a rectangular plate, but a keystone shape. Additionally, the time needed for the electrons to reach the upper portions of the screen was longer than the lower areas, which were closer to the gun. Electronics in",
"German and French guns is unclear.\nThe early goniometric devices suffered from the problem that the layer (gun aimer) had to move around to look through the sight. This was very unsatisfactory if the aiming point was not to the front, particularly on larger guns. The solution was a periscopic panoramic sight, with the eyepiece to the rear and the rotatable top of the sight above the height of the layer’s head. The German Goertz 1906 design was selected by both the British and the Russians. The British adopted the name \"Dial Sight\" for this instrument; the US used \"Panoramic Telescope\";",
"Sonnar's three cell with six air-glass surfaces versus the Double Gauss's four and eight made it less vulnerable to flare. Its telephoto effect also made the lens shorter, an important factor for the Leica and Contax 35mm RFs designed to be compact.\nAs maximum aperture continued to increase, the Double Gauss's greater symmetry promised easier aberration correction. This was especially important for SLRs because, without the parallax error of RFs, they also began offering much closer focusing distances (typically a half meter instead a whole meter). The Double Gauss became the preferred normal lens design in the 1950s with the availability",
"Reticle Firearms Telescopic sights for firearms, generally just called scopes, are probably the device most often associated with crosshairs. Motion pictures and the media often use a view through crosshairs as a dramatic device, which has given crosshairs wide cultural exposure. Reticle shape While the traditional thin crossing lines are the original and still the most familiar cross-hair shape, they are really best suited for precision aiming at high contrast targets, as the thin lines are easily lost in complex backgrounds, such as those encountered while hunting. Thicker bars are much easier to discern against a complex background, but lack",
"fit the shape of the frame that will hold them. Frame styles vary and fashion trends change over time, resulting in a multitude of lens shapes. For lower power lenses, there are few restrictions which allow for many trendy and fashionable shapes. Higher power lenses can cause distortion of peripheral vision and may become thick and heavy if a large lens shape is used. However, if the lens becomes too small, the field of view can be drastically reduced.\nBifocal, trifocal, and progressive lenses generally require a taller lens shape to leave room for the different segments",
"Wide-angle lens Angle of view A lens is considered wide-angle when it covers the angle of view between 64° and 84° which in return translates to 35–24mm lens in 35mm film format. Characteristics Longer lenses magnify the subject more, apparently compressing distance and (when focused on the foreground) blurring the background because of their shallower depth of field. Wider lenses tend to magnify distance between objects while allowing greater depth of field.\nAnother result of using a wide-angle lens is a greater apparent perspective distortion when the camera is not aligned perpendicularly to the subject: parallel lines converge at the same",
"benefits to EF-S lenses, both related to the smaller (1.6× or APS-C) sensor size. One is that since a lens designed for a smaller sensor need only project an image circle large enough to cover the small sensor, the lens itself can be smaller; it can therefore also be lighter and have lower materials costs, since the lens elements, made of relatively heavy and expensive optical glass, will be smaller than in a comparable full-frame lens. Such a lens, if used on a body with a larger sensor, would leave the outer portions of the sensor outside its image circle,",
"Fresnel lenses use segments with curved cross-sections and produce sharp images, while non-imaging lenses have segments with flat cross-sections, and do not produce sharp images. As the number of segments increases, the two types of lens become more similar to each other. In the abstract case of an infinite number of segments, the difference between curved and flat segments disappears. Imaging Fresnel lenses are used as simple hand-held magnifiers. They are also used to correct several visual disorders, including ocular-motility disorders such as strabismus. Fresnel lenses have been used to increase the visual size of CRT displays in pocket",
"it has full micrometric movements. All the parts related to lenses and backs are interchangeable. The lenses are on board or on bayonet, le lens boards are flat or recessed, the lenses have no need of helical focusing mount. The backs and their accessories are in common with the Bicam system. The bellows is interchangeable. The peculiarity of the S5 micron is to be built on two separate shifting blocks that do not interfere between them allowing the two standards to get to touching. This characteristic make it possible to use extreme wide angle lenses and to perform adjustment movements",
"of the f/2.8 Mk I remains nearly circular from f/2.8 to f/5.6, according to the Canon Press release from 2002. Characteristic of zoom lenses, it exhibits some barrel distortion at its shortest focal length. Reverse zoom An unusual aspect of the f/2.8 Mk I lens (and the 28–70mm f/2.8L) is that its barrel extends as it zooms toward its shortest focal length. When used with the supplied lens hood, which attaches to a non-moving part of the lens, this extension results in a properly matched shade at every angle of view. Most zoom lens hoods are designed for only the",
"remains at a constant size compared to the target, while rear plane reticles remain a constant size to the user as the target image grows and shrinks. Front focal plane reticles are slightly more durable, but most American users prefer that the reticle remains constant as the image changes size, so nearly all modern American variable power telescopic sights are rear focal plane designs. American and European high end optics manufacturers often leave the customer the choice between a FFP or SFP mounted reticle. Collimated reticles Collimated reticles are produced by non-magnifying optical devices such as reflector sights (often called",
"a circle. For this reason NCGs in most cases are not round, but round NCGs looking like regular gears are also possible (small ratio variations result from meshing area modifications).\nGenerally NCG should meet all the requirements of regular gearing, but in some cases, for example variable axle distance, could prove impossible to support and such gears require very tight manufacturing tolerances and assembling problems arise. Because of complicated geometry, NCGs are most likely spur gears and molding or electrical discharge machining technology is used instead of generation.",
"Double-Gauss lens The double Gauss lens is a compound lens used mostly in camera lenses that reduces optical aberrations over a large focal plane. Design The double Gauss lens consists of two back-to-back Gauss lenses (a design with a positive meniscus lens on the object side and a negative meniscus lens on the image side) making two positive meniscus lenses on the outside with two negative meniscus lenses inside them. The symmetry of the system and the splitting of the optical power into many elements reduces the optical aberrations within the system. There are many variations of the design.",
" B shows a concave sided SWC, typical of a lightweight .45 ACP bullet used in bullseye shooting. The concave sides reduce the bullet weight, and thus the recoil, while keeping the overall length of the bullet long enough to feed reliably in a semi-automatic pistol such as the M1911 commonly found in bullseye competitions.\nSome of the most famous SWC designs were developed by Elmer Keith for use in handgun hunting. These designs (C) use a wider front, and convex sides on the \"cone\" in front. This puts more weight in the front of the bullet, allowing a heavier",
"a stabilizing gyroscope with a vertical spin axis corrects for deck tilt, and stabilizes the optical sights and radar antenna. However, gun barrels point in a direction different from the line of sight to the target, to anticipate target movement and fall of the projectile due to gravity, among other factors. Gun mounts roll and pitch with the deck plane, but also require stabilization. Gun orders include angles computed from the vertical gyro data, and those computations involve Euler angles.\nEuler angles are also used extensively in the quantum mechanics of angular momentum. In quantum mechanics, explicit descriptions of the representations",
"will still be useful from 50 to 200 m (55 to 219 yd) without needing further adjustment. Optical sights In some reticled optical instruments such as telescopes, microscopes or in telescopic sights (\"scopes\") used on small arms and theodolites, parallax can create problems when the reticle is not coincident with the focal plane of the target image. This is because when the reticle and the target are not at the same focus, the optically corresponded distances being projected through the eyepiece are also different, and the user's eye will register the difference in parallaxes between the reticle and the target (whenever",
"used consisted of 2.5×, 3× and 4× models, made by manufactures like Görtz, Gérard, Oige, Zeiss, Hensoldt, Voigtländer and various civilian models from manufacturers like Bock, Busch and Füss. Several different mountings produced by various manufacturers were used. Even with a turned-down bolt handle (unless it is low-profile as is common practice with modern hunting rifles), optics mounted low directly above the receiver will not leave enough space between the rifle and the telescopic sight body for unimpaired operation of the bolt or three-position safety catch lever. This ergonomic problem was solved by mounting the telescopic sight relatively high above",
"fixed-focus convex lenses is used to provide a fixed magnification, but with the crucial distinction that the same optical components in the same spacing will, if physically inverted, result in a different, though still fixed, magnification. This allows one set of lenses to provide two different magnifications ; two sets of lenses to provide four magnifications on one turret ; three sets of lenses provide six magnifications and will still fit into one turret. Practical experience shows that such Galilean optics systems are as useful as a considerably more expensive zoom system, with the advantage of knowing the magnification in use as"
] |
How do antidepressants and antipsychotics work in the brain? | [
"It depends what drugs you're talking about. Each drug works slightly differently towards a desired effect. For examples, selective serotonin reuptake inhibitors (SSRIs) work by blocking the receptors that bind to and destroy serotonin (the brain's happy chemical). Since your brain naturally doesn't produce enough serotonin, this is beneficial. Each SSRI works slightly differently, but the end result is largely the same.\n\nAnti-psychotics are a complete mixed bag. If you search \"*nameofdrug* pharmacokinetic action\" you can get an idea of how each one works",
"Your brain is a network of cells called neurons. Thought, decisions, and making your muscles move are all the result of signals that neurons pass along down different pathways. These messages are send from one neuron to the next by use of messengers called \"neurotransmitters.\" Examples of common neurotransmitters are serotonin, dopamine, norepinephrine, and acetylcholine among others. Each area of your brain uses different combinations of these signals to cause the messages to be passed along in different ways. There is a theory that depression and psychotic symptoms arise when somewhere the message machinery isn't working the way it should; either there is too much or too little stimulation by one of these neurotransmitters. The drugs generally block or otherwise manipulate the message transmission process to try to get the messages flowing the way we want them to. The good thing is that they work for a lot of people. The bad thing is that when we give you a drug, it goes to your entire brain, not just the part that has a bit of trouble. We can't only block the dopamine receptors in one part of your brain that is causing hallucinations, so it may cause side effects related to changing the dopamine signalling in other areas.",
"As other people have mentioned, most antidepressants are SSRIs. We really don't know why SSRIs work. The \"serotonin deficiency\" model for depression is almost certainly false -- or at least incomplete -- because SSRIs begin inhibiting reuptake immediately, but it usually takes a few weeks for a patient on an SSRI to start seeing improvement.",
"Think of your brain as an electrical outlet. It needs the the Mirtazapine or Aripiprazole cables to complete a connection to power devices in your brain. If none of the cables fit into the sockets, then your devices have no power."
] | [
"types of antidepressants may by used such as TCAs (tricyclic antidepressants), SSRIs, and MAOIs, but more studies are still needed about TCAs recommendations. Antidepressants, in general, may also work by playing a neuroprotective role in how they relieve anxiety and depression. It's thought that antidepressants may increase the effects of brain receptors that help nerve cells keep sensitivity to glutamate which is an organic compound of a nonessential amino acid. This increased support of nerve cells lowers glutamate sensitivity, providing protection against the glutamate overwhelming and exciting key brain areas related to depression. Antidepressant medications are often the first",
"help. Antidepressants must be used with caution in brain injury people due to the potential for undesired effects because of the already altered brain chemistry. Long term psychological and physiological effects There are multiple responses of the body to brain injury, occurring at different times after the initial occurrence of damage, as the functions of the neurons, nerve tracts, or sections of the brain can be affected by damage. The immediate response can take many forms. Initially, there may be symptoms such as swelling, pain, bruising, or loss of consciousness. Post-traumatic amnesia is also common with brain damage, as is",
"their respective receptors located in the CTZ. The antiemetic medications can block the binding site on a chemoreceptor in the CTZ, so that the emetic agent cannot bind to it to cause its emetic effects. Another way that antiemetic medications can work is by binding to a chemoreceptor in the CTZ, but instead of initiate vomiting, the medication can cause the receptors to send signals to the other parts of the vomiting center that inhibit emesis. Also, some anti-emetic medications work by lowering the amount of dopamine levels in the brain, which in turn effects how much dopamine comes in",
"Antidepressants have been found to assist in the elimination of cognitive dysfunction associated with depression, whereas cognitive dysfunction associated with true dementia continues along a steady gradient. In cases where antidepressant therapy is not well tolerated, patients can consider electroconvulsive therapy as a possible alternative. However, studies have revealed that patients who displayed cognitive dysfunction related to depression eventually developed dementia later on in their lives.\nThe development of treatments for dementia has not been as fast as those for depression. Thus far, cholinesterase inhibitors are the most popular drug used to slow the progression of the disease and improves cognitive",
"William Cohen's way of explaining the physiological and pharmacological responses that the body has to psychoactive drugs, those chemicals that can pass through the blood brain barrier and produce a mental effect in the central nervous system. Thus, uppers stimulate, downers depress, and psychedelic drugs have a variety of effects on the neurotransmitters.",
"in any of the neuroacanthocytosis disorders. Medication may be administered to decrease the involuntary movements produced by these syndromes. Antipsychotics are used to block dopamine, anticonvulsants treat seizures and botulinum toxin injections may control dystonia. Patients usually receive speech, occupational and physical therapies to help with the complications associated with movement. Sometimes, physicians will prescribe antidepressants for the psychological problems that accompany neuroacanthocytosis. Some success has been reported with Deep brain stimulation.\nMouthguards and other physical protective devices may be useful in preventing damage to the lips and tongue due to the orofacial chorea and dystonia typical of chorea acanthocytosis.",
"of agoraphobia. Antidepressants are important because some have antipanic effects. Antidepressants should be used in conjunction with exposure as a form of self-help or with cognitive behaviour therapy. A combination of medication and cognitive behaviour therapy is sometimes the most effective treatment for agoraphobia.\nBenzodiazepines, antianxiety medications such as alprazolam and clonazepam, are used to treat anxiety and can also help control the symptoms of a panic attack. If taken for too long, they can cause dependence. Treatment with benzodiazepines should not exceed 4 weeks. Side effects may include confusion, drowsiness, light-headedness, loss of balance, and memory loss. Alternative medicine Eye",
"the brain that is involved in mood regulation and memory. Antidepressants drugs have a similar effect but to a lesser extent than ECT\".\nECT is prescribed by a psychiatrist. Indications for ECT use were initially for schizophrenia, and those who poorly respond to medications. ECT can be used in the treatment for those with major depressive disorder, depressed bipolar disorder, manic bipolar disorder, schizophrenia, manic excitement, and catatonia. \"Decision to conduct ECT therapy usually comes after there has been failure in other forms of treatment, including medication and psychotherapy\".\nPrior to performing ECT, a set of tests are performed to ensure the",
"without newborn neurons, antidepressants are unable to restore the regulation of the stress response and recovery becomes impossible.\nSome studies have hypothesized that learning and memory are linked to depression, and that neurogenesis may promote neuroplasticity. One study proposes that mood may be regulated, at a base level, by plasticity, and thus not chemistry. Accordingly, the effects of antidepressant treatment would only be secondary to change in plasticity. However another study has demonstrated an interaction between antidepressants and plasticity; the antidepressant fluoxetine has been shown to restore plasticity in the adult rat brain. The results of this study imply that instead",
"neurogenesis is mediated by the action of antidepressants. Chronic use of antidepressant increased neurogenesis in the hippocampus of rats. Other animal research suggests that long term drug-induced antidepressants effects modulate the expression of genes mediated by clock genes, possibly by regulating the expression of a second set of genes (i.e. clock-controlled genes).\nThe delayed onset of clinical effects from antidepressants indicates involvement of adaptive changes in antidepressant effects. Rodent studies have consistently shown upregulation of the 3, 5-cyclic adenosine monophosphate (cAMP) system induced by different types of chronic but not acute antidepressant treatment, including serotonin and norepinephrine uptake inhibitors, monoamine oxidase",
"Psycholeptic In pharmacology, a psycholeptic is a medication which produces a calming effect upon a person. Such medications include barbiturates, benzodiazepines, nonbenzodiazepines, phenothiazines, opiates/opioids, carbamates, ethanol, 2-methyl-2-butanol, cannabinoids (in some classifications), some antidepressants, neuroleptics, and some anticonvulsants. Many herbal medicines may also be classified as psycholeptics (e.g. kava)\nThe psycholeptics are classified under N05 in the Anatomical Therapeutic Chemical Classification System.",
"to specific drug classes within the ATC system. Another major classification system is the Biopharmaceutics Classification System. This classifies drugs according to their solubility and permeability or absorption properties.\nPsychoactive drugs are chemical substances that affect the function of the central nervous system, altering perception, mood or consciousness. These drugs are divided into different groups like: stimulants, depressants, antidepressants, anxiolytics, antipsychotics, and hallucinogens. These psychotropic drugs have been proven useful in treating wide range of medical conditions including mental disorders around the world. The most widely used drugs in the world include caffeine, nicotine and alcohol, which are also considered recreational",
"the presynaptic neurone to stop its action, it is then reused or broken down by monoamine oxidase. Psychedelic drugs The serotonergic psychedelic drugs psilocin/psilocybin, DMT, mescaline, psychedelic mushroom and LSD are agonists, primarily at 5HT2A/ receptors. The empathogen-entactogen MDMA releases serotonin from synaptic vesicles of neurons. Antidepressants Drugs that alter serotonin levels are used in treating depression, generalized anxiety disorder and social phobia. Monoamine oxidase inhibitors (MAOIs) prevent the breakdown of monoamine neurotransmitters (including serotonin), and therefore increase concentrations of the neurotransmitter in the brain. MAOI therapy is associated with many adverse drug reactions, and patients are at risk of",
"may be aversive for individuals for whom the effects could worsen affective deficits. CNS depressants Alcohol and sedative/hypnotic drugs, such as barbiturates and benzodiazepines, are central nervous system (CNS) depressants that lower inhibitions via anxiolysis. Depressants produce feelings of relaxation and sedation, while relieving feelings of depression and anxiety. Though they are generally ineffective antidepressants, as most are short-acting, the rapid onset of alcohol and sedative/hypnotics softens rigid defenses and, in low to moderate doses, provides relief from depressive affect and anxiety. As alcohol also lowers inhibitions, alcohol is also hypothesized to be used by those who normally constrain emotions",
"Critical Psychiatry Network. Neurotransmitters Psychoactive drugs exert their sensory and behavioral effects almost entirely by acting on neurotransmitters and by modifying one or more aspects of synaptic transmission. Neurotransmitters can be viewed as chemicals through which neurons primarily communicate; psychoactive drugs affect the mind by altering this communication. Drugs may act by 1) serving as a precursor for the neurotransmitter; 2) inhibiting neurotransmitter synthesis; 3) preventing storage of neurotransmitter in the presynaptic vesicle; 4) stimulating or inhibiting neurotransmitter release; 5) stimulating or blocking post-synaptic receptors; 6) stimulating autoreceptors, inhibiting neurotransmitter release; 7) blocking autoreceptors, increasing neurotransmitter release; 8) inhibiting neurotransmission",
"produce a more rapid onset of action and greater efficacy than traditional antidepressants.\nDA may promote neurotrophic processes in the adult hippocampus, as 5-HT and NA do. It is thus possible that the stimulation of multiple signalling pathways resulting from the elevation of all three monoamines may account, in part, for an accelerated and/or greater antidepressant response.\nDense connections exist between monoaminergic neurons. Dopaminergic neurotransmission regulates the activity of 5-HT and NE in the dorsal raphe nucleus (DR) and locus coeruleus (LC), respectively. In turn, the ventral tegmental area (VTA) is sensitive to 5-HT and NE release.\nIn the case of SSRIs, the",
"antidepressants administered for this disease are selective serotonin reuptake inhibitors (SSRIs) and their efficacy may be explained by neurogenesis. In a normal brain, an increase in serotonin causes suppression of the corticotropin-releasing hormone (CRH) through connection to the hippocampus. It directly acts on the paraventricular nucleus to decrease CRH release and down regulate norepinephrine functioning in the locus coeruleus. Because CRH is being repressed, the decrease in neurogenesis that is associated with elevated levels of it is also being reversed. This allows for the production of more brain cells, in particular at the 5-HT1a receptor in the dentate gyrus of",
"model.\"\nCognitive biases have been shown in a wide range of species including rats, dogs, rhesus macaques, sheep, chicks, starlings and honeybees. Self-medication with psychoactive drugs Humans can suffer from a range of emotional or mood disorders such as depression, anxiety, fear and panic. To treat these disorders, scientists have developed a range of psychoactive drugs such as anxiolytics. Many of these drugs are developed and tested by using a range of laboratory species. It is inconsistent to argue that these drugs are effective in treating human emotions whilst denying the experience of these emotions in the laboratory",
"and MAOIs inhibit the reuptake or metabolism of norepinephrine and serotonin in the brain, which results in higher concentrations of neurotransmitters. Antidepressants that have dual mechanisms of action inhibit the reuptake of both serotonin and norepinephrine and, in some cases, inhibit with weak effect the reuptake of dopamine.\nAntidepressants affect variable neuronal receptors like muscarinic-cholinergic, α₁- and α₂-adrenergic, and H₁-histaminergic receptors, and sodium channels in the cardiac muscle, leading to decreased cardiac conduction and cardiotoxicity. Selectivity of antidepressant agents are based on the neurotransmitters that are thought to influence symptoms of depression.\nDrugs that selectively block the reuptake of serotonin and norepinephrine",
"Certain antidepressant drugs such as fluoxetine and fluvoxamine, which are generally thought to affect depression by acting as selective serotonin reuptake inhibitors (SSRIs), have also been found to normalize the levels of certain neurosteroids (which are frequently deficient in depressed patients) at doses that are inactive in affecting the reuptake of serotonin. This suggests that other actions involving neurosteroids may also be at play in the effectiveness of these drugs against depression. Benzodiazepine effects on neurosteroids Benzodiazepines may influence neurosteroid metabolism by virtue of their actions on translocator protein (TSPO; \"peripheral benzodiazepine receptor\"). The pharmacological actions of benzodiazepines at the",
"(SSRI) antidepressants have been shown in randomized controlled trials to improve the attendant symptoms of anxiety and depression, such as anger and hostility, associated with BPD in some patients. According to Listening to Prozac, it takes a higher dose of an SSRI to treat mood disorders associated with BPD than depression alone. It also takes about three months for benefit to appear, compared to the three to six weeks for depression. Antipsychotics The newer atypical antipsychotics are claimed to have an improved adverse effect profile than the typical antipsychotics. Antipsychotics are also sometimes used to treat distortions in thinking or",
"If D2-blocking drugs are administered the blocked dopamine spills over to the D1 receptors. The increased adenylate cyclase activity affects genetic expression in the nerve cell, which takes time. Hence antipsychotic drugs take a week or two to reduce the symptoms of psychosis. Moreover, newer and equally effective antipsychotic drugs actually block slightly less dopamine in the brain than older drugs whilst also blocking 5-HT2A receptors, suggesting the 'dopamine hypothesis' may be oversimplified. Soyka and colleagues found no evidence of dopaminergic dysfunction in people with alcohol-induced psychosis and Zoldan et al. reported moderately successful use of ondansetron, a 5-HT₃",
"hyperactivity, impulsivity, and attentional problems. For co-morbid disorders with FXS, antidepressants such as selective serotonin reuptake inhibitors (SSRIs) are utilized to treat the underlying anxiety, obsessive-compulsive behaviors, and mood disorders. Following antidepressants, antipsychotics such as risperidone and quetiapine are used to treat high rates of self-injurious, aggressive and aberrant behaviors in this population (Bailey Jr et al., 2012). Anticonvulsants are another set of pharmacological treatments used to control seizures as well as mood swings in 13%–18% of individuals suffering from FXS. Drugs targeting the mGluR5 (metabotropic glutamate receptors) that are linked with synaptic plasticity are especially beneficial for targeted symptoms",
"usually insufflated (inhaled or \"snorted\"). Effects Psychoactive drugs operate by temporarily affecting a person's neurochemistry, which in turn causes changes in a person's mood, cognition, perception and behavior. There are many ways in which psychoactive drugs can affect the brain. Each drug has a specific action on one or more neurotransmitter or neuroreceptor in the brain.\nDrugs that increase activity in particular neurotransmitter systems are called agonists. They act by increasing the synthesis of one or more neurotransmitters, by reducing its reuptake from the synapses, or by mimicking the action by binding directly to the postsynaptic receptor. Drugs that reduce neurotransmitter",
"for antipsychotics from discontinuation-relapse studies may be flawed, because they do not take into account that antipsychotics may sensitize the brain and provoke psychosis if discontinued, which may then be wrongly interpreted as a relapse of the original condition.\nUse of this class of drugs has a history of criticism in residential care. As the drugs used can make patients calmer and more compliant, critics claim that the drugs can be overused. Outside doctors can feel under pressure from care home staff. In an official review commissioned by UK government ministers it was reported that the needless use of antipsychotic medication",
"antipsychotics when the patient has not responded to an antidepressant is also known to increase the effectiveness of antidepressant drugs, albeit at the cost of more frequent and potentially serious side effects. There is some evidence for the addition of a thyroid hormone, triiodothyronine, in patients with normal thyroid function. Stephen M. Stahl, renowned academician in psychopharmacology, has stated resorting to a dynamic psychostimulant, in particular, d-amphetamine is the \"classical augmentation strategy for treatment-refractory depression\". However, the use of stimulants in cases of treatment-resistant depression is relatively controversial. Efficacy of medication and psychotherapy Antidepressants are statistically superior to placebo but",
"antitussives. Psychoactive drugs are commonly prescribed to patients with psychiatric disorders. However, certain critics believe that certain prescription psychoactives, such as antidepressants and stimulants, are overprescribed and threaten patients' judgement and autonomy.",
"sensitivity of these receptors, a process called desensitization or tolerance. Sensitization and desensitization are more likely to occur with long-term exposure, although they may occur after only a single exposure. These processes are thought to play a role in drug dependence and addiction. Physical dependence on antidepressants or anxiolytics may result in worse depression or anxiety, respectively, as withdrawal symptoms. Unfortunately, because clinical depression (also called major depressive disorder) is often referred to simply as depression, antidepressants are often requested by and prescribed for patients who are depressed, but not clinically depressed. Legality The legality of psychoactive drugs has been",
"favor of the use of antidepressants for the treatment of suicidal ideation, in some cases antidepressants are claimed to be the cause of suicidal ideation. Upon the start of using antidepressants, many clinicians will note that sometimes the sudden onset of suicidal ideation may accompany treatment. This has caused the Food and Drug Administration (FDA) to issue a warning stating that sometimes the use of antidepressants may actually increase the thoughts of suicidal ideation. Medical studies have found antidepressants help treat cases of suicidal ideation and work especially well with psychological therapy. Lithium reduces the risk of suicide in people",
"to both healthy controls and patients treated with antidepressants. The function of CREB can be modulated via a signalling pathway resulting from the binding of serotonin and noradrenaline to post-synaptic G-protein coupled receptors. Dysfunction of these neurotransmitters is also implicated in major depressive disorder.\nCREB is also thought to be involved in the growth of some types of cancer. Involvement in circadian rhythms Entrainment of the mammalian circadian clock is established via light induction of PER. Light excites melanopsin-containing photosensitive retinal ganglion cells which signal to the suprachiasmatic nucleus (SCN) via the retinohypothalamic tract (RHT). Excitation of the RHT signals"
] |
Why do computers still feel so slow despite hardware becoming so much faster over the past few decades? | [
"Software today has a plethora of additional features. You might only use Word for extremely basic word processing, but Auto Save, graphs, interoperability with other Office products, etc. mean that it needs more memory. Additionally, a heavier load on memory means faster performance.\n\nOther than that, hardware might be much faster, but if you have 25 browser toolbars and 100 other plugins, it's your fault that you can't load a text-only page.\n\nHowever, on my computer right now, I have 6 remote desktop sessions, Outlook, Chrome, Firefox, IE, Safari, Snipping Tool, Skype, GoToMeeting, Trillian, several instances of Windows Explorer, Notepad++, VS2013, Photoshop, and Illustrator open simultaneously. All of this is on a portable machine that's 1/10th the size of the computer I used to use in 2004. Try running even half of that (even with 2004 software) on an old machine and let me know if you still think computers today feel slow.\n\nThe real reason you think everything is slow is almost entirely a combination of your perception and poor use of resources."
] | [
"work traditionally considered to be \"routine.\"\nTheodore Modis and Jonathan Huebner argue that the rate of technological innovation has not only ceased to rise, but is actually now declining. Evidence for this decline is that the rise in computer clock rates is slowing, even while Moore's prediction of exponentially increasing circuit density continues to hold. This is due to excessive heat build-up from the chip, which cannot be dissipated quickly enough to prevent the chip from melting when operating at higher speeds. Advancements in speed may be possible in the future by virtue of more power-efficient CPU designs and multi-cell processors.",
"while memory speed only improved at 10%. Given these trends, it was expected that memory latency would become an overwhelming bottleneck in computer performance.\nCPU speed improvements slowed significantly partly due to major physical barriers and partly because current CPU designs have already hit the memory wall in some sense. Intel summarized these causes in a 2005 document.\nFirst of all, as chip geometries shrink and clock frequencies rise, the transistor leakage current increases, leading to excess power consumption and heat... Secondly, the advantages of higher clock speeds are in part negated by memory latency, since memory access times have not",
"Although computers have existed for most of the 20th century, some economic researchers have noted a lag in productivity growth caused by computers that didn't come until the late 1990s.\"",
"rapidly increasing in size and decreasing in cost. However, they were not improving in speed at the same rate. This meant the time needed to access data from memory was growing in relative terms in comparison to the speed of the CPUs. This argued for the inclusion of more registers, giving the CPU more temporary values to work with. A larger number of registers meant more bits in the computer word would be needed to encode the register number, which suggested that the instructions themselves be reduced in number to free up room.\nFinally, a paper by Andrew Tanenbaum demonstrated that",
"replace the jumpers.\nHowever, these newer systems shared one quality with their earlier cousins, in that everyone on the bus had to talk at the same speed. While the CPU was now isolated and could increase speed, CPUs and memory continued to increase in speed much faster than the buses they talked to. The result was that the bus speeds were now very much slower than what a modern system needed, and the machines were left starved for data. A particularly common example of this problem was that video cards quickly outran even the newer bus systems like PCI, and computers",
"the journey in one hour. Computer technology The term tends to be used quite a bit when comparing computer hardware. During the latter 1990s, the price–performance ratios of midrange and large mainframe systems fell tremendously in comparison to a number of smaller microcomputers handling the same load. Many companies were forced out of the industry as this happened, including DEC, Data General and many multiprocessor vendors such as Sequent Computer Systems and Pyramid Technology.",
"the input. Since the 1950s computers have seen dramatic increases in both the available computational power and in the available amount of memory, so current acceptable levels would have been unacceptable even 10 years ago. In fact, thanks to the approximate doubling of computer power every 2 years, tasks that are acceptably efficient on modern smartphones and embedded systems may have been unacceptably inefficient for industrial servers 10 years ago.\nComputer manufacturers frequently bring out new models, often with higher performance. Software costs can be quite high, so in some cases the simplest and cheapest way of getting higher performance might",
"computers were developed, however, the speed of card reading, magnetic tape, and early disk drives, along with newer high speed transistorized circuits, meant that processing could be done at a much higher speed, and a faster print mechanism was needed to match the resulting productivity. IBM's early computers, such as the IBM 701, were developed for higher speed calculation than was possible with earlier electromechanical calculating machines. They did not have a demand for high speed printing, as the results of massive calculations produced very little printed output. Around the time that the 1403 was introduced, IBM's",
"1960s, in the 1990s computer technologies had become much more accessible to artists which then led to a large increase in the digital performance activity. It was during this time that computer hardware was built to become much more “user – friendly” and we then witnessed the invention of the digital camera and the home PC's (Personal Computer) and the establishment of the World Wide Web. It was during this period of time which would then go on to be known as being the ‘Digital Revolution’. During the period of the ‘Digital Revolution’ there was a great influence on the",
"market with the Apple and perhaps with other business computers. With the present disk drive, though, it is hard-pressed to lose its image as a toy.\nThe C-64's designers blamed the 1541's slow speed on the marketing department's insistence that the computer be compatible with the 1540, which was slow because of a flaw in the 6522 VIA interface controller. Initially, Commodore intended to use a hardware shift register (one component of the 6522) to maintain fast drive speeds with the new serial interface. However, a hardware bug with this chip prevented the initial design from working as anticipated, and the",
"standard. One of the most common issues was that as PC clones became more common, PC manufacturers began increasing the processor speed to maintain a competitive advantage. Unfortunately, because the ISA bus was originally locked to the processor clock, this meant that some 286 machines had ISA buses that ran at 10, 12, or even 16 MHz. In fact, the first system to clock the ISA bus at 8 MHz was the turbo 8088 clones that clocked the processors at 8 MHz. This caused many issues with incompatibility, where a true IBM-compatible third-party card (designed for an 8 MHz or 4.77 MHz bus)",
"processor and its companion chipset.\nThe graphics, sound, and PCI bus ran at the same speed as the processor clock also due to tight integration. This made the processor appear much slower than its actual rated speed. However, the graphics system is able to use the main system memory providing for significant cost savings on the basic systems and embedded controllers in the market for this platform.",
"same year. (\"Slower than average\" in their own words when compared to other occupations)\" and is down from 7% for the 2012 to 2022 BLS estimate and is further down from 9% in the BLS 2010 to 2020 estimate.\" Today, computer hardware is somehow equal to electronic and computer engineering (ECE) and has been divided into many subcategories; the most significant is embedded system design. Computer software engineering According to the U.S. Bureau of Labor Statistics (BLS), \"computer applications software engineers and computer systems software engineers are projected to be among the faster than average growing occupations\" The expected ten-year",
"At the very beginning the computer was unable to run at optimal speed or make use of the full power of the processors, a problem which DGSCA was already well aware of (it was inaugurated before its final installation was completed). Technically a whole 1/3 of the nodes were unable to run due to temperature issues in the work room (when running all nodes at 100% their capacity). In recent dates, the computer's performance has been stabilized (with the addition of two more cooling units) and is near optimal condition. \nThis prompted an alarmist reaction among the first users which",
"few decades, even economically. While transistor count increases according to Moore's law, overall performance rises only very slowly. According to Lanier, this is because human productivity in developing software increases only slightly, and software becomes more bloated and remains as error-prone as it ever was. \"Simply put, software just won't allow it. Code can't keep up with processing power now, and it never will.\"\nAt the end he warns that the biggest problem of any theory (esp. ideology) is not that it is false, \"but when it claims to be the sole and utterly complete path to understanding life and reality.\"",
"problem of using the above scheme is that fast CPUs compute much faster than slow CPUs. Further, higher-end computer systems also have sophisticated pipelines and other advantageous features that facilitate computations. As a result, a spammer with a state-of-the-art system will hardly be affected by such deterrence while a typical user with a mediocre system will be adversely affected. If a computation takes a few seconds on a new PC, it may take a minute on an old PC, and several minutes on a PDA, which might be a nuisance for users of old PCs, but probably unacceptable for users",
"computers, which allow a number of hard drives to be connected without the need for a card. However, these high-performance systems are generally too expensive to implement in low-end devices, like a mouse. This has led to the parallel development of a number of low-performance bus systems for these solutions, the most common example being the standardized Universal Serial Bus (USB). All such examples may be referred to as peripheral buses, although this terminology is not universal.\nIn modern systems the performance difference between the CPU and main memory has grown so great that increasing amounts of high-speed memory is built",
"it. It was quite reasonable to connect a CPU and RAM to VME on separate cards to build a computer. However, as the speed of the CPUs and RAM rapidly increased, VME was quickly overwhelmed. Increasing the speed of VME was not easy, because all of the parts plugged into it would have to be able to support these faster speeds as well.\nFuturebus looked to fix these problems and create a successor to systems like VMEbus with a system that could grow in speed without affecting existing devices. In order to do this the primary technology of Futurebus was built",
"the Sheepshaver \"Classic\" emulator on current Mac computers. Due to speed/memory increases of current hardware, performance under emulation is superior to native operation on older machines, and stability does not seem to have been compromised.\nAmong its other anomalies, the limited accuracy QuickDraw routines were not sufficient for direct use with highly accurate applications such as computer numerical control (CNC) machines.\nSome versions of the program (including 2.0 v3) have a bug where users are unable to save their work, encountering an error stating that an additional 1k of disk space is required. This is due to a limitation of saving to",
"editor, calling it \"maddeningly slow in many cases\". It noted that the QX-10's 4 MHz processor was not at fault, because other word processors ran as fast as on other 8-bit CP/M computers. Despite Epson's promise of speed improvements, Valdocs 2 remained slow; InfoWorld's 1985 review of the QX-16 reported that the computer was \"severely limited by [Valdocs'] slow operation\". While the reviewer did not report crashes, a \"small but perceptible delay\" between pushing a key and the character appearing on the screen when using the word processor grew over time to be \"significant and would annoy heavy-duty word processing users\",",
"were widely used in scientific and industrial applications even after the advent of digital computers, because at the time they were typically much faster, but they started to become obsolete as early as the 1950s and 1960s, although remained in use in some specific applications, such as aircraft flight simulators, the flight computer in aircraft, and for teaching control systems in universities. More complex applications, such as aircraft flight simulators and synthetic aperture radar, remained the domain of analog computing (and hybrid computing) well into the 1980s, since digital computers were insufficient for the task. Precursors This is a list",
"I/O bus.\nThese simple bus systems had a serious drawback when used for general-purpose computers. All the equipment on the bus had to talk at the same speed, as it shared a single clock.\nIncreasing the speed of the CPU becomes harder, because the speed of all the devices must increase as well. When it is not practical or economical to have all devices as fast as the CPU, the CPU must either enter a wait state, or work at a slower clock frequency temporarily, to talk to other devices in the computer. While acceptable in embedded systems, this problem was",
"various manufacturers became competitive with the higher-end home computers (see below). Throughout the 1980s costs and prices continued to be driven down by: advanced circuit design and manufacturing, multifunction expansion cards, shareware applications such as PC-Talk, PC-Write, and PC-File, greater hardware reliability, and more user-friendly software that demanded less customer support services. The increasing availability of faster processor and memory chips, inexpensive EGA and VGA video cards, sound cards, and joystick adapters also bolstered the viability of PC/DOS computers as alternatives to specially-made computers and game consoles for the home. High performance From about 1985 the high end of",
"direct mode. In contrast to modern computers, home computers most often had their operating system (OS) stored in ROM chips. This made startup times very fast – no more than a few seconds – but made OS upgrades difficult or impossible without buying a new unit. Usually only the most severe bugs were fixed by issuing new ROMs to replace the old ones at the user's cost. Also, the small size and limited scope of home computer \"operating systems\" (really little more than what today would be called a kernel) left little room for bugs to hide.\nAlthough modern operating systems include extensive",
"long stalls that occurred when data had to be fetched from main memory. Additionally, the large transistor counts and high operating frequencies needed for the more advanced ILP techniques required power dissipation levels that could no longer be cheaply cooled. For these reasons, newer generations of computers have started to exploit higher levels of parallelism that exist outside of a single program or program thread.\nThis trend is sometimes known as throughput computing. This idea originated in the mainframe market where online transaction processing emphasized not just the execution speed of one transaction, but the capacity to deal with massive numbers",
"the key competitors in the post-PC era of mobile computing. Tech companies with a heavy dependency on PC sales such as Hewlett-Packard and Dell have seen decreased profits, while IBM has also struggled due to slowing demand for hardware and consulting services. Detractors Despite the decrease in PC sales, desktop computers and laptops still make up 84% of the global Web traffic as of March 2013. At its Worldwide Partner Conference in 2012, Microsoft's COO Kevin Turner attacked Tim Cook's declaration of a post-PC era for being \"completely incorrect\", and described its then-upcoming Windows 8 operating system as a \"game-changer\"",
"in computers was common. The decade was marked by market upheavals caused by the shrinking price of transistors.\nIt became possible to put an entire CPU on one printed circuit board. The result was that minicomputers, usually with 16-bit words, and 4K to 64K of memory, became common.\nCISCs were believed to be the most powerful types of computers, because their microcode was small and could be stored in very high-speed memory. The CISC architecture also addressed the semantic gap as it was then perceived. This was a defined distance between the machine language, and the higher level programming languages used to",
"might not work in a higher-speed system (or even worse, would work unreliably). Most PC makers eventually decoupled the slot clock from the system clock, but there was still no standards body to \"police\" the industry.\nAs companies like Dell modified the AT bus design, the architecture was so well entrenched that no single clone manufacturer had the leverage to create a standardized alternative, and there was no compelling reason for them to cooperate on a new standard. Because of this, when the first 386-based system (the Compaq Deskpro 386) hit the market in 1986, it still supported 16-bit",
"first computer\" that \"will open the world of computing to many who would be denied access to it by cost.\" However, the built-in memory was so small that use of a memory expansion pack was \"mandatory for any worthwhile use\". He also found the ZX81 to be alarmingly unreliable, having to have his first two test machines replaced before getting one that worked properly.\nNew Scientist's Malcolm Peltu commented that it was \"great technical value for money particularly for computing enthusiasts\" but thought that others were \"likely to be bored very quickly by the basic system\". He highlighted weaknesses in the",
"through continuity of the pattern of information that makes us\" and that humans are not bound to a specific \"substrate\" like biology. Law of accelerating returns The law of accelerating returns is the basis for all of these speculations about creating a digital brain. It explains why computational capacity will continue to increase unabated even after Moore's Law expires, which Kurzweil predicts will happen around 2020. Integrated circuits, the current method of creating computer chips, will fade from the limelight, while some new more advanced technology will pick up the slack. It is this new technology that will get us"
] |
Help me with the interpretation of these quotes | [
"> \"Some days you're the pigeon, and some days you're the statue.\"\n\nPigeons crap on statues. Some days you do something bad to someone else, some days, you're at the receiving end.\n\n\n > \"To forgive is to set a prisoner free and discover that the prisoner was you.\"\n\nThe act of forgiving does more for (liberates) you than for the party you are forgiving. But you realize this only after you go through the act of forgiving. \n\n\n > \"If a man is talking in the forest and no woman is there to hear him is he still wrong?\"\n\nIs a play on a popular quote \"If a tree falls in a forest and no one is around to hear it, does it make a sound?\" The original quote draws attention to the fact that there is virtually no way to answer that question. It raises questions about observation and the nature of reality. Your quote is just a silly way of saying that all women believe that men are always wrong. regardless of whether a woman is listening or not.",
"> If a man is talking in the forest and no woman is there to hear him is he still wrong\n\nThe joke is that a woman is always nagging on her man that he is wrong. So if she isn't around to hear him talk, is he still wrong?\n\n > Some days you're the pigeon, and some days you're the statue.\n\nSome days you figuratively shit on other people and some days you get figuratively shit on by other people\n\n > To forgive is to set a prisoner free and discover that the prisoner was you.\n\nYou will find that to hold a grudge means you will have a lot of negative feelings inside. By forgiving someone you will feel better yourself. Thus you are a prisoner to your own unwillingness to forgive."
] | [
"says: \"All systems are functional\", then, in indirect speech:\nIncorrect: Hal said that \"everything was going extremely well\".\nCorrect: Hal said that everything was going extremely well. Irony Another common use of quotation marks is to indicate or call attention to ironic, dubious, or non-standard words:\nHe shared his \"wisdom\" with me.\n\nThe lunch lady plopped a glob of \"food\" onto my tray.\n\nHe complained about too many \"gummint\" regulations.\nQuotes indicating verbal irony, or other special use, are sometimes called scare quotes. They are sometimes gestured in oral speech using air quotes, or indicated in speech with a tone change or by replacement with supposed[ly]",
"to which I am far removed.\nThe quote is often used to remind historians, reporters, editors etc. not to get carried away by emotion when writing about war or crimes. It is also the motto of the Czech Bureau for Foreign Relations and Information and Danish Army Military Police.\nA modern version is \"without fear or favor\".",
"has to be careful not to quote already quoted material:\n\nfirst> hello, how are you?\n\nI am fine.\n\nfirst> hello, how are you?\nsecond> I am fine.\n\nGood, I am also fine.\nIt is often the case that it makes sense, particularly in the simple quoting case, to insert a note telling who said what:\n\nLast Saturday, when the sun was nice, Second Guy said:\n> Last thursday, while eating popcorn, First Guy said:\n>> hello, how are you?\n> I am fine\nGood, I am also fine. Canonical quoting There is no standard declaring one way of quoting to be \"right\" and others to be \"wrong\", but some standards depend",
"line is used in the 1991 film Ricochet, in which Denzel Washington recites the quote in the final scene atop a tower. A variation of the quote—\"Top of the world, ma!\"—appears in the 1986 movie Tough Guys during a scene in which Eli Wallach shoots at cops from a train. It has also been quoted in a fifth season episode of Cheers, a second season episode of Breaking Bad and the series finale of Mixels. The line is also quoted in the Kings of the Sun song \"Drop The Gun\".\nThe film has inspired songs such as Madonna's",
"QuoteSlide, appears daily on Shockwave.com and Games.com. Books In 2008, the editors at Don't Quote Me produced a quotations book. Called Beltway Bloopers: Hilarious Quotes and Anecdotes from Washington, D.C., it was published by Metro Books. The book is a collection of political quotations.",
"the London-based Arabic newspaper, Al-Hayat, which published the quote in a July 11, 2005, opinion article. As'ad Abdul Rahman, chairman of the Palestinian Encyclopedia, used the quote as his lede for an opinion piece about alleged Jewish control of the world media in the Gulf News of December 4, 2004.\nA student columnist used the quote in her December 11, 2003 Daily Illini column, but later admitted the quote was false and apologized.\nThe incident was still being discussed as late as 2007.\nA columnist for The Hoya, the student newspaper of Georgetown University in Washington, D.C., used the quotation on March 19,",
"as a lion than 100 years as a sheep\". When informed that the source of the quote was 20th century Italian fascist dictator Benito Mussolini, Trump responded that the origin of the quote made no difference because \"it's a very good quote.\"\nOn July 2, 2016, Trump tweeted a picture originally created as a meme by white supremacists. The tweet featured a photo of Clinton next to a star-shaped badge saying \"Most Corrupt Candidate Ever!\" with a background of $100 bills. The six-pointed star was interpreted as a Star of David and the tweet denounced as \"blatantly anti-semitic\" by many observers,",
"from which the quote was taken by clipping the article from the publication and storing it in a binder as well as noting its source, date and context in his computer.\nIn addition, he thoroughly scrutinized every quote even more before adding it to the published editions of his books. Specifically, Simpson wanted to avoid the inclusion of a quote that would lose its significance in the future, so he was fond of saying that he would let quotes “marinate in time” for six months to a year to judge their lasting quality, saying that, “There’s a certain news judgment involved",
"alleged comment, testified that \"the gist of the quotes in what was said appear to be accurate,\" but that he did not remember Judge Murphy using the words \"tell her.\" Walsh said Crowley told him about Murphy's remarks in the lobby conference and acknowledged he did not know whether the judge said, \"get over it,\" \"she needs to get over it,\" or \"tell her to get over it.\"\nMurphy testified that the quotes attributed to him by defense witnesses were \"absolutely preposterous.\"\nIn February 2005, the jury found that the Boston Herald and David Wedge had defamed Judge Murphy and published false",
"of people next to a quote misattributed to Voltaire: \"To learn who rules over you, simply find out who you are not allowed to criticize\". The quote is actually that of white supremacist and neo-Nazi Kevin Alfred Strom. In the tweet, Cusack added the words \"Follow the money\". He later blamed it on a \"bot\", then defended it, then apologized and deleted the tweet. Personal life Cusack trained in kickboxing under former world kickboxing champion Benny Urquidez for over two decades. He began training under Urquidez in preparation for his role in Say Anything... and holds the rank of a",
"The quote was, as Trevelyan puts it, \"directed in a kindly spirit at the reforming zeal of a group of junior Fellows\". Incidentally, the motion was seconded by Coutts Trotter, one of the most senior Fellows.",
"go out and dig up the verification for you. I’m happy to do it.\" \nThe IHRC website stated that the veracity of the quote had not been confirmed:\nWhilst this quotation can be found on several reputable sites, we could not independently verify its authenticity. If you know the source please do let us know.",
"in parentheses, (!), after a sentence or phrase to indicate irony or sarcasm: Çok iyi bir iş yaptın (!), 'You've done a very good job – Not!'. Limbu In Limbu, an exclamation mark is used after a Limbu sentence or phrase for emphasis, and is common following both commands and the addressees of such commands. For example, in the Limbu sentence ᤐᤚᤢ᥄ ᤄᤨᤘᤑ ᤂᤥᤆᤌᤙ Mediterranean, ᤚᤦᤛᤅ᥄ — Paṡu! Ghōwapha khōcathaśa Mediterranean, ṡausaṅa! (Armies! Your first target is the Mediterranean!). It is further used in parentheses, (᥄), after a sentence or phrase to indicate irony or sarcasm: ᤖᤥᤂᤌ ᤔᤚᤗ ᤐᤤ ᤊᤇ",
"citizen. The full quote is Haec studia adolescentiam alunt, senectutem oblectant, secundas res ornant, adversis perfugium ac solacium praebent, delectant domi, non impediunt foris, pernoctant nobiscum, peregrinantur, rusticantur (\"These studies sustain youth and entertain old age, they enhance prosperity, and offer a refuge and solace in adversity, they delight us when we are at home without hindering us in the wider world, and are with us at night, when we travel and when we visit the countryside.\")",
"when disregarding a question or to refer to something they have no opinion or emotions about. In expressing an opinion, it means the speaker's opinion is that of apathy. However, some may respond with \"meh\" simply to avoid creating an opinion on the matter at all.\n\"Do you want to go to the party with me?\" \"Meh.\"\n\"What did you think about the book we had to read?\" \"Meh.\" Origin The origin is unknown. Some have speculated that the term's origin is Yiddish because of its similarity to the interjection \"feh\", which appears in the 1936 Yiddish song Yidl Mitn Fidl. In",
"obfuscation, espouse elucidation\", is a humorous fumblerule used by English teachers and professors when lecturing about proper writing techniques. Literally, the phrase means \"avoid being unclear\" or \"avoid being unclear, support being clear\", but the use of relatively uncommon words causes confusion in much of the audience (those lacking the vocabulary), making the statement an example of irony, and more precisely a heterological phrase. The phrase has appeared in print at least as early as 1959, when it was used as a section heading in a NASA document.\nAn earlier similar phrase appears in Mark Twain's Fenimore Cooper's Literary Offenses, where",
"of what is meant. Roger Kreuz and Glucksberg propose the echoic reminder theory to explain sarcasm because it provides motivation for saying the opposite of what is meant but it also provides an explanation to the marked asymmetry of ironic statements; positive statements can be used ironically. They conducted three experiments that tested to see how sarcastic a final remark would be in a story prompt the participants were given.\nHere is an example of a positive expertise prediction with a negative outcome and a positive remark: Nancy and her friend Jane were planning a trip to the beach. \"The weather",
"to Abraham Lincoln. However, the original quote (\"When you look for the bad, expecting it, you will get it\") is actually from the book, where it appears without attribution.\nAs a result of the novel's success, the adjective \"Pollyannaish\" and the noun \"Pollyannaism\" became popular terms for a personality type characterised by irrepressible optimism evident in the face of even the most adverse or discouraging of circumstances. It is sometimes used pejoratively, referring to someone whose optimism is excessive to the point of naïveté or refusing to accept the facts of an unfortunate situation. This pejorative use can be heard in",
"officially credited or acknowledged. This aspect creates a dilemma for historians and compilers of speech anthology; namely, when some poignant phrase gains popularity such as John F. Kennedy's \"ask not what your country can do for you, ask what you can do for your country,\". Should credit be given to the President, to speechwriter Ted Sorensen, or to both? Professional speechwriter Lawrence Bernstein writes:\nSome clients have called with six months to spare, others with four hours to go; some want to meet up first, others want coaching afterwards; quite a few did everything by email and we’ve never even spoken.\nWhile",
"in words or ideas within the marks, or even outright contempt. They can indicate that a writer is purposely misusing a word or phrase or that the writer is unpersuaded by the text in quotes, and they can help the writer deny responsibility for the quote. In general, they express distance between writer and quote.\n\nFor example: \nSome \"groupies\" were following the band.\n The scare quotes could indicate that the word is not one the writer would normally use, or that the writer thinks there is something dubious about the word groupies or its application to these people. The exact meaning",
"inexpensive computers and the widespread use of the Internet, it has become easy for anyone to accumulate and distribute these quotation lists. Like the \"Yogiisms\" of baseball great Yogi Berra, or the Colemanballs collected by Private Eye, a damaging quotation purports to give insight into the thinking of the speaker, frequently a politician or of the politicians or political groups that used it as means of attack. As such they belong to the colorful history of political satire.",
"is one that relates back to the speaker, either as an object e.g. Je me suis trompé ‘I'm mistaken, I made a mistake’ (= *j'ai trompé moi-même, literally ‘I fooled myself’), or as a dative form e.g. Je me suis donné du temps (= * j'ai donné du temps à moi-même, I gave myself some time).",
"English by Adam Makkai, the author asserts that the phrase is included among English idioms that are expressed in a \"standard format\" and whose usage \"signals to the hearer that he is using an authority in underscoring his own opinion.\" Researchers Andrew Littlejohn and Sandhya Rao Mehta acknowledged that the famous quote rendered not only a discursive use, but a constructional one as well, noting that \"the structure itself can be used a salient, but neutral equation formula...'noun thy name is noun.'\" Law Supreme Court Justice Antonin Scalia, dissenting from the Court's decision in King v. Burwell, upholding the",
"a method of getting at the way things actually are.\nTwo qualifications exist for the metaphor as mistake: It must be given by an authority figure, and it must have a certain aura of mystery around it. In this way, the metaphor becomes both right (given by authority) and wrong (not strictly true as a descriptor).\nPercy's example is of a boy on a hunting trip who sees a bird and asks what it is. The African-American accompanying him and his father calls the bird a blue dollar, which excites the boy until his father corrects him and tells him the bird",
"higher prestige.\nAsch, however, reinterprets Lorge's findings and suggests that there was \"a change in the object of judgment, rather than in the judgment of the object\" (Asch, 1940). He suggests that a person will redefine the object of judgment based on the content of the evaluations. Therefore, the person will base the meaning of the quote in the context of what he/she believes to be true about the person who said the quote, resulting in different meanings of the statements based on the author.\nIn evidence of his claims, Asch conducted an experiment in which college students read statements with the",
"quote was originally published online without the second sentence.\nIn a 2014 interview, George said:\nI didn't think there was any press there when I said it. I was talking to a couple of troubled priests who are worried about the secularization of our culture. I was telling them they should take the long view, step back, and renew their confidence in the providence of God. I was saying that even if the worst possible case scenario happens, we'll be okay. It was a mental game in the Kantian sense ... let's imagine the worst thing that could happen. Instead of wringing",
"the most quoted phrases in American politics. It is inscribed on Robert Kennedy's memorial in Arlington National Cemetery.\nSenator Ted Kennedy, brought up the speech in his eulogy for Robert, saying \"What he leaves to us is what he said, what he did, and what he stood for. A speech he made to the young people of South Africa on their Day of Affirmation in 1966 sums it up the best...\"\nThe first and final drafts of the speech are in Robert Kennedy's Senate papers, which are held by the John F. Kennedy Library.",
"Quoting out of context Contextomy Contextomy refers to the selective excerpting of words from their original linguistic context in a way that distorts the source's intended meaning, a practice commonly referred to as \"quoting out of context\". The problem here is not the removal of a quote from its original context per se (as all quotes are), but to the quoter's decision to exclude from the excerpt certain nearby phrases or sentences (which become \"context\" by virtue of the exclusion) that serve to clarify the intentions behind the selected words. Comparing this practice to surgical excision, journalist Milton",
"quotes include, “Stand at the corner of a dream and fight” and “I had a dream that will be and a butterfly cocooned in prisons,” in honour of Mahinoor Elmasry who was arrested along with countless others for standing against injustice in Egypt. Other quotes include, “No to the impossible,” “We love life if we had access to it,” “I will dream,” “How big is the idea, how small is the state,” “Those who have no land have no sea,” “On this earth there are things worth living for,” “One day we will be who we want to be, the",
"George W. Bush, as an Iraq-based arm of al-Qaeda). Oliver said that in response to criticism of Trump, Trump had replied, \"Obviously I'm being sarcastic ... but not that sarcastic, to be honest with you.\"\nIn calling out that Trump's attempt to clarify the remark as sarcastic and Trump's repeated walking back of that justification days later, Oliver described Trump's statement as \"bullshit\" and a \"douchebag's apology\" and stated that trying to rationalize Trump's campaign is \"like watching a circus seal fold laundry\". Oliver also called Trump's sarcasm \"absurd\", and joked about Trump's claim that Clinton was a co-founder, saying by"
] |
why are modern depictions of the future often dystopic, compared to the bright and positive predictions in the past? | [
"Science Fiction is less of a prediction mechanism and more of a window into what people are currently thinking. In early sci-fi, the goal was to exploit a possible future where people became better as individuals and as a species. Currently, sci-fi represents a general pessimism about the human condition.\n\nNot everything is that way of course, and there are a few upbeat stories about people in science fiction (see: the new Arrival movie).",
"There have always been both views. \n\nIn the 1890s, H.G. Wells wrote of pretty dystopian futures in *The Time Machine* and *When the Sleeper Wakes*. Jack London wrote *The Iron Heel* in 1908.\n\nEarly to mid 20th Century examples include Huxley's *Brave New World* (1931), Orwell's *Nineteen Eighty-Four* (1948) and Bradbury's *Fahrenheit 451* (1953).",
"Because fear, anger, and violence sell. It would be a pretty uneventful and boring book if everyone in the future got along, everyone had enough to eat, and everyone worked together for a common purpose. Not to mention that it would go against all history of human nature and be completely unbelievable."
] | [
"influence on future orientation because optimistic people generally have positive expectations for their future and believe things will happen in their favour. Time perspective Another way in which future orientation has been conceptualized is through time perspective. This line of research similarly focuses on how current behavior is not only determined by the present, but also the past and the future, because the past and future are present at a cognitive level. Two related components of the time perspective framework are time attitude and time orientation. Time attitude refers to a person's negative or positive attitudes toward the past, present",
"and the use of postmodern tropes to explain all modern geo-political phenomena. According to Wheen, postmodern scholars tend to critique unfair power structures in the west including issues of race, class, patriarchy, the effect of radical capitalism and political oppression. Where he finds fault in these tropes is when the theories go beyond evidence-based critical thinking and use vague terminology to support obscurantist theories. An example is Luce Irigaray's assertion, cited by Alan Sokal and Jean Bricmont in their book Fashionable Nonsense, that the equation \"E=mc²\" is a \"sexed equation\", because \"it privileges the speed of light over other",
"more positive qualities and a more positive future outlook than others. Self-enhancing triad People generally hold unrealistically positive views about themselves. Such flattering views can often be neatly categorised within what has become known as the Triad of Positive Illusions. The three illusions in question are above-average effect, illusions of control, and unrealistic optimism. These illusions can be replicated across many situations and are highly resistant to revision. Rather ironically, when informed of the existence of such illusions, people generally consider themselves to be less prone to them than others. Illusions of control People overestimate the level of control they",
"gamblers are more likely to easily construct an accurate representation of the event. \"Construal level theory\" theorizes that distant events are conceptualized more abstractly than immediate ones. Thus, psychologists suggest that a lack of concrete details prompts forecasters to rely on more general or idealized representations of events, which subsequently leads to simplistic and inaccurate predictions. For example, when asked to imagine what a 'good day' would be like for them in the near future, people often describe both positive and negative events. When asked to imagine what a 'good day' would be like for them in a year, however,",
"observed and measured in research. The most prominent constructs include possible selves, optimism, time perspective, delay discounting. While different in definition, all of these constructs are thought to tap into and impact how people think and plan for the future. Despite the many different ways that future orientation is investigated and measured, there is evidence that a hopeful and purposeful sense of the future is associated with positive outcomes. Possible selves The collection of self-representations or self-knowledge that someone has about their self is referred to as their self-concept, and this is formed based on past experiences and expectations about",
"likelihood that they would avoid the event\". They have generally found that unrealistic optimism was greater for negative than positive valence.\nValence effects, which is also considered a form of cognitive bias, have several real-world implications. For instance, it can lead to the overestimation of a company's future earnings by investors and this could contribute to a tendency for it to becoming overpriced. In terms of achieving organizational objectives, it could encourage people to produce unrealistic schedules helping drive a so-called planning fallacy, which often result in making poor decisions and project abandonment. Attempts to alter and eliminate Studies have shown",
"real-world setting for inspiration, as in Barry Hughart's Bridge of Birds, clearly derived from China, or Lloyd Alexander's use of real world cultures such as Welsh for The Chronicles of Prydain or Indian for The Iron Ring, make the line between fantasy worlds and alternate histories fuzzy. The use of cultural elements, and still more history and geography, from actual settings pushes a work toward alternative history.\nConversely, the creation by an author of an imaginary country—such as Ruritania or Graustark—does not automatically transform that imaginary country into a fantasy world, even if the location would be impossible in reality owing",
"societies are highly subjective across the political spectrum. Furthermore, projects characteristic of high modernity are best enacted under conditions of authoritarian and technocratic rule, as populations are more easily controlled and changed. Modernization and development Geographer Peter J. Taylor argues that high modernity's false optimism in the transformative power of science and technology contributed to confusion in the modernization process, especially in the case of third world countries striving to develop according to Western principles of modernization.\nFollowing the successes of the Marshall Plan in Europe, economists turned their attention towards development in the Third World in the aftermath of the",
"fabricate a false reality that is to be consumed as real. Linked to contemporary western culture Umberto Eco and post-structuralists would argue, that in current cultures fundamental ideals are built on desire and particular sign-systems. Significance Hyperreality is significant as a paradigm to explain current cultural conditions. Consumerism, because of its reliance on sign exchange value (e.g. brand X shows that one is fashionable, car Y indicates one's wealth), could be seen as a contributing factor in the creation of hyperreality or the hyperreal condition. Hyperreality tricks consciousness into detaching from any real emotional engagement, instead opting for artificial simulation,",
"was painting a state of things which did not change at once. ... I remember it.\" \n... Nothing is so easy as speculating in our closets on the probable effects of any given arrangement of public affairs; and if the results of such imaginary politics were confined to the Utopias in which their ingenious authors gave them birth, we should have no objection to their theories. But when they are boldly obtruded upon the notice of the country as formulæ for actual practice, we feel it our duty, not to take these speculative conclusions for granted, but to turn",
"necessarily, reflexive. For one thing, they claim, theories about social reality may affect – might change – social reality itself. Some critics of (neo-)realism have raised the possibility that realist theories, for instance, may act as self-fulfilling prophecies. To the extent that they are taken by theorists and practitioners to be the \"common sense\" of international politics, diplomacy and policy-making, those theories may encourage precisely the kind of mistrust, ruthless competition and amorality that they posit to be natural and inherent features of the international realm. Familiar methodological examples of the capacity of observation and theorising to affect the object/phenomena",
"and endless reproductions of fundamentally empty appearance. Essentially (although Baudrillard himself may balk at the use of this word), fulfillment or happiness is found through simulation and imitation of a transient simulacrum of reality, rather than any interaction with any \"real\" reality.\nWhile hyperreality is not a relatively new concept, its effects are more relevant today than when it was first conceptualized. This is attributed to the way it effectively captured the postmodern condition, particularly how people in the postmodern world seek stimulation by creating unreal worlds of spectacle and seduction and nothing more. There are dangers to the use",
"series of publications that involve the concept of reality as a paradigm even in non-philosophical areas. In fact, the debate on new realism, for number of contributions and media response, has no equivalent in the recent cultural history, to the point of being chosen as 'case study' for the analysis of the sociology of communication and linguistics.\nIn the international arena, the Manifesto of new realism can be found in several translations: English (SUNYI Press), French (Hermann), German (Klostermann), Spanish (Biblioteca Nueva) ecc. New realism was discussed in the Frankfurter Allgemeine Zeitung, in the Neue Zürcher Zeitung and the Süddeutsche",
"near future tend to be more content with a detailed-specific test. In one study, participants viewed a number of partial pictures paired with ideas of either the near or the distant future. When looking at these images, with the idea of the near future, the participants were more able to view the image as a whole concrete image, while they had more abstract interpretations of the distant future images. Judgments People judge all aspects of their lives, including events, people, and society. If an event is close in time, we are more likely to think in terms of concrete low-level",
"are “constructed,” i.e., selectively reported, muted, or otherwise distorted, unless one possesses a plausible estimate of the past “as it essentially (not ‘actually’) was.” On the other hand, estimates of the past become even more plausible when the sources of their exaggerations, omissions, and other distortions are identified. For Schwartz, therefore, realism’s premise is modest: the meaning of events vary ceaselessly, and often significantly, but in the average situation that meaning is more often forced upon the observer by an event’s properties than imposed by observer’s categories of thought, sensitivity, worldview, or interests. Because the properties",
"contains such ideas as the designation of countries as \"Failed states\", \"Modern states\" and \"Postmodern states\", and statements such as \"The challenge to the postmodern world is to get used to the idea of double standards\". His world-view is said to have been influential in the political thinking of Tony Blair as well as the development of European Security and Defence Policy.",
"complex and often counter-intuitive. His new book project, \"Civilization and the Cosmos\" is under contract with Harvard University Press and Viking Press. It argues that changes in different environments across the solar system have influenced human history in previously unrecognized ways.",
"some for dramatizing so-called 'dystopian scenarios,' which may, in fact, be reflective of real-life conditions in some places in the world. Some see Critical Design as rooted in the fears of a wealthy, urban, western population and failing to engage with existing social problems. As an example, a project titled Republic of Salivation, by designers Michael Burton and Michiko Nitta, featured as part of MoMA's Design and Violence series, portrays a society plagued by overpopulation and food scarcity which is reliant on heavily modified, government-provided, nutrient blocks. Certain media responses to the work, point to the \"presumed naivety of the",
"by writers who describe themselves as constructivist theorists. According to this view, the fundamental structures of international politics are social rather than strictly material. This leads to social constructivists to argue that changes in the nature of social interaction between states can bring a fundamental shift towards greater international security. Challenging realism During constructivism's formative period neorealism was the dominant discourse of international relations, thus much of constructivism's initial theoretical work challenged basic Neorealist assumptions. Neorealists are fundamentally causal structuralists, in that they hold that the majority of important content to international politics is explained by the structure of the",
"representations particularly in stories set in the future. Some of the most famous examples are George Orwell's Nineteen Eighty-Four, Aldous Huxley's Brave New World and Ray Bradbury's Fahrenheit 451. Dystopian societies appear in many sub-genres of fiction and are often used to draw attention to society, environment, politics, economics, religion, psychology, ethics, science or technology. Some authors use the term to refer to existing societies, many of which are or have been totalitarian states or societies in an advanced state of collapse.\nSome scholars, such as Gregory Claeys and Lyman Tower Sargent, make certain distinctions between typical synonyms of dystopias. For",
"negative realism turns into a positive realism: in resisting us reality does not merely set a limit we cannot trespass, but it also offers opportunities and resources. This explains how, in the natural world, different life-forms can interact in the same environment without sharing any conceptual scheme and how, in the social world, human intentions and behaviors are made possible by a reality that is first given, and that only at a later time may be interpreted and, if necessary, transformed. Now that the season of postmodernism has died out, New Realism expresses the widespread need for renewal in extra-disciplinary",
"thought (i.e. the interpretation of philosophical realisms and \"theories of truth\" that developed starting from the end of last century in response to a deviation of the relationship between the individual and reality). This, in turn, leads to the proposal of an antidote to the degeneration of postmodernist ideology and the degraded and mendacious relationship with the world that it has caused: New Realism, in fact, identifies itself with the synergistic action of three key words, Ontology, Critique and Enlightenment. New Realism has been the subject of several debates and national and international conferences and has called for a",
"does not relate to how the experience is like.\nInaccurate theories:\nPeople have created cultural theories and had experiences that greatly influence beliefs of how an event will affect us. For example, our culture has emphasized a correlation between wealth and happiness, however despite this belief; money does not necessarily bring happiness.\nMotivated Distortions:\nWhen faced with a negative event people may have forecasts that are overestimated and can evoke either comfort or fear in the present. The overestimation however can often be used to soften the effects of an event or make it easier by the reality not being as extreme",
"for Popular Science. His \"retro-futuristic\" style was used during the depression to artistically convert the ideas of inventive Americans into unique visual expressions of potential reality.",
"historical time - critics like J. G. Ballard object that the end-product is a world of \"laws without penalties, events without significance, a sun without shadows\": of surface without depth. They see postmodern superficiality as a by-product of the false consciousness of global capitalism, where surface distractions, news, and entertainment supersaturate the zapping mind in such a way as to foreclose the possibility of envisioning any critical alternative. Therapy Almost all depth psychologies defy the postmodern to value depth over surface - to aim, in David Cooper's words, for \"change from the depths of oneself upwards into the superficies of",
"the word 'actual' as an indexical. The indexical account of actuality was - in Lewis's mind - one step down the road to modal realism: possible worlds are just as real as our world. Later on his career Lewis gravitated more and more towards Williams’s ontology, expressing sympathy with a sparse theory of tropes. \nArmstrong and Lewis were both influential figures who played their own part in bringing metaphysics back into mainstream philosophy. Given the influence of Williams on both Armstrong and Lewis, Williams played a key role in the revival of metaphysics. Williams’s articles on trope theory and four-dimensionalism",
"and personifying, whereas modern thought is abstract and impersonal: more basically, mythopoeic thought is \"pre-philosophical\", while modern thought is \"philosophical\". Because of this basic contrast between mythopoeic and modern thought, the Frankforts often use the term \"mythopoeic thought\" as a synonym for ancient thought in general. Personalistic view of nature According to the Frankforts, \"the fundamental difference between the attitudes of modern and ancient man as regards the surrounding world is this: for modern, scientific man the phenomenal world is primarily an 'It'; for ancient—and also for primitive—man it is a 'Thou'\". In other words, modern man sees most things",
"world of everyday life as largely impenetrable compared to conceptual schemes. The failure to acknowledge this principle traces back to the confusion between ontology (the sphere of being) and epistemology (the sphere of knowledge); such confusion is critically thematised by Ferraris starting from the character of unamendability that is typical of being as opposed to knowledge (see in particular: Ontologia (2003) and Storia dell’ontologia (2008, with other authors)). His reflection on realism led, in 2011, to the elaboration of the Manifesto of New Realism. From social ontology to documentality The natural outcome of critical ontology is the twofold acknowledgement of",
"past can be rewritten through present knowledge and perspective of the event. The reality that is currently constructed can be completely changed through language (e.g. bias (omission, source, tone)). The unreliability of the recorded realty can skew the original concept and make the past remark unreliable. \nActual idealism is regarded as a liberal and tolerant doctrine since it acknowledges that every being picturizes reality, in which their ideas remained hatched, differently. Even though, reality is a figment of thought.\nEven though core concept of the theory is famous for its simplification, its application is regarded as extremely ambiguous. Over the years,",
"and liberal democracy, which he sees as the long-term agents of global reconciliation. In contrast to postmodernism, post-millennialism is distinguished by the rejection of victimary thinking and a turn to \"non-victimary dialogue\" that will \"diminish ... the amount of resentment in the world.\" Gans has developed the notion of post-millennialism further in many of his internet Chronicles of Love and Resentment and the term is allied closely with his theory of generative anthropology and his scenic concept of history. Kirby's pseudo-modernism or digimodernism In his 2006 paper The Death of Postmodernism and Beyond, the British scholar Alan Kirby formulated a"
] |
Maps. Specifically, why is there a debate over which map is the most accurate? | [
"Peel an orange. Now, lay it flat on a table without tearing, smushing, or otherwise mangling the skin. It's not possible. There are many different \"projections\" of the earth that are used to make maps, but they will always either make nice shapes (rectangles) with very distorted images of the land forms or have weird confusing shapes and be somewhat more accurate.\n\nThe Mercator projection is one you are probably familiar with. It's a rectangle, Greenland and Russia are HUGE. This is confusing to kids, who then think that Greenland or Antarctica are the biggest continents.\n\n_URL_0_\n\nEDIT: I love when simple explanations take off like this. Thanks, all. Love this subreddit.",
"Every map distorts something. \n \nSome maps distort distance, some distort shape, and some distort direction. \n \nIt's impossible to perfectly represent a 'sphere' (technically an oblate spheroid) onto a flat surface without some distortion. You choose the map that best suits your needs.",
"JangusKahn pretty much established the reason why.\nThe world cannot be properly defined on a flat surface, because of this, inconsistencies arise. For instance:\n\nYou can either have a map that is conical; where all the angles are correct. This map however will not have equal area, some locations on the map will have exaggerated landscape sizes, i.e. greenland may be the size of Africa, which would be really quite incorrect.\n\nOr you can have an equal area map, with which the landscape sizes are relatively correct, but the angles are false.\n\nThe Mercator projection is more or less the standard projection representing a cylindrical projection (Called so because it's as if you placed a cylinder around the globe and made a map). The scale factor increases as you get closer to the north and south poles (This means the error in projection grows)\nAlso; if you draw a straight line from one point to another over the ocean, it will not be the shortest distance between 2 points, in fact a \"great circle\" curve will be the shortest distance, but it will appear longer than the straight line on the Mercator projection. \nTherefore, Mercator projections are terrible for navigation.",
"There isn't a debate, the Dymaxion is the most accurate projection with the least amount of distortion. :)\n\nBut seriously, JangusKhan has a good answer for you.",
"Because when you try to make a map of a globe you're attempting to convert a 3D object into a flat image, you're literally trying to remove an entire dimension."
] | [
"Features not appearing on one map but shown on another do not necessarily indicate an actual difference, due to purpose, detail, or accuracy; for example, comparing cadastral and topographic maps.\nMap format can reduce confidence in a regression. 'Strip' maps, or traverse surveys, which record features in a linear path can complicate the spatial interpolation required to match a planar format.\nHistorical research can involve early maps of uncertain accuracy or datum. They are often small scale which leads to the magnification of any position errors in enlarging to match large scale maps. Georeferencing is not always straightforward; topography such as river",
"map has to compromise between portraying the items of interest (or themes) in the right place on the map, and the need to show that item using text or a symbol, which take up space on the map and might displace some other item of information. The cartographer is thus constantly making judgements about what to include, what to leave out and what to show in a slightly incorrect place. This issue assumes more importance as the scale of the map gets smaller (i.e. the map shows a larger area) because the information shown on the map takes up more",
"basis for geography. The map shows us what we know about our earth in the best, clearest and most exact way. The contemporary map should so depict the earth’s surface that one can not only measure the horizontal positions of and distances between all points and localities, but also clearly distinguish vertical variations, from sea level to the highest summits.\"\nPetermann was responsible for drawing most of the maps in the first few years of the journal. His strength was in the analysis and evaluation of all sources available. As such one can say that the indication ‘Originalkarte’ (original map) in",
"it is possible to separate facts from values. As Harley stated: Maps are never value-free images; except in the narrowest Euclidean sense they are not in themselves either true or false. Both in the selectivity of their content and in their signs and styles of representation maps are a way of conceiving, articulating, and structuring the human world which is biased towards, promoted by, and exerts influence upon particular sets of social relations. By accepting such premises it becomes easier to see how appropriate they are to manipulation by the powerful in society. History Although this was a postwar discovery,",
"which cannot convey every detail of the real world. Cartographers must decide and then adjust the content within their maps to create a suitable and useful map that conveys geospatial information within their representation of the world.\nGeneralization is meant to be context-specific. That is to say, correctly generalized maps are those that emphasize the most important map elements while still representing the world in the most faithful and recognizable way. The level of detail and importance in what is remaining on the map must outweigh the insignificance of items that were generalized, as to preserve the distinguishing characteristics of what",
"problems associated with classification of data. The cartographer must choose how many classes to use and how to break the data into those classes. While there are various techniques available, the choice is essentially arbitrary. The look of a map can vary significantly depending on the classification choices. The choices of color and shading likewise affect the map's appearance. Further, all election maps are subject to the interpretation error known as the ecological fallacy.\nFinally, there are problems associated with human perception. Large areas of color appear more saturated than small areas of the same color. A juxtaposition of differing colors",
"value can be used as the scale without causing measurement errors. In maps covering larger areas, or the whole Earth, the map's scale may be less useful or even useless in measuring distances. The map projection becomes critical in understanding how scale varies throughout the map. When scale varies noticeably, it can be accounted for as the scale factor. Tissot's indicatrix is often used to illustrate the variation of point scale across a map. History The foundations for quantitative map scaling goes back to ancient China with textual evidence that the idea of map scaling was understood by the second",
"little overlap, also because the scales used for the different works are mostly different. But the smaller maps are clearly generalizations of the maps in Barth's work. The images in Barth's look sharper, but of course that is also because they are engraved on a larger scale, while all the areas outside the routes, of which nothing or not enough is known are blank.\nThese routes, like many others, were reused in many new maps, such as Barth's route, supplemented with the 1828 routes of René-Auguste Caillé (1799–1838) and Léopold Planet (1850). Invitation for exploring Africa PGM not only reported the",
"the scale statement is nominal it is usually accurate enough for most purposes unless the map covers a large fraction of the earth. At the scope of a world map, scale as a single number is practically meaningless throughout most of the map. Instead, it usually refers to the scale along the equator.\nSome maps, called cartograms, have the scale deliberately distorted to reflect information other than land area or distance. For example, this map (at the right) of Europe has been distorted to show population distribution, while the rough shape of the continent is still discernible.\nAnother example of distorted scale",
"to their fitness for the purpose, such as Winkel tripel, Robinson and Mollweide. Reference maps of the world often appear on compromise projections. Due to distortions inherent in any map of the world, the choice of projection becomes largely one of aesthetics.\nThematic maps normally require an equal area projection so that phenomena per unit area are shown in correct proportion.\nHowever, representing area ratios correctly necessarily distorts shapes more than many maps that are not equal-area.\nThe Mercator projection, developed for navigational purposes, has often been used in world maps where other projections would have been more appropriate. This problem has",
"of Maps emphasizes the importance of lettering, map design, map structure, color, and technique.\nInformation theory helped turn the map into a medium of communicating information. Although Robinson never articulated a map model that could govern the new scientific pursuit of maps, his role in the war led to an understanding of the practical need for maps based on science not art. Robinson opened the door for others to apply Shannon’s Mathematical Theory of Communication to the design of maps. British geographer Christopher Board developed the first MCM in 1967 but it was cumbersome and poorly measured a map’s information quality.",
"Map Geographic maps Cartography or map-making is the study and practice of crafting representations of the Earth upon a flat surface (see History of cartography), and one who makes maps is called a cartographer.\nRoad maps are perhaps the most widely used maps today, and form a subset of navigational maps, which also include aeronautical and nautical charts, railroad network maps, and hiking and bicycling maps. In terms of quantity, the largest number of drawn map sheets is probably made up by local surveys, carried out by municipalities, utilities, tax assessors, emergency services providers, and other local agencies. Many national",
"of paper e.g. A4 or Letter. It is important to use the correct type of paper: both the weight and the coating affect the usability of the final map. Map accuracy and map quality Map accuracy refers to the work of the surveyor (field-worker) and relates not so much to the positional accuracy of the survey but rather to its utility for the competitor. Map quality refers to the quality of the artwork. Many national bodies have a competition in which awards are made to cartographers after assessment by a national panel.",
"order to represent a three-dimensional object on a two dimensional surface, such as is necessary when mapping the earth, map-makers must make decisions about which types of distortions to allow. For example, the most traditionally accepted and commonly used world map is the Mercator map which enlarges the size of Europe and shrinks the size of Africa. This representation can be read to suggest that certain parts of the world are larger, and therefore more important or more powerful than others via the (inaccurate) size comparison presented in the map. The decisions with regards to distortions are the result of",
"'R.'\" Map interpretation There are several problems in creating and interpreting election maps. Popular vote data is necessarily aggregated at several levels, such as counties and states, which are then colored to show election results. Maps of this type are called choropleth maps, which have several well-known problems that can result in interpretation bias. One problem arises when areal units differ in size and significance, as is the case with election maps. These maps give extra visual weight to larger areal units, whether by county or state. This problem is compounded in that the units are not equally significant. A",
"maps are not seen as straightforward “mirrors of reality”, but rather as instruments through which reality is shaped. Casti’s key contribution lies in having embraced this initial assumption as a springboard for articulating a theory able to investigate the construction and the communicative mechanisms of maps. By shifting the focus of interest from maps as tools for mediating territory to maps as operators which actively affect the range of activities one can implement on territories, Casti’s theory earmarked the areas in which action is needed in order to take control of the communicative outcomes of mapping. Assuming a",
"Cartography Ancient times What is the earliest known map is a matter of some debate, both because the term \"map\" is not well-defined and because some artifacts that might be maps might actually be something else. A wall painting that might depict the ancient Anatolian city of Çatalhöyük (previously known as Catal Huyuk or Çatal Hüyük) has been dated to the late 7th millennium BCE. Among the prehistoric alpine rock carvings of Mount Bego (France) and Valcamonica (Italy), dated to the 4th millennium BCE, geometric patterns consisting of dotted rectangles and lines are widely interpreted in archaeological literature as a",
"Map (mathematics) In mathematics, the term mapping, sometimes shortened to map, is a relationship between mathematical objects or structures.\nMaps may either be functions or morphisms, though the terms share some overlap. In the sense of a function, a map is often associated with some sort of structure, particularly a set constituting the codomain. Alternatively, a map may be described by a morphism in category theory, which generalizes the idea of a function. There are also a few, less common uses in logic and graph theory. Maps as functions In many branches of mathematics, the term map is used to mean",
"learn geodesy and fairly advanced mathematics to understand how the shape of the Earth affects the distortion of map symbols projected onto a flat surface for viewing. It can be said, without much controversy, that cartography is the seed from which the larger field of geography grew. Most geographers will cite a childhood fascination with maps as an early sign they would end up in the field. Geographic information systems Geographic information systems (GIS) deal with the storage of information about the Earth for automatic retrieval by a computer, in an accurate manner appropriate to the information's purpose. In addition",
"relatively compact, allowing many variables to be shown simultaneously. Maps Maps are a natural way to represent geographical data. Time and space can be depicted through the use of flow maps. Line strokes are used with various widths and colors to help encode information. Choropleth maps, which encode data through color and geographical region, are also commonly used. Graduated symbol maps are another method to represent geographical data. They are an alternative to choropleth map and use symbols, such as pie charts for each area, over a map. This map allows for more dimensions to be represented using various shapes,",
"be partly drawn in a larger scale, on a separate detail map.\nIn addition to linear true to scale maps, there are also maps with variable scale, for example where the scale gradually increases towards the city centre (aerial photography, and photogrammetry methods).\nCentral to the information provided by a city map is the street network, including its street names (often supplemented by at least a selection of individual house numbers), along with buildings, parks and waterways. Streets and points of interest are usually also listed in a legend or register, locating objects on a map grid on the map. Important places",
"are usually smaller than the area they represent. Because of the need for a scale, the cartographer often makes use of map generalization as a way to ensure clarity. The size of the scale affects the use of generalization; a smaller scale forces a higher level of generalization.\nThere are two types of map generalization; geometric and content. The methods of geometric generalization are selection, simplification, displacement, smoothing, and enhancement. Content generalization promotes clarity of the purpose or meaning of a map by filtering out details irrelevant to the map's function or theme. Content generalization has",
"political jurisdiction, ethnicities and languages, terrain, etc. The line between maps and actual imagery grows increasingly blurry.\nOnline resources such as Google Earth are increasingly useful for other than the most detailed technical analysis. One challenge remains the indexing of maps in geographical information systems, since multiple projections and coordinate systems are used both in maps and in imagery. Order of battle intelligence Principally a military term, order of battle refers to the composition of an adversary's organization, including units, key personnel, equipment, and strength. In general, this is a form of basic intelligence, but is so important, and often so",
"codify) a symbolic meaning, or symbolism. Maps A map is a simplified depiction of a space, a navigational aid which highlights relations between objects within that space. Usually, a map is a two-dimensional, geometrically accurate representation of a three-dimensional space.\nOne of the first 'modern' maps was made by Waldseemüller. Photography One difference between photography and other forms of graphics is that a photographer, in principle, just records a single moment in reality, with seemingly no interpretation. However, a photographer can choose the field of view and angle, and may also use other techniques, such as various lenses to choose the",
"called scale series. The concept of a map series In everyday use, individual maps and atlases are sometimes described as being part of a \"map series\". However, that is not a correct use of the technical language of cartography, in which the term map series refers exclusively to the phenomenon described here, namely a map published over several sheets. The scope of a map series can range from as few as two sheets to at least tens of thousands of sheets.\nObsolete maps, especially of the 19th century, are often named Topographic Atlases, because their small-sized sheets were also bound into",
"fitting straight lines to the curve of a coastline, can easily calculate the lengths of the lines which it defines. However these straight lines may have no inherent meaning in the real world, as was shown for the coastline of Britain.\nThese problems represent a challenge in spatial analysis because of the power of maps as media of presentation. When results are presented as maps, the presentation combines spatial data which are generally accurate with analytic results which may be inaccurate, leading to an impression that analytic results are more accurate than the data would indicate. Spatial characterization The definition of",
"map—cartouche, map legend, title, compass rose, bar scale, etc.\nIn particular, some maps contain smaller \"sub-maps\" in otherwise blank regions—often one at a much smaller scale showing the whole globe and where the whole map fits on that globe, and a few showing \"regions of interest\" at a larger scale in order to show details that wouldn't otherwise fit.\nOccasionally sub-maps use the same scale as the large map—a few maps of the contiguous United States include a sub-map to the same scale for each of the two non-contiguous states. Labeling To communicate spatial information effectively, features such as rivers, lakes, and",
"points may have lesser and un-traveled roadways omitted as not to confuse the map-reader. The selection of the most direct and uncomplicated route between the two points is the most important data, and the cartographer may choose to emphasize this. Simplification Generalization is not a process that only removes and selects data, but also a process that simplifies or abstracts it as well. Simplification is a technique where the general shapes of features are retained, while eliminating unnecessary detail. Generally, smaller scale maps have more simplified features than larger scale maps. The Ramer–Douglas–Peucker algorithm is one of the earliest and",
"reader to estimate the size of the symbol if it is a square or a bar. Proportional symbol maps are effective because they allow the reader to understand large quantities of data in a fast and simple way. Cartogram A cartogram map is a map that purposely distorts geographic space based on values of a theme. A good example to this would be to make the size of countries proportional to their population. Most commonly used in everyday life are distance cartograms. Distance cartograms show real-world distances that are distorted to reflect some sort of attribute, such as the time",
"of engaging the user by presenting a clear presentation, leaving no confusion concerning the purpose of the map. This will enhance the user's experience and keep their attention. If the user is unable to identify what is being demonstrated in a reasonable fashion, the map may be regarded as useless.\nMaking a meaningful map is the ultimate goal. Alan MacEachren explains that a well designed map \"is convincing because it implies authenticity\". An interesting map will no doubt engage a reader. Information richness or a map that is multivariate shows relationships within the map. Showing several variables allows comparison, which adds"
] |
How does wrist size determine ideal body weight? | [
"Sounds like something a fat person came up with to justify being \"naturally\" fat.\n\nOtherwise, they'd just use height..."
] | [
"more than eighty Dynasplint Systems that stretch in extension and flexion of the elbow, wrist, hand, finger, knee, and toes, as well as dorsiflexion and plantarflexion of the foot and ankle, supination and pronation of the forearm, internal rotation and external rotation of the shoulder, as well as abduction and adduction of the fingers and toes. Sizes are available from infant to extra large adult and are individually fit by consultants. Treatment protocol While each patient is different, the average course of treatment is 3 to 4 months for an orthopedic case, and 8 months to a lifetime for",
"envelope is determined by training. Individual muscle fiber ratios can be determined through a muscle biopsy. Other considerations are the ability to recruit muscle fibers for a particular activity, joint angles, and the length of each limb. For a given cross-section, shorter limbs are able to lift more weight. The ability to gain muscle also varies person to person, based mainly upon genes dictating the amounts of hormones secreted, but also on sex, age, health of the person, and adequate nutrients in the diet. A one-repetition maximum test is the most accurate way to determine maximum muscular strength.",
"hand at the widest part of the palm where the knuckles are, but excluding the thumb. The measurement in inches is the glove size, but if one's arms are large, it may be practical to go up a size. Generally, an evening glove is considered to be a true \"opera-length\" glove if it reaches to mid-biceps or higher on the wearer's arm, notwithstanding its actual length in inches or buttons; therefore, a petite woman might find a glove with a measurement of 16 or 17 inches adequate for the purpose, while a tall woman might need a glove longer than 22 inches.",
"Some brands may offer size XL. Surgical gloves are usually sized more precisely since they are worn for a much longer period of time and require exceptional dexterity. The sizing of surgical gloves are based on the measured circumference around the palm in inches, at a level slightly above the thumb's sewn. Typical sizing ranges from 5.5 to 9.0 at an increment of 0.5. Some brands may also offer size 5.0 which is particularly relevant to women practitioners. First-time users of surgical gloves may take some time to find the right size and brand that suit their hand geometry the",
"proportions. ... The combination of these proportions with the exceptional breadth dimensions argue[s] compellingly against the simplistic hypothesis of an average man, even one wearing shoulder pads ... or using artificial arm extensions.\"\nHowever, scientist Esteban Sarmiento (see below) disagrees that the subject has a non-human IMI.\nDr. Scott Lynn, Associate Professor of Kinesiology, California State University, was another scientist who reached a favorable conclusion. D. W. Grieve Anatomist D. W. Grieve of the Royal Free Hospital School of Medicine studied a copy of the film in 1971, and wrote a detailed analysis. He notes, \"The possibility of a very clever fake",
"Arm span Armspan in sports An above-average reach is advantageous in sports such as basketball, tennis, boxing, volleyball, discus throw, fencing, rock climbing, and swimming. For instance, boxer Sonny Liston, while 185 cm (6 ft) tall, had a reach of 213 cm (7 ft). This unusually long reach allowed him to hit opposing boxers from relatively safe distances where they could not reach him. However, a long arm span is mechanically disadvantageous on the bench press. Procedure The most common and easily accessible method of measuring armspan uses the demi-span. Using a tape measure, measure from the individual's sternal",
"correspond to the buttocks, torso, shoulder, elbow, wrist, fingers, thumb, eyelids, lips, and jaw. The arm and hand motor area is the largest, and occupies the part of precentral gyrus between the leg and face area.\nThese areas are not proportional to their size in the body with the lips, face parts, and hands represented by particularly large areas. Following amputation or paralysis, motor areas can shift to adopt new parts of the body. Neural input from the thalamus The primary motor cortex receives thalamic inputs from different thalamic nuclei. Among others:\n- Ventral lateral nucleus for cerebellar afferents\n- Ventral anterior nucleus",
"heart and lungs. All the breadth of the shoulders is due to the shoulder girdle, and contains the axillae and the heads of the humeri. In the middle line the suprasternal notch is seen above, while about three fingers' breadth below it a transverse ridge can be felt, which is known as the sternal angle and this marks the junction between the manubrium and body of the sternum. Level with this line the second ribs join the sternum, and when these are found the lower ribs can often be counted. At the lower part of the sternum, where",
"of a male collegiate rower than a method developed using a sample of the general population, because the sample is narrowed down by age, sex, physical fitness level, type of sport, and lifestyle factors. On the other hand, such a formula is unsuitable for general use. Skinfold methods The skinfold estimation methods are based on a skinfold test, also known as a pinch test, whereby a pinch of skin is precisely measured by calipers, also known as a Plicometer, at several standardized points on the body to determine the subcutaneous fat layer thickness. These measurements are converted to an estimated",
"FDA sunscreen testing is 2 mg/cm² of exposed skin. If one assumes an \"average\" adult build of height 5 ft 4 in (163 cm) and weight 150 lb (68 kg) with a 32-inch (82-cm) waist, that adult wearing a bathing suit covering the groin area should apply approximately 30 g (or 30 ml, approximately 1 oz) evenly to the uncovered body area. This can be more easily thought of as a \"golf ball\" size amount of product per body, or at least six teaspoonfuls. Larger or smaller individuals should scale these quantities accordingly. Considering only the face, this translates to about 1/4 to 1/3 of a teaspoon for the",
"size. The bust size, bust line measure, or over-bust measure is the measurement around the torso over the fullest part of the breasts, with the crest of the breast halfway between the elbow and shoulder, usually over the nipples, ideally while standing straight with arms to the side and wearing a properly fitted bra. This practice assumes the current bra fits correctly. The measurements are made in the same units as the band size, either inches or centimetres. The cup size is calculated by subtracting the band size from the over-the-bust measurement. Consumer fit research A 2012 study by White",
"should be measured at the midpoint between the lower margin of the last palpable ribs and the top of the iliac crest, using a stretch‐resistant tape that provides a constant 100 g tension. Hip circumference should be measured around the widest portion of the buttocks, with the tape parallel to the floor. Other organizations use slightly different standards. The United States National Institutes of Health and the National Health and Nutrition Examination Survey used results obtained by measuring at the top of the iliac crest. Waist measurements are usually obtained by laypersons by measurings around the waist at the navel, but",
"the body.\nAs they are attached to a region with a far smaller diameter than the thigh, there is not room for much weight without greatly changing the effective width of the lower leg. An advantage over thigh weights is that they are not attached to any major muscle or fat storage region, so tightness is not a factor and it can be used in almost any exercise.\nBeing above the ankle, movements incorporating the calf muscles such as calf raises can benefit from ankle weights.\nAnkle weights are useful in adding weight to pull-ups and dips, especially when incorporating leg raises into",
"is seated with the arm supported. Other sites of placement depend on species and may include the flipper or tail. It is essential that the correct size of cuff is selected for the patient. Too small a cuff results in too high a pressure, while too large a cuff results in too low a pressure. For clinical measurements it is usual to measure and record both arms in the initial consultation to determine if the pressure is significantly higher in one arm than the other. A difference of 10 mm Hg may be a sign of coarctation of the aorta. If",
"enough to actual reality that the measurements are reliable and accurate when averaged over groups of people.\nThe principal measurements are also subject to error. Taking a triceps skin fold measurement too frequently or for too long can result in compression of the tissue, and false readings, for example. Even which arm is measured matters, since mid-upper arm circumference is generally greater on the dominant arm (e.g. the right arm for right-handed people). Few studies make specific note of which arms were measured. Evaluation The various measures are evaluated against anthropometric reference data tables, such as those derived",
"android body fat. Waist Hip Ratio Central obesity is measured as increase by waist circumference or waist-hip ratio. Increase in waist circumference > 102 cm (40 in.) in males and > 88 cm (35 in.) in females. However increase in abdominal circumference may be due to increasing in subcutaneous or visceral fat, and it is the visceral fat which increases the risk of coronary diseases. The visceral fat can be estimated with the help of MRI and CT scan.\nIn females, measures of Waist to Hip ratio have been observed as an evolutionary sign of attractiveness and reproductive success. A females waist being",
"and where they are. Bengal: 36\", Bombay: 27\", Madras: 33\", Government Average: 33\". The hand measurements were used.\nAnguli (width of 3 fingers) = 1 Girah\n8 Girah = 1 Hath (elbow to the end of the middle finger, approximately 18\" )\n5 5/6 Hath = One Kathi\n20 Kathi = One Pand\n20 Pand = One Begah\n2 Hath = 1 Gaz\n3 Gaz = Two Karam\n3 Karams = 1 Kan\n3 Square Kans = 1 Marla\n20 Marlas = 1 Kanal\n8 Kanals = 1 Ghamaon\n9 Kanals 12 Marlas = 1 Acre\n4 Kanals = 1 Begah Akbar weights and measures Akbar standardised weights and measurements using a",
"and hip angles at REL. Monitoring these kinematics would aid in reducing shoulder stress. Mean shoulder abduction and shoulder flexion angles at SFC were 155° ±16° and 168° ±35°, respectively. As the stride foot contacted the ground, the knee demonstrated a mean value of 27°±9° of flexion. Stride length averaged 89% ±11% of body height. Stride position varied between subjects, with a mean value of –3 ±14 cm; this indicates that when the foot contacted the ground, on average it landed slightly to the first-base side of home plate for right-handed pitchers, and to the third-base side for left-handers. The elbow",
"hip circumference.\nAdiposity indexes that include the waist circumference (for example waist-to-height ratio WHtR) may be better than BAI and BMI in evaluating metabolic and cardiovascular risk in both clinical practice and research.",
"notch (center of the breastbone) to their middle finger as it is stretched out to one side, then either plug the result into a formula to estimate height, or double the demi-span for the actual armspan measurement. Demi-span is used because measuring from fingertip to fingertip is difficult, requiring two people or markings on a wall.",
"Anthropometry of the upper arm Measures The anthropometric measures of the upper arm are divided into principal measures, which are measured directly, and derived measures, which are derived from the principal measures using specific formulae and empirically-derived corrections. The derived measures attempt to provide better indicators of body composition and nutritional status than the principal measures, by accounting for the fact that external measurements of the arm necessarily compound measurements of bone, fat, and muscle. Principal measures The three principal anthropometric measures of the upper arm are the upper arm length, the triceps skin fold (TSF), and the mid-upper",
"exponent based on body mass, or body length (Snout-vent length, total length etc.). A perfectly isometrically scaling organism would see all volume-based properties change proportionally to the body mass, all surface area-based properties change with mass to the power of 2/3, and all length-based properties change with mass to the power of 1/3. If, after statistical analyses, for example, a volume-based property was found to scale to mass to the 0.9th power, then this would be called \"negative allometry\", as the values are smaller than predicted by isometry. Conversely, if a surface area-based property scales to mass to the 0.8th",
"Body surface area In physiology and medicine, the body surface area (BSA) is the measured or calculated surface area of a human body. For many clinical purposes BSA is a better indicator of metabolic mass than body weight because it is less affected by abnormal adipose mass. Nevertheless, there have been several important critiques of the use of BSA in determining the dosage of medications with a narrow therapeutic index, such as chemotherapy.\nTypically there is a 4–10 fold variation in drug clearance between individuals due to differing the activity of drug elimination processes related to genetic and environmental factors. This",
"per kilogram of body mass per minute (e.g., mL/(kg·min)). The latter expression is often used to compare the performance of endurance sports athletes. However, VO₂ max generally does not vary linearly with body mass, either among individuals within a species or among species, so comparisons of the performance capacities of individuals or species that differ in body size must be done with appropriate statistical procedures, such as analysis of covariance. Estimation using submaximal exercise testing The necessity for a subject to exert maximum effort in order to accurately measure VO₂ max can be dangerous in those with compromised respiratory or",
"muscle mass or larger bones will have higher BMIs. As such, BMI is a useful indicator of overall fitness for a large group of people, but a poor tool for determining the health of an individual. Underwater weighing Irrespective of the location from which they are obtained, the fat cells in humans are composed almost entirely of pure triglycerides with an average density of about 0.9 kilograms per litre. Most modern body composition laboratories today use the value of 1.1 kilograms per litre for the density of the “fat free mass”, a theoretical tissue composed of 72% water (density",
"Metrological Relief Measurements The relief measures 2.09 m long, 62 cm high by ca. 10 cm thick and is broken over the figure's left forearm but when complete it measured one Greek fathom or orguia. There is also an image of a foot above the right forearm which measures 29.7 cm, an imprint of a clenched fist over the right forearm of 11 cm and fingers, which measure between 1.85 and 2 cm. Eric Fernie studied the relief and noted its ancient measurement of the Greek fathom.",
"use to measure changes in body composition over time for individuals. Two-electrode foot-to-foot measurement is less accurate than 4-electrode (feet, hands) and eight-electrode measurement. Results for some four- and eight-electrode instruments tested found poor limits of agreement and in some cases systematic bias in estimation of visceral fat percentage, but good accuracy in the prediction of resting energy expenditure (REE) when compared with more accurate whole-body magnetic resonance imaging (MRI) and dual-energy X-ray absorptiometry (DEXA).\nThe use of multiple frequencies in specific BIA devices that utilize eight electrodes has been found to have a 94% correlation method with DEXA when",
"the body mass index. In the U.S. Navy the method is known as the \"rope and choke.\" There is limited information, however, on the validity of the \"rope and choke\" method because of its universal acceptance as inaccurate and easily falsified.\nThe U.S. Army and U.S. Marine Corps also rely on the height and circumference method. For males, they measure the neck and waist just above the navel. Females are measured around the hips, waist, and neck. These measurements are then looked up in published tables, with the individual's height as an additional parameter. This method is used because it is",
"fingers are stretched out from each other; itegneq (in Yup'ik) measurement from tip of toes to end of heel; foot (in length); it’ganeq (in Yup'ik) measurement from tip of toes to end of heel; foot (in length); malruneq (in Yup'ik) measurement of the width at their ends of the index finger and the middle finger held next to each other; naparneq (in Yup'ik) measurement from tip of extended thumb to opposite side fist; patneq (in Yup'ik) measurement, the width of the four fingers (thumb excluded) of one's hand; pingayuneq (in Yup'ik) measurement of the width at their ends of the",
"The midpoint of the ideal weight for the medium frames for each height was selected as the “ideal” weight used for calculations of “excess weight” (initial weight minus ideal weight). This led to a formula to calculate the ideal weight used by bariatric surgeons, but it had lost considerable accuracy by 2007, again due to improvements in medical care and in public health."
] |
Why does it seem like most crime is committed by minorities? | [
"Most crime is committed by the poor. Statistically minorities have more poor, so they tend to have more criminals.",
"Consider where you are getting this information. If something seems off like this (crime rates not matching up with demographics), see if you can find actual statistics that confirm it. If it can't be confirmed, then it's some other bias coming in (kind of like the joke in Family guy that as soon as they find out the girl stuck in the well isn't white, she's hispanic, all the media leave because they don't want to cover that)",
"Education and income play a big role.\n\nThe police also probably arrest more minorities, and the news definitely reports more stories about minorities, exaggerating the effect."
] | [
"Criminal justice system Research suggests that police practices, such as racial profiling, over-policing in areas populated by minorities and in-group bias may result in disproportionately high numbers of racial minorities among crime suspects. Research also suggests that there may be possible discrimination by the judicial system, which contributes to a higher number of convictions for racial minorities. A 2012 study found that \"(i) juries formed from all-white jury pools convict black defendants significantly (16 percentage points) more often than white defendants, and (ii) this gap in conviction rates is entirely eliminated when the jury pool includes at least one black",
"racial minorities in crime statistics and in the prison population is the result of race- and class-motivated disparities in arrests, prosecutions and sentencing rather than differences in actual participation in criminal activity, an approach which has also been taken by proponents of critical race theory. This line of argumentation is generally seen as part of a wider approach to race-related issues referred to as the Discrimination Thesis, which assumes that differences in the treatment received by people of minority racial background in a number of public institutions, including the criminal justice, education and health care systems, is the result of",
"to violence than the data and statistics stated leading to the conclusion that the stereotype of blacks as more likely criminals is deeply embedded in the collective consciousness and societal norms of Americans. Such data may reveal a possible connection, but is functionally inconclusive due to a variety of other correlating factors which overlap with race and ethnicity. Race and socioeconomic status While there is a correlation between blacks and Hispanics and crime, the data imply a much stronger tie between poverty and crime than crime and any racial group, when gender is taken into consideration. The direct correlation between",
"against by law enforcement in white neighborhoods, especially in neighborhoods that have recent growth in black population.\nIn-group bias has also been observed when it comes to traffic citations, as black and white cops are more likely to cite out-groups.\nResearch also shows that there is discrimination by the judicial system, which contributes to a higher number of convictions and harsher sentencing for racial minorities.\nA 2012 study found that \"(i) juries formed from all-white jury pools convict black defendants significantly (16 percentage points) more often than white defendants, and (ii) this gap in conviction rates is entirely eliminated when the jury pool",
"on ethnicity.) Leading forms of bias cited in the FBI's Uniform Crime Reporting (UCR) Program, based on law enforcement agency filings are: anti-black, anti-Jewish, anti-white, anti-homosexual, and anti-Hispanic bias in that order in both 2004 and 2005. According to the Bureau of Justice Statistics, whites, blacks, and Hispanics had similar rates of violent hate crime victimization between 2007 and 2011. However, from 2011 to 2012, violent hate crimes against Hispanic people increased by 300%. When considering all hate crimes, and not just violent ones, African Americans are far more likely to be victims than other racial groups.\nThe New Century Foundation,",
"effects of racial bias. Location and context The American police officers live and work in a society full of prejudices against minorities. In addition, police officers usually deal with high crime rates in minority neighborhoods. These experiences reinforce their existing prejudices by ignoring that most people with a non-white ethnic background don't become criminals. This leads to discrimination against minorities. Other factors that lead to discrimination by the police are institutionalized language barriers between police and some ethnic groups, experiences with disrespectful or hostile residents in certain minority neighborhoods and low punishment for police officers who misbehave towards minorities.\nThose prejudices",
"race, religion, politics, or socioeconomic status often exist between police and the citizenry. Some police officers may view the population (or a particular subset thereof) as generally deserving of punishment. Portions of the population may perceive the police to be oppressors. In addition, there is a perception that victims of police brutality often belong to relatively powerless groups, such as minorities, the disabled, and the poor. A 1968 study in three large cities found that police brutality was \"far from rare\", and that the most likely victim was a \"lower-class\" man of either race.\nRace was suspected to play a role",
"as race, interactions, and dress) are used to determine if a person is involved in criminal activity and that race is not a sole factor in the decision to detain or question an individual. They further claim that the job of policing is far more imperative than to concerns of minorities or interest groups claiming unfair targeting.\nProponents of racial profiling believe that inner city residents of Hispanic communities are subjected to racial profiling because of theories such as the \"gang suppression model\". The \"gang suppression model\" is believed by some to be the basis for increased policing, the theory being",
"the cases. 52.5% of people who committed homicides in the 1980-2005 time period were black. Causes of racial disproportionality Two competing hypotheses exist regarding why racial/ethnic minorities, especially African Americans, are overrepresented in the criminal justice system compared to their share of the general population.. These are the differential offending or differential involvement hypothesis, which proposes that this overrepresentation is a result of African Americans committing more of the crimes that result in criminal justice processing, and the differential selection hypothesis, which proposes that this disproportionality is a result of discrimination by the criminal justice system. Piquero (2008) argues that",
"who commit disorder and crime have a clear tie to groups suffering from financial instability and may be of minority status: \"The use of racial context to encode disorder does not necessarily mean that people are racially prejudiced in the sense of personal hostility.\" He notes that residents make a clear implication of who they believe is causing the disruption, which has been termed as implicit bias. He further states that research conducted on implicit bias and stereotyping of cultures suggests that community members hold unrelenting beliefs of African-Americans and other disadvantaged minority groups, associating them with crime, violence, disorder,",
"privileges of being in the majority are unknown by the majority, paradoxically, because they are the majority and are not subjected to the social trials of being a minority. Also white people have been portrayed by the media as mentally ill, after they had committed a serious crime such as a mass shooting. This has given an unfair judgement to black shooters because of racial skin color that the media portraits them. When black people do a mass shooting they are often viewed as being a threat with criminal intent & so they are less likely to be seen",
"difference in male and female crime rates, for instance, is far greater than that between racial groups, and pointed out that the police have a history of targeting innocent black men.\nResearch published in 2005 by the Home Office and based on the Offending, Crime and Justice Survey found that:\nWhite respondents and those of Mixed ethnic origin were more likely to say they had offended, both on an ever and last year basis than other ethnic groups. This pattern held across offence categories and was also apparent for serious and frequent offending. Conversely, those of Asian origin were least likely to",
"white supremacist groups in an embellished manner. Immigrant crime Opponents of immigration often claim that immigrants contribute to higher crime rates, but research suggests that people tend to overestimate the relationship between immigration and criminality. The academic literature provides mixed findings for the relationship between immigration and crime worldwide, but finds for the United States that immigration either has no impact on the crime rate or that it reduces the crime rate. Military unity Some concerns regarding immigration can be found in perceived military loyalty, especially if the country of emigration becomes involved in a war with the country of",
"where the race of the offender was known were committed by black suspects. As most crime is intraracial, most of their victims were black as well, and crime remained concentrated within black communities. Due to high crime rates, many inner city areas were heavily policed, often by police forces drawn from the population of the greater urban area rather than the local, primarily black, population, resulting in many black people feeling that they were being discriminated against by law enforcement. By 2009, black people accounted for 39.4% of the prison population in the United States. The incarceration rate of black",
"on the victim's sexual orientation. The report states that among hate crime offenses motivated by race, 70% were composed of anti-black bias, while 17.7% were of anti-white bias, and 5% were of anti-Asian or Pacific Islander bias. Racial composition of geographic areas Studies have examined that ethnic/racially heterogeneous areas, most often neighborhoods in large cities, have higher crime rates than more homogeneous areas. Most studies find that the more ethnically/racially heterogeneous an area is, the higher its crime rates tend to be.\nStudies examining the relationship between percentages of different races in an area and crime rates have generally either found",
"racial disparities in violent crime in recent times. However, a study of government data from 1980–2008 found that the reduction in Black violent crime relative to White violent crime was an artifact of those previous studies, which was due to Hispanic offenders being counted as White in the comparison. The Hispanic population has been increasing rapidly and Hispanics have violence rates higher than that of Whites but lower than that of Blacks. Assault The CDC keeps data on non-fatal injury emergency department visits and the race of victims. While non-Hispanic white victims account for approximately half of total non-fatal assault",
"reported that most of the reason violent crime rates are so high among blacks originates mainly from unemployment, economic deprivation, and family disorganization. Specifically, he found that \"the scarcity of employed black men increases the prevalence of families headed by females in black communities\" and that the increased prevalence of such families in turn results in family disruption that significantly increases black murder and robbery rates. Sampson, et al. and Phillips have reported that at least half of the black-white homicide offending differential is attributable to structural neighborhood factors like parents' marital status and social context. Multiple other studies have",
"to relatively powerless groups, such as racial or cultural minorities, the disabled, and the poor. An analysis of the available FBI data by Dara Lind for Vox found that US police kill black people at disproportionate rates: Black people accounted for 31 percent of police killing victims in 2012, even though they made up just 13 percent of the US population. Although the data is incomplete because it’s based on voluntary reports from police agencies around the country, it highlights the vast disparities in how police use force.\nThe war model of policing has been offered as a reason for why",
"deprivation, victimisation and offending are closely and intricately inter-related\".\nIn June 2010, through a Freedom of Information Act request, The Sunday Telegraph obtained statistics on accusations of crime broken down by race from the Metropolitan Police Service. The figures showed that the majority of males who were accused of violent crimes in 2009–2010 were black. Of the recorded 18,091 such accusations against males, 54 percent accused of street crimes were black; for robbery, 58 percent; and for gun crimes, 67 percent. Robbery, drug use, and gang violence have been associated with black people since the 1960s. In the 1980s and 1990s,",
"violent. A 2012 study found that white Americans overestimated the percent of burglaries, illegal drug sales, and juvenile crimes committed by blacks by between 6.6 and 9.5 percentage points.\nThere is also some research suggesting that blacks have also internalized the criminal stereotype. According to a study, 82% of blacks think they are perceived as violent by Whites. African Americans are also more likely than Whites to think that racial profiling is widespread and to think they are treated unfairly by police, both in general and in actual criminal justice encounters. Consequences in the justice system Many psychologists argue that the",
"– black convicts have a disproportionately higher rate of incarceration than other ethnicities. The government reports The overall number of racist incidents recorded by the police rose by 7 per cent from 49,078 in 2002/03 to 52,694 in 2003/04.\nMedia representation of young black British people has focused particularly on \"gangs\" with black members and violent crimes involving black victims and perpetrators. According to a Home Office report, 10 per cent of all murder victims between 2000 and 2004 were black. Of these, 56 per cent were murdered by other black people (with 44 per cent of black people murdered by",
"found \"that minority defendants who kill white victims are capitally charged at substantially higher rates than minority defendants who kill minorities... There is also strong and statistically significant evidence that minority defendants who kill whites are more likely to end up with capital sentences than comparable cases with white defendants.\"\nA 2016 analysis by the New York Times \"of tens of thousands of disciplinary cases against inmates in 2015, hundreds of pages of internal reports and three years of parole decisions found that racial disparities were embedded in the prison experience in New York.\" Blacks and Latinos were sent more frequently",
"the dominant group. As these differences are usually perceived negatively by, this results in loss of social and political power for members of minority groups.\nThere is no legal definition of national minorities in international law, though protection of minority groups is outlined by the United Nations Declaration on the Rights of Persons Belonging to National or Ethnic, Religious and Linguistic Minorities. International criminal law can protect the rights of racial or ethnic minorities in a number of ways. The right to self-determination is a key issue. The Council of Europe regulates minority rights in the European Charter for Regional or",
"engaged in racial profiling; it means they are stopping people in those communities who fit descriptions of suspects or are engaged in suspicious activity.\"\nHeather MacDonald denied that blacks are being stopped too often and claimed the opposite: \"The actual crime rates reveal that blacks are being significantly understopped, compared with their representation in the city’s criminal population.\" NYC Police Commissioner Raymond Kelly wrote, \"the statistics reinforce what crime numbers have shown for decades: that blacks in this city were disproportionately the victims of violent crime, followed by Hispanics. Their assailants were disproportionally black and Hispanic too.\"\nStop-and-frisk became an issue in",
"of civil rights. There also an ongoing debate on the relationship between race and crime regarding the disproportional representation of certain minorities in all stages of the criminal justice system.\nStudies in racial taxonomy based on DNA cluster analysis (See Lewontin's Fallacy) has led law enforcement to pursue suspects based on their racial classification as derived from their DNA evidence left at the crime scene. DNA analysis has been successful in helping police determine the race of both victims and perpetrators.\nThis classification is called \"biogeographical ancestry\".",
"as racial profiling, over-policing in areas populated by minorities and in-group bias may result in disproportionately high numbers of racial minorities among crime suspects in Sweden, Italy, and England and Wales. Research also suggests that there may be possible discrimination by the judicial system, which contributes to a higher number of convictions for racial minorities in Sweden, the Netherlands, Italy, Germany, Denmark and France. A 2018 study found that the Dutch are less likely to reciprocate in games played with immigrants than the native Dutch.\nSeveral meta-analyses find extensive evidence of ethnic and racial discrimination in hiring in the North-American and",
"against minorities. They train their officers to profile individuals based upon their racial heritage, and to exert excessive force to restrain them. Racial profiling and police brutality are \"employed to control a population thought to be undesirable, undeserving, and under punished by established law\". In both situations, police officers \"rely on legal authority to exonerate their extralegal use of force; both respond to perceived threats and fears aroused by out-groups, especially— but not exclusively— racial minorities\". For example, \"blacks are: approximately four times more likely to be targeted for police use of force than their white counterparts; arrested and convicted",
"whites and Asians – making black people disproportionately higher victims of killing by people from other ethnicities). In addition, a Freedom of Information request made by The Daily Telegraph shows internal police data that provides a breakdown of the ethnicity of the 18,091 men and boys who police took action against for a range of offences in London in October 2009. Among those proceeded against for street crimes, 54 per cent were black; for robbery, 59 per cent; and for gun crimes, 67 per cent.\nBlack people, who according to government statistics make up 2 per cent of the population, are",
"killed by police officers as low-income blacks. However, black cops were found to be more likely to kill black civilians than white cops were, because police tend to be drawn from the communities they work in. Consequences There is evidence that the American society has internalized the criminal stereotype of African Americans. For example, in experiments where African American and white individuals perform the same act, respondents have reported that the black figure is more threatening than the white figure. Likewise, in surveys asking about fear of strangers in hypothetical situations, respondents are more fearful of being victimized by black",
"minority group by a more powerful majority. By contrast, acts of terrorism are typically \"upward crimes,\" with a low-power minority perpetrator targeting a more prominent majority group.\nThe California Association for Human Relations Organizations (CAHRO) asserts that hate groups such as the Ku Klux Klan (KKK) and White Aryan Resistance (WAR) preach violence against racial, religious, sexual and other minorities in the United States. Joseph E. Agne argues that hate-motivated violence is a result of the successes of the civil rights movement, and he asserts that the KKK has resurfaced and that new hate groups have formed. Agne argues that it"
] |
why babies have a highersurvival rate in tragedies like plane crashes and earthquakes | [
"Less mass makes less force upon impact. They are also squishier which is not always good, but sometimes helps."
] | [
"injuries requiring hospitalization. Children in forceful impacts suffer twice as many pulmonary contusions as adults with similar injury mechanisms, yet have proportionately fewer rib fractures. The rates of certain types of injury mechanisms differ between children and adults; for example, children are more often hit by cars as pedestrians. Some differences in children's physiology might be advantageous (for example they are less likely to have other medical conditions), and thus they have been predicted to have a better outcome. However, despite these differences, children with pulmonary contusion have similar mortality rates to adults. History In 1761, the Italian",
"an increase in child fatalities in the mid-1990s as small children were being hit by deploying airbags during collisions. The supposed solution to this problem, moving the child seat to the back of the vehicle, led to an increase in the number of children forgotten in unattended vehicles, some of whom died under extreme temperature conditions.\nRisk compensation, or the Peltzman effect, occurs after implementation of safety measures intended to reduce injury or death (e.g. bike helmets, seatbelts, etc.). People may feel safer than they really are and take additional risks which they would not have taken without the safety measures",
"babies has not resulted in a noticeable decrease in CP. This is generally attributed to medical advances in areas related to the care of premature babies (which results in a greater survival rate). Only the introduction of quality medical care to locations with less-than-adequate medical care has shown any decreases. The incidence of CP increases with premature or very low-weight babies regardless of the quality of care. As of 2016, there is a suggestion that both incidence and severity are slightly decreasing - more research is needed to find out if this is significant, and if so, which interventions are",
"cricket have a notable incidence of head injuries (concussions). In one survey of retired NFL players, all of whom reported one or more concussions during their playing careers, 25% had hearing loss and 50% had tinnitus. Perinatal conditions These are much more common in premature babies, particularly those under 1500 g at birth. Premature birth can be associated with problems that result in sensorineural hearing loss such as anoxia or hypoxia(poor oxygen levels), jaundice, intracranial haemorrhages, meningitis. Fetal alcohol syndrome is reported to cause hearing loss in up to 64% of infants born to alcoholic mothers, from the ototoxic effect on",
"Trauma in children Anatomic and physiologic differences There are significant anatomical and physiological differences between children and adults. For example, the internal organs are closer in proximity to each other in children than in adults; this places children at higher risk of traumatic injury.\nChildren present a unique challenge in trauma care because they are so different from adults - anatomically, developmentally, physiologically and emotionally. A 2006 study concluded that the risk of death for injured children is lower when care is provided in pediatric trauma centers rather than in non-pediatric trauma centers. Yet about 10% of injured children are treated",
"the introduction of safety devices such as AADs, the fatality rate has stayed roughly constant when adjusted for the increasing number of participants. This can largely be attributed to an increase in the popularity of high performance canopies, which fly much faster than traditional parachutes. A greater number of landing fatalities in recent years has been attributed to high speed maneuvers close to the ground. Safety equipment in children Experimental studies have suggested that children who wear protective equipment are likely to take more risks. Risky sexual behavior and HIV/AIDS Evidence on risk compensation associated with HIV prevention interventions is",
"including suicide, may, in some cases, be attributed to the long-term effects of untreated neonatal pain. Pathophysiology The present understanding of pain in babies is largely due to the recognition that the fetal and newborn unmyelinated nerve fibres are capable of relaying information, albeit slower than would be the case with myelinated fibres. At birth a baby has developed the neural pathways for nociception and for experiencing pain, but the pain responses are an immature version of that of an adult. There are a number of differences in both nerve structure and in the quality and extent of nerve response",
"likely to take longer to recover.\nThe way in which children cope with the injury after it occurs may have more of an impact than factors that existed prior to the injury. Children's mechanisms for dealing with their injuries may have an effect on the duration of symptoms, and parents who do not deal effectively with anxiety about children's post-injury functioning may be less able to help their children recover.\nIf another blow to the head occurs after a concussion but before its symptoms have gone away, there is a slight risk of developing the serious second-impact syndrome (SIS). In SIS,",
"affecting birth outcomes. In Australia, studies show that male infants born with drastically higher average birth weights were born in mostly severely fire-affected areas. This is attributed to the fact that maternal signals directly affect fetal growth patterns.\nAsthma is one of the most common chronic disease among children in the United States affecting estimated 6.2 million children. A recent area of research on asthma risk focuses specifically on the risk of air pollution during the gestational period. Several pathophysiology processes are involved are in this. In human's considerable airway development occurs during the 2nd and 3rd trimester and",
"on, children may develop symptoms related to problems with blood flow and an enlarged heart. They may experience dizziness or shortness of breath, fainting or near-fainting episodes, chest pain, abnormal tiredness or fatigue, headaches, or nosebleeds. They have cold legs and feet or have pain in their legs with exercise (intermittent claudication).\nIn cases of more severe coarctations, babies may develop serious problems soon after birth because not enough blood can get through the aorta to the rest of their body.\nArterial hypertension in the arms with low blood pressure in the lower extremities is classic. In the lower extremities, weak pulses",
"Also, one study looking at elderly individuals from Iwanuma City in the Miyagi prefecture found that exercise may help decrease depressive symptoms among older adults who survived the earthquake and tsunami disaster.\nAnxiety\nOne of the most common fears regarding nuclear disasters is radiation exposure. Parental anxiety was one of the reasons for thyroid ultrasound examinations in children after the disaster. In 2015, one study found that in a group of 300,473 children that had undergone a thyroid ultrasound since the Fukushima nuclear disaster, nearly half of this sample had developed nodules or cysts; 116 children from this sample developed nodules that",
"diarrhea and malaria, disproportionately impact children; about 90 percent of malaria and diarrhea deaths are among young children. Children are also 14–44 percent more likely to die from environmental factors, again leaving them the most vulnerable. Those in urban areas will be affected by lower air quality and overcrowding, and will struggle the most to better their situation. Social effects of extreme weather As the World Meteorological Organization explains, \"recent increase in societal impact from tropical cyclones has largely been caused by rising concentrations of population and infrastructure in coastal regions.\" Pielke et al. (2008) normalized mainland U.S. hurricane damage",
"increase blood pressure in children.\nAccording to a WHO report-2018, polluted air is a main cause poisoning millions of children under the age of 15 years and ruining their lives which resulting to death of some six hundred thousand children annually. Infants Ambient levels of air pollution have been associated with preterm birth and low birth weight. A 2014 WHO worldwide survey on maternal and perinatal health found a statistically significant association between low birth weights (LBW) and increased levels of exposure to PM2.5. Women in regions with greater than average PM2.5 levels had statistically significant higher odds",
"and secondary crashes can dramatically increase the expected crash severity.",
"includes physical, sexual, and psychological abuse of a child ages zero to five years-old. Trauma in early development has extreme impact over the course of a lifetime and is a significant contributor to infant mortality. Developing organs are fragile. When an infant is shaken, beaten, strangled, or raped the impact is exponentially more destructive than when the same abuse occurs in a fully developed body. Studies estimate that 1–2 per 100,000 U.S. children annually are fatally injured. Unfortunately, it is reasonable to assume that these statistics under represent actual mortality. Three-quarters (74.8 percent) of child fatalities in FFY 2015",
"mothers are at higher risk to be born small or prematurely. Impact on child development Children's reactions to emergencies fluctuate depending on age, temperament, genetics, pre-existing problems, coping skills and cognitive competencies, and the dose of the emergency. Although most children are said to recover over time, if emergency reactions are left untreated, they can have a significant adverse impact on children's social, emotional, behavioural and physical development. Age 6 and younger In conflict-affected countries, the average mortality rate for children under 5 is more than double the rate in other countries. On the average, twelve children out of a",
"of strong attachment between infants and their primary caregiver on child development is well documented; research has shown that attachment disruptions are a predictor of poor mental health, increased crime rates, and relationship quality. Satellite babies suffer at least two major attachment disruptions: the first when they are separated from their mother, and another when they are separated from their family caregiver to be returned to their mother.\nUpon reunification with their parents, satellite babies may exhibit a range of both externalising and internalising behaviours that indicate emotional trauma, including oppositional behaviour, separation anxiety, and social isolation. According to interviews with",
"accounted for 59.5% of all mortality for children under 18 in 2004. Injury is the leading cause of death in this age group in the United States—greater than all other causes combined. It is also the leading cause of permanent paralysis for children. In the US approximately 16,000,000 children go to a hospital emergency room due to some kind of injury every year. Male children are more frequently injured than female children by a ratio of two to one. Some injuries, including chemical eye burns, are more common among young children than among their adult counterparts; these are largely due",
"and trauma described by mental health professionals who also experienced the attacks and their aftermath Schechter observed that separation anxiety among infants and young children who had either lost or feared loss of their caregivers triggered posttraumatic stress symptoms in the surviving caregivers. These observations validated his prior work on the adverse impact of family violence on the early parent-child relationship, formative social-emotional development and related attachment disturbances involving mutual dysregulation of emotion and arousal. This body of work on trauma and attachment has been cited by prominent authors in the attachment theory, psychological trauma, developmental psychobiology and neuroscience",
"blood pressure and heart rate. Studies of this kind provided hard evidence that avoidant infants were truly distressed during the strange situation task despite their minimally distressed appearance as they showed elevations in heart rate when caregivers were away and took longer to return to baseline when the caregiver returned in comparison to securely attached infants. Studies of skin conductance and heart rate in adults have shown that those with avoidant attachment and anxious attachment will show markers of increased distress during attachment and non-attachment stressors compared to those securely attached. Health behaviours According to attachment theory people with insecure",
"post-traumatic stress disorder are common secondary complications of HG and emotional support can be beneficial. Infant The effects of HG on the fetus are mainly due to electrolyte imbalances caused by HG in the mother. Infants of women with severe hyperemesis who gain less than 7 kilograms (15 lb) during pregnancy tend to be of lower birth weight, small for gestational age, and born before 37 weeks gestation. In contrast, infants of women with hyperemesis who have a pregnancy weight gain of more than 7 kilograms appear similar to infants from uncomplicated pregnancies. There is no significant difference in the neonatal death",
"emotional and physiological responding. Researchers Edgar, Paul and Nicol found that in conditions where the chick was susceptible to danger, the mother hens heart rate increased, vocal alarms were sounded, personal preening decreased and body temperature increased. This responding happened whether or not the chick felt as if they were in danger. Mother hens experienced stress-induced hyperthermia only when the chick's behavior correlated with the perceived threat. Animal maternal behavior may be perceived as empathy, however, it could be guided by the evolutionary principles of survival and not emotionality.",
"by caregivers who are familiar with the person's normal behavior. \nInfants do feel pain, but lack the language needed to report it, and so communicate distress by crying. A non-verbal pain assessment should be conducted involving the parents, who will notice changes in the infant which may not be obvious to the health care provider. Pre-term babies are more sensitive to painful stimuli than those carried to full term.\nAnother approach, when pain is suspected, is to give the person treatment for pain, and then watch to see whether the suspected indicators of pain subside. Other reporting barriers The way",
"heatstroke. National Child Passenger Safety Board Secretariat Amy Artuso pointed to distraction as an issue in an article published by CNN. Artuso and San Jose State University's Jan Null are two of the experts consulted in an article published by The Clarion-Ledger. Earlier, Gene Weingarten reported on kids and hot cars in The Washington Post.\nInfants and children driven by teen drivers are three times more likely to be injured in a crash than those driven by an adult.\nIn the United States, Child Passenger Safety Week and National Car Seat Check Saturday are observed every year in September. The purpose",
"exposure to a potentially traumatic event. Furthermore, that same individual may recover more quickly and successfully from a potentially traumatic experience than an individual who could be said to be less resilient. In children, level of functioning is operationalized as the child continuing to behave in a manner that is considered developmentally appropriate for a child of that age. Level of functioning is also measured by the presence of mental health disorders such as depression, anxiety, posttraumatic stress disorder, and so on. Factors that affect resilience Factors that affect resilience include cultural factors like socioeconomic status, such that having more",
"Infant respiratory distress syndrome, gastrointestinal, and hematologic diseases, central nervous system (CNS) problems such as hearing loss, are more prone to infections, and at risk for hearing and vision loss.\nBabies born of low weight are also at risk for respiratory, gastrointestinal, cardiac, CNS, infection and vision problems. These gestational issues persist until the adult years for most children and result in high blood pressure, Type II Diabetes, and other heart diseases.\nPrematurity and Low Birth Weight caused by air pollution also affects fetal brain development. This is of importance since lack of proper brain development will not allow a child's brain",
"intruding fear of the unknown, potentially dangerous, strange person.\"\nMain and Hesse found most of the mothers of these children had suffered major losses or other trauma shortly before or after the birth of the infant and had reacted by becoming severely depressed. In fact, fifty-six per cent of mothers who had lost a parent by death before they completed high school had children with disorganized attachments. Subsequent studies, whilst emphasising the potential importance of unresolved loss, have qualified these findings. For example, Solomon and George found unresolved loss in the mother tended to be associated with disorganized attachment in their",
"school athletes suffer approximately 715,000 injuries annually. Regarding American football, there are five times more catastrophic injuries in high school than compared to college-level competition. Overuse injuries Nearly half of all injuries in pediatric sports medicine are due to overuse. Such injuries can be attributed to inappropriate workout intensity and overlong athletic seasons. Other risk factors include sleep deprivation, general physical and cognitive immaturity, dietary imbalance and inadequate physical fitness. Among young athletes, common overuse injuries are stress fractures, which include injury of the: According to research, the frequency of injury varies from sport to sport as well as depending",
"uncommon such as washing a car repeatedly or taking up repetitive tasks such as sewing, computer games, etc. It is an effort to stay above the grief. Childhood loss as mentioned before can predispose a child not only to physical illness but to emotional problems and an increased risk for suicide, especially in the adolescent period.\nChildren can experience grief as a result of losses due to causes other than death. For example, children who have been physically, psychologically or sexually abused often grieve over the damage to or the loss of their ability to trust. Since such children usually have",
"orphans answered “I felt like crying” a lot as compared to 20.8% of children orphaned by other reasons. 60.3% of AIDS orphans also answered “I felt sad” a lot, while only 20.8% of children orphaned by other reasons answered the same level. In addition, the study showed that the bulk of the depression score was concentrated among children of younger ages for AIDS orphans, while in other orphans it was mostly seen in older children. A distinction was also made between genders; girls orphaned due to AIDS had a higher rate of depression than boys.\nStudies also show that the likelihood"
] |
In tennis, why are women's French Open and other Grand Slam winners paid the same amount as men when they play fewer sets? | [
"Probably to prevent being called sexist for having different prizes based on gender. If it bothers you, remember they're getting paid for getting the same \"job\" done. Nadal gets the same amount of money as Serena because they both won Wimbledon (example, no idea if that's happened.) the amount of \"work\" is irrelevant since they're getting paid based on results.\n\nIf you want to make the seeming unfairness worse, take into account that the men draw bigger crowds and tv ratings and therefore make more money for the event, along with playing more sets.",
"It is because women players are equally good as men.\n_URL_0_",
"Pro athletes, like actors, don't get paid for they amount of work they do. They get paid to put on a show, and if the audience is happy with the show, everyone is happy.\n\nThere was also a period when men's tennis was really, really boring. After Connors and McEnroe were past their prime, there weren't dominant players, big rivalries, or even much in terms of personality. Women's tennis was much more interesting at the time, and often drew bigger audiences and sponsorship deals. Female players complained they were underpaid, and many tournaments instituted prize equality.\n\n > Why don't women play the same number of sets anyways?\n\nTradition. Most women's professional sports started off as a novelty, and taken less serious. People didn't necessarily want to seem them play all that long, and there were probably concerns about, as you say, frailness.\n\nBut even though we have more enlightened views today, 3 sets is the standard...it is what current athletes train to, and changing it would disrupt the game without much upside.",
"Because the appearance of equality is more important than actual equality.\n\nIf you wanted actual equality you would evaluate pay on the amount of spectators/viewers the 2 genders draw in and use that as a metric. How many sets they play or how much work they do isn't relevant to a pay/prize money discussion since pay is determined by value.",
"It was not this way for a really long time, but they have now moved to equal pay for all 4 majors. Martina Navratilova even suggested that the girls should play 5 sets and that if they had, she would have won even more because she was more fit than a lot of others. \n\nHowever, scheduling is already very difficult and it can be tough trying to up the ladies to 5 set matches. I personally think they should do this for majors, though."
] | [
"has argued that women's tennis is worth less for a variety of reasons; it says, for example, that because men play a best of five sets game they work harder for their prize money.\nThis argument just doesn’t make sense; first of all, women players would be happy to play five sets matches in grand slam tournaments....\nSecondly, tennis is unique in the world of professional sports. No other sport has men and women competing for a grand slam championship on the same stage, at the same time. So in the eyes of the general public the men's and women's games have",
"match point and go on to win a Major final. Fight for equal prize money Despite years of protesting by tennis pioneer Billie Jean King and others, in 2005 the French Open and Wimbledon still refused to pay women's and men's players equally through all rounds. In 2005, Williams met with officials from both tournaments, arguing that female tennis players should be paid as much as male tennis players. Although WTA tour President Larry Scott commented that she left \"a very meaningful impression\", Williams's demands were rejected.\nThe turning point was an essay published in The Times on the eve of",
"system. On the professional circuit, men play best-of-five-set matches at all four Grand Slam tournaments, Davis Cup, and the final of the Olympic Games and best-of-three-set matches at all other tournaments, while women play best-of-three-set matches at all tournaments. The first player to win two sets in a best-of-three, or three sets in a best-of-five, wins the match. Only in the final sets of matches at the Australian Open, the French Open, Wimbledon, the Olympic Games, Davis Cup (until 2015), and Fed Cup are tie-breaks not played. In these cases, sets are played indefinitely until one player has a two-game",
"the prize money of the United States Open. Starting with the United States Open, up to now, all of the four Grand Slam tournaments offer the same prize money to female and male athletes. The list of the top 10 highest-paid female athletes in 2018 released by Forbes shows that tennis is the best-paying sports for female athletes as eight tennis player joined that list. In 2019, Serena WIlliams is the highest of all women's tennis players on the Forbes World's Highest-Paid Athletes list. She currently is sitting at number sixty-three. Williams is the highest of all female athletes on",
"money. So the more we support the tournament, the more unequally we should be treated! But doubles and mixed doubles are separate events from the singles competition. Is Wimbledon suggesting that, if the top women withdrew from the doubles events, that then we would deserve equal prize money in singles? And how then does the All England Club explain why the pot of women's doubles prize money is nearly £130,000 smaller than the men's doubles prize money?\nI intend to keep doing everything I can until Billie Jean's original dream of equality is made real. It's a shame that the name",
"one of the four Grand Slam tournaments is awarded 2000 points. In 2009, a greater emphasis began to be placed on winning a tournament, as the points awarded to the runner-up dropped from 70% of the champion's points to 60% (i.e. from 700 points to 600 points in a Masters 1000 event). Points also began to be awarded for Davis Cup singles play. Women's professional tennis Women's professional tennis began in 1926, when world number one female player Suzanne Lenglen accepted $50,000 for a series of matches against three-time US Champion Mary K. Browne. The series ended in 1927,",
"common at smaller tournaments. By 1970 these figures had increased to up to 12:1.\nIn 1970 Margaret Court won the Grand Slam and received only a $15,000 bonus, whereas the men could achieve up to $1 million. The low point in women's pay inequality came before the US Open in 1970. The Pacific Southwest Championships directed by Jack Kramer, had announced a 12:1 ratio in the prize money difference between what males and females would win. The tournament would not take place until after the US Open. Several female players contacted Gladys Heldman, publisher of World Tennis Magazine, and stated that they",
"running her record tournament total to 89. This win also pushed Williams to her 13th slam, getting ahead of Billie Jean King. After the match, Martina Navratilova said that Williams is in the top 5 of all the women's tennis players in all of history, which she said that \"it's not just about how many Slams you win or how many tournaments you win—it's just your game overall. And she's definitely got all the goods.\"\nIn the doubles, she once again played with sister Venus as the top seeds. They cruised through their first three matches winning it straight sets, over",
"fourth consecutive slam final, being the first pair in women's tennis to compete in four consecutive slam finals, the sisters were also squared at four wins a piece in their previous meetings. The first set saw Venus served for the set, but failed to do so, as Serena pushed it to a tie-break and win seven games to four. However the older Williams came back and took the second set. In the final set Venus saved breakpoints in the eight game, but eventually got broken in the tenth game to hand her sister the victory. Serena had 54 errors to",
"is unique in that, for men, matches are best three of five sets, and that both female and male players do not play singles (or doubles) matches in consecutive days, barring inclement weather or other unforeseen scheduling issues. The fields are expanded as one hundred twenty-eight singles players and 64 doubles teams are featured in the main draws. Men's Prior to 1990 professional men's tour tennis consisted of two competing tennis circuits, the Grand Prix tennis tour and World Championship Tennis. This was particularly true during the 1970s, when tour tennis was started in its current format -",
"Grand Slam tournaments from 2000 to 2016 are as follows: at Wimbledon (grass surface), 127 bagels were made; at French Open (clay surface), 267; at the US Open Tennis Championship (hard surface), 275, and at the Australian Open (hard surface), 238. Björn Borg (five-time Wimbledon champion and six-time French Open champion) recorded 20 6–0 sets at the French Open, and only 5 at Wimbledon. Women's singles For women in Grand Slam tournaments, a double bagel result is possible as the matches are best of three sets. In the Open Era, not a single Grand Slam tournament match ended with a",
"margin of victory be two. A volleyball game tied at the target score continues until one team's score exceeds the other's by two points.\nThe traditional requirement that a tennis set be won by two games sometimes resulted in men's five-set matches lasting over six hours (including an 8-hour 11-minute set at Wimbledon) or, in women's/doubles' three-set matches, lasting over three hours, which is a major disruption to a television schedule. To shorten matches, sets tied at six games each can now be broken by a single tiebreaker game. This is awarded to the first player to score",
"current pay gap in the workplace throughout America as well. This difference means that roughly the 15th best male player makes almost $120,500 more than a female with the same ranking. In 2018, according to the Guardian, 71% of the worlds top men earn more in prize money than females who have their same ranking. Between 2010-2014 the US Women's Open final drew a larger audience than the men. The 2007 Wimbledon Championships was the first tournament that offered equal prize money for male and female athletes. This may be the case during televised events and the grand slams, women",
"next match Gasquet once again delivered winning both his matches (singles and mixed doubles) to ensure France's defeat of Great Britain. However that meant Gasquet would have to play Roger Federer of Switzerland, whom he had lost to on numerous occasions in the past. Predictably Gasquet lost to Federer in straight sets, the first set being a 6-1 annihilation, however due to Mladenovic's victory over Bencic and Mladenovic and Gasquet's victory over Federer and Bencic in the mixed doubles, France progressed through to the final where they faced the United States. France defeated the United States in the final after",
"money In professional tennis tournaments such as Wimbledon, the singles competition receives the most prize money and coverage, followed by doubles, and then mixed doubles usually receive the lowest monetary awards. For instance in the US Open as of 2018, the men's and women's singles prize money (US$40,912,000) accounts for 80.9 percent of total player base compensation, while men's and women's doubles (US$6,140,840), men's and women's singles qualifying (US$3,008,000), and mixed doubles (US$505,000) account for 12.1 percent, 5.9 percent, and 1.0 percent, respectively. The singles winner receives US$3,800,000, while the doubles winning pair receives $700,000 and the mixed doubles winning",
"women's tennis In women's tennis matches the ball is usually played without effect (less than lift) and games tend to play more from the baseline; typing is generally less powerful than men. The game is made in a more tactical speed and anticipation. The service is also less powerful; it is relatively less important than for men. However, there has been a noted evolution in this field since the 1990s.",
"she adds as much topspin as possible to increase the probability of the ball landing in court. As well as her forehand, she can rely on her first-serve to get her some easy points as she often has a high first-serve percentage and usually wins the majority of points on her first-serve. She rarely has a match where she serves no aces at all, and in her second round match at the 2008 US Open she served a total of seven aces.",
"a winning margin of at least two points.\nInternational competitions run by the International Racquetball Federation are like the USA Racquetball scoring system: two games to 15 with a tie-breaker to 11, if necessary, and win by one. However, the men's and women's pro tours play matches that are the best-of-five games to 11 points, requiring a two-point margin for victory. Hinders Due to the nature of the game, players often occupy the space their opponent(s) want(s) to occupy. This may result in a player blocking his opponent's ability to play the ball. Such occurrences are termed either hinders or penalty",
"the same value.\nThird, ... we enjoy huge and equal celebrity and are paid for the value we deliver to broadcasters and spectators, not the amount of time we spend on the stage. And, for the record, the ladies’ final at Wimbledon in 2005 lasted 45 minutes longer than the men's....\nWimbledon has justified treating women as second class because we do more for the tournament. The argument goes that the top women – who are more likely also to play doubles matches than their male peers – earn more than the top men if you count singles, doubles and mixed doubles prize",
"all of their career titles on clay. Among female players, there have been very few whose best results were confined exclusively to clay. Virginia Ruzici, Anastasia Myskina, Iva Majoli, Sue Barker, Ana Ivanovic, Francesca Schiavone, Jeļena Ostapenko and Ashleigh Barty are the only female players to have won major titles at only the French Open since the beginning of the open era.\nIncreasingly, clay courters have attempted to play better on other surfaces with some success. Ferrero reached the US Open Final in 2003, the same year he won the French Open, and also won several hardcourt tournaments. Nadal was considered",
"has won the most Grand Slams (23 as of 2017) in the Open era, beating out tennis legend, Steffi Graf. Serena is only one behind Margaret Court for total singles titles in women's tennis. Her career prize money of $84 million is more than twice as much as any other female athlete. Management American sports entrepreneur Jerry Diamond (1928–1996) served as executive director of the women's association from 1974 to 1985. He was instrumental in negotiating business deals with Avon, Colgate-Palmolive, and Toyota, and worked out the deal that made Virginia Slims the titular sponsor of the WTA tour.\nLarry Scott became",
"which they won with ease in straight sets. This marked their fourth consecutive doubles slam. They're only the third women's doubles pair to win four major titles in a row. Martina Navratilova and Pam Shriver did it in 1983–84, and Gigi Fernández and Natasha Zvereva did it in 1992–93. Wimbledon Championships Williams was entering Wimbledon as the world no. 1, defending champion, and 3 time former champion. She started her campaign for a fourth title against a young Portuguese in Michelle Larcher de Brito. Williams won comfortably beating de Brito in straight sets. In the following round, she faced former",
"win was her commitment to fitness training. Court was dubbed \"The Aussie Amazon\" because she did weights, circuit training and running along sandy hillsides. This training helped keep her relatively injury-free through most of her career.\nCourt won a record 64 Grand Slam tournament titles, including a record 24 singles titles, 19 women's doubles titles, and a record 21 mixed doubles titles. The total includes two shared titles at the Australian Championships/Open in 1965 and 1969. The mixed doubles finals of those years were not played because of bad weather and the titles are shared by both of the finalist pairs.\nCourt",
"won the French Open, including John McEnroe, Frank Sedgman, John Newcombe, Venus Williams, Stefan Edberg, Boris Becker, Jimmy Connors, Louise Brough, Virginia Wade or Martina Hingis; McEnroe and Edberg lost their sole French Open finals appearances in five sets.\nOn the other hand, players whose games are more suited to slower surfaces, such as Rafael Nadal, Björn Borg, Ivan Lendl, Mats Wilander, Justine Henin and Chris Evert, have found great success at this tournament. In the Open Era, the only male players who have won both the French Open and Wimbledon, played on faster grass courts, are Rod Laver, Jan",
"reached the number 1 ranking in 1973 after winning the US Open in 1972 and the French Open in 1973.\nWomen's tennis, in particular, has seen tremendous successes both in the 20th and 21st centuries, with the advent of Florența Mihai, Virginia Ruzici, Irina Spîrlea and Simona Halep. Three of these women reached the Top 10 of the WTA rankings in singles, namely Ruzici, Spîrlea and Halep whilst Mihai, Ruzici and Halep reached Grand Slam finals with Ruzici winning the French Open in 1978 and Halep winning the same tournament in 2018.\nTournaments held in Romania on the men's tour every year",
"who used their all-court games, a break from recent years that featured a succession of power baseliners claiming the title. At almost every point throughout the match, both players approached the net to volley. Tipped as the tournament favorite, Henin won the first set. But Mauresmo recovered to win the next two sets and her second Grand Slam singles title and deny the Belgian a career Grand Slam. This was the only Wimbledon final of the decade that did not involve Venus and/or Serena Williams.\nHenin withdrew from Tier I events in San Diego and Montreal because of injury but played",
"resistance as she took 3 games in the set, but Williams was proven to good as she won her 10th slam title. The win also meant that Williams has now become the highest paid female athlete in history, overtaking golfer Annika Sörenstam.\nIn doubles, she paired with sister Venus and won their first three matches in straight sets against Svetlana Kuznetsova and Nadia Petrova, Ayumi Morita and Martina Müller, and Samantha Stosur and Rennae Stubbs.\n In the quarterfinals, they dropped their first set of the tournament against the team of Hsieh Su-wei and Peng Shuai, when they lost the second set,",
"team in French first division history with 16 titles, including an ongoing streak of twelve titles (2007 to present). In the UEFA Women's Champions League, OL have won a record five titles (2011, 2012, 2016, 2017 and 2018) and have been runners-up twice (2010 and 2013). Tennis Tennis is the second most popular French sport in terms of the number of licensed players with 1,111,316 licensed tennis players in France (2012).\nFrance holds the tennis Grand Slam tournament Roland Garros. As of February 20, 2017, the current male and female French no. 1 players are Jo-Wilfried Tsonga and Caroline Garcia,",
"to compete in Grand Slam tournaments and other events organized or sanctioned by the ILTF, including the Davis Cup. \nThe move is made because the English are tired of the hypocrisy in the sport, the shamateurism that plagues high-class tennis. It is well known that amateurs bargain for – and receive – exorbitant expenses to compete at many tournaments.\n\"We must take action on our own account to make the game honest\", said Derek Penmam of the British association. \"For too long now we have been governed by a set of amateur rules that are quite unenforceable.\"\nDuring the first years of",
"the French Open. Both players employed the same strategy, trying to win points from the baseline. Nadal won a break early in the first set, but lost it back quickly and had to fend off two other break points during the set. Nadal ending up winning the first set 6–3. Down 3–1 in the second set, Ferrer had four break points to get back into the set. However, Nadal fought them all off, winning the last point on a 31-shot rally, the longest of the match. From there he cruised to a 6–2 set victory. "
] |
why do you get so irritated by someone asking to hear something more than one or two times? | [
"Because I've been told many times before to speak up so people can hear me. Doesn't always work well when you're an introvert :/",
"I’m deaf in one ear so I know I do this all the time (or I just smile and nod), so when other people do it I try to give them the benefit of the doubt. I know how frustrating it can be. Honestly if someone is asking that many times for me to repeat myself, at least I know they really want to know what I said."
] | [
"its actual ringing. The ringing can generate a string of anxieties, characterized by thoughts associated with having to speak, perform and converse. Sufferers may perceive the other end as threatening or intimidating. Anxiety may be triggered by concerns that the caller may bear bad or upsetting news, or be a prank caller.\nFear of making calls may be associated with concerns about finding an appropriate time to call, in fear of being a nuisance. A sufferer calling a household or office in which they know several people may be concerned at the prospect of failing to recognize the voice of the",
"that constitutes life’s meaning. Furthermore, many feel as if their inability to hear others during conversation is their fault. It's important that these individuals learn how to become more assertive individuals who do not lack fear when it comes to asking someone to repeat something or to speak a little louder. Although there is much fatigue and frustration that is produced from one’s inability to hear, it is important to learn from personal experiences in order to improve on one’s communication skills. In essence, these patterns will help adults with hearing loss deal with the communication barriers that are present.",
"person who answers, with resultant embarrassment. Some sufferers may be anxious about having to \"perform\" in front of a real or perceived audience at their end of the line: this is a particular problem for those required to use a phone in the workplace.\nFear of using the phone in any context (for either making or receiving calls) may be associated with anxiety about poor sound quality, and concerns that one or other party will not understand what has been said, resulting either in misunderstandings, or in the need for repetition, further explanation, or other potentially awkward forms of negotiation. These",
"said over the phone, when several people are talking at once, in a large space, or when the speaker’s face cannot be seen. Subsequently, challenging social interactions can negatively lead to decreased self-esteem, shame, and fear. This can be more acutely felt by those who experience hearing impairment or loss earlier in life, rather than later when it is more socially accepted. Such psychosocial states, regardless of age, can lead to social isolation, which is known to negatively impact one’s overall health and well-being. The compounding impacts can also lead to depression, especially if hearing impairment leads to tinnitus.",
"clearly and obviously that they were distressed while giving a speech. This non-verbal communication is a signal of discomfort to the observer and is perhaps an unconscious request for help.\" These behaviors that are included in the fidget factor lead youth to have difficulty forming relationships as these actions may be perceived as inauthentic or secretive. Fidgeting has been identified through discourse analysis of couples in conflict as a visual cue of shame, related to facial tension and masking of expressions.\nFreeze Factor: stillness, facial tension and silence. \nIndividuals who scored higher on this factor typically displayed a lack of any",
"Communication noise Psychological noise Psychological noise results from preconceived notions we bring to conversations, such as racial stereotypes, reputations, biases, and assumptions. When we come into a conversation with ideas about what the other person is going to say and why, we can easily become blinded to their original message. Most of the time psychological noise is impossible to free ourselves from, and we must simply strive to recognize that it exists and take those distractions into account when we converse with others. Environmental Noise Environmental noise is the summary of noise pollution from outside, caused by transport, industrial and",
"people sick of the sound of my tongue. It appeared to me that I had various things to say, and I had no malevolent feelings; but, nevertheless, the result was that expressed\nabove. Well, lately some change has happened. If I talk to a person one day they must have me the next. Faces light up when they see me. \"Ah! I say, come here.\" \" Come and dine with me.\" It's the most preposterous thing I ever experienced. It is curiously pleasant.'\nJenkin was a good father, joining in his children's play as well as directing their studies. The boys used",
"tired, anxious or intoxicated. During live broadcasts on TV or on the radio, for example, nonprofessional speakers and even hosts often make speech errors because they are under stress. Some speakers seem to be more prone to speech errors than others. For example, there is a certain connection between stuttering and speech errors. Charles F. Hockett explains that \"whenever a speaker feels some anxiety about possible lapse, he will be led to focus attention more than normally on what he has just said and on what he is just about to say. These are ideal breeding grounds for stuttering.\" Another",
"witnessing others' pain. For instance, in Stanley Milgram's obedience experiment, subjects (\"teachers\") were told to shock \"learners\" every time the learners answered a question incorrectly. Although the \"learners\" were not actually shocked, the subjects believed they were. As they were going through the study, many of the \"subjects showed signs of extreme tension and conflict\". Milgram observed some subjects laughing nervously when they heard the \"learners'\" false screams of pain. In A Brief Tour of Human Consciousness, neuroscientist V.S. Ramachandran suggests that laughter is used as a defense mechanism used to guard against overwhelming anxiety. Laughter often diminishes the",
"annoyance.\nEEG and Magnetoencephalography studies show an increased activity in several parts of the Central Nervous System.\nBiochemical changes due to sound annoyance include increased secretion of epinephrine, which is related to the 'fight'-reaction (See fight-or-flight response) and increased adrenal cortical activity (see adrenal cortex), which is related to intense and/or stressful events.\nEpidemological investigations have shown that the negative effects of sound annoyance include \"a feeling of resentment, displeasure, dissatisfaction, discomfort or offence when noise interferes with someones thoughts, feelings or actual activities\". Besides that, unwanted sounds can mask the positive indicators of safety\n. These factors may diminish well-being of people that",
"to as \"exactness\". It is important to note that sometimes the inconsistency may be resolved and there may still be no laugh. Because laughter is a social mechanism, an audience may not feel as if they are in danger, and the laugh may not occur. In addition, the extent of the inconsistency (and aspects of its timing and rhythm) has to do with the amount of danger the audience feels, and how hard or long they laugh.\nLaughter can also be brought on by tickling. Although most people find it unpleasant, being tickled often causes heavy laughter, thought to be an",
"suffering associated with a traumatic event.\nIf the individual is shy or bashful and appears nervous when talking, they are likely to exhibit nervous laughter. Individuals who are shy and introverted who find themselves the center of conversational attention often become \"giddy\" with nervous laughter; this is a subconscious response caused by the brain over-thinking due to social anxiety or inexperience.",
"not recognizing the listener's feelings or reactions, such as a wish to change the topic of talk or end the interaction. This social awkwardness has been called \"active but odd\". Such failures to react appropriately to social interaction may appear as disregard for other people's feelings and may come across as insensitive. However, not all individuals with AS will approach others. Some of them may even display selective mutism, not speaking at all to most people and excessively to specific others. Some may choose only to talk to people they like.\nThe cognitive ability of children with AS often allows them",
"because \"our attention is divided between the task at hand and observing the reactions of the people in the audience\" in much the same way how one is distracted from the task at hand by sounds or flashing lights. The effects of distraction-conflict are also shown to be the strongest when there is a sense of urgency. Major empirical findings In their initial research in 1978, Sanders, Baron, and Moore hypothesized that subjects would be more distracted when performing a task with a coactor or an audience than when working alone. The researchers hoped to demonstrate this through a paired-word",
"the passing of danger. Friedrich Nietzsche, by contrast, suggested laughter to be a reaction to the sense of existential loneliness and mortality that only humans feel.\nFor example: a joke creates an inconsistency and the audience automatically tries to understand what the inconsistency means; if they are successful in solving this 'cognitive riddle' and they realize that the surprise was not dangerous, they laugh with relief. Otherwise, if the inconsistency is not resolved, there is no laugh, as Mack Sennett pointed out: \"when the audience is confused, it doesn't laugh.\" This is one of the basic laws of a comedian, referred",
"is another character who has trouble communicating due to his constant sneezing and hay fever which renders his speech uncomfortable for him and those who hear him as:\nhis anxiety was his voice, which had taken into varying in volume as uncontrollably as though a poltergeist were fiddling with the controls,\nsometimes coming out of the sudden boom or roar, sometimes fading till off the air.\nEric Arble and Iseult have problems communication as their conversations are either interrupted by the arrival of Eva or by each other's overwhelmingly emotional reaction to what the other had said. In one instance of misunderstanding, Eric",
"nervousness to enliven an otherwise fearful speech presentation.\nA speaker's anxiety can also be reduced if they know their topic well and believe in it. It has been suggested that people should practice speaking in front of smaller, less intimidating groups when they're getting started in public speaking. Additionally, focusing on friendly, attentive people in the audience has been found to help. \nTraditional advice has been to urge fearful speakers not to take themselves too seriously, and to be reminded that mistakes are often unnoticed by audiences. Gaining experience in public speaking often results in it becoming less anxiety-provoking over time.",
"and faces of the people around us. It explains why a kind face or a soothing tone of voice can dramatically alter the way we feel. It clarifies why knowing that we are seen and heard by the important people in our lives can make us feel calm and safe, and why being ignored or dismissed can precipitate rage reactions or mental collapse. It helped us understand why attuning with another person can shift us out of disorganized and fearful states. In short, Porges’s theory makes us look beyond the effects of fight or flight and put social relationships front",
"who laugh all the time, because they never listen to what you're saying, they always — have another agenda and they generally have no sense of humour. The most untrustworthy body language I know is that of the person who laughs all the time. That terrifies me. People with no sense or a very limited sense of humour I am very wary of too, because it's not a sign of great intelligence to be without a sense of humour. If you've no sense of irony you haven't a great decision making capacity because you must see the possibilities of the",
"Misophonia Signs and symptoms As of 2016 the literature on misophonia was limited. Some small studies show that people with misophonia generally have strong negative feelings, thoughts, and physical reactions to specific sounds, which the literature calls \"trigger sounds\". These sounds are apparently usually soft, but can be loud. One study found that around 80% of the sounds were related to the mouth (eating, slurping, chewing or popping gum, whispering, whistling, etc.), and around 60% were repetitive. A visual trigger may develop related to the trigger sound. It also appears that a misophonic reaction can occur in the absence of",
"Dysfunction Disorder may feel that certain noises are painful or overwhelming. They may need to cover their ears when hearing a sound or in anticipation of what they think will be an offensive sound. They can find certain music to be soothing and become mesmerized by it. However, they may become overstimulated and upset if they hear something for which they are unprepared. Visual system The visual system involves sight. A child with Sensory Dysfunction Disorder may or may not be able to see an item that is directly in front of them. He or she may be sensitive to",
"tired and consequently disinterested in what the speaker has to say. Temperature and seating arrangements can distract an audience by causing them discomfort, shifting their focus to their own annoyance. Being too far from a speaker can also cause the audience to lose focus because of a sort of \"Hawthorne effect. Physiological noise can also lead to distractions that take an audiences attention from the speaker. This noise may range from ailments and illness, all the way to emotions like arousal. Both sides of the spectrum can affect the audiences attention, for example, a speaker giving a speech while under",
"noise sound much louder than anything else, to be jarring to hungover viewers. Quotes \"Curse you, God, for making me this way!\" – A feature of a recurring theme in the series, where someone would be laughed at (in a surreal fashion) due to a misfortune. The victim of the ridicule would always say this, while shaking his or her fists at the sky.\n\"My expectations were confounded and from thence the humour arose.\"\n\"Who is the real sick man in this so called society?\" A question posed by Herring throughout the first series to justify his outrageously inappropriate and perverse",
"at putting distance between themselves and the deceptive communication, producing “nonimmediacy cues” These can be verbal or physical, including speaking in more indirect ways and showing an inability to maintain eye contact with their conversation partners. Another cue for detecting deceptive speech is the tone of the speech itself. Streeter, Krauss, Geller, Olson, and Apple (1977) have assessed that fear and anger, two emotions widely associated with deception, cause greater arousal than grief or indifference, and note that the amount of stress one feels is directly related to the frequency of the voice. Camouflage The camouflage of a physical object",
"excitedly to a door bell is subjected to repeated ringing without accompanying visitors, and stops reacting to the meaningless stimuli. It becomes habituated to the noise. On the other side of habituation is sensitization. Some dogs' reactions to the stimuli become stronger instead of them habituating to the repeated stimuli or event. Desensitization is the process of pairing positive experiences with an object, person, or situation that causes fear or anxiety. Consistent exposure to the feared object in conjunction with rewards allows the animal to become less stressed, thereby becoming desensitized in the process. This type of training can be",
"situation was pleasant and/or non-threatening, and to help prevent it escalating into something like a real fight. This, according to psychologists, is the reason why laughter exists in the first place, suggesting these noises were the dolphin equivalent of a human laugh.",
"Annoyance Psychology Various reasons exist for why one finds particular stimuli annoying. Measurement of annoyance is highly subjective. As an attempt at measurement, psychological studies on annoyance often rely on their subjects' own ratings of levels of annoyance on a scale. Any kind of stimuli can cause annoyance, such as getting poked in the side or listening to a song repeatedly. Many stimuli that one is at first neutral to, or even finds pleasant, can turn into annoyances from repeated continued exposure. One can often encounter this phenomenon with such media as popular music, memes, commercials, and advertising",
"Glossophobia Research According to research done at the University of Tennessee Knoxville, speech anxiety is generally the feeling of nervousness, dread and concern along with a feeling of discomfort. \nIt has been estimated that 75% of all people experience some degree of anxiety/nervousness when it comes to public speaking. If untreated, public speaking anxiety can lead to serious detrimental effects on one's quality of life, career goals and other areas. For example, educational goals requiring public speaking might be left unaccomplished. However, not all persons with public speaking anxiety are necessarily unable to achieve work goals, though this disorder becomes",
"Sound annoyance Sound annoyance is \"a feeling of displeasure associated with any agent or condition [related to sound, or stemming from James Arthur Baltas] that is believed to affect adversely an individual or a group\". Impact on health and well-being Annoyance implies a negative factor on an individual's well-being and comfort. Its effects may include physiological responses, central nervous system reactions, and biochemical changes.\nPhysiological reactions to sound annoyance include increased heart rate and increased blood pressure which, among others, may lead to hypertension. Hearing impairment, such as increased hearing threshold, and tinnitus are considered as another possible consequence of sound",
"kind of funny.\nAnd about 10 minutes in you start actually getting into it.\nand Colm Ó Cíosóig interpreted audience reaction as:\nWe hate you. But we have to keep on watching you. Because we can't believe what you're doing, that you're bringing this torture upon us!"
] |
How are the new Intel processors better than older ones even if they're running at the same speed and have the same number of cores? | [
"Alright, take it like this: A processor is a laborer who's job it is to take loads of materials up to the architect and builders. Other laborers might be able to move up and down the hill just as fast as our laborer, but are less efficient with the loads that they bring. Every five minutes our laborer takes two armfuls of materials up the hill, with another third load, on his back. The loads are already pre-sorted, and grouped for efficiency. The other laborers can only carry one load at best, and cannot do operations on the load they are carrying, such as sorting or math. At the end of the day the other laborers, have made the same amount of trips up the hill, maybe even more. However, our laborer has allowed for more work to have been done. In short his work per cycle was higher.\n\nIn a processor, the frequency (e.g. 3.2ghz) is the amount of cycles, or \"trips up the hill\" done in one second. 1Hz would be one \"trip up the hill.\" 3.2gHz would be 3.2x10^9Hz or 3,200,000,000 \"trips up the hill.\" Old pentium processors had a high rate of cycles, but did very little work per cycle. \n\nCores in a processor can be viewed as our laborer being able to call in his friends to help with the work. But, these friends end up standing around, and are only useful if the architect designed the project to have multiple tasks that multiple people could work on. If four columns have to be constructed, then 4 efficient laborers could bring the materials quickly. If only one column is needed, the four laborers would not be needed. One laborer could bring the materials just as quickly as the task cannot be sub-divided, or in computer speak \"multi-threaded.\"",
"Numer of cores and clock speed only barely matters. You can buy 5+ year old processors which have similar stats. The main difference is the architecture of the processors. Newer processors have more effficient architecture (which might also need less power to run) and they are able to do more and better operations per cycle. As an (fabricated) example: While an old processor might be able to add two numbers in one cycle and then square them in the next one, a new processor might be able to do both in one cycle, reducing the overall time needed.",
"Different architecture can make a massive difference.\n\nThe clock cycle is how quickly the processor will do one piece of work. However the sizes of a piece of work change.\n\nFor instance, on a 6600k maybe it takes 7 clock cycles to compute the square root of a number, but the 7600k does the same in 5 clock cycles. That would make the 7600k faster even if they have identical clock speed and number of cores.\n\nThe 7600K also supports faster memory than the 6600K which will also make a difference."
] | [
"processors changed when the Core 2 line of processors were released. By 2009, Intel was using a good-better-best strategy with Celeron being good, Pentium better, and the Intel Core family representing the best the company has to offer.\nAccording to spokesman Bill Calder, Intel has maintained only the Celeron brand, the Atom brand for netbooks and the vPro lineup for businesses. Since late 2009, Intel's mainstream processors have been called Celeron, Pentium, Core i3, Core i5, and Core i7, in order of performance from lowest to highest. The first generation core products carry a 3 digit name, such as i5 750,",
"8890, only one core type can be active at a time, either the high-performance or low-power cores, but not both. Thus, the A10 Fusion appears to software and benchmarks as a dual core chip. Apple claims that the high-performance cores are 40% faster than Apple's previous A9 processor and that the two high-efficiency cores consume 20% of the power of the high performance Hurricane cores; they are used when performing simple tasks, such as checking email. A new performance controller decides in realtime which pair of cores should run for a given task in order to optimize for performance or",
"at the same clock frequency. For instance, the common register+immediate addressing mode was significantly faster than on the 8086, especially when a memory location was both (one of the) operand(s) and the destination. Multiply and divide also showed great improvement, being several times as fast as on the original 8086 and multi-bit shifts were done almost four times as quickly as in the 8086. End of life Along with hundreds of other processor models, Intel discontinued the 80188 processor 30 March 2006, after a life of about 24 years.",
"whereas the Intel processors had a 20-bit bus that could access 1 MB of RAM. Internally, the 23-bit addresses of the Z8000 were also more complex to process than Intel's simpler system using 16-bit base addresses and separate segment registers. For those looking for a low-cost option able to access (what was then) large amounts of memory, the Intel designs were competitive and available over a year earlier.\nFor those looking for pure performance, the Z8000 was the fastest CPU available in early 1979. However, this was true only for a period of a few months. The 16/32-bit Motorola 68000 came",
"working at higher clock speeds. In response, Intel started exploring ways to improve the performance of its microprocessors in ways other than raising the clock speeds of the processors such as increasing the sizes of the processors' caches, using a P6 microarchitecture descendant in Pentium M CPUs and beyond, and using multiple processing cores in its processors.\nBecause of the philosophy change, Intel now faces the challenge of making consumers compare its processors based on the PR system rather than raw clock speed, ironically a problem which Intel created itself.\nSome analysts regard the PR scheme (and a raw MHz /",
"100 billion cycles per second. Comparing The clock rate of a CPU is most useful for providing comparisons between CPUs in the same family. The clock rate is only one of several factors that can influence performance when comparing processors in different families. For example, an IBM PC with an Intel 80486 CPU running at 50 MHz will be about twice as fast (internally only) as one with the same CPU and memory running at 25 MHz, while the same will not be true for MIPS R4000 running at the same clock rate as the two are different processors that implement different",
"processor and its companion chipset.\nThe graphics, sound, and PCI bus ran at the same speed as the processor clock also due to tight integration. This made the processor appear much slower than its actual rated speed. However, the graphics system is able to use the main system memory providing for significant cost savings on the basic systems and embedded controllers in the market for this platform.",
"a 65 watt TDP. With SpeedStep enabled, the average temperature of the CPU when idle is essentially that of the ambient atmosphere with its fan running at 1500 RPM.\nAt launch time, Intel's price for the Core 2 Extreme X6800 was US$999 each in quantities of 1000. Like the desktop Core 2 Duo, it has 4 MB of shared L2 cache available. This means that the only major difference between the regular Core 2 Duo and Core 2 Extreme is the higher clock rate and unlocked multiplier, the usual advantages of the \"Extreme Edition.\" The fully unlocked multiplier is of use to",
"parts that fail quality control to be sold at a lower rating. When yields improve, they may be replaced with versions that only have the cache amount needed on the die, to bring down manufacturing cost. At launch time, Intel's prices for the Core 2 Duo E6300 and E6400 processors were US$183 and US$224 each in quantities of 1000. Conroe CPUs have improved capabilities over previous models with similar processor clock rates. According to reviews, the larger 4 MB L2 cache vs. the smaller 2 MB L2 cache at the same frequency and FSB can provide a 0–9% performance gain with certain",
"complexity of the such processors is much higher than for regular processors. This is primarily because of the need to implement two separate units, the BIU and EU, operating separately.\nAs the complexity of these chips increases, the cost also increases. These processors are relatively costlier than their counterparts without the prefetch input queue.\nHowever, these disadvantages are greatly offset by the improvement in processor execution time. After the introduction of prefetch instruction queue in the 8086 processor, all successive processors have incorporated this feature. x86 example code code_starts_here:\n mov bx, ahead\n mov word ptr cs:[bx], 9090h\nahead:\n ",
"be highly competitive with Intel, and the included Wraith coolers were generally competitive with higher-priced aftermarket solutions.\nRyzen 1800X's multi-threaded performance, in some cases while using Blender or other open-source software, was around four times the performance of the FX-8370, or nearly double that of the i7 7700K. One reviewer found that Ryzen chips would typically outperform competing Intel i7 processors for a fraction of the price when all eight cores were utilized.\nOne complaint among a subset of reviewers, however, was that Ryzen processors fell behind their Intel counterparts when running older games, or running certain newer games at mainstream resolutions",
"more markets some time ago. The triple-core processor still see the same specifications for quad-core variants, the naming of the processor lineup, according to the AMD branding scheme, will be named as Phenom triple-core 8000 series, the processor line will be focused on what AMD called the fourth market segment or the \"High-end Mainstream\" segment beside Value, Mainstream and Performance segments in an interview with BetaNews, which the targeted customers of the processors are \"those who are willing to pay more for more performance but not required for too much processing power as required by gamers and system builders\", while",
"But since 34 is greater than 30, the ML-34 is faster than the MT-30. Athlon Neo With 27 mm × 27 mm in size and 2.5 mm in thickness, the Athlon Neo processors utilize a new package called \"ASB1\", essentially a BGA package, for smaller footprint to allow smaller designs for notebooks and lowering the cost. The clock of the processors is significantly lower than desktop and other mobile counterparts to reach a low TDP, at 15W maximum for a single core x86-64 CPU at 1.6 GHz. The Athlon Neo processors are equipped with 512 KB of L2 cache and HyperTransport 1.0 running at",
"of new processor architecture is accompanied by the issue of software development. Software tends to lag behind hardware development, especially in the case of multi-core chips. Intel aims to solve this problem by creating a new programming language especially for the 80 core processor called Ct. Intel also created a software development kit to accommodate visual recognition and multi thread instructions. Both Intel and Microsoft are supporting a new age of programmers by jointly donating $20 million to the cause. Dimensions The processor is constructed using a 65 nm CMOS process, the die is 12.64 mm by 21.72 mm (274.5 mm²) and contains 100",
"per chip is starting to increase at a slower rate. Therefore, power efficiency is starting to become as important, if not more important than fitting more and more transistors into a single chip. Recent processor designs have shown this emphasis as they put more focus on power efficiency rather than cramming as many transistors into a single chip as possible. In the world of embedded computers, power efficiency has long been an important goal next to throughput and latency. Shifts in market demand Increases in clock frequency have grown more slowly over the past few years, compared to power reduction",
"6-core MIPS, for each, that \"no longer require to rely on an external Intel Xeon E5 host processor\") make the supercomputer much more energy efficient than the other top 10 (i.e. it is 5th on Green500 and other such ZettaScaler-2.2-based systems take first three spots). At 19.86 million cores, it is by far the biggest system: almost double that of the best manycore system in the TOP500, the Chinese Sunway TaihuLight, ranked 3rd. New developments in supercomputing In November 2014, it was announced that the United States was developing two new supercomputers to exceed China's Tianhe-2 in its place as",
"double that of its similarly clocked Core 2 Duo counterpart.\nThe multiple cores of the Kentsfield mostly benefits applications that can easily be broken into a small number of parallel threads (such as audio and video transcoding, data compression, video editing, 3D rendering and ray-tracing). To take a specific example, multi-threaded games such as Crysis and Gears of War which must perform multiple simultaneous tasks such as AI, audio and physics benefit from the quad-core CPUs. In such cases, the processing performance may increase relative to that of a single-CPU system by a factor approaching the number of CPUs. This should,",
"gradual than the speed-ups resulting from significant frequency increases. The primary reason cited for the breakdown is that at small sizes, current leakage poses greater challenges and also causes the chip to heat up, which creates a threat of thermal runaway and therefore further increases energy costs.\nThe breakdown of Dennard scaling and resulting inability to increase clock frequencies significantly has caused most CPU manufacturers to focus on multicore processors as an alternative way to improve performance. An increased core count benefits many (though by no means all) workloads, but the increase in active switching elements from having multiple cores still",
"applications and 0–16% performance gain with certain games.\nThe higher end Conroe processors are the E6600 (2.4 GHz) and E6700 (2.67 GHz) Core 2 Duo models. The family has a 1066 MHz front side bus, 4 MB shared L2 cache, and 65 watts TDP. These processors have been tested against AMD's then-current top performing processors (Athlon 64 FX Series), which were, until this latest Intel release, the highest performance X86 CPUs available. Conroe chips also produce less heat than their predecessors — a benefit of the new 65 nm technology and the more efficient microarchitecture. At launch time, \nIntel's prices for the Core 2 Duo E6600 and",
"and BA22.\nModern 8051 cores are faster than earlier packaged versions. Design improvements have increased 8051 performance while retaining compatibility with the original MCS 51 instruction set. The original Intel 8051 ran at 12 clock cycles per machine cycle, and most instructions executed in one or two machine cycles. A typical maximum clock frequency of 12 MHz meant these old 8051s could execute one million single-cycle instructions, or 500,000 two-cycle instructions, per second. In contrast, enhanced 8051 silicon IP cores now run at one clock cycle per machine cycle, and have clock frequencies of up to 450 MHz. That means an 8051-compatible",
"generation of processors. Features The processor consists of 80 individual cores on a single chip. The cores are different from the cores used in today's mainstream multi-processors in that they are much simpler in design. The same parts and ideas that went into constructing today's generation of processors were used in the new processor. These parts and ideas are simply reconstructed in a fashion which defines the new tera-scale era of processor architecture and allow for more than four cores to function on one chip. Dual floating point engines Each of the cores on board the teraflops research chip contains",
"design choice to devote more power and transistor budget to the graphics processing units (GPUs). For example, the 7th generation CPUs were not manufactured with modern out of order execution processors, but instead use in-order processors with high clock speeds and deep pipelines. In addition, most types of computing systems have main memory located hundreds of clock cycles away from the processing elements. Therefore, as CPUs have become faster and main memory capacity much larger, there is massive data consumption that occurs that only increases the potential occurrence of Von Neumann bottlenecking, where there are cache misses in the shared",
"The conventional amount of cores in consumer grade computers are 2–8 cores while workstation grade computers can have even greater amounts. However, even the current amount of cores aren't great enough to perform at teraFLOPS performance leading to an even greater amount of cores that must be added. As a result of the program, two prototypes have been manufactured that were used to test the feasibility of having many more cores than the conventional amount and proved to be successful. Prototypes Teraflops Research Chip (Polaris) is an 80-core prototype processor developed by Intel in 2007. It represents Intel's first public",
"with the follow-on SPARC T4 processor. The T4 core count was reduced to 8 (from 16 on the T3), the cores were made more complex, the clock rate was nearly doubled - all contributing to faster single thread performance (from between 300% to 500% increase over previous generations. Additional effort was made to add the \"critical thread API\", where the operating system would detect a bottleneck and would temporarily allocate the resources of an entire core, instead of 1 (of 8) threads, to the targeted application processes exhibiting single threaded CPU bound behavior. This allowed the T4 to uniquely mitigate",
"processors. In fully threaded workloads, total system performance will increase by a value equal to the number of cores added (i.e. moving from a 4-core 2.6 GHz to a 6-core 2.6 GHz system would enable 50% more total processing power). With proper BIOS support and the correct supporting components, many users have reported substantial overclocking potential, often as high as 4.4 GHz while staying within Intel's maximum allowed voltages (no higher than 1.35v for the core or the uncore).",
"reserve cores that could be brought online when a core fails in the processor. Lastly, the processors would gain new capabilities and functionality as dedicated hardware engines, such as graphics engines, could be integrated. Hardware Intel Tera-Scale is focused on creating multi-core processors that can utilize parallel processing to reach teraFLOPS of computing performance. Current processors consist of highly complicated cores; however, current cores are built in a way that makes it difficult to have more than the current amounts of cores in CPUs. As a result, Intel is currently focused on creating Tera-Scale processors with many cores rather than",
"expensive computer systems, performing typical benchmarks at roughly 1/4 the speed of the new 80286 chip at the same clock frequency (in early 1982). This initial performance gap to the rather low-profile and low-priced 8086 line was probably the main reason why Intel's plan to replace the latter (later known as x86) with the iAPX 432 failed. Although engineers saw ways to improve a next generation design, the iAPX 432 capability architecture had now started to be regarded more as an implementation overhead rather than as the simplifying support it was intended to be.\nOriginally designed for clock frequencies of up",
"hardware with the same performance and are fully supported by Intel. According to Werner Krotz-Vogel, Technical Marketing Engineer at Intel's Cluster Ready team, the Math Kernel Library (MKL) runs even faster than the open source library Automatically Tuned Linear Algebra Software (ATLAS) on an AMD Opteron system.",
"on their previous experience with increased core counts on CPUs, doubling the number of cores was able to nearly double the performance with no increase in power. With a greater amount of cores, there are possibilities of improved energy efficiency, improved performance, extended lifetimes and new capabilities. Tera-Scale processors would improve energy efficiency by being able to \"put to sleep\" cores that are unneeded at the time while being able to improve performance by intelligently redistributing workloads to ensure an even workload spread across the chip. Extended lifetimes are also capable by tera-scale processors due to the possibility of having",
"major central processing unit (CPU or processor) manufacturers started to produce power efficient processors with multiple cores. The core is the computing unit of the processor and in multi-core processors each core is independent and can access the same memory concurrently. Multi-core processors have brought parallel computing to desktop computers. Thus parallelisation of serial programmes has become a mainstream programming task. In 2012 quad-core processors became standard for desktop computers, while servers have 10 and 12 core processors. From Moore's law it can be predicted that the number of cores per processor will double every 18–24 months. This could mean"
] |
When did we start giving kids sugar for breakfast and why? | [
"Sugar became readily available. And the US is a major producer of corn so put the two together and you have a cheap product. Companies like General Mills started to fund television and started to advertise to children. Sugar wasn't a substantive part of cereal until the 1950s really only have first been add in the 1920s. In the 1960s and on through the 80s a campaign called \"Heart Smart\" Cereal manufactures were able to pay large sums of money to get a logo from the American Heart Association and during this time scientific research was being run and evangelized against saturated (but natural fats). This effected breakfast because eggs and bacon where now seen as unhealthy, similarly this caused the natural lard to be removed from friers over corn-based oils. Basically, parents of kids in 70s and 80s were made to feel like bacon was bad but cereal was \"GREAT!\"",
"vegetarian religious reasons. Cereal was invented by a seventh day Adventist vegetarian insane asylum female torturer. (not to overstate it) For the purpose of getting people to eat less meat. p.s. Wikipedia was more accurate a decade ago. _URL_0_",
"I suspect it only takes one manufacturer to add sugar, which would almost certainly make breakfast more palatable to children, and then the rest would have to follow to keep their market share.\n\nHumans in general like sweet things - this is universal - all cultures find the sweetest fruits, risk the wrath of bees for honey and so on. Once you've started making it part of cereals it would be almost impossible to stop.",
"since the fifties, we have had the four basic food groups in the 90's it started coming to light that special interests were controlling the narrative _URL_2_\n\nso feeding kids cereals is an outgrowth of the american agricultural industry. \n\nto be fair, other industries do that too, for instance freud's [nephew](_URL_2_) was brought on to help the bacon industry sell bacon and that's where we get the concept of a farmer's breakfast.",
"When we started taking fat out of food, it removed all the good flavors. Started adding sugars to make things taste good again.",
"in the future people will view sugar the same way we view cigarettes now. this will be done through anti sugar PSAs and will help us avoid a type 2 diabetes epidemic. right now, 1 in 3 kids born in the 2000s are projected to get it.",
"Sugar wasn't widely considered bad for your health until the past 20 years or so. In the 80s and into the 90s, nutrition was all about FAT. Everyone wanted a low-fat diet. Sugar wasn't considered good, but the main downsides were tooth decay and making kids hyperactive. No one was talking about how a high sugar diet could also make you overweight, not to mention diabetic. (Doctors probably knew, but I'm talking about what the average parent understood.) \n\nSo the fats (eggs, meats, milk) were replaced with carbohydrates (cereal, bread, pancakes, bagels, waffles, juice, etc). Of course parents thought they were making a smart choice, not realizing they were trading one type of bad nutrition for another.",
"Because the blight has destroyed all the crops and all we got left is corn. We never went to the moon. Matt Damon.",
"Without reading any of the comments, I'm gonna say the '50s. That's when the unhealthy lifestyle began. TV dinners, driving instead of walking, urban sprawl, etc.",
"When it became profitable, companies used advertising to influence people.\n\nThis is the ELI5 for why people do a lot of things.",
"I'm no history major or archeologist, but I'm pretty sure people have been eating fruits for breakfast since people became people.",
"Time to make eggs, sausage and toast - warm up the pan, oil pan, fry sausage, toast bread, crack eggs, scramble eggs, cook eggs in sausage grease, plate foods, scrub pan.\n\nTime to make cereal and milk - open box, pour cereal, pour milk into glass. Rinse cereal out of bowl, leave in sink to soften enough to go down drain.\n\n\nWhich one do you think a busy family with both parents sending kids off to school while getting ready for work are going to do? People are much busier, and sugary foods are much cheaper than the ?healthier? options.",
"We did it the same time we started feeding it to ourselves. The reasons are manifold and largely financial and political, but long story short: you can't box up bacon and eggs and sell it for a 300% markup the way you can cereal and waffles, so there's been a very long history of food companies trying to convince you that their products are what you're \"supposed\" to eat for breakfast (and lunch and dinner) and that the other stuff is bad for you. Short answer.",
"Grains have been a major source of human consumption from the beginning of agriculture and it was used before agriculture as well, though only if it was found. So, I wouldn't say that our diets were protein and fat. Anyway 50%-60% of protein will be broken down into glucose with in 3-4 hours of eating. So, protein isn't sugar free.",
"On another note: its mainly in the US where breakfast with waffles, pancakes etc. is common",
"Professional baker here, Real artisan produced bagels, have 3% or less sugar in them, in a batch. Which might be like 1gram of sugar per bagel, in the end, if not less. \n\nIt's about processed mass produced foods we should be concerned about, and making an effort in this country to go back to home cooked meals and cooking from scratch --which is quickly becoming a lost skill",
"I don't know if it's true that children ate fat and protein for breakfast. Maybe wealthy children, but for most, it was whatever the local carbohydrate was. Corn, rice, wheat, millet, whatever. Usually a gruel, sometimes a bread of some sort. Of course, that was probably whole grain for most of history.",
"1. It's cheap and readily avaliable.\n\n2. Kids love it. You ever try to get a kid to pick cheerios over lucky charms? Shit ain't easy.",
"Cereal and breakfast sugar go hand in hand. \n\nThe history of breakfast cereal in the U.S. is a long and complicated one, but to put it as simply as I can: The Kellogg family were Seventh Day Adventist Christians who believed eating meat and animal products was an unclean habit. They also believed that masturbation was one of the worst evils in the world, and that bland diets would help keep people from wanting to play with their sugar smacks, so to speak. \n\nSo in the late 1800's, the Kellogg brothers started a cereal company (yep, that one) in Michigan and sold anti-masturbation corn flakes, which were originally served in their sanitarium, but later to the public. Post cereal was founded about the same time by a local competitor. \n\nBut what really helped cereal take over the American breakfast world was the establishment of grocery store chains. For the first time, people would pick out their own grocery goods, packaged on shelves. So advertising became very important. Early advertisement pamphlets in stores declared breakfast cereal to be the secret to health, and so moms started serving it to their kids.\n\nUnfortunately, kids don't like eating bowls of bland grain (which is still carbohydrate, just not as tasty as regular sugar), so they started sprinkling sugar on it themselves. It wasn't long before cereal companies figured out that they could do this in the factory and sell more cereal. \n\nSo in short, sugar arrived on the breakfast table because a couple brothers from Michigan looked down on masturbation, invented cereal, and figured out how to advertise it in new-fangled grocery stores as a \"health food\".\n\n[Longer history here](_URL_3_)",
"Basically the food industry is corrupt and sugar is fucking addicting, and the food industry wants people to get addicted to sugar so they keep buying more and more food. So they put sugar in everything, market it as, in this case, breakfast food, and then people buy it because people are idiots.",
"How are bagels sugar? I make bagels at home and don't use more than a tablespoon of barley malt syrup for a whole batch."
] | [
"the market.\nAt the 1904 World Fair, the Quaker Oats Company made a candy-coated puffed cereal, a wheat-based product similar to Cracker Jack's candy-coated popcorn. Ranger Joe, the first pre-sweetened breakfast cereal, and little more than candy-coated puffed wheat or rice, was introduced in the US in 1939.\nAfter World War II, the big breakfast cereal companies—now including General Mills, who entered the market in 1924 with Wheaties—increasingly started to target children. The flour was refined to remove fiber, which at the time was considered to undermine digestion and absorption of nutrients, and sugar was added to improve the flavor for children.",
"whole grain cereals. At the time, the standard breakfast for the well-off was eggs and meat, while the poor ate porridge, farina, gruel and other boiled grains. The brothers eventually argued over the addition of sugar to their product. In 1906, Will founded the Battle Creek Toasted Corn Flake Company, later becoming the Kellogg Company.\nIn 1930, he established the W. K. Kellogg Foundation, ultimately donating $66 million to it. His company was one of the first to put nutrition labels on foods. He also offered the first inside-the-box prize for children. Kellogg said, \"I will invest my money in people.\"\nDuring",
"\"sugar babies\" appear to be college students below the \"mid twenties\".",
"generally only lunch was provided. This began to change after the introduction of the Oslo breakfast in 1932, an uncooked meal of nutritional ingredients. Between the wars the Oslo breakfast became famous worldwide; claims were widely reported that it helped children fed on it grow several inches taller than they would otherwise. Similar initiatives were launched in several countries across the world. In the United States, a major step forward in the provision of breakfast for schoolchildren was the 1966 launch of the School Breakfast Program.\nIn the UK, breakfast clubs were introduced in the 1990s, driven not just by",
"in the Caribbean, and ingredients such as cocoa and chocolate became available in the Old World. In the eighteenth century, processors learned how to refine sugar from sugar beets, allowing Europeans to grow sugar locally. These developments led to an increase in the sophistication of baking and pastries, and the development of new products such as puff pastries and Danish dough. 18th century to present Two important books on bread-baking were published in the 1770s: Paul-Jacques Malaouin published L'art du meinier, du boulanger et du vermicellier (The Art of the Miller, the Bread-Baker, and the Pasta-Maker) in 1775,",
"with the assistance of Enterprise Europe Network. Mother-of-one Rend Platings founded the organisation after hearing England's chief medical officer's revelation that, as a result of obesity, today's generation of parents may be the first to outlive their children.\nThe Sugarwise logo was developed by design firm Pemberton & Whitefoord (P&W) with the support of Tesco.\nThe first product to be certified was JimJams reduced-sugar chocolate spread.\nIn July 2017 Sugarwise certified \"Sugar Free\" recipes magazine sold in UK supermarkets.",
"sugar\"; in comparison, \"a 45-gram Kit Kat chocolate bar, ...contains 230 calories, 12 grams of fat, 35 milligrams of sodium and 22 grams of sugar. Matzo granola Matzo granola is a breakfast food eaten by Jewish people during the festival of Passover. It consists of broken up matzo pieces in place of oats. Many variations are possible by adding other ingredients.",
"high, and consistently strong brands such as Corn Flakes indicated that a solid market existed for basic cereals as well. Sugar Frosted Mini-Wheats, introduced in 1969, was a product that offered the fundamental nutrition of shredded wheat with the added appeal of sweet taste. The brand, with 'sugar' eventually removed from its name, became Kellogg's anchor product in the growing wheat biscuit category.\nConsumer developments in the late 1970s and early 1980s further affected the cereal industry. Parents and other advocates for children began to complain about the negative effects of sugary cereals and linked children's consumption of presweetened cereals to",
"foods, which adds to the problem of childhood obesity. An experiment that took place in a summer camp, where researches showed food advertisements to children between ages 5–8 for two weeks. The outcome-what kids chose to eat at a cafeteria were the ads they saw on TV over the two weeks. Cigarettes and alcohol advertising In advertisements, cigarettes \"are used as a fashion accessory and appeal to young women. Other influences on young people include the linking of sporting heroes and smoking through sports sponsorship, the use of cigarettes by popular characters in television programmes and cigarette promotions. Research suggests",
"feeding of flour or cereal mixed with broth or water became the next alternative in the 19th century, but once again quickly faded. Around this time there became an obvious disparity in the feeding habits of those living in rural areas and those in urban areas. Most likely due to the availability of alternative foods, babies in urban areas were breastfed for a much shorter length of time, supplementing the feeds earlier than those in rural areas.\nThough first developed by Henri Nestlé in the 1860s, infant formula received a huge boost during the post–World War II baby boom. When business",
"it before breakfast; infants are bathed in it. On her way back home, the girl who carries the strong water picks several cornel or willow twigs, with which children are lightly struck that morning. This is intended to strengthen their health. Česnica An indispensable part of Christmas dinner is the česnica, a round loaf of bread. The preparation of this bread may be accompanied by various rules and rituals. The dough for it is sometimes prepared with the strong water. A widespread custom is to put a coin into the dough; regionally, little objects made of cornel wood may be",
"Prayers are often said before breakfast in order to bless the meal. Netherlands and Belgium For breakfast, the Dutch and Belgians typically eat sliced bread with butter or margarine and various choices of toppings: dairy products (numerous variations of cheese), a variety of cured and sliced meats, or sweet or semi-sweet products such as jam, syrup (from sugar beets or fruit), honey, Kokosbrood (a coconut product that is served thinly sliced like sliced cheese) or peanut butter. Another type of sweet toppings are the chocolate toppings; the Dutch have chocolate toppings in all variations: hagelslag (chocolate sprinkles), chocoladevlokken (chocolate flakes)",
"of cooking and desserts. Europe Nearchus, admiral of Alexander of Macedonia, knew of sugar during the year 325 B.C., because of his participation in the campaign of India led by Alexander (Arrian, Anabasis). The Greek physician Pedanius Dioscorides in the 1st century CE described sugar in his medical treatise De Materia Medica, and Pliny the Elder, a 1st-century CE Roman, described sugar in his Natural History: \"Sugar is made in Arabia as well, but Indian sugar is better. It is a kind of honey found in cane, white as gum, and it crunches between the teeth. It comes in lumps",
"today), and claimed that eight million people ate Quaker Oats each day. Expansion included acquisition of Aunt Jemima Mills Company in 1926, which continues as a leading brand of pancake mixes and syrup, the sport drink Gatorade in 1983, and in 1986, the Golden Grain Company, producers of Rice-A-Roni canned lunch food. In 2001 Quaker Oats was itself bought out by PepsiCo. Late 19th century The first cold breakfast cereal, Granula, was invented in the United States in 1863 by James Caleb Jackson, operator of Our Home on the Hillside which was later replaced by the Jackson Sanatorium in Dansville,",
"food calories per day. As sugar consumption grew in the latter part of the 20th century, researchers began to examine whether a diet high in sugar, especially refined sugar, was damaging to human health. Excessive consumption of sugar has been implicated in the onset of obesity, diabetes, cardiovascular disease, dementia, and tooth decay. Numerous studies have tried to clarify those implications, but with varying results, mainly because of the difficulty of finding populations for use as controls that consume little or no sugar. In 2015, the World Health Organization recommended that adults and children reduce their intake of free sugars to",
"school children with more nutritious food. Perhaps the second most famous example was Lord Boyd-Orr's work in Scotland, which showed the benefits of giving school children free milk – this led to universal school milk provision across Scotland and later the whole of Great Britain.\nFrom the 1930s to 1950s, programs based on the Oslo breakfast soon spread to other Norwegian cities, across Scandinavia, the rest of Europe, and to the wider world, including countries like Australia and Canada. As an example of the positive reports from trials of the breakfast, Jack Drummond of London University said that after 130 poor",
"The Kid in You The Kid in You is an advertising slogan developed for Kellogg's Frosted Mini-Wheats by the Leo Burnett Agency in the mid-1980s. The slogan was aimed at adults who were concerned with their perceived maturity but still wanted a sweet tasting children's cereal. Overview \"The Kid in You\" campaign, started in 1984, proved to be a brilliant response to demographic challenges facing the breakfast cereal industry in the 1980s. As baby boomers aged and consumers showed an increasing interest in nutritious alternatives to the heavily sweetened, child-oriented cereals that had driven growth for two decades, the breakfast",
"iconic Sugar Babies candy that was originally developed in 1935. Compositions Malvin's compositions include I'm Headin' For California with Glenn Miller in 1944, Join the W.A.C., Time in the Town of Berlin, Glenn's Travels, Goodnight Wherever You Are, Time Alone Will Tell, and Let Me Be Your Sugar Baby.",
"grains – while avoiding high-calorie, low-nutrient junk food.\nA 2010 study showed that children in the United States snacked on average six times per day, approximately twice as often as American children in the 1970s. This represents consumption of roughly 570 calories more per day than U.S. children consumed in the 1970s. Snacks and cognition A Tufts University Department of Psychology empirical study titled \"Effect of an afternoon confectionery snack on cognitive processes critical to learning\" found that a consumption of a confectionery snack in the afternoon improved spatial memory in the study's sample group, but in the area of attention",
"One, or the \"Sugar Book\"—on 4 May 1942, through more than 100,000 school teachers, PTA groups and other volunteers. Sugar was the first consumer commodity rationed. Bakeries, ice cream makers and other commercial users received rations of about 70% of normal usage. Coffee was rationed nationally on 27 November 1942 to 1 pound (0.45 kg) every five weeks. By the end of 1942, ration coupons were used for nine other items. Typewriters, gasoline, bicycles, footwear, silk, nylon, fuel oil, stoves, meat, lard, shortening and oils, cheese, butter, margarine, processed foods (canned, bottled, and frozen), dried fruits, canned milk, firewood and coal,",
"till late Victorian times household sugar remained very little changed and sugar loaves were still common and continued so until well into the twentieth century...\n— Elizabeth David, English Bread and Yeast Cookery",
"the early colonists were proficient in sugar work and sugary treats were generally only enjoyed by the very wealthy. Even the simplest form of candy – rock candy, made from crystallized sugar – was considered a luxury. Industrial Revolution The candy business underwent a drastic change in the 1830s when technological advances and the availability of sugar opened up the market. The new market was not only for the enjoyment of the rich but also for the pleasure of the working class. There was also an increasing market for children. While some fine confectioners remained, the candy store became a",
"Sugar magazine was launched in October 1994, published by Attic Futura. The first edition, November 1994, was an immediate success, reaching a circulation of 205,000 exceeding its initial circulation target by 55,000. It soon overtook its main rival, Just Seventeen. Like competing titles at the time, Sugar used explicit sexual editorial to attract readership. This was controversial and contributed to the establishment of the Teenage Magazine Arbitration Panel in 1996. Sales peaked in 1997, after which demand for teen mags generally, Sugar included, began to go into decline due to the rising influence of digital media. In 2002,",
"adults and children, Frosted Mini-Wheats was a brand that could remain on pantry shelves even after children had moved away from home. Target market Children under the age of 17 consume the most cereal per capita. Adults (25-49) by contrast consume approximately half as much. As the baby-boom market aged during the early 1980s, Kellogg's saw its market share decline dramatically. To reverse this trend, Kellogg's believed it had to convince adults to eat more cereal. When they were children, the approximately 75 million adults of this generation had fueled the industry's huge growth. But the adult market had become",
"Sugar baby A sugar baby is a person who receives cash, gifts or other financial and material benefits in exchange for being in an intimate relationship, usually including sex as part of the transaction. The paying partner is typically wealthier and older. A sugar baby's male partner is often referred to not as a trick or a john but a sugar daddy, while the less-common female counterpart is a sugar momma. \nThe practice is sometimes called \"sugaring\". Described in 2015 as an expanding trend, it has produced the highest number of sugar babies in the United States, followed by",
"a breakfast club.\nAttendance of a breakfast club is not mandatory; many parents prefer to feed their children at home. The clubs are often run by schools, but can also be community run. Schools themselves are the most common location for breakfast clubs, but they can also be found in churches, community halls or even commercial premises. Breakfast clubs are sometimes open to children from more than one school. History The earliest known modern advocate for school dinners was Count Rumford in the late 18th century. School dinners became more widely available in the 19th and 20th century, though",
"Britain was providing 650,000 children with free meals at schools; about 3,500,000 children received milk at school, in addition to priority supplies at home. The bad news was that his \"national loaf\" of mushy grey wholemeal bread replaced the ordinary white variety, to the distaste of most housewives. Children were sad to learn that supplies of sweets were reduced to save shipping space on sugar and chocolate.\nWoolton kept food prices down; eggs and other items were subsidised. He promoted recipes that worked well with the rationing system, most famously the meatless \"Woolton pie\" which consisted of carrots, parsnips, potatoes and",
"is a break between the time range of 9:00 and 11:00 am, called almuerzo (depending on the time you have had breakfast and anticipate eating). In jobs of little physical effort, it can be a light lunch of a coffee, juice, infusion with some sweet or snack of almonds, nuts, or cookies. In jobs of great physical effort is usually a sandwich or a fried egg with ham and cheese. United States During the first decades of the 19th century, elevenses consisted of drinking whiskey.\nIt is common for school children to have a short snack break, called recess, in the morning",
"avoid coffee, tea, cola, and other beverages containing caffeine.\nThe pioneers of the Adventist Church had much to do with the common acceptance of breakfast cereals into the Western diet, and the \"modern commercial concept of cereal food\" originated among Adventists. John Harvey Kellogg was one of the early founders of Adventist health work. His development of breakfast cereals as a health food led to the founding of Kellogg's by his brother William. In both Australia and New Zealand, the church-owned Sanitarium Health and Wellbeing Company is a leading manufacturer of health and vegetarian-related products, most prominently Weet-Bix.\nResearch funded by the",
"band back cheese, craft cheese, etc.) refried beans, various forms of eggs or cereal (corn flakes, oatmeal) sweetened with condensed milk. Morning beverages include milk, coffee, tea, Milo, Ovaltine, Cocoa, orange juice (fresh or concentrated). Eating breakfast is called \"drinking tea.\"\nMidday meals vary, from lighter foods like beans and rice with or without coconut milk, tamales, panades, (fried maize (corn) shells with beans or fish) and meat pies, escabeche (onion soup), chilmole (black soup made with black recardo), stew chicken and garnaches (fried tortillas with beans, cheese, and cabbage sauce) to various constituted dinners featuring some type of rice and"
] |
Why does it seem like there is much more Democrat/Obama bashing posts out there on social media sites than republican bashing? | [
"A Democrat is President, so current events can be assigned to/blamed on them more easily. It's harder to put blame on people who don't have power -- and even when a party has more power in the Senate/House, that's not what most people pay attention to. Back in the Bush years it was the other way around, you saw plenty of criticism of Bush but not that much of Gore/Kerry.",
"Maybe that depends on who your friends are. Donald Trump is getting a rather large volume of \"bashing posts on social media\". He's running as a Republican.",
"It's because they're in power, at least in the White House. I don't know if you're old enough to remember when other presidents have been in office, but they got the same treatment.",
"Have you visited /r/politics lately? Reddit is a social media site."
] | [
"who broke windows and the doorbell, attempted to kick in the door, and wrote graffiti on the walls. RPV Chairman John Whitbeck blamed the \"hateful rhetoric\" of Democrats as the cause of the violence. Recent elections The Republican party lost 15 seats in the 2017 Virginia House of Delegates election. In 2018 the party lost three seats in the House of Representatives elections. In 2019, the party will be defending their narrow majorities in the House of Delegates and State Senate.",
"Democratic Party, appeared on Countdown with Keith Olbermann and supported the protests saying, \"We desperately need a coming together of working people to stand up to Wall Street. We need to rebuild the middle-class in this country and you guys can't have it all.\"\nHouse Majority Leader Eric Cantor (R-Va), in a speech to a Values Voter Summit, characterized the movement as \"growing mobs\" and said that Obama's \"failed policies\" and rhetoric \"condon[ing] the pitting of Americans against Americans\" were to blame. In response, White House Press Secretary Jay Carney accused Cantor of \"unbound\" hypocrisy, given the Majority Leader's support of",
"rally, a term which had been used in Fox News' coverage of the white supremacist rally. Several of Trump's comments at the press conference mirrored those appearing earlier on Fox News.\nAccording to Dylan Byers of CNN, Fox News' coverage on the day of the press conference \"was heavy with \"whataboutism\". The average Fox viewer was likely left with the impression that the media's criticism of Trump and leftist protestors' toppling of some Confederate statues were far greater threats to America than white supremacism or the president's apparent defense of bigotry.\" Byers wrote, \"it showed that if Fox News has a",
"sympathize with the attackers and apologize for American values rather than to condemn the attackers' actions. Romney's remarks were widely criticized by media sources regarding the course of events and by political commentators for leaving Romney open to the appearance of seeking to gain personal political advantage from a national tragedy. Republicans initially distanced themselves from Romney's comments, but as he came under increasing criticism for the timing and nature of his comments, several conservative politicians defended his remarks. Vote mobilization problems Romney replaced the traditional GOTV system with the centralized Project Orca. The project failed to mobilize 40,000 volunteers",
"regularly than Republicans (28% of Democrats vs. 19% of Republicans). Even more striking, Republicans are approximately five times more likely than Democrats to report watching \"The O'Reilly Factor\" regularly and are seven times more likely to report listening to \"Rush Limbaugh\" regularly.\" As a result, when the opinions of Republicans who only tune into conservative media outlets were compared to those of their fellow conservatives in a study by Stroud (2010), their beliefs were considered to be more polarized. The same result was retrieved from the study of liberals as well. Due to our greater tendency toward selective exposure, current",
"even maintain a majority in the House of Representatives in the 2014 mid-term elections.\nAs part of his critique Luntz said:\nAnd they get great ratings, and they drive the message, and it's really problematic. And this is not on the Democratic side. It's only on the Republican side. ... [Democrats have] got every other source of news on their side. And so that is a lot of what's driving it. If you take—Marco Rubio's getting his ass kicked. Who's my Rubio fan here? We talked about it. He's getting destroyed! By Mark Levin, by Rush Limbaugh, and a few others. He's",
"organizing protests against privacy violations could for a time not be found by searching. The very word privacy was also restricted. Censorship of conservative news In May 2016, Facebook was accused by a former employee for leaving out conservative topics from the trending bar. Although Facebook denied these allegations, the site planned to improve the trending bar.\nIn August 2018, Facebook deleted videos posted to it by PragerU. Facebook later reversed its decision and restored the PragerU content, saying that PragerU content was falsely reported to have hate speech.\nAs a result of perception that conservatives are not treated neutrally on Facebook",
"'shitposting' and circulating internet memes maligning Hillary Clinton\".\nIn September 2016 The Independent wrote that shitposting is an apolitical \"tool that can be put to a variety of effects\". However, posts such as these have appeared long before the 2016 US presidential election. Engineering & Technology magazine wrote that \"[s]hitposting, whether from the left or right, is perilously close to delivering an online metastasis of Orwell's Two-minute Hate [sic]\".\nIn November 2016, Esquire magazine wrote that \"Internet mockery was emerging as a legitimate political technique: shitposting. Maybe the 2020 election would be all shitposting.\"\nIn March 2018, talking about Facebook group New",
"an opinion piece for the Wall Street Journal, \"Offensive comments about rape by [Republican] Senate candidates in Missouri and Indiana gave the media an excuse to put social issues at the election's center in a way that badly hurt the entire party, as well as costing Republicans two Senate seats.\" The comments from otherwise low-profile candidates may have cost Mitt Romney the election and reinforced some voters' concerns that the GOP is out of touch with women. They also were credited with helping President Obama win the women's vote at the 2012 presidential election.\nKaren Hughes, a former adviser to George",
"during the campaign, which has been questioned by those who see Huckabee campaigning from a strong social conservative platform while McCain is seen by many as socially moderate or liberal.\nOn Super Tuesday in West Virginia, McCain supporters threw their support to Huckabee, which resulted in a highly publicized Huckabee win early on Tuesday. Romney had been leading there in the polls prior to the primary. This strategy likely both increased the number of votes given to Huckabee and reduced the number that went to Romney of those voting Tuesday evening. The strategy appears to have been successful as Romney suspended",
"hashtag is often interpreted as a reference to Trump allegedly practicing and preaching hate on various minority groups. Impact Protests after Trump's inauguration have helped energize progressives in the Democratic Party, according to Ace Smith, a strategist for the party. According to the Los Angeles Times, \"Protesters have quickened the outrage metabolism among members of Congress, encouraged disruptive tactics [...] and mostly ended the argument within the congressional caucuses over whether Democrats should work with Trump on occasion rather than universally oppose him.\" Ben Wikler, a director for MoveOn.org, commented that it feels as if grassroots energy has exploded like",
"Drudge cited an unnamed \"official\" source saying that CNN reporter Michael Ware had \"heckled\" Republican Senators McCain and Graham during a live press conference. Drudge reported that:\nAn official at the press conference called Ware's conduct \"outrageous,\" saying, \"here you have two United States Senators in Baghdad giving first-hand reports while Ware is laughing and mocking their comments. I've never witnessed such disrespect. This guy is an activist not a reporter.\"\n— Matthew Drudge, Drudge Report\nA video hosted by Rawstory shows that Ware did not make a sound or ask any question during the press conference. Oprah and Sarah Palin On September 5,",
"heckling from the public gallery. Ryan quickly ordered a vote to override a presidential veto; House Democrats successfully prevented this attempt, but sought to slow down the process by voting with paper cards, rather than electronically as is common, and by forcing Republicans to push through a crowd to reach electronic voting sites. As Ryan descended from the rostrum after calling the 15-minute vote, he was met by chants of \"shame\" from Democratic members, and quickly retreated to a cluster of Republicans. The Democrats, meanwhile, persisted in shouting and singing their demands for gun control legislation, as well as calling",
"threat than Democrats, The Times intentionally gave the news less exposure in hopes of influencing their readers' focus away from issues that Democrats tend to poll weaker than Republicans in. O'Reilly has also said that the paper would highlight any terrorist attack if one was to occur so they may criticize the Bush Administration:\nSo The Times wins both ways. The paper diminishes the War on Terror by putting it on page 37, but if something bad ever happened, it can attack President Bush.\nO'Reilly has accused the paper of being deceptive about television ratings for The O'Reilly Factor against that of",
"O'Reilly criticized MSNBC host Rachel Maddow showed a tape of Senator John McCain portraying him as insensitive to the plight of a person who lost a family member to gun violence. Although Maddow did readily admit the tape may have been doctored, O'Reilly criticized her nonetheless for airing it knowing that it could have been edited. Press O'Reilly has accused the print press of purposely misquoting him and using their hard news pages to further their editorial points of view. He has said that print media is too liberal and attacks opposing viewpoints.\nIn 2003, O'Reilly criticized the Los Angeles Times",
"rather than a parody of Obama. Ehrenstein responded to the controversy in late December stating, \"As everyone knows Whites feel no guilt about America's racist history whatsoever. All they care about is the appearance of politesse — the slimy veneer of 'good manners.' Clearly the Republican party (racist to its very core) is 'split' over what to do in the wake of having lost so much political capital. Chip and his ilk want to continue making childish attacks. Others in the party seek to turn chicken shit into chicken salad by claiming Obama is the second coming of Ronald Reagan.\"",
"States military had aimed at journalists in Iraq and killed 12 of them. Similarly, in 2002, Trent Lott had to resign as Senate majority leader due to his inappropriate racist remarks that were widely discussed in the blogosphere. However bloggers attract attention not only to oust journalists and politicians. An online investigation on technical problems with electronic voting machines started by an activist Bev Harris in 2003 eventually forced traditional media outlets to address issue of electronic voting malperformance. This in turn made Diebold, a company that produces these machines, to acknowledge its fault and take measures to fix it.",
"A press release from HUD on March 28, 2019 stated that HUD was charging that \"Facebook enabled advertisers to exclude people whom Facebook classified as parents; non-American-born; non-Christian; interested in accessibility; interested in Hispanic culture; or a wide variety of other interests that closely align with the Fair Housing Act’s protected classes.\" Political Redlining Political redlining is the process of restricting our supply of political information with assumptions about our demographics and present or past opinions. It occurs when political campaign managers delimit which population is less likely to vote and design information campaigns only with likely voters in mind.",
"Many of the comments were deleted as more information was received about the case.\nAfter having been started by overtly conspiracist outlets, the false flag narrative was later picked up by some mainstream conservatives. Commentator Rush Limbaugh said that Republicans could not be responsible for the packages, that \"Republicans just don't do this kind of thing. Even though every event, like mass shootings, remember, every mass shooting there is, the Democrats in the media try to make everybody think right off the bat that some tea partier did it, or some talk radio fan did it, or some Fox News viewer",
"poll placed him at 7% with Brownback at 6. Huckabee acknowledged their similarities and said that \"without a doubt, we're going after the same voters.\" Other sources have expressed concern that there is room for only one of them in the race, and that if Huckabee comes out on top, Brownback will struggle to raise money and vice versa.\nOn July 26, Huckabee called upon Tom Tancredo to pull his campaign's campaign ad which attacked Huckabee on the subject of illegal immigration. Huckabee called the ad \"blatantly dishonest\" and said that \"when people engage in a completely false attack, it's usually",
"his own campaign, Bush made a statement urging Congress to pass the Americans with Disabilities Act, which he signed upon gaining office and which became one of his proudest legacies.\nAt a 2003 Democratic primary debate repeatedly interrupted by hecklers, Joe Lieberman quoted John McCain, \"no one's been elected since 1972 that Lyndon LaRouche and his people have not protested\". The first reported incidence of heckling by LaRouche followers was at the Watergate hearings in 1973. Since then, LaRouche followers have repeatedly disrupted speaking events and debates featuring a large variety of speakers. Conflict with journalists In the 1980s, journalists including",
"among others which lead to the false assumptions of danger and criminality.\" New media stereotypes In 2012, Moody documented Facebook fans' use of social media to target President Barack Obama and his family using stereotypes. Her study found several themes and missions of groups targeting the Obamas. Some groups focus on attacking the president's politics, and consist of Facebook members who have an interest in politics and use social media to share their ideas. Other, more malicious types focus on the president's race, religion, sexual orientation, personality, and diet.\nMoody, assistant professor of journalism, public relations and new media in Baylor's",
"\"accurately reflect the will of the American people\". The following day, the White House released another statement, saying: \"the federal government did not observe any increased level of malicious cyberactivity aimed at disrupting our electoral process on Election Day.\"\nDonald Trump and New Hampshire governor Chris Sununu both complained that liberal voters from Massachusetts were illegally bused into New Hampshire for the 2016 election, and Scott Brown blamed the same phenomenon for losing his senate race in 2014. The New Hampshire Secretary of State and New Hampshire Department of Justice issued a report in 2018 regarding complaints of voters being bused",
"Post [anyway, if for] no other reason than [because] they drive a lot of cable coverage\". Jon Bekken, journalism professor at Suffolk University, has cited The Huffington Post as an example of an \"advocacy newspaper\". The Wall Street Journal columnist James Taranto mockingly calls it the Puffington Host, and Rush Limbaugh frequently refers to it as the Huffing and Puffington Post.\nDuring the 2016 U.S. presidential election, the Huffington Post regularly appended an editor's note to the end of stories about candidate Donald Trump, reading: \"Donald Trump regularly incites political violence and is a serial liar, rampant xenophobe, racist, misogynist and",
"been \"personal attacks, the use of profanity and hate speech\" by \"a significant number of folks\". Some readers were skeptical of his claims and brought forth a mirror site of the blog that showed that there were relatively few posts fitting Brady's description. Brady responded by saying that the comments never showed up on the blog because management had been removing them as soon as they were posted. The Post has since restored 948 comments.\nOn January 22, 2006, Howell discussed the controversy started by her column the previous week. She repeated the statement that Abramoff had directed his clients to",
"Conservative writer Bill Kristol initially described Romney's remarks as \"arrogant and stupid\" (a comment he later said \"might have been a tad harsh\"), but ultimately stood by Romney, saying, \"It remains important for the country that Romney wins in November (unless he chooses to step down and we get the Ryan-Rubio ticket we deserve!).\" Several Republicans campaigning for seats in the 2012 election disputed or criticized Romney's remarks, including Senate candidates Linda McMahon (CT), George Allen (VA), Sen. Dean Heller (NV), Sen. Scott Brown (MA), and Gov. Susana Martinez (NM). Some conservative Republicans, such as Erick Erickson and Rush Limbaugh,",
"YouTube was circulated of a February 2009 lecture by Jones at the Berkeley Energy and Resources Collaborative. He used strong language to refer to Congressional Republican lawmakers, and himself, when conveying that Democrats need to step up the fight. The incident made headlines and Jones apologized, saying his words \"do not reflect the views of this administration, which has made every effort to work in a bipartisan fashion, and they do not reflect the experience I have had since I joined the administration.\"\nRepublicans persisted in their attack on Jones. Representative Mike Pence (R-Indiana), the chairman of the Republican Conference",
"quotes from conservative politicians that seem politically sensitive. They will then submit the site to a filter and see if it gets blocked. They will then point out that the content deemed \"inappropriate\" on their pages was, in fact, \"appropriate\" when coming from a corporate (or conservative blog) site. They also routinely search out sites of liberal and progressive content to see if they are blocked. They then compile a report to point out how the said software is discriminatory and restrictive of free speech/free access in what it censors. They offer these reports to the software makers and later",
"to solve these problems wouldn't be getting shit for not offering solutions.\"\nRepublican presidential candidate Mitt Romney said that while there were \"bad actors\" that needed to be \"found and plucked out\", he believes that targeting one industry or region of America is a mistake and views encouraging the Occupy Wall Street protests as \"dangerous\" and inciting \"class warfare\". Romney later expressed sympathy for the movement, saying, \"I look at what's happening on Wall Street and my view is, boy, I understand how those people feel.\"\nHouse Democratic Leader Rep. Nancy Pelosi said she supports the Occupy Wall Street movement. In September,",
"out after a report from an unnamed Facebook employee on May 7 alleged that contractors for the social media giant were told to minimize links to their sites in its \"trending news\" column. Alex Breitbart, former editor-in-chief of Breitbart News, claimed that \"Facebook trending news artificially mutes conservatives and amplifies progressives.\" Facebook's response included a statement that they \"do not permit the suppression of political perspectives\" and that its trending news articles are selected by algorithms to prevent human bias from violating its policy of neutrality. Fact checking and \"fake news\" Conservative outlets criticize fact checking of conservative content, as a"
] |
Why is my grip so weak when I wake up in the morning, especially after a good night's sleep? | [
"Your muscles are stiff from not moving overnight and your blood sugar is low.",
"Is the sensation the same as when you try to pick up a pencil after laughing very hard? If it is, they have isolated what hormone makes us weaker. The explanation in the context of sleep is that it prevents you from acting out your dreams by inhibiting nerve signals. They haven't figured out exactly why we get it when we laugh too though.\n\nIf you mean that the muscles feel stiff, then I'd go with the below explanation."
] | [
"Osteoarthritis Signs and symptoms The main symptom is pain, causing loss of ability and often stiffness. The pain is typically made worse by prolonged activity and relieved by rest. Stiffness is most common in the morning, and typically lasts less than thirty minutes after beginning daily activities, but may return after periods of inactivity. Osteoarthritis can cause a crackling noise (called \"crepitus\") when the affected joint is moved, especially shoulder and knee joint. A person may also complain of joint locking and joint instability. These symptoms would affect their daily activities due to pain and stiffness. Some people report increased",
"is hanging freely at a person's side. Clinical significance The overuse of the coracobrachialis can lead to stiffening of the muscle. Common causes of injury include chest workouts or activities that require one to press the arm very tight towards the body, e.g. work on the rings in gymnastics. Symptoms of overuse or injury are pain in the arm and shoulder, radiating down to the back of the hand. In more severe cases, the musculocutaneous nerve can get trapped, causing disturbances in sensation to the skin on the radial part of the forearm and weakened flexion of the elbow,",
"holding arms crossed causing significant pain similar to restless leg syndrome. Affected persons may notice trembling in the diaphragm while breathing, or the need to place hands in pockets, under legs while sitting or under pillows while sleeping to keep them still and to reduce pain. Trembling in the jaw may be felt and heard while lying down, and the constant movement to avoid pain may result in the grinding and wearing down of teeth, or symptoms similar to TMD. The voice may crack frequently or become harsh, triggering frequent throat clearing. Swallowing can become difficult and accompanied by painful",
"Low back pain Signs and symptoms In the common presentation of acute low back pain, pain develops after movements that involve lifting, twisting, or forward-bending. The symptoms may start soon after the movements or upon waking up the following morning. The description of the symptoms may range from tenderness at a particular point to diffuse pain. It may or may not worsen with certain movements, such as raising a leg, or positions, such as sitting or standing. Pain radiating down the legs (known as sciatica) may be present. The first experience of acute low back pain is typically between the",
"bed and the calf muscles began to stiffen and \njerk. My toes drew up under my feet, and as I moved or\nturned my head flashes of light kept darting across my eyes..\nI then knew something serious was developing, so I crawled\noff the bed and scrambled to a case in my room and got out\n(fortunately) the bromide of potassium and the chloral. I\nhad no confidence or courage to weigh them, so I guessed\nthe quantity-about 30 gr. [30 grains, about 2 grams] bromide of potassium and 10 gr.\nchloral-put them in a tumbler with some water, and drank\nit off. My whole body was",
"most of the body’s pressure relies over arms and shoulders which produce neck stiffness and frozen shoulder. This can be solved with a side sleeper pillow that allows the correct placement of neck, arms and shoulders. Back sleeping Unlike side sleeping, this position may favour episodes of snoring and sinusitis, as well as back pain. This position requires a soft but firm support for three critical curves of the body: Behind the neck, in the middle of the back and lower back. For this, an orthopedic pillow with neck contour and a wedge under knees can allow the",
"surrounding the joint. With this condition, the pain is usually worse during and after activity, and the tendon and joint area can become stiff the following day as muscles tighten from the movement of the tendon. Many patients report stressful situations in their life in correlation with the beginnings of pain which may contribute to the symptoms. Medical imaging Ultrasound imaging can be used to evaluate tissue strain, as well as other mechanical properties.\nUltrasound-based techniques are becoming more popular because of its affordability, safety, and speed. Ultrasound can be used for imaging tissues, and the sound waves can also",
"professional poker player who, after gaining weight, became somnolent and fatigued and prone to fall asleep during the day, as well as developing edema of the legs suggesting heart failure. The authors coined the condition \"Pickwickian syndrome\" after the character Joe from Dickens' The Posthumous Papers of the Pickwick Club (1837), who was markedly obese and tended to fall asleep uncontrollably during the day. This report, however, was preceded by other descriptions of hypoventilation in obesity. In the 1960s, various further discoveries were made that led to the distinction between obstructive sleep apnea and sleep hypoventilation.",
"contract, bringing the head down and shoulders up, while the back muscles draw the spine into a concave curve. This, in turn, pushes the pelvis forward and pulls the genitals up, slumping the body into a classic fetal position\".\nIn trying to resist this position, the body will begin to shake in places such as the legs and hands. Several other things happen besides this. Muscles in the body contract, causing them to be tense and ready to attack. Second, \"blood vessels in the extremities constrict\". This can leave a person with the feeling of cold fingers, toes, nose, and ears.",
"when getting up. Although the symptoms were dull, never severe and frontal in situation, he slept well but tended to wake in the early hours. He also suffered from bouts of indigestion, which was treated with bicarbonate of soda. Armstrong also suffered from panic attacks with an episode occurring before the accident. One medical condition he no longer suffered from was breathlessness and he also lost his sense of smell 18 months before the accident occurred.",
"other potential causes of irritation to the rotator cuff or bursa and may lead to inflammation and impingement. Signs Signs of these conditions include the slow onset of discomfort and pain in the upper shoulder or upper third of the arm and/or difficulty sleeping on the shoulder, similar condition can have sharp pain or discomfort when the upper shoulder is positioned at certain angles. Tendinitis and bursitis also cause pain when the arm is lifted away from the body or overhead. If tendinitis involves the biceps tendon (the tendon located in front of the shoulder that helps bend the elbow",
"he forces me down on the bed. And I just was very frightened, and I tried to get away from him and I told him 'No,' that I didn't want this to happen but he wouldn't listen to me. ... It was a real panicky, panicky situation. I was even to the point where I was getting very noisy, you know, yelling to 'Please stop.' And that's when he pressed down on my right shoulder and he would bite my lip. ... When everything was over with, he got up and straightened himself, and I was crying at the moment",
"his right thigh. He was evaluated by Terry Tramell in Indianapolis on August 20. Gidley revealed the extent of his injuries the day after being discharged from hospital, \"I'm very sore, but not too bad really. I feel like you do after you've been skiing for the first time after a long layoff. When you get off the slopes you feel fine, but when you get up in the morning you can hardly move. I feel like I've got about 25 charley horses all over me.\" He used crutches to aid in his mobility because his body was sore from",
"Maybe I'll be so tired after the next shock treatment I won't get up, I won't ever get up, and I'll be dead. But I always got up. Something in me beyond my wishes made me put myself together again. I memorized my name, I taught myself to say my name. Teddy, Teddy, I'm Teddy ... I'm here, I'm here, in this room, in this hospital. And my mommy's gone ... I would cry and realize how dizzy I was. The world was spinning around me and coming back to it hurt too much. I want to go down, I",
"As petty excuses run through his mind (it is cold, it is evening), a “fit of restlessness” raises him to his feet. What is it inside this man that slaps him awake from his customary lethargy? His mind has changed suddenly, and he has to redress himself before he goes out and “rediscovers himself down in the street.” At first, the man is especially aware of the power of his body: “your limbs responding with particular agility to the unexpected freedom you have procured for them.” Then he is overcome by the power of a decisive act: action has the",
"person crept in during the night and lay upon the sleeper, so as to constrict the chest and breathing—leading to a sense of suffocation, side by side with a terrifying dream of being either crushed or (in the case of a woman) sexually violated by the (male) incubus or ephialtes. Sleepers thus set upon feel they are about to die—but as Bond (who was himself prone to nightmares) stated: \"As soon as they shake off that vast oppression, they are affected with a strong palpitation, great anxiety, languour, and uneasiness – which symptoms gradually abate, and are succeeded by the",
"the knee to see if the pain is reproduced). Bending the knee (into hyperflexion if tolerable), and especially squatting, is typically a painful maneuver if the meniscus is torn. The range of motion of the joint is often restricted.\nCooper's sign is present in over 92% of tears. It is a subjective symptom of pain in the affected knee when turning over in bed at night. Osteoarthritic pain is present with weightbearing, but the meniscal tear causes pain with a twisting motion of the knee as the meniscal fragment gets pinched, and the capsular attachment gets stretched causing the complaint of",
"\"worrying twist\" in the story when Fletch's blood pressure drops as doctors attempt to wake him from his coma. However, when doctors try to awake Fletch again, he successfully awakes. Raf then takes over Fletch's care. Walkinshaw explained that Fletch and Raf's friendship is that close that Raf wants to do anything he can to save Fletch. Fletch's health deteriorates and he falls from his bed and injures himself. As a result, Fletch cannot feel anything in his legs and feet, leaving Raf \"alarmed\". Raf and Bernie then perform a lumbar puncture on Fletch and he is \"terrified\" when he",
"ill-fitting bit and bridle or bad hands, resulting in mouth pain, can cause secondary back pain as the horse lifts its neck and stresses its back to avoid the pressure to the mouth. Diagnosis A veterinarian or experienced horse owner can palpate the back of a horse to pinpoint sources of pain and from there assess the most likely cause. Radiographs (X-Rays) can be used to diagnose potential problems with cracked vertebrae, some forms of arthritis, impinging dorsal spinous processes (kissing spines), and other skeletal problems, although with large, heavily muscled animals this diagnostic modality is limited. Certain",
"swelling to the back of the fetlock caused by inflammation of the sheaths of the deep digital flexor tendon, appear most often in the rear legs. Soft and fluid-filled, the swelling may initially be accompanied by heat and pain, but can remain long after the initial injury has healed without accompanying lameness. Repeated injuries to the tendon sheath, often caused by excessive training or work on hard surfaces, can cause larger problems and lameness.\nLeg injuries that are not immediately fatal still may be life-threatening because a horse's weight must be distributed evenly on all four legs to prevent circulatory problems,",
"he said that it did not hurt. He went on to say \"No, there are no nerves in there, it didn’t hurt. I just heard it snap and I was just aware of it. You can feel it come up, but there’s no pain.\" Although the biceps was repaired Thompson has reported that it feels different and that \"it’s just not quite as smooth.\" Although he has said that he does not think it will ever be the same, he has also said that: \"When I get to a competition, I won’t be holding back because of my arm. I’ve",
"above the waist, vibration sensation was lost in the sternum, and markedly reduced proprioception or sensation about the self's orientation. Many people suffering from the neurological effects of copper deficiency complain about very similar or identical symptoms as the patient. This numbness and tingling poses danger for the elderly because it increases their risk of falling and injuring themselves. Peripheral neuropathy can become very disabling leaving some patients dependent on wheel chairs or walking canes for mobility if there is lack of correct diagnosis. Rarely can copper deficiency cause major disabling symptoms. The deficiency will have to be present for",
"in flexed-arm and straight-arm hangs for time.\nThe width of the grip may also differ. When grabbing and holding the bar during the pull-up, the hands can be apart at shoulder-width, or wider, or narrower enough to touch each other. This may make the pull-up more difficult and may limit the range of motion compared to the shoulder-width grip. Safety Organizations such as the American Council on Exercise give advice such as \"care should be taken not to unduly put stress on your shoulder during this exercise\". Elbow pain due to tendonitis, bursitis, and ulnar nerve entrapment can occur",
"Put Me Off at Buffalo Lyrics He caught the train at Albany and to the porter said, put me off at Buffalo. \n\nHe was tired and took a sleeper and says, now I'll go to bed, \n\nJust to rest an hour or so. \n\nIn an undertone he murmured \"now I lay me down to wink,\" put me off at Buffalo\n\nThen he tipped the porter saying, Port old boy come have a drink,\n\nPut me off at Buffalo, oh, oh, oh,\n\nDon't forget to put me off at Buffalo, Oh, oh, my berth is lower five, \n\nIf you find me hard to wake,",
"to be the person inside. For the first five minutes the pain is severe, but you believe you can bear it. During the second five minutes this belief evaporates, but the poultice is buckled at the back and you can't get it off. This is the period the onlookers most enjoy. During the last five minutes, I noted a sort of numbness supervenes.\nAs a non-paying patient, in the uniform nightshirt, you were primarily a specimen, a thing I did not resent but could never quite get used to.\nIn the public wards of hospitals you see horrors that you don't seem",
"18 June, Berthold again advised his sister of his ongoing medical problems. \n\"My arm has gotten worse. It is rather swollen and infected underneath the open wound. I believe the bone splinters are forcibly pushing themselves out, because the swollen area is very hard. The pain is terrific. During my air battle yesterday…I screamed loudly in pain.\"\n \nHe took a break until 28 June, when he scored his 37th victory. That night, he wrote his sister, \n\"The arm is still not good. Since the lower wound has opened up again, the pain has subsided a bit and the swelling has",
"local hospital, where he is forced to spend the evening. Ross' roommate is an elderly man with a respiratory infection. Ross sarcastically suggests that he would like to trade ailments with the old man, who jokingly accepts the trade and they go to sleep. Salvadore turns over quickly and hits his hand. He then realizes it no longer hurts and begins to unwrap it. As he unwraps it, he begins to cough. He gets out of the bed and checks the other man, whose hand has begun to hurt. He begs to change things back, but Salvadore tells him no",
"called a \"Charley horse\" or a \"corky\". Such cramping is associated with strenuous physical activity and can be intensely painful; however, they can even occur while inactive and relaxed. Around 40% of people who experience skeletal cramps are likely to endure extreme muscle pain, and may be unable to use the entire limb that contains the \"locked-up\" muscle group. It may take up to a week for the muscle to return to a pain-free state, depending on the person's fitness level, age, and several other factors. Nocturnal leg cramps Nocturnal leg cramps are involuntary muscle contractions that occur in",
"numbness or pins and needles when nerve irritation or compression is involved. Weakness in the legs or loss of bowel or bladder control in the presence of thoracic spine pain can indicate spinal cord compression and should be investigated. Causes The most common causes of upper back pain are unknown but theorized to originate from muscular irritation, intervertebral discs, spinal facet joints, ribs or soft tissue (e.g. ligament/fascia) problems. Commonly intra-scapular pain is referred from the lower cervical spine. Contributing factors to injury include; lack of strength, poor posture, overuse injuries (such as repetitive motion), or a trauma",
"in chronic cases. Treatment entails synovial excision and total joint replacement.\nClicking, grating, or locking may result from acute mechanical problems due to intra-articular bodies within the affected joint. Locking may destroy articular cartilage, resulting in secondary osteoarthritis. Symptoms such as joint stiffness and aching are the result of osteoarthritis that sets in after years of persistent joint irritation.\nNote: Possibility of paralyzation if left too long. [Citation appreciated] Radiography Typical finding is of multiple, smooth, oval-shaped calcified masses within the joint space or bursa. They have a characteristic popcorn-ball appearance of calcified cartilage. With serial imaging,"
] |
Why can you feel the spiciness of food when it comes out after eating (for example) a bunch of hot cheetos? | [
"Since you didn't say the word \"butthole\" or \"asshole\" in this question, i'm going to refuse to answer it.\n\nOK..i'm feeling generous. The spicy \"stuff\" in spicy food (capsaicin) is an irritant and your mucus membranes - including your ASSHOLE - are sensitive to it. You don't always break it all down before it passes through you."
] | [
"Peruvian, Hungarian, Indian, Korean, Indonesian, Lao, Malaysian, Mexican, New Mexican, Singaporean, Southwest Chinese (including Szechuan cuisine), Vietnamese, and Thai cuisines.\nThis particular sensation, called chemesthesis, is not a taste in the technical sense, because the sensation does not arise from taste buds, and a different set of nerve fibers carry it to the brain. Foods like chili peppers activate nerve fibers directly; the sensation interpreted as \"hot\" results from the stimulation of somatosensory (pain/temperature) fibers on the tongue. Many parts of the body with exposed membranes but no taste sensors (such as the nasal cavity, under the fingernails, surface of the",
"mild to hot. The Scoville scale measures the pungency of chili peppers, as defined by the amount of capsaicin they contain.\nPungency is not considered a taste in the technical sense because it is carried to the brain by a different set of nerves. While taste nerves are activated when consuming foods like chili peppers, the sensation commonly interpreted as \"hot\" results from the stimulation of somatosensory fibers in the mouth. Many parts of the body with exposed membranes that lack taste receptors (such as the nasal cavity, genitals, or a wound) produce a similar sensation of heat when exposed to",
"spiciness or hotness) Substances such as ethanol and capsaicin cause a burning sensation by inducing a trigeminal nerve reaction together with normal taste reception. The sensation of heat is caused by the food's activating nerves that express TRPV1 and TRPA1 receptors. Some such plant-derived compounds that provide this sensation are capsaicin from chili peppers, piperine from black pepper, gingerol from ginger root and allyl isothiocyanate from horseradish. The piquant (\"hot\" or \"spicy\") sensation provided by such foods and spices plays an important role in a diverse range of cuisines across the world—especially in equatorial and sub-tropical climates, such as Ethiopian,",
"a burning effect on other sensitive areas, such as skin or eyes. The degree of heat found within a food is often measured on the Scoville scale. Because some people enjoy the heat, there has long been a demand for capsaicin-spiced products like curry, chili con carne, and hot sauces such as Tabasco sauce and salsa.\nIt is common for people to experience pleasurable and even euphoric effects from ingesting capsaicin. Folklore among self-described \"chiliheads\" attributes this to pain-stimulated release of endorphins, a different mechanism from the local receptor overload that makes capsaicin effective as a topical analgesic. Research and",
"with normal taste reception. The pungent feeling caused by allyl isothiocyanate, capsaicin, piperine, and allicin is caused by activation of the heat thermo- and chemosensitive TRP ion channels including TRPV1 and TRPA1 nociceptors.\nThe pungency of chilies may be an adaptive response to microbial pathogens.",
"we are less familiar with. Ketchup is commonly used an example of Bingham fluid and its flow behavior can be compared to that of a polymer melt. Psychorheology Psychorheology is the sensory judgement of rheological properties. It is a term used in the food industry, to describe how a food \"feels\" to the mouth. It is not necessarily straightforward to predict how a food will \"feel\" based purely on the true rheological properties.\nThe most important factor in food rheology is consumer perception of the product. This perception is affected by how the food looks on the plate as well",
"occurs because of effects on taste buds that are mostly located in the tongue. Sometimes, only partial recovery of taste occurs. Common complaints are of food tasting too sweet or too bitter or of a continuous metallic taste. Complications Sores or ulcerations can become infected by virus, bacteria or fungus. Pain and loss of taste perception makes it more difficult to eat, which leads to weight loss. Ulcers may act as a site for local infection and a portal of entry for oral flora that, in some instances, may cause septicaemia (especially in immunosuppressed patients). Therefore, oral mucositis can be",
"Astringent (taste) Astringent is a taste that puckers the mouth, numbs the tongue, and constricts the throat. This taste is caused by astringents such as tannins. \nThe astringent taste is in unripened bananas, unripe persimmons and acorns dominantly, which prevents them from being eaten. It is also present in pomegranates, cranberries, crabapples, quinces as one among others, and in vegetables and beans as a secondary taste. It is also present in red meat, burnt and smoked food, and amla. Astringent foods are dry, cool, and heavy. \nSquirrels, wild boars, insects can eat astringent food as their tongues are able to",
"cooling and fizzing sensation results from the endothermic reaction between sodium carbonate and a weak acid, commonly citric acid, releasing carbon dioxide gas, which occurs when the sherbet is moistened by saliva. In China, it is used to replace lye-water in the crust of traditional Cantonese moon cakes, and in many other Chinese steamed buns and noodles. In cooking, it is sometimes used in place of sodium hydroxide for lyeing, especially with German pretzels and lye rolls. These dishes are treated with a solution of an alkaline substance to change the pH of the surface of the food and improve",
"Astringent An astringent (sometimes called adstringent) is a chemical that shrinks or constricts body tissues. The word derives from the Latin adstringere, which means \"to bind fast\". Calamine lotion, witch hazel, and yerba mansa, a Californian plant, are astringents.\nAstringency, the dry, puckering mouthfeel caused by the tannins in unripe fruits, lets the fruit mature by deterring eating. Ripe fruits and fruit parts including blackthorn (sloe berries), Aronia chokeberry, chokecherry, bird cherry, rhubarb, quince and persimmon fruits, and banana skins are very astringent; citrus fruits, like lemons, are somewhat astringent. Tannins, being a kind of polyphenol, bind salivary proteins and make",
"severe than those induced by food allergy, but can include anaphylaxis. Research directions FODMAPs are fermentable oligo-, di-, monosaccharides and polyols, which are poorly absorbed in the small intestine and subsequently fermented by the bacteria in the distal small and proximal large intestine. This is a normal phenomenon, common to everyone. The resultant production of gas potentially results in bloating and flatulence. Although FODMAPs can produce certain digestive discomfort in some people, not only do they not cause intestinal inflammation, but they avoid it, because they produce beneficial alterations in the intestinal flora that contribute to maintain the good health",
"eye or a wound) produce a similar sensation of heat when exposed to hotness agents. Asian countries within the sphere of, mainly, Chinese, Indian, and Japanese cultural influence, often wrote of pungency as a fifth or sixth taste. Coolness Some substances activate cold trigeminal receptors even when not at low temperatures. This \"fresh\" or \"minty\" sensation can be tasted in peppermint, spearmint, menthol, anethol, ethanol, and camphor. Caused by activation of the same mechanism that signals cold, TRPM8 ion channels on nerve cells, unlike the actual change in temperature described for sugar substitutes, this coolness is only a perceived",
"it and he spits out immediately. Tracy sees him and explains it was an exothermic reaction caused by edible thermophenylene that made him react the way he did. She offers him a spot in a focus group to taste the cookies. Dory accepts and brings OC along to help him get closer to Tracy.\nDory works for a while and he begins to get into a rhythm when he finds a blue explosion in a toilet in the men's bathroom. Dory thinks he sees something moving in the water and he shares his findings with the rest of the gang. OC",
"it becomes. After the shear is removed the ketchup thickens to its original viscosity.\nKetchup is a non-Newtonian fluid meaning that its viscosity changes under stress and is not constant. It is a shear thinning fluid which means its viscosity decreases with increased shear stress. The equation used to designate a Non-Newtonian fluid is as follows: . This equation represents apparent viscosity where apparent viscosity is the shear stress divided by shear rate. Viscosity is dependent on stress. This is apparent when you shake a bottle of tomato sauce/ketchup so it becomes liquid enough to squirt out. Its viscosity decreased with",
"may show signs of oral allergy syndrome, a food allergy classified by a cluster of allergic reactions in the mouth in response to the consumption certain fruits, vegetables, and nuts. Foods commonly involved include beans, celery, cumin, hazelnuts, kiwifruit, parsley, potatoes, bananas, melons, cucumbers, and zucchini. Because cooking usually denatures the proteins that cause the reaction, the foods are more allergenic when eaten raw; exceptions are celery and nuts, which may not be safe even when cooked. Signs of reaction can include itching, burning, and swelling of the mouth and throat, runny eyes and nose, hives, and, less commonly, vomiting,",
"which is why spicy foods cause nasal drip. The zygomatic sends signals to the lacrimal nerve that activate the lacrimal gland; which is the reason that spicy foods can cause tears. Both the lesser palatine and the zygomatic are maxillary nerves (from the trigeminal nerve).\nThe special visceral afferents of the vagus nerve carry taste from the epiglottal region of the tongue.\nThe lingual nerve (trigeminal, not shown in diagram) is deeply interconnected with chorda tympani in that it provides all other sensory info from the ⅔ of the tongue. This info is processed separately (nearby) in rostal lateral subdivision of nucleus",
"a similar burning sensation, it is caused by a different substance—piperine. Cuisine Capsicum fruits and peppers can be eaten raw or cooked. Those used in cooking are generally varieties of the C. annuum and C. frutescens species, though a few others are used, as well. They are suitable for stuffing with fillings such as cheese, meat, or rice.\nThey are also frequently used both chopped and raw in salads, or cooked in stir-fries or other mixed dishes. They can be sliced into strips and fried, roasted whole or in pieces, or chopped and incorporated into salsas or other sauces, of which",
"condiment, such as ketchup. The overall taste sensation might be sweet, savory, mild or hot, but it typically has a strong flavor that complements or adds to the primary food item with which it is served. In the United States In the United States, the most common commercially available relishes are made from pickled cucumbers and are known in the food trade as pickle relishes. Pickle relish is one of the most commonly used spreads in the U.S. Two variants of this are hamburger relish (pickle relish in a ketchup base or sauce) and hot dog relish (pickle relish in",
"of excessive salivation (as might occur when nauseated or as the result of gastroesophageal reflux disease). The endogenous gases are produced either as a by-product of digesting certain types of food, or of incomplete digestion, as is the case during steatorrhea. Anything that causes food to be incompletely digested by the stomach or small intestine may cause flatulence when the material arrives in the large intestine, due to fermentation by yeast or prokaryotes normally or abnormally present in the gastrointestinal tract.\nFlatulence-producing foods are typically high in certain polysaccharides, especially oligosaccharides such as inulin. Those foods include beans, lentils, dairy products,",
"through smell, have been known to provoke lethal reactions in extremely sensitive individuals. Common food allergens are gluten, corn, shellfish (mollusks), peanuts, and soy. Allergens frequently produce symptoms such as diarrhea, rashes, bloating, vomiting, and regurgitation. The digestive complaints usually develop within half an hour of ingesting the allergen.\nRarely, food allergies can lead to a medical emergency, such as anaphylactic shock, hypotension (low blood pressure), and loss of consciousness. An allergen associated with this type of reaction is peanut, although latex products can induce similar reactions. Initial treatment is with epinephrine (adrenaline), often carried by known patients in the form",
"Michel Lotito Entertainment Michel Lotito began eating unusual material as a teenager, at around 16 years of age, and he performed publicly beginning in 1966. He had an eating disorder known as pica, which is a psychological disorder characterized by an appetite for substances that are largely non-nutritive. Doctors determined that Lotito also had a thick lining in his stomach and intestines which allowed his consumption of sharp metal without suffering injury. Lotito also had digestive juices that were unusually powerful, meaning that he could digest the unusual materials. However, it also meant that soft foods, such as bananas and",
"the face, scalp and neck: capsaicin (the compound that makes spicy food taste \"hot\"), binds to receptors in the mouth that detect warmth. The increased stimulation of such receptors induces a thermoregulatory response. Antiperspirant Unlike deodorant, which simply reduces axillary odor without affecting body functions, antiperspirant reduces both eccrine and apocrine sweating. Antiperspirants, which are classified as drugs, cause proteins to precipitate and mechanically block eccrine (and sometimes apocrine) sweat ducts. The metal salts found in antiperspirants alters the keratin fibrils in the ducts; the ducts then close and form a \"horny plug\". The main active ingredients in modern antiperspirants",
"correspond to moderate or strong taste intensities. It is the prolonged moderate or strong taste intensities that persist even after a food is no longer present in the mouth that describe aftertaste sensation.\nFoods that have distinct aftertastes are distinguished by their temporal profiles, or how long their tastes are perceived during and after consumption. A sample testing procedure to measure a food's temporal profile would entail first recording the time of onset for initial taste perception when the food is consumed, and then recording the time at which there is no longer any perceived taste. The difference between these two",
"the type of grain used. This texture and look is important as they wish to make the patty look like a beef patty. Vegetables Vegetables such as corn, carrots, and mushrooms, provide the patty with texture and taste. Additionally, they provide moisture when heated. This allows the disc shape without breaking apart easily. The vegetables also provide nutrients with the addition of some vitamins and minerals. Dry ingredients Adding dry ingredients, such as oats, flours, nuts, or breadcrumbs, can absorb excess moisture and liquid, which results in the patty sticking together tightly. This could turn the moist veggie patties into",
"phenomenon. Numbness Both Chinese and Batak Toba cooking include the idea of 麻 (má or mati rasa), a tingling numbness caused by spices such as Sichuan pepper. The cuisines of Sichuan province in China and of the Indonesian province of North Sumatra often combine this with chili pepper to produce a 麻辣 málà, \"numbing-and-hot\", or \"mati rasa\" flavor. These sensations although not taste fall into a category of Chemesthesis. Astringency Some foods, such as unripe fruits, contain tannins or calcium oxalate that cause an astringent or puckering sensation of the mucous membrane of the mouth. Examples include tea, red wine,",
"back of the throat, up the nose, then eventually moves to the roof of the mouth and finally the tongue where the pain is intense, at which point there can be gustatory sweating and tears from the eyes. Some tasters note the strong, fruity Fatalii flavour, which is quite distinct, as being almost identical to the yellow version. Others find it milder.\nHot chili aficionados who have tasted all four colour varieties report the heat increasing from the white, which has pronounced citrus lime and lemon flavours, through yellow, then red, then to the hottest and sweetest being the chocolate or",
"Nick Gazin gave it a \"C\" grade, writing, \"After my first bite, I was a little surprised , because it tasted exactly like a Whopper with spicy taco meat instead of normal Whopper meat.\" However, when Fox News' Chew on This had multiple tasters test the Whopperito, the tasters gave it very positive reviews, with one of them saying of the item, \"Weird concept but I like it.\"",
"suspected. Species of Leccinum often cause nausea when consumed raw.",
"food and found enhanced dopamine release in the nucleus accumbens and increased pleasure-related behavior after administration of a sucrose solution. A related study found that endocannabinoids affect taste perception in taste cells In taste cells, endocannabinoids were shown to selectively enhance the strength of neural signaling for sweet tastes, whereas leptin decreased the strength of this same response. While there is need for more research, these results suggest that cannabinoid activity in the hypothalamus and nucleus accumbens is related to appetitive, food-seeking behavior. Energy balance and metabolism The endocannabinoid system has been shown to have a homeostatic role",
"nerves, etc.; temperature, detected by thermoreceptors; and \"coolness\" (such as of menthol) and \"hotness\" (pungency), through chemesthesis.\nAs taste senses both harmful and beneficial things, all basic tastes are classified as either aversive or appetitive, depending upon the effect the things they sense have on our bodies. Sweetness helps to identify energy-rich foods, while bitterness serves as a warning sign of poisons.\nAmong humans, taste perception begins to fade around 50 years of age because of loss of tongue papillae and a general decrease in saliva production. Humans can also have distortion of tastes through dysgeusia. Not all mammals share the same"
] |
If they're undocumented immigrants, how does the US know that there are 11 million of them? | [
"The US doesn't know; but it estimates. \n\nThere are many different estimates and approximations. The most cited number comes from census data. The census does not ask if someone is legally in the country or not, but it does ask about place of birth. The government does know how many foreigners are permanent residents and how many have become citizens, so subtracting the legal immigrants from the foreign-born census respondents yields the number of illegal immigrants.\n\nThis number is an estimate, and far from perfect. Not everybody responds to census, for instance, and many illegal immigrants specifically don't respond. So the number is refined by other metrics, is compared with other things known about people. Even if they are illegally in the country, they still need to pay rent, drive, work, do other things. Combining all this information with statistical analysis generates the estimate.",
"Estimates, as mentioned below.\n\nBear in mind that 'undocumented' doesn't actually mean undocumented.\n\nWhat it means is that they do not have legal status in this country. (For instance, some are caught within the country and their legal status is noted, but they are released on their own recognizance pending an official deportation hearing- which they may never actually show up for) This includes people who DID have legal status but lost it (eg: someone here on student visa whose visa has expired)\n\nThe numbers reported in the news are a culmination of analyzing data from all these sources."
] | [
"one who was admitted as a refugee pursuant to 8 U.S.C. § 1157(c), can either be a national of the United States (American) or an alien, which requires a case-by-case analysis and depends mainly on the number of continuous years he or she has physically spent in the United States as a lawful permanent resident (LPR). Firm resettlement of refugees in the United States U.S. Presidents and the U.S. Congress have expressly favored some \"legal immigrants\" because the U.S. Attorney General had admitted them to the United States as refugees, i.e., people who experienced genocides in the past and have",
"increasing share of U.S. unauthorized immigrants were long-term residents; in 2015, 66% of adult unauthorized residents had lived in the country for at least ten years, while only 14% had lived in the U.S. for less than five years.\nIn June 2012, President Obama issued a memorandum instructing officers of the federal government to defer deporting young undocumented immigrants who were brought to the U.S. as children as part of the Deferred Action for Childhood Arrivals (DACA) program. Under the program, eligible recipients who applied and were granted DACA status were granted a two-year deferral from deportation and temporary eligibility",
"But one million people do matter.\" Henderson also noted that Beck makes it seem as if allowing immigration is done at a cost to Americans, but that is not what research on the issue indicates. False claims FactCheck.Org have said an advertisement released by NumbersUSA contained \"inaccurate, inflated and emotionally charged claims.\" PolitiFact evaluated as false a NumbersUSA claim that, in an extreme case, the migration of \"a single permanent foreign worker could result in the permanent immigration to the United States of 273\" relatives through chain migration, noting widespread agreement among experts that such this was \"likely impossible under",
"of 2009, 66% of legal immigrants were admitted on the basis of family ties, along with 13% admitted for their employment skills and 17% for humanitarian reasons.\nNearly 8 million people immigrated to the United States from 2000 to 2005; 3.7 million of them entered without papers. In 1986 president Ronald Reagan signed immigration reform that gave amnesty to 3 million undocumented immigrants in the country. Hispanic immigrants suffered job losses during the late-2000s recession, but since the recession's end in June 2009, immigrants posted a net gain of 656,000 jobs. Over 1 million immigrants were granted legal residence in",
"by President Trump's rescission of the DACA memo and the subsequent voluntary dismissal by Plaintiffs in the underlying district court action. Analysis and studies In February 2015, the Migration Policy Institute estimated that about 3.7 million unauthorized immigrants in the United States are potentially eligible for DAPA, around 766 000 in just five counties: Los Angeles and Orange in California, Harris and Dallas in Texas, and Cook in Illinois.\nThe President's program, when combined with Deferred Action for Childhood Arrivals, would have delayed deportation of slightly less than half of the 11 million illegal aliens in the United States. More",
"wall with Mexico. Since 1994, Pew Research center has tracked a change from 63% of Americans saying that immigrants are a burden on the country to 27%. Asylum for refugees In contrast to economic migrants, who generally do not gain legal admission, refugees, as defined by international law, can gain legal status through a process of seeking and receiving asylum, either by being designated a refugee while abroad, or by physically entering the United States and requesting asylum status thereafter. A specified number of legally defined refugees, who either apply for asylum overseas or after arriving in the U.S., are",
"the number of people entering the U.S. illegally declined by nearly 67%, according to the Pew Hispanic Center, from 850,000 yearly average in the early 2000s to 300,000. The most recent estimates put the number of unauthorized immigrants at 11 million in 2015, representing 3.4% of the total U.S. population. The population of unauthorized immigrants peaked in 2007, when it was at 12.2 million and 4% of the total U.S. population. As of 2014, unauthorized immigrant adults had lived in the U.S. for a median of 13.6 years, with approximately two-thirds having lived in the U.S. for at least a",
"of illegal immigrants is diverted into rural mountainous and desert areas, leading to several hundred migrant deaths along the Mexico–U.S. border of those attempting to cross into the United States from Mexico illegally and vice versa. Undocumented labor contributes $395 billion to the economy every year. While the U.S. is in favor of immigration, the increase in undocumented immigration has given border-crossing a negative image. There are around 11.5 million undocumented workers in the U.S. today, and 87% of undocumented immigrants have been living in the U.S. for more than 7 years. Local economies that develop on the Mexican side",
"refugees have already \"been lawfully accorded the privilege of residing permanently in the United States\" by the Attorney General, but decades later the immigration officers unconstitutionally turned these firmly resettled Americans into refugees again. Unlike other aliens in removal proceedings, the refugees obviously owe permanent allegiance solely to the government of the United States. This makes them nothing but a distinct class of persecuted Americans. The ones who are denied U.S. citizenship are statutorily allowed to live in the United States with their American families for the rest of their life. Deporting such Americans shocks the conscience because it is",
"estimated that the undocumented immigrant population in the United States was 22 million (approximately twice as large as the estimate derived from U.S. Census Bureau figures); an author of the study notes that this has implications for the relationship between undocumented immigration and crime suggesting the correlation is lower than previously estimated: \"You have the same number of crimes but now spread over twice as many people as was believed before, which right away means that the crime rate among undocumented immigrants is essentially half whatever was previously believed.\" A 2019 analysis found no evidence that illegal immigration increased crime.",
"was extended to undocumented migrants that entered the country before 9 January 2015. Migrants are assured that they will not be detained nor deported when inquiring for information or submitting their application at an INM office. Identification and proof of residency/entry date (such as bus or airplane tickets, utility bills, school records or expired visas) should be presented. If these proofs can not be provided, the legal testimony of two Mexicans/resident foreigners may also be accepted. The program runs until 19 December 2017. Public opinion The 2019 survey found that 58% of Mexican respondents oppose immigration from Central America. Immigrant",
"immigrant is the victim or witness of a crime, or if he calls or approaches the police seeking assistance, police officers will not inquire about his immigration status.\nIn January 2017, President Donald Trump enacted a new executive order that would allow undocumented immigrants nationwide to be deported on lesser charges than previously. Over the week of February 6, 2017, six hundred people in 11 states, including 41 people in the New York City area, were arrested by U.S. Immigration and Customs Enforcement. The ICE stated that of those arrested in the New York City area, 95% of those arrested",
"\"undocumented immigrants in the U.S. who meet certain requirements should be allowed to stay legally.\"\nAmerican opinion regarding how immigrants affect the country and how the government should respond to illegal immigration have changed over time. In 2006, out of all U.S. adults surveyed, 28% declared that they believed the growing number of immigrants helped American workers and 55% believed that it hurt American workers. In 2016, those views had changed, with 42% believing that they helped and 45% believing that they hurt. The PRRI 2015 American Values Atlas showed that between 46% and 53% of Americans believed that \"the growing",
"live in households with at least one potentially DAPA-eligible adult\" and that \"two-thirds of these adults have lived in the United States for at least 10 years\". Over half the undocumented aliens eligible for the President's delayed deportation live in California, Texas, and New York.\nTwo weeks later, Texas Attorney General Greg Abbott, joined by twenty-six other states, sued in the United States District Court for the Southern District of Texas. Of the 3.6 million illegal aliens eligible for DAPA, 2.2 million reside in states that did not join the lawsuit. United States District Court On February 16, 2015, United",
"foreign-born people (based on immigration records and adjusted by projections of deaths and out-migration) to obtain the total, illegal immigrant (residual) population. This methodology is used by the US Department of Homeland Security, the Pew Hispanic Center, the Center for Immigration Studies, and the U.S. Census Bureau. Since illegal immigrants have many reasons for not answering the U.S. Census correctly and since penalties for answering the U.S. Census incorrectly are rarely enforced, it is accepted that it under-counts the number of illegal immigrants. The users of this methodology assume that 10% of illegal immigrants are not counted by census takers.",
"According to demographer Jeffery Passel of the Pew Hispanic Center, the flow of Mexicans to the U.S. has produced a \"network effect\"—furthering immigration as Mexicans moved to join relatives already in the U.S. Further incentives Lower costs of transportation, communication and information has facilitated illegal immigration. Mexican nationals, in particular, have a very low financial cost of immigration and can easily cross the border. Even if it requires more than one attempt, they have a very low probability of being detected and then deported once they have entered the country. Legal issues Aliens can be classified as unlawfully present for",
"country.\nAppointed by President Clinton, the U.S. Commission on Immigration Reform recommended in 1997 that legal immigration be reduced to about 550,000 a year. Since 11 September 2001, the politics of immigration has become an extremely hot issue. It was a central topic of the 2008 election cycle.\nU.S. immigration law distinguishes between \"immigrants\" who become lawful permanent residents and \"nonimmigrants\" who may remain lawfully in the U.S. for years, but who do not obtain permanent resident status. Since World War II, more refugees have found homes in the U.S. than any other nation and more than two million refugees have arrived",
"than 10 million people in the United States reside in a household with at least one adult who would have been eligible for DAPA, with two thirds of those adults having lived in the United States for 10 years or more. Over half the illegal aliens eligible for the President's delayed deportation live in California, Texas, and New York.\nThe program was challenged in federal court by 26 states. Of the 3.6 million illegal aliens eligible for DAPA, 2.2 million reside in states that did not join the lawsuit.\nA 2016 study of the impact of DACA on labor market",
"For large countries in particular (such as India, China, and Mexico), this limit was much less than the number of people who sought to migrate through family-based and employment-based migration. This led to many cases of people who had approved petitions for family-based or employment-based immigration but needed to wait several years in order to be able to legally immigrate or adjust status to that of Lawful Permanent Resident. Some of these people stayed in the United States, going out of status, while others waited outside the United States for long periods of time. Growth of the removal/deportation machinery Until",
"110, the Central Intelligence Agency Act. Illegal immigration The illegal immigrant population of the United States is estimated to be between 11 and 12 million. The population of unauthorized immigrants peaked in 2007 and has declined since that time. The majority of the U.S. unauthorized immigrants are from Mexico, but \"their numbers (and share of the total) have been declining\" and as of 2016 Mexicans no longer make up a clear majority of unauthorized immigrants, as they did in the past. Unauthorized immigrants made up about 5% of the total U.S. civilian labor force in 2014. By the 2010s, an",
"no \"alien ineligible for citizenship\" could be admitted as an immigrant to the United States, consolidating the prohibition of Asian immigration. Postwar immigration World War II-era legislation and judicial rulings gradually increased the ability of Asian Americans to immigrate and become naturalized citizens. Immigration rapidly increased following the enactment of the Immigration and Nationality Act Amendments of 1965 as well as the influx of refugees from conflicts occurring in Southeast Asia such as the Vietnam War. Asian American immigrants have a significant percentage of individuals who have already achieved professional status, a first among immigration groups.\nThe number of Asian immigrants",
"significantly, and that this trend is \"irreversible. ... It is something that we think will be permanent.” Illegal entry The Pew Hispanic Center estimated that 6–7 million immigrants came to the United States via illegal entry (the rest entering via legal visas allowing a limited stay, but then not leaving when their visa period ended). There are an estimated half million illegal entries into the United States each year. Illegal border crossings have declined considerably from 2000, when 71,000–220,000 migrants were apprehended each month, to 2018 when 20,000–40,000 migrants were apprehended.\nA common means of border crossing is to hire people",
"previous year. NPR stated that immigrants may be less likely to attempt to enter the U.S. illegally because of President Trump's stance on illegal immigration. The majority of illegal immigrants come from Mexico. Studies have shown that 40 million foreign born residents live in the US. 11.7 million of that population is illegal. During the 1950s, there were 45,000 documented immigrants from Central America. In the 1960s, this number more than doubled to 100,000. In the decade after, it increased to 134,000. In September 2019, Mexican foreign minister Marcelo Ebrard stated that immigration to the U.S. through Mexico has decreased",
"limit of 675,000 permanent immigrants each year; this limit does not apply to spouses, unmarried minor children or parents of U.S. citizens. Outside of this number for permanent immigrants, 480,000 visas are allotted for those under the family-preference rules and 140,000 are allocated for employment-related preferences. The current system and low number of visas available make it difficult for low-skilled workers to legally and permanently enter the country to work, so illegal entry becomes the way immigrants respond to the lure of jobs with higher wages than what they would be able to find in their current country. Family reunification",
"civilians and civilian groups guard the border. Detention About 31,000 people who are not American citizens are held in immigration detention on any given day, including children, in over 200 detention centers, jails, and prisons nationwide. The United States government held more than 300,000 people in immigration detention in 2007 while deciding whether to deport them. Deportation Deportations of immigrants, which are also referred to as removals, may be issued when immigrants are found to be in violation of US immigration laws. Deportations may be imposed on a person who is neither native-born nor a naturalized citizen of the United",
"show an estimated 870,000 Mexican nationals left Mexico to return to the U.S. It is hard to track of this because there is no official number of immigrants going to the United States or returning to Mexico every year. Characteristics Since about 2014, most illegal immigrants living in the U.S. have been long-term residents. In 2014, about two-thirds (66%) had been in the U.S. for ten years or more, while just 14% had been in the U.S. for less than five years.\nJust as the total population of illegal immigrants in the U.S. has declined since 2007, the proportion of illegal",
"to a study conducted by the Pew Research Center of the approximately 11 million immigrants unlawfully present in the United States, nearly 8 million of them are active in the labor force. Their representation by industry is pronounced, making up over half of the hired labor on farms and 9% of jobs in the service sector. The majority of these service sector jobs are in domestic help and fast food. Overall, unlawful immigrants make up approximately 5% of the American labor force.\nThe Hand That Feeds presents the issues surrounding the rights of unlawful immigrants and their impact on the American",
"Immigration Statistics (OIS) Annual Flow Reports on naturalization contain information obtained from naturalization applications on the number and characteristics of persons aged 18 years and older who became naturalized US citizens during a given fiscal year. Nonimmigrant Admissions Nonimmigrants are foreign nationals granted temporary admission into the United States. The major purposes for which nonimmigrant admission may be authorized include temporary visits for business or pleasure, academic or vocational study, temporary employment, or to act as a representative of a foreign government or international organization, among others.\nThe Office of Immigration Statistics (OIS) Annual Flow Reports on nonimmigrants contain information obtained",
"2011.\nFor those who enter the US illegally across the Mexico–United States border and elsewhere, migration is difficult, expensive and dangerous. Virtually all undocumented immigrants have no avenues for legal entry to the United States due to the restrictive legal limits on green cards, and lack of immigrant visas for low-skilled workers. Participants in debates on immigration in the early twenty-first century called for increasing enforcement of existing laws governing illegal immigration to the United States, building a barrier along some or all of the 2,000-mile (3,200 km) Mexico-U.S. border, or creating a new guest worker program. Through much of 2006 the",
"(at any time and from anywhere in the world) request these popular immigration benefits depending on whichever is more applicable or easiest to obtain.\nThose who were admitted as refugees under 8 U.S.C. § 1157(c) and later adjusted to that of LPRs inside the United States are statutorily protected from deportation for lifetime. These are families, including children, who escaped from genocides and have absolutely no safe country of permanent residence other than the United States. This legal finding is supported by latest precedents of all the U.S. courts of appeals and the BIA, which are binding on all immigration officials.\n\nThese"
] |
How did the N-word get to be so common in hip-hop culture, and why is it used so casually among certain black communities? | [
"The use of Nigga/Nigger by blacks to describe other blacks is not a hip-hop thing. It's been happening conversationally in black communities for over 100 years; it just seems more prevalent because white folks are listening to the music made by blacks, and black music has become increasingly vulgar in the past 25 years. \n\nAs for why they use the word, its common for a specific group to take on negative words used against them in an effort to empower themselves with a sense of pride. \n\nFor instance look at homosexuals who commonly call each other Fag or southern whites who call each other Rednecks. They can call each other that but when someone outside of their group says it they would still be offended. No difference.",
"When black people use the word they are \"owning\" it and taking it back from white people who used it to victimize them. White people can't use that word that way.\n\nBlack people share the same experience of being called \"niggers\" by whites so when they use it amongst themselves it is an in-group thing based on shared experience. The meaning and weight of the word changes when a black person uses it. It can mean \"you're my mate\" or it can mean \"that guy is a deadbeat loser\". The important thing is that it a word no longer used against them but by them. White people can't use the word that way.\n\nWhite people should not say the word because it was historically used by white people against black people who were slaves, against black people who were lynched, against black people who could't share schools, drinking fountains or lunch counters. It is a word drenched in white racism.\n\nPeople need to understand that we live in an unequal society with an unjust past that affects the present. There are gradations of power, social hierarchy, money and privilege in our society. And that just because white people at the top can't say \"nigger\" doesn't mean they are being discriminated against or living some kind of hardship. All it means is that white people can't use a white racist slur any more and it is none of our fucking business if black people decide to adopt it as slang and use it as they like.",
"Sometimes groups take words back as a way to redefine their meaning. This happened with Indigenous Australian artists and the word black. In the late 80s a group of artist (Boomalli artists I think) reclaimed it and started spelling it Blak as a symbol of empowerment. I assume the same thing happened with the n word. In the suburb I grew up in the same thing happened with the word Wog in reference to the Italian community.",
"[Tyler, the Creator](_URL_0_) (rapper) explains, why he uses words like \"faggot\" and \"nigga\", although he has gay friends and is black.\n\nTL,DW: It's just a word, that you can take the power out of."
] | [
"used in British English since the 16th century. It was part of the African American dialect of English in the 1960s meaning \"to converse\", and very soon after that in its present usage as a term denoting the musical style. Today, the term rap is so closely associated with hip-hop music that many writers use the terms interchangeably. Proto-rap Art forms such as spoken word jazz poetry and comedy records had an influence on the first rappers. Coke La Rock, often credited as hip-hop's first MC cites the Last Poets among his influences, as well as comedians such as Wild",
"by the African American style of \"capping,\" a performance where men tried to outdo each other in originality of their language and tried to gain the favor of the listeners. The basic elements of hip hop—boasting raps, rival \"posses\" (groups), uptown \"throw-downs,\" and political and social commentary—were all long present in African American music. MCing and rapping performers moved back and forth between the predominance of toasting songs packed with a mix of boasting, 'slackness' and sexual innuendo and a more topical, political, socially conscious style. The role of the MC originally was as a Master of Ceremonies for a",
"to appeal to contemporary hippies, and is known as the 'original hippie'. The form hippie is attested in print as jazz slang in 1952, but is agreed in later sources to have been in use from the 1940s. Reminiscing about late 1940s Harlem in his 1964 autobiography, Malcolm X referred to the word hippy as a term that African Americans used to describe a specific type of white man who \"acted more Negro than Negroes\".\nIn Greenwich Village, New York City by the end of the 1950s, young counterculture advocates were widely called hips because they were considered \"in the know\"",
"signed to Sugar Hill Records, the first all female group to release a rap record, Funk You Up.\nThe roots of rapping are found in African-American music and ultimately African music, particularly that of the griots of West African culture. The African-American traditions of signifyin', the dozens, and jazz poetry all influence hip hop music, as well as the call and response patterns of African and African-American religious ceremonies. Early popular radio disc jockeys of the Black-appeal radio period broke into broadcast announcing by using these techniques under the jive talk of the post WWII swing era in the late 40's",
"community. Lyrics that openly use derogatory words such as \"fag\" or \"dyke\" have saturated the market, even being found in conscious rap, considered the most progressive section of hip hop. Marc Lamont Hill argues, \"the progressive agendas of political rap artists such as Public Enemy, X-Clan, Paris, and Sista Souljah were strongly informed by radical Afrocentric, Black Islamic, and crude Black Nationalist ideologies that were openly hostile to queer identities\".\nArtist Jay-Z's verse (#3) on \"Can I get open\" by Original Flavor is considered an example of a well known homophobic slur in Hip Hop.\nThe genre has been considered a predominantly",
"in their 1980 song \"Holiday in Cambodia\" in the line, Bragging that you know how the niggers feel cold and the slum's got so much soul. The context is a section mocking champagne socialists. Rap groups such as N.W.A (Niggaz with Attitudes) re-popularized the usage in their songs. One of the earliest uses of the word in hip hop was in the song \"New York New York\" by Grandmaster Flash and the Furious Five in 1983. Responding to accusations of racism after referring to \"niggers\" in the lyrics of the 1988 Guns N' Roses song, \"One in a Million\", Axl",
"queer communities as a way to escape discrimination and \"dissolve of restrictions on black/gay people\". Black rock music combined with political voices against the Vietnam War, most notably seen in Jimi Hendrix and his song \"Machine Gun\". \nHip Hop rose to popularity in the 1980s and was born in urban, predominantly African American and Latino communities that had high rates of unemployment, crime, and poverty. Rap and Hip Hop became the tools of expression for black male ghetto youth, a group that was once largely invisible to mainstream society, giving them a platform to use confrontational and political poetics to",
"later, in inner-city neighborhoods plagued by high illiteracy and dropout rates, music remains the most dependable medium of expression. Hip Hop is thus to modern day as Negro Spirituals are to the plantations of the old South: the emergent music articulates the terrors of one's environment better than written, or spoken word, thereby forging an \"unquestioned association of oppression with creativity [that] is endemic\" to African American culture\".\nAs a result, lyrics of rap songs have often been treated as \"confessions\" to a number of violent crimes in the United States. It is also considered to be the duty of rappers",
"to the modern rap is the West African griot tradition, in which \"oral historians\", or \"praise-singers\", would disseminate oral traditions and genealogies, or use their formidable rhetorical techniques for gossip or to \"praise or critique individuals.\" Griot traditions connect to rap along a lineage of Black verbal reverence that goes back to ancient Egyptian practices, through James Brown interacting with the crowd and the band between songs, to Muhammad Ali's quick-witted verbal taunts and the palpitating poems of the Last Poets. Therefore, rap lyrics and music are part of the \"Black rhetorical continuum\", and aim to reuse elements of past",
"African American jive slang and meant \"sophisticated; currently fashionable; fully up-to-date\". The Beats adopted the term hip, and early hippies inherited the language and countercultural values of the Beat Generation. Hippies created their own communities, listened to psychedelic music, embraced the sexual revolution, and many used drugs such as marijuana and LSD to explore altered states of consciousness.\nIn 1967, the Human Be-In in Golden Gate Park, San Francisco, and Monterey Pop Festival\npopularized hippie culture, leading to the Summer of Love on the West Coast of the United States, and the 1969 Woodstock Festival on the East Coast. Hippies in Mexico,",
"done without accompaniment. It can be broken down into different components, such as \"content\", \"flow\" (rhythm and rhyme), and \"delivery\". Rapping is distinct from spoken word poetry in that it is performed in time to the beat of the music. The use of the word \"rap\" to describe quick and slangy speech or witty repartee long predates the musical form. MCing is a form of expression that is embedded within ancient African and Indigenous culture and oral tradition as throughout history verbal acrobatics or jousting involving rhymes were common within the Afro-American and Latino-American community. Graffiti Graffiti is the most",
"of the civil rights movement have used hip hop culture in the 1980s and 1990s to show the limitations of the movement.\" Hip hop gave young African Americans a voice to let their issues be heard; \"Like rock-and-roll, hip hop is vigorously opposed by conservatives because it romanticizes violence, law-breaking, and gangs\". It also gave people a chance for financial gain by \"reducing the rest of the world to consumers of its social concerns.\"\nIn late 1979, Debbie Harry of Blondie took Nile Rodgers of Chic to such an event, as the main backing track used was the break from Chic's",
"South Africa, particularly amongst colored people, who began to identify with an American construct of Blackness, as well as strong parallels between the hardship experienced in the many poor neighborhoods of South Africa and the ghettos of New York out of which American hip hop grew. Local flavors and additives gradually started dominating the local take on hip hop, and so kwaito started taking shape. The development of the genre and other local sounds was given an enormous boost with one of the ANC's first legislative acts to dramatically increase the amount of private radio stations in South Africa and",
"used the word \"RAP,\" an African-American English word for \"talk\" or \"discussion.\" (It would be several decades before \"rap\" began referring to a musical style.) An advertisement in the 1957 edition of Broadcasting Yearbook, using the descriptions of the era, said \"Survey figures show the most Negroes in the Norfolk area listen most to WRAP.\" It added that WRAP, at 850 kilocycles, was \"the only all-Negro station in Norfolk.\" For more on the history of the station, see WRAP (Norfolk).\nIn 1987, WRAP was acquired by local cable TV company Clinton Cablevision (later Sinclair Telecable). The new",
"from one cultures, shaped hip-hop to represent the voice of the people of the streets, and eventually helped hip-hop spread across America, \"At its most elemental level hip hop is a product of post—civil rights era America, a set of cultural forms originally nurtured by African American youth in and around New York in the ’70s\"(Nelson George, vii).\nMost Hip-Hop is used to make change for the better in a world of political and social inequality and discrimination. Even though many believe the black communities started hip-hop it was actually commenced by the youth who needed to express their feelings and",
"Big Daddy Kane, Biz Markie, Slick Rick, The Beastie Boys, Salt-n-Pepa, and others. In the early 1990s hip hop functioned to give the black community a voice in the public sphere, and had spread from New York to across the country in the East Coast as well as worldwide. Hip hop gained appeal among African-Americans because of the \"authentic\" nature of the lyrical content. It transitioned into gangsta rap in the 1990s, which involved rapping about drugs, violence, and other issues faced by black communities. Emergence of the West Coast Hip hop had a presence on the West Coast from",
"rappers would sample popular American rap beats, simply inserting Swahili rhymes in place of English. This infant Bongo Flava style and imported American hip hop was initially embraced almost exclusively by young upper class individuals who found it fashionable to follow US trends. This was often viewed as Tanzanians simply appropriating American culture and style, relating this to the idea of Americanization. In the early 1990s, as the genre was developing, the 'Kiswacentric' concept was born. Artists began to \"localize\" the music by addressing purely Tanzanian issues and eventually using the Swahili language, which in itself is a language",
"a carbon copy of earlier American work.\nLike much of the hip hop from the United States, many French hip hop artists use the genre to address pressing social issues. The authors of \"Arab Noise and Ramadan Nights: Rai, Rap, and Franco-Maghrebi Identity\" state that French rappers rap about \"the history of slavery, humanity's origins in Africa, Europe's destruction of African civilizations and the independence struggle led by the Front De Liberation Nationale.\" The components of their music are mostly influenced by the American rappers, but they also have their own style such as having their culture's tune in the beat.",
"from people. Hip-Hop has been put out there originating from African Americans rapping about how they were oppressed, or how they have been segregated for too long. Filipino Americans also used this as an outlet to talk about their issues with society. In the book \"Writer in Exile/Writer in Revolt: Critical Perspectives on Carlos Bulosan\" Viola talks about how Hip-Hop in general talks about the movements that has been made, it replicates the feelings that people had, how strongly they felt about what mattered to them the most. Hip-Hop is this form of expression that put what people wanted to",
"street salutation 'one' (similar to 'peace') used around Nas's neighborhood.\" In a 1994 article on the distinct styles of East Coast and West Coast hip hop, music journalist Touré referred to \"One Love\" as an example of the thematic differences between the two regional scenes, stating:\nThe more ambitious themes of New Yorkers' rhymes over those of their L.A. counterparts can be traced to the original intention of hip-hop in each city: Many L.A. rappers embraced the drug culture, while those in New York tended to use hip-hop as an avenue of escape from it ... In 'One Love', Nas echoes",
"How to Speak Hip Context An interest with hipster slang had been present in the mainstream culture since the late-30s/1940s when jazz music became a popular form. Cab Calloway released a recording of a song called the \"Hepsters Dictionary\" in 1938 (along with a published booklet). In the film Song of the Thin Man from 1947 the \"straight\" Nick and Nora have trouble following the jargon of the jazz musicians in the story. \nDuring the 1950s, as people became conscious of the Beat Generation phenomena, amid fears of juvenile delinquency, there was an increased urgency to understand the",
"hop was really created. Elements of hip hop have always been around. When the media first noticed hip hop, they learned that it came from the streets of New York. The public's perception of hip-hop is that it is an African American attribute because it was a new form of art for African American.\nWhat many do not know is that the majority of the people who were influenced and later contributed to hip hop were Latinos. Puerto Ricans are MCs’, break dancers like the Rock Steady Crew, and Graffiti artists (Sal Rojas, Brown Pride).\nThe youth in the streets, who came",
"deliberate misspelling of the word \"ghetto\". For its first two albums, Making Trouble (1988) and Grip It! On That Other Level (1989), the spelling was the English standard \"Ghetto Boys\". For their third album, The Geto Boys, they changed it to the \"Geto\" spelling, which the group has used since. The Geto Boys' lyrics push gangsta rap themes to extremes, and sometimes focus on murder, explicit sex, and violence. The group is credited for putting Southern hip hop on the hip hop music map and inspired a legion of acts, including 2Pac Eminem, UGK, T.I., Goodie Mob, Outkast, 50 Cent,",
"Americans in the 1970s which consists of a stylized rhythmic music that commonly accompanies rapping, a rhythmic and rhyming speech that is chanted. It developed as part of hip hop culture, a subculture defined by four key stylistic elements: MCing/rapping, DJing/scratching with turntables, break dancing, and graffiti writing. Other elements include sampling beats or bass lines from records (or synthesized beats and sounds), and rhythmic beatboxing. Traditional African music The traditional music of Africa, given the vastness of the continent, is historically ancient, rich and diverse, with different regions and nations of Africa having many distinct musical traditions.\nTraditional music",
"the words \"hip/hop/hip/hop\" in a way that mimicked the rhythmic cadence of the U.S. Army marching drill. He then worked the \"hip hop\" cadence into part of his performance. This led to the term \"hip hoppers\" being used derogatorily by the culture's early detractors, most of whom were from the disco set, to label the music used. This evolved into the term \"Hip Hop\" and was later adopted by the industry.\n\nMelle Mel and The Kidd Creole were the first rappers to call themselves \"MCs\" (Masters of Ceremonies). The 3 emcees worked with Flash, who went on to bring in Mr.",
"scene, authenticity or street cred is important. The word wigger is the specific used to refer to caucasian people mimicking black hip-hop culture. Larry Nager of The Cincinnati Enquirer wrote that rapper 50 Cent has \"earned the right to use the trappings of gangsta rap – the macho posturing, the guns, the drugs, the big cars and magnums of champagne. He's not a poseur pretending to be a gangsta; he's the real thing.\"\nA This Are Music review of white rapper Rob Aston criticizes his \"fake-gangsta posturing\", calling him \"a poseur faux-thug cross-bred with a junk punk\" who glorifies \"guns, bling,",
"of African American genres such as rap and hip hop into their music and utilize lines rapped entirely in Korean, which was uncommon at that time. While each song differs in genre, a key characteristic is a prominently distinct and simple melody which is accompanied by a minimalistic piano, guitar or percussion-based groove. Their overall style has been described as a mixture of \"belting styles\" with \"gentle rap, candid lyrics and plain vocal narration\". Their ability to seamlessly transition between rap and R&B is apparent in their hit songs, most of which are classified as R&B ballads or pop but",
"Bronx neighborhoods in the 1970s. Some music critics, scholars and political commentators have denied hip hop's authenticity. Advocates who claim hip hop is an authentic music genre state that it is an ongoing response to the violence and discrimination experienced by black people in the United States, from the slavery that existed into the 19th century, to the lynchings of the 20th century and the ongoing racial discrimination faced by blacks.\nPaul Gilroy and Alexander Weheliye state that unlike disco, jazz, R&B, house music, and other genres that were developed in the African-American community and which were quickly adopted and then",
"expanding the word's earlier meaning in the African-American community—\"to discuss or debate informally.\"\nThe early rapping of hip-hop developed out of DJ and Master of Ceremonies' announcements made over the microphone at parties, and later into more complex raps. Grandmaster Caz states: \"The microphone was just used for making announcements, like when the next party was gonna be, or people's moms would come to the party looking for them, and you have to announce it on the mic. Different DJs started embellishing what they were saying. I would make an announcement this way, and somebody would hear that and they add",
"African hip hop Hip hop music has been popular in Africa since the early 1980s due to widespread American influence. In 1985 hip hop reached Senegal, a French-speaking country in West Africa. Some of the first Senegalese rappers were M.C. Lida, M.C. Solaar, and Positive Black Soul, hip pop music came from chicago \nThere also have been groups in Tanzania and other countries that emceed before 1989, that knows as Kwanza Unit although it is not very well known. During the late 1980s to early 1990s, rap started to escalate all over Africa. Each region had a new type of"
] |
How do companies that sell domains create them, If I decided I wanted to do there job how would I do it? | [
"A group called ICANN (the Internet Corporation for Assigned Names and Numbers) maintains servers all over the globe that tell computers where to look for a .com domain, or a .de domain, or a .us domain, or a .mil domain. Each of those top-level domains has a different *registrar*. The registrar is the organization in control of all the domains under that top-level domain, or TLD. I believe VeriSign controls .com and .net, so when you visit _URL_1_ or _URL_0_, your request (if we ignore all the caching and higher-level things in place) goes through ICANN's \"root servers\" to VeriSign's servers down to a high-level registrar like GoDaddy or NameCheap's servers, and this is where the actual information for the domain is stored - what IP to access for this domain, e-mail information, etc.\n\nICANN rarely adds new gTLDs (generic TLDs like .com, .net, .gov). Your best bet is to found an independent country, wait for international recognition, and then apply for a ccTLD, or country-code TLD, like .us, .me, .tk, or .es. ICANN has actually been looking at proprietary TLDs for awhile now, I am not sure what the application process is like but I'm sure it's not cheap. In the near future you might see TLDs like .apple, .fb, .goog, .nikon, .twttr, and .tumblr floating around.\n\nOf course, you could just apply to VeriSign and ask their permission to sell .com and .net domains. I believe the application fee is $2000, and you pay VeriSign a large portion of every domain fee collected. ICANN takes a smaller cut from each sale, a fraction of a dollar if I recall. Then you just need to get licensing for all of the over 100 gTLDs and ccTLDs out there, and you're 10% of the way to becoming a successful high-level registrar. :)\n\nMost new high-level registrars actually *resell* their domains from a company named eNom. NameCheap started out like this, I believe they are independent now however. Because eNom already has certification for most of the world's TLDs, you can sell their domains under your own name, for a fee of course. So the flow of money goes from the consumer - > you - > eNom, or other reseller - > VeriSign, or other TLD registrar - > ICANN, with everybody taking a cut of the pie along the way.\n\nSome TLDs out there offer free registration under them. I believe that the island of Tokelau (.tk) used to do (still does?) this, and there's an initiative to create a .free domain for, namely, free domains. I'm not sure what Tokelau's incentive is for doing this, I believe that they make significant amounts of ad revenue by parking ads on domains. dot.free is an initiative for Internet equality, but if ICANN's disturbing thirst for profit is any indication of what's to come, they probably will not succeed.\n\nTL:DR; Venture capital.\n\nI haven't been in the domain business for a few years and I'm sure that things have changed a lot. I will do my best to answer any questions you have, although I've never been especially talented at talking to children.",
"From my understanding of domains, domain registration companies like Go daddy technically don't create a website domain for you. You submit a domain name, and if someone else isn't using it, they license that domain to you for a certain amount of time, then when that period runs out, it either expires, or you pay to renew it. So if someone has a domain that you want, you can buy it directly from them, or if they are not using it, just wait until it expires, then register it for yourself.",
"Technically the companies that you are \"buying\" the domain name from are not selling it to you. You are paying them to register the name for you with a governing body. These companies; like godaddy, name cheap, whatever are accredited by either the generic top-level domain registry (gTLD) or a county code top-level domain registry (ccTLD). If you wanted to get in on this, you'd have to get accredited by one or both of these agencies."
] | [
"the company grows and is sold, the media companies receive cash for their shares.\nDomain name registrants (usually those who register and renew domains as an investment) sometimes \"park\" their domains and allow advertising companies to place ads on their sites in return for per-click payments. These ads are typically driven by pay per click search engines like Google or Yahoo, but ads can sometimes be placed directly on targeted domain names through a domain lease or by making contact with the registrant of a domain name that describes a product. Domain name registrants are generally easy to identify through WHOIS",
"the original owner before s/he can renew it. This practice is often used to extort large amounts of money from legitimate domain name holders who rely on their domain names to remain in business. Basic uses and purposes of Domain Names In order for the exchange of information to be organized and searchable on the World Wide Web domain names are used. Domain names are substitutes for IP addresses, which are presented numerically, in order to further simplify the process of searching for information on the Internet. Domain name servers maintain the list that matches domain names to IP",
"completing provided offers and referring other people and frequently use an [Affiliate marketing|affiliate] model. These sites are typically sponsored by companies in order to advertise their products. The sites are in turn paid for advertising and attracting new clients. By collecting user data that the user submits, companies can target certain areas of clientele and offer products accordingly.\nIn most cases, incentive sites grant rewards for completing requirements. This usually requires viewing advertisements, signing up for a site, entering a PIN code (through a mobile device), purchasing trial products or full products or completing surveys. This in turn rewards the specified",
"Web developer Nature of employment Web developers are found working in various types of organizations, including large corporations and governments, small and medium-sized companies, or alone as freelancers. Some web developers work for one organization as a permanent full-time employee, while others may work as independent consultants, or as contractors for an agency or at home personal use. Web developers typically handle both server-side and front-end logic. This usually involves implementing all the visual elements that users see and use in the web applications or use, as well as all the web services that are necessary to power the usage",
"networking site uses in the local area and advertise specials and deals. These can be exclusive and in the form of \"get a free drink with a copy of this tweet\". This type of message encourages other locals to follow the business on the sites in order to obtain the promotional deal. In the process, the business is getting seen and promoting itself (brand visibility).\nSmall businesses also use social networking sites to develop their own market research on new products and services. By encouraging their customers to give feedback on new product ideas, businesses can gain valuable insights on",
"however, most of them failed to receive wide recognition, and thus domain names offered by those alternative roots cannot be used universally on most other internet-connecting machines without additional dedicated configurations. Business models Domain names are often seen in analogy to real estate in that domain names are foundations on which a website can be built, and the highest quality domain names, like sought-after real estate, tend to carry significant value, usually due to their online brand-building potential, use in advertising, search engine optimization, and many other criteria.\nA few companies have offered low-cost, below-cost or even free domain registration with",
"names, and the organization had a goal of trying to expand new top-level domain names. As new domain names are created, ICANN hopes for many overseers to sell their name to registrars. According to ICANN, the front-runner for a new domain name is \".shop\" and the goal is to increase supply and demand for domain names. A landrush period will occur over the creation of new domain names because as the new domain names are created, overseers will sell their domain names, which will cause businesses and individuals to rush to buy new names. This increase in demand causes a",
"sites are created to make money by using advertising programs. In such case, they are called Made for AdSense sites or MFA. This derogatory term refers to websites that have no redeeming value except to lure visitors to the website for the sole purpose of clicking on advertisements.\nMade for AdSense sites are considered search engine spam that dilute the search results with less-than-satisfactory search results. The scraped content is redundant to that which would be shown by the search engine under normal circumstances, had no MFA website been found in the listings.\nSome scraper sites link to other sites to improve",
".jobs Intended use The intended use of the domain jobs is for companies and organizations to register some version of their corporate names and use it for a site aimed at those seeking employment with that company, or, .jobs can target a specific market. For example, manufacturing.jobs could represent employment for a specific corporation, or market sector.\nIn 2010, Employ Media LLC applied to ICANN to extend the charter under which Employ Media is authorized to sell the .jobs domains. If accepted, Employ Media plans to create hundreds of thousands and perhaps a million new, niche job boards and sell domains",
"Domain name registry Operation Some name registries are government departments (e.g., the registry for India gov.in). Some are co-operatives of Internet service providers (such as DENIC) or not-for profit companies (such as Nominet UK). Others operate as commercial organizations, such as the US registry (nic.us).\nThe allocated and assigned domain names are made available by registries by use of the WHOIS system and via their domain name servers.\nSome registries sell the names directly, and others rely on separate entities to sell them. For example, names in the .com top-level domains are in some sense sold \"wholesale\" at a regulated price by",
"make it possible for webmasters to run webrings without being dependent on an off-site service. Ringlink, SimpleRing, PHP-Ring and Ringmaker are some examples.",
"first elected board members to oversee the growth of the UK domain name industry. Pre-Nominet domain names Moving domains to the newly formed company registrants of existing domains were invited to agree to Nominet's new terms and conditions. There were several complaints from pre-Nominet domain owners objecting to the need to start paying for something that was previously free.\nMany pre-Nominet domain names had little or no contact information, as a result it has been hard to work out ownership of the domain names. Nominet are running an internal project (the PreNom project) to clear out the remaining pre Nominet domain",
"address to and from its domain name.\nDomain names are used to establish a unique identity. Organizations can choose a domain name that corresponds to their name, helping Internet users to reach them easily.\nA generic domain is a name that defines a general category, rather than a specific or personal instance, for example, the name of an industry, rather than a company name. Some examples of generic names are books.com, music.com, and travel.info. Companies have created brands based on generic names, and such generic domain names may be valuable \nDomain names are often simply referred to as domains and domain name",
".shop History The idea of a .shop generic top-level domain was around since at least 1999, when an attempt to register it with IAHC was made. Its proposed usage is similar to current endeavors: to provide a dedicated space for ecommerce on the Internet. In 2000, Commercial Connect, LLC requested to operate a .shop registry from ICANN .\nCommercial Connect's application from 2000 was well-received, but other domains were prioritized. Japan's GMO Registry also expressed interest in the top level domain name space in late 2009, though Commercial Connect was the most vested candidate that had taken prior steps towards attaining",
"in the company to exchange ideas, enhance each other's ideas and have the best ideas be automatically promoted (and you need an automated promotion mechanism in the software because the problem isn't that you won't get enough ideas, the problem is you'll get too many and you don't want someone to have to manually filter through them all).",
"such as Chicago.jobs to third parties. The International Association of Employment Web Sites and dozens of other employment services organizations have objected.\nIt has been suggested that subdomains of other domains, such as jobs.example.com, can be used without any new registrations on the part of the companies involved. However, there is no general consensus among companies or industry sectors for any such naming scheme, like there is for the www prefix and other prefixes, so the proponents of .jobs argue the domain can gain a market presence by allowing recruiters to communicate a simple, direct URL destination of employment opportunities",
"is one which they would consider investing in. Each Dragon ultimately will either make an offer to invest or will declare that they are \"out\", meaning they are not interested in the business. Once all five Dragons are \"out\", the pitch ends.\nWhile some entrepreneurs are made offers of exactly what they are seeking, most of the offers the Dragons make either seek a greater percentage of the business (equity) or seek a royalty on the sales of the business (this has become more prevalent in later seasons). The entrepreneurs and Dragons may then engage in negotiations until the available offers",
"was interested in that name would surf through and see it listed for sale. With the development of the domain auction, multiple users can list multiple domains all in the same place, thereby exposing them to a greater number of potential buyers. Sites such as eBay and Sedo have made using auctions very commonplace, and domain auction sites also require little to no technical knowledge to use.\nIn the past, if a domain name was already registered by another party, it was generally advisable to choose a different name. Whether current owners list domains for auction for a specified period",
"generated customized websites for virtually every town and city in the U.S. to enable local businesses to learn to improve the information that shows up on Google search, Google maps and Google+.\" It has been described as a community-based organization aimed at helping small businesses succeed on the Web by bringing community members, business owners, and local business leaders together. USA Today described the program as an \"aggressive new program to help small businesses get found online.\" The program includes access to additional online resources including mentoring and workshops. Local chambers of commerce have worked with Google in a partnering",
"like AdSense for content, Google matches advertisements to the content of a website — in this case, a mobile website. Instead of traditional JavaScript code, technologies such as Java and Objective-C are used. As of February 2012, AdSense for Mobile Content was rolled into the core AdSense for Content offering to better reflect the lessening separation between desktop and mobile content. Domains AdSense for domains allows advertisements to be placed on domain names that have not been developed. This offers domain name owners a way to monetize (make money from) domain names that are otherwise dormant or not in use.",
"VeriSign, and individual domain name registrars sell names \"retail\" to businesses and consumers. Allocation policies Historically, domain name registries operated on a first-come-first-served system of allocation but may reject the allocation of specific domains on the basis of political, religious, historical, legal or cultural reasons.\nFor example, in the United States, between 1996 and 1998, InterNIC automatically rejected domain name applications based on a list of perceived obscenities.\nRegistries may also control matters of interest to their local communities; for example, the German, Japanese and Polish registries have introduced internationalized domain names to allow use of local non-ASCII characters. Dispute policies Domains",
"whilst .org.uk is for organisations, there are no restrictions on registering domains. While .me.uk originally had no restrictions on registrants it has since been tightened up to require registrants to be natural persons (i.e. not companies, etc.).\nHowever, registrants in .ltd.uk must be, and remain, private limited companies incorporated under the UK Companies Acts. In addition, names can only be registered if they correspond (in accordance with the algorithm in the rules of registration) with the exact company name, as recorded at the companies registry at Companies House. The same conditions apply for public limited companies which wish to use a",
"AppSumo Operations Initially, Sumo focused only on digital tools, such as SAAS apps that offered life time deals (LTD's). Today, the majority of deals offered are learning based products attempting to teach customers skills such as programming languages, project management, and hiring practices.\nAppSumo deals exclusively with digitally distributed goods. The deals include application software (apps), ebooks, learning courses, and other packages. Many of the site's deals are aimed towards productivity products and website tools, such as copywriting courses, email marketing, or project management apps. In 2015, AppSumo started a sister company called Sumo that sells marketing tools to",
"stated that a domain name in the contemporary era has evolved from a mere business address to a business identifier. Therefore, a domain name is not merely a portal for internet navigation, but also an instrument which distinguishes and identifies the goods or services of the business, while simultaneously providing the specific internet location. This feature of domain names in the modern era allows them to be likened to trade marks, and concomitantly to be included within the purview of the Trade Marks Act. Passing off The court delineated the elements of an action for passing off that Satyam Infoway",
"Search Engine Optimization experts use traffic generated to sell on to make a profit. They also claim having more visitors travelling from expired domains to a website can improve Search Engine Results Pages (SERPs) and Alexa rankings which both play an important role in Search Engine Marketing (SEM). Domain auction website A domain auction website provides the technology through which users can list or purchase multiple domains easily and conveniently. Domain parking, once the most efficient method for advertising a domain for sale, allowed a domain owner to post the availability of the domain on a page, hoping someone who",
"These online estate agents claim to give private property sellers the ability to market their property via the major property portals (the preferred medium used by traditional high street estate agents) for a fraction of the cost of the traditional estate agency. Online estate agents claim that they can advertise a property as effectively as traditional estate agents by using digital marketing techniques and centralising their back office operation to one location, rather than having physical offices in the town in which they are based. Online estate agents normally cover the whole of the UK, therefore claiming to be able",
"newspapers, magazines and websites. They offer reprint rights and grant permissions to other parties for republishing content of which they own/represent copyrights. Business syndicates A group formed of several business entities, like companies or corporations, which share common interests in a market but usually are not direct competitors. Larger companies or corporations form syndicates to strengthen their position in the market. Internet companies and corporations, focusing on various Internet ventures, tend to form syndicates within their own group, with direct competitors involved. In such cases, they share a certain type of market, like brand management or search engine optimization, and",
"placing pay-per-click ads on it. Domainers rely on type-in traffic, which is when Internet surfers type in the domain name rather than using a search engine. Domainers can make a lot of money by buying and selling domain names.\nSome domainers relied on domain tasting, which involves placing pay-per-click ads on the domain for five days (or less) to determine whether the ads will make more than the annual cost of the domain. If the domain is dropped within the five-day grace period, no fee is incurred. An industry has grown up out of this business with domainers taking part in",
"the platform easy to access without having to download any applications. The tools are simplified and easy to understand, using a simple drag-and-drop methodology for creating a website. The websites that are created are then hosted on a secured server using cloud technology that can be accessed from around the World. The company offer three different packages which provide different solutions and amount of storage space, depending on the size and functionality necessary to facilitate the customer's needs. The most basic membership is free, with the highest available subscription costing €23,99/Month. Making use of HTML5 and CSS3 the website and",
"to engage candidates. Execution of Talent Communities Talent communities can be executed in a variety of ways depending on a company's size and goals.\nFor the smallest of companies, a simple spreadsheet of interested candidates may be all that is needed. For larger companies, it makes sense to have a dedicated software vendor focused on talent communities such as Smashfly, Avature, Yello, Fuseology, or NextWave Hire.\nCompanies with internal engineering resources can also get creative by constructing their own solutions by using APIs like Twilio, Sendgrid, etc. as well as existing off the shelf marketing technologies like Marketo.\nThe best talent communities"
] |
How can metal and mirrors block WiFi signal? | [
"WiFi (and radio and microwaves and a lot of other things) are electromagnetic waves. They move through space by alternating electric fields and magnetic fields. One change makes the other change. Why does this work? It is because magnetic field flux likes to remain constant. If there are any changes in the magnetic field, these create changes in the electric field to counteract the changes in the electric field. These changes in the electric field cause the electric field to counteract the magnetic field. Back and forth.\n\nSo what is special about metal that disrupts this process?\n\nMetals are generally conductive. This means that they can move electric charges around easily. When electric charges build up in one spot, they like to disperse. It is like compressing a spring. Metals let that spring move more quickly and get back to its resting state in less time.\n\nSooooo....\n\nWhen WiFi hits metal, it moves the electrons away from their initial resting state but the electrons jump immediately back. These counteracting movements create counteracting electric and magnetic fields and cancels out the WiFi.",
"Wifi is just radio, which is long wavelengths of light. Mirrors and metal reflect not only visible light, but infrared and radio as well."
] | [
"the glass with metallic nanoparticles and dyes to cause the sunlight falling on the glass to diffuse sideways toward the edges where the silicon strips turn it into electricity. \nA mixture of dyes is used to capture and absorb a wide spectrum of available light. Having absorbed the sunlight, the fluorescent dyes then re-radiate it. Interaction with the metallic nanoparticles turns light into a form of electromagnetic radiation known as surface plasmons. The surface plasmons propagate over the glass surface and are intercepted by the silicon strips at the edges. The company would not reveal which metals are used in",
"polyimide cap protects the screen and helps reduce any impedance mismatch that might occur when the wave crosses from the air into the device. One-way transmission In 2015 visible light joined microwave and infrared NIMs in propagating light in only one direction. (\"mirrors\" instead reduce light transmission in the reverse direction, requiring low light levels behind the mirror to work.)\nThe material combined two optical nanostructures: a multi-layered block of alternating silver and glass sheets and metal grates. The silver-glass structure is a \"hyperbolic\" metamaterial, which treats light differently depending on which direction the waves are traveling. Each layer is tens",
"scattered light from each layer causes the mirror to reflect EUV light of the desired wavelength as would a normal metal mirror in visible light. Using multilayer optics it is possible to reflect up to 70% of incident EUV light (at a particular wavelength chosen when the mirror is constructed). Transparent conductive coatings Transparent conductive coatings are used in applications where it is important that the coating conduct electricity or dissipate static charge. Conductive coatings are used to protect the aperture from electromagnetic Interference, while dissipative coatings are used to prevent the build-up of static electricity. Transparent conductive coatings",
"metals, such as chromium, cobalt, nickel, and copper. The high reflectivity of some heavy metals is important in the construction of mirrors, including precision astronomical instruments. Headlight reflectors rely on the excellent reflectivity of a thin film of rhodium. Electronics, magnets, and lighting Heavy metals or their compounds can be found in electronic components, electrodes, and wiring and solar panels where they may be used as either conductors, semiconductors, or insulators. Molybdenum powder is used in circuit board inks. Ruthenium(IV) oxide coated titanium anodes are used for the industrial production of chlorine. Home electrical systems, for the most part, are",
"light, they require line of sight to operate the destination device. The signal can, however, be reflected by mirrors, just like any other light source. If operation is required where no line of sight is possible, for instance when controlling equipment in another room or installed in a cabinet, many brands of IR extenders are available for this on the market. Most of these have an IR receiver, picking up the IR signal and relaying it via radio waves to the remote part, which has an IR transmitter mimicking the original IR control. Infrared receivers also tend to have a",
"Metal-mesh optical filter Metal-mesh optical filters are optical filters made from stacks of metal meshes and dielectric. They are used as part of an optical path to filter the incoming light to allow frequencies of interest to pass while reflecting other frequencies of light.\nMetal-mesh filters have many applications for use in the far infrared (FIR) and submillimeter regions of the electromagnetic spectrum. These filters have been used in FIR and submillimeter astronomical instruments for over 4 decades, in which they serve two main purposes: bandpass or low-pass filters are cooled and used to lower the noise equivalent power of cryogenic",
"small particulates. It is sprayed on to the enclosure and, once dry, produces a continuous conductive layer of metal, which can be electrically connected to the chassis ground of the equipment, thus providing effective shielding.\nElectromagnetic shielding is the process of lowering the electromagnetic field in an area by barricading it with conductive or magnetic material. Copper is used for radio frequency (RF) shielding because it absorbs radio and electromagnetic waves. Properly designed and constructed copper RF shielding enclosures satisfy most RF shielding needs, from computer and electrical switching rooms to hospital CAT-scan and MRI facilities. Example applications One example",
"wavelength of light in the beam is periodically blocked, transmitted, blocked, transmitted, by the interferometer, due to wave interference. Different wavelengths are modulated at different rates, so that at each moment the beam coming out of the interferometer has a different spectrum.\nAs mentioned, computer processing is required to turn the raw data (light absorption for each mirror position) into the desired result (light absorption for each wavelength). The processing required turns out to be a common algorithm called the Fourier transform. The Fourier transform converts one domain (in this case displacement of the mirror in cm) into its inverse domain",
"filters are used to block visible light but pass infrared; they are used, for example, in infrared photography.\nInfrared cut-off filters are designed to block or reflect infrared wavelengths but pass visible light. Mid-infrared filters are often used as heat-absorbing filters in devices with bright incandescent light bulbs (such as slide and overhead projectors) to prevent unwanted heating due to infrared radiation. There are also filters which are used in solid state video cameras to block IR due to the high sensitivity of many camera sensors to unwanted near-infrared light. Ultraviolet Ultraviolet (UV) filters block ultraviolet radiation, but let visible light",
"holes to obtain the desired ratio of reflection to transmission. Later, metal was sputtered onto glass so as to form a discontinuous coating, or small areas of a continuous coating were removed by chemical or mechanical action to produce a very literally \"half-silvered\" surface.\nInstead of a metallic coating, a dichroic optical coating may be used. Depending on its characteristics, the ratio of reflection to transmission will vary as a function of the wavelength of the incident light. Dichroic mirrors are used in some ellipsoidal reflector spotlights to split off unwanted infrared (heat) radiation, and as output couplers in laser construction.\nA",
"interference pattern, but only if light from both arms have traveled the \"same\" optical distance (\"same\" meaning a difference of less than a coherence length). By scanning the mirror in the reference arm, a reflectivity profile of the sample can be obtained (this is time domain OCT). Areas of the sample that reflect back a lot of light will create greater interference than areas that don't. Any light that is outside the short coherence length will not interfere. This reflectivity profile, called an A-scan, contains information about the spatial dimensions and location of structures within the item of interest. A",
"corrosion and makes it more susceptible to abrasion. Adding a protective layer to the aluminum would reduce its reflectivity. Interference layer An interference layer may be located on the first surface of the glass substrate. It can be used to tailor the reflectance. It may also be designed for diffuse reflectance of near-ultraviolet radiation, in order to prevent it from passing through the glass substrate. This substantially enhances the overall reflection of near-ultraviolet radiation from the mirror. The interference layer may be made of several materials, depending on the desired refractive index, such as titanium dioxide.",
"visible light are all electromagnetic radiation; they differ only in frequency. So other things equal, a microwave circuit shrunk down by a factor of 100,000 will behave the same way but at 100,000 times higher frequency.\n This effect is somewhat analogous to a lightning rod, where the field concentrates at the tip. \nIt is fundamentally based on the fact that the permittivity of the metal is very large and negative. At very high frequencies (near and above the plasma frequency, usually ultraviolet), the permittivity of a metal is not so large, and the metal stops being useful for concentrating fields.\nFor",
"has picometer resolution in the vertical plane above the waveguide surface. Plasmons and metal optics Metals are an effective way to confine light to far below the wavelength. This was originally used in radio and microwave engineering, where metal antennas and waveguides may be hundreds of times smaller than the free-space wavelength. For a similar reason, visible light can be confined to the nano-scale via nano-sized metal structures, such as nano-sized structures, tips, gaps, etc. Many nano-optics designs look like common microwave or radiowave circuits, but shrunk down by a factor of 100,000 or more. After all, radiowaves, microwaves, and",
"the light (in a narrow range of wavelengths) which is incident on the mirror. Such mirrors are often used in lasers.\nIn astronomy, adaptive optics is a technique to measure variable image distortions and adapt a deformable mirror accordingly on a timescale of milliseconds, to compensate for the distortions.\nAlthough most mirrors are designed to reflect visible light, surfaces reflecting other forms of electromagnetic radiation are also called \"mirrors\". The mirrors for other ranges of electromagnetic waves are used in\noptics and astronomy. Mirrors for radio waves (sometimes known as reflectors) are important elements of radio telescopes. Military applications It has been said",
"the transmission properties of these meshes quite well as long as the wavelength of light is larger than the size of the metallic element (). Electromagnetic theory Electromagnetic theory of light can be used to describe how light incident on both capacitive and inductive metallic meshes will behave in transmission, reflection, and absorption. Transmission and reflection If an incident plane wave of electromagnetic radiation hits a metallic grid of either type perpendicular to its path it will scatter, and the only propagating parts will be the zeroth order reflected wave and the zeroth order transmitted wave. The frequency of both",
"of wavelengths. Such mirrors are often used as beamsplitters, and as output couplers in lasers. Alternatively, the coating can be designed such that the mirror reflects light only in a narrow band of wavelengths, producing an optical filter.\nThe versatility of dielectric coatings leads to their use in many scientific optical instruments (such as lasers, optical microscopes, refracting telescopes, and interferometers) as well as consumer devices such as binoculars, spectacles, and photographic lenses.\nDielectric layers are sometimes applied over top of metal films, either to provide a protective layer (as in silicon dioxide over aluminium), or to enhance the reflectivity of the",
"through the glass substrate to the lower layers of the mirror, possibly with some refraction, depending on the angle of incidence as light enters the mirror.\nMetal substrates (\"Metal Mirror Reflectors\") may also be used in solar reflectors. NASA Glenn Research Center, for example, used a mirror comprising a reflective aluminum surface on a metallic honeycomb as a prototype reflector unit for a proposed power system for the International Space Station. One technology uses aluminum composite reflector panels, achieving over 93% reflectivity and coated with a speciality coating for surface protection. Metal reflectors offer some advantages over",
"one in which the transmitted radiation must reflect off the object in order to reach the receiver. In this mode, an object is detected when the receiver sees the transmitted source rather than when it fails to see it. As in retro-reflective sensors, diffuse sensor emitters and receivers are located in the same housing. But the target acts as the reflector, so that detection of light is reflected off the disturbance object. The emitter sends out a beam of light (most often a pulsed infrared, visible red, or laser) that diffuses in all directions, filling a detection area. The",
"and scatter light across the surface and through the material. Nanoparticle cells A common design is to deposit metal nano-particles on the top surface of the surface of the solar cell. When light hits these metal nano-particles at their surface plasmon resonance, the light is scattered in many different directions. This allows light to travel along the solar cell and bounce between the substrate and the nano-particles enabling the solar cell to absorb more light. The concentrated near field intensity induced by localized surface plasmon of the metal nanoparticles will promote the optical absorption of semiconductors. Recently, the",
"The beam is modified for each new data point by moving one of the mirrors; this changes the set of wavelengths that can pass through.\nAs mentioned, computer processing is required to turn the raw data (light intensity for each mirror position) into the desired result (light intensity for each wavelength). The processing required turns out to be a common algorithm called the Fourier transform (hence the name, \"Fourier-transform spectroscopy\"). The raw data is sometimes called an \"interferogram\". Because of the existing computer equipment requirements, and the ability of light to analyze very small amounts of substance, it is often beneficial",
"a special light sensitive receiver. The signal can be broadcast to a whole room through speakers or a person who wears an individual receiver. There must be a clear line of connection between the transmitter and receiver so that the light signal is not interrupted. The benefit of infrared systems is that they only work in the room where the transmitter and receiver are located resulting in significantly fewer issues with cross-over. These systems can be sensitive to external light sources or interfering objects. Induction Loop Induction loop systems utilize electromagnetic energy to transmit the signal. These systems can cover",
"buried. Light-emitting diodes In radio receivers, crystal detectors were often forward-biased with DC current from a battery to make them more sensitive rectifiers. In the course of investigating biased junctions as a technician at Nizhny Novgorod, Losev noticed that when direct current was passed through a silicon carbide (carborundum) point contact junction, a spot of greenish light was given off at the contact point. Losev had constructed a light-emitting diode (LED). Although this effect had been noticed in 1907 by British Marconi engineer Henry Joseph Round, he had just published a brief two paragraph note on",
"visible light with wavelengths shorter than 600 nm (yellow). Silver is expensive, soft, and quickly tarnishes, but has the highest reflectivity in the visual to near-infrared of any metal. Silver can reflect up to 98 or 99% of light to wavelengths as long as 2000 nm, but loses nearly all reflectivity at wavelengths shorter than 350 nm. Dielectric mirrors can reflect greater than 99.99% of light, but only for a narrow range of wavelengths, ranging from a bandwidth of only 10 nm to as wide as 100 nm for tunable lasers. However, dielectric coatings can also enhance the reflectivity of metallic coatings and protect them",
"are dielectric mirrors made from alternating high and low refractive index quarter-wave thick multilayer.\nSuch dielectric mirrors provide a high degree of wavelength-selective reflectance at the required free surface wavelength λ if the thicknesses of alternating layers d₁ and d₂ with refractive indices n₁ and n₂ are such that n₁d₁ + n₂d₂ = λ/2 which then leads to the constructive interference of all partially reflected waves at the interfaces. But there is a disadvantage: because of the high mirror reflectivities, VCSELs have lower output powers when compared to edge-emitting lasers.\nThere are several advantages to producing VCSELs when compared with the production",
"modulated, i.e. switched on and off, to prevent interference from other sources of infrared (like sunlight or artificial lighting). The receiver uses a silicon photodiode to convert the infrared radiation to an electric current. It responds only to the rapidly pulsing signal created by the transmitter, and filters out slowly changing infrared radiation from ambient light. Infrared communications are useful for indoor use in areas of high population density. IR does not penetrate walls and so does not interfere with other devices in adjoining rooms. Infrared is the most common way for remote controls to command appliances.\nInfrared remote control protocols",
"sent to the guarded equipment.\nThe light beams emitted from the transmitter are sequenced, one after the other, and pulsed at a specific frequency. The receiver is designed to only accept the specific pulse and frequency from its dedicated transmitter. This enables the rejection of spurious infrared light and thus enhances their suitability as components within a safety system.\nTypically, light curtains are connected to a safety relay which will remove motive power from the hazard in the event that an object is detected. Safety relays can be provided with muting functionality which enables the temporary disabling of the safety function to",
"by the (glass) substrate on top, and the bottom may be covered with a protective coating, such as a copper layer and varnish.\nDespite the use of aluminum in generic mirrors, aluminum is not always used as the reflective layer for a solar mirror. The use of silver as the reflective layer is claimed to lead to higher efficiency levels, because it is the most reflective metal. This is because of aluminum's reflection factor in the UV region of the spectrum. Locating the aluminum layer on the first surface exposes it to weathering, which reduces the mirror's resistance to",
"the light is reflected at the partially transmissive mirror and the 100% reflective mirror, and thus the light travels back and forth between the partially transmissive mirror and the 100% reflective mirror. \nWhen the light beam is reflected each time at the partially transmissive mirror, a small portion of the light power passes through the mirror and travels away from the glass plate. For a light beam passing though the mirror after multiple reflections, the position of the line-focus can be seen in the virtual image when observed from the light output side. Therefore, this light beam travels as if",
"elements in a system.\nThis is a simplified explanation and omits some important but more complex technical considerations. Technical explanation For dielectric mirrors, materials with a refractive index between approx. 1.5 and 2.2 are available. The amplitude of the Fresnel reflection is about 0.2. With 10 layers about 0.99 of the light amplitude that is 0.98 of the light intensity is reflected. So if a given chirped mirror has 60 layers, light of a specific frequency interacts only with one sixth of the whole stack.\nReflection from the first surface amounts to an early reflection with unaltered chirp. This is prevented by"
] |
Why do mirrors look like they have depth while screens (computer, tv, etc.) just look flat? | [
"Mirrors respond to the movements of your head and eyes. In terms of 3d virtual reality a mirror has built in head and eye-tracking. This gives the presented image a sense of depth that a picture does not have. You can look around the corner, which no amount of head movement will do to a static 2d image.",
"Because your eyes are receiving two separate images from a mirror. You see depth because your eyes receive two slightly different views of the world and your brain stitches these together to generate depth. 3d movies work on the same principle and the glasses are there to separate the two different images. Mirrors don't need glasses because they reflect light in different directions and your two eyes can pick up two different images.",
"When we look at a mirror, we see reflected light, which apart from being flipped is no different to the light we see when we look directly at objects. When we look at the a picture on a screen we see light coming from a flat plane. The way we can tell how near and far objects (and parts of objects) are from us is by our brains comparing the different view formed from light reaching each eye.\n\nThe reason that we perceive a picture as having appearance of depth is because of information besides the difference in the view from each eye. For example, things that are larger appear closer, and things that are smaller appear further away. If I showed you a picture with a big elephant and a small elephant, you'd probably think the big one closer and the small one further (when the truth is that *neither* elephant is nearer or further. They're both as flat on the picture as each other). Our brains fill in the information about what is supposed to be near and far in a picture by using basic rules about size and speed, and information about what we expect to be true (for example, a bus is always bigger than a person). Our brains give us the *idea* of depth in a picture, but the experience of that is very different from the depth information that our eyes give us by seeing alone.",
"It's because each one of your eyes is receiving a different image, while a screen shows the same image to both eyes. Try this experiment on a mirror: Put an object in front of you between the mirror and yourself, then close your left eye, look at the object's reflection through the mirror, then close the other eye and do the same. As you have seen, the object was rotated accordingly to each eye which your brain interprets as depth, if the image was coming from a screen both of your eyes would've seen the same image and your brain would interpret as an image in a plane.",
"Because when you look at a mirror, you are looking from two points (eyes) and seeing two slightly different images.\n\nWhen you look at a monitor, you are looking from two different points, but seeing the exact same image.\n\nBasically, what your right and left eye sees in the mirror are two slightly different images. 3D.",
"Mirrors: Extreme graphics, low budget, repetitive gameplay.\n\n7/10 IGN"
] | [
"with curved surfaces can be modeled by ray tracing and using the law of reflection at each point on the surface. For mirrors with parabolic surfaces, parallel rays incident on the mirror produce reflected rays that converge at a common focus. Other curved surfaces may also focus light, but with aberrations due to the diverging shape causing the focus to be smeared out in space. In particular, spherical mirrors exhibit spherical aberration. Curved mirrors can form images with magnification greater than or less than one, and the image can be upright or inverted. An upright image formed by reflection in",
"reversed—as images in mirrors are—unless a mirror or inverting prism was used during exposure to flip the image. To be seen optimally, the image had to be lit at a certain angle and viewed so that the smooth parts of its mirror-like surface, which represented the darkest parts of the image, reflected something dark or dimly lit. The surface was subject to tarnishing by prolonged exposure to the air and was so soft that it could be marred by the slightest friction, so a daguerreotype was almost always sealed under glass before being framed (as was commonly done in France)",
"highly magnified or highly diminished images when the object is placed at certain distances. Convex mirrors A convex mirror or diverging mirror is a curved mirror in which the reflective surface bulges towards the light source. Convex mirrors reflect light outwards, therefore they are not used to focus light. Such mirrors always form a virtual image, since the focal point (F) and the centre of curvature (2F) are both imaginary points \"inside\" the mirror, that cannot be reached. As a result, images formed by these mirrors cannot be projected on a screen, since the image is inside the",
"formed between two plane-surfaces (or between the principle planes of curved surfaces) due to manufacturing errors or limitations, causing one edge of the mirror to be slightly thicker than the other. Nearly all mirrors and optics with parallel faces have some slight degree of wedge, which is usually measured in seconds or minutes of arc. For first-surface mirrors, wedges can introduce alignment deviations in mounting hardware. For second-surface or transmissive mirrors, wedges can have a prismatic effect on the light, deviating its trajectory or, to a very slight degree, its color, causing chromatic and other forms of aberration. In some",
"from the pinhole light source is interrupted by the knife edge. Viewing the mirror from behind the knife edge shows a pattern on the mirror surface. If the mirror surface is part of a perfect sphere, the mirror appears evenly lighted across the entire surface. If the mirror is spherical but with defects such as bumps or depressions, the defects appear greatly magnified in height. If the surface is paraboloidal, the mirror looks like a doughnut or lozenge. It is possible to calculate how closely the mirror surface resembles a perfect paraboloid by placing a special mask over the",
"allow the user to rotate the screen into portrait mode. However, as a result of the light polarization technology, an LCD monitor, particularly TN panels, the angle of image viewability will degrade when rotated. Liquid crystal displays vary in contrast when viewed from different angles along one axis. This axis is normally oriented to be vertical so that the image quality appears unchanged when the screen is viewed from the side, and image contrast is adjusted by tilting the panel up or down. By rotating the screen 90 degrees, the varying contrast axis is now horizontal and a viewer to",
"rays came. This is called retroreflection.\nMirrors with curved surfaces can be modelled by ray tracing and using the law of reflection at each point on the surface. For mirrors with parabolic surfaces, parallel rays incident on the mirror produce reflected rays that converge at a common focus. Other curved surfaces may also focus light, but with aberrations due to the diverging shape causing the focus to be smeared out in space. In particular, spherical mirrors exhibit spherical aberration. Curved mirrors can form images with magnification greater than or less than one, and the magnification can be negative, indicating that",
"an outside observer looks into the surface of the partially reflective mirror, the lights appear to recede into infinity, creating the appearance of a tunnel of lights of great depth.\nIf the mirrors are not precisely parallel, but instead are canted at a slight angle, the \"visual tunnel\" will be perceived to be curved (off to one side) as it recedes into infinity.\nAlternatively, this effect can also be seen when an observer stands between two parallel fully reflective mirrors, as in some dressing rooms, some elevators, or a house of mirrors. A weaker version of this effect can be seen by",
"room, the reflected image cannot be seen. When the lighting in the blue room is increased, often with the main room lights dimming to make the effect more pronounced, the reflection becomes visible and the objects within the blue room seem to appear in thin air. A common variation uses two blue rooms, one behind the glass and one to the side, which can be switched visible or invisible by alternating the lighting.\nThe hidden room may be an identical mirror-image of the main room, so that its reflected image matches the main room's; this approach is useful in making objects",
"mirror can only be pointed straight up. Research is underway to develop telescopes that can be tilted, but currently if a liquid mirror were to tilt out of the zenith, it would lose its shape. Therefore, the mirror's view changes as the Earth rotates and objects cannot be physically tracked. An object can be briefly electronically tracked while in the field of view by shifting electrons across the CCD at the same speed as the image moves; this tactic is called time delay and integration or drift scanning. Some types of astronomical research are unaffected by these limitations, such as",
"on the bottom mirror, the mirrors create a real image, which is a virtually identical copy of the original that appears in the opening. The quality of the image is dependent upon the precision of the optics. Some such illusions are manufactured to tolerances of millionths of an inch.\nA parabolic reflector pointing upward can be formed by rotating a reflective liquid, like mercury, around a vertical axis. This makes the liquid mirror telescope possible. The same technique is used in rotating furnaces to make solid reflectors.\nParabolic reflectors are also a popular alternative for increasing wireless signal strength. Even with simple",
"located behind the reflecting surface. For a flat mirror this virtual image has the same size and is located behind the mirror at the same distance as the original object. For curved mirrors, however, the situation is more complex. Electromagnetic emanations Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. Electromagnetic emanations have turned out to constitute a security threat to computer equipment. The figure below presents how a keystroke is retrieved and what material is necessary.\nThe approach is",
"can simply warp the acquired image into a cylindrical or spherical panorama. Even perspective views of smaller fields of view can be accurately computed.\nThe biggest advantage of catadioptric systems (panoramic mirror lenses) is that because one uses mirrors to bend the light rays instead of lenses (like fish eye), the image has almost no chromatic aberrations or distortions. The image, a reflection of the surface on the mirror, is in the form of a doughnut to which software is applied in order to create a flat panoramic picture. Such software is normally supplied by the company who produces the system.",
"Curved mirror A curved mirror is a mirror with a curved reflecting surface. The surface may be either convex (bulging outward) or concave (recessed inward). Most curved mirrors have surfaces that are shaped like part of a sphere, but other shapes are sometimes used in optical devices. The most common non-spherical type are parabolic reflectors, found in optical devices such as reflecting telescopes that need to image distant objects, since spherical mirror systems, like spherical lenses, suffer from spherical aberration. Distorting mirrors are used for entertainment. They have convex and concave regions that produce deliberately distorted images. They also provide",
"mirror has to be carefully ground, polished and figured to an extremely accurate shape, usually a paraboloid. Telescopes with high focal ratios may use spherical mirrors since the difference in the two shapes is insignificant at those ratios. The tools used to achieve this shape are surprisingly simple, consisting of a similarly sized glass tool, a series of finer abrasives, and a polishing pitch lap made from a type of tree sap. Through a whole series of random strokes the mirror naturally tends to become spherical in shape. At that point, a variation in polishing strokes is typically used to",
"types depending on the distance between the object and the mirror.\nThese mirrors are called \"converging mirrors\" because they tend to collect light that falls on them, refocusing parallel incoming rays toward a focus. This is because the light is reflected at different angles, since the normal to the surface differs with each spot on the mirror. Uses of concave mirrors Concave mirrors are used in reflecting telescopes. They are also used to provide a magnified image of the face for applying make-up or shaving. In illumination applications, concave mirrors are used to gather light from a small source and direct",
"a mirror is always virtual, while an inverted image is real and can be projected onto a screen.",
"a single plane, and the angle between the reflected ray and the surface normal is the same as that between the incident ray and the normal. This is known as the Law of Reflection.\nFor flat mirrors, the law of reflection implies that images of objects are upright and the same distance behind the mirror as the objects are in front of the mirror. The image size is the same as the object size. (The magnification of a flat mirror is equal to one.) The law also implies that mirror images are parity inverted, which is perceived as a left-right inversion.\nMirrors",
"at least two drilled holes at the sides. The latter tend to be larger than the former. Most of the mirror stones have been sawn from a larger piece of rock and fashioned into an oval shape; occasionally it is possible to distinguish the original form of the parent stone. The curve of each mirror is unique and tailored to the stone from which it is worked, and none possesses perfect symmetry; this appears to be deliberate. Although the elliptical mirrors are parabolic, the circular mirrors have a spherical concavity. The circular mirrors are effective at lighting fires while the",
"Perplexed as to how solid metal could be transparent, Shen guessed that some sort of quenching technique was used to produce tiny wrinkles on the face of the mirror too small to be observed by the eye. Although his explanation of different cooling rates was incorrect, he was right to suggest the surface contained minute variations which the naked eye could not detect; these mirrors also had no transparent quality at all, as discovered by William Bragg in 1932 (after an entire century of their confounding Western scientists).\nRobert Temple describes their construction: \"The basic mirror shape, with the design on",
"Mirror A mirror is an object that reflects light in such a way that, for incident light in some range of wavelengths, the reflected light preserves many or most of the detailed physical characteristics of the original light, called specular reflection. This is different from other light-reflecting objects that do not preserve much of the original wave signal other than color and diffuse reflected light, such as flat-white paint.\nThe most familiar type of mirror is the plane mirror, which has a flat surface. Curved mirrors are also used, to produce magnified or diminished images or focus light or simply distort",
"aligned, by design, there is a small vertical axis error inherent for each camera body. This error implies that all pictures (and videos as well) taken with a wrong vertical parallax are harder to look at, because one eye is looking up while the other is looking down. To effectively correct this optical discrepancy, the camera offers a vertical parallax correction in its menu system: MENU/SET/OPT AXIS CONTROL. The best way to use this adjustment is to zoom at maximum, take a picture, then analyse it with a software stereoscopic player(using row or column interlaced view) to obtain the subject",
"principle in the field of thin-film optics.\nSpecular reflection forms images. Reflection from a flat surface forms a mirror image, which appears to be reversed from left to right because we compare the image we see to what we would see if we were rotated into the position of the image. Specular reflection at a curved surface forms an image which may be magnified or demagnified; curved mirrors have optical power. Such mirrors may have surfaces that are spherical or parabolic. Mechanism In classical electrodynamics, light is considered as an electromagnetic wave, which is described by Maxwell's equations. Light waves incident",
"upright, though diminished, image and because they provide a wider field of view as they are curved outwards. \nThese mirrors are often found in the hallways of various buildings (commonly known as \"hallway safety mirrors\"), including hospitals, hotels, schools, stores, and apartment buildings. They are usually mounted on a wall or ceiling where hallways intersect each other, or where they make sharp turns. They are useful for people accessing the hallways, especially at locations having blind spots or where visibility may be limited. They are also used on roads, driveways, and alleys to provide safety for motorists where there",
"illusion of depth, it is not useful as a general stereoscopic technique. For example, it cannot be used to show a stationary object apparently extending into or out of the screen; similarly, objects moving vertically will not be seen as moving in depth. Incidental movement of objects will create spurious artifacts, and these incidental effects will be seen as artificial depth not related to actual depth in the scene. Over/under format Stereoscopic viewing is achieved by placing an image pair one above one another. Special viewers are made for over/under format that tilt the right eyesight slightly up and the",
"with this technique because there is always a dead angle directly behind the lens.\nCameras with two lenses\n360-degree cameras with two lenses are probably the most common type, as they can accommodate a full 360-degree angle with two lenses facing each other. A camera takes pictures and videos with an angle of just over 180 degrees, e.g. 220 degrees. These are then converted into a 360-degree object using software. Problems are often caused by stitching errors. This means that an incorrect combination of the images can result in an unclean cut edge that is difficult or impossible to remove.\nCameras with multiple",
"fish such as the herring which live in shallower water, the mirrors must reflect a mixture of wavelengths, and the fish accordingly has crystal stacks with a range of different spacings. A further complication for fish with bodies that are rounded in cross-section is that the mirrors would be ineffective if laid flat on the skin, as they would fail to reflect horizontally. The overall mirror effect is achieved with many small reflectors, all oriented vertically. Silvering is found in other marine animals as well as fish. The cephalopods, including squid, octopus and cuttlefish, have multi-layer mirrors made of protein",
"Mirror is concerned with vision, the way we see—or sometimes refuse to see—what's right in front of us, and what can happen when we open our eyes.\"",
"it outward in a beam as in torches, headlamps and spotlights, or to collect light from a large area and focus it into a small spot, as in concentrated solar power. Concave mirrors are used to form optical cavities, which are important in laser construction. Some dental mirrors use a concave surface to provide a magnified image. The mirror landing aid system of modern aircraft carriers also uses a concave mirror. Mirror shape Most curved mirrors have a spherical profile. These are the simplest to make, and it is the best shape for general-purpose use. Spherical mirrors, however, suffer from",
"incident ray and the normal. This is known as the Law of Reflection.\nFor flat mirrors, the law of reflection implies that images of objects are upright and the same distance behind the mirror as the objects are in front of the mirror. The image size is the same as the object size. The law also implies that mirror images are parity inverted, which we perceive as a left-right inversion. Images formed from reflection in two (or any even number of) mirrors are not parity inverted. Corner reflectors produce reflected rays that travel back in the direction from which the incident"
] |
How do you create a new sound/sound effect/noise? | [
"It's not so much that all of these sounds are \"new\" as you're using them in a way that's associated with something. And these sounds can be created in lots of different ways.\n\nFirst get a few sound recordings - animal cries, wood scraping against metal, a balloon letting out air, a chair falling down stairs, a cello playing a slow note, and so on. \n\nTake two or three of them and layer them on top of each other in a simultaneous playback. Speed one up and slow the other down, or play one in reverse. Adjust volumes, add effects like reverb (echo), add electronic processing to stretch or compact and so on, and there's your new sound. \n\nAs an example, they slowed down a baby elephant's cry to make the big Tyrannosaur roar at the end of Jurassic Park.",
"Like /u/the_original_retro said, existing sounds mixed together, then either digitally altered, or altered with various analog techniques.\n\n > The lightsaber sound effect was developed by sound designer Ben Burtt as a combination of the hum of idling interlock motors in aged movie projectors and interference caused by a television set on a shieldless microphone. Burtt discovered the latter accidentally as he was looking for a buzzing, sparking sound to add to the projector-motor hum.\n\n > The pitch changes of lightsaber movement were produced by playing the basic lightsaber tone on a loudspeaker and recording it on a moving microphone, generating Doppler shift to mimic a moving sound source.\n_URL_0_\n\nAs for the THX sound, it's explained here\n_URL_1_"
] | [
"white noise.\nOnce each sound had been created, it was modified. Some sounds were created at all the required pitches direct from the oscillators, others had to be repitched later by adjusting the tape playback speed and re-recording the sound onto another tape player. This process continued until every sound was available at all the required pitches. To create dynamics, the notes were re-recorded at slightly different levels.\nEach individual note was then trimmed to length by cutting the tape, and stuck together in the right order. This was done for each \"line\" in the music – the main plucked bass, the",
"modulate sound, different from the effects located under the FX tab. Two timbres, a saw and square wave, can be morphed or used independently when creating a sound. These are the default when Harmor is opened, but they can be edited or changed. Reverb and preverb effects can be created by using the blur knob to smear the partials horizontally. Blurring the top and bottom of a partial affects its frequencies, while blurring the left and right of a partial affect its attack and decay, respectively. Located directly below the blur, the prism knob is useful for creating a detuned",
"spaces as resonating bodies to create sounds. Different methods are used to produce the sounds, including hitting columns with metal rods, strapping vibrating motors to girders, and blowing air through pipes. The sounds often resemble musical instruments, including organs, flutes.",
"create new sounds by rendering the source recordings unrecognizable... In a statement, Nicolai described the album as a \"cinematographic emotion of a soundtrack to a film that actually does not exist in reality\".",
"sound, and then making it a bit more unrecognisable. It’s about using different things and subverting them in the process.",
"some time talking about the effects and about the special way of using the instrument. The most interesting thing is how you interconnect these various effects [from an instrument] that is one of the oldest on earth. Whether you blow on it, in it, or you use it as a trumpet or a recorder, you can have a lot of different sounds on such an instrument. But that's nothing new about it, the new thing is how you can combine them and how you can get them to interconnect so that it becomes one musical statement, one phrase. \n In",
"sound waves are often modulated using automation or low-frequency oscillation controlling the cutoff of an audio filter (typically a low- or high-pass filter), or the wave's amplitude, to adjust the waveform (to create a ‘wobbly’ effect on its parameters). In addition, it is common to utilize a somewhat \"twinkly\"-sounding gradual rise in pitch during \"risers\" (gradual pre-drop buildups of white noise), and arpeggio chords, vocal chops, or vocoders. Kawaii future bass Kawaii future bass, also known simply as kawaii bass, is a subgenre of future bass, known for its happy and cute timbre and strong Japanese pop culture influences. Often,",
"bit, these sounds are drawn closer until they are confronted. The movement continues until the sounds are at their initial state, but on opposite sides: the winds producing \"pointed\" sounds, while the percussion instruments, by means of complicated trills, etc., produce long held sounds. Henri Pousseur describes this development as an \"arc of duration\".",
"The sound can be obtained by rubbing their edges together in a sliding movement for a \"sizzle\", striking them against each other in what is called a \"crash\", tapping the edge of one against the body of the other in what is called a \"tap-crash\", scraping the edge of one from the inside of the bell to the edge for a \"scrape\" or \"zischen,\" or shutting the cymbals together and choking the sound in what is called a \"hi-hat chick\" or crush. A skilled percussionist can obtain an enormous dynamic range from such cymbals. For example, in Beethoven's ninth symphony,",
"formats. Sound The music and sound effects were produced by Russell Shaw and Adrian Moore. Moore used Sound Forge to develop the sound effects. Some (such as the snooker balls) were taken directly from its library, and others (including the treatment machines) were created by mixing sounds together. Some machine sounds were created by mixing the sounds of electric egg mixer with that of a hydraulic lifter. The farting sounds were recorded when Moore was working with bands including T'Pau, Prefab Sprout, and Seal at a recording studio: he did so as a joke, but they were useful for Theme",
"Art of Noise Beginnings The technological impetus for the Art of Noise was the advent of the Fairlight CMI sampler, an electronic musical instrument invented in Australia. With the Fairlight, short digital sound recordings called samples could be \"played\" through a piano-like keyboard, while a computer processor altered such characteristics as pitch and timbre. Music producer Trevor Horn was among the first people to purchase a Fairlight. While some musicians were using samples as adornment in their works, Horn and his colleagues saw the potential to craft entire compositions with the sampler, disrupting the traditional rock aesthetic. (Others were also",
"produced New Sounds since 1982 and Soundcheck from its beginning in 2002.",
"Mosolov uses a live orchestra to create a factory-like sound, unlike Antheil's Ballet mécanique, which uses mechanical elements to reach its musical goals. Introduction The piece begins as a representation of the start of the machine, with a tam-tam stroke and repetitious figures that begin in a few instruments and, measure by measure, are added to the sound until the instruments join together to suggest the sound of a factory at work. By measure twenty-seven, the overlapping instruments create a deliberate and machine-like sound above which the horns are directed to stand and play the main theme of the piece.",
"environment has become increasingly filled with the noise of machines, encouraging musicians to create a more \"complicated polyphony\" in order to provoke emotion and stir our sensibilities. He notes that music has been developing towards a more complicated polyphony by seeking greater variety in timbres and tone colors. Noise-Sounds Russolo explains how \"musical sound is too limited in its variety of timbres.\" He breaks the timbres of an orchestra down into four basic categories: bowed instruments, metal winds, wood winds, and percussion. He says that we must \"break out of this limited circle of sound and conquer the infinite",
"variety of noise-sounds,\" and that technology would allow us to manipulate noises in ways that could not have been done with earlier instruments. Future sounds Russolo claims that music has reached a point that no longer has the power to excite or inspire. Even when it is new, he argues, it still sounds old and familiar, leaving the audience \"waiting for the extraordinary sensation that never comes.\" He urges musicians to explore the city with \"ears more sensitive than eyes,\" listening to the wide array of noises that are often taken for granted, yet (potentially) musical in nature. He feels",
"compositional process and forms cultivated noise. It can be understood as presumed system of artificial sound spectrum organization and of apabsolute micro-sound (or partial) stability, which represents the opposite to the nature (or behavior) of noise. Composition of \"composition background\" or \"hidden layers source\", which for many composers represent a final product, for Sijarić represents a starting point of filtration process development. Influenced by composers such as Beat Furrer, Gérard Grisey, Morton Feldman and research in the field of Philosophy, Semiology, Psychoacoustics and Electronic & Computer Music (using Computer as Composition Assistant), he developed his own compositional style. Academic career",
"Waveshaper In electronic music waveshaping is a type of distortion synthesis in which complex spectra are produced from simple tones by altering the shape of the waveforms. Uses Waveshapers are used mainly by electronic musicians to achieve an extra-abrasive sound. This effect is most used to enhance the sound of a music synthesizer by altering the waveform or vowel. Rock musicians may also use a waveshaper for heavy distortion of a guitar or bass. Some synthesizers or virtual software instruments have built-in waveshapers. The effect can make instruments sound noisy or overdriven.\nIn digital modeling of analog audio equipment such as",
"change in timbre of the original sound or to create a sense of cultural or stylistic context. A well-known example is the overdriving of an electric guitar or electric bass signal to produce a clipped, distorted guitar tone or fuzz bass.\nEditing processes that deliberately produce artifacts often involve technical experimentation. A good example of the deliberate creation of sonic artifacts is the addition of grainy pops and clicks to a recent recording in order to make it sound like a vintage vinyl record.\nFlanging and distortion were originally regarded as sonic artifacts; as time passed they became a valued part",
"and these pick up both the sound from the speaker and its reflections off the walls of the chamber. The farther away from the loudspeaker, the more echo and reverberation the microphone(s) picks up and the louder the reverberation becomes in relation to the source. The signal from the microphone line is then fed back to the mixing desk, where the echo/reverberation-enhanced sound can be blended with the original 'dry' input.\nAn example of this physical effect can be heard on the 1978 David Bowie song \"Heroes\", from the album of the same name. The song, produced by Tony Visconti, was",
"from a different direction, the listener perceives a single sound at the location of the first-arriving stimulus. The delay between the first-arriving and the second-arriving sound can be in the range of 1 to 5 ms for clicks, and as much as 40 ms for complex sounds such as speech and music. At delays above these thresholds, the second sound is heard as an echo. This phenomenon illustrates how the auditory system suppresses local reverberations to enhance the intelligibility of perceived sounds and it is a critical factor in acoustical engineering and design of sound reinforcement systems.",
"comes from a standing wave whose wavelength is about twice the length of the tube, giving the fundamental frequency. Lord Rayleigh, in his book, gave the correct explanation of how the sound is stimulated. The flow of air past the gauze is a combination of two motions. There is a uniform upwards motion of the air due to a convection current resulting from the gauze heating up the air. Superimposed on this is the motion due to the sound wave.\nFor half the vibration cycle, the air flows into the tube from both ends until the pressure",
"a guitar slide on his bass strings and sending the signal through a Binson Echorec. A high-pitched screeching noise, played by Gilmour on guitar, is prominent during this largely ambient section. After observing the song being created, Nick Mason noted: \"The guitar sound in the middle section of 'Echoes' was created inadvertently by David plugging in a wah-wah pedal back to front. Sometimes great effects are the results of this kind of pure serendipity, and we were always prepared to see if something might work on a track. The grounding we'd received from Ron Geesin in going beyond the manual",
"present. The sound of a bullet entering a person from a close distance may sound nothing like the sound designed in the above example, but since very few people are aware of how such a thing actually sounds, the job of designing the effect is mainly an issue of creating a conjectural sound which feeds the audience's expectations while still suspending disbelief.\nIn the previous example, the phased 'whoosh' of the victim's fall has no analogue in real life experience, but it is emotionally immediate. If a sound editor uses such sounds in the context of emotional climax or a",
"applied to the sound sources we get in step two.\nThe convolution calculations in step three are related to the effect of reverberation. The mathematical description of reverberation is a convolution with a continuous weighting function. This is due to the echos in the environment. The sound rendering method approximates this by using the fact that the wavelength of sound is similar to that of the object, so it diffuses in its reflections. This provides a smoothing effect of the sound. These facts allow us to use a simplified sound tracking algorithm without making much difference.\nAll in all, this method is",
"Active noise control Explanation Sound is a pressure wave, which consists of alternating periods of compression and rarefaction. A noise-cancellation speaker emits a sound wave with the same amplitude but with inverted phase (also known as antiphase) to the original sound. The waves combine to form a new wave, in a process called interference, and effectively cancel each other out – an effect which is called destructive interference.\nModern active noise control is generally achieved through the use of analog circuits or digital signal processing. Adaptive algorithms are designed to analyze the waveform of the background aural or nonaural noise, then",
"is drawn across a series of recording and playback heads.\nWhen a signal from a voice or instrument is fed into the machine, it records the signal onto the tape loop as it passed over the record head. As the tape advances, the newly recorded signal is then picked up by a series of playback heads mounted in line with the record head. These play the sound back as the signal passes over each head in turn, creating the classic rippling or cascading echoes that are typical of tape echo units.\nThe number of playback heads determines the number of repeats, and",
"be the crumpling of cellophane, while rain may be recorded as salt falling on a piece of tinfoil.\nLess realistic sound effects are digitally synthesized or sampled and sequenced (the same recording played repeatedly using a sequencer). When the producer or content creator demands high-fidelity sound effects, the sound editor usually must augment his available library with new sound effects recorded in the field.\nWhen the required sound effect is of a small subject, such as scissors cutting, cloth ripping, or footsteps, the sound effect is best recorded in a studio, under controlled conditions. Such small sounds are often delegated to",
"sound through a circular hole), fluid dynamics (e.g., the flow of water through a firehose nozzle) and the diffusion of materials and heat (e.g., cooling of a red-hot coin in a water bath)",
"most recent technology, so there was something called a Time Cube you could feed a signal into -- it looked like a bong, a big plastic tube with a couple of bends in it -- and when the sound came out the other end, it sort of shot at you like an echo effect. He used that on the guitar in \"Gimme Danger\", a beautiful guitar echo overload that's absolutely beautiful; and on the drums in \"Your Pretty Face Is Going To Hell\". His concept was, \"You're so primitive, your drummer should sound like he's beating a log!\" It's not",
"vibration. Operation Sound waves are created as the air vibrates in response to a person's speech or other sounds. A second person's ear collects these sound waves and converts them into nerve impulses which their brain interprets as sound. In normal speech these waves travel through the air, but with a tin can telephone the waves are transmitted through an additional medium of cups and string.\nWhen the string is pulled taut and someone speaks into one of the cans, its bottom acts as a diaphragm, converting the sound waves into longitudinal mechanical vibrations which vary the tension of the string."
] |
Why it hurts in the nether regions when you are poked in the belly button | [
"I am not contributing at all but now you have me poking my belly button like an idiot. Thanks.",
"Not ganna lie my belly button is deep and smelly",
"Your balls start off in your abdomen, the same nerves go to both. Same reason you get abdominal pain when you hurt your balls."
] | [
"somewhere near the umbilicus (belly button). Should the inflammation become severe, it may actually irritate the inner lining of the abdominal cavity called the peritoneum. This thin layer of tissue lies deep to the abdominal wall muscles. Now the pain has become \"localized\". If pressure is applied to the muscles of the right lower abdomen (or iliac fossa) near a very irritated appendix, then the muscle fibers in that area will be stretched and will hurt. Process A Rovsing's sign is elicited by pushing on the abdomen far away from the appendix in the left lower quadrant. The appendix, in",
"Inguinal hernia Signs and symptoms Hernias present as bulges in the groin area that can become more prominent when coughing, straining, or standing up. The bulge commonly disappears on lying down. Mild discomfort can develop over time. The inability to \"reduce\", or place the bulge back into the abdomen usually means the hernia is 'incarcerated' which requires emergency surgery.\nSignificant pain is suggestive of strangulated bowel (an incarcerated indirect inguinal hernia).\nAs the hernia progresses, contents of the abdominal cavity, such as the intestines, can descend into the hernia and run the risk of being pinched within the hernia, causing an intestinal",
"in another abdominal area can often be seen and felt. When standing, such a bulge becomes more obvious. Besides the bulge, other symptoms include pain in the groin that may also include a heavy or dragging sensation, and in men, there is sometimes pain and swelling in the scrotum around the testicular area.\nIrreducible abdominal hernias or incarcerated hernias may be painful, but their most relevant symptom is that they cannot return to the abdominal cavity when pushed in. They may be chronic, although painless, and can lead to strangulation (loss of blood supply), obstruction (kinking of intestine), or both. Strangulated",
"poorly absorbed in the small intestine and subsequently fermented by the bacteria in the distal small and proximal large intestine. This is a normal phenomenon, common to everyone. The resultant production of gas potentially results in bloating and flatulence.\nNevertheless, although FODMAPs can cause certain digestive discomfort in some people, not only do they not cause intestinal inflammation, but they help to prevent it because they produce beneficial alterations in the intestinal flora that contribute to maintain the good health of the colon.\nFODMAPs are not the cause of irritable bowel syndrome nor other functional gastrointestinal disorders, but rather a person develops",
"notices that Jack feels no pain when she presses his belly. Cameron shows the team Jack's x-rays. She says he's constipated. Foreman diagnoses Hirschsprung's disease. They do a barium enema and a biopsy to confirm.\nCameron reviews the x-rays they've done on Jack over the course of over a week which show his colon is clear. Cameron checks Jack's belly and says while it feels better, it appears larger. Just then, Jack's right eye fixes (lateral rectus palsy) and he seizes. They give him diazepam for the seizure. Foreman sees Jack's optic disc is swollen, indicating intracranial hypertension. They give him",
"incision that isn't placed around the belly button. Through this smaller incision, excess skin is removed and the belly button is temporarily detached, floating above the muscles during this process. The muscles are tightened and reshaped from sternum to pubic area. The skin is then tightened and the belly button is reattached, or moved down one or two cm if desired. Liposuction may also be performed to achieve desirable results. Circumferential abdominoplasty A circumferential abdominoplasty is an extended abdominoplasty plus a buttock lift. The resulting scar runs all the way around the body, and the operation is also called a",
"Rovsing's sign Referral of pain This anomaly occurs because the pain nerves deep in the intestines do not localize well to an exact spot on the abdominal wall, unlike pain nerves in muscles. Pain from a stomach ulcer or gallstone can be interpreted by the brain as pain from the stomach, liver, gall bladder, duodenum, or first part of the small intestine. It will \"refer\" pain often to the mid upper abdomen, the epigastrum.\nBecause the appendix is a piece of intestine, it follows a similar referral pattern. An appendix with some early inflammation may give a non-specific irritation",
"a large majority of people, is located in the right lower quadrant. While this maneuver stretches the entire peritoneal lining, it only causes pain in any location where the peritoneum is irritating the muscle. In the case of appendicitis, the pain is felt in the right lower quadrant despite pressure being placed elsewhere.\nMost practitioners push on the left lower quadrant to see where the patient complains of pain. If pain is felt in the right lower quadrant, then there may be an inflamed organ or piece of tissue in the right lower quadrant. The appendix is generally the prime",
"cramping during bowel movements, left-sided abdominal pain, passage of mucus through the rectum, and anorectal pain. Causes Proctitis has many possible causes. It may occur idiopathically (idiopathic proctitis, that is, arising spontaneously or from an unknown cause). Other causes include damage by irradiation (for example in radiation therapy for cervical cancer and prostate cancer) or as a sexually transmitted infection, as in lymphogranuloma venereum and herpes proctitis. Studies suggest a celiac disease-associated \"proctitis\" can result from an intolerance to gluten.\nA common cause is engaging in anal sex with partner(s) infected with sexual transmitted diseases in men who have sex with",
"Rectocele Signs and symptoms Mild cases may simply produce a sense of pressure or protrusion within the vagina, and the occasional feeling that the rectum has not been completely emptied after a bowel movement. Moderate cases may involve difficulty passing stool (because the attempt to evacuate pushes the stool into the rectocele instead of out through the anus), discomfort or pain during evacuation or intercourse, constipation, and a general sensation that something is \"falling down\" or \"falling out\" within the pelvis. Severe cases may cause vaginal bleeding, intermittent fecal incontinence, or even the prolapse of the bulge through the mouth",
"Gastrojejunocolic fistula A gastrojejunocolic fistula is a disorder of the human gastrointestinal tract. It may form between the transverse colon and the upper jejunum after a Billroth II surgical procedure. (The Billroth procedure attaches the jejunum to the remainder of the stomach.) Fecal matter thereby passes improperly from the colon to the stomach, and causes halitosis.\nPatients may present with diarrhea, weight loss and halitosis as a result of fecal matter passing through the fistula from the colon into the stomach.",
"Proctitis Symptoms A common symptom is a continual urge to have a bowel movement—the rectum could feel full or have constipation. Another is tenderness and mild irritation in the rectum and anal region. A serious symptom is pus and blood in the discharge, accompanied by cramps and pain during the bowel movement. If there is severe bleeding, anemia can result, showing symptoms such as pale skin, irritability, weakness, dizziness, brittle nails, and shortness of breath.\nSymptoms are ineffectual straining to empty the bowels, diarrhea, rectal bleeding and possible discharge, a feeling of not having adequately emptied the bowels, involuntary spasms and",
"cause of unilateral low back pain. With sacroiliitis, the individual may experience pain in the low back, buttock or thigh, depending on the amount of inflammation. Common problems of the sacroiliac joint are often called sacroiliac joint dysfunction (also termed SI joint dysfunction; SIJD). Sacroiliac joint dysfunction generally refers to pain in the sacroiliac joint region that is caused by abnormal motion in the sacroiliac joint, either too much motion or too little motion. It typically results in inflammation of the SI joint, or sacroiliitis.",
"Anterior compartment syndrome Symptoms Diffuse tightness and tenderness over the entire belly of the tibialis anterior muscle that does not respond to elevation or pain medication can be early warning signs and suggestive of Anterior Compartment Syndrome. Other common symptoms include excessive swelling that causes the skin to become hot, stretched and glossy. Pain, paresthesias, and tenderness in both the ischemic muscles and the region supplied by the deep common fibular nerve are exhibited by patients suffering from this condition. Sensitivity to passive stretch and active contraction are common, and tend to increase the symptoms. Pathology A",
"gas distention, which causes this affected piece of bowel to rise upward in the abdomen.\nAbdominal distention may occasionally be seen in adult horses in the flank region, if the cecum or large colon is affected. Foals, however, may show signs of gas within the small intestines with severe abdominal distention. Pelvic flexure impaction This is caused by an impaction of food material (water, grass, hay, grain) at a part of the large bowel known as the pelvic flexure of the left colon where the intestine takes a 180 degree turn and narrows. Impaction generally responds well to medical treatment, usually",
"Gastrointestinal perforation Signs and symptoms Signs and symptoms may include a sudden pain in the epigastrium to the right of the midline indicating the perforation of a duodenal ulcer, while a gastric ulcer perforation reveals itself by burning pain in epigastrium, with flatulence and dyspepsia.\nIn intestinal perforation, pain starts from the site of perforation and spreads across the abdomen.\nGastrointestinal perforation results in severe abdominal pain intensified by movement, nausea, vomiting and hematemesis. Later symptoms include fever and or chills. In any case, the abdomen becomes rigid with tenderness and rebound tenderness. After some time the abdomen becomes silent and heart",
"gallbladder to the intestines. Gallstones can get trapped in the gastrointestinal tract, most commonly at the connection between the small and large intestines (ileocecal valve). When a gallstone gets trapped, it can lead to an intestinal obstruction, called gallstone ileus, leading to abdominal pain, vomiting, constipation, and abdominal distension. Causes Cholecystitis occurs when the gallbladder becomes inflamed. Gallstones are the most common cause of gallbladder inflammation but it can also occur due to blockage from a tumor or scarring of the bile duct. The greatest risk factor for cholecystitis is gallstones. Risk factors for gallstones include female",
"Intussusception (medical disorder) Signs and symptoms Early symptoms can include periodic abdominal pain, nausea, vomiting (sometimes green in color from bile), pulling legs to the chest area, and intermittent moderate to severe cramping abdominal pain. Pain is intermittent—not because the intussusception temporarily resolves, but because the intussuscepted bowel segment transiently stops contracting. Later signs include rectal bleeding, often with \"red currant jelly\" stool (stool mixed with blood and mucus), and lethargy. Physical examination may reveal a \"sausage-shaped\" mass, felt upon palpating the abdomen. Children, or those unable to communicate symptoms verbally, may cry, draw their knees up to their",
"types of complaints that relate to intestinal gas, which may present individually or in combination. Bloating and pain Patients may complain of bloating as abdominal distension, discomfort and pain from \"trapped wind\". In the past, functional bowel disorders such as irritable bowel syndrome that produced symptoms of bloating were attributed to increased production of intestinal gas. However, three significant pieces of evidence refute this theory. First, in normal subjects, even very high rates of gas infusion into the small intestine (30 ml/min) is tolerated without complaints of pain or bloating and harmlessly passed as flatus per rectum. Secondly, studies aiming to",
"Bloating Symptoms The most common symptoms associated with bloating is a sensation that the abdomen is full or distended. Rarely, bloating may be painful or cause shortness of breath.\nPains that are due to bloating will feel sharp and cause the stomach to cramp. These pains may occur anywhere in the body and can change locations quickly. They are so painful that they are sometimes mistaken for heart pains when they develop on the upper left side of the chest. Pains on the right side are often confused with problems in the appendix or the gallbladder.\nOne symptom of gas that is",
"from caudal extension of a suppurative abdominal process like appendicitis, diverticular or gynaecologic sepsis. Signs and symptoms Pain in the perianal area is the most common symptom of an anorectal abscess. The pain may be dull, aching, or throbbing. It is worst when the person sits down and right before a bowel movement. After the individual has a bowel movement, the pain usually lessens. Other signs and symptoms of anorectal abscess include constipation, drainage from the rectum, fever and chills, or a palpable mass near the anus.\nThe condition can become extremely painful, and usually worsens over the course of just",
"by pushing stool from the anal canal back into the rectum.\nOnce the voluntary signal to defecate is sent back from the brain, the abdominal muscles contract (straining) causing the intra-abdominal pressure to increase. The pelvic floor is lowered causing the anorectal angle to straighten out from ~90ᵒ to <15ᵒ and the external anal sphincter relaxes. The rectum now contracts and shortens in peristaltic waves, thus forcing fecal material out of the rectum, through the anal canal and out of the anus. The internal and external anal sphincters along with the puborectalis muscle allow the feces to be passed by pulling",
"the genital system, and the gastrointestinal tract is the basis of the radiation of pain to the gonads, as well as the nausea and vomiting that are also common in urolithiasis. Postrenal azotemia and hydronephrosis can be observed following the obstruction of urine flow through one or both ureters.\nPain in the lower-left quadrant can sometimes be confused with diverticulitis because the sigmoid colon overlaps the ureter, and the exact location of the pain may be difficult to isolate due to the proximity of these two structures. Risk factors Dehydration from low fluid intake is a major factor in stone formation.",
"are common causes of acute scrotal pain in adolescent\nboys and adults. At physical examination, they usually are palpable as tender and enlarged\nstructures. Clinically, this disease can be differentiated from torsion of the spermatic cord by\nelevation of the testes above the pubic symphysis. If scrotal pain decreases, it is more likely\nto be due to epidiymitis rather than torsion (Prehn's sign). Most cases of epididymitis are\nsecondary to sexually transmitted disease or retrograde bacteria infection from the urinary\nbladder. The infection usually begins in the epididymal tail and spreads to the epididymal\nbody and head. Approximately 20% to 40% of cases are associated with orchitis",
"signs and symptoms. The chest pain caused by GERD has a distinct 'burning' sensation, occurs after eating or at night, and worsens when a person lies down or bends over. It also is common in pregnant women, and may be triggered by consuming food in large quantities, or specific foods containing certain spices, high fat content, or high acid content. If the chest pain is suspected to be heartburn, patients may undergo an upper GI series to confirm the presence of acid reflux.\nHeartburn or chest pain after eating or drinking and combined with difficulty swallowing may indicate esophageal spasms. GI",
"instances an ulcer will form on the nipple. One reason for the development of cracked and sore nipples is the incorrect latching-on of the infant to the nipple. If a nipple appears to be wedge-shaped, white and flattened, this may indicates that the attachment of the infant is not good and there is a potential of developing cracked nipples. Herpes infection of the nipple is painful. Nipple pain can also be caused by excessive friction of clothing against the nipple that causes a fissure. Vertical transmission Some infections are transmitted through the nipple, especially if irritation or injury to the",
"Boyz in the Sink Bellybutton \"Belly Button\", their first song, is Lunt's musical lament that he lacks a navel depicted through his visit to a medical clinic. Tim Hodge voices Khalil the Caterpillar, who appears dressed as a physician who informs Lunt that his stem serves the purpose as a belly button. While originally included as the Silly Song for The Ballad of Little Joe, the video was released separately and won the Children's Jury Award for Animated Short Film or Video at the 2004 Chicago International Children's Film Festival. The song has been cited as the favorite silly song",
"Diverticulitis Signs and symptoms Diverticulitis typically presents with left lower quadrant abdominal pain of sudden onset. There may also be fever, nausea, diarrhea or constipation, and blood in the stool. Causes The causes of diverticulitis are poorly understood, with approximately 40 percent due to genes and 60 percent due to environmental factors. Conditions that increase the risk of developing diverticulitis include arterial hypertension and immunosuppression. Obesity is another risk factor. Low levels of vitamin D are associated with an increased risk of diverticulitis. Diet It is unclear what role dietary fibre plays in diverticulitis. It is often stated that a",
"Hereditary angioedema Signs and symptoms Symptoms generally begin around puberty but can occur earlier. These individuals have recurrent swelling in the extremities, genitals, face, lips, larynx or GI tract. Some patients describe a sensation of fullness but not pain or itching in the affected area except for those with abdominal swellings who often experience acute abdominal pain. Others experience an intense amount of pain, described as radiating from the bone outward along with intense itching just beneath the skin and intense heat, regardless of the area targeted.\nInstances of swelling around the throat or larynx can cause difficulties in breathing should",
"(i.e. its kshetram) is barely below the belly button.\nIt is connected with the sense of taste, (the tongue) and with reproduction (the genitals).\nIt is often associated with the testes and ovaries. They produce the hormones testosterone or estrogen, which influence sexual behaviors. They are stored in areas where genetic information lies dormant, in the same way that samskaras lie dormant within Svadhisthana. Practices Practices in kundalini yoga to control and balance the energy in Svadhisthana chakra include vajroli mudra (contraction of the genitals), ashvini mudra (contraction of the anus), and various asanas and pranayamas. Comparisons The equivalent chakra in the"
] |
Why do grapes spark in the microwave? | [
"they have a high iron content in the skin"
] | [
"Microwave popcorn Microwave popcorn is a convenience food consisting of unpopped popcorn in an enhanced, sealed paper bag intended to be heated in a microwave oven. In addition to the dried corn, the bags typically contain cooking oil with sufficient saturated fat to solidify at room temperature, one or more seasonings (often salt), and natural or artificial flavorings or both. With the many different flavors, there are many different providers. Design The bag is typically partially folded when it is placed in a microwave, and inflates as a result of steam pressure from the heated kernels.\nThe design of a microwave",
"concentrating heat on the oil in a microwave popcorn bag (which is solid at room temperature) in order to melt it rapidly.\nAmong the first microwave susceptors marketed were those from the mid-1980s in a product called McCain Micro Chips by McCain Foods. It consisted of a susceptor sheet which cooked French fries in a microwave oven. These sheets are currently used in several types of packaging for heating and cooking products in microwave ovens. Care in package design and use is required for proper food safety.\nA \"crisping sleeve\" is a device made of paperboard and affixed with a susceptor used",
"in the 1940s saw over 100 locations across the United States, also claims to be the originator of Texas toast.\nJohn Mollard's 1802 cookbook \"The Art of Cookery Made Easy and Refined\" (page 152) includes a recipe called \"Fried Onions with Parmesan Cheese.\" The recipe suggests cutting onions into 1/2\" rings, dipping them into a batter made of flour, cream, salt and pepper, and Parmesan cheese, and then deep frying them in \"boiling\" lard. It further suggests serving them with a sauce made of melted butter and mustard.",
"into the familiar crispy puff. Special varieties are grown to give improved popping yield. Though the kernels of some wild types will pop, the cultivated strain is Zea mays everta, which is a special kind of flint corn. Cooking methods Popcorn can be cooked with butter or oil. Although small quantities can be popped in a stove-top kettle or pot in a home kitchen, commercial sale of freshly popped popcorn employs specially designed popcorn machines, which were invented in Chicago, Illinois, by Charles Cretors in 1885. Cretors successfully introduced his invention at the Columbian Exposition in 1893. At this same",
"Nebraska. According to the USDA, corn used for popcorn production is specifically planted for this purpose; most is grown in Nebraska and Indiana, with increasing area in Texas. As the result of an elementary school project, popcorn became the official state snack food of Illinois. Popping mechanism Each kernel of popcorn contains a certain amount of moisture and oil. Unlike most other grains, the outer hull of the popcorn kernel is both strong and impervious to moisture and the starch inside consists almost entirely of a hard type.\nAs the oil and the water within the kernel are heated, they",
"corn and oil can be placed, with a dome shaped cover which often doubles as a serving bowl.\nIn the middle of the 1970s, Pillsbury made microwave popcorn for sale in vending machines (and later to wide distribution in supermarkets, as microwave oven sales increased), thus reducing the need for a separate appliance in some homes. To improve flavour, texture and shelf life of pre-packaged microwave popcorn, companies started adding diacetyl, PFOA, and trans-fats into the packages which has led to some concern among health conscious snackers.",
"quoted the ideas of Masaru Emoto that microwave ovens cause water molecules to form crystals that resemble crystals exposed to negative thoughts or beliefs, such as when the words \"Hitler\" and \"Satan\" were exposed to the water. Steven Novella calls Emoto's claims \"pure pseudoscience\" and states that \"Hari's conclusions about microwaves are all demonstrably incorrect and at odds with the scientific evidence\". She later described the post as not her \"most impressive piece of work\" and noted that it was written when she had first started blogging. In a widely discredited 2011 post, Hari warned readers that the air pumped",
"salt and buttered before serving. Some diners use specialized skewers, thrust into the ends of the cob, to hold the ear while eating without touching the hot and sticky kernels.\nWithin a day of corn being picked it starts converting sugar into starch, which results in reduction in the level of natural sweetness. Corn should be cooked and served the same day it has been harvested, as it takes only a single day for corn to lose up to 25% of its sweetness. Preparation The most common methods for cooking corn on the cob are frying, boiling, roasting, and grilling.",
"Corn on the cob can be grilled directly in its husk, or it can be husked first and then wrapped in aluminum foil. When oven roasting, cooking the corn in the husk directly on the rack is recommended. When roasting or grilling corn on the cob, the cook can first peel the husk back to rub the corn with oil or melted butter, then re-secure the husk around the corn with a string. Corn on the cob can also be microwaved for 3 to 4 minutes still in its husk.\nCommon condiments and seasonings for corn on the cob include butter,",
"and protein content is the same.\nUnlike the vast majority of breakfast cereals, Corn Pops in the USA had been packaged in a foil-lined bag until the mid-2010s. This helped to prevent the Pops from going stale and from secreting a sticky substance that caused the corn pops to stick together (a problem caused by the method by which the cereal is processed). Honey Smacks, another Kellogg's puffed grain cereal, used the same bag Corn Pops used. However, the Canadian version of Corn Pops had long been packaged in a standard plastic cereal bag, now used for American pops as",
"Commercial production is dominated by white and yellow. Terminology In the popcorn industry, a popped kernel of corn is known as a \"flake\". Two shapes of flakes are commercially important. \"Butterfly\" (or \"snowflake\") flakes are irregular in shape and have a number of protruding \"wings\". \"Mushroom\" flakes are largely ball-shaped, with few wings. Butterfly flakes are regarded as having better mouthfeel, with greater tenderness and less noticeable hulls. Mushroom flakes are less fragile than butterfly flakes and are therefore often used for packaged popcorn or confectionery, such as caramel corn. The kernels from a single cob of popcorn may form",
"baked, boiled, microwaved, steamed, sautéed or fried. This squash adds sweet flavor and texture to stir-fries. Its seed cavity is ideal for stuffing.",
"Vergeletto, Nunzia would toast the corn until about a third of the grain had popped, and got a “crest” (thus it takes the name ghèl – galli in Italian, roosters in English). On the other hand, the last miller of Loco, Remigio Meletta, used to discard carefully every popped grain. It's possible that this selection was due to the difficulty in milling this kind of grain with a too heterogeneous consistency.\nDuring the milling, which was the final part of the process, the miller had to grind the grain very finely to be able to obtain, as Schira says, a flour",
"or frying, because it eliminates the formation of tars and char, which are carcinogenic. Microwave radiation also penetrates deeper than direct heat, so that the food is heated by its own internal water content. In contrast, direct heat can burn the surface while the inside is still cold. Pre-heating the food in a microwave oven before putting it into the grill or pan reduces the time needed to heat up the food and reduces the formation of carcinogenic char. Unlike frying and baking, microwaving does not produce acrylamide in potatoes, however unlike deep-frying, it is of only limited effectiveness in",
"found Heinz canned baked beans products to be contaminated with the hormone disruptor bisphenol.\nIn June 2009, a company PR stunt announced they had introduced the prototype of the world's smallest, portable microwave, the \"Beanzawave\". This was due to the British just loving a bit of Heinz beans, they even have it for breakfast with the traditional British fry up, The microwave was to appeal to office workers and students and can be powered by a computer via a USB port. The microwave may be used to heat up coffee or tea, or small food items. It is also good for",
"boiled and steamed taste that microwave-only cooking tends to create.\nIn order to aid browning, sometimes an accessory browning tray is used, usually composed of glass or porcelain. It makes food crisp by oxidizing the top layer until it turns brown. Ordinary plastic cookware is unsuitable for this purpose because it could melt.\nFrozen dinners, pies, and microwave popcorn bags often contain a susceptor made from thin aluminium film in the packaging or included on a small paper tray. The metal film absorbs microwave energy efficiently and consequently becomes extremely hot and radiates in the infrared, concentrating the heating of oil for",
"Kettle corn History in the United States Kettle corn was introduced to the United States in the 18th century. It is referenced in the diaries of Dutch settlers in Pennsylvania circa 1776. It was a treat sold at fairs or consumed at other festive occasions. The corn, oil, sugar, and salt are cooked together in a cast iron kettle, or possibly a Dutch oven. This produces a noticeable sweet crust on the popcorn; however, this method requires constant stirring or the sugar will burn. Alternatively, a batch of plain popped corn can be sweetened with sugar or honey before adding",
"hot. Toasted sesame seeds are often sprinkled on top.",
"Corn on the cob Corn on the cob is a culinary term used for a cooked ear of freshly picked maize from a cultivar of sweet corn. Sweet corn is the most common variety of maize eaten directly off the cob. The ear is picked while the endosperm is in the \"milk stage\" so that the kernels are still tender. Ears of corn are steamed or boiled, usually without their green husks, or roasted with them. The husk leaves are in any case removed before serving.\nCorn on the cob is normally eaten while still warm. It is often seasoned with",
"the corn in lye kills the seed's germ, which keeps it from sprouting while in storage. Finally, in addition to providing a source of dietary calcium, the lye or lime reacts with the corn so that the nutrient niacin can be assimilated by the digestive tract. People consume hominy in intact kernels, grind it into sand-sized particles for grits, or into flour.\nIn Mexican cooking, hominy is finely ground to make masa. Fresh masa that has been dried and powdered is called masa seca or masa harina. Some of the corn oil breaks down into emulsifying agents (monoglycerides and diglycerides),",
"put in cement or stainless steel tanks with capacities between 4,000–30,000 litres (1,100–7,900 US gal). The bottom third of the grapes gets crushed under the weight of gravity and resulting must begins normal yeast fermentation with ambient yeasts found naturally on the skins of the grapes. Carbon dioxide is released as a byproduct of this fermentation and begins to saturate the individual intact grape berries that remain in the barrel. The carbon dioxide seeps into the skin of the grape and begin to stimulate fermentation at an intracellular level. This is caused, in part, by the absence of oxygen in the winemaking",
"a crank. This is to prevent burning of the kernels on the bottom and, under limited conditions, enables users to make sweetened popcorn by mixing sugar directly with the kernels before they pop.\nIn 1978, Presto introduced the Popcorn Pumper, a popper for consumer use in the home, which used hot air blown up through the kernels. By cooking without oil, it reduced the calories and fat in the finished product. It was also faster and easier than pan fry popping.\nHome popcorn makers are also available, which consist of an electrically heated circular tray with a powered stirring arm, into which",
"and 18 ft. in diameter, surmounts the roof. The potato is electric lighted and its eyes, through the electric mechanism, are made to wink constantly. A cube of butter thrust into its split top glows intermittently.\" Premiums such as postcards, letter openers, and spoons were also produced to promote \"The Route of the Great Big Baked Potato\"; the slogan served the Northern Pacific for about 50 years. The song \"Great Big Baked Potato\" (words by N.R. Streeter and H. Caldwell; Music by Oliver George) was written about this potato. United Kingdom A baked potato is sometimes called a",
"normal popcorn, cooked with white sugar and salt, traditionally in a large copper kettle. Once reserved for specialty shops and county fairs, kettle corn has recently become popular, especially in the microwave popcorn market. The popcorn maker is a relatively new home appliance, and its popularity is increasing because it offers the opportunity to add flavors of the consumer's own choice and to choose healthy-eating popcorn styles. Health risks Popcorn is included on the list of foods that the American Academy of Pediatrics recommends not serving to children under four, because of the risk of choking.\nMicrowaveable popcorn represents",
"world's fair, F.W. Rueckheim introduced a molasses-flavored \"Candied Popcorn\", the first caramel corn; his brother, Louis Ruekheim, slightly altered the recipe and introduced it as Cracker Jack popcorn in 1896.\nCretors's invention introduced the first patented steam-driven popcorn machine that popped corn in oil. Previously, vendors popped corn by holding a wire basket over an open flame. At best, the result was a hot, dry, unevenly cooked snack. Cretors's machine popped corn in a mixture of one-third clarified butter, two-thirds lard, and salt. This mixture can withstand the 450 °F (232 °C) temperature needed to pop corn and it produces little smoke. A",
"a pumpkin seed sauce with chopped hard-boiled eggs. The sauce is created by toasting pumpkin seeds, grinding them to a powder, and blending with a broth of epazote. However, prior to blending, the toasted, ground seeds have their oil extracted by mixing the powder with a small amount of water and squeezing the resulting paste with your hands. This oil is collected and reserved for use as a garnish. After the tortillas have been dipped in the pumpkin seed sauce and filled, the dish is topped with a cooked tomato-chile sauce. Traditionally, the chile used in this sauce is the",
"popped corn. While the kernels may come in a variety of colors, the popped corn is always off-yellow or white as it is only the hull (or pericarp) that is colored. \"Rice\" type popcorn have a long kernel pointed at both ends; \"pearl\" type kernels are rounded at the top. Commercial popcorn production has moved mostly to pearl types. Historically, pearl popcorn were usually yellow and rice popcorn usually white. Today both shapes are available in both colors, as well as others including black, red, mauve, purple, and variegated. Mauve and purple popcorn usually have smaller and nutty kernels.",
"from frost. The curing process helps the fruit keep longer before spoiling.\nAs with other squash varieties, the acorn squash vine makes yellow trumpet flowers that are edible. Tops about three inches from the end are also edible and they are one of the most common vegetables in the Philippines (as greens). Uses Acorn squash is most commonly baked, but can also be microwaved, sauteed or steamed. For savory recipes, it may be stuffed with rice, meat or vegetable mixtures. If a sweeter dish is desired, maple syrup is often used to fill the halves prior to baking, or used in",
"Popcorn History Corn was domesticated about 10,000 years ago in what is now Mexico. Archaeologists discovered that people have known about popcorn for thousands of years. In Mexico, for example, remnants of popcorn have been found that date to around 3600 BC.\nPopping of the kernels was achieved by hand on the stove-top through the 19th century. Kernels were sold on the East Coast of the United States under names such as Pearls or Nonpareil. The term popped corn first appeared in John Russell Bartlett's 1848 Dictionary of Americanisms. Popcorn is an ingredient in Cracker Jack, and in the early years",
"of the kernel to the corn cob, where the nutrient and water flow, and this is the only part that not covered by the pericarp. It contains fiber. Use Corn kernels have a number of uses, including food, biofuel, and bioplastics. Food Corn is a popular food throughout the world in many forms. It is used in breakfast cereals in the Western world (as corn flakes) and it is a grain that can be eaten raw off the cob, although it is usually preferred cooked. It may be fed to animals or humans. In the United States, for economic reasons"
] |
Why is it bad for computers to be turned off manually (like removing the power source) rather than by pressing the shutdown button. | [
"Imagine your hard drive is a supermarket.\n\nThe workers have to restock (writing to hard drive) and do price checks (reading the hard drive).\n\nWhen you go through a shutdown, the computer makes sure that all the workers finish their jobs and leave the supermarket before closing.\n\nWhen you turn off the computer, it's like all the workers immediately disappear. This means that if someone was stocking the shelves, they poof into nothingness. If they were holding anything, it would immediately crash down on the ground (data corruption).",
"Say you have a file in your computer, a text document that contains \"This is a test\". You edit the document to say \"This is not a test\" and save it. If you unplug your computer while it's in the process of saving, you could end up with a text document that reads \"This is no\" because it didn't finish saving. This is not the original text, nor is it the edited text, it's incomplete. For a simple text file, this is not a huge deal, you are just missing some information. If it were a more important file, it could stop certain things from functioning in your computer, or it could perform actions that you didn't intend it to and cause errors. Your computer is constantly saving different files on your computer so if you interrupt it, it could \"corrupt\" a file and cause issues. When you shut down properly, the computer will make sure it is finished with whatever it is doing so this doesn't happen.",
"When you save something it doesn't write it out to the disk, it writes it into a buffer, and that can be written to the actual disk, in whole or in part, at some later time. When you halt your system properly, it ensures these are flushed, preventing data loss. Also, historically in the case of mechanical disks, if you abruptly powered off, it would cause a crash (literally the head of the arm in the disk would crash into the platter), which could again cause data loss."
] | [
"Shutdown (computing) To shut down or power off a computer is to remove power from a computer's main components in a controlled way. After a computer is shut down, main components such as CPUs, RAM modules and hard disk drives are powered down, although some internal components, such as an internal clock, may retain power. Implementations The shutdown feature and command is available in Microsoft Windows, ReactOS, HP MPE/iX, and in a number of Unix and Unix-like operating systems such as Apple macOS. Apple macOS In Apple macOS the computer can be shut down by choosing \"Shut Down…\" from the",
"Apple Menu or by pressing the power key to bring up the power management dialog box and selecting button \"Shut down\". An administrator may also use the Unix shutdown command as well. It can also be shut down by pressing [Alt]+[Command]+[Eject optical disc on optical drive] but this will not prompt the user anything at all. Unix and Linux In Unix and Linux, the shutdown command can be used to turn off or reboot a computer. Only the superuser can shut the system down.\nOne commonly issued form of this command is shutdown -h now, which will shut down a system",
"without powering them down. This was useful since after a computer was powered down, it was necessary to wait a few seconds before powering it up again to avoid potential damage to the power supply and hard drive. Since software developers and technical writers would need to restart a computer many times, this key combination was a big time-saver. David Bradley and Mel Hallerman chose this key combination because it is practically impossible to accidentally press this combination of keys on a standard original IBM PC keyboard.\nHowever, the key combination was described in IBM's technical reference documentation",
"and reboots the computer, but does not invoke the Power On Start Up Test (POST) or clear memory. Hardware reset buttons on PCs work by causing a momentary power interruption to the CPU, which resets it and causes the computer to reboot. Unlike Ctrl+Alt+Del, pressing the reset button causes the BIOS to perform the POST check. By the early 2000s, reset buttons had largely disappeared from PCs although the connector for them is still present on motherboards.\nReset buttons or keypresses on any computer cannot erase the contents of system RAM, which can only be done by powering the computer off",
"power was restored.\nDepending on the architecture, the reset button might have different effects. On PCs, usually it is connected to the motherboard, and when pressed it sends a reset signal to all peripherals.\nMany newer computers have no separate button for resetting the computer; it is integrated with the power button. On most newer operating systems, the user can customize what happens when they press the power button. For example, they may set it to 'Do nothing', 'restart', 'shutdown', or 'stand by'. This is only for pressing the button once; on most computers the power button can remove power immediately",
"Reset button Personal computers The reset button could be an actual button or concept. The reset button would typically kick off a soft boot, instructing the computer to go through the process of shutting down, which would clear memory and reset devices to their initialized state. Contrary to the 'Power Button', which would simply remove power immediately.\nPressing the reset button would be preferable to the power button, which could potentially leave a device in the middle of some operation and subject to defect. In most commodity hardware, the consumer would expect the device to be resilient enough to 'reset' when",
"will halt when started before the network connection is made, displaying an error message and requiring a keypress), loss of control of the machine due to software problems (machine hang, termination of remote control or networking software, etc.), and virus infection or hard disk corruption. Therefore, the use of a reliable server-class machine with RAID drives, redundant power supplies, etc., will help to maximize availability. Additionally, a device which can switch the machine off and on again, controlled perhaps by a remote signal, can force a reboot which will clear problems due to misbehaving software.\nFor a machine not in constant",
"unused on a regular schedule. Switches that turn the power off when the connected device goes into standby, or that turn other outlets on or off when a device is turned on or off are also available. Switches can be activated by sensors. Home automation sensors, switches and controllers can be used to handle more complex sensing and switching. This produces a net saving of power so long as the control devices themselves use less power than the controlled equipment in standby mode.\nStandby power consumption of some computers can be reduced by turning off components that use power in standby",
"the Shift key while clicking Shut Down.\nHibernation is often under-used in business environments as it is difficult to enable it on a large network of computers without resorting to third-party PC power management software. This omission by Microsoft has been criticized as having led to a huge waste in energy.\nThird-party power management programs offer features beyond those present in Windows. Most products offer Active Directory integration and per-user or per-machine settings with more advanced power plans, scheduled power plans, anti-insomnia features and enterprise power usage reporting. Notable vendors include 1E NightWatchman, Data Synergy PowerMAN (Software), Faronics Power Save and",
"may cause a process to run which is waiting to read or write. A power-off interrupt predicts imminent loss of power, allowing the computer to perform an orderly shut-down while there still remains enough power to do so. Keyboard interrupts typically cause keystrokes to be buffered so as to implement typeahead.\nInterrupts are sometimes used to emulate instructions which are unimplemented on some computers in a product family. For example floating point instructions may be implemented in hardware on some systems and emulated on lower-cost systems. In the latter case, execution of an unimplemented floating point instruction will cause an \"illegal",
"immediately. Another one is shutdown -r now to reboot. Another form allows the user to specify an exact time or a delay before shutdown: shutdown -h 20:00 will turn the computer off at 8:00 PM, and shutdown -r -t 60 will automatically reboot the machine within 60 seconds (one minute) of issuing the command.",
"then any peripherals attached to the E/I (if multiple disk drives are attached, the last drive on the chain is to be powered on first and work down from there), the E/I, and the computer last. When powering down, the computer is to be turned off first, followed by the monitor, E/I, and peripherals. In addition, users are instructed to remove all disks from the drives during power up or down (or else leave the drive door open to disengage the read/write head from the disk). This is because a transient electrical surge from the drive's read/write head would create",
"NOT work (due to certain optimizations in the implementation). Instead there was a button on the console called Modify which when pressed together with the Check Reset button, when the computer was in Manual mode, would set the computer in a mode that would clear all of memory in a tenth of one second regardless of how much memory you had; when you pressed Start. It also stopped automatically when memory was cleared, instead of requiring the operator to stop it.\nOther than typing machine code at the console, a program could be loaded via either the paper tape reader, the",
"not a problem, but while the machine is booting up it will attempt to detect its keyboard and mouse and either fail to boot or boot with an unwanted (e.g. mouseless) configuration. Likewise, a failure to detect the monitor may result in the computer falling back to a low resolution such as (typically) 640x480. Thus, mechanical KVM switches may be unsuitable for controlling machines which can reboot automatically (e.g. after a power failure).\nAnother problem encountered with mechanical devices is the failure of one or more switch contacts to make firm, low resistance electrical connections, often necessitating some wiggling or adjustment",
"the screen fades out with black bars, and then to a white screen and the phone returns to main screen (often known as restart). No real explanation as to why this happens has surfaced. There are various ways of fixing this problem though. Doing a full reset of the phone and not messing with the MMS settings is one. Users have been able to send messages after this, although for some, the problem arises again. Some users report that disabling message delivery reports fixes the issue. Unlocking the phone is another option. This",
"a second switch, with a higher triggering temperature, usually turns off even the cache and forces the computer to reboot). This mitigates the impact of programs resembling power viruses on the processor's longevity, while still accommodating their possible legitimate uses; it can also make overclocking possible with less risk. Manual reset Some thermal switches must be reset manually after they have been tripped. This design is used when an automatic and unattended restart would create a hazardous condition, such as sudden startup of a powerful motor without warning. These types of thermal cutouts are usually reset by pressing a push-button",
"switching on the incoming supply, automatic or unintentional restarting of the machine shall be prevented when such a restart causes a hazardous condition.",
"and waiting approximately 10 seconds for residual current in the RAM chips to dissipate. Game consoles On game consoles, many times it is simply a software signal. For example, on the Nintendo 64 and the GameCube, it instructs the currently running software (game or console BIOS) to restart forcibly, usually fading out the volume and/or screen brightness for a cleaner effect. On the PlayStation 2, the button is by default programmed to restart the whole system, but, especially on games using the Network Adapter/HDD, it might clean up the connection, unmount hard drive partitions, and remove power from the hard",
"problem of standby power completely. In fact, switching off at the power point is effective enough, there is no need to disconnect all devices from the power point. Some such devices offer remote controls and digital clock features to the user, while other devices, such as power adapters for disconnected electronic devices, consume power without offering any features (sometimes called no-load power). All of the above examples, such as the remote control, digital clock functions and—in the case of adapters, no-load power—are switched off just by switching off at the power point. However, for some devices with built-in internal battery,",
"In a restart, the operating system ensures that all pending I/O operations are gracefully ended before commencing a reboot. Power failure Unexpected loss of power for any reason (including power outage, power supply failure or depletion of battery on a mobile device) forces the system user to perform a cold boot once the power is restored. Some BIOSes have an option to automatically boot the system after a power failure. An uninterruptible power supply (UPS), backup battery or redundant power supply can prevent such circumstances. Random reboot \"Random reboot\" is a non-technical term referring to an unintended (and often undesired)",
"the system will not switch on. There are several ways to check for this. First the laptop can be partially disassembled and the mouse assembly can be unplugged from the system board and the system switched on. If the system boots with the mouse unplugged then it is the switch. Another way to check for the problem is by running a magnet over the reed switch, there should be a faint click when the magnet triggers the switch. This does not require disassembly but the magnet must be in the correct position and be strong enough. Some people have modified",
"if held down for a few seconds. When the OS hangs, the reset button is no longer \"integrated with the power button\".\nMany early microcomputers sported a reset button or key, such as the Apple II, TRS-80, and Atari 8-bit. Commodore did not include one on their computers until the CBM-II line.\nThe original IBM PC had no hardware reset button and IBM did not include one on any of their personal computers until the early 1990s, however many clones began sporting them early on. All PC compatibles can be rebooted by pressing Ctrl+Alt+Del, which triggers the BIOS startup routines and re-initializes",
"stickers \"Any key\" to the reset buttons of their office computers, causing their less experienced colleagues to misinterpret the message – to considering it just as being a sarcasm about software-related difficulties solving skills of novice users (seeing a message you didn't expect? ahh, panic! don't even try to read it and understand!! just press reset!!!), or a Murphy's law-similar pessimism about actual resolvability of some types of work-flow problems caused by bugs in software.",
"also remarked that by far most users, including power users, will not have a reason to turn the feature off, saying that there are \"almost no downsides\" to it.",
"to continue using the operating system. If the user's computer system ever changes — for example, if two or more relevant components of the computer itself are upgraded — Windows will return to the unactivated state and will need to be activated again within a defined grace period. If a user tried to reactivate too frequently, the system will refuse to activate online. The user must then contact Microsoft by telephone to obtain a new activation code.\nHowever, activation only applied to retail and \"system builder\" (intended for use by small local PC builders) copies of Windows. \"Royalty OEM\" (used by large PC",
"cause system operational issues if something goes wrong. In contrast, most user-level software on modern operating systems can be stopped without greatly affecting the rest of the system. Even drivers executing in user mode can crash a system if the device is erroneously programmed. These factors make it more difficult and dangerous to diagnose problems.\nThe task of writing drivers thus usually falls to software engineers or computer engineers who work for hardware-development companies. This is because they have better information than most outsiders about the design of their hardware. Moreover, it was traditionally considered in the hardware manufacturer's interest to",
"Other devices may require a complete re-installation of the software. The following section lists a few common electronic devices and how they can be reset to factory settings.\nComputer factory resets will restore the computer to the computer's original operating system and delete all of the user data stored on the computer. Microsoft's Windows 8 and Windows 10, and Apple's macOS have options for this.\nOn Android devices, there is a factory data reset option in Settings that will appear to erase all of the device's data and reset all of its settings. This method is typically used when the device has",
"clearing IF will force the processor to ignore all interrupts, the kernel may never get control back if it is not set to 1 again. Old DOS programs Some old DOS programs that use a protected mode DOS extender and install their own interrupt handlers (usually games) use the CLI instruction in the handlers to disable interrupts and either POPF (after a corresponding PUSHF) or IRET (which restores the flags from the stack as part of its effects) to restore it. This works if the program was started in real mode, but causes problems when such programs are run in",
"debug programs when operating support was limited and most programs were run in stand-alone mode. Typically a front-panel switch could cause the computer to single-step, that is run a single instruction and stop until the programmer pressed a button to execute the next instruction. An address stop could be set to stop a running program when it attempted to execute an instruction or access data at a specified address. The contents of registers and memory would be displayed in the front-panel lights. The programmer could read and alter register contents, change program instructions or data in memory or force a",
"touch sensitive controls where either the eject button or start button for Dell MediaDirect would stay lit for a few minutes after the unit was powered on, rendering the rest of the buttons useless. However, a firmware update for this media panel posted on the Dell Community forums has been reported to fix this issue. Another solution for this issue is to power down the laptop and remove the battery, then holding the power button for 30 seconds to fully discharge all remaining electrical power in the system, draining any residual flea power.\nSome users have reported video card problems with"
] |
How does sound (intangible) get trapped and recorded in the grooves of a record (tangible) | [
"Sound isn't \"trapped\" in the record. It's being recorded and then reproduced from the recording. For a vinyl record, that recording of the sound's data is contained as a groove cut into the surface."
] | [
"and other fiber products) are not those known for allowing a quiet noise-free surface. Vinyl Vinyl records do not break easily, but the soft material is easily scratched. Vinyl readily acquires a static charge, attracting dust that is difficult to remove completely. Dust and scratches cause audio clicks and pops. In extreme cases, they can cause the needle to skip over a series of grooves, or worse yet, cause the needle to skip backwards, creating a \"locked groove\" that repeats over and over. This is the origin of the phrase \"like a broken record\" or \"like a scratched record\", which",
"records, it enables the user to physically inscribe sounds onto a CD (or any flat, smooth surface) with a needle and replay them back on any similar machine.\nHome recording equipment made a cameo appearance in the 1941 Marx Brothers film, The Big Store. A custom recording was also the original surprise Christmas present in the 1931 version of The Bobbsey Twins' Wonderful Secret (when the book was rewritten in 1962 as The Bobbsey Twins' Wonderful Winter Secret, it became an 8 mm movie).",
"Skip (audio playback) Vinyl gramophone records Vinyl records are easily scratched and vinyl readily acquires a static charge, attracting dust that is difficult to remove completely. Dust and scratches cause audio clicks and pops and, in extreme cases, they can cause the needle (stylus) to skip over a series of grooves, or worse yet, cause the needle to skip backwards, creating an unintentional locked groove that repeats the same 1.8 seconds (at 33⅓ RPM) or 1.3 seconds (at 45 RPM) of track over and over again. Locked grooves are not uncommon and are even heard occasionally in broadcasts. The",
"of pop music production methods. Flanging is added to electric guitar and keyboard parts. Other magnetic tape artifacts include wow, flutter, saturation, hiss, noise, and print-through.\nIt is valid to consider the genuine surface noise such as pops and clicks that are audible when a vintage vinyl recording is played back or recorded onto another medium as sonic artifacts, although not all sonic artifacts must contain in their meaning or production a sense of \"past\", more so a sense of \"by-product\". Other vinyl record artifacts include turntable rumble, ticks, crackles and groove echos.\nIn the Nyquist–Shannon sampling theorem, inadequate sampling bandwidth creates",
"me [...] That record was more just a collection of twenty different home recordings, whereas the montage work I'm doing now is like a thousand sounds in one minute. Now I'm able to go out into the world with my field recorder, record sounds, and bring them home to collage on the computer. The raw sounds can really move and come alive that way. I love the idea of a record containing an entire universe; where the sounds span decades of recording from all over the world and all sorts of different sources.\"",
"of analogous materials. Sound recordings The collection includes material on phonograph records, audio tapes, and cassettes. The first recordings, which were on wax cylinders, were made between 1912 and 1914 by the Finnish folklorist A. O. Väisänen (1890–1969). The main data carriers are DATs and Mini discs which have been used since 1995 and memory cards since the beginning of 2000. From 1992 Jaan Tamm – a sound engineer in the Estonian Folklore Archives – worked on digitalizing the earlier tape recordings. Older collections of sound recordings contain recordings of instrumental music performed on older instruments. In the 20th century,",
"their characteristic square center hole came in three sizes, 6 inches (known as \"Mail Chute\") that played for fifteen minutes per side, a 5-inch disc with 10 minutes of recording time per side, and 4-inch \"Memo Discs\" with eight minutes of recording time. The soft vinyl medium limited the number of times a disc could be played back without degradation of the audio quality.\nA SoundScriber is a plot device in the 1952 Joan Crawford film Sudden Fear.",
"earlier part to form a circle. The sound is encoded by fine variations in the edges of the groove that cause a stylus (needle) placed in it to vibrate at acoustic frequencies when the disc is rotated at the correct speed. Generally, the outer and inner parts of the groove bear no intended sound (exceptions include the Beatles' Sgt. Pepper's Lonely Hearts Club Band and Split Enz's Mental Notes).\nIncreasingly from the early 20th century, and almost exclusively since the 1920s, both sides of the record have been used to carry the grooves. Occasional records have been issued since then with",
"substantial results. Phonograph/Gramophone The phonograph, invented by Thomas Edison in 1877, could both record sound and play it back. The earliest type of phonograph sold recorded on a thin sheet of tinfoil wrapped around a grooved metal cylinder. A stylus connected to a sound-vibrated diaphragm indented the foil into the groove as the cylinder rotated. The stylus vibration was at a right angle to the recording surface, so the depth of the indentation varied with the audio-frequency changes in air pressure that carried the sound. This arrangement is known as vertical or \"hill-and-dale\" recording. The sound could be played back",
"to imitate this membrane and caused it, by vibrating, to make and break the circuit of an electric current, he would be able through the magnetic power of the interrupted current to reproduce the original sounds at a distance.\nDuring 1837-38 Professor Page of Massachusetts had discovered that a needle or thin bar of iron, placed in the hollow of a coil or bobbin of insulated wire, would emit an audible 'tick' at each interruption of a current, flowing in the coil, and if these separate ticks followed each other fast enough, by a rapid interruption of the current, they would",
"a different way, really. Just the sound of it, the machine, is really strange... Keeping space in the record was really a conscious thing. I really wanted to put more space in there.\" These textures are also on the record given that Stott enjoyed sounds that tried to be organic but were actually fake. With this in mind, Stott presented the humanity of the otherwise synthetic sounds through his disruptive and surreal use of the Triton's pitch bending feature. Composition Too Many Voices is primarily influenced by early grime, the works of This Mortal Coil and Dead Can Dance, and",
"idea, and it was not until 1887 that yet another inventor, Emile Berliner, actually photoengraved a phonautograph recording into metal and played it back.\nScott's early recordings languished in French archives until 2008, when scholars keen to resurrect the sounds captured in these and other types of early experimental recordings tracked them down. Rather than using rough 19th century technology to create playable versions, they were scanned into a computer and software was used to convert their sound-modulated traces into digital audio files. Brief excerpts from two French songs and a recitation in Italian, all recorded in 1860, are the most",
"white noise.\nOnce each sound had been created, it was modified. Some sounds were created at all the required pitches direct from the oscillators, others had to be repitched later by adjusting the tape playback speed and re-recording the sound onto another tape player. This process continued until every sound was available at all the required pitches. To create dynamics, the notes were re-recorded at slightly different levels.\nEach individual note was then trimmed to length by cutting the tape, and stuck together in the right order. This was done for each \"line\" in the music – the main plucked bass, the",
"Soundscape, two members, Peter Huse and Bruce Davis, embarked on a tour across Canada in 1973, in an effort to document the changing soundscape and preserve dying sounds becoming obsolete due to new technology. The types of sounds recorded on this project included natural ambiences, signifiers such as bells, chimes and foghorns, as well as mechanical and industrial sounds. The recordings are typically long uninterrupted takes and do not attempt to mask the presence of the recordists. Much of the recordings consist of Huse and Davis asking for directions or interacting with the people they encounter in the sound environments",
"phonograph patent, and the Bell and [Charles Sumner] Tainter patent of 1886 was the method of recording. Edison's method was to indent the sound waves on a piece of tin-foil, while Bell and Tainter's invention called for cutting, or \"engraving\", the sound waves into a wax record with a sharp recording stylus. \nAmong the later improvements by the Volta Associates, the Graphophone used a cutting stylus to create lateral zig-zag grooves of uniform depth into the wax-coated cardboard cylinders, rather than the up-and-down vertically-cut grooves of Edison's contemporary phonograph machine designs. \nNotably, Bell and Tainter developed wax-coated cardboard cylinders for",
"were then recorded onto vinyl records before manipulating them on record decks to sample. In order to create a vintage sound, Barrow said that they distressed the vinyl records they had recorded by \"putting them on the studio floor and walking across them and using them like skateboard\", and they also recorded the sound through a broken amplifier. For the track \"Sour Times\", the album samples Lalo Schifrin's \"The Danube Incident\" and Smokey Brooks' (Henry Brooks, Otis Turner) \"Spin It Jig\"; for \"Strangers\", Weather Report's (Wayne Shorter) \"Elegant People\"; for \"Wandering Star\", War's \"Magic Mountain\"; for \"Biscuit\", Johnnie Ray's",
"flakes of magnetic material were scraped away by the reader head, wiping out portions of the music and changing the character and sound of the loops as they progressed, the recording process playing an inadvertent witness to the destruction of Basinski's old music.\n\nIn essence, Basinski is improvising using nothing so much as the passage of time as his instrument, and the result is the most amazing piece of processmusic I've ever heard, an encompassing soundworld as lulling as it is apocalyptic.\nThe process art movement and the environmental art movement are directly related:\nProcess Artists engage the primacy of organic systems, using",
"passing over tape heads to read, write or erase as it moves. Audio recording Magnetic tape was invented for recording sound by Fritz Pfleumer in 1928 in Germany, based on the invention of magnetic wire recording by Oberlin Smith in 1888 and Valdemar Poulsen in 1898. Pfleumer's invention used a ferric oxide (Fe\n₂O\n₃) powder coating on a long strip of paper. This invention was further developed by the German electronics company AEG, which manufactured the recording machines and BASF, which manufactured the tape. In 1933, working for AEG, Eduard Schuller developed the ring-shaped tape head. Previous head designs were needle-shaped",
"device, called the microphone diaphragm. That sound causes the microphone diaphragm, which is connected to a small metal needle, to vibrate. The needle then vibrates in the same way, causing its sharp tip to etch a distinctive groove into a cylinder, which was made out of tinfoil. Playback In order to playback the sound recorded on one of the tinfoil cylinders, the recording process is essentially reversed. As the cylinder spins, the needle follows the groove created by the previous recording session. This causes the needle to vibrate, and then the diaphragm. This vibration comes",
"spaces as resonating bodies to create sounds. Different methods are used to produce the sounds, including hitting columns with metal rods, strapping vibrating motors to girders, and blowing air through pipes. The sounds often resemble musical instruments, including organs, flutes.",
"with metal beads or seeds and then both halves are fitted together. Another sound can be made by holding the shaker in the palm of the hand tightly, then opening it whilst shaking it up and down. This makes a whirling sound not possible with other percussion instruments.",
"produced a sound all its own. When she left the room he was intrigued by the sound the vinyl made when manipulated in this fashion. After months of experimentation, he introduced this technique at a party and thus scratching was born. Many forms of popular music have used the technique.\nA dramatization of Theodore’s invention of the record scratch was featured on Comedy Central’s television show “Drunk History”, narrated by Questlove. Career In the early 1980s, Theodore was a part of the group Grandwizard Theodore & the Fantastic Five. They released \"Can I Get a Soul Clap\" in 1982. He was",
"it breaches the speed of sound, more than 30 times the speed of the initial movement in the handle. The crack is thus a small sonic boom. Whips were the first man-made objects to break the sound barrier.\nMost stick type whips cannot make a crack by themselves, unless they either have a very long lash, such as a longe whip, or are very flexible with a moderately long lash, like certain styles of buggy whip. But any design can be banged against another object, such as leather boot, to make a loud noise. Short, stiff crops often have a",
"opens the channel while moving the record backwards creating a more controlled sounding \"baby scratch\". Done in quick succession it sounds as though a chirp sound is being produced. Stab A \"stab\" is quite similar to the Chirp technique but requires the crossfade mixer to be \"closed\". The stab requires the user to push the record forward and back quickly and moving the crossfade mixer with your thumb pressed against it, which results in minimal sound coming out, producing a sharp \"stabbing\" noise\". Crab A \"crab\" is a type of scratch used by turntablists. It was invented by DJ Qbert.",
"Kraakdoos A kraakdoos or cracklebox is a custom-made instrument, in the form of a noise-making electronic device. It is a small box with six metal contacts on top, which generate various unusual sounds and tones when pressed by the performer's fingers. The human body becomes a part of the circuit and determines the range of sounds possible, thus different people shall generate different results.\nThe concept was first conceived by Michel Waisvisz and Geert Hamelberg in the 1960s, and developed further in the 1970s when Waisvisz joined the STEIM foundation in Amsterdam, Netherlands. The kraakdoos is a simple device, based on",
"concept has been extended to the production of records consisting entirely of circular multiple bands to provide collections of infinite loop sound samples of duration limited to one revolution of the disc. Notable examples of this are the releases from RRRecords of the 7-inch RRR-100 (with 100 individual bands) and the 12-inch RRR-500 (with 500 bands) and RRR-1000 (with 1000 bands.) Sound recorded in locked grooves Most records have a locked groove at the end of each side or individual band. It is usually a silent loop that keeps the needle and tonearm from drifting into the label area. However,",
"is often used to describe a person or thing that continually repeats itself. Locked grooves are not uncommon and were even heard occasionally in radio broadcasts.\nVinyl records can be warped by heat, improper storage, exposure to sunlight, or manufacturing defects such as excessively tight plastic shrinkwrap on the album cover. A small degree of warp was common, and allowing for it was part of the art of turntable and tonearm design. \"Wow\" (once-per-revolution pitch variation) could result from warp, or from a spindle hole that was not precisely centered. Standard practice for LPs was to place the LP in a",
"the recording or playback stylus. It was then wound onto a second reel. The sharp recording stylus, actuated by a sound-vibrated mica diaphragm, engraved a groove into the wax coating. In playback mode, a dull, loosely mounted stylus attached to a rubber diaphragm rode in the recorded groove. The reproduced sound was heard through rubber listening tubes like those of a stethoscope.\nThe position of the recording and reproducing heads, mounted alternately on the same two posts, could be adjusted so that several recordings could be cut on the same wax-coated strip. Although the machine was never developed commercially, it is",
"of recording music. The initial musical pieces were formed of sound manipulation using tape recorders.\nTovey began experimenting using an old Grundig tape recorder. He disconnected the erase head from the playback head and installed a simple switch between the two. This gave him control over what sounds could be erased or kept. He spent a lot of time building up sound collages using this method. After finishing full-time education Tovey began working at various day jobs and around the mid seventies managed to set up his own home studio. At the time he was living in London, in a small",
"the sounds into entirely new forms, like rusted copper piping stripped out of an abandoned building and melted down into shiny, interwoven wiring.\" The recordings were influenced by Chilean-French mystic and filmmaker Alejandro Jodorowsky, and the cover shows a distorted image of the recently deceased Japanese Butoh dancer Kazuo Ohno."
] |
If we know the algorithm behind a hash algorithm, how is it not cracked? | [
"So there's two questions here: encryption and hashes. I'll explain them both. \n\nIf I tell you that a number divided by 12 has a remainder of 7, you can't know for sure that the original number was 31 even though you know exactly what I did to get the answer. That's because modulo (getting the remainder of a division problem) is a one-way function: there's no way to get the original from the result. Hashes are all one-way functions. But unlike modulo division, the formula is so complex that we don't know a way to find answers other than guess-and-check, and instead of twelve possible answers, there are something like 13407807929942597099574024998205846127479365820592393377723561443721764030073546976801874298166903427690031858186486050853753882811946569946433649006084096 possible answers, so checking different things to see if they give you the right hash is not feasible unless you have a few centuries. If someone does find a faster way to find solutions for a hash, we consider the hash \"broken\" and we switch to using a different algorithm- this happened to MD5, for example.\n\nIn the case of actual encryption, which is designed to be decrypted at some point, there's a missing secret number from the formula that you need to do the decryption.",
"Hashes are one-way functions. They're designed specifically so that you can't \"solve for the other side of the equation\" and run them in reverse. You can turn a cow into hamburger. You can't turn a hamburger into a cow. \n\nAlso, since the input to any hashing algorithm is infinite and the output is finite, the output of any hashing algorithm has a potentially infinite number of corrosponding inputs. So if you were to reverse the algorithm and run it for some value, you'd get an infinite number of inputs that could generate that value.",
"Ok so instead of using a proper hashing algorithm let's use something you're probably more familiar with: averaging. So to hash our input we'll just average the digits together and then round up to the nearest integer, for example input \"12345\" will be hashed to \"3\".\n\nMore examples: \"67890\" hashes to \"6\", \"34845\" hashes to \"5\", and \"14128\" hashes to \"4\". \n\nWe can use this \"algorithm\" for any length input to return a single-digit hash. For example, input \"88412695821\" hashes to \"5\".\n\nOk... so now you know our little \"algorithm\" pretty thoroughly, correct? \n\nSo let me give you a hash I made: \"8\". Crack it and tell me what the original input value was. \n\nYou can't do it. Even though you have full knowledge of how the algorithm works you still don't have enough information to reverse it back to its original value. Sure... I'm sure you could find lots of number sequences that would average out to 8 (especially since we use the \"round up to the nearest integer\" rule), but you have no way at all to know if the numbers you chose were the actual original numbers I used."
] | [
"hash table or rainbow table. If the look-up is considerably faster than the hash function (which it often is), this will considerably speed up cracking the file. However, if the password file is salted, then the hash table or rainbow table would have to contain \"salt . password\" pre-hashed. If the salt is long enough and sufficiently random, this is very unlikely. Unsalted passwords chosen by humans tend to be vulnerable to dictionary attacks since they have to be both short and meaningful enough to be memorized. Even a small dictionary (or its hashed equivalent, a hash table) is",
"algorithm is also referred to as a \"message digest\" or a \"check sum\". Hashing is good for determining if information has been changed in transmission. If the hash value is different upon reception than upon sending, there is evidence the message has been altered. Once the algorithm has been applied to the data to be hashed, the hash function produces a fixed-length output. Essentially, anything passed through the hash function should resolve to the same length output as anything else passed through the same hash function. It is important to note that hashing is not the same as encrypting. Hashing",
"Consistent hashing In computer science, consistent hashing is a special kind of hashing such that when a hash table is resized, only keys need to be remapped on average, where is the number of keys, and is the number of slots. In contrast, in most traditional hash tables, a change in the number of array slots causes nearly all keys to be remapped because the mapping between the keys and the slots is defined by a modular operation.\nConsistent hashing achieves some of the goals of rendezvous hashing (also called HRW Hashing), which is more general, since",
"with the hash. The salt is combined with the password when computing the hash, so an attacker precomputing a rainbow table would have to store for each password its hash with every possible salt value. This becomes infeasible if the salt has a big enough range, say a 32-bit number. Unfortunately, many authentication systems in common use do not employ salts and rainbow tables are available on the Internet for several such systems. Entropy as a measure of password strength It is usual in the computer industry to specify password strength in terms of information entropy which is measured in",
"more efficient than cracking). If it is reversibly encrypted then if the attacker gets the decryption key along with the file no cracking is necessary, while if he fails to get the key cracking is not possible. Thus, of the common storage formats for passwords only when passwords have been salted and hashed is cracking both necessary and possible.\nIf a cryptographic hash function is well designed, it is computationally infeasible to reverse the function to recover a plaintext password. An attacker can, however, use widely available tools to attempt to guess the passwords. These tools work by hashing possible passwords",
"Hash consing In computer science, particularly in functional programming, hash consing is a technique used to share values that are structurally equal. The term hash consing originates from implementations of Lisp that attempt to reuse cons cells that have been constructed before, avoiding the penalty of memory allocation. Hash consing is most commonly implemented with hash tables storing weak references that may be garbage-collected when the data stored therein contains no references from outside the table. Hash consing has been shown to give dramatic performance improvements—both space and time—for symbolic and dynamic programming algorithms. An interesting property of hash consing",
"two strings, “hello” and “8571935789325698” can be hashed to the same hash value, “89232323”. This would be effective for an attacker to know because when passwords are stored into a database with their appropriate hashes, the hacker could use the password “8571935789325698” which would allows the hacker to login successfully despite the actual password being “hello”. Although hackers would require time to brute force different passwords to find a hash collision, these hackers could alternatively wait until computational power increases enough to make cracking these hashing collisions faster. In the meantime, they can search around for servers",
"Primary clustering In computer programming, primary clustering is one of two major failure modes of open addressing based hash tables, especially those using linear probing. It occurs after a hash collision causes two of the records in the hash table to hash to the same position, and causes one of the records to be moved to the next location in its probe sequence. Once this happens, the cluster formed by this pair of records is more likely to grow by the addition of even more colliding records, regardless of whether the new records hash to the same location as the",
"hash function is completely unspecified and the table does not resize. With an ideal hash function, a table of size with open addressing has no collisions and holds up to elements with a single comparison for successful lookup, while a table of size with chaining and keys has the minimum collisions and comparisons for lookup. With the worst possible hash function, every insertion causes a collision, and hash tables degenerate to linear search, with amortized comparisons per insertion and up to comparisons for a successful lookup.\nAdding rehashing to this model is straightforward.",
"Collision (computer science) Computer security Although hashing is generally pretty quick and efficient to do, there exists some limitations that can cause problems when it comes to computer security. Although there are some prevention methods being discovered to protect against hashing collisions, hashing is still not a perfect operation.\nWhen it comes to hashing strings, there could be multiple strings that can be hashed to the same value. Hackers can use this knowledge to their advantage to bypass security measures such as username and passwords. According to the example in the website “Learn Cryptography”, we can see that the",
"the matching results are presumed to be proof that the passwords were \"the same.\"\nThe advantages of this method have been that the hashtext can be stored and copied among Unix systems without exposing the corresponding plaintext password to the system administrators or other users. This portability has worked for over 30 years across many generations of computing architecture, and across many versions of Unix from many vendors. Weaknesses of the traditional scheme The traditional DES-based crypt algorithm was originally chosen because DES was resistant to key recovery even in the face of \"known plaintext\" attacks, and because it was computationally",
"checksums in order and hashing the result again using MD4. Otherwise, the MD4 hash of the only chunk of the file is used with no further modifications.\nThis method of hashing allows the recipient to verify that a hash list corresponds to an original eD2k file hash, without the need to actually have the file present on disk.\nIn the past, there has been some ambiguity for files whose size is a multiple of the chunk size (9500 KiB). Old versions of some eD2k hash tools computed file hashes with an additional 0-byte chunk at the end. This is because an ambiguity",
"hashes are much faster to calculate but there is a greater risk of a hash collision. Systems that utilize weak hashes will subsequently calculate a strong hash and will use it as the determining factor to whether it is actually the same data or not. Note that the system overhead associated with calculating and looking up hash values is primarily a function of the deduplication workflow. The reconstitution of files does not require this processing and any incremental performance penalty associated with re-assembly of data chunks is unlikely to impact application performance.\nAnother concern is the interaction of compression and",
"UUHash UUHash is a hash algorithm employed by clients on the FastTrack network. It is employed for its ability to hash very large files in a very short period of time, even on older computers. However, this is achieved by only hashing a fraction of the file. This weakness makes it trivial to create a hash collision, allowing large sections to be completely altered without altering the checksum.\nThis method is used by Kazaa. The weakness of UUHash is exploited by anti-p2p agencies to corrupt downloads. Sig2Dat The name UUHash derives from the sig2dat utility which creates URIs referencing files on",
"hashing functions is that they are often slower to compute, which means that in cases where the uniformity for any size is not necessary, a non-cryptographic hashing function might be preferable. Perfect hash function If all keys are known ahead of time, a perfect hash function can be used to create a perfect hash table that has no collisions. If minimal perfect hashing is used, every location in the hash table can be used as well.\nPerfect hashing allows for constant time lookups in all cases. This is in contrast to most chaining and open addressing methods, where the time",
"MPQ (file format) File indexing In order to meet the requirements of speed generally demanded by a computer game, files are indexed in a hash table using a quick, low-collision hashing algorithm. The index of a specific file within the hash table is the hash of the lowercased filename modulo the size of the hash table, allowing for quick verification of a file's existence within the archive. If multiple files within the archive have the same hash, colliding entries will follow each other in increasing index order (forming a colliding hash cluster). In order to identify the exact entry for",
"known as Zobrist hashing after Albert Zobrist, an American computer scientist, is a method for constructing universal families of hash functions by combining table lookup with XOR operations. This algorithm has proven to be very fast and of high quality for hashing purposes (especially hashing of integer-number keys).\nZobrist hashing was originally introduced as a means of compactly representing chess positions in computer game playing programs. A unique random number was assigned to represent each type of piece (six each for black and white) on each space of the board. Thus a table of 64x12 such numbers is initialized",
"And because the hash is salted with a challenge, Mallory could use it only for one login process. However, Alice wants to give some confidential information to Bob, and she wants to be sure it's Bob and not Mallory.\nFor solving this, Bob has registered himself to a certificate authority (CA), which signed his certificate. Alice could solely rely on that signature system, but she knows it has weaknesses. To give her additional assurance that there is no man-in-the-middle attack, Bob creates a proof that he knows the password (or a salted hash thereof), and includes his certificate into this proof.",
"hash and tells Bob the hash value (whilst keeping the solution secret). Then, when Bob comes up with the solution himself a few days later, Alice can prove that she had the solution earlier by revealing it and having Bob hash it and check that it matches the hash value given to him before. (This is an example of a simple commitment scheme; in actual practice, Alice and Bob will often be computer programs, and the secret would be something less easily spoofed than a claimed puzzle solution). Verifying the integrity of messages and files An important application of secure",
"is known as a hash anchor table. The hashing function is not generally optimized for coverage - raw speed is more desirable. Of course, hash tables experience collisions. Due to this chosen hashing function, we may experience a lot of collisions in usage, so for each entry in the table the VPN is provided to check if it is the searched entry or a collision.\nIn searching for a mapping, the hash anchor table is used. If no entry exists, a page fault occurs. Otherwise, the entry is found. Depending on the architecture, the entry may be placed in the TLB",
"Dynamic perfect hashing In computer science, dynamic perfect hashing is a programming technique for resolving collisions in a hash table data structure.\nWhile more memory-intensive than its hash table counterparts, this technique is useful for situations where fast queries, insertions, and deletions must be made on a large set of elements. FKS Scheme The problem of optimal static hashing was first solved in general by Fredman, Komlós and Szemerédi. In their 1984 paper, they detail a two-tiered hash table scheme in which each bucket of the (first-level) hash table corresponds to a separate second-level hash table. Keys are hashed twice—the first",
"algorithm used by Microsoft, are publicly available. LM hash is particularly vulnerable because passwords longer than 7 characters are broken into two sections, each of which is hashed separately. Choosing a password that is fifteen characters or longer guarantees that an LM hash will not be generated. Common uses Nearly all distributions and variations of Unix, Linux, and BSD use hashes with salts, though many applications use just a hash (typically MD5) with no salt. The Microsoft Windows NT/2000 family uses the LAN Manager and NT LAN Manager hashing method (based on MD4) and is also unsalted, which makes it",
"one of the commonly used variants of the algorithm, the hash table is split into two smaller tables of equal size, and each hash function provides an index into one of these two tables. It is also possible for both hash functions to provide indexes into a single table.\nLookup requires inspection of just two locations in the hash table, which takes constant time in the worst case. This is in contrast to many other hash table algorithms, which may not have a constant worst-case bound on the time to do a lookup. Deletions, also, may be performed by blanking the",
"Hash table Hashing The idea of hashing is to distribute the entries (key/value pairs) across an array of buckets. Given a key, the algorithm computes an index that suggests where the entry can be found:\nindex = f(key, array_size)\nOften this is done in two steps:\nhash = hashfunc(key)\nindex = hash % array_size\nIn this method, the hash is independent of the array size, and it is then reduced to an index (a number between 0 and array_size − 1) using the modulo operator (%).\nIn the case that the array size is a power of two, the remainder operation is reduced to masking, which improves speed, but",
"innovation. The mining process involves identifying a block that, when hashed twice with SHA-256, yields a number smaller than the given difficulty target. While the average work required increases in inverse proportion to the difficulty target, a hash can always be verified by executing a single round of double SHA-256.\nFor the bitcoin timestamp network, a valid proof of work is found by incrementing a nonce until a value is found that gives the block's hash the required number of leading zero bits. Once the hashing has produced a valid result, the block cannot be changed without redoing the work. As",
"are built on an ad hoc basis, where the bits of the message are nicely mixed to produce the hash. Various bitwise operations (e.g. rotations), modular additions and compression functions are used in iterative mode to ensure high complexity and pseudo-randomness of the output. In this way, the security is very hard to prove and the proof is usually not done. Only a few years ago, one of the most popular hash functions, SHA-1, was shown to be less secure than its length suggested: collisions could be found in only 2⁵¹ tests, rather than the brute-force number of 2⁸⁰.\nIn other",
"random corruption. Authenticity verification It is often desirable to verify that a file hasn't been modified in transmission or storage by untrusted parties, for example, to include malicious code such as viruses or backdoors. To verify the authenticity, a classical hash function is not enough as they are not designed to be collision resistant; it is computationally trivial for an attacker to cause deliberate hash collisions, meaning that a malicious change in the file is not detected by a hash comparison. In cryptography, this attack is called a preimage attack.\nFor this purpose, cryptographic hash functions are employed often. As",
"and comparing the result of each guess to the actual password hashes. If the attacker finds a match, they know that their guess is the actual password for the associated user.\nPassword cracking tools can operate by brute force (i.e. trying every possible combination of characters) or by hashing every word from a list; large lists of possible passwords in many languages are widely available on the Internet. The existence of password cracking tools allows attackers to easily recover poorly chosen passwords. In particular, attackers can quickly recover passwords that are short, dictionary words, simple variations on dictionary words or that",
"its index is a simple, constant-time operation. Therefore, the average overhead of an operation for a hash table is only the computation of the key's hash, combined with accessing the corresponding bucket within the array. As such, hash tables usually perform in O(1) time, and outperform alternatives in most situations.\nHash tables need to be able to handle collisions: when the hash function maps two different keys to the same bucket of the array. The two most widespread approaches to this problem are separate chaining and open addressing. In separate chaining, the array does not store the value itself but stores",
"new item into a multimap and a hash collision occurs, the multimap unconditionally stores both items.\nWhen storing a new item into a typical associative array and a hash collision occurs, but the actual keys themselves are different, the associative array likewise stores both items. However, if the key of the new item exactly matches the key of an old item, the associative array typically erases the old item and overwrites it with the new item, so every item in the table has a unique key. Database indexing Hash tables may also be used as disk-based data structures and database indices"
] |
What does an economic crash actually look like? | [
"A lot of those predictions are not very specific as to how this would actually play out.\n\nFirst things first, the level of debt the US government is in is considerable but by no means exceptional. A lot of countries carry similar levels of debt and do fine. As long as you can service the debt, there's no cause for panic. Only some of the debt is held by foreign countries (a lot of it is held by US citizens), and those who own US IOUs can't just decide to collect on the debt. There's a schedule for when it interest payments need to be made and an end date for when the bonds are to be repaid. So no, a foreign takeover is not on the cards.\n\nAs for the economic breakdown scenario itself, the economy is based on the productivity of companies and people. Regardless of what happens with the Dollar or government debt, as long as bricklayers lay bricks and farmers grow food, there isn't going to be an economic meltdown. A doomsday scenario in which the economy grinds to a halt would only be possible if people can no longer do their jobs and companies can no longer operate for some reason. As far as I can tell, this would require a major infrastructure breakdown, like banks no longer being able to function, power plants being switched off or communication networks breaking down.",
"A lot of people selling things at once and/or a lot of people defaulting on their loans at once.\n\nFor example, when gold crashes we'll see a lot of people wanting to sell it and not many people wanting to buy it. High supply + low demand = > lower prices. People sell their gold \"at a discount\" and then the next person has to sell at a deeper \"discount\", and the price falls.\n\nAnother form (see: 2008 housing crisis) is people not being able to pay their debts, which means the lender doesn't have the cash to pay their own debts, which means their lender doesn't have money to pay their own debts, this leads to people and banks selling off assets \"at a discount\" to try to raise cash, leading to the same downward spiral as above."
] | [
"Economic collapse Cases There are few well documented cases of economic collapse. One of the best documented cases of collapse or near collapse is the Great Depression, the causes of which are still being debated.\n\"To understand the Great Depression is the Holy Grail of macroeconomics.\" —Ben Bernanke (1995)\nBernanke's comment addresses the difficulty of identifying specific causes when many factors may each have contributed to various extents.\nPast economic collapses have had political as well as financial causes. Persistent trade deficits, wars, revolutions, famines, depletion of important resources, and government-induced hyperinflation have been listed as causes.\nIn some cases blockades and embargoes caused",
"the eve of a larger socioeconomic crisis, Chen Ping keenly observed and pointed out that the 2008 crash was not the same as previous capitalist cyclical economic crises. Rather, it was the crash of a global development model that plunged its corresponding values and social systems into a deep dilemma. In other words, since the crisis of the US subprime mortgage system, the growth model of the globalized modern industrial civilization has come to an end.\n“A mature capitalist society based on universal values should not only acknowledge that people are born equal, but also grant them equal access to information",
"crash is by no means the sole event that contributed to the depression. The Wall Street Crash is usually seen as having the greatest impact on the events that followed and therefore is widely regarded as signaling the downward economic slide that initiated the Great Depression. True or not, the consequences were dire for almost everybody. Most academic experts agree on one aspect of the crash: It wiped out billions of dollars of wealth in one day, and this immediately depressed consumer buying.\nThe failure set off a worldwide run on US gold deposits (i.e. the dollar), and forced the Federal",
"Stock market crash A stock market crash is a sudden dramatic decline of stock prices across a significant cross-section of a stock market, resulting in a significant loss of paper wealth. Crashes are driven by panic as much as by underlying economic factors. They often follow speculative stock market bubbles.\nStock market crashes are social phenomena where external economic events combine with crowd behavior and psychology in a positive feedback loop where selling by some market participants drives more market participants to sell. Generally speaking, crashes usually occur under the following conditions: a prolonged period of declining stock prices and excessive",
"The Great Crash, 1929 The Great Crash, 1929 is a book written by John Kenneth Galbraith and published in 1955. It is an economic history of the lead-up to the Wall Street Crash of 1929. The book argues that the 1929 stock market crash was precipitated by rampant speculation in the stock market, that the common denominator of all speculative episodes is the belief of participants that they can become rich without work and that the tendency towards recurrent speculative orgy serves no useful purpose, but rather is deeply damaging to an economy. It was Galbraith's belief that a",
"economic optimism, a market where P/E ratios (Price-Earning ratio) exceed long-term averages, and extensive use of margin debt and leverage by market participants. Other aspects such as wars, large-corporation hacks, changes in federal laws and regulations, and natural disasters of highly economically productive areas may also influence a significant decline in the stock market value of a wide range of stocks. All such stock drops may result in the rise of stock prices for corporations competing against the affected corporations.\nThere is no numerically specific definition of a stock market crash but the term commonly applies to steep double-digit percentage losses",
"buy (examples: the mezzanine tranche of a CDO-squared; a CDS on a synthetic CDO,...), big mistakes can be made--especially if rating agencies tell you they are triple-A, to wit, safe enough for grandma. When the crash comes, losses may therefore be much larger than investors dreamed imaginable. Markets may dry up as no one knows what these securities are really worth. Panic may set in. Thus complexity per se is a source of risk.\"",
"never occur.\nWell-known examples of bubbles (or purported bubbles) and crashes in stock prices and other asset prices include the 17th century Dutch tulip mania, the 18th century South Sea Bubble, the Wall Street Crash of 1929, the Japanese property bubble of the 1980s, the crash of the dot-com bubble in 2000–2001, and the now-deflating United States housing bubble. The 2000s sparked a real estate bubble where housing prices were increasing significantly as an asset good. International financial crisis When a country that maintains a fixed exchange rate is suddenly forced to devalue its currency due to accruing an unsustainable current",
"economic danger was not events on the day of the crash itself, but the potential for \"spreading collapse of securities firms\" if an extended liquidity crisis in the securities industry began to threaten the solvency and viability of brokerage houses and designated market makers (also known as \"specialists\"). This possibility first loomed on the day after the crash. At least initially, there was a very real risk that these institutions could fail. If that happened, spillover effects could sweep over the entire financial system, with negative consequences for the real economy as a whole. \nThe source of these liquidity problems",
"stock market crash and the Great Depression formed the largest financial crisis of the 20th century. The panic of October 1929 has come to serve as a symbol of the economic contraction that gripped the world during the next decade. The falls in share prices on October 24 and 29, 1929 were practically instantaneous in all financial markets, except Japan.\nThe Wall Street Crash had a major impact on the U.S. and world economy, and it has been the source of intense academic historical, economic, and political debate from its aftermath until the present day. Some people believed that abuses by",
"I think we are achieving that.\"\nMuch of the debate also took place on the Michael Roberts blog page. In 2018, Roberts & Carchedi published a joint book, titled World in Crisis: Marxist Perspectives on Crash & Crisis, which is billed \"the most comprehensive empirically-based defense of Marx’s law of profitability, as the cause of capitalist crises.\" Underlying causes Profitability may be observed to fall, along with other variables, but that says nothing about the true interrelationship of the determinants which explain why it falls. David Harvey stated: \"Data that show a falling rate of profit do not necessarily confirm the",
"new class of assets (for example, stock in \"dot com\" companies) profit from rising asset values as other investors learn about the innovation (in our example, as others learn about the potential of the Internet), then still more others may follow their example, driving the price even higher as they rush to buy in hopes of similar profits. If such \"herd behaviour\" causes prices to spiral up far above the true value of the assets, a crash may become inevitable. If for any reason the price briefly falls, so that investors realize that further gains are not assured, then the",
"the time of the crash that a depression was starting. They asked, \"Can a very serious Stock Exchange collapse produce a serious setback to industry when industrial production is for the most part in a healthy and balanced condition?\" They argued that there must be some setback, but there was not yet sufficient evidence to prove that it would be long or would necessarily produce a general industrial depression.\nHowever, The Economist also cautioned that some bank failures were also to be expected and some banks may not have had any reserves left for financing commercial and industrial enterprises. It concluded",
"psychological effects of the crash reverberated across the nation as businesses became aware of the difficulties in securing capital market investments for new projects and expansions. Business uncertainty naturally affects job security for employees, and as the American worker (the consumer) faced uncertainty with regards to income, naturally the propensity to consume declined. The decline in stock prices caused bankruptcies and severe macroeconomic difficulties, including contraction of credit, business closures, firing of workers, bank failures, decline of the money supply, and other economically depressing events.\nThe resultant rise of mass unemployment is seen as a result of the crash, although the",
"the crack that started the avalanche'.\nResearch at the Massachusetts Institute of Technology suggests that there is evidence the frequency of stock market crashes follows an inverse cubic power law. This and other studies such as Prof. Didier Sornette's work suggest that stock market crashes are a sign of self-organized criticality in financial markets. In 1963, Mandelbrot proposed that instead of following a strict random walk, stock price variations executed a Lévy flight. A Lévy flight is a random walk that is occasionally disrupted by large movements. In 1995, Rosario Mantegna and Gene Stanley analyzed a million records of the S&P",
"that the position of the banks was the key to the situation, but what was going to happen could not have been foreseen.\nSome academics view the Wall Street Crash of 1929 as part of a historical process that was a part of the new theories of boom and bust. According to economists such as Joseph Schumpeter, Nikolai Kondratiev and Charles E. Mitchell, the crash was merely a historical event in the continuing process known as economic cycles. The impact of the crash was merely to increase the speed at which the cycle proceeded to its next level.\nMilton Friedman's A Monetary",
"country spent two months with declining GDP, it was not until the Wall Street Crash in October 1929 that the effects of a declining economy were felt, and a major worldwide economic downturn ensued.\nAlthough its causes are still uncertain and controversial, the net effect was a sudden and general loss of confidence in the economic future. The market crash marked the beginning of a decade of high unemployment, poverty, low profits, deflation, plunging farm incomes, and lost opportunities for economic growth and personal advancement. .",
"the economy encounters a shock.",
"i.e. the lapse of time between the moment that the shock began to affect the economy and the moment that economic (monetary and fiscal) policy as well as the regulatory policy are altered and put into effect in response to the shock to various markets: goods market (real GDP), the labor market (unemployment rate), money market (interest rate and inflation), and the financial (stock and bond) market. Indeed, moderate financial panic occurred driven—at least partially—by the fear that other investors are about to panic and sell. There were falls in stock and bond market prices, and rises in nominal interest",
"crash,” causing a temporary but significant dip in the market.",
"slipping since summer 1929 and the crash ratified it; the third group says that in either scenario the crash could not have caused more than a recession. There was a brief recovery in the market into April 1930, but prices then started falling steadily again from there, not reaching a final bottom until July 1932. This was the largest long-term U.S. market decline by any measure. To move from a recession in 1930 to a deep depression in 1931–32, entirely different factors had to be in play. Population dynamics In 1939, prominent economist Alvin Hansen discussed the decline in population",
"This research indicates that it is the internal structure of the market, not external crises, which is primarily responsible for crashes. The number of different stocks that move up or down together were shown to be an indicator of the mimicry within the market, how much investors look to one another for cues. When the mimicry is high, many stocks follow each other's movements - a prime reason for panic to take hold. It was shown that a dramatic increase in market mimicry occurred during the entire year before each market crash of the past 25 years, including the financial",
"analysts have also tried to look for external triggering events. Aside from the general worries of stock market overvaluation, blame for the collapse has been apportioned to such factors as program trading, portfolio insurance and derivatives, and prior news of worsening economic indicators (i.e. a large U.S. merchandise trade deficit and a falling U.S. dollar, which seemed to imply future interest rate hikes).\nOne of the consequences of the 1987 Crash was the introduction of the circuit breaker or trading curb on the NYSE. Based upon the idea that a cooling off period would help dissipate investor panic, these mandatory market",
"price recovery. Conversely, rapid price falls in response to adverse news (e.g. disappointing earnings announcements) which do not rapidly revert are not generally characterized as flash crashes.",
"Once the bubble bursts, the fall in prices causes the collapse of unsustainable investment schemes (especially speculative and/or Ponzi investments, but not exclusively so), which leads to a crisis of consumer (and investor) confidence that may result in a financial panic and/or financial crisis; if there is monetary authority like a central bank, it may be forced to take a number of measures in order to soak up the liquidity in the financial system or risk a collapse of its currency. This may involve actions like bailouts of the financial system, but also others that reverse the trend of",
"other's cues, it is easier for panic to take hold and affect the market. This work is a mathematical demonstration of a significant advance warning sign of impending market crashes.\nA recent phenomenon, known as the RR Reversal, has also been well documented in recent years – where a rapidly increasing stock experiences an inexplicable and sudden pullback to the magnitude of 10 – 40% within a month. Panic of 1907 In 1907 and in 1908, the NYSE fell by nearly 50% due to a variety of factors, led by the manipulation of copper stocks by the Knickerbocker company. Shares of",
"Wall Street Crash of 1929 The Wall Street Crash of 1929, also known as the Stock Market Crash of 1929 or the Great Crash, was a major stock market crash that occurred in late October 1929. It started on October 24 (\"Black Thursday\") and continued until October 29, 1929 (\"Black Tuesday\"), when share prices on the New York Stock Exchange collapsed.\nIt was the most devastating stock market crash in the history of the United States, when taking into consideration the full extent and duration of its after effects. The crash, which followed the London Stock Exchange's crash of September, signaled",
"Crash Proof Description The book, published in 2007, just before the 2008 financial crisis predicted an imminent decline in the value of the American dollar and advised investment in foreign securities and precious metals. After the recession of 2008, he published an updated version of the book called Crash Proof 2.0 which in January 2010 was listed on the New York Times best-seller list.",
"lose up to 87 percent of their value. The crash resulted in new regulations being announced in August 2014. Minimum trading prices of 0.20 cents per share would be introduced, short positions would be required to be reported, and a 5 percent collateral levy implemented. The exchange said the measures were to curb excessive speculation and potential share price manipulation.\nTwo short-lived (less than a second) movements (more than 1%) in several (40 and 88) stock prices followed by recovery were reported for November 25, 2014. Significance of recovery Events described as flash crashes typically exhibit a rapid partial or total",
"others have submitted different ideas regarding rare disasters' impact on other economic phenomenon. However, many economists remain skeptical of how much rare disasters really explain the equity premium and Mehra still expresses doubt as to the validity of the theory. Controversy Rajnish Mehra was skeptical of Reitz's claim that rare disasters explain the equity premium and real interest rate behavior, because the rare disaster that Rietz had specified had never occurred in the U.S. Rietz suggested 25 to 97% drops, but this has never happened in the United States. Even if this were true, there are several other flaws regarding"
] |
Real world and theoretical instances of sci-fi weapons. | [
"lasers are just really coherent light. They go through space and hit anything and everything in their way and scatter or absorb into that stuff, thus imparting energy. Normally you don't see it, they travel through lots of things like glass and air, but, photons being both a particle and a wave at the same time can't be treated as purely fast flying ping-pong balls. Due to their wave nature they have a CHANCE to interact with any atom they come across. As an example, take a microwave. There is metal sheet with the little round holes in it infront of the glass window. Microwaves have very little chance of bouncing off the glass, and would just fly out and fry you. But, the metal plate in the window blocks (absorbs/reflects) the microwaves. But, because the wavelength of the microwaves dictates the chance of interaction, you can drill holes in the metal and still have a very high chance to interact with the microwave photons, thus letting you see into the microwave, while not getting fried by it. But here's the thing, you get the laser bright enough and two things happen: 1) objects being interacted with get the power input into the laser [imparted onto them at a distance](_URL_0_) this will melt, vaporize, or turn to plasma the material just as if you'd applied an equally powerful flame to it. 2) The tiny probability that a laser photon will interact with some materials (like air or glass) stops protecting the material, as .1% of interaction combined with something like a 1MWatt laser would still be 1KWatt of power on average applied. Thus lasers can turn just about anything into a plasma if they're bright enough, even mirrors, [air](_URL_1_), or anything else you put in the way.\n\nOn your final notes: Masers, same thing as lasers just using a different frequency that can be easier to generate at some power levels. Radiation guns, tesla cannons, arc-weapons, are all the same ideas as any other weapon. It's all about getting energy to the target. They're all more fancy energy-tossing weapons that tossing out radiation (electromagnetic energy like a laser) and radioactive particles (like your particle accelerator) and free-electrons (ready to chemically interact with their target, breaking bonds and reducing the strength or functionality of the target material or lifeform)."
] | [
"Weapons in science fiction Strange and exotic weapons are a recurring feature in science fiction. In some cases, weapons first introduced in science fiction have been made a reality; other science fiction weapons remain purely fictional, and are often beyond the realms of known physical possibility.\nAt its most prosaic, science fiction features an endless variety of sidearms—mostly variations on real weapons such as guns and swords. Among the best-known of these are the phaser—used in the Star Trek television series, films and novels—and the lightsaber and blaster—featured in Star Wars movies, comics, novels and TV shows.\nBesides adding action and entertainment",
"other innovative sci-fi technologies are included, for example: Artificial Gills, Still Suits, medical and anti-aging drugs, Electro-Binoculars (1000 Lightyears range), ECM for communication and sensorscans, belt-size personal force-screen generators, power assisted personal armour, grav/jump belts, robots of every type, laser/blaster guns, laserswords & lightswords, anti-robot positronic brain disruptors (APROBDIF), etc. Combat System Combat is generally a four-step process. One first determines if a character scores a hit with his chosen weapon. Things like range, size of the target, movement, and amount of cover come into play. If one scores a hit, then one rolls to determine hit location. After hit",
"the best aim point and the precise moment to automatically fire the weapon. Fictional guns Due to the difficulties involved in developing such a system, the weapon is still mainly fictional, being common in Cyberpunk and other science fiction genres. The science fiction concept of a smartgun has its origins in much earlier works of military science fiction, such as Starship Troopers and The Forever War. The term \"smartgun\" as applied to such systems appears in popular culture at least as early as the 1980s. \nAliens demonstrated its capabilities with the M56 Smartgun, a handheld light machine gun. This weapon",
"most other science-fiction games. Sure, there are spaceships, lasers, and plasma guns, but in WH40K these marvels are treated more like fantasy magical devices than like plausible developments of modern technology.\" Rolston then wrote a lengthy article showing how this miniatures game could be converted to a role-playing system. He thought the mixture of sf and fantasy lended itself to role-playing, saying, \"this choice of a future-fanatasy theme has two appealing features as a role-playing setting. First, a future fantasy frees the game master (GM) from the challenging task of moderating and maintaining a plausible science-fictional universe... [and] you can",
"roleplaying games Science fiction Science fiction settings are inspired by science fiction literature. The setting is generally in the future, sometimes near future but also quite often in the far future, though in many cases the setting bears no connection to the world we live in, e.g. Star Wars. Common elements involve futuristic technology, contact with alien life forms, experimental societies, and space travel. Psionic abilities (i.e. ESP and telekinesis) often take the place of magic. The genre can be divided similarly with science fiction literature into subgenres, such as cyberpunk or space opera.\nScience fiction settings for role playing were",
"major departure from her nanotech novels, mixing elements of historical fiction with the alternate history subgenre of science fiction. There is no mention of nanotech in the book, though it does deal with other technology both real and theoretical throughout the novel. In War Times is centered on secret technologies used during the war and extrapolates on what might have happened if some of those had surpassed atomic tech and created a lasting peace instead of a Cold War. Without ever using the specific term, Goonan clearly considers the concept of the multiverse first postulated by American philosopher and psychologist",
"Strike and UFO—not to be confused with UFO: Enemy Unknown by MicroProse—series; as well as stand-alone titles like Nexus: The Jupiter Incident, Joint Task Force, and Codename: Panzers. Fantastical While most fantasy titles bear some resemblance to a historical period (usually medieval), they also incorporate fictional creatures, areas, and/or magic, and are limited by few historical constraints.\nThe leading High Fantasy real-time tactics games belong to the Warhammer Fantasy Battle series. This loose series began with one of the earliest mainstream real-time tactics games, Warhammer: Shadow of the Horned Rat (1995). While the game's depth of tactical simulation is comparable to",
"video game series, various factions make extensive use of laser and particle beam technology. The most notable are Allied units Prism Tank from Red Alert 2 and Athena Cannon from Red Alert 3, the Nod's Avatar and Obelisk of Light from Tiberium Wars, as well as various units from Generals constructed by USA faction, including their \"superweapon\" Particle Cannon. Plasma weaponry Weapons using plasma (high-energy ionized gas) have been featured in a number of fictional universes, such as Transformers, the Halo franchise, Star Wars, Babylon 5, Warframe, and the miniature game Warhammer 40,000. Weapons of mass destruction Nuclear weapons",
"rock canyons, saloons, and gunfights melded with traditional role-playing game story elements such as magic and demons.\nFirearms factor heavily in Filgaia's mythology. Called \"ARMs\", these weapons represent the world's ever-growing warfare technology, and, unlike the first Wild Arms, are not considered inherently dangerous. Similar technology is used to create other mechanical weaponry not common in normal Western fiction, including cybernetic limbs and miniature robots. Other forms of high technology such as aircraft, motorized vehicles, and radio devices also make an appearance, though some of their usage is attributed to magic rather than science. Characters The cast of",
"author Bill Slavicsek because to him it was a \"wonderful adventure\", but not \"a D&D adventure. Once you add ray guns and power armor to the game, you have a fundamentally different experience.\" Other products that have introduced futuristic elements into D&D include the adventure City of the Gods (1987) and the novel Tale of the Comet (1997).\nAll four modules of the S-series were included as part of the Dungeons of Dread hardcover collection, released on March 19, 2013. Lawrence Schick wrote in the foreword: \"Vegepygmies and robots. What more could you need to hear? Let’s go! S3 Expedition to",
"and/or nuclear particle (i.e. photon, etc.) devices are typically not accepted by the contributors of the site. Often this category of fictional weapons is associated with video games and anime, but some movies (science fiction in particular) contain these as well. In these instances, the devices that represent actual firearms or hypothetical future evolution of current firearms are represented.\nAs the database primarily relates to small arms, categories of large destructive devices are excluded as well. One such example would be an Intercontinental Ballistic Missile (ICBM).\nNo homemade films are permitted. Exceptions Exceptions to the exclusions above are small arms that are",
"cars and jet packs. Instead, there are far more fantastic marvels, such as laptop computers, MRI machines, Blu-ray players, and other real-life wonders made manifest via quantum mechanics.\nUsing the interpretation of quantum theory that physical reality exists only when it is observed, therefore in the mind, the genre of quantum fiction is more closely related to idealism than the genre of empirical classic science fiction. In this regard, other creative works can be seen as subcategories of quantum fiction and even science, or reality itself, is a work of fiction. Quantum theory as literary device In the fiction of Guyanese",
"cyberpunk (e.g. Shadowrun). Even when the main setting of a game is not taken directly from the history of our world, they still tend to draw heavily on historical models, though distorted by the presence of magic; also, as gods often have direct and tangible interactions with the world, religion is usually very unlike our world.\nFantasy typically remains the most played roleplaying genre with the majority of the top five roleplaying games by quarterly sales involving fantasy settings (as seen in sales estimates for 2010-2013). RPGs of the fantasy genre are sometimes collectively called \"Fantasy roleplaying games\" (\"FRP\").\nSee Category:Fantasy",
"\"sci-fi sim\" of 2000. They wrote, \"Although it changed the way things work in BattleTech, it accomplished what Crimson Skies set out to do: Open up the sci-fi genre to non-BattleTech-heads.\" The editors of Computer Games Magazine nominated MechWarrior 4 for their 2000 \"Sci-Fi Simulation of the Year\" award.",
"adventurers and superspies battle the Nazi forces in the shadows and scientists work feverishly in their laboratories to perfect the next doomsday weapon for their masters. Powered by advanced science, will the darkness of fascism spread across the world, or can brave men and women prevent it?\" Rules Gear Krieg is based on the Silhouette game engine, a streamlined set of rules that is already described in Heavy Gear, Dream Pod 9's other science fiction game. It can be played as either a role-playing game (RPG), a tactical wargame, or an hybrid integration of both.\nBoth the RPG and miniature games",
"science fiction movies, with the popular sci-fi films at the time being Star Wars and the anime adaptations of Lensman. The team saw Lensman together and it influenced the game's story. Its plasma laser impressed them and is why Gradius features a laser weapon. The Moai were included to add a mysterious element to the game like Xevious and its Nazca Lines. Arcade Gradius was first released in Japan for Konami's Bubble System, an arcade board which allows operators to change the software through the used of a proprietary magnetic-based media called \"Bubble Software\". The game was distributed as a",
"to the types of weapons that would be available to the player. Arkane recognized that as a research station, their security forces would only likely have common weapons, such as pistols and shotguns, and would not have the equivalent of super-powerful gear like Doom's BFG. What advanced weapons are available were designed to look like prototypes and have flaws associated with them being only in their testing phase.\nArkane's Harvey Smith is credited with establishing the Typhon and the reason for their existence in the story. The player as Morgan follows in the threat's wake, finding survivors that have no idea",
"more \"realism\" to science fiction, and they attempted to build on this.\nSimilarly influential, and generally cited as proto-cyberpunk, is the Philip K. Dick novel Do Androids Dream of Electric Sheep, first published in 1968. Presenting precisely the general feeling of dystopian post-economic-apocalyptic future as Gibson and Sterling later deliver, it examines ethical and moral problems with cybernetic, artificial intelligence in a way more \"realist\" than the Isaac Asimov Robot series that laid its philosophical foundation. This novel was made into the seminal movie Blade Runner, released in 1982. This was one year after another story, \"Johnny Mnemonic\" helped move proto-cyberpunk",
"Cyberpunk exist: Cyberpunk, Cyberpunk 2020 and Cyberpunk v3, by R. Talsorian Games, and GURPS Cyberpunk, published by Steve Jackson Games as a module of the GURPS family of RPGs. Cyberpunk 2020 was designed with the settings of William Gibson's writings in mind, and to some extent with his approval, unlike the approach taken by FASA in producing the transgenre Shadowrun game. Both are set in the near future, in a world where cybernetics are prominent. In addition, Iron Crown Enterprises released an RPG named Cyberspace, which was out of print for several years until recently being re-released in online PDF",
"a purpose-grown cloned assassin. Ridley Scott's 1982 film Blade Runner, like Philip K. Dick's novel Do Androids Dream of Electric Sheep?, on which it is loosely based, uses the story of a hunt for escaped military androids to explore the idea what it means to be human.\nIn John Carpenter's 1974 film Dark Star, a notable portion of the plot involves the characters trying to convince a large intelligent bomb not to detonate inside the ship.\nThe idea of animate weapons is now so much a science fiction trope that it has spawned a whole genre of science fiction films such as",
"theme.\nAlien doomsday machines are common in science fiction as \"Big Dumb Objects\", McGuffins around which the plot can be constructed. An example is the Halo megastructures in the video game franchise Halo, which are world-sized doomsday machines. The sentient weapon The science fiction themes of autonomous weapons systems and the use of computers in warfare date back to the 1960s, often in a Frankensteinian context, notably in Harlan Ellison's 1967 short story \"I Have No Mouth, and I Must Scream\" and films such as The Forbin Project, originally released in 1970 (based on a novel by Dennis Feltham Jones). In",
"of the Matrix, while also including, as a major plot element, the return of magic to the world and the classic Dungeons and Dragons races of elves, dwarfs, trolls and so forth. Likewise, the superhero genre typically emulates the comic book universes such as the DC and Marvel Universes as a form of science fantasy set in contemporary setting where all fantastic elements from futuristic technology to mythic beings co-exist.\nMore extreme mashups are also possible; Torg combined fantasy, science fiction, pulp, and horror elements while Feng Shui combined Chinese historical fantasy with Kung Fu action tropes and dystopian science fiction.",
"well as numerous statements raising it above the average GCS produced game. The game's heavy plot focus on a secret CIA project at Area 51 into the space-time continuum headed by \"Section 7\", using recovered alien technology, that now threatens the fabric of the universe itself. Desperate, a prominent and now disillusioned project member, Dr. Richard Golchan, recruits the son of his old friend and collaborator to infiltrate the project in the hopes of exposing and ending it. Colosso Adventure Series The Colosso Adventure Series is a trilogy of games by Campana Productions (Thom Campana) made with the engine, with",
"far too numerous to list, but popular examples include Star Trek (in all of its various incarnations), Star Wars, Halo, Stargate, Warhammer 40,000, Babylon 5, Buck Rogers, Flash Gordon, Battlestar Galactica, Mass Effect, Freespace and many comic book franchises. Video games have frequently touched the subject, with the Wing Commander franchise serving as a prototypical example. Few games attempt to simulate an environment with realistic distances and speeds, though Independence War and Frontier: Elite II both do, as does the board game Attack Vector: Tactical.",
"Jerry Houser reprising his role. Books Sci-Fi is a supporting character in the Joe novel 'Fool's Gold'. His simulation training pays off as he pilots the space shuttle, the USS Defiant, through several maneuvers that end up saving the Earth from a doomsday weapon.\nHe is also a supporting character in 'Serpentor and the Mummy Warrior'. Other works Sci-Fi's figure is briefly featured in the fiction novel 6 Sick Hipsters. In the story, the character Paul Achting spent four years collecting G.I. Joe figures to set up a battle scene between the Joes and Cobra. As he imagined the characters in",
"the machine are held, which include playing Spacewar.\nIn addition to Galaxy Game and Computer Space, numerous other games have been directly inspired by Spacewar. These include Orbitwar (1974, PLATO network computers), Space Wars (1977, arcade), and Space War (1978, Atari 2600). Additionally, in Asteroids (1979), designer Ed Logg used elements from Spacewar, namely the hyperspace button and the shape of the player's ship. Products as late as the 1990 computer game Star Control drew direct inspiration from Spacewar. Russell has been quoted as saying that the aspect of the game that he was most pleased with was the number of",
"of the technology used is either similar in advancement to that of the present day, or based on technology considered plausible in the near-future, such as the railgun. A handful of exceptions, notably faster-than-light interstellar travel and superluminal communication, depend on purely fictional or speculative principles. Radically advanced tech mixes with seemingly anachronistic technologies such as internal combustion engines and projectile weapons. Artificial intelligence, nanotechnology, androids, and many other staples of future fiction are generally absent or downplayed. Incessant warfare is generally blamed for the uneven advancement, the destruction of industry and institutes of learning over the",
"Gun Metal (video game) Gameplay Gun Metal allows players to pilot a futuristic mech which can transform into a plane. The game is based around a war (sometime in the future) on a planet called Helios, where humans have settled. Enemy spacecraft have followed them from Earth and are attempting to exterminate the colony. Project Gunmetal is a massive operation which oversaw the creation of a supremely powerful war machine. In its primary form, a walking \"humanoid\" mech many dozens of feet high, it possesses a range of 12 weapons and an electronic shield. At the",
"in most science fiction, in particular more hard science fiction, is to conceal the true (impossible) nature of materials, technologies, or devices mentioned in the story, often because of a violation of the laws of physics as currently understood. As reality and somewhat serious projections about the future are important in hard sci-fi, technobabble can give the impression of new discoveries rendering our current understanding of how the universe works \"wrong\". For example, despite the implications of the Special Theory of Relativity on faster than light travel, it can be done via wormholes—technobabble provides an \"enabling device\" to provide the",
"warfare that first surfaced in anecdotal descriptions, newspapers, and books during the 1980s. The report cited alleged psychotronic weapons such as a \"hyperspatial nuclear howitzer\" and beliefs that Russian psychotronic weapons were responsible for Legionnaire's disease and the sinking of the USS Thresher among claims that \"range from incredible to the outrageously incredible.\" The committee observed that although reports and stories as well as imagined potential uses for such weapons by military decision makers exist, \"nothing approaching scientific literature supports the claims of psychotronic weaponry.\"\nPsychotronic weapons were reportedly being studied by the Russian Federation during the 1990s with military analyst"
] |
Why do many elderly constantly lick their lips/make slurping and smacking sounds? | [
"Medications and certain diseases can cause dry mouth. I've helped some of my elderly clients by offering them a mouth lozenge or hard candy to suck on because it helps produce more saliva. You could also help by making sure that they stay hydrated. It is very common for the elderly to suffer dry mouth from dehydration.\n\nYou mention \"smacking sounds\" which makes this sound like a bit more than dry mouth, but I'm not here to speculate. There are quite a few disorders that we see in the elderly that can cause these symptoms. \n\nOne would be a disorder called \"Tardive Dyskinesia\" can cause these symptoms, and is caused by long term use of some psychiatric medications. With this disorder, the symptoms are typically incurable.\n\nParkinson's Disease can also cause these symptoms. \n\nIf you can visibly tell that the client has a dry mouth, then help them by keeping them hydrated, giving them gum or hard candy (if they are cognizant enough to have such), or some mouth rinses can help as well. \n\nMany symptoms can signal dry mouth. Some shorter term symptoms are swollen and or irritated tongue/lips/gums. Bad breath is another symptom. Long term effects of dry mouth can cause serious tooth decay.",
"If the person is on antipsychotics which are sometimes given to people with dementia, it could be tardive dyskinesia, a bad side effect that causes a movement disorder that can become permanent-please talk to your/their healthcare provider"
] | [
"thumb sucking (or sucking on other objects such as pens, pipes, lollipops), dental cleaning (e.g. flossing), chewing gum, hypersalivation, drooling and mouth breathing. Some consider habitual lip licking or picking to be a form of nervous tic, and do not consider this to be true angular cheilitis, instead calling it perlèche (derived from the French word pourlècher meaning \"to lick one’s lips\"), or \"factitious cheilitis\" is applied to this habit. The term \"cheilocandidiasis\" describes exfoliative (flaking) lesions of the lips and the skin around the lips, and is caused by a superficial candidal infection due to chronic lip licking. Less",
"Ageusia Causes The main causes of taste disorders are head trauma, infections of upper respiratory tract, exposure to toxic substances, iatrogenic causes, medicines, and glossodynia (\"Burning Mouth Syndrome (BMS)\").\nHead trauma can cause lesions in regions of the central nervous system which are involved in processing taste stimuli, including thalamus, brain stem, and temporal lobes; it can also cause damage to neurological pathways involved in transmission of taste stimuli. Neurological damage Tissue damage to the nerves that support the tongue can cause ageusia, especially damage to the chorda tympani nerve and the glossopharyngeal nerve. The chorda tympani nerve passes taste for",
"down they fall again into a state of Insensibility, drivling constantly from the Mouth as in deep salivation; breathe slowly, but not unequally nor snort. Young people are more subject to it than the old; and the Judgement generally pronounced is Death, the Prognostik seldom failing. If now and then one of them recovers, he certainly loses the little Reason he had, and turns Ideot...\"\nIn 1901, a devastating epidemic erupted in Uganda, killing more than 250,000 people, including about two-thirds of the population in the affected lakeshore areas. According to The Cambridge History of Africa, \"It has been estimated that",
"other words to trigger identification. Another stimulus that reaches some level of semantic processing while in the unattended channel is taboo words. These words often contain sexually explicit material that cause an alert system in people that leads to decreased performance in shadowing tasks. Taboo words do not affect children in selective attention until they develop a strong vocabulary with an understanding of language.\nSelective attention begins to waver as we get older. Older adults have longer latency periods in discriminating between conversation streams. This is typically attributed to the fact that general cognitive ability begins to decay with",
"inability to interpret facial expressions properly; this is believed to be due to kindling of the amygdala with resultant distortion of neurotransmission. Adolescents, females and young adults are most sensitive to the neuropsychological effects of binge drinking. Adolescence, in particular early adolescence, is a developmental stage that is particularly vulnerable to the neurotoxic and neurocognitive adverse effects of binge drinking due to it being a time of significant brain development.\nBinge drinking regimes are associated with causing an imbalance between inhibitory and excitatory amino acids and changes in monoamines release in the central nervous system, which increases neurotoxicity and may result",
"as pseudo-stuttering or as a normal disfluency. As children learn to talk, they may repeat certain sounds, stumble on or mispronounce words, hesitate between words, substitute sounds for each other, and be unable to express some sounds. Children with a normal disfluency usually have brief repetitions of certain sounds, syllables or short words, however, the stuttering usually comes and goes and is most noticeable when a child is excited, stressed or overly tired. Stuttering is also believed to be caused by neurophysiology. Neurogenic stuttering is a type of fluency disorder in which a person has difficulty in producing speech in",
"verbal greeting. Nodding syndrome Nodding is also a symptom of nodding disease, a yet unexplained disease. It affects mostly children under 15, and was first documented in Tanzania in 1962.",
"the corner of his mouth twitches slightly. His composure extends to his voice, which is soft and respectful. When he wishes to speak without having been spoken to or is about to discuss a delicate subject, he makes a low gentle cough \"like a very old sheep clearing its throat on a misty mountain top\". He may also cough to signify disapproval. Bertie states that he saw the normally imperturbable Jeeves come \"very near to being rattled\" for the first time when the sight of Bingo Little in a false beard caused Jeeves to drop his jaw and steady himself",
"out unwanted objects. Through making a narrow funnel with the lips, the suction of the mouth is increased. This suction is essential for babies to breast feed. Lips can also be used to suck in other contexts, such as sucking on a straw to drink liquids. Articulation The lips serve for creating different sounds—mainly labial, bilabial, and labiodental consonant sounds as well as vowel rounding—and thus are an important part of the speech apparatus. The lips enable whistling and the performing of wind instruments such as the trumpet, clarinet, flute, and saxophone. People who have hearing loss may unconsciously",
"licking them. This behaviour carries throughout their lives and bunting remains a primal source of interaction between adults as it stimulates a familiar interaction between kin.",
"children a frequent cause is repeated lip-licking, and in adults it may be a sign of underlying iron deficiency anemia, or vitamin B deficiencies (e.g., B₂-riboflavin, B₉-folate, or B₁₂-cobalamin, which in turn may be evidence of poor diets or malnutrition such as celiac disease).\nAlso, angular cheilitis can be caused by a patient's jaws at rest being 'overclosed' due to edentulousness or tooth wear, causing the jaws to come to rest closer together than if the complete/unaffected dentition were present. This causes skin folds around the angle of the mouth which are kept moist by saliva, which in turn favours infection;",
"but the mechanisms devoted to detection are lacking. Also, the amount of laughter exhibited by the elderly is smaller compared to young adults. In addition, the older population seems to not enjoy aggressive types of humor as much as the younger ones, and the elderly are especially sensitive to jokes referring to old age. \nIt is interesting to point out the \"see-saw\" effect aging has in terms of the brain mechanisms underlying humor. Despite the apparent decreases in the cognitive component of humor understanding, the affective element remains steady, if not more refined and enhanced. The greater bilateral activation older",
"Thumb sucking Thumb sucking is a behavior found in humans, chimpanzees, captive ring-tailed lemurs, and other primates. It usually involves placing the thumb into the mouth and rhythmically repeating sucking contact for a prolonged duration. It can also be accomplished with any organ within reach (such as other fingers and toes) and is considered to be soothing and therapeutic for the person. As a child develops the habit, it will usually develop a \"favorite\" finger to suck on.\nAt birth, a baby will reflexively suck any object placed in its mouth; this is the sucking reflex responsible for breastfeeding. From the",
"their children's behaviour as reflected by the expressions: mi ma hsonma, hpa ma hsonma (မိမဆုံးမ ဖမဆုံးမ undisciplined either by mother or by father) and ami youk tau hnoukkyan, ahpa youk tau ko amu-aya kyan (bad language from bad mother, bad body-language from bad father). Saying \"thank you\" however is not Burmese custom between friends and within the family.\nIt is considered rude to touch a person's head, because it is the \"highest\" point of the body. It is also considered taboo to touch another's feet, but worse still to point with the foot or sit with feet pointing at someone older,",
"or consciously lip read to understand speech without needing to perceive the actual sounds. Tactile organ The lip has many nerve endings and reacts as part of the tactile (touch) senses. Lips are very sensitive to touch, warmth, and cold. It is therefore an important aid for exploring unknown objects for babies and toddlers. Erogenous zone Because of their high number of nerve endings, the lips are an erogenous zone. The lips therefore play a crucial role in kissing and other acts of intimacy.\nA woman's lips are also a visible expression of her fertility. In studies performed",
"Human infants are not necessarily excited or upset when babbling; they may also babble spontaneously and incessantly when they are emotionally calm.\nThe sounds of babbling are produced before an infant begins to construct recognizable words. This can be partly attributed to the immaturity of the vocal tract and neuromusculature at this age in life. Infants first begin vocalizing by crying, followed by cooing and then vocal play. These first forms of sound production are the easiest for children to use because they contain natural, reflexive, mostly vowel sounds.\nBabbling is assumed to occur in all children acquiring language.",
"utter the first sound of a sentence, and shows high levels of awareness and frustration. Another variety also begins suddenly with frequent word and phrase repetition, and does not include the development of secondary stuttering behaviours.\nStuttering can also have its roots in development. Many toddlers and preschool age children stutter as they are learning to talk, and although many parents worry about it, most of these children will outgrow the stuttering and will have normal speech as they get older. Since most of these children do not stutter as adults, this normal stage of speech development is usually referred to",
"that as long as the habit is broken before the onset of permanent teeth, at around 5 years old, the damage is reversible. Thumb sucking is sometimes retained into adulthood and may be due to stereotypic movement disorder, another psychiatric disorder, or simply habit continuation. Using anatomical and neurophysiological data a study has found that sucking the thumb is said to stimulate receptors within the brain which cause the release of tension, mentally and physically which shows a scientific standpoint regarding the psychological basis of thumb sucking.",
"whose brain is bitten numbly by numb maggots; who walks generously with wide-spread, tentative legs, falls frequently in the gutter, and who sees, in the extremity of his ecstasy, blue mice and pink elephants. He is the type that gives rise to the jokes in the funny papers.\nThis is contrasted to drinkers such as the narrator, who are possessed of imagination and become drunk more in brain than in body. To them, John Barleycorn sends clear visions of the eventual pointlessness of life and love and struggle.",
"of TOTs and improves the retrieval of the target word and has been shown to have a larger benefit for older adults. This is consistent with the spreading activation model, where neural connections are strengthened when used more. Although older people experience more tip of the tongue states more often than any other category, recent studies have shown that frequent tip of the tongue states are not linked at all to dementia, which is common in the elderly. Despite the association of increased age with lower levels of episodic memory and more frequent TOT states, the two phenomena",
"speaking and, in the \"cycle of stuttering,\" to yet more fear, anxiety and expectation of stuttering. With time secondary stuttering, including escape behaviours such as eye blinking and lip movements, may be used, as well as fear and avoidance of sounds, words, people, or speaking situations. Eventually, many become fully aware of their disorder and begin to identify themselves as stutterers. With this may come deeper frustration, embarrassment and shame. Other, rarer patterns of stuttering development have been described, including sudden onset with the child being unable to speak, despite attempts to do so. The child usually is unable to",
"was an inside joke which stood for Alte Kocker (Lit: elderly person who is defecating), a Yiddish idiom which means an old man or woman of diminished capacity who can no longer do the things they used to do.\nMuch of the \"gibberish\" that the stooges sometimes spoke was actually the Jewish language of Yiddish. The most famous example of this occurs 15 minutes into the 1938 short Mutts to You. Moe and Larry were impersonating Chinese laundrymen in an attempt to fool the local cop. While being questioned Larry says \"Ech Bin A China Boychic Frim Slobatkya-Gebernya Hak Mir Nisht",
"behaviours are absent. Most young children are unaware of the interruptions in their speech. With young stutterers, disfluency may be episodic, and periods of stuttering are followed by periods of relatively decreased disfluency.\nThough the rate of early recovery is very high, with time a young person who stutters may transition from easy, relaxed repetition to more tense and effortful stuttering, including blocks and prolongations. Some propose that parental reactions may affect the development of a chronic stutter. Recommendations to \"slow down\", \"take a breath\", \"say it again\", etc., may increase the child’s anxiety and fear, leading to more difficulties with",
"protruding it against his upper gums in front, as if pronouncing quickly under his breath, 'Too, too, too.' All this accompanied sometimes with a thoughtful look, but more frequently with a smile. Generally when he had concluded a period, in the course of a dispute, by which time he was a good deal exhausted by violence and vociferation, he used to blow out his breath like a whale.\nThere are many similar accounts; in particular, Johnson was said to act in such a manner at the thresholds of doors, and Frances Reynolds claims that, \"with poor Mrs Williams, a blind lady",
"and says that he responds to such complaints by treating them as falling within the category of irritable bowel syndrome. Sumioka says that the reason why he tends to see more younger people and women among such patients is because these demographics are more readily susceptible to feelings of shame.[Ibid] This is because shame heightens psychological tension and this serves to aggravate the symptoms.[Ibid] Somatic marker hypothesis Working from Sumioka's abovementioned reference to irritable bowel syndrome, critic Ryoichi Takahashi interprets the Mariko Aoki phenomenon by raising theories such as \"gut-brain correlation\" and a \"somatic marker hypothesis.\" The",
"mouth moves in distinct ways during speech production. When producing each individual sound out loud, humans use different parts of their mouths, as well as different methods to produce particular sounds. During the beginnings of babbling, infants tend to have greater mouth openings on the right side. This finding suggests that babbling is controlled by the left hemisphere of the brain. The larynx, or voicebox, is originally high in the throat which allows the baby to continue to breathe while swallowing. It descends during the first year of life, allowing the pharynx to develop and facilitates the production of adult-like",
"family member may resort to making jokes of when the deceased person used to give unwanted “wet willies” (term used for when a person sticks their finger inside their mouth then inserts the finger into another person's ear) to any unwilling participant. A person might also find comedic relief with others around irrational possible outcomes for the deceased funeral service. It is also possible that humor would be used by people to feel a sense of control over a more powerless situation and used as way to temporarily escape a feeling of helplessness. Exercised humor can be a sign of",
"sometimes left her on the child's toilet overnight.\nResearchers concluded that, if Genie vocalized or made any other noise, her father beat her with a large plank that he kept in her room. To keep her quiet, he bared his teeth and barked and growled at her like a wild dog, and grew his fingernails out to scratch her. If he suspected her of doing something he did not like, he made these noises outside the door and beat her if he believed she had continued to do it, instilling an extremely intense and persistent fear of cats and dogs in",
"laugh and respond to tickle skin as rats age, however, it has also been reported that in females, brain maturation after puberty appears to redefine tickling as aversive, leading to avoidance rather than appetitive responses. Further studies show that rats chirp when wrestling one another, before receiving morphine, or when mating. The sound has been interpreted as an expectation of something rewarding. High frequency ultrasonic vocalizations are important in rat communication and function to elicit approach behavior in the recipient.\nThe initial goal of research by Jaak Panksepp and Jeff Burgdorf was to track the biological origins of how the",
"face or to 'lose' face) and discusses politeness as a response to alleviate or avoid face-threatening acts that include insults, requests and etcetera. Therefore, hypocorrection may be utilised in such situations in order to allow people to 'save' face. Impacts of Hypocorrection Hypocorrection may have a part in innovating sound changes. Ohala proposed a theory of sound change arising from the listener's misperception. The theory highlights important variations in \"the phonetic form of functionally equivalent speech units\", and puts forth that when faced with coarticulatory speech variation, listeners either:\n1) perceptually compensate for predictable variations and arrive at the pronunciation target"
] |
Why is the trade-off of the American soldier so controversial? | [
"We have two policies and a law that put the President in a bind:\n\n1) The United States does not negotiate with terrorists. Been a policy for several decades now and we obviously did here. In fact, this is the first time we've ever negotiated directly with Taliban/Al-Qaida to exchange anything. \n\n2) The United States military leaves no man behind. Dead, alive, captured...if there is something to recover and bring back home, we will go out of our way and risk many men to do so. He was a POW for 5 years and had no idea where to get him with special or conventional operations. Deserter or not, we don't leave a man behind.\n\n3) Congress must, by law, receive 30 days notice of what the president intended to do. Even the Bin Ladin raid, certain members of Congress with the security clearance knew the raid was happening, when, where and how. It's being debated if Obama actually notified members of Congress in the timeframe required by law, but it seems as if he didn't. \n\nIt brings up many questions for all Americans and what is the cost of a life. Is an American worth five lives? Six? Ten? How much are all the current Americans being held hostage around the world worth to us? This deal broadcast to the world what we *might* do and have done to negotiate for lives. They have become bargaining chips now with a set price and have an estimated retail value. That's food for thought.\n\nOther issues include that the five prisoners were battled hardened and high ranking members of Al-Qaida who have reportedly killed thousands. Now they want nothing more than to see the US burn for locking them in a hole for so many years. It's no doubt they will take their vengeance seriously.",
"Six soldiers were killed while looking for him and he is reported to have left his post and gone in search of a Taliban official who speaks English to surrender himself.",
"5 for 1.\n\nHe purposely abandoned his post\n\nNegotiated with terrorists which makes them more emboldened. One person was quoted as saying that this proves that the US will lose the war (as if there is ever a true winner)\n\nDidn't follow normal protocol, but ignored procedure to do all of this.",
"Let me clear a few things up that have supposedly been \"explained.\"\n\n1) We didn't negotiate with terrorists per se. We all know that Taliban are pieces of shit, but they were purposely left off the terror list so that we could negotiate with them if needed. \n\n\n2) Supposedly Congress was kept in the dark. That claim is starting to shake out as bullshit.\n\nFeb 7th WaPo Article - \"...the American offer, which has been on the table for more than two years, senior officials from the White House, the Pentagon, the State Department and other agencies decided within the past month to allow the simultaneous release of all five men.\" \n\n[Link](_URL_0_)\n\n\n3) \"Americans are now targets for kidnapping by terrorist groups.\" \n\nAs if the before the POW swap, they were not high-value targets, right?\n\n\n4) \"They were high-value terrorists. The worst of the worst\" \n\nWho haven't been convicted and were not going to be convicted of anything. Who were so high-value, that when a former chief Gitmo prosecutor was asked about them his response was basically \"Who?\"\n\n\nIt's all about Obama.",
"He's either a deserter or a traitor possibly, so the soldiers who died in the hunt for him were trying to rescue someone who might not have done the same for them, despite swearing an oath to do so.",
"If you give a mouse a cookie, he'll ask for a glass of milk. This is why we don't EVER negotiate with terrorists. \n\nIf you show a terrorist that the easiest way to get his buddies out of prison is for them to kidnap ANY SOLDIER (even a deserter) and then exchange said soldier for FIVE terrorists, they will kidnap more soldiers.",
"At the end of a war you exchange POW's. This is another reason that the \"War\" on \"terror\" is stupid, you can't legitimately ever say, ok its done terms are set now lets give each others guys back.",
"Controversy sucks up a lot of media oxygen, since it includes debate. Then- VA scandal front page Now- VA scandal page 23b. Well played.",
"[serious] for those that are against the trade, do you believe there are scenarios where it is okay to leave a US soldier behind? If so, what are your criteria for leaving someone behind?",
"1) The official policy of the United States is to not negotiate with terrorists.The Taliban is not technically a terrorist organization but considering they have harbored and assisted Al Qaeda and others for years, that resonates deeply with many Americans, many of whom would likely espouse the belief that the Talban is a terrorist group.\n\n2) The US soldier in question was either a deserter or a traitor. A handful of US soldiers were killed while trying to find or rescue him; they gave their lives for someone who willingly opened himself up to the circumstances and likely wouldn't have done the same for them had they been captured honestly in battle.\n\n3) Evidently--and I have nowhere near a nuanced enough knowledge of the matter to have feelings on this one way or the other--the Obama administration failed in a duty to notify Congress of its intentions in a timely matter as is (purportedly) required by US law.\n\n4) Obama. I'm a pretty conservative guy but I will admit I find it hard to imagine anyone (at least in the GOP) would be making this big of a deal about it if Obama wasn't president.",
"The top answers are not fully correct.\n\nId like to add the main sediment is the fact that the guy is probably a deserter. 6 people died trying to rescue him, and the fact he ditched his men in the first place, he gets to come home, they don't.",
"From what I understand, he voluntarily left camp. After several soldiers (who did not voluntarily leave camp) were killed trying to find him, the President traded 5 \"high-level\" terror suspects. To be fair, I don't believe that the prisoners in Guantanamo are necessarily \"legal\" detainees, but in an international conflict, those lines are blurry and I don't think the holding of Bergdahl was any more \"legal\".\n\nThe two points that seem to leave political opponents of the president most angry are:\n\n1. The soldier's father is ethically opposed to detainees at Guantanamo, has tweeted that a god will \"repay\" for the death of every Afghan child. During his speech, he also repeated a common phrase from the Koran about the compassion of Allah, (apparently) in a clean Afghan accent. I'm not sure of the significance of the accent, but opponents of the trade believe that Taliban and Al-Qaeda leaders are ecstatic about the results of the trade, and you never want your opponent to be happier with the negotiations than you are. Not to mention the fact that the success of this swap could incentivize more kidnappings and breaks the mantra of \"don't negotiate with terrorists\".\n\n2. More recently, there may have been indications that the administration tried to shield this decision from Congress and the \"court of public opinion\", presumably because they predicted it would be unpopular.\n\n**TL;DR Traded six American lives and 5 terrorist prisoners for one soldier who deserted; his father subsequently praised Allah, predicted god's vengeance for the death of Afghanis, to the expected delight of our enemies**",
"Crazy conspiracy theory here but what if the United States was able to surreptitiously sedate the detainees and then install some type of tracker into their bodies that can't be uncovered. It's like letting a baited cockroach go back to the nest to kill the other roaches.",
"We've proven we will trade for hostages; every soldier now becomes a potential hostage for negotiation, and extremely valuable ones at that. We traded 5 hardened terrorists responsible for at least hundreds of deaths, in exchange for an anti-American former-soldier who deserted during the war (treason punishable by death). Allegedly, our troops had Kill-On-Sight orders for him, and we lost 6 soldiers going after him in the first place.\n\nSo we lost 6 soldiers because he deserted, and now we'll trade a huge number of high-ranking terrorists in exchange to get him back, meanwhile endangering all of our real soldiers and personnel to save this guy. In addition, this guy has been held for 5 years - so it is bullshit that the deal couldn't wait 30 days for Congress's approval.\n\nBut what *couldn't* wait 30 days was Obama's image, given the VA scandal on top of the other dozen scandals he *\"just found out about watching the news.\"* We're only finding out details of this case through alternate channels. The story presented by the White House was a poor, captured soldier finally being returned home. Bullshit, but it makes for great PR. A PR stunt that undoubtedly will cost several more lives of American Troops as a result.",
"ELI5: Why is the trade-off of the American soldier so controversial?\n\nWe released 5 people who have dedicated their lives to the destruction of the west.\n\nIn return we got back a soldier who probably deserted his post and eventually gave aid and comfort to the enemy.\n\nThe controversy: Is the world a safer place today than it was before we released 5 people that have dedicated their lives to the destruction of the west?",
"> Obama did this under a cloud of mystery to whether he did this legally (giving Congress 30 days notice) or by passing a bill that would allow him to do this, or he overstepped his authority and did this illegally. Now we have set ourselves up for more attacks.\n\nThis is such a loaded statement/question, I'm really surprised the mods have allowed it.",
"I've only skimmed the stories, but the bottom line is if you ever show that you are willing to pay a ransom, then others may try to demand a ransom from you again, in the future. Thus, putting others in greater danger of being taken.\n\nEdit: spelling",
"The soldier was likely a deserter. We just traded 5 guys who are dangerous for a traitor (assuming deserting comrades in a time of war is a betrayal).",
"pretty sure those 5 have a drone strike reserved for them",
"Well for one, there's another soldier that's been held for 3+ years. Now the family is like \"where the fuck is my husband/father\" why can't they trade for him huh!?"
] | [
"work as hard as everyone else. Many of the men were unable to regain the jobs they had whey had left to join the war. Some, due to illness or injury, were unable to work. Anumber of wealthier supporters donated money to help the needy veterans, though many were too proud to accept.\nA first reunion of the Rough Riders was held in the Plaza Hotel in Las Vegas, New Mexico in 1899. Roosevelt, then Governor of New York, attended this event. In 1948, fifty years after the Rough Riders disbandment, the U.S. Post office issued a commemorative stamp in their",
"Jay and his supporters did not care if American seamen, one of the lowest ranks in the Navy, did not receive justice for being arrested and tortured by the British. He, a former soldier, naturally felt sympathy for his fellow servicemen and acknowledged that the elite's treatment of the seamen must be similar to their treatment of other American citizens of lesser status. As Jennifer R. Mercieca and James Arnt Aune noted in their article \"A Vernacular Republican Rhetoric: William Manning's Key of Libberty,\" historian Thomas Gustafson would refer to Jay's Treaty as one of the great controversies of the",
"resulted in the expensive loss of an Avengers Quinjet, and widespread property damage.\nU.S. Agent – stubborn as ever – claims a complete lack of knowledge of the incident as he \"is a very busy man\". When asked to justify his actions, U.S. Agent refuses to do so, with his response being \"Forget it. Theyre alive right? They should be grateful!\" and accused his interrogators of just wanting to drag heroes down.\nU.S. Agent leaves his interviewers with one piece of advice: \"I go out there to save lives. You just pay the bills. Just be good little bean counters – and",
"on our frontier. We are much pleased. We know they are true men, and they know exactly what they are about. With many of them Indian and Mexican fighting has been their trade for years. That they may be permanently retained in the service on our frontier is extremely desirable, and we cannot permit ourselves to doubt such will be the case.\nDespite these popular stories and their fame, some of their most brutal interventions, such as the massacre of unarmed civilians, elderly men, women and children in Saltillo, ordered by Samuel H. Walker, remained unknown to the American public at",
"their lives, but only after having appeared before a Board of Generals in London, pleading their case. Morale According to Fortescue, the Americans were distrusted by the whole army, but there were also plenty of reasons for the Americans to distrust, and feel betrayed by, the British government and the British military leadership, besides the rampant diseases that everyone fell victim to, irrespective of rank or origin, and the lack of surgeons and stores on the hospital ships, that all suffered equally. The lack of pay and subsistence on Jamaica, forced the officers of the regiment to take personal loans",
"felt that the Americans did not do well because they were distracted by the thoughts of being cheated; Goren publicly apologised to the Italians. Accusation against Claude Delmouly and Gerard Bourchtoff, 1960 Claude Delmouly and Gerard Bourchtoff were members of the French national team that won the World Team Olympiad in Turin, Italy in 1960. Months later they were accused by Simone Albarran, widow of Pierre Albarran, of using signals at another event prior to Turin to show hand strength. Specifically, it was alleged that they used an illegal signal known as ‘l’ascenseur’ in French (‘the lift’ in English",
"killed in action (KIA) without substantial evidence. In 1995 Rolling Thunder Inc. won approval from the United States Government for a POW/MIA postage stamp to be put in circulation and the organization continues to work with the U.S. Senate and House of Representatives on new bills for the return of, and information about, servicemen and women. Rolling Thunder co-authored the 2006 Respect for America's Fallen Heroes Act. Criticism The Economist said the organization \"was founded...to advance a specific crackpot belief: that successive Republican and Democratic administrations have concealed evidence that American captives are being held alive in South-East Asia.\"",
"a matter of pride, a matter of honor, a matter of ego.\" \"If it had been about the money, it would have been done months ago,\" said a US senior administration official knowledgeable about the negotiations. \"Just like for us, it was not just about the supply routes.\" According to the BBC the reason for the long US refusal to apologise for the Salala incident was deep anger among Americans about the death of US soldiers in Afghanistan from attacks by militant groups with alleged connections to Pakistan's ISI intelligence agency. Another reason for the United States refusal to apologise",
"but it is impossible for me to prevail on some of my men to deliver their arms until they have some assurance from the U.S. authorities that those independent companies and squads claiming protection under the Federal Government are immediately disarmed. I am confident that you are not aware of the many murderous crimes and outrageous depredations committed on the people through the country, or their course would have been ended before this. I called the attention of Colonel Ryan, commanding at Lewisburg, to this matter last winter, but he seemed to take no action in the matter whatever, and",
"the Henry Ford Trade School closed decades earlier and shop owners had been reluctant to train new apprentices for fear that they may leave for higher wages. With these facts, Father Cunningham convinced the U.S. Department of Defense that the nationwide shortage of skilled machinists represented a national security concern, arguing that in the event of a war, the armed forces would be faced with a shortage of replacement parts. Focus: HOPE bought the 300,000-square-foot (28,000 m²) Ex-Cell-O plant for a nominal price and obtained a federal grant along with a number of corporate donations for equipment and building",
"payments. He said\nI felt the biggest statement we could make was to go to Moscow and show the world. If there was a total boycott, fine, but trade was still going on. It was disgusting. Why should the athletes be made to suffer?\nAccording to women's swimming captain Lisa Forrest, Tonelli adopted populist tactics in championing the athletes' cause. He said that Fraser was sending \"wheat to feed the Russian army, wool to clothe the army and Australian metal to make Russian guns\", claiming that this contradicted the proposed protest against the invasion and Russian military aggression. Tonelli's anti-authoritarian and individualistic",
"tens of thousands of soldiers since the start of the Iraq War. Slotnick then successfully tried four similar cases.\nWith his son, Stuart, Slotnick also obtained a settlement for publicly traded company Sportingbet with the U.S. Government's Department of Justice for $30 million and a non-prosecution agreement. This amount was a quarter of what competing site PartyGaming paid in a similar lawsuit. Pursuant to the non prosecution agreement, Sportingbet will not be indicted for their criminal acts in the United States.\nDuring 2005, he merged Slotnick Shapiro & Crocker with Buchanan Ingersoll & Rooney, with which he is currently a partner and",
"country gave him that uniform because Rogers was not willing to do what they needed him to. Walker calls Rogers a traitor, and states that his country has given him the authority of the real Captain America, and that Rogers never understood duty to country and doing what is required to keep its shores safe. Rogers retorts that Captain America represents an ideal for all people, of all countries.\nUltimately U.S. Agent is defeated by Rogers. Mazikandar's dictator is presented to his hand picked successor, who promptly executes his predecessor on the steps of the capitol building to the surprise of",
"had any graphic understanding of the human price being paid in the war. The government also restricted what reporters could write, and coverage was generally upbeat and bloodless.\nThe editor of the Christian Science Monitor felt that the government rules to \"hold back and play down American casualties\" gave the American public an artificially optimistic view of the war's progress. In Australia, General Douglas MacArthur threatened to court-martial any soldier who gave a correspondent an interview without official permission. Life Washington correspondent Cal Whipple felt that Strock’s photograph was needed to inject a dose of reality on the home front who",
"on May 7, 2015, Charney sued Standard General (the hedge fund that took control of American Apparel following his 2014 ouster) for $30 million, claiming that Standard General's public statements that the investigation of Charney was \"independent and carried out by a third party\" was allegedly untrue, and as such was defamatory and an intentional interference with economic relations and prospective economic relations. In the same lawsuit, Charney claims the investigation of himself was a \"sham\" and he said American Apparel's board, controlled by Standard General, sacked him because he would not drop his fight to regain control of the",
"organizations fought by Captain America in World War II; political science professor Matthew J. Costello has pointed out that this conflation of Communist and Nazi totalitarianism removes ambiguity from the threat and thus from America's moral superiority in the comics. In contrast, in the post-9/11 context of Iron Man 3, Pepper says of Extremis' war profiteering, \"That's exactly what [Stark Industries] used to do\". Whereas immediately after 9/11 Captain America was concerned with Islamic terrorism, by 2005–2007 he was primarily engaged with homegrown terrorists: A.I.M. and A.I.D.",
"Bones initiation ... And we're going to ruin people's lives over it and we're going to hamper our military effort, and then we are going to really hammer them because they had a good time.\" Speaking at the 2009 Conservative Political Action Conference, Limbaugh accused Democratic congressional leaders such as Harry Reid of deliberately undermining the war effort.\nIn 2018, Limbaugh speculated that evidence of Iraqi weapons of mass destruction had been fabricated by the U.S. intelligence community to embarrass President Bush. Trade In 1993, Limbaugh supported the North American Free Trade Agreement, joking in response to claims that it would lead",
"War hero, U.S. Senator, New York State Attorney General and Assemblyman, and finally Vice President under Jefferson, Burr adamantly denied and vehemently resented all charges against his honor, his character or his patriotism.\nBurr was charged with treason for assembling an armed force to take New Orleans and separate the Western from the Atlantic states. He was also charged with high misdemeanor for sending a military expedition against territories belonging to Spain. George Hay, the prosecuting U.S. Attorney, compiled a list of over 140 witnesses, one of whom was Andrew Jackson. To encourage witnesses to cooperate with the prosecution, Thomas Jefferson",
"about the conduct of U.S. soldiers.\nCommentator Bill O'Reilly called for protests of Redacted and against Mark Cuban. O'Reilly claims that the film demeans U.S. soldiers and may incite violence against them, and he has called on ticketholders to bring signs to Dallas Mavericks games and all theaters showing the movie, stating 'Support the Troops'. Mark Cuban has responded, saying \"The movie is fully pro-troops. The hero of the movie is a soldier who stands up for what is right in the face of adversity... I think that the concept that the enemy will see these films and use it as",
"ambassador was handed a note from the State Department calling the practice 'wholly unwarrantable' and demanding immediate correction. But despite the British Foreign Office urging the Ministry of Economic Warfare to be cautious for fear of damaging relations with the US, the British claimed to have uncovered a nationwide US conspiracy to send clothing, jewels, securities, cash, foodstuffs, chocolate, coffee and soap to Germany through the post, and there was no climbdown. Gruss und Kuss From the war's beginning, a steady stream of packages, many marked Gruss und Kuss (\"greetings and kisses!\") had been sent from the United States through",
"in the US would drop dramatically. The U.S. government would be doing so in a less confrontational manner than they had in recent years. American Apparel incident In 2009, American Apparel was convicted of having workers that partook in illicit work. About 1,800 of American Apparel's employees were illegal immigrants who were not authorized to work in the United States. The federal government sent a written notice that stated that American Apparel faced civil fines and would have to fire all workers who were unauthorized to be in the United States.",
"America as an enemy, even going out of her way to travel to Peggy Carter's funeral to comfort Rogers. She tries to warn Rogers not to oppose the accords or interfere with the Winter Soldier, but he refuses to listen. During the battle at the German airport, she mainly fights against Ant-Man and Hawkeye, the latter of which she still remains friends with despite the conflict. When Steve and Bucky attempt to use a plane to confront Zemo, she allows them to go and stops Black Panther from pursuing them. After she was reported for her betrayal, she is forced",
"Price was using as scapegoats for his own failures. Reynolds followed this up by sending a copy to Price and asking him to resign from the military. Price responded by requesting that Smith conduct a formal investigation of Price’s charges and in a published letter to the Shreveport News denied Reynolds’ charges while referring to him as someone \"who pretends to be, and styles himself in it [the Texas Republican letter], the Governor of the State of Missouri.\nA court of inquiry was held in late April 1865, but it was never concluded due to the end of the",
"that he failed as Captain America. U.S. Agent walks away halfway through his dressing-down.\nU.S. Agent was once more forced to choose between following the rules and laws of the nation he had dedicated himself to serving, or ignoring them in favor of doing what he personally believed to be right, when he investigated a series of gruesome murders of illegal immigrants on the Mexico/U.S border who he later discovered were being committed by a corrupt law enforcement official.\nU.S. Agent investigates the killer \"the Scourge of the Underworld\" and discovers that Scourge is not an individual at all, but is in",
"hundreds of thousands in extra money to relocate\".\nVeterans of the armed services expressed outrage at Graves' actions, along with the VA's refusal to fire her, to recoup the embezzled tax-payer dollars, or to seriously reprimand its employees that had broken the law. The American Legion expressed a similar dissatisfaction with the VA's lack of discipline and, noting their retention of ample salaries, called the scandal an \"insult and a disgrace to all veterans\".\nIn addition, Pete Hegseth of Concerned Veterans for America accused Secretary of Veterans Affairs Robert A. McDonald of ineffective leadership and of perpetuating a culture of dishonesty within",
"long,\" he testified. \"It is time the nation woke up and realized that it's not the armed robbers or drug dealers who cause the most economic harm, it's the white collar criminals living in the most expensive homes who have the most impressive resumes who harm us the most. They steal our pensions, bankrupt our companies, and destroy thousands of jobs, ruining countless lives.\" He testified to Rep. Gary Ackerman (D-NY) that he had never been compensated for his efforts. \"I did it for our flag, for patriotism.\" Markopolos presented recommendations to improve the SEC's operations, which included mandatory department",
"provided for improper financial reasons: \"To those who argue that we could make a profit and build up our own industry by selling munitions abroad, I reply that we in America have not yet reached a point where we wish to capitalize on the destruction and death of war.\"\nLindbergh elucidated his beliefs about race in a Reader's Digest article in 1939, stating: \"We can have peace and security only so long as we band together to preserve that most priceless possession, our inheritance of European blood, only so long as we guard ourselves against attack by foreign armies and dilution",
"Many factors reportedly contributed to these tensions, including the fact that U.S. forces received better rations than Australian soldiers, shops and hotels regularly gave preferential treatment to Americans, and the American custom of \"caressing girls in public\" was seen as offensive to the Australian morals of the day. Lack of amenities for the Australians in the city also played a part. The Americans had PXs offering merchandise, food, alcohol, cigarettes, hams, turkeys, ice cream, chocolates, and nylon stockings at low prices, all items that were either forbidden, heavily rationed, or highly priced to Australians. Australian servicemen were not allowed into",
"him about his activity because Walsh knew he himself was doing the same thing. Walsh later advised then-defensive coordinator Romeo Crennel to change the team's signals in light of the event.\nOn May 15, 2008, Senator Ted Kennedy (D-MA), who at the time, along with Specter sat on the United States Senate Committee on the Judiciary, commented on Specter's initiative, saying: \"With the war in Iraq raging on, gasoline prices closing in on $4 a gallon, and Americans losing their homes at record rates to foreclosure, the United States Senate should be focusing on the real problems that Americans are struggling",
"that task, why they were forced to compete for speed, why they were not given survivor's leaves, and why they had not been allowed to rise in rank. Forrestal replied weakly, saying that a predominance of black men were stationed at Port Chicago so of course they would be working there to load munitions. Forrestal pointed out that there was no discrimination because other naval weapons stations were manned by white crews loading munitions. The Navy Secretary said that the men had not been promoted because their time at Port Chicago had been a \"trial period\", and that they were"
] |
Headphone impedance. | [
"Impedance is basically electrical resistance, if you are familiar with the principle. But anyways, low impedance headphones are louder because they have less resistance and so more current flows through them. High impedance are not necessarily worse, but since they have higher resistance they are not as loud, which can be good in some situations. Generally low impedance headphones are good for portable electronics for a number of reasons. Less current used means the battery will last longer, because the device can use less current to create the same sound output as for higher impedance headphones."
] | [
"the current that would be drawn by a 4 to 8 ohm load at normal line out signal voltages. The result will be very weak sound from the speaker and possibly a damaged line out circuit.\nHeadphone outputs and line outputs are sometimes confused. \nDifferent make and model headphones have widely varying impedances, from as little as 20 Ω to a few hundred ohms; the lowest of these will have results similar to a speaker, while the highest may work acceptably if the line out impedance is low enough and the headphones are sensitive enough.\nConversely, a headphone output generally has a",
"a number of manufacturers to introduce amplifiers with 'headphone virtualization' features. In principle, the DSP chips allow the two-driver headphone to simulate a full Dolby 5.1 (or more) surround system. When the sounds from the two headphone drivers mix, they create the phase difference the brain uses to locate the source of a sound. Through most headphones, because the right and left channels do not combine as they do with crossfeed, the illusion of sound directionality is created. Professional audio models In pro-audio terminology, a headphone amplifier is a device that allows multiple headsets to be connected to one or",
"W depending on the specific headphone being used and the design of the amplifier. Certain high power designs can provide up to 6W of power into low impedance loads, although the benefit of such power output with headphones is unclear, as the few orthodynamic headphones that have sufficiently low sensitivities to function with such power levels will reach dangerously high volume levels with such amplifiers.\nEffectively, a headphone amplifier is a small power amplifier that can be connected to a standard headphone jack or the line output of an audio source. Electrically, a headphone amplifier can be thought of as",
"an amplifier that presents a very high input impedance (ideally infinite) and presents a lower output impedance (ideally zero) and larger range of output voltages (ideally infinite). This allows headphones of a low sensitivity to be driven louder as a result of the extra voltage provided by the amplifier. There are potential fidelity gains if headphones are driven with lower distortion than using a headphone amplifier integrated into a general purpose audio product. In practice, this most often occurs when using low impedance headphones with consumer electronics with insufficiently low output impedance (see impedance discussion below). Volume",
"used and not recommended with modern headphones. High output impedance can result in frequency response fluctuations, due to varying load impedance at different frequencies. In 2008 Stereophile Magazine published an article that showed that a 120-Ohm output impedance could cause a 5-dB error in frequency response with certain types of headphones. However, the author of the article also states: \"The ramifications for subjective assessment of headphones are more troublesome because it is usually unclear what assumptions the manufacturer has made regarding source impedance.\" \nMore importantly, low output impedance can reduce distortion by improving the control that the source",
"Most headphone amplifiers support a higher voltage output and therefore higher power (volume) levels. Whereas most portable electronics are powered by a 1.8, 2.5 or 3.3 Vpp supply, many headphone amplifiers use 10, 18 or 24 Vpp supplies, allowing 5-20 dB higher volume. If a pair of headphones is too quiet, adding an amplifier that can output higher voltage/power will increase its volume. Output impedance Many headphone amplifiers have an output impedance in the range of 0.5 - 50 Ohms. The 1996 IEC 61938 standard recommended an output impedance of 120 Ohms, but in practice this is rarely",
"Low-impedance headphones are in the range 16 to 32 ohms and high-impedance headphones are about 100-600 ohms. As the impedance of a pair of headphones increases, more voltage (at a given current) is required to drive it, and the loudness of the headphones for a given voltage decreases. In recent years, impedance of newer headphones has generally decreased to accommodate lower voltages available on battery powered CMOS-based portable electronics. This has resulted in headphones that can be more efficiently driven by battery-powered electronics. Consequently, newer amplifiers are based on designs with relatively low output impedance.\nThe impedance of headphones is of concern because",
"This type of noise is often perceived as snap, crackle and pop when mechanically manipulating or handling the headphone cord. It is often hard to tell, without actual measurements if the source of this noise is electronic or mechanical in nature.\n2) Impedance: Low impedance speaker systems (typically 4-8 Ohms) operating at high power draw heavy currents. A 100W RMS, 4 Ohm speaker operating at full power, for example requires a current of 5A RMS. Depending the length of the speaker cable, and the listener's budget, a minimum wire size of 16AWG is required, and stranded copper cables as heavy",
"audio signals of many varieties are monitored using headphones.\nWired headphones are attached to an audio source by a cable. The most common connectors are 6.35 mm (¼″) and 3.5 mm phone connectors. The larger 6.35 mm connector is more common on fixed location home or professional equipment. The 3.5 mm connector remains the most widely used connector for portable application today. Adapters are available for converting between 6.35 mm and 3.5 mm devices. Electrical characteristics Electrical characteristics of dynamic loudspeakers may be readily applied to headphones, because most headphones are small dynamic loudspeakers. Impedance Headphones are available with high or low impedance (typically measured at 1 kHz).",
"headphones, also known as in-ear monitors (IEMs) or canalphones, are small headphones with similar portability to earbuds that are inserted in the ear canal itself. IEMs are higher-quality in-ear headphones and are used by audio engineers and musicians as well as audiophiles.\nThe outer shells of in-ear headphones are made up of a variety of materials, such as plastic, aluminum, ceramic and other metal alloys. Because in-ear headphones engage the ear canal, they can be prone to sliding out, and they block out much environmental noise. Lack of sound from the environment can be a problem when sound is a necessary",
"types of transducer to convert electrical signals to sound. Moving-coil The moving coil driver, more commonly referred to as a \"dynamic\" driver is the most common type used in headphones. It consists of a stationary magnet element affixed to the frame of the headphone, which sets up a static magnetic field. The magnet in headphones is typically composed of ferrite or neodymium. A voice coil, a light coil of wire, is suspended in the magnetic field of the magnet, attached to a diaphragm, typically fabricated from lightweight, high-stiffness-to-mass-ratio cellulose, polymer, carbon material, paper or the like. ",
"of the output limitations of amplifiers. A modern pair of headphones is driven by an amplifier, with lower impedance headphones presenting a larger load. Amplifiers are not ideal; they also have some output impedance that limits the amount of power they can provide. To ensure an even frequency response, adequate damping factor, and undistorted sound, an amplifier should have an output impedance less than 1/8 that of the headphones it is driving (and ideally, as low as possible). If output impedance is large compared to the impedance of the headphones, significantly higher distortion is present. Therefore, lower impedance headphones tend",
"Instead, DC voltage in the output section is blocked by an output coupling capacitor - typically a large-value (3000-6000μF) electrolytic capacitor - which is interposed between the amplifier's output section and the loudspeaker. OTL Applications OTL power amplifiers for driving loudspeakers require multiple tubes in parallel to obtain the required drive current. An alternative is to use high impedance loudspeakers (now rare, but the Philips produced 400 and 800 ohm speakers, such as type number: AD4690/M800).\nOTL headphone amplifiers are more common, as typical headphones require the current that a single pair of tubes can provide.\nOTL designs are sometimes also",
"it merits treating separately because unlike an OTL for a loudspeaker, which has to push the extremes of a valve circuit's ability to deliver relatively high currents at low voltages into a low impedance load, some headphone types have impedances high enough for normal valve types to drive reasonably as OTLs, and in particular electrostatic loudspeakers and headphones which can be driven directly at hundreds of volts but minimal currents.\nOnce more there are some safety issues associated with direct drive for electrostatic loudspeakers, which in extremis may use transmitting valves operating at over 1 kV. Such systems are potentially lethal.",
"on a small section of protoboard, has a lower parts cost than other headphone amplifiers, and can run for many hours on a single 9 volt battery. The CMoy headphone amplifier can be fit into Altoids tins and can often be found for sale on eBay by searching for \"CMoy\". Circuit A typical CMoy consists of two identical AC coupled, non-inverting operational amplifier circuits each with a 100kΩ input impedance.\nPower is supplied to the opamps using a dual power supply, which effectively divides the input voltage source in half to create a virtual ground. Many virtual ground circuit",
"midway up the cord. In 2008, anti-counterfeiting identifiers (such as a hologram on the back of the circuit board) were added.\nAn \"MIE\" mobile headset version was released in 2009. The MIE includes a microphone and remote control, located on the cord. IE2 / MIE2 The IE2 in-ear headphones were sold from 2010 until 2016. Unlike many other in-ear headphones, they are not inserted deep into the ear canal, rather the fit is similar to an earbud. Therefore, noise isolation is less effective than Canalphones The audio quality of the IE2 was judged to be outperformed by other models in its",
"reaches it by means of a hollow tube. Telephone headsets Telephone headsets connect to a fixed-line telephone system. A telephone headset functions by replacing the handset of a telephone. Headsets for standard corded telephones are fitted with a standard 4P4C commonly called an RJ-9 connector. Headsets are also available with 2.5 mm jack sockets for many DECT phones and other applications. Cordless bluetooth headsets are available, and often used with mobile telephones. Headsets are widely used for telephone-intensive jobs, in particular by call centre workers. They are also used by anyone wishing to hold telephone conversations with both hands free.\nFor older",
"choice of media player, PC-suite or Data transfer. The data transfer mode allows the phone to function as a mass storage device making a card reader (to access the phone's microSD card) unnecessary.\nThe base of the phone also features a 4-part 2.5 mm socket for the supplied headset. When the supplied 4-part 2.5 mm headset is plugged in, it can function as an antenna for the stereo FM radio that also has support for Visual Radio.\nIt is possible to connect a 3-part 2.5 mm to 3.5 mm adapter to use with standard headphones, however as normal headphones do not have a microphone, this feature",
"Geophone Etymology The term geophone derives from the Greek word \"γῆ (ge)\n\" meaning \"earth\" and \"phone\" meaning \"sound\". Construction Geophones have historically been passive analog devices and typically comprise a spring-mounted wire coil moving within the field of a case-mounted permanent magnet to generate an electrical signal. Recent designs have been based on microelectromechanical systems (MEMS) technology which generates an electrical response to ground motion through an active feedback circuit to maintain the position of a small piece of silicon.\nThe response of a coil/magnet geophone is proportional to ground velocity, while MEMS devices usually respond proportional to\nacceleration. MEMS have a",
"one of the plates. Air is forced through the perforations; combined with a continuously changing electrical signal driving the membrane, a sound wave is generated. Electrostatic headphones are usually more expensive than moving-coil ones, and are comparatively uncommon. In addition, a special amplifier is required to amplify the signal to deflect the membrane, which often requires electrical potentials in the range of 100 to 1000 volts.\nDue to the extremely thin and light diaphragm membrane, often only a few micrometers thick, and the complete absence of moving metalwork, the frequency response of electrostatic headphones usually extends well above the audible limit of",
"impedance (also: output impedance) is generally smaller than 0.1 ohm (Ω), and from the point of view of the driver voice coil, is a near short-circuit.\nThe loudspeaker's nominal load impedance (input impedance) of is usually around 4 to 8Ω, although other impedance speakers are available, sometimes as low as 1Ω. Effect of voice coil resistance This is key factor in limiting the amount of damping that can be achieved electrically, because its value is larger (say between 4 and 8Ω typically) than any other resistance in the output circuitry of an amplifier that does not use an output",
"transportation. Speaker cabinets with 1/4 input jacks typically have two parallel jacks, so that the amp head may be plugged into one cabinet, and then a second cabinet can be \"daisy chained\" by connecting it to the first cabinet. Cabinets with horn-loaded tweeters often have an attenuator knob for controlling the tweeter. Some 2000s-era speaker cabinets may have Speakon jacks; these jacks are often used with high-wattage amps, because they are safer, as the cable connections are hidden inside the connector and thus it is impossible for the user to touch the metal contacts when plugging in the amp cable.\nBass",
"High impedance Digital electronics In digital circuits, a high impedance (also known as hi-Z, tri-stated, or floating) output is not being driven to any defined logic level by the output circuit. The signal is neither driven to a logical high nor low level; this third condition leads to the description \"tri-stated\". Such a signal can be seen as an open circuit (or \"floating\" wire) because connecting it to a low impedance circuit will not affect that circuit; it will instead itself be pulled to the same voltage as the actively driven output. The combined input/output pins found on many ICs",
"Sound-powered telephone Operation The microphone transducer converts sound pressure from a user's voice into an electric current, which is then converted back to sound by a transducer at the receiver nodes. The most significant distinction between ordinary telephones and sound-powered telephones is in the operation of the microphone. Since the microphones used in most telephones are designed to modulate a supplied electric current they cannot be used in sound-powered transducers. Most sound-powered telephones use a dynamic microphone. A common approach to transducer design is the balanced armature design because of its efficiency. The number of simultaneous",
"a USB cable. The port on the top is meant for a headset but most users of the phone do not employ a headset because the SPH-N270 is designed with aesthetics in mind.\nOther than physical conveniences, the phone features an assisted GPS receiver, English and Spanish languages, multiple alarms, a calendar, a to-do list and a simple calculator. A notable emphasis of the Samsung SPH-N270 is integration with voice. While 300 contacts stored in the phone can be dialed automatically from the menu, utterance of their names also triggers a phone call. In addition, phone digits can be spoken for",
"location is unusually noisy or the listener has an exceptionally good ear.\nThe best way to reduce the inclusion of electrical noise is two twist the conductors together, use shielded cables, employ differential drive or a combination of all three methods. Also, the cable interconnect keep should always be kept as short as physically possible.\nElectrostatic and piezoelectric noise can also become an issue in exotic headphone systems, if the headphones have a relatively high input impedance compared to traditional speakers which have a nominal impedance of 8 Ohms. This is where a careful choice of insulating materials can make a difference.",
"Accutone Headsets for Call Centers The business unit of Accutone builds headsets for office and call centres, ranging from telephone connection to VoIP connection. They are one of the few brands to supply Unified Communication (UC) Headsets in the market, supporting Microsoft Lync platform. With the expected continual growth of demand for headset in the global contact center and office market, a research showed that Accutone is a key contributor amongst only a handful of brands. Consumer Audio Headphones At the retail level, the Accutone brand is associated with a wide series of audio headphones, ranging from in-ear to over-the-head",
"approximately 20 kHz. The high frequency response means that the low midband distortion level is maintained to the top of the audible frequency band, which is generally not the case with moving coil drivers. Also, the frequency response peakiness regularly seen in the high frequency region with moving coil drivers is absent. Well-designed electrostatic headphones can produce significantly better sound quality than other types.\nElectrostatic headphones require a voltage source generating 100 V to over 1 kV, and are on the user's head. Since the invention of insulators, there's no actual danger. They do not need to deliver significant electric current, which further limits",
"messaging in their devices. though such practices have received mixed response from some segments of the buying who favor the personal choice of setting their own volume levels.\nThe usual way of limiting sound volume on devices driving headphones is by limiting output power. This has the additional undesirable effect of being dependent of the efficiency of the headphones; a device producing the maximum allowed power may not produce adequate volume when paired with low-efficiency, high-impedance equipment, while the same amount of power can reach dangerous levels with very efficient earphones.\nSome studies have found that people are more likely to raise",
"steady direct current is passed between the plates through the granules. The varying resistance results in a modulation of the current, creating a varying electric current that reproduces the varying pressure of the sound wave. In telephony, this undulating current is directly passed through the telephone wires to the central office. In public address systems it is amplified by an audio amplifier. The frequency response of the carbon microphone, however, is limited to a narrow range, and the device produces significant electrical noise.\nBefore the proliferation of vacuum tube amplifiers in the 1920s, carbon microphones were the only"
] |
What exactly is this whole Netflix, Comcast, and/or Verizon conflict? | [
"Netflix user on Comcast internet - I LOVE NETFLIX OMG RAWRRRR! NETFLIX ALL DAY\n\nComcast - Too many people are using Netflix, we didn't model this level of demand when pricing our services. Henceforthwhich we are going to lower the internet speeds for people using Netflix because WE ARE DOUCHNOZZLES.\n\nNetflix - WTF BRO?\n\nNetflix User on Comcast - WTF BRO?\n\nComcast - Pay me more money.\n\nNetflix/Netlflix users - Go fuck yourself.\n\nComcast - Ok sure, in the meantime, SLOW INTERNET FOR YOU\n\nNetflix users - Fuck I can't watch Netflix.\n\nNetflix - FUCKBEANS. Here's your cash Comcast, you shit-eating fuck.\n\nComcast - Thanks, fuck you too.\n\nNetflix users - My subscription cost best not go up..\n\nNetflix - ....\n\nThat's where we are at now, if I understand it myself."
] | [
"A/S's digital terrestrial television network in Denmark on September 26, 2013 together with C More's other channel C More Series & the VOD service C More Play. 2014 Because of UFC started their own streaming service UFC Fight Pass could Canal 9 & Canal 8 Sport not get the extension of their rights to the UFC PPV and UFC Fight Night, but they would still be able to show the UFC's TV shows like UFC Unleashed, UFC Main Event & classics WEC Events. This was announced on their Facebook page on January 4, 2014.\nOn March 1, 2014 it was announced",
"September 2016, Comcast confirmed that it planned to launch a mobile service, using Verizon's network as an MVNO, in mid-2017.\nIn February 2017, in the wake of competition from Sprint and T-Mobile, and initiatives to expand the capacity and improve the quality of its network by using macrocells and supporting carrier aggregation, Verizon announced that it would bring back an \"unlimited\" data plan (subject to throttling in heavy network areas after 22 GB of usage). Verizon's decision not to restrict the bitrate of video services prompted Sprint and T-Mobile to remove similar restrictions from their own plans.\nIn March 2017, Verizon announced that",
"that the series had been cancelled, and the following day Netflix confirmed that they were pulling out of the series. NRK, who owns the rights to the series, remained optimistic however that a deal could be made with another company for a fourth series.",
"Network was chosen as the slot for Esquire Network. G4 Media, and its main network are expected to \"remain as is for the foreseeable future, though it's highly unlikely the company will invest in more original programming.\"\nDish Network, which was a part owner of G4 Media, dropped the network from its lineup on November 1, 2013. G4 Media becomes defunct, so does G4 After the fifth season of American Ninja Warrior was completed, control of production for the series for future seasons shifted from G4 Media to NBCUniversal Television, leaving G4 Media as a defunct production company maintaining the archives",
"as CEO.\nOn 27 January 2016, Nine's online catch-up video on demand service 9Jumpin was retired and replaced by 9Now. 9Now offers a range of content larger than 9Jumpin and also offers a live streaming service for Nine's multicast channels. Live streaming for Nine was launched on the same day, with streaming for 9Gem, 9Go! and 9Life launched on 19 May 2016. Following the launch of 9Now, the WIN Corporation, owner of Nine affiliate WIN Television, filed a lawsuit against Nine Entertainment Co., claiming that live streaming into regional areas breaches their affiliation agreement. The case was later dismissed on 28",
"announced they would be available on Hulu Live TV and YouTube TV.\nOn April 11, 2018, Comcast dropped Big Ten Network in a number of \"out-of-market\" states that fall outside of the conference's direct geographical footprint, with other selected markets dropping the network on May 10, 2018. This notably includes the 23,000 Comcast customers in New York, despite the recent addition of Rutgers University in New Jersey having been used to market the conference and BTN in neighboring New York City. Canadian carriage In September 2008, the Canadian Radio-television and Telecommunications Commission approved a request by Shaw Communications to allow carriage",
"2017, it was reported that AT&T planned to launch a new cable TV-like service for delivery over-the-top over its own or a competitor's broadband network sometime next year.\nOn November 20, 2017, Assistant Attorney General Makan Delrahim filed a lawsuit for the United States Department of Justice Antitrust Division to block the merger with Time Warner, saying it \"will harm competition, result in higher bills for consumers and less innovation.\" In order for AT&T to fully acquire Time Warner, the Department of Justice stated that the company must divest either DirecTV or Turner Broadcasting System.\nAs of 2017, AT&T is the world's",
"with its sister channels, Univision, Galavisión, Univision Deportes Network and Univision tlnovelas were dropped by AT&T U-verse on March 4, 2016, due to a carriage dispute.\nThis however, did not affect DirecTV customers, despite being a subsidiary of AT&T, as they were done on a separate deal. All of Univision's channels (including UniMás) were later returned to the U-verse lineup on March 24, 2016.\nOn January 27, 2017, Charter Spectrum (along with Time Warner Cable and Bright House, the latter merged with Charter Communications on 2016) faced another dispute with Univision, warning Charter Communications that UniMas and its sister channels could be",
"a new feature where subscribers could catch-up on past episodes. \nIt was announced on February 11, 2014 that Neon Alley would discontinue its web channel format and transition to become a free on-demand service for those living in the United States. Series will be streamed through their website or through Internet connected devices on Hulu: a joint venture between NBCUniversal Television Group, Disney-ABC Television Group and Fox Broadcasting Company. The change took effect on April 1, 2014. Following the relaunch, as a direct result of migrating to Hulu, viewers living in Canada lost access to the website. After Viz.com",
"with Braga suggesting that fans could prompt Netflix into producing a new season of Enterprise by watching the existing four seasons on the service. This resulted in a Facebook campaign set up to promote the idea of a fifth season. Season five At the time of the cancellation, Coto had hoped for renewal and had already started to make plans for the fifth season. These included the expectation that the show would begin to cover the buildup to the Romulan War, as well as continue to link to The Original Series with references to things such as the cloud city",
"live streaming service 9Now on 27 January 2016, WIN filed a lawsuit against Nine, claiming that live streaming into regional areas breached their affiliation agreement. Justice Hammerschlag of the NSW Supreme Court dismissed the case on 28 April 2016, ruling that the definition of \"broadcasting\" in WIN's affiliation agreement with the Nine Network did not cover internet streaming, \"and that Nine is under no express or implied obligation not to do it.\"\nFollowing WIN's defeat in the 9Now lawsuit, Nine announced it had signed a new $500 million affiliation deal with Network Ten's main affiliate Southern Cross Austereo. This saw Southern",
"U.S.\nNetflix is the exclusive video-on-demand provider for the series and makes the content available in all its territories, except for Australia and New Zealand. In Australia, Better Call Saul premiered on the streaming service Stan on February 9, 2015, acting as the service's flagship program. In New Zealand, the show is exclusive to the New Zealand-based subscription video-on-demand service, Lightbox. The episodes were available for viewing within three days of broadcast in the U.S.\nIn the United Kingdom and Ireland, the series was acquired by Netflix on December 16, 2013, and the first episode premiered on February 9, 2015, with the",
"Production On October 11, 1999, ABC and Warner Bros. Television announced that parts of the November 17 episode of The Drew Carey Show would be broadcast simultaneously on television and the internet, a first for a primetime show. The event would also mark the first time the internet arms of ABC and Warner Bros. would work together. The companies hoped to target around 500,000 viewers of the estimated 4 million US households with internet access that regularly watched the show. Richard Tedesco from Broadcasting & Cable reported that the video would be streamed using Microsoft's Windows Media Player. ABC opted",
"cable networks, one regional news cable station (New England Cable News), a whole bunch of websites, two pro sports teams in Philadelphia and two arenas, a food service vendor, a ticket agency, and four theme parks. And some other stuff.\" Impact on the video market One of the claims is \"Comcast would be able to use its vertically integrated position to deny rival distributors access to programming or to raise the cost of that programming\". Comcast-NBC will face two rival distributors – the satellite and telephone company and the new entrant. Of course, both of them are worrying about the",
"DirecTV filing a complaint against Comcast with the FCC on September 23, 1997, claiming that it used unfair monopolistic control to keep Comcast SportsNet Philadelphia from being made available via satellite (in contrast, DirecTV had carried SportsChannel Philadelphia prior to its shutdown). Consequently, market penetration by direct broadcast satellite providers in the Philadelphia area is much lower than in other cities within the United States. Comcast eventually began offering the sports network to Verizon's FiOS service in eastern Pennsylvania, Delaware and southern New Jersey in December 2006. The \"terrestrial exception\" loophole was closed by the FCC in a 4-1 vote",
"November 2012, Fight Network expanded into the U.S. market and launched a subscription service for live online streaming of the channel on NeuLion.\nIn July 2015, Fight Network launched on Suddenlink Communications across the U.S.\nIn July 2018, Fight Network returned to the UK on the Showcase TV service on Sky and Freesat.",
"to enforce a monopoly position. C-SPAN denied Sky Angel's arguments, and claimed the removal was for contractual reasons relating to IPTV. Sky Angel, in its filing with the court, showed that CSPAN was already streaming its channels over the web to the public free of charge. In June 2013, the company subsequently filed a second antitrust suit. The claims were rejected, with the court arguing once again that Sky Angel had produced no actual evidence of collusion among the C-SPAN consortium.\nIn April 2010, Discovery Communications announced that it would pull its channels from Sky Angel in response to unspecified concerns",
"making it the first cancelled Netflix/streaming TV series to be revived for a cable network, rather than the other way around as usual.",
"network HDNet (later relaunched as AXS TV) to broadcast their next event, Titan FC 16, live on the network. The event would take place on January 28, 2011, and was headlined by a super heavyweight bout between former two-time UFC Heavyweight champion Tim Sylvia and former The Ultimate Fighter: Heavyweights cast member Abe Wagner.\nPrior to the airing of the promotion's second show on the network, Titan FC 17: Lashley vs. Ott, CEO Joe Kelly announced that the organization had signed a three-year extension with HDNet to broadcast their live events under the network's HDNet Fights label. Kelly subsequently resigned from",
"shareholders. Sky was delisted on 7 November 2018 after Comcast acquired all remaining shares.\nWhile NBCUniversal and Sky still operate mainly as separate entities within Comcast, following the Sky takeover Comcast has begun the process of integrating some of NBCUniversal's international operations with parts of Sky. Among other moves, NBCUniversal's pay television channels in the United Kingdom will be folded with Sky's, and Sky Deutschland will become the parent company of NBCU's German networks. Preparation of over-the-top streaming service, Peacock On January 14, 2019, NBCUniversal announced that it will launch an over-the-top streaming service to compete with Netflix, Amazon Prime Video,",
"February 11, 2008 CBS announced that the live Internet feeds would return for the season with certain events in the House being blocked out to preserve drama of the television broadcasts. The Internet talk show House Calls: The Big Brother Talk Show would also return with host Gretchen Massey. A new feature for Big Brother 9 was the addition of watching the live Internet feeds and new episode of Big Brother live on MediaFLO enabled cell phones. Big Brother 9 was broadcast on television in the United Kingdom, airing on E4 with two one-hour episodes on Thursday nights and one",
"air, NY1 reporters covered the story as if the channel was fully operational, interviewing survivors and witnesses.\nFollowing the attack on the World Trade Center on September 11, 2001, NY1's feed was temporarily transmitted internationally through Oxygen after the cable channel was unable to broadcast regular programming from its headquarters in the Manhattan neighborhood of Battery Park City, located near the World Trade Center. In 2001, Time Warner Cable began offering NY1 to digital cable subscribers in the Albany market (it remained on that system even after the October 2002 launch of sister cable news channel Capital News 9); the channel",
"the 2017–18 playoffs, Verizon still offers mobile streaming of games, but no longer holds exclusive rights to stream NFL games on smartphones or make them exclusive to Verizon Wireless subscribers. Instead, Verizon elected to use the deal to bolster its recent acquisition of Yahoo!; on January 9, 2018, Verizon announced that it would host streams of playoff games through the Yahoo! Sports and go90 app, including Super Bowl LII. As a result of the deal, the online stream was available to viewers on all Internet devices for the first time, regardless of network (because of Verizon's previous exclusive rights deal,",
"AXN to its programming lineup as one of its exclusive channels. TV5 files complaint On March 14, 2011 local television network, TV5 through its parent company, ABC Development Corporation (now TV5 Network, Inc.) filed a complaint to the local National Telecommunications Commission against SkyCable. The latter accused SkyCable of unfair practice for refusing to carry its news channel, AksyonTV. Under NTC Memorandum Circular 4-08-88, all cable and satellite companies in the Philippines must carry all free-to-air local channels on its lineup. On April 1, 2011, SkyCable announced the inclusion of AksyonTV to its lineup effective May 4 on channel 61",
"apps for iOS, Android and newer version Windows devices; a traditional VOD service called CBS on Demand available on most traditional cable and IPTV providers; and through content deals with Amazon Video (which holds exclusive streaming rights to two CBS drama series, Extant and Under the Dome) and Netflix. Notably, however, CBS is the only major broadcast network that does not provide recent episodes of its programming on Hulu (sister network The CW does offer its programming on the streaming service, albeit on a one-week delay after becoming available on the network's website on Hulu's free service, with users of",
"April 2016 with Justice Hammerschlag of the NSW Supreme Court stating that, \"I have concluded that live streaming is not broadcasting within the meaning of the PSA (program supply agreement), and that Nine is under no express or implied obligation not to do it.\"\nFollowing their victory in the 9Now court case, Nine Entertainment Co. announced on 29 April 2016 that it had signed a $500 million five year affiliation deal with Southern Cross Austereo, the then-primary regional affiliate of Network Ten. On 1 July 2016, WIN Television lost its Nine affiliate status to Southern Cross, which had Nine's metropolitan branding",
"Corp. bought MediaOne, including its stake in the network; in January 2001, AT&T proposed to sell the stake, along with its interest in seven other cable networks, in a filing with the Federal Communications Commission. Comcast acquired the stake in November 2002 as part of its merger with AT&T Broadband.\nThe network's name was shortened to FSN New England in 2004, through the de-emphasis of the \"Fox Sports Net\" brand by the regional networks. In later years, the network carried selected New York Mets games in parts of Connecticut that were not served by MSG or FSN New York (now MSG",
"deal with Viacom In September 29, 2016, National Amusements sent a letter to the company and Viacom, encouraging the two companies to merge back into one company. On December 12, the deal was called off.\nOn January 12, 2018, CNBC reported that Viacom had re-entered talks to merge back into CBS Corporation, after AT&T's purchase of Time Warner was planned and The Walt Disney Company's plan to acquire most of 21st Century Fox assets and the heavy competition from companies such as Netflix and Amazon. Shortly afterward, it was reported that the combined company could be a suitor for acquiring the",
"release Video-on-demand service Netflix signed an agreement with the EBU in July 2019 that would allow them to distribute the 2020 contest on their service in the United States.",
"as over-the-top services.\nCiting the reduction of competition in the broadband and cable industries that would result from the merger, the Department of Justice planned to file an antitrust lawsuit against Comcast and Time Warner Cable in an effort to block it. On April 24, 2015, Comcast announced that it would withdraw its proposal to acquire TWC. Afterward, TWC would enter into an agreement to be acquired by Charter Communications. Background On November 22, 2013, it was widely reported that Comcast was seeking advice on a possible bid for Time Warner Cable. Charter Communications was also thinking of making an offer."
] |
What is the difference between RAR, ZIP, GZIP, etc? | [
"First of all, gzip is only a compression format, while rar and zip are compression _and archival_ formats. That is, you can store several files into a zip file, while in order to do the same in a gzip (or bz2, or xz) file you need to wrap them into some kind of archival format first; usually tar - > x.tar.gz, x.tar.bz2, x.tar.xz vs. x.zip, x.rar or x.7z.\n\nThis creates an important difference: unless you specifically alter the compressed format in some way, .tar.something files are always compressed \"solid\" by default; that is, the compressor takes the raw stream of bytes of the tar archive and compresses it. Thus, in order to seek to a particular file you need to decompress everything that came before it. If a compression+archival format like zip, rar or 7z is used, the \"solid\" compression is usually just an option, not the default.\n\nThen, the compression algorithms themselves are different. Zip and GZip use the Deflate algorithm, while 7zip and xz use the LZMA algorithm, etc. You can check them all out on the Wikipedia."
] | [
"Filzip Features The program has been localized to more than twenty languages.\nFilzip supports seven different archive formats, allowing the user to add and extract files from the archives. These include ZIP, BH, CAB, JAR, LHA (LZH), TAR, and gzip. A handful of other formats are supported for extraction only, including ACE, ARC, ARJ, RAR, and ZOO.\nFiles within most formats can be viewed without explicitly unpacking them, and can be removed or renamed within the archive. ZIP files may be spanned; that is, written to any number of files with a fixed maximum size so that they can be placed on",
"Libzip Notable features libzip supports reading and writing zip archives. In particular, it allows extracting single or multiple files and querying their attributes (including extra fields and comments). For writing, it allows replacing files or adding new ones; the data can come from buffers, files, or even other zip archives (without recompression). Extra field data and comments (both file and archive) can be added, modified, or deleted. All changes are finalized when closing the archive, so the on-disk archive is always self-consistent.\nThe zip64 extension for large files is also supported. Version 1.2.0 added support for encryption and decryption using AES,",
"7-Zip 7z By default, 7-Zip creates 7z-format archives with a .7z file extension. Each archive can contain multiple directories and files. As a container format, security or size reduction are achieved using a stacked combination of filters. These can consist of pre-processors, compression algorithms, and encryption filters.\nThe core 7z compression uses a variety of algorithms, the most common of which are bzip2, PPMd, LZMA2, and LZMA. Developed by Pavlov, LZMA is a relatively new system, making its debut as part of the 7z format. LZMA uses an LZ-based sliding dictionary of up to 4 GB in size, backed by a",
"gained some popularity as a gzip replacement. It produces considerably smaller files (especially for source code and other structured text), but at the cost of memory and processing time (up to a factor of 4).\nAdvanceCOMP and 7-Zip can produce gzip-compatible files, using an internal DEFLATE implementation with better compression ratios than gzip itself—at the cost of more processor time compared to the reference implementation.",
"SliTaz Features SliTaz uses the Openbox window manager.\nAdditional packages are added using a program called \"TazPanel\". This is due to the specific package format that SliTaz uses (tazpkg). It can still use packages from the more popular distribution though, as Debian, by means of first carrying out a conversion of these different packages.\nBy default, SliTaz offers no persistence, however it can still be added if the user wish. The choice of the filesystem/bootloader used with slitaz is then of importance however; persistence being only available with ext2 and ext3 filesystems and the syslinux or extlinux boot loader.\nAnother useful tool is",
"Shortcut (computing) In computing, a file shortcut is a handle in a user interface that allows the user to find a file or resource located in a different directory or folder from the place where the shortcut is located. Similarly, an Internet shortcut allows the user to open a page, file or resource located at a remote Internet location or Web site.\nShortcuts are typically implemented as a small file containing a target URI or GUID to an object, or the name of a target program file that the shortcut represents. The shortcut might additionally specify parameters to be passed to",
"Zopfli Properties and use case Zopfli can output either a raw DEFLATE data stream or DEFLATE data encapsulated into gzip or zlib formats. It can be configured to do more or fewer iterations than the default 15 to trade processing time for compression efficiency.\nUnder default settings, the output of Zopfli is typically 3–8% smaller than zlib's maximum compression, but takes around 80 times longer. The speed of decompressing Zopfli's output versus zlib's output is practically unaffected.\nDue to its significantly slower compression speed, zopfli is less suited for on-the-fly compression and is typically used for one-time compression of static content. This",
"specifies different headers for error and consistency checking. Other common, similarly named formats and programs with different native formats include 7-Zip, bzip2, and rzip. Concerns The theoretical maximum compression factor for a raw DEFLATE stream is about 1032 to one, but by exploiting the ZIP format in unintended ways, ZIP archives with compression ratios of billions to one can be constructed. These \"zip bomb\"s unzip to extremely large sizes overwhelming the capacity of the computer it is running on.",
"ZIP file is viewed in a text editor the first two bytes of the file are usually \"PK\". (DOS, OS/2 and Windows self-extracting ZIPs have an EXE before the ZIP so start with \"MZ\"; self-extracting ZIPs for other operating systems may similarly be preceded by executable code for extracting the archive's content on that platform.)\nThe .ZIP specification also supports spreading archives across multiple file-system files. Originally intended for storage of large ZIP files across multiple floppy disks, this feature is now used for sending ZIP archives in parts over email, or over other transports or removable media.\nThe FAT filesystem of",
"ZIP archive to be made into a self-extracting archive (application that decompresses its contained data), by prepending the program code to a ZIP archive and marking the file as executable. Storing the catalog at the end also makes possible hiding a zipped file by appending it to an innocuous file, such as a GIF image file.\nThe .ZIP format uses a 32-bit CRC algorithm and includes two copies of the directory structure of the archive to provide greater protection against data loss. Structure A ZIP file is correctly identified by the presence of an end of central directory record which is",
"PeaZip Features The program features an archive browser interface with search and history features for intuitive navigation in archive's content, and allows the application of fine-grained multiple exclusion and inclusion filter rules to the archive; a flat browsing mode is possible as alternative archive browsing method.\nPeaZip allows users to run extracting and archiving operations automatically using command-line generated exporting the job defined in the GUI front-end. It can also create, edit and restore an archive's layout for speeding up archiving or backup operation's definition.\nOther notable features of the program include archive conversion, file splitting and joining, secure file deletion, byte-to-byte",
"Gzip Derivatives and other uses The tar utility included in most Linux distributions can extract .tar.gz files by passing the z option, e.g., tar -zxf file.tar.gz.\nzlib is an abstraction of the DEFLATE algorithm in library form which includes support both for the gzip file format and a lightweight stream format in its API. The zlib stream format, DEFLATE, and the gzip file format were standardized respectively as RFC 1950, RFC 1951, and RFC 1952.\nThe gzip format is used in HTTP compression, a technique used to speed up the sending of HTML and other content on the World Wide Web. It",
"ZipGenius Features ZipGenius features include: support for TWAIN devices (scanners and digital cameras), file extraction to CD/DVD burner (only under Windows XP), an FTP client (FTPGenius), and ZGAlbum. ZGAlbum allows users to create slideshows with pictures, which can be loaded from a folder or imported through a TWAIN device.\nZipGenius also fully integrates with Windows Explorer shell. User interface and functions have been placed in multiple locations. Program functions can be accessed either from a menu of buttons on the main toolbar, or from a drop-down menu. They can be customized to suit user preferences.\nZipGenius 6 is capable of",
"libraries; and a standalone executable 7za.exe, containing built-in modules, but with compression/decompression support limited to 7z, ZIP, gzip, bzip2, Z and tar formats. A 64-bit version is available, with support for large memory maps, leading to faster compression. All versions support multi-threading.\nThe 7za.exe version of 7-Zip is available for Unix-like operating systems (including Linux, FreeBSD, and macOS), FreeDOS, OpenVMS, AmigaOS 4, and MorphOS under the p7zip project. Security On older versions Self-extracting archives were vulnerable to arbitrary code execution through DLL hijacking: they load and run a DLL named UXTheme.dll, if it is in the same folder as the executable",
"first use of the title “StuffIt Wireless.” Alternatives macOS includes Archive Utility which is compatible with the open formats ZIP, gzip, and bzip2. In versions since 10.3 (Panther), it now preserves resource forks in the ZIP format, so Stuffit is no longer a requirement for Mac file compression. ZIP is also a de facto standard, making it more widely accepted for archives and sharing.\nWhile StuffIt used to be a standard way of packaging Mac software for download, macOS native compressed disk images (DMG) have largely replaced this practice.\nStuffIt might still be used in situations where its specific features are required",
"Zstandard Features Zstandard was designed to give a compression ratio comparable to that of the DEFLATE algorithm (developed in 1991 and used in the original ZIP and gzip programs), but faster, especially for decompression. It is tunable with compression levels ranging from negative 5 (fastest) to 22 (slowest in compression speed, but best compression ratio).\nThe zstd package includes parallel (multi-threaded) implementations of both compression and decompression. Starting from version 1.3.2 (October 2017), zstd optionally implements very long range search and deduplication similar to rzip or lrzip.\nCompression speed can vary by a factor of 20 or more between the fastest and",
"(called “blobs”), and compilation scripts for building a given software component. There are two ways to provide binary “blobs”. In a BOSH release that is provided as an archive file, blobs are directly included. But with BOSH releases that are provided as git repositories, doing the same tends to be problematic when blobs get big. That's why a BOSH release provides a concept of “blobstore”, from where referenced blobs can be fetched. Most BOSH releases use blobstores that are backed by public Amazon S3 buckets, but there are other ways to refer to a private or a local “blobstore” in",
"a swap device on the least recently used (LRU) basis. This approach makes zswap a true swap cache, as the oldest cached pages are evicted to a swap device once the cache is full, making room for newer swapped pages to be compressed and cached.\nzbud is a special-purpose memory allocator used internally by zswap for storing compressed pages, implemented as a rewrite of the zbud allocator used by the Oracle's zcache, which is another virtual memory compression implementation for the Linux kernel. Internally, zbud works by storing up to two compressed pages (\"buddies\", hence the allocator name) per",
"compression and non-compression archive formats (both for packing and unpacking), including ZIP, Gzip, bzip2, xz, tar and WIM. The utility also supports unpacking APM, ARJ, CHM, cpio, DEB, FLV, JAR, LHA/LZH, LZMA, MSLZ, Office Open XML, onepkg, RAR, RPM, smzip, SWF, XAR, and Z archives and CramFS, DMG, FAT, HFS, ISO, MBR, NTFS, SquashFS, UDF, and VHD disk images. 7-Zip supports the ZIPX format for unpacking only. It has had this support since at least version 9.20, which was released in late 2010.\n7-Zip can open some MSI files, allowing access to the meta-files within along with the main contents. Some",
"Microsoft CAB (LZX compression) and NSIS (LZMA) installer formats can be opened. Similarly, some Microsoft executable programs (.EXEs) that are self-extracting archives or otherwise contain archived content (e.g., some setup files) may be opened as archives.\nWhen compressing ZIP or gzip files, 7-Zip uses its own DEFLATE encoder, which may achieve higher compression, but at lower speed, than the more common zlib DEFLATE implementation. The 7-Zip deflate encoder implementation is available separately as part of the AdvanceCOMP suite of tools.\nThe decompression engine for RAR archives was developed using freely available source code of the unRAR program, which has a licensing restriction",
"by a ZIP application. A side-effect of this is that it is possible to author a file that is both a working ZIP archive and another format, provided that the other format tolerates arbitrary data at its end, beginning, or middle. Self-extracting archives (SFX), of the form supported by WinZip, take advantage of this, in that they are executable (.exe) files that conform to the PKZIP AppNote.txt specification, and can be read by compliant zip tools or libraries.\nThis property of the .ZIP format, and of the JAR format which is a variant of ZIP, can be exploited to hide rogue",
"ZAP File A Basic .ZAP File A .ZAP file can be as simple or as complicated as the System Administrator wishes to make it. There are only two required fields in a .ZAP file, an Application Name (called a Friendly Name) and a Setup Command line. Other information is optional.\nThe .ZAP File begins with a title line consisting of the word Application inside single Square Brackets ([ ]). Underneath this come the entry fields, the two Required fields being FriendlyName = \"Name\" and SetupCommand = \"\\\\Server\\share\\setupfile\". You can also add Optional entries, such as DisplayVersion = and Publisher =. Note",
"machine it is running on. It can also shutdown and check the status of the host. ZYpp package management ZYpp (or libzypp) is a Linux software management engine which has a powerful dependency resolver and a convenient package management API. ZYpp is the backend for zypper, the default command line package management tool for openSUSE. Build Service The Open Build Service provides software developers with a tool to compile, release and publish their software for many distributions, including Mandriva, Ubuntu, Fedora and Debian. It typically simplifies the packaging process, so developers can more easily package a single program for many",
"Spooling In computing, spooling is a specialized form of multi-programming for the purpose of copying data between different devices. In contemporary systems, it is usually used for mediating between a computer application and a slow peripheral, such as a printer. Spooling allows programs to \"hand off\" work to be done by the peripheral and then proceed to other tasks, or to not begin until input has been transcribed. A dedicated program, the spooler, maintains an orderly sequence of jobs for the peripheral and feeds it data at its own rate. Conversely, for slow input peripherals, such as",
"Sandbox (computer security) In computer security, a \"sandbox\" is a security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading. It is often used to execute untested or untrusted programs or code, possibly from unverified or untrusted third parties, suppliers, users or websites, without risking harm to the host machine or operating system. A sandbox typically provides a tightly controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access, the ability to inspect the host system or read from",
"JAGS.\nThe BUGS language is the language that specifies the model code. It is parsed by OpenBUGS, which then creates an executable (compiled code) that generates a sample from the posterior distribution when run.\nOpenBUGS was designed to run together with S-Plus and the BUGS language is similar to the S programming language. OpenBUGS works well together with R; the R2OpenBUGS or BRugs packages provides some interoperability, and R modules help further analyses.",
"the C++ library, as well as ports of LZMA to Pascal, Go and Ada.\nThe 7-Zip implementation uses several variants of hash chains, binary trees and Patricia tries as the basis for its dictionary search algorithm.\nDecompression-only code for LZMA generally compiles to around 5 KB, and the amount of RAM required during decompression is principally determined by the size of the sliding window used during compression. Small code size and relatively low memory overhead, particularly with smaller dictionary lengths, and free source code make the LZMA decompression algorithm well-suited to embedded applications. LZHAM LZHAM (LZ, Huffman, Arithmetic, Markov), is an LZMA-like implementation",
"of ZipZaps waned somewhat in 2004 with RadioShack's introduction of XMODS. Like ZipZaps, XMODS offered customization options in both appearance and performance potential, but were considerably larger at 1:28 scale. XMODS Micro RC On October 2008, RadioShack relaunched the ZipZaps line – this time, as XMODS Micro RC. Only the name was changed; all parts were backwards and forwards-compatible between ZipZaps (except the light features of the SE line) and XMODS Micro RC lines, and used the same chassis and controller of the regular ZipZaps line (as opposed to the more advanced features of the SE line).",
"Zip to Zap Background The Zip to Zap was an idea of Chuck Stroup, a student at North Dakota State University in Fargo. Stroup could not afford to attend the more traditional spring break festivities held in Fort Lauderdale, Florida. Therefore, he came up with the idea of what was to become known as the \"Zip to Zap a Grand Festival of Light and Love\". Stroup placed an advertisement in the student newspaper at NDSU, The Spectrum. His idea was soon embraced by college students throughout the upper midwest of the United States and states as far away as Texas",
"Rzip Compression algorithm rzip operates in two stages. The first stage finds and encodes large chunks of duplicated data over potentially very long distances (900 MB) in the input file. The second stage uses a standard compression algorithm (bzip2) to compress the output of the first stage.\nIt is quite common these days to need to compress files that contain long distance redundancies. For example, when compressing a set of home directories several users might have copies of the same file, or of quite similar files. It is also common to have a single file that contains large duplicated chunks over long"
] |
Keto. What is it? Is there scientific evidence for it? Should everyone do it? | [
"Keto is an umbrella term for any dietary habit/initiative that emphasizes the metabolic state \"ketosis\" in which the body produces ketones, an energy source and alternative to carbohydrate-derived glucose. Ketones can supply up to around 75-80% of your body's necessary energy (the brain requires approx. 25% of energy from glucose).\n\nEssentially, this makes Keto an LCHF diet (low carb, high fat) but moderation of protein intake is also stressed because protein can be metabolized into glucose at higher levels. \n\nKeto is about losing weight by controlling insulin response and having your body burning ketones (in fat) through calorie debt. It is not a magic bullet and does require reduction of calories (to deficit) for weight loss. However, most ketogenic people find this easier to maintain than other low-calorie diets due to the higher satiety levels of full fat and protein.\n\nLike any other \"diet\", keto requires a bit of research and some vigilance in terms of watching your levels of various things. Fat, protein, and carbs are important to control but ketosis (the state of burning ketones as primary energy source) is also diuretic which means loss of water and electrolytes that have to be replenished. Ketoers are often thirsty and drink a lot of water and also have to make sure to consume requisite amounts of potassium, magnesium, and sodium to stay healthy (sometimes through supplements, more often through food).\n\nMost people try to get 65% fat, 5% carbs, and 30% protein as their \"macros\" in food. Others play with those numbers a bit for varying reasons. The commonly accepted limit on carbs-per-day is around 25-30g for most people, but some can eat up to 50 or more g of carbs and maintain ketosis.\n\nIt seems like not everyone needs to do keto. There's a lot of ways to lose weight and keep it off by maintaining a healthy lifestyle. For me personally, keto helps combat some poor habits I have developed with food (specifically eating very fast and overreating). \n\nThere is some correlative reports of other benefits for keto including reduction of diabetes symptoms, inflammation, flatulence and gas, and some even claim that their mood improves and clarity of thinking also.",
"Since you are five years old I won't bother you with the science.\n\nMost people think eating fat makes you fat. Instead they eat lots of white stuff called carbs. Carbs are stuff like bread, pasta, cake, beer and fruit. \n\nCarbs are delicious, but people who eat lots of carbs tend to get fat. The problem is that eating carbs makes you want to eat more carbs right away! \n\nOn a keto diet you eat a lot of fat instead of carbs. It doesn't make you fat; it keeps you full so you don't want to eat as much food. \n\nLots of people like me have lost weight eating lots of fat and cutting out the carbs.",
"If you eat any diet at a calorie deficit to your needs then you will lose weight because your body will use fat and protein from excess to make up the difference. Keto says get a majority of your calories from fat, and protein, and very little from carbohydrates. You can't have any sugars or refined carbs, the numbers just don't allow it. \n\nAgain, you will lose weight on any calorie reduced diet, you could eat nothing but XXXX calories of fudge every day and lose weight, but it is not exactly nutritional. Keto gives you a slight advantage in that on a normal diet the body will burn carbs first, then transition to burn fat if it runs out, on keto your body will stay in the mode that uses fat for energy and will still have needed protein. The idea is that first you burn dietary fat, then stored fat, all without much transition. Probably the best benefit is that the food you have to eat are very filling. \n\nLook at 2 breakfast choices:\n\n2 pop-tarts ~400 calories. Not implying it is the healthiest choice on the planet, but it would be close to what a person would consider a normal breakfast, if not on the light side.\n\nvs keto:\n\n3 eggs, 3 strips of bacon, and a half cup of green vegetables. Load them up with butter if you want, throw some cheese on the eggs, and you come in right around 400 calories if you do. \n\nNow which one of those is going to leave you hungry at lunch time? Might have to eat only a snack then.",
"> Should everyone do it? \n\nNo, the world hasn't enough sustainable resources for us all to eat mainly fat and protein. Carbs are much more efficient to produce. Animal fat from grain-fed animals uses about ten times as much resources compared to getting the same calories from carbs made from grain. \n\nBefore the keto fans arrive - yes I eat bacon, no I'm not vegan.",
"/r/keto links to [this article](_URL_0_) in its sidebar. It does a good job of explaining the diet.\n\nAlso, read the stuff in the sidebar at /r/keto for more information.",
"Former ketoer here. It works well if you're just trying to lose weight and I don't really have any gripes about it from a health perspective. However, if you're in shape and are working towards a goal in the gym, i.e. getting stronger at a lift, training for a marathon, whatever, then YOU NEED CARBS. They really help with performance and recovery and low carb diets just don't support that.\n\nFor anyone who answers and says I'm low carb and x% body fat and yada yada yada, I'd challenge you to let me change your diet for a month. You'd be amazed what a few carbs would do."
] | [
"Kemron Kemron is the name of a drug which was released in Kenya in 1991 and purported to be highly effective in removing the symptoms of AIDS. When put under international scrutiny, the treatment was seen to perform no better than placebo. The advent of the drug was notable for the government support and international attention it received. Claim In August 1990, Kenyan researcher Davy Koech, director of the Kenya Medical Research Institute, announced that when his HIV patients chewed wafers laced with tiny amounts of alpha interferon, most had greatly improved health and some cleared HIV from",
"Ketogenesis Ketogenesis is the biochemical process through which organisms produce ketone bodies through breakdown of fatty acids and ketogenic amino acids. This process supplies energy under circumstances such as fasting or caloric restriction to certain organs, particularly the brain, heart and skeletal muscle. Insufficient gluconeogenesis can cause hypoglycemia and excessive production of ketone bodies, ultimately leading to a life-threatening condition known as ketoacidosis. Production Ketone bodies are produced mainly in the mitochondria of liver cells, and synthesis can occur in response to an unavailability of blood glucose, such as during fasting. Other cells, e.g. human astrocytes, are capable of carrying",
"of detachment. Ketamine is used in chemsex encounters to \"improve the experience of receptive anal intercourse or fisting\".\nA study of sauna participants in Barcelona, Spain, in 2016, found that the most commonly used drugs in chemsex are \"GHB/GBL, cocaine, ecstasy, silver bars (MDMA), poppers and Viagra\".\nA 2014 study on chemsex in London, UK, indicated that the drugs associated with chemsex include mephedrone, GHB/GBL, crystal meth, ketamine, and cocaine.\nInternet posts by men seeking PNP experiences often resort to slang to identify what drug they are partying with. These drugs tend to inhibit penile erection, a phenomenon known by the slang term",
"behaviors that promote ketogenesis could help manage the effects of some cancers.",
"These undesirable effects may serve to limit the use of ketamine for depression. Dozens of \"ketamine clinics\" have opened across the United States, where intravenous ketamine is used off-label to treat people with depression. Neurological In 1989, psychiatry professor John Olney reported ketamine caused irreversible changes, known as Olney's lesions, in two small areas of the rat brain. However, the rat brain has significant differences in metabolism from the human brain; therefore such changes may not occur in humans.\nThe first large-scale, longitudinal study of ketamine users found current frequent (averaging 20 days/month) ketamine users had increased depression and impaired memory by",
"Ketobemidone History Ketobemidone was first synthesized in 1942 by Eisleb and colleagues, at the laboratory of I.G. Farbenindustrie at Hoechst during the Second World War. The first study of it in humans was published in 1946, and it was introduced in clinical medicine shortly after. It was not in clinical use in the United States when the Controlled Substances Act 1970 was promulgated and was assigned to Schedule I with an ACSCN of 9628. As of 2013, no annual manufacturing quota was assigned by the DEA.\nPfizer manufactures ketobemidone under the tradenames Ketogan and Ketorax. It is available as",
"\nNeonates, pregnant women and lactating women are populations that develop physiologic ketosis especially rapidly in response to energetic challenges such as fasting or illness. This can progress to ketoacidosis in the setting of illness although occurs rarely. Propensity for ketone production in neonates is due to their high-fat breast milk diet, disproportionally large central nervous system and limited liver glycogen.\nKetosis can also be induced by consumption of ketogenic fats (such as medium chain triglycerides) or consuming exogenous ketones in foods or supplements. Biochemistry The precursors of ketone bodies include fatty acids from adipose tissue or the diet and ketogenic amino",
"out ketogenesis, but they are not as effective at doing so. Ketogenesis occurs constantly in a healthy individual.\nKetogenesis takes place in the setting of low glucose levels in the blood, after exhaustion of other cellular carbohydrate stores, such as glycogen. It can also take place when there is insufficient insulin (e.g. in type 1 (but not 2) diabetes), particularly during periods of \"ketogenic stress\" such as intercurrent illness.\nThe production of ketone bodies is then initiated to make available energy that is stored as fatty acids. Fatty acids are enzymatically broken down in β-oxidation to form acetyl-CoA. Under normal conditions, acetyl-CoA",
"use of ketamine was documented in the early 1970s in underground literature (e.g., The Fabulous Furry Freak Brothers). It was used in psychiatric and other academic research through the 1970s, culminating in 1978 with the publishing of psychonaut John Lilly's The Scientist, and Marcia Moore and Howard Alltounian's Journeys into the Bright World, which documented the unusual phenomenology of ketamine intoxication. The incidence of non-medical ketamine use increased through the end of the century, especially in the context of raves and other parties. Its emergence as a club drug differs from other club drugs (e.g., MDMA), however, due to its",
"nor the NIH found evidence that Kemron performed better than placebo. Withdrawal of claim Support of the drug proved to be an embarrassment for many of its supporters as the drug failed to cure patients under controlled conditions.\nThe University of Pretoria and the Government of South Africa ultimately were not able to support the claim of the drug's efficacy.",
"NBOMe-mescaline History NBOMe-mescaline and NBOMe-escaline were first reported in 1999 resulting from research performed at Free University of Berlin concerning their activity as partial agonists at rat vascular 5-HT2A receptors. NBOMe-mescaline was first reported in September 2008 to have been self administered by humans as a psychedelic drug at some unspecified point prior. It first became available as a commodity in the research chemical market in May 2010 several months after a few 25x-NBOMes became available. Properties and chemistry Solubility of the hydrochloride salt: ~5 mg/ml in Phosphate Buffered Saline (PBS) @ pH 7.2; ~10 mg/ml in ethanol & DMF;",
"addiction and daily intake of ketamine. Cortical atrophy and holes in superficial white matter are seen early on. After 4 years of addiction lesions spread throughout the brain and damage is evident in the pons and other deeper brain structures. Prevention In medical settings, NMDA receptor antagonists are used as anesthetics, so GABAA receptor positive allosteric modulators are used to effectively prevent any neurotoxicity caused by them. Drugs that work to suppress NAN include anticholinergics, benzodiazepines, barbiturates and agonists at the alpha-2 adrenergic receptor in the brain, such as clonidine.\nConversely, coadministration of NMDA-antagonists with alpha-2 adrenergic antagonists, like yohimbine,",
"accumulation of acetyl-CoA in turn produces excess ketone bodies through ketogenesis. The result is a rate of ketone production higher than the rate of ketone disposal, and a decrease in blood pH.\nThere are some health benefits to ketone bodies and ketogenesis as well. It has been suggested that a low-carb, high fat ketogenic diet can be used to help treat epilepsy in children. Additionally, ketone bodies can be anti-inflammatory. Some kinds of cancer cells are unable to use ketone bodies, as they do not have the necessary enzymes to engage in ketolysis. It has been proposed that actively engaging in",
"metabolism, and intentionally induced via a ketogenic diet, and in ketoacidosis (usually due to diabetes mellitus). Although ketoacidosis is characteristic of decompensated or untreated type 1 diabetes, ketosis or even ketoacidosis can occur in type 2 diabetes in some circumstances as well. Applications Ketones are produced on massive scales in industry as solvents, polymer precursors, and pharmaceuticals. In terms of scale, the most important ketones are acetone, methylethyl ketone, and cyclohexanone. They are also common in biochemistry, but less so than in organic chemistry in general. The combustion of hydrocarbons is an uncontrolled oxidation process that gives ketones as well",
"of ketones that results in a metabolic acidosis. Ketoacidosis and is most commonly caused by a deficiency of insulin in type 1 diabetes or late stage type 2 diabetes, but can also be the result of chronic heavy alcohol use, salicylate poisoning, or isopropyl alcohol ingestion. Ketoacidosis causes significant metabolic derangements and is a life threatening medical emergency. Ketoacidosis is distinct from physiologic ketosis as it requires failure of the normal regulation of ketone body production. Causes Elevated blood ketone levels are most often caused by accelerated ketone production, but may also be caused by consumption of exogenous ketones or",
"with ketamine (approximately 12 to 47% protein-bound). Concentrations of ketamine in the brain have been reported to be several-fold higher than in plasma. Pharmacokinetics In medical settings, ketamine is usually injected intravenously or intramuscularly. Ketamine can be started using the oral route, or people may be changed from a subcutaneous infusion once pain is controlled. Oral ketamine is easily broken down by bile acids, thus has a low bioavailability. Often, lozenges or \"gummies\" for sublingual or buccal absorption prepared by a compounding pharmacy are used to combat this issue. Some specialists stop the subcutaneous infusion when the first dose of",
"also been documented. Ketamine's rise in the dance culture was most rapid in Hong Kong by the end of the 1990s.\nKetamine use as a recreational drug has been implicated in deaths globally, with more than 90 deaths in England and Wales in the years of 2005–2013. They include accidental poisonings, drownings, traffic accidents, and suicides. The majority of deaths were among young people. This has led to increased regulation (e.g., upgrading ketamine from a Class C to a Class B banned substance in the U.K.).\nUnlike the other well-known dissociatives phencyclidine (PCP) and dextromethorphan (DXM), ketamine is very short-acting. It takes",
"to be used by nonliver tissues. These ketones can cross the blood-brain barrier and are then taken up by brain cells. While glucose is the brain’s chief energy source, ketones normally serve as the \"backup\" energy source.\nKetones act as an alternative energy source for brain cells that have an impaired ability to use glucose (sugar) as a result of Alzheimer’s disease, and the makers of Axona claim that this may have medical benefits. Clinical trials Axona has been evaluated in Phase II clinical trials, paid for and conducted by Cericin, only one of which was published in an open-access",
"However, many suggest that this is not a valid model of human use, and studies conducted on primates have shown that use must be heavy and chronic to cause neurotoxicity. A 2009 review found no evidence of ketamine-induced neuron death in humans. However, temporary and permanent cognitive impairments have been shown to occur in long-term or heavy human users of the NMDA antagonists PCP and ketamine. A large-scale, longitudinal study found that current frequent ketamine users have modest cognitive deficits, while infrequent or former heavy users do not.\nMany drugs have been found that lessen the risk of neurotoxicity from NMDA",
"dysphoria, depression, anxiety, psychological and physical weakness, pain, and compulsive cravings.\nGHB addiction occurs when repeated drug use disrupts the normal balance of brain circuits that control rewards, memory and cognition, ultimately leading to compulsive drug taking. Although there have been reported fatalities due to GHB withdrawal, reports are inconclusive and further research is needed. Ketamine risks Ketamine use as a recreational drug has been implicated in deaths globally, with more than 90 deaths in England and Wales in the years of 2005–2013. They include accidental poisonings, drownings, traffic accidents, and suicides. The majority of deaths were among young people. This",
"Ketone bodies Ketone bodies are the water-soluble molecules (acetoacetate, beta-hydroxybutyrate, and the spontaneous breakdown product of acetoacetate, acetone) containing the ketone group that are produced by the liver from fatty acids during periods of low food intake (fasting), carbohydrate restrictive diets, starvation, prolonged intense exercise, alcoholism or in untreated (or inadequately treated) type 1 diabetes mellitus. Ketone bodies are readily transported into tissues outside the liver and converted into acetyl-CoA, which then enters the citric acid cycle and is oxidized in the mitochondria for energy. In the brain, ketone bodies are also used to make acetyl-CoA into long-chain fatty acids.\nKetone",
"routine drug use monitoring purposes. The presence of norketamine, a pharmacologically-active metabolite, is useful for confirmation of ketamine ingestion. Medical use Ketamine was first synthesized in 1962 by Calvin L. Stevens, a professor of Chemistry at Wayne State University and a Parke-Davis consultant conducting research on alpha-hydroxyimine rearrangements. After promising preclinical research in animals, ketamine was introduced to testing in human prisoners in 1964. These investigations demonstrated ketamine's short duration of action and reduced behavioral toxicity made it a favorable choice over phencyclidine (PCP) as a dissociative anesthetic. Following FDA approval in 1970, ketamine anesthesia was first given to American",
"a ketogenic diet may work in its ability to restore GABAergic inhibition. But further studies on murine models need to be conducted, ultimately leading to the possibility of conducting a controlled study on humans afflicted with the disorder.\nThere is speculation that a ketogenic diet may be harmful for humans with SSADH deficiency as it may cause elevated levels of GHB in the bloodstream. Research While SSADH deficiency has been studied for nearly 30 years, knowledge of the disorder and its pathophysiology remains unclear. However, the progress that has been made with both murine and human models of the disorder have",
"inositol, isopropylbenzylamine or dimethylsulfone. Another popular method is to combine methamphetamine with other stimulant substances, such as caffeine or cathine, into a pill known as a \"Kamikaze\", which can be particularly dangerous due to the synergistic effects of multiple stimulants. Reports in 2007 of the appearance of flavored \"Strawberry Quik meth\" circulated in the media and local law enforcement, but were debunked in 2010 by the DEA, although meth of varying colors has been seized.\nRarely, the impure reaction mixture from the hydrogen iodide/red phosphorus route is used without further modification, usually by injection; it is called \"ox blood\". \"Meth oil\"",
"Teniposide Medical uses Teniposide is used for the treatment of a number of cancer types in children. In the US, it is approved for the second-line therapy of acute lymphocytic leukemia (ALL) in combination with other antineoplastic drugs. In Europe, it is also approved for the treatment of Hodgkin's lymphoma, generalized malignant lymphoma, reticulocyte sarcoma, acute leukaemia, primary brain tumours (glioblastoma, ependymoma, astrocytoma), bladder cancer, neuroblastoma and other solid tumours in children. Administration The medication is injected though a vein and burns if it leaks under the skin. It can be used in combination with other anticancer drugs. Contraindiactions The",
"journal in 2009. Sales and marketing The product launched in 2009. By 2012 it was being administered to about 30,000 patients in the US. Criticism A 2011 story by ABC News noted widespread concern about Axona in the medical community, with some calling it \"snake oil.\"\nThe theory that the brain in Alzheimer's disease patients is better able to use ketones than glucose is not widely accepted among AD clinicians and researchers.\nThe Alzheimer's Association has classified Axona an \"alternative treatment\", has \"expressed concern that there is not enough evidence to assess the potential benefit of medical foods for Alzheimer’s disease\",",
"Calvin L. Stevens Calvin Lee Stevens (November 3, 1923 – November 26, 2014) was an American chemist. He was a professor of Organic Chemistry at Wayne State University, and is known for being the first to synthesize the drug ketamine. Early life and education Stevens was born in Edwardsville, Illinois to Arthur Allen Stevens and Irma E. Ambuehl. He earned a Bachelor of Science at the University of Illinois, and in 1947 a Ph.D. in Organic Chemistry from the University of Wisconsin in the field of substituted ketene acetals and related orthoesters. Career Stevens received Postdoctoral Fellowship at the",
"Ketonuria Pathophysiology Ketones are metabolic end-products of fatty acid metabolism. In healthy individuals, ketones are formed in the liver and are completely metabolized so that only negligible amounts appear in the urine. However, when carbohydrates are unavailable or unable to be used as an energy source, fat becomes the predominant body fuel instead of carbohydrates and excessive amounts of ketones are formed as a metabolic byproduct. Higher levels of ketones in the urine indicate that the body is using fat as the major source of energy.\nKetone bodies that commonly appear in the urine when fats are burned for energy are",
"25B-NBOMe Toxicity and harm potential 25B-NBOMe has been used in clinical trials with an evaluation dose for safety consideration to humans of only 1 microgram. Such a dose is only 1/300th the dose expected to be hallucinogenic to humans and it is expected that recreational use would greatly exceed doses determined to be safe to humans. One case has been reported on where 25B-NBOMe was identified as the cause of death for a 17-year-old boy. The drug was also implicated in the death of an 18-year old male, however it was not reported whether the presence of the drug",
"Nisoxetine was never marketed as a drug due to a greater interest in pursuing the development of fluoxetine, a selective serotonin reuptake inhibitor (SSRI). Obesity Numerous evidence suggests that by altering catecholaminergic signaling (cell communication via norepinephrine and dopamine), food intake and body weight will be affected via classic hypothalamic systems that are involved in the regulation of energy balance. Antidepressants, such as the atypical antidepressant bupropion, can also cause weight loss due to their ability to increase extracellular dopamine and norepinephrine by inhibiting their uptake. Other research has focused on the interaction of serotonin and norepinephrine, leading to serotonin–norepinephrine"
] |
Why did the basalt at the Giant's Causeway in Northern Ireland form into mostly hexagons? | [
"This is called columnar jointing. It is mostly caused by the rate of cooling of the lava flow. As the flow cools, thermal stresses cause the triple junction (where 3 lines connect). \n\nAs for how common it is, I suppose its relatively common. This type of feature is not restricted to basalts. They can form in a variety of compositions of magma. \n\nSource: Senior geology major, and _URL_0_"
] | [
"basalt columns that were probably created simultaneously as a result of volcanic eruption millions of years ago. These rock columns are arranged in a pattern that gives an appearance of a man made structure. Most of the columns are hexagonal and interlocked with similar rocks on all the edges that emit a musical sound when struck. Most visible columns are 8 to 10 feet long but there can be longer rocks further deep inside the mountain. Although basalt columns are not unique and are found at several places around the world (including St. Mary's Islands in Karnataka, India), the quality,",
"\"ball and socket\" joints. The size of the columns is primarily determined by the speed at which lava from a volcanic eruption cools. The extensive fracture network produced the distinctive columns seen today. The basalts were originally part of a great volcanic plateau called the Thulean Plateau which formed during the Paleocene. Legend According to legend, the columns are the remains of a causeway built by a giant. The story goes that the Irish giant Fionn mac Cumhaill (Finn MacCool), from the Fenian Cycle of Gaelic mythology, was challenged to a fight by the Scottish giant Benandonner. Fionn accepted the",
"intrusions along the Antrim coast. They were formed during the Paleogene and Neogene periods (66 million to 2.6 million years ago), a period of intense volcanic activity in Northern Ireland. The Giant's Causeway, also from this time period, was created by volcanic eruption. At the Maidens, magma was forced underground through layers of weakness, but never reached the surface. It cooled more slowly, solidifying and leaving a hard rock, relatively resistant to weathering compared to the strata around it and so forming the islands left today. Other examples of nearby sills are Fair Head, the Portrush sill which forms Ramore",
"Basalt Headlands The Basalt Headlands are a chain of intermittent high-cliffed bluffs and islands that fringe the northern edge of the Minas Basin, Nova Scotia, Canada. Its name comes from the basaltic outcrops that formed about 200 million years ago when this region was volcanically active by continental rifting.",
"basalt but with a radial array of columns akin to the spokes of a giant wheel. Its formation is attributed to the cooling of \"a pocket of lava, probably in a spherical cave formed from an earlier lava flow\". Sandstone layer The sandstone layer seen in the Jackson Creek has been dated to about 400 million years old. They are made of quartz and quartzite gravel, and are located midway between the car park and the Organ Pipes. They are stated to be part of a deep lead – an ancient stream bed buried by a lava flow, and later revealed by",
"to the basalt columns found at the Giant's Causeway, but these are dolerite, a rock similar to basalt but which cooled more slowly, held inside the volcano vent, and so had time to grow larger crystals.\nScawt Hill, another volcanic plug 5 km west north west of Ballygally, is an internationally important site for geology due to the rare minerals found there. It is a protected Area of Special Scientific Interest.",
"basalt, also called traprock, a volcanic rock. The mountain formed near the end of the Triassic Period with the rifting apart of the North American continent from Africa and Eurasia. Lava welled up from the rift and solidified into sheets of strata hundreds of feet thick. Subsequent faulting and earthquake activity tilted the strata, creating the cliffs and ridgeline of Short Mountain. Hot, dry upper slopes, cool, moist ravines, and mineral-rich ledges of basalt talus produce a combination of microclimate ecosystems on the mountain that support plant and animal species uncommon in greater Connecticut. Short Mountain is also a raptor",
"with limestone river valleys. Around the Ulster/Connacht border, the mountains are made from Carboniferous sandstones with softer Carboniferous limestones below them. In central Ulster, the mountains are predominantly made from metamorphic rocks. In the west of both Connacht and Ulster, the mountains are mostly metamorphic rocks with some granite. The Mourne and Wicklow Mountains are mainly granite. Much of the northeast of Ireland is a basalt plateau. An area of particular note is the Giant's Causeway on the north coast, a mainly basalt formation caused by volcanic activity between 50–60 million years ago. The basalts were originally part of the",
"the Grand Manan Basalt was later separated into its own rift basin by block faulting [ref. McHone, 2011]. The Fundy basalts are themselves only a small portion of the enormous Central Atlantic Magmatic Province or CAMP, which was formed in a volcanic event preceding the breakup of the supercontinent Pangaea in Early Jurassic time. These lava flows also crop out along the western shores of Nova Scotia, where they are known as the North Mountain Basalt.\nBoth there and on Grand Manan Island, many interesting minerals have filled the cracks and bubbles left by gases boiling out of the cooling",
"Scawt Hill Volcanic plugs in Northern Ireland Over 30 volcanic plugs are dotted through Northern Ireland, mostly along the Antrim coast like Scawt Hill, although they are relatively rare throughout the rest of Ireland. Volcanic plugs are often easy to spot. Their harder rock erodes away more slowly than their surroundings so they rise above the landscape as a hill.\nThe largest volcanic plug in Northern Ireland is the oval-shaped Slemish. At its widest, Slemish is over 1 km in diameter. Scawt Hill is more of a typically sized example. This olivine dolerite plug is 270 m x 180 m wide and",
"The Palisades (Hudson River) Geology The basalt cliffs are the margin of a diabase sill, formed about 200 million years ago, at the close of the Triassic period by the intrusion of molten magma upward into sandstone. The molten material cooled and solidified before reaching the surface. Water erosion of the softer sandstone left behind the columnar structure of harder rock that exists today. The cliffs are about 300 ft (100 m) thick in sections and originally may have reached 1,000 ft (300 m).\nThe end-Triassic extinction event that coincided with the formation of the Hudson Palisades, Central Atlantic magmatic province, 200 million",
"The basalts are overlain by a black siltstone to conglomerate called the Turners Falls Sandstone and Mt. Toby Conglomerate. Mount Toby, the type locality for the Mt. Toby Conglomerate, can be seen directly across the Connecticut River from Sugarloaf Mountain.\nAbout 200 million years ago, as the continent of North America began rifting apart from Africa and Eurasia, a series of erosion and deposition episodes interspersed with basalt lava flows created this layer cake. Faulting and earthquakes tilted the layers; subsequent erosion and glacial activity exposed the tilted \"layers\" of sandstone, basalt, and erosion-resistant conglomerate visible today. Although not composed of",
"Irish midlands camped in Mesolithic times 8,500 or so years ago. This ancient lake disappeared long ago, swamped by the growing expanse of bog, which buried not only the lake itself, but preserved the campsites of the early midlanders. Ireland's wavestones No scientific evidence has been published to verify that the Irish wavestones have formed in lakes. Furthermore, no wavestones have been described from present-day lakes in Ireland, which is puzzling as parts of the country, such as The Burren, are studded with lakes containing many partly-submerged Carboniferous limestone erratics. A requirement for limestone solution is that water must essentially",
"added later, and in some cases were apparently never added at all.\nIrish recumbent stone circles take a rather different form, with the recumbent being small and placed in an isolated position on the southwest side while the two tallest stones, known as portals, stand opposite on the northeast side. It is highly likely that the recumbent stone circles of northeast Scotland and south-west Ireland are related, given how similar they are, but the geographical distance between them – several hundred kilometers of mountain terrain, bogs and sea – has prompted debate about how exactly the relationship came about. It is",
"glen below was larger and heavier, and carved out a deeper trough than that of Coire Gabhail. When the glaciers melted a hanging valley was left, high above the glen. Debris from the glaciers left moraines in the mouths of the glens and corries, often resulting in a lake forming behind them. In time these waters found their way through the debris and the lake drained leaving a relatively flat-bottomed alluvial plain which now forms the floor of the corrie.\nThe name Coire Gabhail (Corrie of the Bounty, or The Hollow of Capture) refers to former times when the corrie was",
"Basalt Lake Basalt Lake is a small freshwater lake surrounded by three basalt outcrops with ‘organ-pipe’ formations in their rocks, situated in the central part of the ice-free Byers Peninsula, Livingston Island in the South Shetland Islands, Antarctica. and draining through a 1.6 km stream southwards into Bransfield Strait.\nThe feature is descriptively named from the surrounding rock formations. Location Basalt Lake is centred at 62°38′35″S 61°03′33.7″W which is 4.07 km northeast of Sealer Hill, 1.85 km east of Usnea Plug, 1.5 km east-southeast of Chester Cone, 3.02 km west-southwest of Tsamblak Hill and 3.22 km west-northwest from Negro Hill (British mapping in 1968, detailed Spanish mapping",
"are not unique. Basalt columns are a common volcanic feature, and they occur on many scales (because faster cooling produces smaller columns). Railway access The Belfast-Derry railway line run by Northern Ireland Railways connects to Coleraine and along the Coleraine-Portrush branch line to Portrush. Local Ulsterbus provide connections to the railway stations. There is a scenic walk of 7 miles from Portrush alongside Dunluce Castle and the Giant's Causeway and Bushmills Railway.",
"Fingal's Cave Formation Fingal's Cave is formed entirely from hexagonally jointed basalt columns within a Paleocene lava flow, similar in structure to the Giant's Causeway in Northern Ireland and those of nearby Ulva.\nIn all these cases, cooling on the upper and lower surfaces of the solidified lava resulted in contraction and fracturing, starting in a blocky tetragonal pattern and transitioning to a regular hexagonal fracture pattern with fractures perpendicular to the cooling surfaces. As cooling continued these cracks gradually extended toward the centre of the flow, forming the long hexagonal columns we see in the wave-eroded cross-section today. Similar",
"it rapidly cooled and solidified, successive flows built up layer upon layer, each time filling and covering existing landscapes. Hyaloclastites and pillow lavas were formed when the lava flowed into lakes, rivers and seas. Magma that did not make it to the surface as flows froze in conduits as dikes and volcanic plugs and large amounts spread laterally to form sills. Dike swarms extended across the British Isles throughout the Cenozoic. Individual central complexes developed with arcuate intrusions (cone sheets, ring dikes and stocks), the intrusions of one centre cut through earlier centres recording magmatic activity with time. During intermittent",
"Much of the northern side of the glen is formed by the slopes of 1003m high mountain of Sgurr Mor and the 919m high Gairich, both of which are Munros. The more broken southern side is dominated, at least in its upper reaches, by three (Corbetts; the 835m high Sgurr Cos na Breachd-laoidh, the 858m Fraoch Bheinn and the 880m Sgurr Mhurlagain. The glen runs through territory formed by psammites and pelites of the late Precambrian Moine Supergroup, a thick sequence of metamorphosed rocks which is intruded by the West Highland Granite Gneiss in the middle section of the glen.",
"ago that traveled into a deep north trending U-shaped valley on the eastern flank of The Black Tusk. Subsequent volcanism produced another sequence of basaltic lava flows 4,000 years ago that flowed in the same glacial valley.\nThe Black Tusk, a black pinnacle of volcanic rock on the northwestern shore of Garibaldi Lake, is the glacially eroded remnant of a much larger volcano that formed during two periods of volcanic activity. The first between 1.1 and 1.3 million years ago erupted hornblende andesite lava flows and tuffs. These volcanics compose mountain ridges southwest, southeast and northwest of the prime volcanic structure. Subsequent erosion demolished",
"Basalt has been identified on Mars in many places. Instruments on orbiting spacecraft have detected clay (also called phyllosilicate) in some layers. Recent research with an orbiting near-infrared spectrometer, which reveals the types of minerals present based on the wavelengths of light they absorb, found evidence of layers of both clay and sulfates in Columbus crater. This is exactly what would appear if a large lake had slowly evaporated. Moreover, because some layers contained gypsum, a sulfate which forms in relatively fresh water, life could have formed in the crater.\nScientists are excited about finding hydrated",
"the pile are surrounded by ice-ponded flows up to 100 m (328 ft) thick.\nTuber Hill (50.93°N 123.44°W), a small basaltic stratovolcano with a potassium-argon date of 0.6 million years, was constructed on the Bridge River upland when neighboring valleys were filled by ice. Where distal flows violated on the glaciers a marginal meltwater lake was created in which less than 150 m (492 ft) of interbedded hyaloclastite, debris flows, and lacustrine tuff were deposited.\nThe youngest volcanic rocks in the Bridge River volcanic field lie east of Tuber Hill and are remnants of valley-filling basalt flows. The age of these valley-filling basalt flows is unknown",
"to create a v-valley. The edges of the cap broke off. These blocks travelled downwards along the hill sides towards the bottom of the valley, where they accumulated. They fill now a portion of the valley which is about 1.4 km long and up to 350 m wide. Surface erosion Some of the channels discovered in the basalt are 1000 mm deep and up to 300 mm wide, which is highly unusual for basalts. It is the result of chemical leaching by acidic seepage from the humus on top of the boulders.",
"legend, the giant Finn McCool created the Giant's Causeway, as a causeway to Scotland. Sōunkyō Gorge Sōunkyō Gorge, a part of the town of Kamikawa, Hokkaido, Japan, features a 24-kilometer stretch of columnar jointing, which is the result of an eruption of the Daisetsuzan Volcanic Group 30,000 years ago. Deccan Traps The late Cretaceous Deccan Traps of India constitute one of the largest volcanic provinces of Earth, and examples of columnar jointing can be found in St. Mary's Island in the state of Karnataka. Makhtesh Ramon The columnar jointed sandstone of the HaMinsara (Carpentry Shop) in the makhtesh (erosion cirque)",
"founded by Saint Mochua in the 7th century AD, the Irish round tower at Clondalkin is one of four remaining towers in County Dublin, the other three are located at Swords, Lusk and Rathmichael. The tower stands at 25.6 m (84 ft) high and because the stones used in construction are of a rough undressed variety of local calp limestone, it is thought to be an early round tower. The drum is also extremely narrow, the diameter being only 4.04 m (13.3 ft) metres at its widest point. A most unusual feature of this tower is the very pronounced buttress at the base of",
"and olivine nephelinite. Lava flows in the north east flowed down valleys to the sea.\nIn the north west, there was so much lava that valleys filled and overflowed. A plain resulted with up to 750 meters thickness, and maximum extent south of Wynyard and Burnie. In the late Eocene and early Oligocene lakes were formed near Waratah. Older alkaline basalt in the north west is from 26.3 million years ago, at Table Cape basanite from 13.3 million years ago and at Stanley basanite is dated to 12.5 million years ago and 8.5 million years ago. Mount Cameron West has olivine basalt from 15.5 and",
"Druidenstein The Druidenstein is a cone-shaped basalt rock in the northern Heller Upland above the town of Kirchen on the Sieg in the parish of Herkersdorf, Altenkirchen, Germany. The basalt cone stands at a height 431 m above sea level (NN) and is about 20 metres high. Formation The Druidenstein is about 25 million years old (Young Tertiary) and covers an area of about 100 m². Its unusual shape was caused when lava forced itself through the Devonian greywacke of the basement and then solidified. As a result, prismatic basalt columns formed at right angles to the cooling surface.\nBy erosion on the hard basalt core has",
"crystals accumulated at the base of a magma chamber. The chamber eventually collapsed, forming a caldera. There are swarms of near-vertical dykes of basalt on the northwest coast between Kilmory and Guirdil, created by basaltic magma forcing its way into fissures in the pre-existing rock. The western hills, although less elevated than the Cuillin, exhibit a superb collection of periglacial landforms including boulder sheets and lobes, turf-banked terraces, ploughing boulders and patterned ground. On Orval and Ard Nev the weathered basalt and granophyre has been sorted by frost heaving into circles 50 centimetres in diameter and weathering on Barkeval has produced",
"Giant's Causeway Geology Around 50 to 60 million years ago, during the Paleocene Epoch, Antrim was subject to intense volcanic activity, when highly fluid molten basalt intruded through chalk beds to form an extensive lava plateau. As the lava cooled, contraction occurred. Horizontal contraction fractured in a similar way to drying mud, with the cracks propagating down as the mass cooled, leaving pillarlike structures, which are also fractured horizontally into \"biscuits\". In many cases the horizontal fracture has resulted in a bottom face that is convex while the upper face of the lower segment is concave, producing what are called"
] |
How do bathroom mirrors always get those little spots on them even if you literally never touch the mirror? | [
"probably splashes from you brushing your teeth and washing your face and not wiping the mirror afterwards.",
"Do you brush your teeth in front of the mirror?\n\nYou probably do, and like most people, you probably spatter tiny amount of toothpaste mixed with saliva from your toothbrush. Sometimes the motion of the brushing install in enough to flick a dot onto the mirror; sometimes it's the spitting into the sink, or backsplash from rinsing your brush."
] | [
"types depending on the distance between the object and the mirror.\nThese mirrors are called \"converging mirrors\" because they tend to collect light that falls on them, refocusing parallel incoming rays toward a focus. This is because the light is reflected at different angles, since the normal to the surface differs with each spot on the mirror. Uses of concave mirrors Concave mirrors are used in reflecting telescopes. They are also used to provide a magnified image of the face for applying make-up or shaving. In illumination applications, concave mirrors are used to gather light from a small source and direct",
"upright, though diminished, image and because they provide a wider field of view as they are curved outwards. \nThese mirrors are often found in the hallways of various buildings (commonly known as \"hallway safety mirrors\"), including hospitals, hotels, schools, stores, and apartment buildings. They are usually mounted on a wall or ceiling where hallways intersect each other, or where they make sharp turns. They are useful for people accessing the hallways, especially at locations having blind spots or where visibility may be limited. They are also used on roads, driveways, and alleys to provide safety for motorists where there",
"the center, traditionally arranged so that it can be viewed only indirectly with a mirror. There are several theories as to why, such as the mirror represents the entrance to the beyond or underworld, a representation of eternity or a symbol that the person is no longer here. Around the photo are various offerings of things that the person liked in life. The most common are food items such as plates of mole, tamales, sweets, fruit, hot chocolate, atole, tequila, mezcal and beer. There are also particular breads baked for these kinds of altars in this town such as “hojaldra”",
"Mirror A mirror is an object that reflects light in such a way that, for incident light in some range of wavelengths, the reflected light preserves many or most of the detailed physical characteristics of the original light, called specular reflection. This is different from other light-reflecting objects that do not preserve much of the original wave signal other than color and diffuse reflected light, such as flat-white paint.\nThe most familiar type of mirror is the plane mirror, which has a flat surface. Curved mirrors are also used, to produce magnified or diminished images or focus light or simply distort",
"the mirrors to see their reflection make the adjustments to their makeup/hair that they felt they needed. These actions made Hickox consider about the self-being presented in the public, and that that self may be different from the ones we truly are and what we truly believe. Nevertheless, the mirrors being photographed are unable to reflect as the mirror images are transformed into a sea of black by the scanning process. The reflection is no longer available. Dialogue, 2012 These works picture a young girl in different moments of her life. According to Hickox, these photos of a young female",
"reversed—as images in mirrors are—unless a mirror or inverting prism was used during exposure to flip the image. To be seen optimally, the image had to be lit at a certain angle and viewed so that the smooth parts of its mirror-like surface, which represented the darkest parts of the image, reflected something dark or dimly lit. The surface was subject to tarnishing by prolonged exposure to the air and was so soft that it could be marred by the slightest friction, so a daguerreotype was almost always sealed under glass before being framed (as was commonly done in France)",
"holding the glass, over which the metal was fitted. In the 18th century oval mirrors began to be used, and later the introduction of dressing tables with built-in mirrors was part of the decline from fashion of the toilet service. Depictions in art, such as the Zoffany of Queen Charlotte, wife of George III, usually show that the elaborate crest at the top of the mirror has disappeared beneath the lace covers spreading to the sides, which are probably tied round it. These were used to pull over the service on its table when it was not in use,",
"from the pinhole light source is interrupted by the knife edge. Viewing the mirror from behind the knife edge shows a pattern on the mirror surface. If the mirror surface is part of a perfect sphere, the mirror appears evenly lighted across the entire surface. If the mirror is spherical but with defects such as bumps or depressions, the defects appear greatly magnified in height. If the surface is paraboloidal, the mirror looks like a doughnut or lozenge. It is possible to calculate how closely the mirror surface resembles a perfect paraboloid by placing a special mask over the",
"mirror deflects the beam upward to the middle mirror, that one deflects\nthe beam downward to the last mirror.\nThe picture sketches the three mirrors outlined by magenta quadrangles,\nthree colored rays entering from the right, an exit pupil as a green canvas, and where\nthe rays end up in the exit pupil. \nIf the mirrors are rotated by 20 degrees , an equivalent ray tracing shows\nthat they rays hit the exit pupil at places rotated by 40 degrees away\nfrom the places of the nominal angle.",
"layers of mirror metaphors remind the beholder to examine himself thoroughly according to his own virtuous or vicious life. This is all the more true if the mirror is combined with iconography of death. Not only is Death as a corpse or skeleton holding the mirror for the still living personnel of paintings, illuminations and prints, but the skull appears on the convex surfaces of depicted mirrors, showing the painted and real beholder his future face.",
"mirror (from blown glass) than a perfectly flat one. They were also known as \"bankers' eyes\" due to the fact that their wide field of vision was useful for security. Famous examples in art include the Arnolfini Portrait by Jan van Eyck and the left wing of the Werl Altarpiece by Robert Campin. Concave mirrors A concave mirror, or converging mirror, has a reflecting surface that is recessed inward (away from the incident light). Concave mirrors reflect light inward to one focal point. They are used to focus light. Unlike convex mirrors, concave mirrors show different image",
"an outside observer looks into the surface of the partially reflective mirror, the lights appear to recede into infinity, creating the appearance of a tunnel of lights of great depth.\nIf the mirrors are not precisely parallel, but instead are canted at a slight angle, the \"visual tunnel\" will be perceived to be curved (off to one side) as it recedes into infinity.\nAlternatively, this effect can also be seen when an observer stands between two parallel fully reflective mirrors, as in some dressing rooms, some elevators, or a house of mirrors. A weaker version of this effect can be seen by",
"scholarly and theological wisdom and knowledge as they appear in book illuminations of different evangelists and authors of theological treatises. Depicted mirrors – orientated on the physical properties of a real mirror – can be seen as metaphors of knowledge and reflection and are thus able to remind the beholder to reflect and get to know himself. The mirror may function simultaneously as a symbol and a device of a moral appeal. That is also the case if it is shown in combination with virtues and vices, a combination which also occurs more frequently in the 15th century: The moralizing",
"it is able to \"see\". He argued that merely looking outward into the mirror ignores the fact that the mirror has a non-reflecting side, which is also a part and parcel of reality. The backside of the mirror was created by evolution to gather as much information as needed to better survive. The picture in the mirror is what we see within our mind. Within our cultural evolution we have extended this picture in the mirror by inventing instruments that transform the most needed of the invisible to something visible.\nThe back side of the mirror is acting for itself as",
"Merleau-Ponty has called a mirror 'the instrument of a universal magic that changes things into spectacles, spectacles into things, me into others, and others into me.' We, the viewers, stand opposite the barmaid on the other side of the counter and, looking at the reflection in the mirror, see exactly what she sees... A critic has noted that Manet's 'preliminary study shows her placed off to the right, whereas in the finished canvas she is very much the centre of attention.' Though Manet shifted her from the right to the center, he kept her reflection on the right. Seen in",
"cameras; otherwise keystone artifacts will affect the images.\" \nThe mirror itself also takes away one f-stop since the light is split up for the two cameras. Mirrors of bad quality can produce a color mismatch that has to be corrected in postproduction. In addition to that every mirror filters the light according to its polarization. This leads to brightness differences between the two images especially at reflections and transparent objects.",
"into the inhabited space surrounding it. The simultaneous representation of traditional dimensions and of reality in motion reveal the new dimensions of the mirror-paintings. Sometimes the paintings on the mirrors are portraits of Pistoletto's friends, patrons and/or self-portraits: this is true for the artist's recent entirely mirrored-hall at the Ristorante del Cambio, Piazza Carignano, Turin.",
"the image in the mirror serves an artistic purpose. \"Extraordinary sections like ... linking the falling hair to the semi-reflected face of the girl in the mirror (Girl in the mirror, 1964) ... which cut up, analyse, and unite, all have the one aim of intensifying the signifying fragment.\"",
"respond to a mirror, very few show any evidence that they recognize it is in fact themselves in the mirror reflection.\nThe Asian elephants in the study also displayed this type of behavior when standing in front of a 2.5-by-2.5-metre (8.2 ft × 8.2 ft) mirror - they inspected the rear and brought food close to the mirror for consumption.\nEvidence of elephant self awareness was shown when the elephant Happy repeatedly touched a painted X on her head with her trunk, a mark which could only be seen in the mirror. Happy ignored another mark made with colorless paint that was also on her",
"fish such as the herring which live in shallower water, the mirrors must reflect a mixture of wavelengths, and the fish accordingly has crystal stacks with a range of different spacings. A further complication for fish with bodies that are rounded in cross-section is that the mirrors would be ineffective if laid flat on the skin, as they would fail to reflect horizontally. The overall mirror effect is achieved with many small reflectors, all oriented vertically. Silvering is found in other marine animals as well as fish. The cephalopods, including squid, octopus and cuttlefish, have multi-layer mirrors made of protein",
"mirror, and rushes back to his quarters. In the morning he learns that there are no signs of a mirror from the previous night. Because of this incident, the man states that he does not have any mirrors in his house. \"A Folklore for My Generation: A Prehistory of Late-Stage Capitalism\" A narrator meets an old classmate from his high school days in Kobe during his trip to Lucca. In a frame story, the classmate tell about his relationship with his girlfriend Yoshiko; most people thought they were ideal because of excellence in so many things but it was, in",
"highly magnified or highly diminished images when the object is placed at certain distances. Convex mirrors A convex mirror or diverging mirror is a curved mirror in which the reflective surface bulges towards the light source. Convex mirrors reflect light outwards, therefore they are not used to focus light. Such mirrors always form a virtual image, since the focal point (F) and the centre of curvature (2F) are both imaginary points \"inside\" the mirror, that cannot be reached. As a result, images formed by these mirrors cannot be projected on a screen, since the image is inside the",
"obvious there are special mirrors or cameras in the room. But they do not know when observation may or may not be occurring.",
"in other words the spirit. It is supposed that the reflection of person in the mirror also has a spirit. By putting a mirror in front of the dead-body, the reflection of body with spirit is returned to the dead-body so that it does not hurt people living there. The custom of putting a mirror on the chest is differently described in the south-west of the country: A mirror protects the deceased person, because the spirit has already left the body. \nOf course, it is prayed a lot for the dead person. If the person could not be buried because",
"Distorting mirror A distorting mirror, funhouse mirror or carnival mirror is a popular attraction at carnivals and fairs. Instead of a normal plane mirror that reflects a perfect mirror image, distorting mirrors are curved mirrors, often using convex and concave sections to achieve the distorted effect. Because of their distorting properties, they are sometimes featured in fiction as a literary device, such as in Hans Christian Andersen's The Snow Queen.",
"Mirror is concerned with vision, the way we see—or sometimes refuse to see—what's right in front of us, and what can happen when we open our eyes.\"",
"exposed to the mirror.\nManta rays have the largest brains of the fishes. In 2016, Dr. Csilla Ari tested captive manta rays at the Atlantis Aquarium in the Bahamas by exposing them to a mirror. The manta rays appeared to be extremely interested in the mirror. They behaved strangely in front the mirror, including doing flips and moving their fins. They also blew bubbles. They did not interact with the reflection as if it were another manta ray; they did not try to socialize with it. However, only an actual mirror test can determine if they actually recognize their own reflections,",
"rays came. This is called retroreflection.\nMirrors with curved surfaces can be modelled by ray tracing and using the law of reflection at each point on the surface. For mirrors with parabolic surfaces, parallel rays incident on the mirror produce reflected rays that converge at a common focus. Other curved surfaces may also focus light, but with aberrations due to the diverging shape causing the focus to be smeared out in space. In particular, spherical mirrors exhibit spherical aberration. Curved mirrors can form images with magnification greater than or less than one, and the magnification can be negative, indicating that",
"from small sizes, good to carry with oneself, to full body sized; they may be handheld, mobile, fixed or adjustable. A classic example of the latter is the cheval glass, which may be tilted. Signalling With the sun as light source, a mirror can be used to signal by variations in the orientation of the mirror. The signal can be used over long distances, possibly up to 60 kilometres (37 mi) on a clear day. This technique was used by Native American tribes and numerous militaries to transmit information between distant outposts.\nMirrors can also be used for search to attract the",
"attempts at disrupting the clean, crisp reflections involved smearing oil on the mirror's surface, as seen in Untitled #2455.\nSeeking to alter the surface even further, Imboden began scratching the silver backing off of the mirrors she was working with, making them transparent in some places while still reflective in others. Putting a model behind the mirror made them visible in the areas where the mirror was transparent, while a model in front can be seen in the parts that are still reflective. Through the relationship of the models in front of and behind the mirror, as well as"
] |
Where did the idea of a "dumb blonde" come from? | [
"Blondes in society are generally considered to be more attractive as their hair color makes them more desirable. The stereotype is built on the idea that women can get ahead because of their looks and don't need to rely on their intelligence as much. Therefore blondes are \"dumb\" by comparison.",
"here's a good thread with an answer: _URL_0_"
] | [
"apparently distressed Duthé so much that she promised to kiss anyone who restored her honor; the offer went untaken. Although the origin of the stereotype of the dumb blonde is not entirely clear, cultural historian Joanna Pitman has noted that “Rosalie Duthé acquired the dubious honour of becoming the first officially recorded dumb blonde.”\nDuthé was the supposed author of an autobiography, Galanteries d'une Demoiselle du Monde ou Souvénirs de Mlle. Duthé (1833), though it has been claimed the real author was Baron Lamothe-Langon, who had known Duthé personally.\nRosalie Duthé died in 1830, probably around the age of 82. She is",
"way onto the bonfires, such as Paul Kruger and Margaret Thatcher, although most modern effigies are of Fawkes. The \"guy\" is normally created by children from old clothes, newspapers, and a mask. During the 19th century, \"guy\" came to mean an oddly dressed person, while in American English it has lost any pejorative connotation and instead refers to any male person and the plural form can refer to people of any gender (see you guys).\nJames Sharpe, professor of history at the University of York, has described how Guy Fawkes came to be toasted as \"the last man to enter Parliament",
"their hair blond, indicating that physical attractiveness is more important to them than other, non-physical traits and as an extension to \"the dumb blonde\" stereotype. Politics In American politics, the word was used in the 1990s during Bill Clinton's sexual misconduct allegations, leading to the invention of the term \"Bimbo eruptions\" to refer to political sex scandals. The expression was also used in a 2014 report in which Colin Powell explained his reluctance to vote for Hillary Clinton in light of her husband's continued affairs with \"bimbos\".\nAfter the first 2015 Republican Presidential Debate, Donald Trump re-tweeted a message",
"nickname \"big head\", because of his unusually large head and his arrogance. At the age of six, he discovered the law of attraction and repulsion by playing with magnets made of steel. This insight led to a plan to create new people. He \"saw an unlike human being, made to attract others, who could, with the knowledge of tricks and lies, rule the original black man.\" By the age of 18, he had exhausted all knowledge in the universities of Mecca. He then discovered that the \"original black man\" contained both a \"black germ\" and a \"brown germ\". With 59,999",
"A (Pretty Little Liars) Characterization \"A\" makes appearances as a figure with black leather gloves, a black hoodie, black pants, and black combat boots. Throughout the seasons, the story focuses on the mystery of \"A\". However, \"Big A\" also sported different disguises, including that of Red Coat, while their ally disguised themselves as The Black Widow, while also donning the Red Coat identity on certain occasions.\nUber A also dressed up as several disguises, including those of a gardener, a maid and a surgeon. They later costume themselves with the traditional look. Original \"A\" Original A was the first \"A\" and",
"and mustache and speaks in Ebonics.\nDuck King, a fictional character created for the video game series Fatal Fury, is a prime example of foreign black stereotypes.\nThe sub-cult movie short Gayniggers from Outer Space is a blaxploitation-like science fiction oddity directed by Danish filmmaker, DJ, and singer Morten Lindberg.\nJefferson Twilight, a character in The Venture Bros., is a parody of the comic-book character Blade (a black, half human, half-vampire vampire hunter), as well as a blaxploitation reference. He has an afro, sideburns, and a mustache. He carries swords, dresses in stylish 1970s clothing, and says that he hunts \"Blaculas\". He looks",
"in the phrase \"all duded up\" for getting dressed in fancy clothes.\nThe word was used to refer to Easterners and referred to a man with \"store bought clothes\". The word was used by cowboys to unfavorably refer to the city dwellers.\nA variation of this was a \"well-dressed man who is unfamiliar with life outside a large city\". In The Home and Farm Manual (1883), author Jonathan Periam used the term \"dude\" several times to denote an ill-bred and ignorant, but ostentatious, man from the city.\nThe implication of an individual who is unfamiliar with the demands of life outside of urban",
"non sequitur, snowclone or an inside joke. Origin In a post by Deadspin assistant editor Rick Chandler, a source (whom site editor Will Leitch called \"a respected journalist\") claimed that in the mid-1990s, a friend of his was flirting in a bar with an attractive woman wearing leather pants and holding a leather jacket. However, his efforts proved unsuccessful when Berman, who was in Scottsdale, Arizona to cover baseball spring training, walked by and told the woman \"You're with me, leather.\" The woman immediately got up and left the bar with Berman.\nDuring the 2006 NFL Draft, fan Aaron Ghitelman asked",
"dumb. The second is that she was fragile. The third is that she couldn't act. She was far from dumb, although she was not formally educated, and she was very sensitive about that. But she was very smart indeed – and very tough. She had to be both to beat the Hollywood studio system in the 1950s. [...] The dumb blonde was a role – she was an actress, for heaven's sake! Such a good actress that no one now believes she was anything but what she portrayed on screen.\nBiographer Lois Banner has written that Monroe often subtly parodied her",
"kids that strongly resemble \"My Real Name\", a bit from Steve Martin's album, A Wild and Crazy Guy.\nJoe Rogan, by contrast has been very open in accusing Carlos Mencia of hacking.\nIn France, many famous stand-up comedians (Gad Elmaleh, Jamel Debbouze, Tomer Sisley, Didier Bourdon, Malik Bentalha, Mickael Quiroga, Yacine Belhousse, Arthur, Michel Leeb, Walter, Rémi Gaillard, Roland Magdane, Michael Youn, Mathieu Madénian, Olivier de Benoist) have been accused of plagiarism by the Facebook/Twitter/YouTube account CopyComic.\nIn 2011, one of the contestants on the talent quest television program Australia's Got Talent was Jordan Paris, whose act was stand-up comedy. His act went",
"was African-American slang for female genitalia, and by extension a lover of same. While working there, he was living with his churchgoing great-grandmother; he convinced her that he worked as a night watchman in a barrel factory.\nAfter Morton's grandmother found out that he was playing jazz in a brothel, she disowned him for disgracing the Lamothe name. He said:\nWhen my grandmother found out that I was playing jazz in one of the sporting houses in the District, she told me that I had disgraced the family and forbade me to live at the house. ... She told me that devil music",
"\"as a lone scheming westerner, 'condescending' to serve an emerging black nationalist country for his own grafting purposes.\" The rest of the cast were dressed in what were basically African and Caribbean costumes, \"some of which were made to look pseudo-Japanese\", and the sets were Japanese. Pooh-Bah is an uptight English colonial official who is contrasted with the sexy, exuberant Caribbean islanders. The Three Little Maids from School arrive dressed in uniforms from their proper English school, including, elbow-length gloves and straw boaters. As they sing of their freedom from the ladies seminary, they strip off their modest clothing until",
"cold, mean-spirited gags about the blind, an Indian man everyone thinks is Jamaican (um, LOL?) and [a] Chinese caricature so dazzlingly racist it beggars belief.\"\nMark Kermode gave the film a scathing review, calling it \"an absolute stinker\" and \"not funny on any level, at all\", saying that: \"it's good that the cast [laugh at themselves in the bloopers] because were it not for the cast laughing at the jokes, there wouldn't be anybody laughing in the cinema... there are no laughs. None. Nul points. Nil.\" Archie Bland of The Independent said that he \"couldn't argue\" with actor Rory Cowan who",
"film Shortbus. The DUMBA Collective Around 2000, the group living in the space called themselves the \"DUMBA Collective,\" a name that stuck until the collective's demise in 2006.\nIn 2004, writer Arial Levy described in New York Magazine DUMBA's trannyboi scene:\nBeing a boi means different things to different people—it’s a fluid identity, and that’s the whole point. Some women who call themselves bois are playing off \"boy\" in the gay-male S/M sense of the term, as in Daddy/Boy: The boy or boi is the submissive and, in the case of lesbians, has sex with dominant butches (tops). Some of the people",
"South African woman, originally from Johannesburg who wanders around Brixton trying to find a black maid. When confronted with anything she doesn't like, her fall-back phrase is \"Aa'm waat!\" (\"I'm white\")\nHortense - a woman in her early to mid-fifties who often sees people with babies (including her niece) insisting that she take a look at them, thinking them to be beautiful. However, on two of the three times she appears (all in S1 E6) she finds the baby ugly so says \"What a lovely...pram\" or \"What a lovely...rattle\". In her third and final appearance, she says: \"Oh! What an",
"is some sort of silly face, promptly ground him and force him to wear a brown paper bag over his head for making \"silly faces\". It is (what his parents do not notice) a piece of his hair sticking up after he combed his hair to look perfect which ruined his school photo.\nTo compound this prank, Cartman then submits Kenny's photo to a milk company, which places it on the milk cartons. Cartman's description of him includes features with obvious double meanings, such as a \"winking brown eye\", \"blonde hair\", and \"rosy cheeks\". The photo draws a response from a",
"women: Madge Perkins, who is white; and Alice Harrison, his higher-class African-American girlfriend. Bob struggles for place in a white-dominated world and is filled with violent thoughts against white people, but does not act on them. \nIn what is described as a \"sexually charged novel\", Madge makes a racial slur toward Bob. His calling her a \"bitch\" results in his demotion. He considers raping her as a way to get back at white America, seeing her as a symbol of \"whiteness\", but when she expresses sexual attraction to him, he rejects her. Alice tells Bob it is no use getting",
"blond, wears horn-rimmed glasses, and is often described as affable, inoffensive and bland, with a deceptively blank and unintelligent expression. He is, nonetheless, a man of authority and action, and considers himself to be a helpful and comforting 'Uncle Albert' to friends and those in need. In some stories, he lives in a flat above a police station at Number 17A, Bottle Street in Piccadilly, London. In the early stories he has a pet jackdaw called Autolycus. Names The name 'Campion' may have its origin in the Old French word for 'champion'. Another source says the name was suggested by",
"IPA ['wero], sounds like ware-roh in English) is a Mexican slang term in Spanish for a pale-skinned or blonde-haired person. Beck cites having been referred to as a \"güero\" throughout his childhood, lending the title of the album and the track \"Qué Onda Guero\" [sic].\n(¿Qué onda, güero? is Mexican slang meaning \"what's up, blond boy?\" or \"hey, white boy\" or \"where you going, blondie?\". A literal translation is \"what wave, whitey?\" which is analogous in English to \"what's happening?\". See List of Chicano Caló words and expressions)\nBeck released an album of Guero remixes called Guerolito later in",
"to her passing. Dorothy Parker Predating The Wizard of Oz origins of the phrase (although not connections to the L. Frank Baum Novels) is New York City's celebrated humorist, critic and \"defender of human and civil rights\" Dorothy Parker, whose social circles in the 1920s and 1930s included gay men. The two origin stories are not mutually exclusive, both could be somewhat true depending on how one learned of the phrase, or even separately where it derived. The socialite would throw \"famous parties at Garden of Allah's lavish celebrity villas\", gay men would use the phrase for entry. The Prohibition",
"know they have a lot of Spanish, dark Dominicans. They be Black as fuck just like me. My dad happened to be a Black Dominican and my mom’s Black. African-Americans and Latinos have it rough in the U.S.—I’m both, so I guess I’m double rough.\". Rodriguez grew up speaking both Spanish and English. \nUgly God started rapping while he was enrolled at the University of Southern Mississippi where he wanted to become a computer engineer before dropping out. 2015-2017: Career Beginnings, \"Water\", and The Booty Tape From 7th to 10th grade, he used the handle 'Pussy Bacon'. He changed",
"hit you. American Idiot knows no limits — it's a global knockout.\"\nPaul Taylor’s review in The Independent hails American Idiot as “the Hair of its generation”. Yet, as noted by Harry Lou in The Indianapolis Business Journal, “[i]ts female characters are sketched even lighter than the main men are”. Although intended to empower the disillusioned youth of early 21st century America, American Idiot excludes the female voice from this discourse. This disempowering of the female is evident in the fact that the female leads are denied identity, let alone agency. Just one of the three is given a name, and all",
"a white male while radioing the dispatcher at the Philadelphia Police Academy, while he uses the term \"brother\" to refer to a black person, despite being white himself.\nOn the TV series Barney Miller, Season 5, Episode 8, \"Loan Shark\", Arthur Dietrich gives an etymology of the word \"honky\", claiming it was \"coined by blacks in the 1950s in reference to the nasal tone of Caucasians\".\nOne of the Harlem Globetrotters refers to the robot Bender as \"silver honky\" in the episode \"Time Keeps On Slippin'\" of the cartoon series Futurama.\nThe animated television series Black Dynamite extensively uses the word \"honky\" as",
"Billy Bennett.\nFrom 1937 the company was billed as the Crazy Gang. Their Palladium shows in the 1930s were All Alight at Oxford Circus (1936), O-Kay for Sound (1936), London Rhapsody (1937), These Foolish Things (1938), and The Little Dog Laughed (1939).\nDuring this period Gray perfected his trademark \"Cockney-French\". The humorist Paul Jennings, who called him \"the funniest man in the world\", gave an instance of it: \"Je got 'ere un packet de cards, cinquante deux in numero. I cuttee in deux, with vang-seess ici and vang-seess there-si\". His stage costume included a pair of metal-rimmed glasses and a looped moustache",
"the name, but every now and then, it makes “very nice liberal white folks” just a little nervous.\" (Patti Hartigan) Boston Globe “For example, “Landry says, “during the O. J.(Simpson) trial we did a game show format called ‘Who do you Blame?’ and the guilty party was always a black man in a stocking cap. African-American audiences are the most responsive. Backstage\nIn 1993, Landry actively went seeking actors of color and ran upon them at The Second City Outreach Program. There she assembled the original ensemble along with Summers as the lone Caucasian member, they mounted Oui Be Negroes’ first",
"Mike McGrady Mike McGrady (October 4, 1933 – May 13, 2012) was an American journalist and author and was the mastermind behind Naked Came the Stranger, one of the most famous literary hoaxes of the twentieth century.\n\"He wanted to prove a point about bad taste, and he did it very well. Though Newsday Columnist Mike McGrady, who died May 13 at 78 won an Overseas Press Club award for his dispatches from Vietnam, he will always be remembered too as the orchestrator of the 1969 literary hoax 'Naked Came the Stranger'. A cringe inducing naughty-housewife novel by \"Penelope Ashe,\" it",
"Luis de Alba El Pirrurris Created sometime in the 1970s, the character is a very rich young man with a haircut similar to that used by the Beatles in their early years and depicts sarcastically and exaggeratedly the stereotype of a so-called \"fresa\". He enjoys deprecating low- to middle-class people with illusions of grandeur, airs of importance, bad taste, and colorful (low class) slang, while at the same time emphasizing his own importance and class-superiority, using a lot of \"high class\" slang. The people he deprecates are pejoratively called nacos. Pirrurris refined the ridicule of nacos into nacology, the study",
"snatched out of a cradle in the cornfields\", Mezzrow wrote. \"The guy didn't have an enemy in the world,\" recalled fellow musician Russ Morgan, \"[b]ut he was out of this world most of the time.\" According to Ralph Berton, he was \"as usual gazing off into his private astronomy\", but his cornet, Condon famously quipped, sounded \"like a girl saying yes\".\nIn 1938, Dorothy Baker borrowed the title of her friend Otis Ferguson's first article and published the novel Young Man with a Horn. Her story of the doomed trumpet player Rick Martin was inspired, she wrote, by \"the music, but",
"nonfiction, This Must Be the Place: The Adventures of the Talking Heads in the 20th Century, about Talking Heads, came out in 2001.\nBig Bang, Bowman's posthumous novel, received critical acclaim.",
"Peter Collins (slang) “Peter Collins” was a circus and theatrical colloquialism in British and American English of the late 19th and early 20th centuries, designating an imaginary or nonexistent person to whom a newcomer or beginner was sent on a silly errand as a kind of initiation (e.g., “Go ask Peter Collins for a left-handed screwdriver”). In underworld slang, it had the additional meaning of “nobody” or “no one.”. In this latter sense, the term was the basis for the pen name “Peter Collinson” (i.e., Peter Collins’s son) used at the very beginning of his writing career by Dashiell Hammett,"
] |
Why do many fast food places have a cutoff for serving breakfast when it's obvious they can serve it consistently and fast? | [
"It's no obvious, it can be difficult, when you only have one or two stoves that are constantly being used for burgers and such, throwing eggs on there causes issues. For other types of breakfast food, they have done calculations, and it wouldn't increase their revenue by a much, as not many people will go to a restaurant only if they serve breakfast at 5pm, most people will go to the restaurant they like and choose what's available. The restaurants also don't want to run out of food for breakfast the next day."
] | [
"Breakfast sandwich Overview Breakfast sandwiches are typically made using breakfast meats (generally cured meats such as sausages, patty sausages, bacon, country ham, Spam and pork roll), breads, eggs and cheese. These sandwiches were typically regional specialties until fast food restaurants began serving breakfast. Because the common types of bread, such as biscuits, bagels, and English muffin, were similar in size to fast food hamburger buns, they made an obvious choice for fast food restaurants. Unlike other breakfast items, they were perfect for the innovation of the drive-through. These sandwiches have also become a staple of many convenience stores.",
"breakfast fast food with the introduction of the Egg McMuffin in 1972 when market research indicated that a quick breakfast would be welcomed by consumers. Five years later McDonald's added a full breakfast line to the menu, and by 1987 a quarter of all breakfasts eaten out in the United States came from McDonald's restaurants. In test market locations, such as New York City, McDonald's added a full breakfast line to its menus in 1975.\nKroc was a firm believer in giving \"something back into the community where you do business\". In 1974 McDonald's acted upon that philosophy in an original",
"Fast casual restaurant A fast casual restaurant, found primarily in the United States, does not offer full table service, but advertises higher quality food than fast food restaurants, with fewer frozen or processed ingredients. It is an intermediate concept between fast food and casual dining, and usually priced accordingly. The category is exemplified by chains such as Five Guys, Chipotle Mexican Grill, Shake Shack, Boston Market, Bruegger's, Captain D's, Culver's, Dig Inn, Freddy's Frozen Custard & Steakburgers, Newk's Eatery, Noodles & Co., Panera Bread, Pizza Ranch, Pollo Tropical, Portillo's, Skyline Chili, Smashburger, Vapiano and Zaxby's. History The concept originated in",
"traditional \"fast food\" restaurants are looking for ways to keep customers in the store longer in an attempt to generate more purchases. And two, the old value proposition behind fast food: deliver a meal cheaply and quickly is also changing. Consumers are becoming so immersed in technology, media and marketing that they are now even expecting to be entertained while they dine. Consumer trends The U.S. saw an increase in the number of households from the period of 1990-2005 yet it also experienced a decline in its population. This resulted in a net decrease in the number of people per",
"at cafes, which is similar to the British cooked breakfast, except that it seldom includes black pudding. Other common menu items are: eggs done how you like, eggs benedict, beans on toast, pancakes, cereal and yogurt, and smoothies. Breakfast nearly always includes coffee, tea, or both, with children drinking milk either on their cereal, in a glass, or hot milo. Recent concern has been raised about the cost of milk and some families being unable to afford it.\nA fast food franchise, McDonald's New Zealand offers a \"kiwi big breakfast\" which includes two sausages, hash brown, scrambled eggs, toasted muffin and",
"as fasting can sometimes be unsafe. A news item in the Canadian Medical Association Journal expressed concern that promotional material for the diet showed people eating high-calorie food, such as hamburgers and chips, and that this could encourage binge eating since the implication was that \"if you fast two days a week, you can devour as much junk as your gullet can swallow during the remaining five days\". Commercialization As of 2019, interest in intermittent fasting led some companies to commercialize diet coaching, dietary supplements, and full meal packages. These companies have been criticized for offering products or services that",
"endeavor proved unsuccessful due to many issues. While approximately 12 Wendy's restaurants in the U.S. and its territories have been serving breakfast since then, Wendy's has not had a company-wide breakfast offering.\nThe newer breakfast menu differs slightly from the ones featured in 1985, and it is structured similarly to its lunch/dinner menu, with value meals and various sides like blended fruit. Menu items include several breakfast sandwiches served on biscuits, frescuit and Kaiser rolls, breakfast burritos, and side orders of hash browns, muffins, and cinnamon sticks. In order to avoid the same issues the original 1985 breakfast offerings faced, the",
"part of the cachet built into the products, Burger King advertises that products are cooked fresh in the restaurant each morning.\nWith the effects of the late-2000s recession reducing breakfast traffic to the stores, Burger King announced that it was making the first wholesale changes to its breakfast line-up in many years. In early 2010, Burger King tested a new group of breakfast products under its new BK Brunch product line; a reintroduced English muffin sandwich, a sandwich featuring ciabatta bread, a pair of breakfast bowls, and a non-alcoholic mimosa. In September, a slightly modified variation of the menu was taken",
"are also more cost-effective for the establishments serving them, because they require fewer staff to prepare them.\nIn southeast Europe, in countries such as Bulgaria, Bosnia, Montenegro, North Macedonia and parts of Croatia breakfast usually consists of various kinds of savory or sweet pastry, with cheese, meat or jam filling. The most typical breakfast consists of two slices of burek and a glass of yogurt. Breakfast also often consists of open sandwiches. The sandwich is buttered (with margarine), with toppings such as prosciutto and yellow cheese. Albania In Albania the breakfast often consists of a scone, milk, tea, eggs, jam or",
"to eat less often at home but instead, have a quick meal in a restaurant or pizzeria. Many foreign fast-food chains operate in Italy, especially in big cities and along motorways. Italian fast-food chains, like Autogrill, are also prevalent, often featuring versions of local dishes. Mid-afternoon snack (Merenda) Many children and adults have a mid-afternoon snack called merenda, generally consumed after school or in mid-afternoon. This may include a wide variety of foods. Merenda is often similar to breakfast, and might consist of a hot milky drink with bread and honey/jam or brioches; other foods are also eaten, such as",
"there are no good or bad foods, but instead there are good or bad diets. The industry has defended itself by placing the burden of healthy eating on the consumer, who freely chooses to consume their product outside of what nutritional recommendations allow.\nMany fast food restaurants added labels to their menus by listing the nutritional information below each item. The intent was to inform consumers of the caloric and nutritional content of the food being served there and result in directing consumers to the healthier options available. However, reports do not display any significant drop in sales at sandwich or",
"It is considered polite for one to leave a little bit of food on one's plate after finishing a meal at another's home. This tells the host that one has been given enough food. If one were to clean their plate that would indicate that one is still hungry. Most Somalis do not take this rule so seriously, but it is certainly not impolite to leave a few bits of food on one's plate. Somali breakfast typically includes a flatbread called lahoh (injera), as well as liver, toast, harakoo, cereal, and porridge made of millet or cornmeal. Lunch can be",
"nuggets, tacos, pizza, and ice cream, although many fast food restaurants offer \"slower\" foods like chili, mashed potatoes, and salads. Cuisine Modern commercial fast food is highly processed and prepared on a large scale from bulk ingredients using standardized cooking and production methods and equipment. It is usually rapidly served in cartons, bags, or in a plastic wrapping, in a fashion which reduces operating costs by allowing rapid product identification and counting, promoting longer holding time, avoiding transfer of bacteria, and facilitating order fulfillment. In most fast food operations, menu items are generally made from processed ingredients prepared at",
"customer and eliminate labor and equipment costs in the individual stores.\nBecause of commercial emphasis on quickness, uniformity and low cost, fast food products are often made with ingredients formulated to achieve a certain flavor or consistency and to preserve freshness. Variants Chinese takeaways/takeout restaurants are particularly popular in Western countries such as the US and UK. They normally offer a wide variety of Asian food (not always Chinese), which has normally been fried. Most options are some form of noodles, rice, or meat. In some cases, the food is presented as a smörgåsbord, sometimes self service. The customer chooses the",
"food. Common menu items at fast food outlets include fish and chips, sandwiches, pitas, hamburgers, fried chicken, french fries, onion rings, chicken nuggets, tacos, pizza, hot dogs, and ice cream, though many fast food restaurants offer \"slower\" foods like chili, mashed potatoes, and salads. Filling stations Convenience stores located within many petrol/gas stations sell pre-packaged sandwiches, doughnuts, and hot food. Many gas stations in the United States and Europe also sell frozen foods, and have microwave ovens on the premises in which to prepare them. Petrol Stations in Australia sell foods such as hot pies, sandwiches, and chocolate bars, which",
"become popular with consumers for several reasons. One is that through economies of scale in purchasing and producing food, these companies can deliver food to consumers at a very low cost. In addition, although some people dislike fast food for its predictability, it can be reassuring to a hungry person in a hurry or far from home.\nIn the post-World War II period in the United States, fast food chains like McDonald's rapidly gained a reputation for their cleanliness, fast service, and a child-friendly atmosphere where families on the road could grab a quick meal. Prior to the rise of the",
"not able to afford to provide them with regular morning meals. They can provide both short- and long-term health benefits. Children who receive breakfast often perform better at learning, and can also be better behaved. Breakfast clubs can also improve the child's long-term health by providing a well balanced nutritious meal. Secondary benefits of breakfast clubs include improving attendance, helping to prevent disadvantaged children from experiencing social isolation, and helping with children who would otherwise not have adult supervision in the first hour or so before school. A significant majority of teachers hold the view that school breakfast",
"that its guests have individual dietary needs, and as part of its \"Have It Your Way\" promise, Burger King offers menu items for individuals with gluten sensitivity. BK food is prepared with several known food allergens, including wheat, milk, soy, and eggs. Products The range of products sold usually depends on the time of day. Lunch items such as hamburgers and fries are traditionally not served during breakfast time. However, some BK stores do sell food under their \"Burgers for Breakfast\" program. While for several years the company dictated hours to its franchisees in the United States, that changed with",
"on breakfast foods such as eggs (including omelettes), waffles, pancakes, and French toast, and most diners serve breakfast all day. Coffee is ubiquitous at diners, if not always of high quality. Many diners in the state carry a full drink menu, including mixed drinks. Many also serve hand-blended milkshakes. The food is usually quite inexpensive, with a decent meal (sandwich, side dish, drink) available for less than ten dollars. Many establishments have transparent display cases in or behind the counter for desserts, typically including a variety of pies and cheesecakes.\nSpecialties specific to New Jersey diners include the previously mentioned pork",
"is very similar to the Australian breakfast. The range of processed breakfast cereals is vast, and children are more likely to eat those that contain added sugar. New Zealanders, particularly in winter, are likely to eat a hot oat cereal called porridge. Porridge is typically served with milk, sugar, fruit or yogurt. Sliced bread which has been toasted and topped with preserves or spreads is a common alternative breakfast. Eating breakfast at a restaurant was unheard of until the 1990s; however cafes which serve breakfast until midday or all day are now common. The Big Breakfast is the main item",
"are designed to be taken away, and traditional table service is rare. Orders are generally taken and paid for at a wide counter, with the customer waiting by the counter for a tray or container for their food. A \"drive-through\" service can allow customers to order and pick up food from their cars.\nNearly from its inception, fast food has been designed to be eaten \"on the go\" and often does not require traditional cutlery and is eaten as a finger food. Common menu items at fast food outlets include fish and chips, sandwiches, pitas, hamburgers, fried chicken, french fries, chicken",
"meals as provided by their school. Adults may leave work to go out for a quick lunch, which might include some type of hot or cold sandwich such as a hamburger or \"sub\" sandwich. Salads and soups are also common, as well as a soup and sandwich, tacos, burritos, sushi, bento boxes, and pizza. Lunch may be consumed at various types of restaurants, such as formal, fast casual and fast food restaurants. Canadians and Americans generally do not go home for lunch, and lunch rarely lasts more than an hour except for business lunches, which may last longer. In the",
"students healthy, nutritious meals because of the inability to pay or accrued debts. When a student is unable to pay for a school meal, he or she might be given an alternative meal (like half a cheese sandwich), some are turned away, other have their food taken away and dumped. The \"shaming\" extends to practices such as \"hand stamping\" - whereas a student's hand is stamped with the word \"money\" - or other forms of debt collection activities against the students and families. The campaign led to the expansion of free school meals to 62,000 additional low-income students",
"King, etc.) use mass-produced pre-prepared ingredients (bagged buns & condiments, frozen beef patties, prewashed/sliced vegetables, etc.) but take great pains to point out to the customer that the \"meat and potatoes\" (hamburgers and french fries) are always cooked fresh (or at least relatively recently) and assembled \"to order\" (like at a diner).\nAlthough a vast variety of food can be \"cooked fast\", \"fast food\" is a commercial term limited to food sold in a restaurant or store with frozen, preheated or precooked ingredients, and served to the customer in a packaged form for take-out/take-away.\nFast food restaurants are traditionally distinguished by their",
"School breakfast club A school breakfast club is a provision for children to eat a healthy breakfast in a safe environment before their first class. The term \"breakfast club\" is commonly used to describe such facilities in the United Kingdom.\nBreakfast clubs generally enhance both academic performance and behavior, especially for children whose parents might not otherwise be able to afford to provide them with regular meals. Breakfast provision is however less prevalent compared with school lunch, both in the UK and worldwide. As of 2013, only about half the school children in the UK have access to",
"offer a fried fish sandwich for some of its customers who desire fish instead of beef or chicken.\nIn 1988, Wendy's was the first fast-food chain to create a single price-point value menu where all items listed on that menu were priced exclusively at 99¢. The menu was restructured in 2007 due to rising costs as the Super Value Menu with prices ranging from 99¢ to $2.00 USD. Breakfast In mid-2007, Wendy's began a national debut of its new breakfast menu in its U.S. and Canadian locations. The chain experimented with serving breakfast for a short time in 1985, but the",
"fish), or, as in the most popular kind in the West, rolled in nori (dried laver) with filling. The filling often includes fish, seafood, chicken or cucumber.\nPizza is a common fast food category in the United States, with nationwide chains including Papa John's, Domino's Pizza, Sbarro and Pizza Hut. It trails only the burger industry in supplying children's fast food calories. Menus are more limited and standardized than in traditional pizzerias, and pizza delivery is offered.\nKebab houses are a form of fast food restaurant from the Middle East, especially Turkey and Lebanon. Meat is shaven from a rotisserie, and is",
"meal—or combo depending on the chain. Value meals at fast food restaurants are common as a merchandising tactic to facilitate bundling, up-selling, and price discrimination. Most of the time they can be upgraded to a larger side and drink for a small fee. The perceived creation of a \"discount\" on individual menu items in exchange for the purchase of a \"meal\" is also consistent with the loyalty marketing school of thought. Technology To make quick service possible and to ensure accuracy and security, many fast food restaurants have incorporated hospitality point of sale systems. This makes it possible for",
"burger locations which highlights no change in consumer behavior even after food was labeled.\nFast food is also affordable on people's incomes and expenses relating to the regions they live. \"Healthy foods including whole-grain products, low-fat dairy foods, and fresh fruits and vegetables may be less available, and relatively costlier, in poor and minority neighborhoods.\" So, fast food stores are located in the areas where the demand by the population is high.\nSome other studies show that eating fast food is not dependent on a person's income. Researchers found that an amount of fast food consumed does not correlate with a person’s",
"Dayton, and Columbus), Indiana, Kentucky (primarily Louisville and the Northern Kentucky suburbs of Cincinnati), and Florida. The restaurants may be considered fast casual. Diners may sit at a booth or table and be served by a waiter, or at many locations, sit at a counter near employees preparing the food. At all restaurants, dishes are assembled at a centrally located service island so diners may watch their food as it is made. Food prepping takes only a few minutes so one often gets their food quickly. Carry-out and drive-through service are also available at most locations. In popular culture"
] |
How could Hartsfield–Jackson Atlanta International Airport be the busiest airport in the world? | [
"It's the main Delta hub, so a lot of connecting flights go through it.\n\nA hub is basically an airport that the airline uses to connect flights to places where not many people want to go. So, if you want to fly from one small airport to another, it's highly unlikely that they'll just happen to have a flight that directly connects them. There will, however, be flights going to and from the hub to those airports.",
"It's Delta's primary hub, which serves as a connection point to both US and international destinations. \n\nWith the merger of Continental and United, the new United actually flew more miles out of ATL. \n\nAtlanta is a 2 hour or less flight to 80% of the US population which makes it a logical airport to use. \n\nAlso Atlanta is a popular city to visit with shopping, dining, and sports attractions.",
"Atlanta has an interesting recent history. Since the mid-70s it's economy has been growing rapidly as corporations relocate their headquarters to the region to take advantage of cheap land, good infrastructure, a pleasant climate, and access to transportation hubs like Hartsfield. That growth generated a lot of air travel.\n\nAtlanta has a good \"ring road\" freeway with high capacity access to the airport. It also has excellent light rail passenger service. It is one of the easiest and most convenient airports to use in the country - maybe THE best.\n\nHartsfield itself which is south if the Atlanta metro area is in a region with a lot of room to grow. Most airports of the jet age are upgrades from airports of the propeller age - they were built at the edges of cities but the cities grew up around them making it very hard and expensive to expand. Hartsfield happens to have been located in a place that ended up being less well developed and therefore it has been able to keep growing. The New York airports are all basically was big as they will ever be. Heathrow wants to grow but expansion is a billion-dollar proposition due to how impacted it is with surrounding development. The airports in China may we become the busiest in the world - they certainly have room to grow - but air travel is still not as common there as it is in the US.\n\nHartsfield is a good place for a hub in a hub & spoke network. For reasons of economy and efficiency the US airlines moved away from non-stop flights and towards hub & spoke networks. Atlanta has a geographical advantage in the sense that it's a good hub compared to population distribution for the eastern half of the country and thus. It's of the population of the United States. The airport is home base for Delta airlines and Delta was able to survive the mergers and failures of the airline business since degregulation in the '70s and it's one of the strongest modern airlines.\n\nThe symbiosis of Hartsfield and Delta drive its volume. With so many passengers transiting the airport it is a logical place to make connections for other airlines too, which further adds to the feedback loop. The US government uses it as a major transit point for deployments overseas and there is a huge logistical system in the Southeast in terms of bases and equipment depots that all feed into Hartsfield.\n\nIt has now become a case of \"the big getting bigger\" as the feedback loops make further concentration even more logical. So it will certainly keep growing.",
"I would imagine it helps that the climate in Atlanta delivers little snow."
] | [
"flights. By 1950 it was the third-busiest airport in the United States in terms of aircraft operations, and its 13,097-foot (3,992 m) runway was the longest in the world in 1953. In summer of 1959 Qantas began the first jet service to Honolulu on its flights between Australia and California. Qantas introduced these jet flights with Boeing 707 aircraft operating a routing of Sydney – Fiji – Honolulu – San Francisco. Aeronautical engineer and airline consultant, Frank Der Yuen, advised in the design of the original building and founded its aerospace museum.\nThe original terminal building on the southeast side of",
"in the 1950s, Hartsfield–Jackson Atlanta International Airport has served as a key engine of the city's economic growth. Delta Air Lines, the city's largest employer and the metro area's third-largest, operates the world's largest airline hub at Hartsfield-Jackson, and it has helped make it the world's busiest airport, in terms of both passenger traffic and aircraft operations. Partly due to the airport, Atlanta has been also a hub for diplomatic missions; as of 2017, the city contains 26 consulates general, the seventh-highest concentration of diplomatic missions in the US.\n\nMedia is also an important aspect of Atlanta's economy. In fact, the",
"as \"Airport of the Year\" in 2005, largely due to the implementation of a $3.1 billion airport improvement program for both major airports in Houston.\nGeorge Bush Intercontinental Airport (IAH), located 23 miles (37 km) north of Downtown Houston between Interstates 45 and 69, is the eighth busiest commercial airport in the United States (by total passengers and aircraft movements) and forty-third busiest globally. The five-terminal, five-runway, 11,000-acre (4,500-hectare) airport served 40 million passengers in 2016, including 10 million international travelers. In 2006, the United States Department of Transportation named IAH the fastest-growing of the top ten airports in the United States. The",
"50 miles (80 kilometres) of track in the plan.\nHartsfield–Jackson Atlanta International Airport is the world's busiest airport as measured by passenger traffic and aircraft traffic. The facility offers air service to over 150 U.S. destinations and more than 75 international destinations in 50 countries, with over 2,500 arrivals and departures daily. Delta Air Lines maintains its largest hub at the airport. Situated 10 miles (16 km) south of downtown, the airport covers most of the land inside a wedge formed by Interstate 75, Interstate 85, and Interstate 285.\nCycling is a growing mode of transportation in Atlanta, more than doubling since",
"Transportation in Houston Airports within the city limits Houston is served by two commercial airports—the largest of which is the George Bush Intercontinental Airport (IAH). The airport is the 11th-busiest in the United States for total passengers, and 16th busiest worldwide. Bush Intercontinental is United Airlines second largest hub, with more than 650 daily departures (more than 450 of which are United flights).\nBush Intercontinental currently ranks second in the United States for non-stop domestic and international service (221 destinations), trailing only Atlanta Hartsfield with 250 destinations. In 2006, the United States Department of Transportation named Bush Intercontinental one of the",
"airport in the world, measured both in terms of total flights and passengers. While it was surpassed by Atlanta's Hartsfield in 1998 (as Chicago splits its air traffic between O'Hare and Midway airports, while Atlanta only uses one airport), with 59.3 million domestic passengers annually, along with 11.4 million international passengers in 2008, O'Hare consistently remains one of the two or three busiest airports globally, and in some years still ranks number one in total flights. It is a major hub for both United Airlines and American Airlines, and a major airport expansion project is currently underway. Midway Airport (MDW), which had",
"Prestwick International Airport, opened in the 1930s. The airport was a transatlantic gateway for over half a century. It lies close to, and was the last European re-fuelling way-point on, the Great Circle route from London via Thule in Greenland to San Francisco - now no longer relevant for modern aircraft with non-stop range. During World War II the US Air Force had a base at the airport, and Elvis Presley set foot in the UK for the only time there in 1960, when his US Army transport aircraft stopped for refuelling en route from Germany. Though a period of",
"Memphis International Airport History Memphis Municipal Airport, dedicated in 1929, opened on a 200-acre (81 ha) plot of farmland just over seven miles (11 km) from downtown Memphis. In its early years the airport had three hangars and an unpaved runway; passenger and air mail service was provided by American Airlines and Chicago and Southern Air Lines (acquired by Delta Air Lines in 1953). In 1939 Eastern Air Lines arrived; that March, Eastern had one departure a day to Muscle Shoals and beyond, American had four east/west and C&S had four north/south.\nDuring World War II the United States Army Air Forces Air",
"top ten fastest growing airports in the United States.\nThe second-largest commercial airport in Houston is the William P. Hobby Airport (named Houston International Airport until 1967). The airport operates primarily small to medium-haul flights and is the only airport in Houston served by Southwest Airlines and JetBlue Airways.\nThe third-largest airport and former U.S. Air Force base, Ellington Airport (formerly Ellington Field), is primarily used for government and private aircraft. At one point, Continental Express operated flights across the city to Bush Intercontinental primarily for residents of southeast Houston and Galveston County. Passenger flights ended on September 7, 2004.\nThe Federal Aviation",
"Airport and, together with the hub of competing carrier Southwest Airlines, has helped make Hartsfield-Jackson the world's busiest airport, both in terms of passenger traffic and aircraft operations. The airport, since its construction in the 1950s, has served as a key engine of Atlanta's economic growth. Housing market According to the Case–Shiller index, home prices in Atlanta increased 19.1% between March 2012 and March 2013.",
"Airport is the fifth busiest international airport in India in respect of aircraft movement (after Delhi, Mumbai, Bangalore and Chennai). It has two asphalt runways, the primary one extended by 700 meters (3627×50m) and upgraded to CATIIIB, and the secondary one (2790×46m) upgraded to CATII ILS standards. Its terminal is a new and sprawling L-shaped six-level integrated terminal of over 2,510,000 sq ft inaugurated in 2013, able to handle 25 million passengers per annum. It includes check-in counters that use CUTE (Common User Terminal Equipment) technology, 78 immigration counters, 12 customs counters, passenger lounges provided by",
"is the busiest passenger airport in South Carolina (IATA: CHS, ICAO: KCHS). The airport shares runways with the adjacent Charleston Air Force Base. Charleston Executive Airport is a smaller airport located in the John's Island section of the city of Charleston and is used by noncommercial aircraft. Both airports are owned and operated by the Charleston County Aviation Authority. Other references E. Lee Spence, a pioneer underwater archaeologist, was a longtime resident of Sullivan's Island. In the 1960s and 1970s, he discovered many shipwrecks along its shores. Those discoveries included the Civil War blockade runners Flora, Beatrice, Stono, Flamingo, Prince",
"684,875 tons of freight in 2012, making it the 10th busiest airport in the U.S. in terms of cargo. It handles many U.S.-based cargo airlines, including DHL Aviation, FedEx Express and UPS Airlines. It also has cargo offices for many international cargo carriers, including British Airways World Cargo, Cathay Pacific Cargo, China Airlines Cargo, EVA Air Cargo, LATAM Cargo Chile and Saudia Cargo. It has two cargo complexes: The North Cargo Terminal, located near Terminal E, and South Cargo, located near Terminal A. Given the airport is the 10th busiest cargo facility in the country, with many companies operating at",
"east of the city in Flowood in Rankin County. Its IATA code is JAN. The airport has non-stop service to 12 cities throughout the United States and is served by 6 mainline carriers (American, Delta, United, and US Airways)\nOn 22 December 2004, Jackson City Council members voted 6-0 to rename Jackson International Airport in honor of slain civil rights leader and NAACP field secretary for Mississippi, Medgar Evers. This decision took effect on 22 January 2005.\nFormerly Jackson was served by Hawkins Field Airport, located in northwest Jackson, with IATA code HKS, which is now used for private air traffic only.\nUnderway",
"George Washington Air Junction The George Washington Air Junction was a proposed airport for Fairfax County, Virginia. It was designed to be the world's largest airport, larger than those of New York, London, Berlin, Paris, Chicago, and Philadelphia combined. It was to have the world's longest runways and facilities to accommodate dirigible airships like the Zeppelin. It never opened, and the land was eventually seized. Background The George Washington Air Junction airport was a project of entrepreneur Henry Woodhouse. He was an aviation enthusiast and represented himself as president of the Aerial League of America, although there is no evidence",
"May 23, 1999. Opening Austin–Bergstrom International Airport opened to the public on May 23, 1999 with a 12,250 feet (3,730 m) runway, among the nation's longest commercial runways. The Barbara Jordan passenger terminal was originally conceived as an 18-gate terminal facility with a footprint of a bit more than 500,000 square feet (46,000 m²). However, ABIA was expanded during construction to have 24 contact gates with jet bridges (named Gate 2-Gate 25) and one gate without a jet bridge (named Gate 1) for a total footprint of 660,000 sqft.\nThe opening of the airport coincided with a considerable number of nonstop flights being",
"Airways, the flagship airline of the British empire at the time, started a service between London and Darwin via Cairo, Karachi, Calcutta, Singapore and Jakarta. This service was later extended to Brisbane and operated jointly with Qantas on 17 December 1934.\nBooming commercial aviation traffic led to congestion at the existing Seletar Airbase (today's Seletar Airport), creating a need for a new airport. On 31 August 1931, Sir Cecil Clementi, Governor of the Straits Settlements, announced that Kallang Basin as the location for the new civil aerodrome suitable for land planes and seaplanes, and relieving Seletar of commercial flight activities. This",
"and Downtown Dallas. In terms of size, DFW International is the largest airport in the state, the 2nd largest in the United States, and 9th largest in the world; DFW International Airport is larger than the island of Manhattan.\nIn terms of traffic, DFW International is the busiest airport in the state, 4th busiest in the United States, and 11th busiest in the world. The headquarters of American Airlines, the largest air carrier in the world ahead of United Airlines and Delta Air Lines, is less than a mile from DFW International within Fort Worth's city limits. Similarly, Love Field is",
"Hartsfield–Jackson Atlanta International Airport Historical airline service Delta and Eastern dominated the airport during the 1970s. United, Southern, Piedmont, Northwest and TWA were also present. In 1978, after airline deregulation, United and TWA no longer served Atlanta, while Southern successor Republic was the airport's third-largest carrier.\nEastern was a larger airline than Delta until deregulation in 1978, but Delta was early to adopt the hub and spoke route system, with Atlanta as a hub between the Midwest and Florida, giving it an advantage in the Atlanta market. Eastern ceased operations in 1991 due to labor issues; American Airlines considered establishing an",
"becoming the city's busiest airport; it closed in 1984. Newark Liberty International Airport opened in 1928. It was followed by Floyd Bennett Field in 1930; New York City's first municipal airport, it built largely in response to the growth of commercial aviation after World War I. LaGuardia Airport was opened in 1939, and Floyd Bennett Field was closed for general aviation two years later. John F. Kennedy International Airport opened as Idlewild Airport in 1948. Airspace The New York Air Route Traffic Control Center (ZNY) is the busiest of 22 Air Route Traffic Control Centers (ARTCC) in the United States.",
"5,000 feet (1,500 m) considered safe for the new, heavier aircraft (like the Douglas DC-3). Amelia Earhart testified before the U.S. Senate in May 1936 that the airport was still unsafe. Other improvements to facilities and safety The airport continued to expand through the late 1930s, albeit slowly. A new Airmail Building was constructed at the field in August 1936, enabling the Bureau of Air Commerce to move its headquarters to the airport's administration building, and Central Airlines moved its headquarters to the field. A new radio and arc lamp control system for planes began installation later that month, and",
"2008. The world's busiest airport in terms of passenger movement in 2008 was Atlanta's Hartsfield-Jackson International Airport with 90,039,280 passengers, nearly three times the passengers that passed through Philadelphia International Airport the same year. Statistics on passenger origination and termination (with PHL airport as an originating or final destination) are not widely available.",
"ends southwest of LGA airspace at the northern end of Roosevelt Island.\nAs of 2014, about 1% of flights to the Port Authority-controlled airports use the Next Generation Air Transportation System, which relies on the Global Positioning System instead of radar. John F. Kennedy International Airport John F. Kennedy International Airport (JFK) is the major entry point for international arrivals in the United States, and it is the largest international air freight gateway in the nation by value of shipments. Sections of the airport have been a foreign trade zone since 1984. About 100 airlines from more than 50 countries operate",
"2,342,310 in 2010. International cargo hub Ted Stevens Anchorage International Airport is also a major cargo hub. As of 2015, it ranked as the fourth busiest airport in the world by cargo traffic, after Hong Kong, Memphis, and Shanghai–Pudong.\nFedEx Express and UPS Airlines operate major hubs at Anchorage International for cargo heading to and from the Far East. NWA Cargo used to operate a major hub at the airport until December 28, 2009 when it closed all operations for Northwest Cargo at all airports. FedEx Express is the airport's largest cargo facility and can handle as many as 13,400 packages",
"and the 17th busiest airport in the world. In addition to Charlotte and Atlanta, other airports in the region with direct, non-stop airline service outside North America include: Raleigh-Durham International Airport, Charleston International Airport, and Nashville International Airport. Other major airports in the region include: Piedmont Triad International Airport, Asheville Regional Airport, Wilmington International Airport, Birmingham-Shuttlesworth International Airport, Huntsville International Airport, Greenville-Spartanburg International Airport, Myrtle Beach International Airport, Columbia Metropolitan Airport, Hilton Head Airport, McGhee Tyson Airport, and Memphis International Airport, which is the world's busiest airport by most cargo traffic by weight annually. Megaregion as a unit The",
"On January 22, 1952 an American Airlines CV-240 crashed in Elizabeth, while on approach to runway 6 killing all 23 aboard and seven on the ground. On February 11, 1952 a National DC-6 crashed in Elizabeth after takeoff from runway 24, killing 29 of 63 on board and four on the ground.\nInevitably, the airport was closed for some months; airline traffic resumed later in the year, but the airport's continued unpopularity and the New York area's growing air traffic led to searches for new airport sites. A proposal to build a new airport at what is now the Great Swamp",
"International Airport is the main airport in the Charlotte area and the 6th busiest in the country. In April 2007, Charlotte was the fastest growing airport in the US. The airport went on to surpass its sister US Airways hub in Philadelphia, Pennsylvania as one of the 30 busiest airports in the world in terms of passenger traffic. A new terminal to the northwest of the center of the airport will be built in the near future, possibly as a Caribbean/Latin America international terminal. CLT is also supplemented by regional airports in Concord, Gastonia, Hickory, Monroe, Statesville, in North Carolina,",
"Airways Maintenance Center at Oakland International Airport. The maintenance hangar could store four Boeing 747s. It opened in May 1973.\nAfter the war Oakland's traffic slumped, but airline deregulation prompted several low-fare carriers to begin flights. This increase prompted the airport to build a $16.3 million second terminal, the Lionel J. Wilson Terminal 2, with seven gates for PSA and AirCal service. In 1987 an Air France Concorde visited Oakland to provide supersonic two-hour flights to the Pacific halfway to Hawaii and back to Oakland.\nFedEx Express opened a cargo base at OAK in 1988, which is now one of the busiest",
"Virginia Airport Facilities The airport resides at an elevation of 20 feet (6 m) above mean sea level. It has one runway designated 05/23 with an asphalt surface measuring 925 by 22 metres (3,035 ft × 72 ft).\nThe airport is home to the Durban Wings Club and thus boasts having one of the oldest flying clubs in the country. History Virginia Airport was officially opened by the then Mayor of Durban, W E Shaw in June 1959. The opening was commemorated by an air race which ended at Virginia. The decision to open a new airport was motivated by the need to relocate the",
"September 1960. American began flying McDonnell Douglas DC-10s from Tucson nonstop to Dallas/Ft. Worth and to Chicago via Phoenix beginning in fall 1971 and continuing through the 1970s. In the late 1980s American was flying Boeing 767-200s nonstop to Dallas/Ft. Worth. The DC-10 and 767 were the largest airliners ever to serve Tucson on scheduled passenger flights.\nOn November 15, 1963 a new terminal designed by Terry Atkinson opened with an international inspection station. The Tucson International Airport name was legitimate: Aeronaves de Mexico had begun Douglas DC-6 service to Hermosillo and beyond in 1961. In the mid 1970s successor airline"
] |
How much of humanity's creation accounts for Earth's mass? | [
"None. Everything we've built came from the Earth to begin with. You can't create or destroy mass so everything we've made weighs the same (in total) as the raw materials they were made from. \n\nIf anything, the Earth is lighter since humans came along. We've built spacecraft and other things and thrown them off the surface of the Earth in to space.",
"All human made objects are estimated to weigh 30 trillion tons, which is a lot, but minuscule compared to the weight of the earth: 5,972,000,000,000,000,000,000 tons. It's about one billionth.",
"Pretty much none of it. One way of looking at it is to consider a globe with accurate raised mountains. But in fact, if such a globe were the size of a china teacup, it would be smoother than the cup. So our structures are as nothing. OTOH, our pollution can affect the thin layer of life on the surface, and that's important to all of us."
] | [
"cbiomass, X is its concentration in the biomass.\n (1)\nAssuming that 100,000 kg biomass supports one human, the asteroids may then sustain about 6e15 (six million billion) people, equal to a million Earths (a million times the present population). Similar materials in the comets could support biomass and populations about one hundred times larger. Solar energy can sustain these populations for the predicted further five billion years of the Sun. These considerations yield a maximum time-integrated BIOTA of 3e30 kg-years in the Solar System. After the Sun becomes a white dwarf star, and other white dwarf stars, can provide energy for",
"mass over 5.5×10¹² kg, about 900 times the mass of the Great Pyramid of Giza. In the enormous gravitational field of a neutron star, that teaspoon of material would weigh 1.1×10²⁵ N, which is 15 times what the Moon would weigh if it were placed on the surface of the Earth. The entire mass of the Earth at neutron star density would fit into a sphere of 305m in diameter (the size of the Arecibo Observatory). The pressure increases from 3.2×10³¹ to 1.6×10³⁴ Pa from the inner crust to the center.\nThe equation of state of matter at such high densities is not precisely",
"fields. It has a diameter of about 1,392,684 kilometres (865,374 mi), around 109 times that of Earth, and its mass (1.989×10³⁰ kilograms, approximately 330,000 times that of Earth) accounts for some 99.86% of the total mass of the Solar System. Chemically, about three quarters of the Sun's mass consists of hydrogen, while the rest is mostly helium. The remaining 1.69% (equal to 5,600 times the mass of Earth) consists of heavier elements, including oxygen, carbon, neon and iron.\nThe Sun formed about 4.567 billion years ago from the gravitational collapse of a region within a large molecular cloud. Most of the matter",
"minimum mass of 1.9 Earth masses was announced on 21 April 2009. It was at the time the smallest extrasolar planet discovered around a normal star and the closest in mass to Earth. Being at an orbital distance of just 0.03 AU and orbiting its star in just 3.15 days, it is not in the habitable zone, and may have 100 times more tidal heating than Jupiter's volcanic satellite Io.\nA planet found in December 2009, GJ 1214 b, is 2.7 times as large as Earth and orbits a star much smaller and less luminous than our Sun. \"This planet probably does",
"In the 1970s, Gerard K. O'Neill suggested building space habitats that could support 30,000 times the carrying capacity of Earth using just the asteroid belt, and that the Solar System as a whole could sustain current population growth rates for a thousand years. Marshall Savage (1992, 1994) has projected a human population of five quintillion (5 × 10¹⁸)\nthroughout the Solar System by 3000, with the majority in the asteroid belt. Freeman Dyson (1999) favours the Kuiper belt as the future home of humanity, suggesting this could happen within a few centuries. In Mining the Sky, John S. Lewis suggests that the resources",
"5 Earth mass planet, would be between 0.499 AU and 0.947 AU.",
"Solar mass History The value of the gravitational constant was first derived from measurements that were made by Henry Cavendish in 1798 with a torsion balance. The value he obtained differs by only 1% from the modern value. The diurnal parallax of the Sun was accurately measured during the transits of Venus in 1761 and 1769, yielding a value of 9″ (9 arcseconds, compared to the present 1976 value of 8.794148″). From the value of the diurnal parallax, one can determine the distance to the Sun from the geometry of Earth.\nThe first person to estimate the mass of the Sun",
"kilogram-years) of 3·10³⁰ kg-years in the Solar System, a hundred thousand times more than life on Earth to date. Considering biological requirements of 100 W kg⁻¹ biomass, radiated energy about red giant stars and white and red dwarf stars could support a time-integrated BIOTA up to 10⁴⁶ kg-years in the galaxy and 10⁵⁷ kg-years in the universe.\nSuch astroecology considerations quantify the immense potentials of future life in space, with commensurate biodiversity and possibly, intelligence. Chemical analysis of carbonaceous chondrite meteorites show that they contain extractable bioavailable water, organic carbon, and essential phosphate, nitrate and potassium nutrients. The results allow assessing",
"of the United States Census Bureau estimated that the world population reached six billion on 21 April 1999. United Nations Population Fund spokesman Omar Gharzeddine disputed the date of the Day of Six Billion by stating, \"The U.N. marked the '6 billionth' [person] in 1999, and then a couple of years later the Population Division itself reassessed its calculations and said, actually, no, it was in 1998.\"\nOn the Day of Six Billion, UN Secretary-General Kofi Annan was in Sarajevo, Bosnia and Herzegovina to monitor the Dayton Agreement. At midnight he went to Koševo Hospital, where Adnan Mević, born at",
"Kepler-452b Mass, radius and temperature Kepler-452b has a probable mass five times that of Earth, and its surface gravity is twice Earth's, though calculations of mass for exoplanets are only rough estimates. If it is a terrestrial planet, it is most likely a super-Earth with many active volcanoes due to its higher mass and density. The clouds on the planet would be thick and misty, covering much of the surface as viewed from space.\nThe planet takes 385 Earth days to orbit its star. Its radius is 50% bigger than Earth's, and lies within the conservative habitable zone of its parent",
"than the surface gravity of Earth.Two independent teams were involved in pioneering work to estimate the mass of the planet. The estimates were made possible because Kepler-78b's gravity causes a \"wobble\" in the orbit of the host star. While the method has been used to characterize gas giants, ordinarily it is hard to estimate the mass of Earth-sized exoplanets because their gravity is too weak to produce a visible influence on their stars. In this case, the planet's orbit is so close to its star that its gravitational influence has a detectable effect.\nOne team, led by Francesco Pepe, used the",
"Kepler-1520b Mass, radius, and temperature The mass of Kepler-1520b is unknown however modeling of the mass loss rate of the planet indicates that the planet cannot be more massive than about 2% the mass of the Earth (less than double the mass of the Moon). According to calculations, it may have lost 70% of its original mass; we may be currently observing its naked iron core. From attempts to measure the secondary eclipse the radius of the planet is constrained to be less than one Earth radius (4600 km) for an albedo of 0.5. It has a surface temperature of 2,255 K",
"4.6×10⁻¹⁰ \nof the Earth’s total mass. The self energy of the Moon is smaller yet, about 2×10⁻¹¹ of its mass. (The contribution for any object of laboratory size is negligible, about 10⁻²⁷, so only measurements of planet-sized or bigger objects have any hope of seeing this effect.)\nIf the Moon just revolved around the Earth, there would be no way to tell what fraction of the Moon's or the Earth's gravity was caused by each form of mass, since only the total can be measured. However, the orbit of the Moon is also strongly affected by the gravity of the",
"the mass of planetesimals fourfold. However, the minimum mass nebula capable of terrestrial planet formation can only form 1–2 M⊕ cores at the distance of Jupiter (5 AU) within 10 million years. The latter number represents the average lifetime of gaseous disks around Sun-like stars. The proposed solutions include enhanced mass of the disk—a tenfold increase would suffice; protoplanet migration, which allows the embryo to accrete more planetesimals; and finally accretion enhancement due to gas drag in the gaseous envelopes of the embryos. Some combination of the above-mentioned ideas may explain the formation of the cores of gas giant planets such as Jupiter",
"26th century Population of Earth Physicist Stephen Hawking, at a White House lecture in 1999, remarked that if there is no space colonization, population expansion continued unabated and the people of the Earth continued to use power at the rate they did then, then by the year 2600, people would be standing shoulder to shoulder and the Earth would glow red hot.",
"Earth. Cultures on simulated asteroid/meteorite materials To quantify the potential amounts of life in biospheres, theoretical astroecology attempts to estimate the amount of biomass over the duration of a biosphere. The resources, and the potential time-integrated biomass were estimated for planetary systems, for habitable zones around stars, and for the galaxy and the universe. Such astroecology calculations suggest that the limiting elements nitrogen and phosphorus in the estimated 10²² kg carbonaceous asteroids could support 6·10²⁰ kg biomass for the expected five billion future years of the Sun, yielding a future time-integrated BIOTA (BIOTA, Biomass Integrated Over Times Available, measured in",
"before the first detections of exoplanets around \"normal\" solar-like stars, were found in orbit around a millisecond pulsar, PSR B1257+12. These planets remained for many years the only Earth-mass objects known outside the Solar System. One of them, PSR B1257+12 D, has an even smaller mass, comparable to that of our Moon, and is still today the smallest-mass object known beyond the Solar System. Pulsar rotational speed limits The first millisecond pulsar, PSR B1937+21, was discovered in 1982 by Backer et al. Spinning roughly 641 times a second, it remains the second fastest-spinning millisecond pulsar of the approximately 200 that",
"expense is the high cost of placing mass into Earth orbit: $7,000–25,000 per kg in inflation-adjusted dollars, according to a 2006 estimate. Proposed concepts for addressing this issue include non-rocket spacelaunch, momentum exchange tethers, and space elevators.\nInterstellar travel for a human crew remains at present only a theoretical possibility. The distances to the nearest stars will require new technological developments and the ability to safely sustain crews for journeys lasting several decades. For example, the Daedalus Project study, which proposed a spacecraft powered by the fusion of Deuterium and He³, would require 36 years to reach the nearby Alpha Centauri",
"mass equal to 1,000,000 times the mass of the Sun is approximately equal to the sigma of a star travelling at 50 km/s.\nThe increase factor is\n10⁶n*10¹=xKm/s+50 km/s.",
"about 0.1% less oblate than Newton's estimate. A theoretical determination of the precise extent of oblateness in response to a centrifugal force requires an understanding of the make-up of the planet, not only today but during its formation.\nIn 1672 Jean Richer found the first evidence that gravity was not constant over the Earth (as it would be if the Earth were a sphere); he took a pendulum clock to Cayenne, French Guiana and found that it lost 2 ¹⁄₂ minutes per day compared to its rate at Paris. This indicated the acceleration of gravity was less at Cayenne than",
"Earth's size appeared around 350 BC, when Aristotle reported in his book On the Heavens that mathematicians had guessed the circumference of the Earth to be 400,000 stadia. Scholars have interpreted Aristotle's figure to be anywhere from highly accurate to almost double the true value. The first known scientific measurement and calculation of the circumference of the Earth was performed by Eratosthenes in about 240 BC. Estimates of the accuracy of Eratosthenes's measurement range from 0.5% to 17%. For both Aristotle and Eratosthenes, uncertainty in the accuracy of their estimates is due to modern uncertainty over which stadion length they meant.",
"outnumber the living\", which was roughly accurate at the time of writing.\nRecent estimates of the \"total number of people who have ever lived\" are in the order of 100 billion. \nThe answer naturally depends on the definition of \"people\", i.e. is only Homo sapiens to be counted, or all of genus Homo, but due to the small population sizes in the Lower Paleolithic, the order of magnitude of the estimate is not affected by the choice of cut-off date substantially more than by the uncertainty of estimates throughout the Neolithic to Iron Age.\nThe estimate is more crucially affected by the",
"Earth masses (see above). On 24 August, astronomers using ESO's HARPS instrument announced the discovery of a planetary system with up to seven planets orbiting a Sun-like star, HD 10180, one of which, although not yet confirmed, has an estimated minimum mass of 1.35 ± 0.23 times that of Earth, which would be the lowest mass of any exoplanet found to date orbiting a main-sequence star. Although unconfirmed, there is 98.6% probability that this planet does exist.\nThe National Science Foundation announced on 29 September the discovery of a fourth super-Earth (Gliese 581g) orbiting within the Gliese 581 planetary system. The",
"had a mass slightly smaller than Mercury in size when it first formed, since the calculations show that planets with masses larger than 7% the Earth's barely lose any mass over billion year time-scales.\nThis discovery helps shed light on how the Earth will interact with the Sun when it becomes a red giant, roughly 5–7 billion years from now. 2012 detections The existence of the planet was first evidenced in data collected by the Kepler spacecraft in 2012. However, the light curve of the star, a graph of its stellar flux versus time, showed that while there were regular",
"its size, with a posterior probability that it is dense enough to be terrestrial at about 0.43. For comparison, at the time Kepler-10c had a Procky of 0.1, and Kepler-131b has a Procky of 0.002.\nKepler-145b is the most massive planet classified as a Mega-Earth, with a mass of 37.1 M⊕ and a radius of 2.65 R⊕, so large that it could belong to a sub-category of Mega-Earth known as Supermassive Terrestrial Planets (SMTP). It likely has an Earth-like composition of rock and iron without any volatiles. A similar Mega-Earth, K2-66b, is about 21.3 times the mass and 2.49 times the",
"mass Where a planet has natural satellites, its mass is usually quoted for the whole system (planet + satellites), as it is the mass of the whole system which acts as a perturbation on the orbits of other planets. The distinction is very slight, as natural satellites are much smaller than their parent planets (as can be seen in the table above, where only the largest satellites are even listed).\nThe Earth and the Moon form a case in point, partly because the Moon is unusually large (just over 1% of the mass of the Earth) in relation to its parent",
"population. Astronomers have not excluded the possibility of an object with a mass similar to that of Earth located farther than 100 AU with an eccentric and inclined orbit. Computer simulations by Patryk Lykawka of Kobe University have suggested that an object with a mass between 0.3 and 0.7 Earth masses, ejected outward by Neptune early in the Solar System's formation and currently in an elongated orbit between 101 and 200 AU from the Sun, could explain the Kuiper cliff and the peculiar detached objects such as Sedna and 2012 VP113. Although some astronomers, such as Renu Malhotra and David Jewitt, have",
"in the Homestake Mine and contemporary neutrino observatories.\nThe supernova 1987A indicated that neutrinos might have mass because of the difference in time of arrival of the neutrinos detected at Kamiokande and IMB. However, because very few neutrino events were detected, it was difficult to draw any conclusions with certainty. If Kamiokande and IMB had high-precision timers to measure the travel time of the neutrino burst through the Earth, they could have more definitively established whether or not neutrinos had mass. If neutrinos were massless, they would travel at the speed of light; if they had mass, they would travel at",
"World population milestones Global billionth milestones There is no estimation for the exact day or month the world's population surpassed each of the one and two billion marks. The days of three and four billion were not officially noted, but the International Database of the United States Census Bureau places them in July 1959 and April 1974. Five billion The Day of Five Billion, 11 July 1987, was designated by the United Nations Population Fund as the approximate day on which world population reached five billion. Matej Gašpar from Zagreb, Croatia (then SR Croatia, SFR Yugoslavia), was chosen as",
"Kepler-52b, Kepler-52c and Kepler-57b have maximum-masses between 30 and 100 times the mass of Earth (although the actual masses could be much lower); with radii about 2 Earth radii, they might have densities larger than that of an iron planet of the same size. As such, exoplanets orbiting very close to their stars could be the remnant cores of evaporated gas giants or brown dwarfs. If cores are massive enough they could remain compressed for billions of years despite losing the atmospheric mass.\nAs there is a lack of gaseous \"hot-super-Earths\" between 2.2 and 3.8 Earth-radii exposed to over 650 Earth"
] |
Why does water taste sugary when I'm super thirsty? | [
"I've never heard of that... it would seem to imply that whatever you last ate was sugary or at least sweet, and some dissolved in the water."
] | [
"to no impact on human teeth.\nCarbonated water may increase irritable bowel syndrome symptoms of bloating and gas due to the release of carbon dioxide in the digestive tract. It does not appear to have an effect on gastroesophageal reflux disease. There is tentative evidence that carbonated water may help with constipation among people who have had a stroke.\nCarbonated water such as club soda or sparkling water is defined in US law as a food of minimal nutritional value, even if minerals, vitamins, or artificial sweeteners have been added to it. History Many alcoholic drinks, such as beer, wine and champagne,",
"The inclusion of some sodium in fluid replacement drinks has some theoretical benefits and poses little or no risk, so long as these fluids are hypotonic (since the mainstay of dehydration prevention is the replacement of free water losses).\nThe consumption of overly sugary and/or salty foods can cause dehydration. Treatment The treatment for minor dehydration that is often considered the most effective is drinking water and stopping fluid loss. Plain water restores only the volume of the blood plasma, inhibiting the thirst mechanism before solute levels can be replenished. Solid foods can contribute to fluid loss from vomiting and diarrhea.",
"is somewhat acidic, this acidity can be partially neutralized by saliva. A study found that sparkling mineral water is slightly more erosive to teeth than non-carbonated water but is about 100 times less erosive to teeth than soft drinks are and only slightly more erosive then tap water. A 2017 study, by the American Dental Association showed that although seltzer water is more erosive than tap water, it would take over 100 years of daily drinking to cause damage to human teeth. However, if there is added sugar or artificial flavoring this does not apply. Natural flavoring will have minimal",
"causing an almost irresistible (if the hypertonicity is severe enough) urge to drink water. The cessation of urine flow prevents the hypovolemia and hypertonicity from getting worse; the drinking of water corrects the defect.\nHypo-osmolality results in very low plasma ADH levels. This results in the inhibition of water reabsorption from the kidney tubules, causing high volumes of very dilute urine to be excreted, thus getting rid of the excess water in the body.\nUrinary water loss, when the body water homeostat is intact, is a compensatory water loss, correcting any water excess in the body. However, since the kidneys cannot generate",
"Zero Sugar, as well as changed its taste by tweaking the blend of natural flavors proprietary to Coca-Cola. Ingredient list Carbonated Water, Caramel Color, Phosphoric acid, Aspartame, Potassium Benzoate, Caffeine, Natural flavor, Acesulfame potassium, Citric acid, Calcium disodium EDTA, Panax ginseng extract.",
"point of water, 0 °C (32 °F). Ice made from water can be 0 °C, or a much lower temperature. The agitation of the machines is partially to keep the water from freezing solid. Some of the drinks have additives to make the freezing temperature of the mix lower, so that the drink can be much colder than a water slush drink. Essential sugar composition Slush is made by a mixture of sugar and water. To prevent the mixture from freezing solid, there must be between 12% - 22% of sugar present in the solution. The sugar acts as an antifreeze in the",
"or oral rehydration therapy.\nAn overconsumption of water can lead to water intoxication, which can dangerously dilute the concentration of salts in the body. Overhydration sometimes occurs among athletes and outdoor laborers, but it can also be a sign of disease or damage to the hypothalamus. A persistent desire to drink inordinate quantities of water is a psychological condition termed polydipsia. It is often accompanied by polyuria and may itself be a symptom of Diabetes mellitus or Diabetes insipidus. Human water requirements A daily intake of water is required for the normal physiological functioning of the human body. The USDA recommends",
"body, relies on the fact that water losses from the body, (through unavoidable water loss through the skin which is not entirely waterproof and therefore always slightly moist, water vapor in the exhaled air, sweating, vomiting, normal feces and especially diarrhea) are all hypotonic, meaning that they are less salty than the body fluids (compare, for instance, the taste of saliva with that of tears. The latter has almost the same salt content as the extracellular fluid, whereas the former is hypotonic with respect to the plasma. Saliva does not taste salty, whereas tears are decidedly salty). Nearly all",
"Thus, the low levels of satiety provided by sugar-sweetened soft drinks may explain their association with obesity. That is, people who consume calories in sugar-sweetened drinks may fail to adequately reduce their intake of calories from other sources. Indeed, people consume more total calories in meals and on days when they are given sugar-sweetened drinks than when they are given artificially sweetened drinks or water. However, these results are contradicted by a study by Adam Drewnowski published in 2004, in which \"32 subjects consumed a 300-calorie snack of fat-free raspberry cookies or regular cola on two occasions each – either",
"sweetened water for the no-radiation, mild radiation and strong radiation rats was 80%, 40% and 10%, respectively.\nThis finding ran contrary to much of the learning literature of the time in that the aversion could occur after just a single trial and over a long delay. Garcia proposed that the sweetened water became regarded negatively because of the nausea inducing effects of the radiation, and so began the study of conditioned taste aversion.\nMany scientists were skeptical of Garcia's findings because it did not follow the basic principles of classical conditioning. However, Garcia replicated his results multiple times. He demonstrated that the",
"heightened response is likely, at least in part, due to an increased number of fungiform papillae. Studies have shown that supertasters require less fat and sugar in their food to get the same satisfying effects. However, contrary to what one might think, these people actually tend to consume more salt than the average person. This is due to their heightened sense of the taste of bitterness, and the presence of salt drowns out the taste of bitterness. (This also explains why supertasters prefer salted cheddar cheese over non-salted.) Aftertaste Aftertastes arise after food has been swallowed. An aftertaste can differ",
"simple carbohydrates: glucose, fructose, sucrose and other simple sugars. If oral bacteria ferment carbohydrates and produce acids that may dissolve tooth enamel and induce dental decay, then sweetened drinks may increase the risk of dental caries. The risk would be greater if the frequency of consumption is high.\nA large number of soda pops are acidic as are many fruits, sauces and other foods. Drinking acidic drinks over a long period and continuous sipping may erode the tooth enamel. A 2007 study determined that some flavored sparkling waters are as erosive or more so than orange juice.\nUsing a drinking straw is",
"in cola drinks lead to diuresis, an increase in the sodium-potassium pumps via cellular phosphodiesterase inhibition, increased renin levels, and also produced metabolic alkalosis which all lead to hypokalemia.\nThe consumption of sugar sweetened beverages has increased over the years; this includes caffeinated and un-caffeinated drinks. The rise in consumption of soft drinks is due to the current convenience, availability, and accessibility of sugar sweetened beverages today. Over these years an increase in concern and action towards the accessibility of sugar sweetened beverages have been taken through policy. Government officials and doctors alike have responded to the increase in sugar sweetened",
"because it triggers three of the five types of taste sensations, according to concentration. Dilute solutions of potassium ions taste sweet, allowing moderate concentrations in milk and juices, while higher concentrations become increasingly bitter/alkaline, and finally also salty to the taste. The combined bitterness and saltiness of high-potassium solutions makes high-dose potassium supplementation by liquid drinks a palatability challenge. Mining Potassium salts such as carnallite, langbeinite, polyhalite, and sylvite form extensive evaporite deposits in ancient lake bottoms and seabeds, making extraction of potassium salts in these environments commercially viable. The principal source of potassium – potash – is mined in",
"added sugars were found between non-Hispanic white and Mexican-American men or women.\nSugar-sweetened beverages raise concern because they are calorie-dense and yet produce low satiety. There exists a strong correlation between the consumption of liquid calories and total energy intake. Individuals do not tend to decrease solid calories in compensation for increased liquid calories. For example, if there were no compensation for liquid calories, the 40-50g of sugar in each 12 oz. can of soda drunk on a daily basis could lead to a 15-pound weight gain per year. On the national scale, the American Heart Association estimates that approximately",
"low-sugar drinks taste sweeter helping people reduce sugar intake. \nA team from the University of Tokyo created a device that simulates the different textures of food through electricity. The device uses electrodes place on the masseter muscle (a jaw muscle used for chewing) and simulates the texture by changing this muscle frequency. For example, a higher frequency gives the food a harder texture.",
"that thirst is not a reliable indicator of the need in water, while other say that obligatory drinking at every opportunity without real need increases the danger of hyponatremia. \"If you hear sloshing in your stomach... you can by-pass that water stop\". (Jeff Galloway)\nIn Sumo, if a bout goes for many minutes the referee may call a break traditionally called mizu-iri or \"water break\".",
"and turbinado sugar. The added sugar content is associated with several health concerns like weight gain, obesity, type 2 diabetes, heart disease, liver disease, dental implications, and gout. Naturally occurring sugars, such as those in fruit or milk, are not added sugars. Even though there are several beverages/drinks that have sugar in them, some beverages, such as milk, fruit juice, and diet drinks, fall into a \"gray\" area because of different contributions to health and weight gain is more complex. Sugar-sweetened beverages contain added sugars such as sucrose or fructose, often in large amounts, which contribute to the overall energy",
"content. Adding zest to lemonade may help reduce the sugar content by making it taste sweeter (due to the flavanone compounds).\nDaily consumption of 120 ml (4 imp fl oz; 4 US fl oz) of lemon juice per day, when mixed with two litres of water, has been shown to reduce the rate of stone formation in people susceptible to kidney stones. Lemons contain the highest concentration of citric acid of any fruit, and this weak acid has been shown to inhibit stone formation.",
"and consumption of sweetened beverages is associated with higher levels of obesity and heart disease. Most of these drinks contain significant amounts of sugars and hence calories, which would add to discretionary and total caloric intake. As such, these ingredients pose health risks because of what they contain (sugar and caffeine) or what they replace in the diet (vitamin and mineral-rich foods).\nAnother set of concerns is that some functional beverages contain ingredients that have not been sufficiently studied for health benefits, safety, and dosage. At the same time, many functional beverages have higher levels of a certain ingredient, like caffeine—which,",
"reversed by simply tasting (but not swallowing or consuming) sweet beverages, which can have rewarding properties. Others have suggested that the taste of sugar (but not artificial sweetener) has psycho-physiological signaling effects.\nAn experiment by Segertrom (2007) and Solberg Nes, has shown that HRV (heart rate variability) is a marker for both ego depletion, and an index for self-control power before the task.\nThe underlying neural processes associated with self-control failure have been recently examined using neurophysiological techniques. According to cognitive and neuroscientific models of mental control, a \"conflict-monitoring/error-detection system\" identifies discrepancies between intended goals and actual behaviors. Error-related negativity (ERN) signals",
"the human body keeps track of loss of body water is that osmoreceptors in the hypothalamus sense a balance of sodium and water concentration in extracellular fluids. Relative loss of body water will cause sodium concentration to rise higher than normal, a condition known as hypernatremia. This ordinarily results in thirst. Conversely, an excess of body water caused by drinking will result in too little sodium in the blood (hyponatremia), a condition which is again sensed by the hypothalamus, causing a decrease in vasopressin hormone secretion from the anterior pituitary, and a consequent loss of water in the urine, which",
"when consumed in large amounts, is associated with heart disease and cancer. Sugar content Many functional drinks have high levels of sugar, even if they have other \"healthy\" ingredients. For example, a 20oz bottle of Glacéau's VitaminWater has been reported to contain approximately 33 g of sugar, which is similar to the sugar content of a can of Coca-Cola. This prompted The Coca-Cola Company to be sued for claiming that VitaminWater was a healthy beverage.\nGiven their sugar content, many functional beverages may not be as healthy an alternative as other commonly consumed beverages. In addition, the sugar content of such",
"unprocessed. As sugar is vital for energy and survival, the taste of sugar is pleasant.\nThe stevia plant contains a compound known as steviol which, when extracted, has 300 times the sweetness of sugar while having minimal impact on blood sugar. Sour Sourness is caused by the taste of acids, such as vinegar in alcoholic beverages. Sour foods include citrus, specifically lemons, limes, and to a lesser degree oranges. Sour is evolutionarily significant as it is a sign for a food that may have gone rancid due to bacteria. Many foods, however, are slightly acidic, and help stimulate the taste buds",
"the water within the ketchup to be at the lowest possible energy state, all of the hydrogen bonds that are able to be made within the matrix must be made. The water bound to the polysaccharide moves more slowly within the matrix, which is unfavorable with respect to entropy. The increased order within the polysaccharide-water complex gives rise to a high-energy state, in which the water will want to be relieved. This concept implies that water will more favorably bind with itself because of the increased disorder between water molecules. This is partially the cause for water leaching out of",
"Sweetened beverage A sweetened beverage is any beverage with added sugar. It has been described as \"liquid candy\". Consumption of sweetened beverages has been linked to weight gain, obesity, and associated health risks. According to the CDC, consumption of sweetened beverages is also associated with unhealthy behaviors like smoking, not getting enough sleep and exercise, and eating fast food often and not enough fruits regularly. Sugar-related health concerns A number of studies suggest that there is a significant correlation between increased consumption of sweetened beverages and weight gain leading to obesity. There has also been an association between consumption of",
"water or overly dilute drinks with too little salt may develop hyponatraemia (serum sodium less than 130 mmol/liter). This is especially common in children with shigellosis and in severely malnourished children with edema. ORS is safe and effective for nearly all children with hyponatraemia, an exception being children with edema for whom ORS provides too much sodium.",
"beverages and its health effects. Internists have further discussed adding extreme sugar sweetened beverages consumption to the list of usual questions about alcohol, tobacco, and illicit drugs that lead to hypokalemia. Although low potassium levels are tolerated in healthy adults, as cola consumption increases things like obesity, hypertension, and diabetes can be developed from hypokalemia. Pregnancy Dietary improvements in expecting mothers are important for the future health of the mother and child. Sugar-sweetened beverages among other beverages like coffee and alcohol are recommended to be reduced in intake. A Norwegian study, showed that pregnant woman minimized their intake of sugar-sweetened",
"reducing fluid consumption to avoid fluid retention before, during, and after exercise.\nHowever, since this can risk dehydration, an alternative approach is possible of consuming a substantial amount of salt prior to exercise. It is still important not to overconsume water to the extent of requiring urination, because urination would cause the extra salt to be excreted. The Role of Thirst In a published statement of the Third International Exercise-Associated Hyponatremia Consensus Development Conference, researchers concluded that drinking in accordance with the sensation of thirst is sufficient for preventing both dehydration and hyponatremia. This advice is contradicted by the American College",
"the lowest pH levels. The low acidity found in fruit juices cause higher risk of cavities with enamel exposure.\nFrequency of sugar sweetened beverages results in dental caries, which are caused by Streptococcus bacteria. Dental caries is an infectious oral disease and is the breakdown of the teeth due to the bacteria in the mouth. It occurs when bacteria within the plaque metabolize the sugar, releasing various acids as waste compounds. As the acids are released, they form holes in the teeth which dissolve the enamel. The sugars, therefore provide a passageway for the activities of the oral bacteria, lowering salivary"
] |
Why do I feel tired after a sitting down for a long time? Eg: a long car ride | [
"If you watch people in other cars, their heads are far from stationary. The brain has to compensate for the head not being stationary and this is very tiring. \n\nI can watch television for a lot longer that I can drive.",
"When sitting, your body stops production of an enzyme known as lipase. Lipase breaks down fat for energy. You feel tired because your body has stopped breaking down fat for energy.",
"When you are stationary for awhile, your heart rate slows, and along with what /u/the_schizoid_man said, other process slow down. When you are driving, your initial focus is on driving, but then eventually you let your mind wander. Mind wandering usually leads to tiredness because most of your focus is on what's going on in your head, and not what your body does."
] | [
"\"I was losing most of the function of my right side. And I decided I needed to go back and do what I loved before I couldn't do it anymore.\" At first she could barely stay on a horse without getting tired, but gradually the muscle control required for riding proved directly beneficial, and psychologically, \"Riding exhilarated me; it gave me a joy and a purpose. When I was so fatigued that I couldn't move, the excitement of going to the barn and getting my foot in the stirrup would make me crawl out of bed.\" As a",
"car and driving it on the limit and so on. Therefore I didn't have a single run or a single lap that I felt comfortable or reasonably confident. I am uncomfortable in the car. It all feels wrong. We changed the seat and the wheel, but even so I was already asking for more room. Going back to when we raced at Estoril last September, it feels much more difficult. Some of that is down to the lack of electronic change. Also, the car has its own characteristics which I'm not fully confident in yet. It makes you a lot",
"the US, aimed at restricting the exhaustion of cyclists taking part in six-day races. \nThe Brooklyn Daily Eagle said:\nThe wear and tear upon their nerves and their muscles, and the loss of sleep make them [peevish and fretful]. If their desires are not met with on the moment, they break forth with a stream of abuse. Nothing pleases them. These outbreaks do not trouble the trainers with experience, for they understand the condition the men are in.\nThe condition included delusions and hallucinations. Riders wobbled and frequently fell. But the riders were often well paid, especially since more people came to",
"seats.\nSome riders complain of excessive road noise vibrating through the hardshell seat. Also, the hardshell seat is \"closed\", providing no ventilation, which may cause excessive sweat to build up on the cyclist's back on hot days. Combination A combination seat has a padded hard seat base with a mesh back.",
"normally take, while others may have other reasons to be nervous, such as when the driver has a poor driving record. However, the practice is dangerous and instead more likely to cause crashes, according to the Daily Mail, citing a 'Driver Distraction' study by Esure. A survey of 2,000 British drivers in early 2018 found that 70% motorists found backseat driving an annoying habit and that life partners were those most likely to interfere. Although only 21% of motorists admitted to backseat driving, half said they have been in arguments due to interfering comments, and five percent admitted to accidentally",
"down in front of the rear seats and the front passenger seat either turning around to face those in the rear or folding down to make a table. In Wellness mode, designed for people who want to do exercises on longer journeys, the ambient lighting turns amber and two platforms each on the top and the bottom of the seats come out allowing isometric upper body and lower body exercise to take place. In Dream mode, the ambient lighting turns blue, pictures of stars and galaxies are broadcast across the roof, the driver's side passenger's seat gets footrests and the",
"altitude. I wanted to be very strong in this period and that worked out great. It was very tough today, especially with the wind, but then again it's the same circumstances for everyone. I was able to get into a rhythm quickly and I could keep up the pace. This is what I can do, but it didn't feel particularly great on this course. It's hard to concentrate when it's only one straight road ahead. There's not much to do while riding. You just have to push and push.\"",
"ever fully awake; I was always in a bit of a daze and that is because the way the shifts work doesn't allow the drivers to get a regular sleep pattern.\" Following this, multiple sources reported on a video apparently showing a different driver struggling to stay awake at the controls. The driver concerned was suspended pending an investigation into the matter. Victoria Derbyshire programme In April 2017, the BBC Two programme Victoria Derbyshire reported that its own investigation into drivers falling asleep at the controls of trams on the Tramlink network revealed four such cases. Six drivers claimed that",
"cool to be in the driver’s seat right now. Having those moments, I thought it was neat.\"\nFollowing a fifth-place finish in his final road course race of his career, Tony Stewart said he was \"just happy I’m not one of the guys who got tore up out there. The crazy part is what happens at the road courses. Everyone just seems to be putting themselves in bad positions they can’t get out of, and that’s how it ends up the way it does. There were guys who had Top 5 going into the last lap who couldn’t finish so we’ll",
"with sleep. Mike Henry, Anderson's coach, who walked with her for much of the event, was not in such good health with blisters covering his feet and suffering from exhaustion and dizziness. He had to retire, being replaced by one of the race judges, Charles Hazelton. Anderson ate at almost every rest time, unless she was sleeping, and her diet included beef, oysters, corned beef, potatoes, cakes and grapes; she drank beef tea, port wine and occasionally champagne. Critics of pedestrianism Local magistrates in Boston, UK, objected to walking on Sundays believing that it corrupted morals. However, Anderson found support",
"the car will have less toe change, this can make the car exhibit less roll understeer and therefore feel more \"twitchy\" during a turn. Other vehicles after lowering will exhibit an increase in toe change compared to stock, this results in the car feeling very \"twitchy\" on straight, bumpy roads, and at the same time feeling unwilling to turn requiring more driver input than normal due to an increase in roll understeer.\nWhen a vehicle is heavily loaded, it lowers the ride height. Typically cars are loaded by having heavy loads in the trunk, many passengers or towing a trailer, thus",
"Even when riders do sit down, Homer always makes the annoying noise, regardless. Jeremy Freedman then appears on a TV screen in the ride cabin and assures the riders that their comfort and safety are in the hands of highly qualified teens, like himself and explains the operators' requirements. He then tells the riders to enjoy themselves, but keep the screaming down so he can study for a math test, because if he does not get a C or higher, he will get kicked out of the audio-visual club. He then begins reading his textbook upside down (unknown to him)",
"leading up to the loop. As the car enters the loop, the track guides the car up, moving the passenger up as well. This change in direction creates a feeling of extra gravity as the passenger is pushed down into the seat.\nAt the top of the loop, the force of the car's acceleration pushes the passenger off the seat toward the center of the loop, while inertia pushes the passenger back into the seat. Gravity and acceleration forces push the passenger in opposite directions with nearly equal force, creating a sensation of weightlessness.\nAt the bottom of the loop, gravity and",
"feedback on back tire grip. However, there is also an increased risk of loss of control in such conditions. This is especially so when taking into account the large number of riders who ride brakeless. These riders must brake entirely through the drivetrain. Ideally this is done by resisting the forward motion of the pedals, shedding speed while the bike is still moving. Alternatively, though far less efficiently, one can brake by stopping the motion of the pedals in mid-rotation, causing the rear wheel to lock in place, allowing the bicycle to skid and slow down from kinetic friction (see",
"seat as the vehicle accelerates forward or pulled forward as it slows down; and feel himself pressed down into his seat as the vehicle accelerates up a hill or rise up out of their seat as the car passes over the crest of a hill and begins to descend. Based on this information alone, he knows how the vehicle is accelerating relative to itself, that is, whether it is accelerating forward, backward, left, right, up (toward the car's ceiling), or down (toward the car's floor) measured relative to the car, but not the direction relative to the Earth, since he",
"\"but obviously not what we were looking for. I knew when they called it that I sped. It wasn’t like I was rolling too fast, it was exiting my pit box. I got jammed up by whoever was in front of me, there were cars on the outside and I was trying to gas to get clear of them and then back off. With these shorter sections I didn’t have time to get it back.”\nFinishing fourth, Kenseth said he \"had a good day, not a great day. The guy doing a great day is the guy doing a burnout. We",
"from the lead during the second half when he locked up at the chicane, which forced him to limp home to the pits, and ultimately retire due to the damage sustained to the car.",
"job, \"I don't even like being this tall\" (\"Swan Song\", 1974). Columbo claims he is always nervous when he is in the passenger seat rather than driving, and in fact is extremely nervous during certain investigations.\nIn \"A Stitch in Crime\", Columbo grumbles throughout the episode about being sleep-deprived and working too hard. (Columbo suffers from severe allergies \"every spring\", although when we first see him suffering symptoms in this episode, he does not know what they are. He says he will not take allergy medicine because of the side effects.) This is also the one and only time—at least in",
"tricycle was described as an \"exceedingly light, pretty wheel and is a worthy member of the Yellow Fellow family.\" Publications The company published a magazine called Cycle Topics in which they warned riders on the practices of the road. \"Don't scorch--this means you\" was one suggestion, as well as \"keep to the right of the road\" and \"turn to one side for a heavy load even if you are on the right side.\"\nSpeeding was quite a problem in the 1890s and the young riders would make it a practice to \"scorch\" through villages and were warned by Stearns to \"ride",
"gave my measurements, and handed over the 600 lire. I would have to buy the fittings and tyres from my errand-boy salary. Oh how my legs used to ache at night through climbing all those stairs during the day! But I'm glad I did, because it surely made my legs so strong\".\n\"Come back within a week; your frame will be ready\" said the owner of the cycle shop\". \"But it wasn't ready, and not the next week, and not the next. For eight weeks I threw precious money away taking the train to Genoa and still no made-to-measure bike for",
"worth is to galloping on a flat surface.\nTo condition the horse's bones, riders may walk on roads or other hard surfaces. However, this is generally only used when the ground conditions are quite soft. Although popular in Britain, most American riders do not do road work. If used too much, it can encourage arthritis.\nSome riders also have access to equine treadmills or swimming pools. Treadmills can sometimes be adjusted to have a slight incline, allowing the horse to work without the added weight of the rider. Swimming is an excellent form of conditioning, and allows the rider to increase the",
"be uncomfortable for passengers because of its high spring rate relative to the weight of the vehicle. A race car would also be described as having heavy springs and would also be uncomfortably bumpy. However, even though we say they both have heavy springs, the actual spring rates for a 2,000 lb (910 kg) race car and a 10,000 lb (4,500 kg) truck are very different. A luxury car, taxi, or passenger bus would be described as having soft springs. Vehicles with worn out or damaged springs ride lower to the ground which reduces the overall amount of compression available to the suspension and",
"as when he drove his psychiatrist's wife to suicide after enduring a long tirade about his weight. He views himself as more mature than his fellow friends and classmates, and often grows impatient with their company; despite claiming to be more mature, he will often break down crying childishly and pathetically whenever he feels defeated. This often leads to loud arguments, which in earlier seasons typically end with Cartman peevishly saying \"Screw you guys... I'm going home!\" and then leaving. In an action King's College philosophy professor David Kyle Johnson describes as \"directed either toward accomplishing his own happiness or",
"signs of dehydration and sometimes suffering beating from the riders.",
"a hunched, nervous depressed wreck, with Shirley nagging him. Shirley: \"How long you gonna keep on being like this? Makes me sick to look at ya. Why don't you go out and get yourself a job?\". John Allen: \"I can't get one. I tried\". Shirley: \"you can go back to riveting\". John: \"I can't go back to that\" \"not ever since Bud .. I can't climb .. when I get up there, my head swims, I get sick, afraid, I gotta hold on. One minute he was standing there talking to me and the next he was flying through space,",
"in such good health, sometimes he could barely walk because he was so fucked up. When he came back from Japan, he left me a couple of messages on my answering machine. He sounded completely out of his mind, though not like he was drunk. It was strange, like he'd gone crazy; finally I got hold of someone, and she told me Jeffrey had come back, that he'd been drinking while he was gone, his liver had poisoned his system, and he was experiencing dementia. The hospital turned him away saying, there's nothing we can do for him, his liver's",
"days and nights behind the wheel, came triumphantly to Paris, reaching an average speed of 24.5 km/h. He said after the race: \"Some 50 km before Paris I had a rather luxurious snack in a restaurant which helped me. But I feel a little tired.\" Legacy The race proved that both the riders and the cars were capable of driving such distances and it generated public enthusiasm which indicated that such events were commercially viable.",
"people to get their pants on\"), as a result of him walking in on his father with another woman when he was thirteen. Upon entering a person's home, he must select the proper seat before sitting down. When it is suggested by Penny that he \"just sit anywhere\", his response is \"Oh, no, if only it were that simple!\" This extends to his inability to accept change. His rigidity in maintaining homeostasis often causes him frustration. Because of his rigidity and stubbornness, only his mother and Bernadette, both possessing strong maternal personalities, have shown the ability to order him to",
"end like this today - my job as a guest driver was to bring the car back in one piece and that didn't happen\" Hinchcliffe explained he felt dizzy and the contact was one of the most hefty of his career, \"I had a pretty good launch and then the thing just bogged. I saw cars going by and I was just starting to get the thing going again. Then I had this massive shunt in the rear. It is a tough break and it was a hard hit. I have backed an IndyCar into the wall on an oval",
"– your adrenaline is pumping so hard it’s over before you notice and you don’t really remember much. We usually get off stage and collapse and/or vomit. Then we pack up, sleep, wake up, load the car and get out of the hotel before they charge us for the room, and rush to make it in time for sound check at the next gig. During the off-days, you’re pretty much useless to anyone. It’s an insane lifestyle and it sounds like I’m complaining but it’s what I always wanted to do, and once it’s all over I always can’t wait"
] |
Why do scissors not work correctly with your left hand. It's almost the exact same movement. | [
"When you use scissors with your right hand, you naturally press the blades together. When you use them with your left hand, the blades don't have that same contact. It's possible to do it intentionally, but it feels awkward and hurts after a while.\n\nSource: lefty."
] | [
"orientation. Human hands are also asymmetric, and when closing, the thumb and fingers do not close vertically, but have a lateral component to the motion. Specifically, the thumb pushes out from the palm and the fingers pull inwards. For right-handed scissors held in the right hand, the thumb blade is closer to the user's body, so that the natural tendency of the right hand is to force the cutting blades together. Conversely, if right-handed scissors are held in the left hand, the natural tendency of the left hand would be to force the cutting blades laterally apart. Furthermore,",
"with right-handed scissors held by the right hand, the shearing edge is visible, but when they are used with the left hand, the cutting edge of the scissors is behind the top blade, and one cannot see what is being cut.\nSome scissors are marketed as ambidextrous. These have symmetric handles so there is no distinction between the thumb and finger handles, and have very strong pivots so that the blades simply rotate and do not have any lateral give. However, most \"ambidextrous\" scissors are in fact still right-handed in that the upper blade is on the right, and hence is",
"on the outside when held in the right hand. Even if they cut successfully, the blade orientation will block the view of the cutting line for a left-handed person. True ambidextrous scissors are possible if the blades are double-edged and one handle is swung all the way around (to almost 360 degrees) so that the back of the blades become the new cutting edges. U.S. Patent 3,978,584 has been awarded for true ambidextrous scissors. Specialized scissors Among specialized scissors and shears used for different purposes are: Culture Due to their ubiquity across cultures and classes, scissors have numerous representations across",
"some place their index finger, and the little finger rests on the finger tang.\nFor people who do not have the use of their hands, there are specially designed foot-operated scissors. Some quadriplegics can use a motorized mouth-operated style of scissor. Right-handed and left-handed scissors Most scissors are best-suited for use with the right hand, but left-handed scissors are designed for use with the left hand. Because scissors have overlapping blades, they are not symmetric. This asymmetry is true regardless of the orientation and shape of the handles: the blade that is on top always forms the same diagonal regardless of",
"the front.\nThere is no need to think of delivering the strike with a 'blade edge'. In fact, it's better to deliver the strike with your palm facing down, so that the thumb side of the stick strikes the target (similar to striking with the back edge of your blade). That helps enormously in keeping the arm straight throughout. Latéral croisé Assuming the cane is in your right hand:\nKeeping the point of the cane to the front, turn you upper body to the left slightly as you draw back your right hand (palm facing up i.e. towards you) and arm across",
"two scissor blades coming together. Some authors differentiate the \"scissors kick\" as similar to a bicycle kick, but done sideways or at an angle; other authors consider them to be the same move.\nIn languages other than English, its name also reflects the action it resembles. Sports journalist Alejandro Cisternas, from Chilean newspaper El Mercurio, compiled a list of these names. In most cases, they either refer to the kick's scissor-like motion, such as the French ciseaux retourné (returned scissor) and the Greek psalidaki, or to its bicycle-like action, such as the Portuguese pontapé de bicicleta. In other languages, the nature",
"a right-hand thread; a common mnemonic device for remembering this when working with screws or bolts is \"righty-tighty, lefty-loosey\". If the fingers of the right hand are curled around a right-hand thread, it will move in the direction of the thumb when turned in the same direction as the fingers are curled. Screws with left-hand threads are used in exceptional cases, where loads would tend to loosen a right handed fastener, or when non-interchangeability with right-hand fasteners is required. For example, when the screw will be subject to counterclockwise torque (which would work to undo a right-hand thread), a",
"can be interchanged between left and right in some other way, such as an \"ambidextrous headset,\" which can be worn on either the left or right ear. As an opposite example, some scissors are made specifically for use in one hand, and will not cut properly if used in the other hand. Left-handed as well as ambidextrous scissors are nowadays available. Knitting In knitting, the use of two needles, the knitter must learn to use both needles seamlessly. Several factors also lead to ambidexterity, the first one being if a person either favors their left hand over their right or",
"blade carries the additional danger that, \"as the faster you go, the more likely the blade will fold back in on itself trapping the finger of your stabbing hand.\" It may be played much more safely by using another object, such as the eraser side of a pencil or a marker with its cap on. In European culture it is traditionally considered a boys' game. However, its focus on motor coordination and dexterity is comparable to clapping games.\nAmong our rowdy amusements [exiled in Siberia] was a popular knife game. You place the palm of your hand flat on a table",
"straight and not twisted along its length. Retightening the handle tensions the blade and locks it at the desired angle relative to the frame. The short steady bar nearest the handle is held securely between finger and thumb while the handle is tightened to ensure the blade remains at the desired angle. Unlike the fretsaw the coping saw blade has holding pins which lock securely into the angled slots of the rotatable blade holders.\nThe direction of the cut is quite easy to change because of the thinness of the blade. Gentle curves are achieved by slowly turning the whole frame",
"which apparently only the uppermost parts of the fingers move and the hand is largely still. There is a St. Petersburg school (more than one) in Russia in which the player moves the thumbs in a circular fashion rather than in and out toward the hand.\nThe differences between the French schools lie in the posture of the arms, shape of the hand, and musical aesthetics. The traditional French schooling lets the player lightly rest the right arm against the harp, using the wrist to sometimes bring the hand only away from the string. The left arm moves more freely. Finger",
"thumb and the outermost fingers, so the thumb moves up if the outer fingers move down. Handles for wide-range motion The handles of bicycle grips, club-style weapons, shovels and spades, axes, hammers, mallets and hatchets, baseball bats, rackets, golf clubs, and croquet mallets involve a greater range of ergonomic issues.",
"consists of two pivoted blades. In lower-quality scissors, the cutting edges are not particularly sharp; it is primarily the shearing action between the two blades that cuts the material. In high-quality scissors, the blades can be both extremely sharp, and tension sprung – to increase the cutting and shearing tension only at the exact point where the blades meet. The hand movement (pushing with the thumb, pulling with the fingers) can add to this tension. An ideal example is in high-quality tailor's scissors or shears, which need to be able to perfectly cut (and not simply tear apart) delicate cloths",
"left is used for fingering. When the player pulls the bow across the strings (such that the frog moves away from the instrument), it is called a down-bow; pushing the bow so the frog moves toward the instrument is an up-bow (the directions \"down\" and \"up\" are literally descriptive for violins and violas and are employed in analogous fashion for the cello and double bass). Two consecutive notes played in the same bow direction are referred to as a hooked bow; a down-bow following a whole down-bow is called a retake.\nGenerally, the player uses down-bow for strong musical beats and",
"of the pattern. The hand moves toward the middle to throw, and back towards the outside to catch the next object. Because the hands must move up and down when throwing and catching, putting this movement together causes the left hand to move in a counterclockwise motion, and the right hand to move in a clockwise motion.\nThis pattern is achievable with a wide array of props besides regular balls. Commonly used props are clubs, rings and scarves. Because of their slow falling speed due to high air resistance, scarves are often used as a first prop for beginning jugglers.\nThe cascade",
"by both hands (known as a \"Two-Hand Touch\") at the same time due to FINA regulations.\nThe turn is initiated by touching the wall during the gliding or during the recovery phase of the arms, depending on how the wall can be touched faster. After touching the wall, the legs are pulled underneath the body. The body turns sideways while one hand is moved forward (i.e. towards the head) along the side of the body. When the body is almost completely turned, the other hand will be swung straight up through the air such that both hands meet at the front",
"one wants the screw, nut, bolt, or cap ultimately to move, and the curl of the fingers, from the palm to the tips, will indicate in which way one needs to turn the screw, nut, bolt or cap to achieve the desired result. Almost all threaded objects obey this rule except for a few left-handed exceptions described below.\nThe reason for the clockwise standard for most screws and bolts is that supination of the arm, which is used by a right-handed person to tighten a screw clockwise, is generally stronger than pronation used to loosen. \nSometimes the opposite (left-handed, counterclockwise, reverse)",
"such as chiffon and silk.\nChildren's scissors are usually not particularly sharp, and the tips of the blades are often blunted or 'rounded' for safety.\nMechanically, scissors are a first-class double-lever with the pivot acting as the fulcrum. For cutting thick or heavy material, the mechanical advantage of a lever can be exploited by placing the material to be cut as close to the fulcrum as possible. For example, if the applied force (at the handles) is twice as far away from the fulcrum as the cutting location (i.e., the point of contact between the blades), the force at the cutting location",
"Rolling scissors The rolling scissors, also called vertical scissors or simply \"rollers,\" is usually an undesirable maneuver to be caught in, both for the attacker and the defender. The advantage usually goes to the aircraft with the higher turn rate, especially when pulling the nose through the top and bottom of the turns. Correct placement of the lift vector during the maneuver is crucial to keep from moving ahead, relative to the opponent. There are many optical illusions that affect the pilot's ability to determine the relative position of the opponent, and mistakes can easily be made. It is extremely",
"be a few inches past the elbow when the knife is held in a reverse grip. Wing Chun schools that use techniques which twirl the knives inside the arm need a reverse grip blade length based on the distance to the interior of the bicep. Other Wing Chun schools measure to the outside of the bicep.",
"thrown almost entirely with the fingers as a \"no thumb\" bowler would throw it, with the thumb only providing some control during the backswing. Smallwood also keeps two hands on the bowling ball until roughly midway through his approach. Two-handed approach A two-handed approach is a bowling technique whereupon the throwing hand is in the bowling ball and the opposite hand is also placed on the ball during the shot. This is an evolution of the one-handed no-thumb technique, where a bowler would generate similar revolutions but could not be as effective because their opposite hand does not support",
"like two chevrons (^^) joined together means that the fingers flex repeatedly and in sync. A double-line zigzag means that the fingers wriggle or flutter out of sync. Hand movement Hundreds of arrows of various sorts are used to indicate movement of the hands through space. Movement notation gets quite complex, and because it is more exact than it needs to be for any one sign language, different people may choose to write the same sign in different ways.\nFor movement with the left hand, the Δ-shaped arrowhead is hollow (white); for movement with the right hand, it is solid (black).",
"Scissors mechanism A scissors mechanism uses linked, folding supports in a criss-cross 'X' pattern. Workings Extension is achieved by applying pressure to the outside of a set of supports located at one end of the mechanism, elongating the crossing pattern.\nThis can be achieved through hydraulic, pneumatic, mechanical or simply muscular means.\nIt may require no power to return to its original position, but simply a release of the original pressure. Also used in kinematics of mechanisms Uses This mechanism is used in devices such as lift tables and scissor lifts. Modern low-profile computer keyboards make an extensive use of it as",
"against a higher energy opponent. However, in many circumstances, such as when an attacker performs a high Yo-Yo too steeply, an unloaded extension is a viable option for the defender. Scissors The scissors are a series of turn reversals and flight path overshoots intended to slow the relative forward motion (downrange travel) of the aircraft in an attempt to either force a dangerous overshoot, on the part of the defender, or prevent a dangerous overshoot on the attacker's part. The defender's goal is to stay out of phase with the attacker, trying to prevent a guns solution, while the attacker",
"When both hands move as one, an open (Λ-shaped) arrowhead is used.\nAs with orientation, movement arrows distinguish two planes: Movement in the vertical plane (up & down) is represented by arrows with double stems, as at the bottom of the diagram at left, while single-stemmed arrows represent movement parallel to the floor (to & fro). In addition, movement in a diagonal plane uses modified double-stemmed arrows: A cross bar on the stem indicates that the motion is away as well up or down, and a solid dot indicates approaching motion. To & fro movement that also goes over or under",
"the arm straight and generate a back-swing. This variation leads to far greater consistency and straightens the ball out when needed. All styles of no-thumbing usually require bowlers to use bowling balls that are generally one to three pounds lighter than their thumb-in counterparts.\nThis technique is often used by casual or league-level bowlers who have not learned how to hook the ball using one of the more standard, thumb-in grips. It is also prevalent among left-handed bowlers using house balls. A left-handed bowler would have to reverse the ball in order to properly use the holes typically drilled for",
"thumb is unable to move with the fingers as the body of the instrument gets in the way. Instead, the thumb works around the neck of the instrument to sit at the point at which the neck meets the right bout of the body, and remains there while the fingers move between the high positions.\nA note played outside of the normal compass of a position, without any shift, is referred to as an extension. For instance, in third position on the A string, the hand naturally sits with the first finger on D♮ and the fourth on either G♮ or",
"away from one's body in the direction of where the player wants the ball to go. It is generally considered more difficult to master than the forehand. It can be executed with either one or both hands. For most of the 20th Century it was performed with one hand, using either an eastern or a continental grip. The first notable players to use two hands were the 1930s Australians Vivian McGrath and John Bromwich. The Two handed backhand was used more often since it allowed easy access to power and control. Players such as Venus Williams, Serena",
"part of the attachment mechanism that pulls the knife against the stationary edge as the knife is drawn down to cut the paper. The other end of the knife unit is a handle. The stationary right edge of the base is also steel, with an exposed, finely-ground edge. When the knife is pulled down to cut paper, the action resembles that of a pair of scissors, only instead of two knives moving against each other, one is stationary. The combination of a blade mounted to a steady base produces clean and straight cuts, the likes of which would have otherwise",
"thumb wraps around in the other direction, which also differs from the match grip technique. The right hand is held straight out over the drum head, higher and farther out than its usual playing position.\nThe right hand turns quickly in a repetitive, counter-clockwise motion, where the butt end hits first and the tip hits immediately after the butt on its way down. The left-handed doubles are placed in between the right hand notes. The left hand technique does not need to change (traditional or match grip may be used for the left hand), although it is often useful to play"
] |
How does air pressure actually work? | [
"Pressure of a fluid or gas against a surface is caused by the molecules in the liquid or gas bouncing off the surface. Because the molecules generally reverse direction due to the collision with the surface, the collision exerts a force on the surface. The more molecules bouncing off the surface, the greater the force.\n\nIt turns out you can describe the molecules bouncing off the surface in a physical model and apply some statistics to it (statistics because there is a huge amount of molecules involved).\n\nIt turns out that you can calculate the average force on an area of the surface (this quantity is called *pressure*) and it depends amongst other things on the number of molecules in a given volume. More molecules in the same volume leads to a higher pressure exerted by the gas in that volume.\n\nMind you, pressure has nothing to do with weight. However, the amount of air molecules in a certain volume varies with the height (or more precisely, distance to the Earth's center), and this *does* have to do with weight and gravity.\n\nAir molecules bump into each other and as they do, they exchange momentum. On average all molecules push back against each other with the same force, so yes, that equalizes and balances out and you would not see a change in the number of molecules per unit of volume. \n\nBut when you take the weight of molecules and the gravity of the Earth into this model, then all molecules have an extra downwards force acting upon them: left on their own they would fall towards Earth like any other object in a gravity field.\n\nThis tendency of molecules to fall downwards makes it so that the molecules from above push a little bit harder on the molecules below them than the other way around. In order to find a balance in the pushing up and the pushing down force you will find slightly more molecules in a unit of volume below than above an imaginary horizontal surface.\n\nAgain, you can model this behaviour and you can derive a nice formula for calculating air pressure at different heights above sea level.\n\ntl;dr: air pressure is determined by (amongst other variables) the number of molecules per unit of volume. This number of molecules per unit of volume increases going from high up in the atmosphere towards sea level because the molecules up higher \"weigh down\" on the molecules down below."
] | [
"Airflow Airflow, or air flow is the movement of air from one area to another. The primary cause of airflow is the existence of pressure gradients. Air behaves in a fluid manner, meaning particles naturally flow from areas of higher pressure to those where the pressure is lower. Atmospheric air pressure is directly related to altitude, temperature, and composition.\nIn engineering, airflow is a measurement of the amount of air per unit of time that flows through a particular device.\nThe flow of air can be induced through mechanical means (such as by operating an electric or manual fan) or can take",
"incoming air in from the pump as well as a manually controlled valve operated by the user, commonly activated by pulling on a trigger. As more air is pumped in, the air in the reservoir is compressed, increasing in pressure; the water is under pressure by the now compressed air. Upon opening the nozzle valve, the water is pushed out through the nozzle as the pressurized air attempts to re-equilibrate with atmospheric pressure. This system allows pumping energy to be stored and used as needed. As well, unlike the methods noted above, this air pressure system allows production of a",
"it is released and the tank depressurizes. When tank pressure reaches its lower limit, the air compressor turns on again and re-pressurizes the tank.\nAn air compressor must be differentiated from a pump because it works for any gas/air, while pumps work on a liquid. Displacement type There are numerous methods of air compression, divided into either positive-displacement or roto-dynamic types. Dynamic displacement Dynamic displacement air compressors include centrifugal compressors and axial compressors. In these types, a rotating component imparts its kinetic energy to the air which is eventually converted into pressure energy. These use centrifugal force generated by a spinning",
"Air compressor An air compressor is a device that converts power (using an electric motor, diesel or gasoline engine, etc.) into potential energy stored in pressurized air (i.e., compressed air). By one of several methods, an air compressor forces more and more air into a storage tank, increasing the pressure. When tank pressure reaches its engineered upper limit, the air compressor shuts off. The compressed air, then, is held in the tank until called into use. The energy contained in the compressed air can be used for a variety of applications, utilizing the kinetic energy of the air as",
"Operation When the engine started, air began flowing through the boost venturi, causing the pressure (referred to as a partial vacuum as it is lower than atmospheric pressure, but not a full vacuum) in the venturi to drop according to Bernoulli's principle. This causes the air pressure in chamber A to drop in proportion with the partial vacuum in the boost venturi.\nAt the same time, air entering the carburetor compresses the air in the impact tubes, generating a positive pressure in chamber B that is proportional to the density and speed of the air entering the engine. The difference in",
"be the mass of air that is drawn from the atmosphere into the cylinder, compressed by the piston, heated by the spark ignition of the added fuel, allowed to expand as it pushes on the piston, and finally exhausted back into the atmosphere. The mass of air is followed as its volume, pressure and temperature change during the various thermodynamic steps. As the piston is capable of moving along the cylinder, the volume of the air changes with its position in the cylinder. The compression and expansion processes induced on the gas by the movement of the piston are idealised",
"the lungs to make it available to the gas exchange process. In spontaneous breathing, a negative pressure is created in the pleural cavity by the muscles of respiration, and the resulting gradient between the atmospheric pressure and the pressure inside the thorax generates a flow of air.\nIn the iron lung by means of a pump, the air is withdrawn mechanically to produce a vacuum inside the tank, thus creating negative pressure. This negative pressure leads to expansion of the chest, which causes a decrease in intrapulmonary pressure, and increases flow of ambient air into the lungs. As the vacuum is",
"Pressure gradient In atmospheric science, the pressure gradient (typically of air but more generally of any fluid) is a physical quantity that describes in which direction and at what rate the pressure increases the most rapidly around a particular location. The pressure gradient is a dimensional quantity expressed in units of pascals per metre (Pa/m). Mathematically, it is obtained by applying the del operator to a pressure function of position. The negative gradient of pressure is known as the force density.\nIn petroleum geology and the petrochemical sciences pertaining to oil wells, and more specifically within hydrostatics, pressure gradients refer to",
"a downward force on the air as it flows past. According to Newton's third law, the air must then exert an equal and opposite (upward) force on the airfoil, which is the lift.\nThe net force exerted by the air occurs as a pressure difference over the airfoil's surfaces. Pressure in a fluid is always positive in an absolute sense, so that pressure must always be thought of as pushing, and never as pulling. The pressure thus pushes inward on the airfoil everywhere on both the upper and lower surfaces. The flowing air reacts to the presence of the wing by",
"measure, air pressure seems to be easier described as density. The similarity comes from the idea that when there are more molecules in the same space, more of them will be heading towards a collision course with the wall.\nThe first concept of air pressure within a balloon that is necessary to know is that air pressures \"try\" to even out. With all the bouncing against the balloon wall (both interior and exterior) there will be a certain amount of expansion/contraction. As air pressure itself is a description of the total forces against an object, each of these forces, on the",
"air pressure; this is achieved by learning to use the cheeks and the throat as a system of shock absorbents. A very simple method by which this is practiced is using a thin straw to blow on to the surface of a cup of water from just above water level, and watching the depression that the air stream creates on the water's surface. The aim is to blow continually and switch between cheek air and lung air without any change in the depth of this depression or groove or hole on the water's surface.\nThe traditional method of learning in zurna",
"ambient air causes a temperature rise of the gas, proportional to the pressure increase. Ambient air is typically compressed in stages, and the gas temperature rises during each stage. Intercoolers and water cooling heat exchangers can remove this heat between stages.\nCharging an empty dive cylinder also causes a temperature rise as the gas inside the cylinder is compressed by the inflow of higher pressure gas, though this temperature rise may initially be tempered because compressed gas from a storage bank at room temperature decreases in temperature when it decreases in pressure, so at first the empty cylinder is charged with",
"is a more powerful air pressure system that was also first introduced by Super Soaker. It is designed so that water is pumped from the reservoir into an empty plastic container. As the water is pumped in, the air sitting inside becomes compressed. When the trigger is pulled, the valve opens and the compressed air forces the water out. Although Water Warriors did not use this design for the first several years of production, they did use a variation they referred to as \"air-piston\" (below). The brand first used separate air pressure in 2009. After being sued by Hasbro,",
"air pressure at sea level, at altitude, or in any artificial atmosphere (e.g. a diving chamber, or decompression chamber) in which the individual is breathing freely. With expansion of the lungs (through lowering of the diaphragm and expansion of the thoracic cage) the alveolar air now occupies a larger volume, and its pressure falls proportionally, causing air to flow in from the surroundings, through the airways, till the pressure in the alveoli is once again at the ambient air pressure. The reverse obviously happens during exhalation. This process (of inhalation and exhalation) is exactly the same at sea level, as",
"over ambient pressure, expands through the valve orifice as its pressure is reduced to ambient and supplies the diver with more gas to breathe. When the diver stops inhaling the chamber fills until the external pressure is balanced, the diaphragm returns to its rest position and the lever releases the valve to be closed by the valve spring and gas flow stops.\nWhen the diver exhales, one-way valves (made from a flexible air-tight material) flex outwards under the pressure of the exhalation, letting gas escape from the chamber. They close, making a seal, when the exhalation stops and the pressure inside",
"in communication with atmospheric pressure. The difference in pressure between the two sides of the piston creates a force tending to lift the piston. Counteracting this force is the weight of the piston and the force of a compression spring which is compressed by the piston rising; because the spring is operating over a very small part of its possible range of extension, the spring force approximates to a constant force. Under steady state conditions the upwards and downwards forces on the piston are equal and opposite, and the piston does not move.\nIf the airflow into the engine is increased",
"Static pressure Static pressure in design and operation of aircraft An aircraft's altimeter is operated by the static pressure system. An aircraft's airspeed indicator is operated by the static pressure system and the pitot pressure system.\nThe static pressure system is open to the exterior of the aircraft to sense the pressure of the atmosphere at the altitude at which the aircraft is flying. This small opening is called the static port. In flight the air pressure is slightly different at different positions around the exterior of the aircraft. The aircraft designer must select the position of the static port carefully.",
"an external port allows air to be sucked in thus creating a constant air supply. \nThe air forms bubbles in the pipe.\nAs the bubbles go down the pipe they are pressurized proportionally to the hydraulic head, which is the height of the column of water in the pipe. \nThe compressed air rises to the top of the separation chamber(wind box).\nThe separation chamber has a compressed-air takeoff pipe, and the compressed air can be used as a power source.\nThe energy of the falling water creates negative pressure inside the pipe that is compensated by the air from the outside atmosphere",
"air compressor, a cylinder filled containing the sieve, a pressure equalizing reservoir and valves and tubes.\nDuring the first half of the first cycle the internal compressor forces this air through a system of chemical filters known as a molecular sieve. This filter is made up of silicate granules called zeolite which attract (via adsorption) nitrogen molecules onto their surfaces more strongly than they attract oxygen molecules – this takes the nitrogen out of the air and concentrates the oxygen. When the desired purity is reached and the first cylinder reaches roughly 20 psi the oxygen and small amounts of other",
"Atmosphere Pressure Atmospheric pressure at a particular location is the force per unit area perpendicular to a surface determined by the weight of the vertical column of atmosphere above that location. On Earth, units of air pressure are based on the internationally recognized standard atmosphere (atm), which is defined as 101.325 kPa (760 Torr or 14.696 psi). It is measured with a barometer.\nAtmospheric pressure decreases with increasing altitude due to the diminishing mass of gas above. The height at which the pressure from an atmosphere declines by a factor of e (an irrational number with a value of 2.71828...) is called",
"air pressure created by vehicle motion or the air ramming into the tube), which, under ideal conditions, is equal to stagnation pressure, also called total pressure. The pitot tube is most often located on the wing or front section of an aircraft, facing forward, where its opening is exposed to the relative wind. By situating the pitot tube in such a location, the ram air pressure is more accurately measured since it will be less distorted by the aircraft's structure. When airspeed increases, the ram air pressure is increased, which can be translated by the airspeed indicator.",
"pressure gradient. Flow around a low-pressure area If a low-pressure area forms in the atmosphere, air tends to flow in towards it, but is deflected perpendicular to its velocity by the Coriolis force. A system of equilibrium can then establish itself creating circular movement, or a cyclonic flow. Because the Rossby number is low, the force balance is largely between the pressure-gradient force acting towards the low-pressure area and the Coriolis force acting away from the center of the low pressure.\nInstead of flowing down the gradient, large scale motions in the atmosphere and ocean tend to occur perpendicular to the",
"space.\"\nIn air-breathing mode, air enters the engine through an inlet. A bypass system directs some of the air through a precooler into a compressor, which injects it into a combustion chamber where it is burnt with fuel, the exhaust products are accelerated through nozzles to provide thrust. The remainder of the intake air continues through the bypass system to a ring of flame holders which act as a ramjet for part of the air breathing flight regime. A helium loop is used to transfer the heat from the precooler to the fuel and drive the engine pumps and compressors. Inlet",
"pressure gradient (Boyle's Law). In expiration, the contraction of the transversus abdominis is the driving force by propelling the viscera into the lungs and expelling air under positive pressure. Conversely, the relaxing and flattening of the oblique abdominis muscle pulls the transversus back down which, once again, draws air back into the lungs. Important auxiliary muscles used for ventilatory processes are the pectoralis, which is used in conjunction with the transverse abdominis during inspiration, and the serratus, which moves with the abdominal oblique accompanying expiration.\nThe lungs of Testudines are multi-chambered and attached their entire length down the carapace. The number",
"air pressure is at the pressure of the free water surface, and varies accordingly with depth. The breathing gas supply for the open bell may be self-contained, or more usually, supplied from the surface via flexible hose, which may be combined with other hoses and cables as a bell umbilical. An open bell may also contain a breathing gas distribution panel with divers' umbilicals to supply divers with breathing gas during excursions from the bell, and an on-board emergency gas supply in high-pressure storage cylinders. This type of diving chamber can only be used underwater, as the internal gas pressure",
"together and breath pressure is applied to them, the cords remain closed until the pressure beneath them, the subglottic pressure, is sufficient to push them apart, allowing air to escape and reducing the pressure enough for the muscle tension recoil to pull the folds back together again. The pressure builds up once again until the cords are pushed apart, and the whole cycle keeps repeating itself. The rate at which the cords open and close, the number of cycles per second, determines the pitch of the phonation.\nThe aerodynamic theory is based on the Bernoulli energy law in fluids. The theory",
"Impact pressure In compressible fluid dynamics, impact pressure (dynamic pressure) is the difference between total pressure (also known as pitot pressure or stagnation pressure) and static pressure. In aerodynamics notation, this quantity is denoted as or . \nWhen input to an airspeed indicator, impact pressure is used to provide a calibrated airspeed reading. An air data computer with inputs of pitot and static pressures is able to provide a Mach number and, if static temperature is known, true airspeed.\nSome authors in the field of compressible flows use the term dynamic pressure or compressible dynamic pressure instead of impact",
"something is there for it to push against. In aerodynamic flow, the pressure difference pushes against the air's inertia, as the air is accelerated by the pressure difference. This is why the air's mass is part of the calculation, and why lift depends on air density.\nSustaining the pressure difference that exerts the lift force on the airfoil surfaces requires sustaining a pattern of non-uniform pressure in a wide area around the airfoil. This requires maintaining pressure differences in both the vertical and horizontal directions, and thus requires both downward turning of the flow and changes in flow speed according to",
"pressure means higher speed, and higher pressure means lower speed.\nThus changes in flow direction and speed are directly caused by the non-uniform pressure. But this cause-and-effect relationship is not just one-way; it works in both directions simultaneously. The air's motion is affected by the pressure differences, but the existence of the pressure differences depends on the air's motion. The relationship is thus a mutual, or reciprocal, interaction: Air flow changes speed or direction in response to pressure differences, and the pressure differences are sustained by the air's resistance to changing speed or direction. A pressure difference can exist only if",
"to aerate as well as mix the water. Water displacement from the expulsion of bubbles can cause a mixing action to occur, and the contact between the water and the bubble will result in an oxygen transfer. Jet aeration Subsurface aeration can be accomplished by the use of jet aerators, which aspirate air, by means of the Venturi principle, and inject the air into the liquid. Coarse bubble aeration Coarse bubble aeration is a type of subsurface aeration wherein air is pumped from an on-shore air compressor. through a hose to a unit placed at the bottom of the water"
] |
Why is the U.N. not the ones taking ISIS out instead of the U.S.? | [
"The UN does not have its own military. The UN passes a resolution, and other nations act to enforce that resolution. When you see the blue helmets, those are soldiers normally operating on behalf of a country, which has decided to participate in a UN operation.\n\nSecond, the UN does not like to make war. It likes to keep the peace. The US is staging an offensive, whereas the UN prefers to police.",
"They UN has to pass a resolution that allows it first. Then, they also have to find countries willing to let the UN use some of their troops. That can be very difficult sometimes."
] | [
"that the United States government has for ordering the airstrikes targeting ISIL members. As the Associated Press reported, \"A U.S.-led coalition has been launching airstrikes on Islamic State militants and facilities in Iraq and Syria for months, as part of an effort to give Iraqi forces the time and space to mount a more effective offensive.\" By stating what problems that ISIS has created, the American media is portraying ISIS as deserving of the actions that the U.S. military is taking against them. This reasoning also justifies why President Barack Obama ordered another 1,500 troops to Iraq in order to",
"with ISIL in some cases. According to one intelligence adviser quoted by controversial journalist Seymour Hersh, the conclusion of a \"highly classified assessment\" carried out by the Defense Intelligence Agency (DIA) and the Joint Chiefs of Staff in 2013 was that Turkey had effectively transformed the secret US arms program in support of moderate rebels, who no longer existed, into an indiscriminate program to provide technical and logistical support for all elements of the opposition, including Jabhat al-Nusra and Islamic State.\nPresident Trump, declaring \"we have won against ISIS,\" abruptly announced on December 19, 2018 that the remaining 2,000 American troops",
"ISIS vowed to take power away from al-Maliki, who called upon Kurdish forces to help keep Iraq out of the hands of ISIS, as well as air support from American drones in order to eliminate dangerous jihadist elements in the country, which was refused by the United States, as \"administration spokesmen have insisted that the United States is not actively considering using warplanes or armed drones to strike [jihadist havens].\" Relationship with the U.S. In an interview published by the German magazine Der Spiegel in June 2008, al-Maliki said that a schedule for a withdrawal of U.S. troops from the country",
"legal authority for the U.S. military to go on the offensive against Militants affiliated with the ISIL-KP (Islamic State of Iraq and the Levant – Khorasan Province), after the State Department announced the designation of ISIS in Afghanistan and Pakistan as a foreign terrorists organisation. ISIS-K formed in January 2015 after it pledged its allegiance to Abu Bakr al-Baghdadi, the number of militants started with around 60 or 70, with most of them coming over the border with Pakistan but now they range between 1,000 and 3,000 militants, mainly defectors from the Afghan and the Pakistani Taliban, and is generally",
"and Turks from clashing, to prevent pro-Syrian government forces from attacking the Kurds, and to keep up pressure to prevent an ISIL resurgence. The U.S. is not seeking a United Nations mandate for the deployment and currently does not envision asking NATO to sponsor the mission, an administration official said, adding that the troops would not technically be \"peacekeepers,\" a term that carries restricted rules of engagement.\nOn 7 March, Gen. Joseph Votel confirmed that U.S. forces were in no rush to pullout by a specific date, instead saying the completion of the withdrawal was conditional on ISIL no longer posing",
"militant group known as the Islamic State of Iraq and the Levant, citing the 2001 Authorization for the Use of Military Force Against Terrorists, and thus did not require additional approval from Congress. The following day on 10 September 2014 President Barack Obama made a televised speech about ISIL, which he stated: \"Our objective is clear: We will degrade, and ultimately destroy, ISIL through a comprehensive and sustained counter-terrorism strategy\". Obama has authorized the deployment of additional U.S. Forces into Iraq, as well as authorizing direct military operations against ISIL within Syria. On the night of 21/22 September the United",
"a terrorist group to conceal and use against civilian aircraft\"; Obama declined to make a decision on the matter, raising the prospect \"that tens of thousands of CIA-backed fighters will search for more-reliable allies, and that the United States will lose leverage over regional partners that until now have refrained from delivering more-dangerous arms to Assad's opponents.\" Following Russia's intervention, top U.S. officials began emphasizing \"the fight against the Islamic State [ISIL], rather than against the Assad government,\" but supporters of the CIA program \"disagree with this rationale, saying that the Islamic State can't be eradicated until a new government",
"provenance of some weapons in detail. However, the study found no instance in which US arms supplied to the Kurdish– and Arab–led Syrian Democratic Forces (SDF) to fight ISIL ended up in ISIL's arsenal. Phasing out In July 2017, anonymous officials stated that President Donald Trump, in consultation with National Security Adviser H. R. McMaster and CIA Director Mike Pompeo, had decided to phase out support for anti-Assad Syrian rebel forces, possibly redirecting resources to fighting ISIL, to offering rebel forces defensive capabilities, or to other operations in the region.\nThe officials said that the decision was made prior to Trump's",
"who lost their jobs and pensions in the de-Ba'athification process after that regime was overthrown. The former Chief Strategist in the Office of the Coordinator for Counterterrorism of the US State Department, David Kilcullen, has said that \"There undeniably would be no Isis if we had not invaded Iraq.\"\nIt has been reported that Iraqis and Syrians have been given greater precedence over other nationalities within ISIL because the group needs the loyalties of the local Sunni populations in both Syria and Iraq in order to be sustainable. Other reports, however, have indicated that Syrians are at a disadvantage to foreign",
"to ISIL did not include distaste for their acts against Americans or westerners: \"We don’t oppose ISIS because they oppose the enemies of Allah ... only because ISIS makes takfir on the Muslims and kills them do I and others have the right to speak against them, even if it is an Islamic state.\"\nThe Turkistan Islamic Party's 19th issue of its magazine Islamic Turkistan contained an interview with Abu Qatada, and Abu Qatada wrote an article in the same issue on jihad. Abdullah al Muhaysini, Hani al Siba'ee, Abu Qatada and Abdurazak al Mahdi appeared in a TIP video.\nDoğu Türkistan Bülteni",
"State of Iraq and Syria (ISIS) \"a barbaric organization\" and \"a growing threat,\" but does not believe that the U.S. should lead the fight against it. Sanders believes that \"the United States should be supportive, along with other countries, but we cannot and we should not be involved in perpetual warfare in the Middle East – the Muslim countries themselves have got to lead the effort.\"\nOn November 15, 2015, in response to ISIS' attacks in Paris, Sanders cautioned against \"Islamophobia\" saying, \"During these difficult times as Americans, we will not succumb to racism. We will not allow ourselves to be",
"term. Starting in 2014, the Obama administration launched air strikes against ISIL and trained anti-ISIL soldiers, while continuing to oppose Assad's regime. The Obama administration also cooperated with Syrian Kurds in opposing the ISIL, straining relations with Turkey, which accused the Syrian Kurds of working with the Kurdish terrorist groups inside Turkey. Russia launched its own military intervention to aid Assad's regime, creating a complicated multi-party proxy war, though the United States and Russia sometimes cooperated to fight ISIL. In November 2015, Obama announced a plan to resettle at least 10,000 Syrian refugees in the United States. Obama's \"light-footprint\" approach",
"U.S. counter terrorism efforts and has contributed to the Global Coalition to Counter ISIL by freezing terrorist assets, shutting down non-governmental organizations with possible links to terrorist financing, and expelling extremists.",
"of 23 senators, and the only Republican, to vote against the Authorization for Use of Military Force Against Iraq, which provided the legal mechanism for the 2003 U.S. invasion of Iraq. When asked, in 2015, how the U.S. could most effectively deal with ISIS, Chafee said the U.S. should pursue a policy of containment through alliance-building with regional powers. Chafee has said the U.S. \"must make international decisions with brains and not biceps\", and at the first 2016 Democratic primary debate, stated that the U.S. must end its use of \"perpetual wars\", referring in part to the War on Terror.",
"saying: \"We really have no choice. We have to knock out ISIS.\"\nIn a 2015 interview, Trump stated \"You have to take out their families, when you get these terrorists, you have to take out their families. ... When they say they don't care about their lives, you have to take out their families.\" When pressed on what \"take out\" meant, Trump said the U.S. should \"wipe out their homes\" and \"where they came from.\" Critics noted that the intentional targeting of non-combatants is a violation of the Geneva Conventions and other aspects of the international law of war. Jonathan Russell,",
"greater diplomatic intervention in which the United States played a key role as an arbiter between Iraq's warring sectarian factions. On the other hand, Aaron Zelin of the Washington Institute for Near East Policy argues that ISIL are \"likely planning attacks whether the U.S. conducts targeted air strikes or not\" and that, in his opinion, the United States, \"should destroy them as soon as possible.\" Former Secretary of State Hillary Clinton and members of the Republican party including John McCain, Lindsey Graham, Ted Cruz, and John Boehner have likewise called for greater military strikes in the region to contain the",
"2014, United Nations Secretary-General Ban Ki-Moon stated: \"As Muslim leaders around the world have said, groups like ISIL – or Da'ish – have nothing to do with Islam, and they certainly do not represent a state. They should more fittingly be called the 'Un-Islamic Non-State'.\" ISIL has been classified a terrorist organisation by the United Nations, the European Union and its member states, the United States, Russia, India, Turkey, Saudi Arabia and many other countries (see § Classification). Over 60 countries are directly or indirectly waging war against ISIL (see § Countries and groups at war with ISIL). The group was described",
"States is one of the key creators of [ISIS]. The United States did not plan the formation of ISIS, but its destructive interventions in the Middle East and the war in Iraq were the basic causes of the birth of ISIS.",
"violence against Clinton, but downplayed by Trump and many of his Republican surrogates to suggest his supporters should take political action against her) and claimed that President Barack Obama and Clinton were \"the founder[s] of ISIS,\" citing in the latter that Obama's decision to reduce the number of U.S. ground troops in Iraq in 2013 created a governance vacuum that led to the radical Jihadist terror group's rise (although the U.S. military reduction did play a factor in its development, ISIS traces its origins to 2004, one year after the Iraq War began under the partial guidance of Obama's predecessor",
"in the military intervention against ISIL, leading to U.S. troops being stationed along SDF-held territories, thus preventing a Turkish invasion. At the same time, US President Donald Trump has expressed his intention to disengage from the Syrian Civil War, initially ordering all US personnel in Syria to be withdrawn, before later deciding to leave a small contingent, at the behest of his military advisors. Nonetheless, the US is keen on maintaining good relations with Turkey, which had by that point already been strained by the refusal of the US to extradite Turkish dissident Fethullah Gülen (whom Turkey accuses of masterminding",
"by ISIL could be a ploy to cause the Jordanians and the rest of the American-led coalition to refrain from any heavier airstrikes.\nJordan's Foreign Minister Nasser Judeh called ISIL's claim \"an old and sick trick\" on Twitter. \"So they behead innocent #US #UK & Japan hostages & BURN a brave #Jordan pilot ALIVE & now a hostage is killed by an airstrike? Sure! Sick!\", he said. He further tweeted: \"An old and sick trick used by terrorists and despots for decades: claiming that hostages human shields held captive are killed by air raids.\" Later upon confirmation of Mueller's death he",
"used ISIL. In February 2017, the Pentagon adopted the abbreviation ISIS when referencing the group.\nA spokesman for the Canadian Minister of Foreign Affairs told Power & Politics in December 2014, \"Whether it is called Daesh, ISIL or ISIS, Canada and the coalition agree this heinous terrorist group presents a threat to the region, and the entire world. That is why Canada has announced a number of measures designed to combat ISIL's brutality and help victims of this barbaric terrorist group.\" Media style guides The Associated Press originally opted to use ISIL, believing Levant to be the most accurate translation. After",
"sharp criticism, public protests as well as lawsuits against the executive order, Trump relaxed the travel restrictions somewhat and dropped Iraq from the list of non-entry countries in March 2017. Syria In July 2017, on the advice of then-CIA director Mike Pompeo, Trump ordered a \"phasing out\" of the CIA's support for anti-Assad Syrian rebels during the Syrian Civil War.\nOn October 9, 2019, Turkey launched an attack on northern Syria to remove the Kurds after Trump shifted his support from the Syrian Kurds to Turkey. Responses to chemical weapons in Syria On April 7, 2017, Trump ordered the United States",
"fight against the Islamic State of Iraq and the Levant (ISIL)The Pentagon made it clear their goal in Syria and Iraq was 'to fight ISIS and fight ISIS only [and] we've asked [our partner forces] to be committed to that same mission' and that they would not fight Assad's military.\nUS-backed rebels often fought alongside al-Qaeda's al-Nusra Front, and some of the US-supplied weapons ended up in the hands of the al-Nusra Front, which had been a major concern of the Obama administration when the program was first proposed.\nThe program remains classified, and many details about the program remain unknown, including",
"in Syria and moving there to fight. When asked if the United States would arm the opposition, Hillary Clinton expressed fears that such weapons could fall into the hands of al-Qaeda or Hamas. In October 2012, the United States expressed concern and confirmed that most of the weapons fall into the hands of radical Islamist rebels.\nIn July 2016, the British press cited \"experts\" as believing that ISIL fielded at least three exclusively Russian-speaking \"Caucasian\" (often led by Chechens) battalions of about 150 men each, the rank and file of those having been drawn from Russia's North Caucasus and other parts",
"Syria that helps smuggle ISIL members from Eastern Syria to rebel held areas such as Idlib, whilst also profiting from smuggling fees. History On 16 September 2016, Ahrar al-Sharqiya announced that they refuse to cooperate with US forces in fighting ISIL during Operation Euphrates Shield because of their support for the People's Protection Units and Syrian Democratic Forces.\nIn September 2016 members of the group taunted, insulted and verbally attacked American forces in al-Rai embedded with the Al-Mu'tasim Brigade, an American spokesmen said that the group posed no threat to American forces and that American forces present were unaware of the",
"several camps across northeastern Syria. A number of the ISIL detainees are foreign fighters, but their status have become increasingly uncertain due to the Turkish offensive as their own countries refuse to take them. When asked about the situation after the withdrawal of US forces in northeastern Syria, US President Donald Trump dismissed the threat of ISIL, remarking that \"they're going to be escaping to Europe\".\nÎlham Ehmed, a Syrian Kurdish official, stated that the SDF felt betrayed by their American allies for \"exposing us to an invasion by Turkish troops who aim to destroy us\", remarking that they do not",
"that US President Barack Obama should have sought congressional authorization to conduct operations against ISIL. \"You can't ask people to risk their lives, risk getting killed, seeing other folks getting killed or injured if Congress isn't willing to do the job to put their thumbprint on this and say, this is a national mission and worth it\", Kaine said during the panel. \"I totally agree with Tim, and I do think it's very important for the president to come over with the authorization that he wants\", McCain added. Regarding the Keystone XL pipeline, Senator Kaine at the forum also explained",
"for the US-led coalition is ISIL, and not the city of Manbij that has been cleared from ISIL by the Syrian Democratic Forces (SDF). \"We are all about hitting ISIS where there is ISIS. If there's no ISIS, that's not our mandate. So that is an important distinction. We have always made it in any kind of conversation we've been having with any ally on Syria.\" On 27 January 2017, after the multilateral peace talks in Astana, the President of the Republic of Turkey, Recep Tayyip Erdoğan, said that \"we should not go deeper than Al-Bab\" and Foreign Minister Mevlüt",
"that ISIL did not make any public claim of responsibility after the attack, but that it did coincide with threats from some of the Iranian-backed Shia militias who fought with the US against the ISIL but now want US forces to leave the country now that ISIL is almost defeated. According to Greg Robin, an expert in explosive devices for the Sahan Research Group, the bomb has been used in Afghanistan, by al-Shabaab in Somalia and Palestinian Islamic Jihad group. December 2017 On December 9, 2017, it is reported that ISIL had lost all strategic territory in Iraq.\nOn 22 December,"
] |
Why does a return flight from Edinburgh to Houston via France (EDI- > CDG- > IAH) cost substantially less that a direct flight on the same plane from France (CDG- > IAH)? | [
"Airline economics are opaque to say the least. In this case, it's likely that the France to Houston flight is the primary reason for the route, and the airline just needs to get the plane from Edinburgh to France to make the route work. By helping offset the cost of the Edinburgh portion, you get a discount on the whole thing.\n\nThe airline has probably also done the math and seen that there aren't many people flying from Edinburgh to Houston."
] | [
"levels. In response, traditional carriers have lowered costs to compete more effectively on price, leading to lower prices on the short haul routes serviced by this sector, especially in business fares. They have also limited or reduced capacity and in some cases launched no-frills subsidiaries of their own. Passenger travel Just over a fifth of all terminal passengers are travelling on domestic routes only, whilst half are travelling between the UK and the rest of the European Union (EU). Of the latter, travel between the UK and Spain, France, Germany and Italy account for around half, with Spain almost matching",
"the group (Air France 4%, KLM 9%) but lagging the 9% of Lufthansa and 10 to 12% of British Airways, while he deplored Paris-Charles de Gaulle luggage handling and safety waiting lines, obstructing connections, and anticipating a difficult 2018 with rising jet fuel prices and concurrence from Gulf carriers, Turkish Airlines, Chinese and Asian airlines, and low-cost carriers, either easyJet, Volotea, Ryanair or long haul.\nAt the end of 2018 Air France–KLM will select its medium-haul fleet replacement for Air France, HOP!, KLM and Transavia, operating 120 Boeing 737 NG, 118 Airbus A320ceo family, 64 Embraer E-Jets, 25 Bombardier CRJ700 series",
"tickets Lufthansa does add fuel surcharges hidden as fees on award tickets. This is prohibited for US based carriers. A transatlantic award flight (regardless which airline is actually flown) with Miles and More can cost up to 500 EUR in additional taxes and fees whereas the same itinerary booked with the US based Star Alliance partner (United) and their miles would cost less than 100 EUR in fees and taxes (even if the itinerary involves Lufthansa aircraft). So Miles and More may have a much lower value than US based Miles.\nIn September 2016, Miles & More adjusted the flight award",
"$10 billion. Transportation All three major American airlines, American Airlines, United Airlines and Delta Airlines fly directly between the U.S. and the UK, principally between London and New York, although all three fly to London Heathrow Airport from a number of hubs, as well as to other major UK airports such as Birmingham Airport, Manchester Airport, Edinburgh Airport and Glasgow Airport. Additionally, Delta codeshares with the UK's Virgin Atlantic which it owns a 49% stake in. Low-cost carriers JetBlue & Southwest fly between the eastern U.S. and the British overseas territories of Bermuda, British Virgin Islands, Cayman Islands and the",
"(NAFTA) and the European Union). Moreover, the Montreal-Paris air route is one of the most flown routes between Europe and a non-European destination.\nWhile Canada and France often find themselves on the opposite sides of such trade disputes as agricultural free trade and the sale of genetically modified food, they co-operate closely on such issues as the insulation of cultural industries from free trade agreements (something both countries are strongly in favour of).\nIn 2006 France was the seventh ranked destination of Canadian exports (0.7%), and ninth ranked source of imports to Canada (1.3%). Academic and intellectual France is the 5th largest",
"a scenario.\nIn 2006, the Department for Transport predicted that, by 2037, annual cross-channel passenger numbers would probably reach 16 million, considerably less optimistic than London and Continental Railways's original 1996 forecast. In 2007 Eurostar set a target of carrying 10 million passengers by 2010.\nThe company cited several factors to support this objective, such as improved journey times, punctuality and station facilities. Passengers in general, it stated, are becoming increasingly aware of the environmental effects of air travel, and Eurostar services emit much less carbon dioxide. and that its remaining carbon emissions are now offset, making its services carbon neutral. Further expansion",
"(equivalent to $12,000 in 2018) return from New York to Southampton. Most of the flights were transpacific, with a one-way ticket from San Francisco to Hong Kong via the \"stepping-stone\" islands posted at $760 (equivalent to $14,000 in 2018). The Pan Am Boeing 314 Clippers brought exotic destinations like the Far East within reach of air travelers and came to represent the romance of flight. Transatlantic flights to neutral Lisbon and Ireland continued after war broke out in Europe in September 1939 (and until 1945), but military passengers and cargoes necessarily got priority, and the service was more spartan.\nEqually critical",
"8 MWp and 160,000 square meter project that cost 20 million euros and is expected to provide 20% (11 million kWh) of the airport's annual energy consumption.\nIn March 2013, AIA reduced its airport fees (the highest in Europe then) in a move to increase traffic. Ryanair publicly attacked the airport operator and its high fees, arguing that those were to be blamed for the drop of air traffic in recent years.\nIn May 2013, Hochtief sold its 40% stakes of AIA to Canada's Public Sector Pension Investment Board (PSP Investments) for 1.1 billion euros.\nIn February 2014, a Chinese consortium consisting of",
"at a substantial loss, approximately 600,000 euros per month. Ticket prices are due to rise from an average of 155 pln to 180 pln, and the number of the cheapest fare tickets on each flight will be reduced. Unlike other low-fares airlines, OLT had provided free drinks and snacks on its flights. They will stop this practice after the re-organisation and only provide free water, still unheard of for low-fares airlines. They intend to start their own catering company and re-introduce free catering and drinks on flights at a later date.\nAmber Gold claims to have invested roughly 52 million euro",
"and European routes including intra-European routes from the Frankfurt hub, (IGS routes to and from Berlin were acquired by Lufthansa) and assumed a controlling interest in the remainder of Pan Am, which continued to operate routes from Miami to London, Paris and Latin America. The total price for these assets was $1.3 billion.\nAlthough Delta initially promised further equity injections to keep Pan Am afloat, it refused to do so only a month later, which forced Pan Am to cease operations on 4 December. United purchased the remaining assets of Pan Am a few days later, including transatlantic routes from Miami,",
"and 55 percent of the Eurostar from Paris to London.\nThe SNCF is owned by the France state. In 2014 it had revenues of 36.138 million dollars, but this represented a drop of 15 percent from 2013. The SNCF has fallen from 214 in the Global 500 in 2010 to 253 in 2013, then down to 322 in 2014.\nThe headquarters of the SNCF was formerly in the 14th arrondissement of Paris, but in July 2013 it was moved to the suburb of Saint-Denis.\nAir France is the national airline of France. In 2014 it had revenues of 33.12 billion",
"the flight carries 4,200,000 pounds (1,900,000 kg) of engine parts. Air France operated flights into CVG for several periods for over a decade before finally terminating the service in 2007.\nIn January 2010, Delta's then-CEO Richard Anderson anticipated that there would be 160–170 daily departures in the summer and that the number would not change through at least the fall. Delta closed Concourse A in Terminal 3 on May 1, 2010, and consolidated all operations into Concourse B. This resulted in the layoff of more than 800 employees. A further 10% cut in capacity followed in the summer of 2011, reducing the",
"buy on board program in 2005; instead, Delta began offering snacks at no extra charge on flights over 90 minutes to most U.S. domestic flights and some flights to the Caribbean and Latin America. Beginning in mid-March 2005 the airline planned to stop providing pillows on flights within the 48 contiguous U.S. states, Bermuda, Canada, the Caribbean, and Central America. In addition, the airline increased the price of alcoholic beverages on Delta mainline flights from $4 ($5.13 when adjusted for inflation) to $5 ($6.41 when adjusted for inflation); the increase in alcohol prices did not occur on Song flights. Basic",
"(LAAG) Group. This includes a runway extension of almost 300 m (980 ft) and a new terminal building. Including measures to offset environmental detriment, it is costed at £25 million.\nOn 9 July 2015, the Airbus E-Fan took off from Lydd Airport for a flight to Calais-Dunkerque Airport. Initially this was claimed as the first electric aircraft to cross the English Channel, but it has since been pointed out that there were previous such flights, including one as long ago as 1981. Airlines and destinations As of November 2018, following LyddAir ceasing its sole route to Le Touquet, there are no scheduled services.",
"flies an average of 8.4 block hours and up to 10 cycles a day with Lufthansa operating 45 min sectors from Frankfurt to Hamburg or Munich, up to China Southern Airlines flying close to 6 hr sectors.\nAirbus plans to deliver about 200 A320neos in 2017.\nIn 2018, new A320neos have a $49 million value, rising by 1-2% per year, and are leased for $330,000-350,000 per month (0.67-0.71%) due to intense lessor competition and low financing costs, while a recent A320ceo is leased for $300,000. Military A320M3A In July 2018, Airbus was evaluating an A320neo variant for ISR missions, particularly maritime patrol",
"from approximately 80 nautical miles (nm) to 15 nms or less. This will allow more aircraft to fly at optimum altitudes and to benefit from the prevailing winds such as the jet stream, saving fuel and reducing greenhouse gas emissions.\nAireon CEO Don Thoma estimates that this will result in an average fuel savings of $400 per flight for the three-and-a-half-hour trip across the North Atlantic. The annual fuel cost savings for airlines in the North Atlantic alone will be in the order of $125 million.\nIn December 2013, ANSPs from three additional countries joined Nav Canada as partners in Aireon. Enav",
"Japan.\nThe British company Reaction Engines Limited, with 50% EU money, has been engaged in a research programme called LAPCAT, which examined a design for a hydrogen-fueled plane carrying 300 passengers called the A2, potentially capable of flying at Mach 5+ nonstop from Brussels to Sydney in 4.6 hours. The follow-on research effort, LAPCAT II began in 2008 and was to last four years. Boeing Hypersonic airliner Boeing unveiled at the AIAA 2018 conference a Mach 5 (5,400 km/h; 2,900 kn) passenger transport.\nCrossing the Atlantic in 2 hours or the Pacific in 3 at 95,000 ft (29 km) would enable same-day return flights, increasing airlines'",
"percent reduction in 2009.\nMany businesses in Cincinnati had urged Delta to restore the service level it had in the late 1990s and early 2000s while some, such as Chiquita Banana, Toyota, and Veritiv relocated to cities with more available flights. The only remaining intercontinental service by Delta is a daily evening departure to Paris. In addition to serving the heavy international travel demand of local companies such as P&G and GE Aviation, the daily Paris flight is also sustained in great part because it ferries jet-engine parts between factories in Cincinnati and France due to GE Aviation's presence. Each year",
"cost Ryanair about a million passengers through the summer of 2019, but the low-cost carrier remains confident in Boeing and would prefer better pricing on future orders rather than cash compensation.\nSouthwest Airlines, the largest operator the plane with 34 737 MAXs, canceled thousands of flights and said the aircraft had a financial impact of $225 million for the first half of 2019. Southwest has been discussing a reimbursement package with Boeing.\nAmerican Airlines canceled 115 flights a day, lowering estimated full-year pretax revenue by $350 million.\nBrazil's Gol expects to spend respectively 1% and 2% more than planned on fuel in the third and",
"in 1987. Operating economics In 1983, Pan American accused the British Government of subsidising British Airways Concorde air fares, on which a return London–New York was £2,399 (£7951 in 2018 prices), compared to £1,986 (£6582) with a subsonic first class return, and London–Washington return was £2,426 (£8041) instead of £2,258 (£7484) subsonic.\nResearch revealed that passengers thought that the fare was higher than it actually was, so the airline raised ticket prices to match these perceptions. It is reported that British Airways then ran Concorde at a profit.\nIts estimated operating costs were $3,800 per block hour in 1972, compared to actual",
"the use of miles or miles plus money is mandatory, as well as a minimum 7-day stay at the destination.\nIn February 2014, Air France–KLM announced it would invest $100 million in GOL Linhas Aéreas Inteligentes in advance of the 2014 FIFA World Cup and the 2016 Olympics.\nSome disagreement exists as to whether GOL is a low-cost carrier. In 2014, GOL was ranked the second best low-cost airline in South America after Azul. GOL refers to itself as a low-cost carrier, but it is increasingly not regarded as such. According to UFRJ specialist Elton Fernandes, \"GOL's costs are not very different",
"increased to almost 216,000 and two new destinations to London and Dortmund have been introduced. In 2015, the total traffic grew up to 276,533 embarked-disembarked passengers, while the number of aircraft movements increased to 5,468.\nIn December 2016, Lufthansa announced its plans to increase operations on Munich – Sibiu route, as the airline scheduled up to 19 weekly flights from 26MAR17. The airline operates this route with CityLine CRJ900 aircraft.\nIn November 2017, Wizz Air, the largest low-cost airline in Central and Eastern Europe and Romania's leading carrier, announced that it will further expand its Sibiu operations, adding a second Airbus A320",
"of July 2013 that fuel surcharges on international flights would increase by A$75 (one way). In addition, domestic base fares will rise by two to three per cent.\nOn Saturday, 24 March 2018, a Boeing 787 Dreamliner operated by Captain Lisa Norman, Captain Jeff Foote, First Officer Dave Summergreene, and Second Officer Troy Lane was the first ever scheduled non-stop commercial flight between Australia and Europe. Flight QF9, was a 17-hour, 14,498 km (9,009-mile) journey from Perth to London Heathrow. Livery and logos The Qantas kangaroo logo made its first appearance in 1944, painted on a Liberator to celebrate the renaming of",
"LGV Picardie would presumably deviate from the existing line north of the Gare du Nord and proceed directly to a new junction with the Calais branch of the LGV Nord to the east of Calais-Fréthun station. It is unclear how Amiens itself would be served, though the cheaper and more likely option would be to use existing infrastructure. Twenty minutes would be saved on the journey between Paris and Calais, thus making it possible to travel from London to Paris (Eurostar) in under two hours. An additional benefit would be to relieve congestion on the LGV Nord",
"Toulouse, Bordeaux, Nantes, etc. Gare Saint-Charles is also one of the main terminal stations for the TGV in the south of France making Marseille reachable in three hours from Paris (a distance of over 750 km) and just over one and a half hours from Lyon. There are also direct TGV lines to Lille, Brussels, Nantes, Geneva, Strasbourg and Frankfurt as well as Eurostar services to London. In addition, the night train (Intercités de Nuit) from Luxembourg and Strasbourg stops here on its way to Nice, whereas the night train from Paris to Nice serves the Gare de Marseille-Blancarde.\nThere is a",
"the same day at Las Palmas de Gran Canaria in the Canary Islands, where the aviators noticed that the plane's fuel consumption was higher than expected. The journey resumed on April 5, when they departed for São Vicente Island, Cape Verde, traversing 1,370 kilometres (850 mi). After making repairs on the Lusitânia, they departed São Vicente on April 17 and flew to Praia on Santiago Island, and then to the Saint Peter and Saint Paul Archipelago, already in Brazilian waters, where they arrived on the same day, after flying 1,700 kilometres (1,100 mi) over the South Atlantic. They had reached that point",
"will have any effect on fares. Some believe the market is already highly competitive. Other sources have been predicting radical changes, such as €10 flights. \nThere have been a number of new entrants that have come into the market in recent years, who have adapted the model of the short-haul low-cost airlines to the transatlantic route. Initially in 2007, Ryanair announced that it was planning to start a new airline (RyanAtlantic) that would operate long-haul flights between Europe and the United States but that project was cancelled. However, in 2014 Norwegian Air Shuttle announced it would start low-cost flights to",
"inaugurated on services to Australia.\nDuring the first half of 2016, Cathay Pacific's passenger yields fell 10 per cent, to the lowest in seven years as competing airlines from Mainland China increased direct service to the U.S. and Europe, hurting the company's revenue from its Hong Kong hub. In October, Cathay Pacific scrapped its profit forecast for the second half of the year, less than two months after its issuance.\nFrom 15 September 2016, Cathay Pacific decided to reintroduce fuel surcharge on many flights after its half-year net profits dropped over 80% and it suffered HK$4.5 billion loss from wrong bets on fuel",
"dollars, representing a loss of 262 million dollars, due to high costs and stiff competition from low-cost airlines and the new airlines from the Persian Gulf. Air France dropped in rank in the Fortune Global 500 from 351 in 2013 to 365 in 2014.\nThe headquarters of Air France is located at Charles DeGaulle Airport, in the Commune of Roissy-en-France;\nA company called Airports of Paris manages all of the civilian airports in the Paris Region, including Charles de Gaulle Airport, Le Bourget Airport and Orly Airport. it also manages a number of overseas airports, particularly in the Middle",
"for a total of $135 million.\nThe Pan Am creditors' committee sued Delta for more than $2.5 billion on 9 December.\nThe Pan Am transaction gave Delta the largest transatlantic route network among U.S. airlines. Because of these acquisitions, Delta became and remains the largest U.S. transatlantic carrier, in terms of passengers carried and number of flights operated. The ex-Pan Am routes acquired by Delta included Detroit to London, despite Northwest Airlines' objections due to Delta's small presence in Detroit and Northwest's comparatively larger operations. Northwest later attempted to buy US Air's (now American Airlines) Baltimore-London route for $5 million and transfer"
] |
On very tall buildings (100+floors) how does usable water get to the very top and how much resource does it take to get one gallon up that high? | [
"Multiple Huge 480 volt 2 foot wide motors pumping water from the basement where it comes in through 24 inch vertical pipes called risers. Source. I've done maintenance on on these type of buildings in NYC. These pumps are loud, we had a doctor on the first floor complaining that he couldn't do tedious work because of the vibrations coming up from the sub basement 40 feet down.",
"Maybe an actual engineer can speak to this, but it's just pumped up into tanks which keep pressure regulated by gravity as the water is used.\n\nOn really tall buildings they may use several stages where water is stored in large tanks and then pumped to the next stage and so on reducing the pressure required to get water to the top. I'd imagine 100 stories worth of pressure would require pumps and piping which would be way more expensive and dangerous than pumping it in stages 20 stories at a time. This is all baseless speculation.",
"In response to your edit- in my (highly anecdotal) experience, if the pumps don't work, nothing works. I was stuck in a hotel during the big blackout in NYC, and the sinks, tubs, and toilets were all non-functional. I felt really, really bad for the cleaning staff who had to go through the whole building after that.\n\nWe were kind of lucky though- the guy running our hotel was awesome and did his best to make people comfortable. Some of the hotels were kicking people out because they didn't want to deal with all the headaches."
] | [
"construction, allows for retention time for chemical treatment chemicals to \"contact\" (chemically treat) with product water.\nGround water tank, made of lined carbon steel, may receive water from a water well or from surface water, allowing a large volume of water to be placed in inventory and used during peak demand cycles.\nElevated water tank, also known as a water tower, will create a pressure at the ground-level outlet of 1 kPa per 10.2 cm or 1 psi per 2.31 feet of elevation. Thus a tank elevated to 20 metres creates about 200 kPa and a tank elevated to 70 feet creates about",
"Rooftop water tower A rooftop water tower is a variant of a water tower, consisting of a water container placed on the roof of a tall building.\nThis structure supplies water pressure to floors at higher elevation than public water towers.\nAs building height increases, the vertical height of its plumbing also increases. This produces a large water column and the weight of this water produces very high pressure at the bottom of the column. Normally, this would require very thick (heavy schedule) plumbing to survive the pressure. Fittings at the bottom of the column would need pressure reducing valves to operate",
"of reinforced concrete and the height from the highest point is 70 feet (21 m). It is capable of holding 100,000 imperial gallons (450,000 l; 120,000 US gal). The Tramway Department provided the electricity required for the centrifugal pump which propelled water from the tank below\nA cottage was erected alongside the tank on the vacant piece of ground shortly after the tower was opened so that the turncock would live on the premises and give every attention to see that the tank was constantly well filled with water. Description Paddington Water Tower is located on a 529-square-metre (5,690 sq ft) allotment on Archibald's Hill. The site",
"125 ft (38 m) high. The Watertoren (or Water Towers) in Eindhoven, Netherlands contain three spherical tanks, each 10 m (33 ft) in diameter and capable of holding 500 cubic metres (130,000 US gal) of water, on three 43.45 m (142.6 ft) spires were completed in 1970. Alternatives Alternatives to water towers are simple pumps mounted on top of the water pipes to increase the water pressure. This new approach is more straightforward, but also more subject to potential public health risks; if the pumps fail, then loss of water pressure may result in entry of contaminants into the water system. Most large water utilities do not use",
"tower was undertaken in 1990, along with the construction of a new wayside rest area. The building The water tower, significant in that it is constructed of poured concrete, stands at 132 feet (40 m) tall and roughly 25 feet (7.6 m) in diameter. The 150,000-US-gallon (570,000 L) capacity tank is supported by a hollow supporting column which contains an unusual set of spiral windows and an internal staircase. The tower pumped and stored water from a 500,000-US-gallon (1,900,000 L) reservoir built below it at the time of its construction, releasing the water via gravity on demand. Present day The tower has become the",
"tank is 10 m (33 ft) in diameter, capable of holding 500 cubic meters of water (132.086 US gallons). The innovative design of three tank-towers together created the largest water tower complex in the Netherlands.",
" In 1978, the water tower was disconnected when the university switched to municipal water. It was listed in the National Register of Historic Places on May 27, 1982 and restored in 1987.\nThe water tower stands 168 feet (51 m) tall on an octagonal base. The tank holds 162,000 US gallons (613 m³) and is 24 feet (7 m) in diameter and 40 feet (12 m) tall. When full, the ~72,400 cubic feet (2,050 m³) of water would weigh 2,050 t. Reiman Gardens Roy Reiman is a 1957 graduate of Iowa State in agriculture journalism and he",
"\"the water was let into it through the 30-inch pipe at half past nine o'clock ... and it was filled in 18½ hours.\" The reservoir \"is built of the most massive description of stone masonry, and is the most costly distributing reservoir owned by the city. It covers about 37,012 square feet (3,438.5 m²) of land, and has a mean horizontal water section of 28,014 square feet (2,602.6 m²), and a capacity of 2,678,961 US gallons (10,140,970 L).\"\nBy c. 1876, \"owing to the connection of the Beacon Hill District with the High-Surface Pumping Works at Roxbury District, this reservoir is now used for",
"that in a city of approximately 200,000 households, there are only 62,000 water meters, and of those, only 23,000 are functional.\nWithout water meters in many areas of the city, water fees are based upon fixed estimates of water usage. Because these estimates frequently underestimate the volume of water actually drawn, strong incentive exists for residents to disable or destroy existing water meters, and present a strong disincentive for households to invest in the installation of new meters. In addition, the lack of meters in the system means that SANAA has no way to clearly identify non-revenue water losses within the",
"confirmed that their annual energy use is 85 kWh/m², slightly lower than anticipated. Cost MHP was constructed at a cost of C$278 m, or $400 per square foot. This would place the cost of the building much higher than local building developers would typically target for a city that is not expanding rapidly. The building was also financed internally, with a target construction payback period of more than 60 years rather than the much shorter typical return projection.\nDuring the initial phase of construction, in 2006, engineers discovered a higher water table than anticipated. As the basement had",
"sea level.\nWell users, including municipal water users, in the WRD area pump about 250,000 acre feet (310,000,000 m³) of water per year out of their aquifer. This is an \"overdraft\" of about 150,000 acre feet (190,000,000 m³) of water over what their underground aquifer can \"normally\" refill. To replace this \"overdraft\" of water into the aquifer, they have flotation ponds that catch rain runoff water, and supplement with other water they either buy or recycle, then let the water soak into the ground (spreading water) to help replenish the water in the aquifer(s). In addition they buy Colorado River water that is",
"(59 ft) and a round portion which is walled up around a 500 cubic metres (18,000 cu ft) large water tank. The upper part is carried by 16 solid columns.",
"sea level and the reservoir had a capacity of 3,856 megalitres (848,000,000 imp gal; 1.019×10⁹ US gal). A subsequent review in October 2006, using more accurate mapping methods, resulted in capacity being re-estimated downwards from the previous estimate of 4,700 megalitres (1.0×10⁹ imp gal; 1.2×10⁹ US gal). Additional galleries and drains were constructed between 1984 and 1986. In order to supply the city with potable water, water from the reservoir was pumped to Mount Stromlo, and from there the water flowed by gravity to fill the city's reservoirs.\nFrom the 1960s onwards, better quality water could be supplied without pumping using the newly completed Bendora and Corin dams, and",
"connected through a pipe to an underground tank that stores water.\nSystems are ideally sized to meet the water demand throughout the dry season, since it must be big enough to support daily water consumption. Specifically, the rainfall capturing area such as a building roof must be large enough to maintain adequate flow of water. The water storage tank size should be large enough to contain the captured water. \nFor low-tech systems, many low-tech methods are used to capture rainwater: rooftop systems, surface water capture and pumping the rainwater that has already soaked into the ground or captured in reservoirs and",
"coating to protect the water from any effects from the lining material. The reservoir in the tower may be spherical, cylindrical, or an ellipsoid, with a minimum height of approximately 6 metres (20 ft) and a minimum of 4 m (13 ft) in diameter. A standard water tower typically has a height of approximately 40 m (130 ft). \nPressurization occurs through the hydrostatic pressure of the elevation of water; for every 10.20 centimetres (4.016 in) of elevation, it produces 1 kilopascal (0.145 psi) of pressure. 30 m (98.43 ft) of elevation produces roughly 300 kPa (43.511 psi), which is enough pressure to operate and provide for most domestic water pressure and",
"water tank known as a tinaco on their roofs. Water that accumulates in a basement cistern, known as an ajibe, is pumped up to it to provide pressure through gravity to the rest of the house regardless of pressure in the local system. In some newer homes, however, key appliances have their own pressure systems, Water resources In 2006, 63% of the Mexican water was extracted from surface water, such as rivers or lakes. The remaining 37% came from aquifers. Due to the strong growth of population and internal migration towards arid and semi-arid regions, many water resources in North",
"water well. The area at the base of the second phase foundation is 15,992 square feet (1,485.7 m²). The strengthened foundation (old foundation and concrete slab) has a total depth of 36 feet 10 inches (11.2 m) below the bottom of the lowest course of marble blocks (now below ground), and 38 feet (11.6 m) below the entry lobby floor. Casey reported that nowhere did the load exceed 9 long tons per square foot (140 psi; 970 kPa) and did not exceed 3 long tons per square foot (47 psi; 320 kPa) near the outer perimeter. To properly distribute the load from the shaft to slab, about half by",
"water plant capable of delivering 9,000 gallons of water per minute.\nTank 1 is an infinite horizon pond which adjoins and overlooks the Pacific, it is a 360,000 square foot concrete pool with a full capacity of 17 million gallons, used for exterior shooting, wet or dry, and consists of three depth levels between 3 1/2 to 40 feet. The tank can be emptied or filled in 40 hours. Alongside is a 162 foot motor driven tower crane, used for constructing film sets, and as a lighting and camera platform. There is a smaller outdoor tank and another two built",
"cistern could contain 300 cubic metres (11,000 cu ft) of water, its top was 42 metres (138 ft) above the ground, and the beams on which the cistern rested were 32 metres (105 ft) above the ground. The water tower was in use until 1974, when Trelleborg New Water Tower took over its functions. Except a café at street level the water tower stands unused.",
"capacity of 2.52 billion cubic meters per day, about one third or 0.86 billion cubic meters per day could be treated at the standard of reclaimed water. Each plant possesses the capacity to further treat part of its flow for reclamation. The capacities of some plants are not fully used. According to one source, 56% of the reclaimed water was used for power plant cooling, 25% for agricultural irrigation, 16% to replenish watercourses and only 2.5% for non-potable residential uses such as toilet flushing, road cleaning, car washing, fire fighting and the use of water for construction. Only 0.5% was used to",
"amount that is high for small households but can be low for large households. Higher consumption is charged at a higher tariff that was N$20.93 per cubic metre (USD 1.40) in 2015. The municipality bills water together with electricity, solid waste collection and the property tax. Residents of informal settlements receive water through public standpipes equipped with prepaid water meters. Prepaid customers pay about USD 1.9 per kiloliter (cubic metre), or about USD 0.038 per 20‐liter container.\nWater tariffs in other municipalities vary. Those municipalities that receive bulk water from NamWater, which includes all large municipalities, have to recover the costs",
"the tank (approximately 750 by 895 feet (273 m) in size), is a small, square building and a subsurface water collection system which supplied the water tank; only one of these water systems is only extensively exposed today.",
"Water tower A water tower is an elevated structure supporting a water tank constructed at a height sufficient to pressurize a water distribution system for the distribution of potable water, and to provide emergency storage for fire protection. In some places, the term standpipe is used interchangeably to refer to a water tower. Water towers often operate in conjunction with underground or surface service reservoirs, which store treated water close to where it will be used. Other types of water towers may only store raw (non-potable) water for fire protection or industrial purposes, and may not necessarily be connected to",
"a public water supply.\nWater towers are able to supply water even during power outages, because they rely on hydrostatic pressure produced by elevation of water (due to gravity) to push the water into domestic and industrial water distribution systems; however, they cannot supply the water for a long time without power, because a pump is typically required to refill the tower. A water tower also serves as a reservoir to help with water needs during peak usage times. The water level in the tower typically falls during the peak usage hours of the day, and then a pump fills it",
"has a water surface of 1.1 square miles, a maximum capacity of 97,800 acre feet (120,600,000 m³), and a normal capacity of 97,500 acre feet (120,300,000 m³). Recreation includes camping, fishing, and boating.",
"almost 650 metres (2,130 ft) deep, is used to pump up the water to a heat exchange substation.\nThe water, now with a termperature of about 13 °C (55 °F), is returned in full to the aquifer by a well 635 metres (2,083 ft) deep.\nThe two wells are 580 metres (1,900 ft) apart at their feet to avoid thermal recycling, and the system is sealed to prevent any contamination of the water.\nWithin the buildings heat pumps deliver water at 35 °C (95 °F) to heat the floors and hot tap water at 60 °C (140 °F).",
"(45 m) tall, has an 85-foot (26 m) base. The substructure walls taper from a thickness of 40 inches (100 cm) at the bottom to 24 inches (61 cm) at the top. The reservoir holds a 250,000-US-gallon (950,000 l) steel tank. When it was constructed it had a dual purpose. Not only did it store water but the falling water also generated electricity for the city street lamps at night.\nA marble bust of Demetrius Ypsilanti stands between a Greek and a U.S. flag at the base of the water tower. The city of Ypsilanti is named after this hero of Greek independence. Present day The",
"concrete must have low permeability to keep out corrosive salt water from the Red Sea. Its depth and size are also considered to be an indicator of what the tower's final height will be. The piles will be up to 200 m (660 ft) deep and the pad over 90 m (300 ft) across, yet the building, which will weigh over 900,000 tonnes (890,000 long tons; 990,000 short tons), is expected to settle. The idea is that it settles evenly enough so that the building doesn't tip or put undue stress on the superstructure. Computer modelling programmes performed tests at the site to confirm",
"United States. To calculate the amount of topsoil you will need, \"simply take your length (in feet) multiplied by your width (in feet) multiplied by your depth (in feet so if you wanted 5 inches that would be 5/12) then divide the total by 27. This will give you your cubic yards needed for the project. Ex: 10L x 10W x (5/12) = 41.66/27 = 1.54 cubic yards of topsoil needed.\".",
"distribution system requirements.\nThe height of the tower provides the pressure for the water supply system, and it may be supplemented with a pump. The volume of the reservoir and diameter of the piping provide and sustain flow rate. However, relying on a pump to provide pressure is expensive; to keep up with varying demand, the pump would have to be sized to meet peak demands. During periods of low demand, jockey pumps are used to meet these lower water flow requirements. The water tower reduces the need for electrical consumption of cycling pumps and thus the need for an expensive"
] |
Why do males of African descendance have a higher likelihood of having facial hair that grows in on itself causing razor bumps? | [
"Hair of some men of African descent (I forget which region) tends to be extremely tightly curled. This easily causes razor bumps and ingrown hairs. Also, because this afflicts so disparately many black men, [Domino's was found in violation of the 1991 Civil Rights Act](_URL_0_).",
"Same reason that their hair is nappy. Black people's hair is curlier, and the same genes that cause curly head hair can affect the hair that grows on the face and body.\n\nThe reason curly hair happens in general is that the follicles (places in the skin where hair comes out) are flattened. Someone with naturally straight hair has circular follicles, whereas someone with curly hair has flattened or oblong follicles.\n\nYour genes affect the way your hair follicles form, and there's a degree of overlap between \"curly hair on head\" and \"curly hair on face.\""
] | [
"African-American men than in other male populations in the US. In fact, the soul patch is so named because African-American men, particularly jazz musicians, popularized the style. The preference for facial hair among African-American men is due partly to personal taste, but also because they are more prone than other ethnic groups to develop a condition known as pseudofolliculitis barbae, commonly referred to as razor bumps, many prefer not to shave. Body image European-Americans have sometimes appropriated different hair braiding techniques and other forms of African-American hair. There are also individuals and groups who are working towards raising the standing",
"neotenous trait.\nEike-Meinrad Winkler and Kerrin Christiansen of the Institut für Humanbiologie studied, in 1993, Kavango people and !Kung people of body hair and hormone levels to investigate the reason black Africans did not have bodies as hairy as Europeans. Winkler and Christiansen concluded the difference in hairiness between black Africans and Europeans had to do with differences in androgen or estradiol production, in androgen metabolism, and in sex hormone action in the target cells.\nValerie Anne Randall of the Department of Biomedical Sciences, University of Bradford, said in 1994 beard growth in Caucasian men increases until the mid-thirties due to a",
"are defective and nonfunctional. There is little, if any, difference in the capacity of male and female bodies to grow hair in response to androgens.\nPubic hair and underarm hair can vary in color considerably from the hair of the scalp. In most people, it is darker, although it can also be lighter. In most cases it is most similar in color to a person's eyebrows.\nHair texture varies from tightly curled to entirely straight, not necessarily correlating to the texture of the scalp hair. People of East Asian heritage tend to have straight, wavy pubic hair.\nPubic hair patterns can vary by",
"delay caused by growth cycles changing from vellus hair to terminal hair. Randall said white men and women are hairier than Japanese men and women even with the same total plasma androgen levels. Randall says that the reason for some people being hairy and some people not being hairy is unclear, but that it probably is related to differing sensitivity of hair follicles to 5α-reductase.\nRodney P.R. Dawber of the Oxford Hair Foundation said in 1997 that East Asian males have little or no facial or body hair and Dawber also said that Mediterranean males are covered with an exuberant pelage.\nMilkica",
"being implicitly defined as straight hair. African-American women in the Army may be forced to choose between small cornrows and chemically processing their hair, if their natural hair is not long enough to fit into a neat pony tail. Facial hair Maintaining facial hair is more prevalent among African-American men than in other male populations in the U.S. In fact, the soul patch is so named because African-American men, particularly jazz musicians, popularized the style. The preference for facial hair among African-American men is due partly to personal taste, but also because they are more prone than other ethnic groups",
"selection may have led to beards. Modern biologists have reaffirmed the role of sexual selection in the evolution of beards, concluding that there is evidence that a majority of women find men with beards more attractive than men without beards.\nEvolutionary psychology explanations for the existence of beards include signalling sexual maturity and signalling dominance by the increasing perceived size of jaws, and clean-shaved faces are rated less dominant than bearded. Some scholars assert that it is not yet established whether the sexual selection leading to beards is rooted in attractiveness (inter-sexual selection) or dominance (intra-sexual selection). A beard can be",
"the upper lip in women is not considered true facial hair, though it is often referred to as a \"moustache\"; the appearance of these dark vellus hairs may be lessened by bleaching. A relatively small number of women are able to grow enough facial hair to have a distinct beard. In some cases, female beard growth is the result of a hormonal imbalance (usually androgen excess), or a rare genetic disorder known as hypertrichosis. Sometimes it is caused by use of anabolic steroids. Cultural pressure leads most women to remove facial hair, as it may be viewed as a social",
"crime. Long lustrous female hair is generally rated attractive by both men and women across cultures. The prevalence of trichophilia (hair partialism or fetishism) is 7% in the population, and very long hair is a common subject of devotion in this group. Biological significance Humans, horses, orangutans and lions are among the few species that may grow their head hair or manes very long. Humans are believed to have lost their fur 2.5–3 million years ago as hominids when transitioning from a forest habitat to the open savanna, as an effect of natural selection, since this development made it possible",
"the level of androgen sensitivity, with pubic hair being the first to appear due to the area's special sensitivity to androgen. The appearance of pubic hair in both sexes is usually seen as an indication of the start of a person's puberty. There is a sexual differentiation in the amount and distribution of androgenic hair, with men tending to have more terminal hair in more areas. This includes facial hair, chest hair, abdominal hair, leg hair, arm hair, and foot hair. Women retain more of the less visible vellus hair, although leg, arm, and foot hair can be noticeable on",
"ethnicity, job, social class, wealth, and many other characteristics. Baldness is inherited from the mother's father A 50% chance exists for a person to share the same X chromosome as his maternal grandfather. Because women have two X chromosomes, they have two copies of the androgen receptor gene, while men only have one. Weight training and other types of physical activity cause baldness Because it increases testosterone levels, many Internet forums have put forward the idea that weight training and other forms of exercise increase hair loss in predisposed individuals. Although scientific studies do support a correlation between exercise",
"of atypical hormonal variation. Many women depilate facial hair that appears, as considerable social stigma is associated with facial hair on women, and freak shows and circuses have historically displayed bearded women. Many women globally choose to totally remove their facial hair by professional laser treatment. In great apes Great apes such as orangutan males seem to have facial hair as well. In chimpanzees and bonobos, facial and body hair become sparser in adulthood due to the aging process, which is in stark contrast to humans, whose facial and body hair become stronger. Because infant great apes have thicker \"facial\"",
"straight hair. Blacks, she believes, should be able to be themselves without feeling pressured to \"tame\" their hair. Africa Throughout much of Africa, afro-textured hair is the most frequent hair form, except among the Afro-Asiatic (Hamito-Semitic) speaking populations in North Africa and the Horn of Africa. In the latter regions, naturally long hair is instead more common.\nIn West African cultures, women with long hair were highly valued. Long, thick hair was seen as a sign of health, strength, and capability to bear many children. In keeping with this general theme, women who were too young for marriage would shave a",
"African-American hair African-American hair and African-American hairstyles are the diverse ways that African-American men and women style their hair. Because many black people have hair with tighter and smaller curls than people of other races, unique hair styles have developed. In addition to many black hairstyles have historical connections to African cultures. African origins Since the beginning of African civilizations, hairstyles have been used to convey messages to greater society. As early as the 15th century, different styles could \"indicate a person's marital status, age, religion, ethnic identity, wealth and rank within the community.\" \nHair maintenance in traditional Africa",
"most human biological processes, this specific order may vary among some individuals. Facial hair is often present in late adolescence, around ages 17 and 18, but may not appear until significantly later. Some men do not develop full facial hair for 10 years after puberty. Facial hair continues to get coarser, darker and thicker for another 2–4 years after puberty.\nThe major landmark of puberty for males is spermarche, the first ejaculation, which occurs, on average, at age 13. For females, it is menarche, the onset of menstruation, which occurs, on average, between ages 12 and 13. The age of menarche",
"preferred men with facial hair because they perceived them to be more masculine, sophisticated and mature than clean-shaven men. Similarly, a study performed by Kenny and Fletcher at Memphis State University, which is largely a commuter school and usually is regarded as more conventional than the University of Chicago, suggested that men with facial hair such as moustaches and beards, were perceived as stronger and more masculine by female students. However, the study performed by Feinman and Gill would suggest that this reaction to facial hair is not nationwide, as women studying in the state of Wyoming showed a marked",
"the direct actions of the sex chromosome gene. The mismatch timing between biological puberty and age of social maturity in western society has a psychological expectation on children. With puberty, men are generally hairier than women, and Darwin was of the opinion that hairlessness was related to sexual selection; however, several other explanations have been advanced to explain human hairlessness, a leading one is loss of body hair to facilitate sweating. This idea closely relates to that of the suggested need for increased photoprotection and is part of the most-commonly-accepted scientific explanation for the evolution of pigmentary traits.\nIndicating that",
"the WHO to retract. In the media In 2002 BBC News reported that unnamed German experts had concluded that the natural distribution of blond hair would cease within the span of 200 years owing to the genes associated with blond hair being recessive. The article reported the scientists had said that there is a reportedly low number of people carrying the recessive blond allele, especially in nations of mixed heritage (for example, the United States, Canada, Argentina, Brazil, New Zealand and Australia). The dominant alleles (brown hair, black hair, brown eyes) \"overthrow\" the recessive genes or metaphorically, endanger them. Subsequently",
"pregnancy, chronic illness, crash diets, and stress among others, it is now occurring at earlier ages with reported cases in women as young as 15 or 16. Society and culture Studies have been inconsistent and not stable across cultures how balding men rate on the attraction scale. While a study from South Korea showed most people rated balding men as less attractive, a more recent survey of 1,000 Welsh women rated bald and gray haired men quite desirable.\nProposed social theories for male-pattern hair loss include that baldness signaled dominance, social status, or longevity. Biologists have hypothesized the larger sunlight exposed",
"than the same subject pictured without facial hair, the moustached subjects were also perceived to be far less socially mature. The decreased perception of social maturity of the men with moustaches may partially be due to the increase in the perception of aggression in the moustachioed men, as aggression is incompatible with social maturity. Workplace In a study performed by J. A. Reed and E. M. Blunk, persons in management positions were shown to positively perceive, and therefore be more likely to hire, men with facial hair. Although men with beards over all scored better than men with only moustaches,",
"women. It is not unusual for women to have a few terminal hairs around their nipples as well.\nIn the later decades of life, especially after the 5th decade, there begins a noticeable reduction in body hair especially in the legs. The reason for this is not known but it could be due to poorer circulation, lower free circulating hormone amounts or other reasons. Function Androgenic hair provides tactile sensory input by transferring hair movement and vibration via the shaft to sensory nerves within the skin. Follicular nerves detect displacement of hair shafts and other nerve endings in the surrounding skin",
"thinning is therefore a sensitive issue for both sexes. For sufferers, it can represent a loss of control and feelings of isolation. People experiencing hair thinning often find themselves in a situation where their physical appearance is at odds with their own self-image and commonly worry that they appear older than they are or less attractive to others. Psychological problems due to baldness, if present, are typically most severe at the onset of symptoms.\nHair loss induced by cancer chemotherapy has been reported to cause changes in self-concept and body image. Body image does not return to the previous state after",
"and dreadlocks, in order to embrace their race, and to return to West African roots.\nSocial pressures at the time were heavily influencing these Americans (women) to have, straight hair, like white people did. This resulted in the Black is beautiful movement, wherein African Americans wore their long natural hair, that was however, untreated and unmodified. More recently, hair-extensions have become widespread. Scholars have pointed out the continued pressure on black women to have straight smooth hair. Amelia Jones points out that dolls for children, such as Barbies, add to this pressure, citing as an example a new, black Barbie with",
"as many females as males had red or auburn hair. A higher proportion of females were also found to have blond hair, whereas males were more likely to have black or dark brown hair. Another study found green eyes, which are a result of lower melanin levels, to be much more common in women than in men, at least by a factor of two. However, one more recent study found that while women indeed tend to have a lower frequency of black hair, men on the other hand had a higher frequency of platinum blond hair, blue eyes and lighter",
"in a study conducted in Brazil, clean-shaven men were preferred by personnel managers over applicants who were bearded, goateed, or moustached. Race African-American men tend to have a higher percentage of wearing a mustache compared to Caucasian men in the United States: \"A far greater percentage of African-American males than white males wear mustaches today and have always worn mustaches.\" Cultures In Western culture, it has been shown that women dislike men who displayed a visible moustache or beard, but preferred men who had a visible hint of a beard such as stubble (often known as a five-o-clock shadow) over",
"women. An evolutionary psychology explanation for this is that malnutrition and deficiencies in minerals and vitamins causes loss of hair or hair changes. Hair therefore indicates health and nutrition during the last 2–3 years. Lustrous hair is also often a cross-cultural preference. One study reported non-Asian men to prefer blondes and Asian men to prefer black-haired women.\nA component of the female beauty ideal in Persian literature is for women to have black hair, which was also preferred in Arabian society in the Middle Ages. In Middle English literature, curly hair is a necessary component of a beautiful woman. Movement patterns",
"however, found that moderate amounts of trunk hair on men was most attractive, to the sample of British and Sri Lankan women. Further, a degree of hirsuteness (hairiness) and a waist-to-shoulder ratio of 0.6 is often preferred when combined with a muscular physique.\nIn a study using Finnish women, women with hairy fathers were more likely to prefer hairy men, suggesting that preference for hairy men is the result of either genetics or imprinting. Among gay men, another study (Yee N., 2002) reported gay males who identify as \"only tops\" prefer less hairy men, while gay males who identify as \"only",
"Discrimination based on hair texture History In the Western world, afro-textured hair has historically been treated with disdain, by members of all ethnicities. In the 15th and 16th centuries, the Atlantic slave trade saw black Africans forcibly transported from Sub-Saharan Africa to North America and, upon their arrival in the New World, their heads would be shaved in effort to not only prevent the spread of lice but to erase their culture, as many Africans used hairstyles to signify their tribal identity, marital status, age, and other personal characteristics. Early on, both men and women would wear headscarves in order",
"young men wore their hair in a type of topknot or \"man bun\" reminiscent of the samurai hairstyles in wuxia movies. This trend was popularised by British and American celebrities including actors Orlando Bloom and Jared Leto as well as footballer Gareth Bale.\nBy 2017, the undercut hairstyle and buzzcut began to decline in the United States, partly due to the unintended popularity of these haircuts among supporters of the alt-right, such as white supremacist Richard Spencer. British hipsters frequently left their undercut unstyled in imitation of 1990s Britpop and early Beatles haircuts. Youth For young girls, tween and teen girls,",
"short hair and very short sideburns for men and sleekly straight hair for women. White collar men's haircuts were often shaved at the nape of the neck to create an artificially even hairline. Women's hairstyles became increasingly long in the latter part of the decade and blunt cuts dominated. Blunt cuts of the late 1980s brought long hair to an equal length across the back. Bangs were popular, with \"mall bangs\", attributed to teenage girls who frequented shopping malls, were styled by ratting bangs into peaks or mounds, and then using hairspray to keep them in place. Chemical treatments Many",
"red-haired people have a mutated copy. Mutation of the MDM2 SNP309 gene is associated with increased risks for younger women.\nFair- and red-haired people, persons with multiple atypical nevi or dysplastic nevi and persons born with giant congenital melanocytic nevi are at increased risk.\nA family history of melanoma greatly increases a person's risk because mutations in several genes have been found in melanoma-prone families. People with a history of one melanoma are at increased risk of developing a second primary tumor.\nFair skin is the result of having less melanin in the skin, which means there is less protection from UV radiation."
] |
In caves deep underground, is there any light? If so, where are those photons coming from? | [
"There will be far infrared light. All materials whose temperature is above absolute zero emit light. Even the cool rocks in a deep cave will be emitting light, but it will be very little, and be deep in the infrared.\n\nThere will also be the odd cosmic ray or particle like a neutrino that will pass through tonnes of solid rock, and finally strike an atom inside the cave, producing a single photon of light that could be at any energy (or color), visible, infrared, ultraviolet, X-ray, gamma or higher. But this would happen very rarely."
] | [
"further than 200 feet (60 m), true cave diving can involve penetrations of many thousands of feet, well beyond the reach of sunlight. The level of darkness experienced creates an environment impossible to see in without an artificial form of light. Caves often contain sand, mud, clay, silt, or other sediment that can further reduce underwater visibility in seconds when stirred up.\nCaves can carry strong water currents. Most caves emerge on the surface as either springs or siphons. Springs have out flowing currents, where water is coming up out of the Earth and flowing out across the land's surface. Siphons have",
"below it, separated by a band of rock between one and two meters tall. Because it is farther from the surface much less light passes through the lower opening, but its depth and size allow it to be the grotto water's primary source of illumination.\nAs light passes through the water into the cave, red reflections are filtered out and only blue light enters the cave. Objects placed in the water of the grotto famously appear silver. This is caused by tiny bubbles, which cover the outside of the object when they are placed underwater. The bubbles cause the light",
"Grotta dello Smeraldo Overview It is one of several caves worldwide, that are flooded with a brilliant blue or emerald light. The quality and nature of the color in each cave is determined by the unique lighting conditions in that particular cave. The grotto, which is located at the Amalfi Coast, is partly filled with sea water. The surface area of the water measures roughly 45 x 32 metres, with a cavern roof about 24 metres above water level. Formation of cave was caused by bradyseism - tectonic upheaval of cliffs, where cliffs fractured and cave was formed along the",
"findings in the tunnel chambers was a miniature mountainous landscape, 17 metres underground, with tiny pools of liquid mercury representing lakes. The walls and ceiling of the tunnel were found to have been carefully impregnated with mineral powder composed of magnetite, pyrite (fool's gold), and hematite to provide a glittering brightness to the complex, and to create the effect of standing under the stars as a peculiar re-creation of the underworld. At the end of the passage, Gómez Chávez’s team uncovered four greenstone statues, wearing garments and beads; their open eyes would have shone with precious minerals. Two of the",
"environments are the threshold regions near cave mouths that extend to the last penetration of sunlight. Hypogean Hypogean or \"true\" cave environments. These can be in regular contact with the surface via wind and underground rivers, or the migration of animals, or can be almost entirely isolated. Deep hypogean environments can host autonomous ecologies whose primary source of energy is not sunlight, but chemical energy liberated from limestone and other minerals by chemoautotrophic bacteria.",
"the world with electric light bulbs as we know them today was the Kraushöhle in Austria in 1883. But the light was abandoned after only seven years and the cave is today visited with carbide lamps. In 1884, two more caves were equipped with electric light, Postojna Cave, Slovenia, and Olgahöhle, Germany.\nBecause of the unwanted development of lampenflora (algae attracted to heat and light) around incandescent electric lights in show caves, many of these attractions, such as Ingleborough Cave in England, have switched to cooler-temperature LED lighting.",
"no detectable flow of water in the deeper cavern. Sinkholes such as El Zapote are common in the wider region and form through the collapse of caves.\nTheir existence has been known to the local cave-diving community for a long time, and there is a visitor centre at El Zapote where a 1.8-metre-long (5.9 ft) specimen taken from the cave floor is exhibited. The Hells Bells were researched by Wolfgang Stinnesbeck from the University of Heidelberg who was investigating caves for traces of human civilization and who authored the first academic work on them. Location El Zapote and the Hells Bells are",
"wavelength emitted by Hydrogen gas when it is ionised by radiation from a star. Detection Protogalaxies can theoretically still be seen today, as the light from the farthest reaches of the universe takes a very long time to reach Earth, in some places long enough that we see them at the stage where they are populated by protogalaxies.\nThere have been many attempts to find protogalaxies with telescopes over the last 30 years because of the value of such a discovery in confirming how galaxies form, but the sheer distance any light would have to travel for it to be old",
"that there is no cave channel in underground. Skylight II Skylight II is an oval measuring 85 by 60 metres (279 ft × 197 ft). The bottom of the skylight is half-covered by water, at a depth of 19 metres (62 ft) below the rim. Some plants grow horizontally on the wall of Skylight II. Skylight III Skylight III is 690 m from the outlet. It is funnel-shaped, with a top diameter of 75 metres (246 ft), and a diameter at the water level of 43 metres (141 ft). The water depth is as much as 22 metres (72 ft) with an extra 10 metres (33 ft) of",
"room, with a door slightly ajar leading to a brightly lit room), or a scene in which most points do not have direct line-of-sight to any light source (such as with ceiling-directed light fixtures or torchieres). In such cases, only a very small subset of paths will transport energy; Metropolis light transport is a method which begins with a random search of the path space, and when energetic paths are found, reuses this information by exploring the nearby space of rays.\nTo the right is an image showing a simple example of a path of rays recursively generated from the camera",
"to the heavy moss and fern growth on their sunlit sides.\nApart from the short walking track to the viewing platform, the cave is undeveloped and in its natural state. Delicate ferns and mosses grow on the cave's sloping floor, and phytokarst stalagmites also grow towards the light, similarly following the growth pattern of the plant life that helps form and shape them.\nDuring winter months, sunlight reaches the back wall of the cavern, creating viable conditions for some species of algae to survive at the lower limit of light availability for photosynthesis. These algae cover the rear walls in a",
"mining magnate. He explored the cave with six other miners. One by one, the miners lowered themselves down into the sinkhole. They carried lanterns for light and spent hours studying the cave walls carefully searching for signs of mineral deposits. They went as far as the Shoe Room, because on one side was the Gulf of Doom, which they believed was the bottomless pit after throwing rocks down the Gulf of Doom and hearing no sound. On the other side was the Cloud Room, which was filled to the ceiling with bat guano. The miners returned to the surface late",
"used to detect faint objects orbiting bright visible stars, including Gliese 229B.\nSensitive telescopes equipped with charge-coupled devices (CCDs) have been used to search distant star clusters for faint objects, including Teide 1.\nWide-field searches have identified individual faint objects, such as Kelu-1 (30 ly away).\nBrown dwarfs are often discovered in surveys to discover extrasolar planets. Methods of detecting extrasolar planets work for brown dwarfs as well, although brown dwarfs are much easier to detect.\nBrown dwarfs can be powerful emitters of radio emission due to their strong magnetic fields. Observing programs at the Arecibo Observatory and the Very Large Array have",
"stone bar, connecting two walls of the cave, is clearly visible just below the waterline, both in above-water photographs and in underwater photos.\nDepending on the season, the ideal moment to visit the cave is between 11 AM and 12 noon. At this time of day the sunlight reflects through the water coming from the white floor of the cave and bathes the grotto in aquamarine light, while objects in the water appear to be silver. The Blue Grotto (Italian: Grotta Azzurra) on the island of Capri in Italy is also famous for this type of phenomenon.\nThe cave was formed by",
"Blue Grotto (Biševo) The grotto First described and painted by Baron Eugen von Ransonet, the cave was originally accessible only by diving as it had one natural entrance below the sea level. Based on his suggestion, an artificial entrance large enough for small boats was built in 1884.\nThe natural entrance to the cave, located on its southern side, is said to resemble a vault on the ceiling of a grotto. It is through this submarine-like opening on the ceiling of the cave that sunlight gets in and creates an iridescent blue glowing effect all around the cave. As well, a",
"Dual photon Dark photon The dark photon is a spin-1 boson associated with a U(1) gauge field, which could be massless and behaves like electromagnetism. But, it could be unstable and massive, quickly decays into electron-positron pairs, and interact with electrons.\nThe dark photon was first suggested in 2008 by Lotty Ackerman, Matthew R. Buckley, Sean M. Carroll, and Marc Kamionkowski to explain the 'g–2 anomaly' in experiment E821 at Brookhaven National Laboratory,. Nevertheless, it was ruled out in some experiments such as the PHENIX detector at the Relativistic Heavy Ion Collider at Brookhaven.\nIn 2015, the Hungarian Academy of Sciences's Institute",
"unconnected. The two documented and recorded Copper Mine adits fed northwards from the mine below a shallow valley, into the river course directly below the Listed Mill on Mullion Mill Farm. From there the water flows into the Cove some 400 yards (370 m) away. With Torchlight Cave, sometimes referred to in the 19th century as the \"Great Cave\", being such an important site for visiting Victorian tourists, the fact that it is now so much more difficult to reach on foot- only for short periods during the lowest tides- it is therefore a strong indicator of a rising sea level,",
"foul gases before looking inside. \"At first I could see nothing,\" he wrote, \"the hot air escaping from the chamber causing the candle flame to flicker, but presently, as my eyes grew accustomed to the light, details of the room within emerged slowly from the mist, strange animals, statues, and gold — everywhere the glint of gold.\" After a pause, Carnarvon asked, \"Can you see anything?\" Carter replied, \"Yes, wonderful things.\" Investigation Carter's team opened the tomb on November 29, and they made the first announcement and press conference the next day. They removed the first item from the tomb",
"which radiates as much far infrared light from its central region as all of the stars in the Milky Way combined. This is due to the dust at the center of M82 being heated by an unknown source. Human body detection Some human proximity sensors use passive infrared sensing in the far infrared wavelength to detect both static and/or moving human bodies.",
"Area. As its name suggests, there is a river in the cave. Entrance To enter the cave visitors ride a boat that an employee steers. The visitors wait for the boat at a building located in the front of the mountain. Rocks of Strange Shapes The stones inside the cave sometimes have interesting shapes, such as Snow Piled Up. Illumination These stones are lit up by lights with different colors.",
"ceiling from time to time but only if the area has previously collapsed. Candles are the only source of light. Humidity inside the mines is at 100%. Since the holes are situated high on mountainsides and deep inside said mountains, the temperature is cool and bearable, but after several hours the air becomes stale. During rain the mines are forced to close. The holes fill up quickly with water, and there is little point in pumping it out again (although sometimes this is done) because the unsecured walls may crumble. Variations Dominican amber can be found in many colors, besides",
"Arctomys Cave Exploration Arctomys Cave was discovered in 1911, and first reported in the Canadian Alpine Journal in 1912 by mountaineer A.O. Wheeler who, accompanied by Conrad Kain, Byron Harmon George Kinney and 'Curly' Phillips, had descended to a waterfall at a depth of about 80 metres, stating that: \"Beyond that the going is wet and the exploration was not carried further, as there was no change in the character of the subterranean shaft.\" There is no record of subsequent visitation until 1971 - 1973 when cavers from the McMaster University Climbing and Caving Club, Guelph University Caving Club,",
"designed the lighting system and dramatic placement of lights still in use today. The cave winds that enticed the explorers further into the cave fascinated Herb, and in 1966 he produced an important scientific paper explaining reasons for these barometric winds. The Conn's book, \"The Jewel Cave Adventure,\" serves not only as a record of their years of cave exploration here, but as an exciting tale of adventure even for non-cavers.\nIn years 1963-1965, when exploration trips into Jewel Cave were restricted, the Conns joined David Schnute exploring Wind Cave. In 1963 the trio found new passages breaking away from the",
"most enduring part of the spectrum; other parts of the spectrum—red, yellow, and finally green—are absorbed during their path through water, but blue light manages to reach the white sand and return upon reflection. They are very big and cool. \nThe deepest blue hole in the world at 300.89 meters (987 feet) deep is in the South China Sea and is named the Dragon Hole, or Longdong. The second deepest blue hole in the world with underwater entrance at 202 metres (663 ft) is Dean's Blue Hole, located in a bay west of Clarence Town on Long Island, Bahamas. Other",
"water reaching certain depths, different proteins, because of the wavelengths and intensities of light they are capable of absorbing, are better suited to different depths. Theoretically, some fish eyes can detect light as deep as 1000 m. At these depths of the aphotic zone, the only sources of light are organisms themselves, giving off light through chemical reactions in a process called bioluminescence.\nFluorescence is simply defined as the absorption of electromagnetic radiation at one wavelength and its reemission at another, lower energy wavelength. Thus any type of fluorescence depends on the presence of external sources of light. Biologically functional fluorescence",
"the cave. The pools of crystal blue waters draw attention because of the presence of calcite, a mineral found in limestones such as those found in this cave. So far there is no project for the preservation of the cave by governmental agencies, but those visiting the site recognizes the need to keep this natural treasure intact. Gruta do Padre was formerly known as Caverna Canabrava, a calcareous cave in the dry caatinga region, municipality of Santana, state of Bahia.",
"and amphibians sense light via a third parietal eye—a structure associated with the pineal gland—which serves to regulate their circadian rhythms, and for navigation, as it can sense the polarization of light. C.W. Leadbeater claimed that by extending an \"etheric tube\" from the third eye, it is possible to develop microscopic and telescopic vision. It has been asserted by Stephen Phillips that the third eye's microscopic vision is capable of observing objects as small as quarks. According to this belief, humans had in far ancient times an actual third eye in the back of the head with a physical",
"the activities of cave explorers, called speleologists, had been dismissed as more of a sport than a science, meaning that underground karstic caves and their associated watercourses were, from a scientific perspective, understudied. Chemistry The development of karst occurs whenever acidic water starts to break down the surface of bedrock near its cracks, or bedding planes. As the bedrock (typically limestone or dolomite) continues to degrade, its cracks tend to get bigger. As time goes on, these fractures will become wider, and eventually a drainage system of some sort may start to form underneath. If this underground drainage system does",
"beam, or \"hot spot\") of a few degrees corresponds to a spot light, useful for searching for distant objects; beam widths of 20 degrees or more are described as flood lights, suitable for lighting a wide nearby area. Typically even a flashlight beam with a small hot spot will have some light visible as \"spill\" around the spot.",
"perfectly concealed (100%) hole, where an object could be placed and hidden from view, is not probable. The problem is the following: in order to carry images, light propagates in a continuous range of directions. The scattering data of electromagnetic waves, after bouncing off an object or hole, is unique compared to light propagating through empty space, and is therefore easily perceived. Light propagating through empty space is consistent only with empty space. This includes microwave frequencies.\nAlthough mathematical reasoning shows that perfect concealment is not probable because of the wave nature of light, this problem does not apply to electromagnetic"
] |
Randomness | [
"This is a really interesting question. I hope you'll forgive the wall of text.\n\nYou're right, rolling a dice is not really random. With enough information about the precise starting conditions, and enough computing power, you could predict where it would land. We say it is 'deterministic'.\n\nHowever, it is what can be called a 'chaotic system' which means that a very small change in the starting conditions can lead to a wildly different evolution of the system, making it unfeasible to predict the outcome with any accuracy. Certainly, it is unpredictable enough for a friendly game of Monopoly. \n\nWhether the universe is deterministic is an open question. At tiny scales, the universe appears to be probabilistic. For example, very small particles do not have a well defined position.\n\nThink of an electron bound to an atom. It is inaccurate to think of it as a little ball zooming around, like a planet orbiting a star. Instead, its position is most accurately described by a \"probability density\" Which means that we can take any point in the space in the atom and say \"there is X percent probability of finding the electron here at a given time\", but until you actually make a measurement you cannot know for certain.\n\nIt is important to stress that this inability to know exactly where an electron will be is NOT due to incomplete knowledge of physics, or imperfect equipment, or any other technical disadvantage. It is fundamentally impossible because the electron simply *does not have* a well defined position, until a measurement forces it to be somewhere (we describe this as 'collapse of the wavefunction'.)\n\n\nSome processes, such as radioactivity, are probabilistic. We can say what the probability of a particle decaying in a given time period is, but not say for sure whether or not it will. Now, the obvious answer to this is that there are actually hidden variables, things we don't know because our knowledge of physics is incomplete. If we DID know them then we would be able to predict everything with 100% accurate and the universe would be deterministic. This is now getting to the limit of my knowledge, but the prevailing opinion amongst physicists, due to something called 'Bell's theorem', is that there are no hidden variables and the universe truly is probabilistic, rather than deterministic. \n\nNow we know that on macroscopic scale the universe is *effectively* deterministic. This is because for the universe to behave in a way we don't expect (based on out laws of physics) you would have to have many trillions of probabilities simultaneousl go in one particular way. Like, flip a coin a million times. sure, it's possible that it'll come up heads every time, but realistically, it isn't going to happen.\n\nThe degree to which a probabilistic microscopic universe translates into an indeterministic macroscopic universe is an interesting question to think about. Maybe the universe is a chaotic system, like your dice. Perhaps if, 13.7 billion years ago, a neutron had decayed into a proton one nanosecond later than it actually did, then the unvierse would be a completely different place (ever heard of the butterfly effect?) \n\nOr perhaps the microscopic probabilities really don't matter on a macroscopic scale.\n\nFurther reading if you are interested. I've linked to the Wikipedia articles, but you may find more accessible articles using google.\n\n[Determinism](_URL_5_)\n\n[Free will](_URL_1_)\n\n[Hidden variables](_URL_6_)\n\n[Wave function collapse](_URL_0_)\n\n[Chaos theory](_URL_3_)\n\n[Butterfly effect](_URL_4_)\n\n[The uncertainty principle](_URL_2_)",
"> How can you can a dice roll random since it depends on the state of the dice and the way you throw it?\n\nA dice roll is not really random, just unpredictable.\n\n > Crap, is life all pre-determined but seems random because there are just so many variables you might as well call it random but it's not?\n\nThe common understanding of quantum mechanics is that it implies that our universe is in fact *not* pre-determined. That are other ways of looking at quantum mechanics where the universe is pre-determined. There's no universal consensus."
] | [
"of a test for randomness. This contrasts with the idea of randomness in probability; in that theory, no particular element of a sample space can be said to be random.\nMartin-Löf randomness has since been shown to admit many equivalent characterizations — in terms of compression, randomness tests, and gambling — that bear little outward resemblance to the original definition, but each of which satisfies our intuitive notion of properties that random sequences ought to have: random sequences should be incompressible, they should pass statistical tests for randomness, and it should be impossible to make money betting on them. The existence",
"randomness is a fundamental property of mathematics and not an accident of Martin-Löf's particular model. The thesis that the definition of Martin-Löf randomness \"correctly\" captures the intuitive notion of randomness has been called the Martin-Löf–Chaitin Thesis; it is somewhat similar to the Church–Turing thesis. Interpretations of the definitions The Kolmogorov complexity characterization conveys the intuition that a random sequence is incompressible: no prefix can be produced by a program much shorter than the prefix.\nThe null cover characterization conveys the intuition that a random real number should not have any property that is “uncommon”. Each measure 0 set can be",
"Random group In mathematics, random groups are certain groups obtained by a probabilistic construction. They were introduced by Misha Gromov to answer questions such as \"What does a typical group look like?\"\nIt so happens that, once a precise definition is given, random groups satisfy some properties with very high probability, whereas other properties fail with very high probability. For instance, very probably random groups are hyperbolic groups. In this sense, one can say that \"most groups are hyperbolic\". The few-relator model of random groups The simplest model of random groups is the few-relator model. In this model, a number of",
"Applications of randomness Randomness has many uses in science, art, statistics, cryptography, gaming, gambling, and other fields. For example, random assignment in randomized controlled trials helps scientists to test hypotheses, and random numbers or pseudorandom numbers help video games such as video poker.\nThese uses have different levels of requirements, which leads to the use of different methods. Mathematically, there are distinctions between randomization, pseudorandomization, and quasirandomization, as well as between random number generators and pseudorandom number generators. For example, applications in cryptography usually have strict requirements, whereas other uses (such as generating a \"quote of the day\") can use a",
"randomness of its own—often described by a different equation driven by a different Brownian Motion—the model is called a stochastic volatility model.",
"formal analysis of probability and randomness.\nThe first known suggestion for viewing randomness in terms of complexity was made by Leibniz in an obscure 17th-century document discovered after his death. Leibniz asked how one could know if a set of points on a piece of paper were selected at random (e.g. by splattering ink) or not. Given that for any set of finite points there is always a mathematical equation that can describe the points, (e.g. by Lagrangian interpolation) the question focuses on the way the points are expressed mathematically. Leibniz viewed the points as random if the function describing them",
"as random.\nA sufficient reason is sometimes described as the coincidence of every single thing that is needed for the occurrence of an effect (i.e. of the so-called necessary conditions). Such view could perhaps be also applied to indeterministic systems, as long as randomness is in a way incorporated in the preconditions. Schopenhauer's Four Forms According to Schopenhauer's On the Fourfold Root of the Principle of Sufficient Reason, there are four distinct forms of the principle.\nFirst Form: The Principle of Sufficient Reason of Becoming (principium rationis sufficientis fiendi); appears as the law of causality in the understanding.\nSecond Form: The Principle of",
"random numbers; the original ERNIE used a gas neon diode. In contrast, pseudorandom numbers, although sometimes simply referred to as random, are produced deterministically by the algorithm used to generate them. The randomness of ERNIE's numbers derived from random statistical fluctuations in the physical processes involved. ERNIE's output was independently tested each month by the Government Actuary's Department, the draw being valid only if it was certified to be statistically consistent with randomness. At the end of its life it was moved to Bletchley Park's National Museum of Computing. \nERNIE 5, the latest model, was brought into service in March",
"ones as random if it is not biased by having the frequency stability property i.e. the frequency of zeros goes to 1/2 and every sub-sequence we can select from it by a \"proper\" method of selection is also not biased.\nThe sub-sequence selection criterion imposed by von Mises is important, because although 0101010101... is not biased, by selecting the odd positions, we get 000000... which is not random. Von Mises never totally formalized his definition of a proper selection rule for sub-sequences, but in 1940 Alonzo Church defined it as any recursive function which having read the first N elements of",
" the field of probability and in more applied disciplines concerning random phenomena, due to its convenient properties as a mathematical model as well as being mathematically interesting. Depending on the setting, the process has several equivalent definitions as well as definitions of varying generality owing to its many applications and characterizations.\nA Poisson point process is defined on some underlying mathematical space, called a carrier space, or state space, though the latter term has a different meaning in the context of stochastic processes. The Poisson point process can be defined, studied and used in one dimension,",
"random (in the sense of being invented out of thin air by the author, not in a modern technical sense). See also Eugenio Montale, Theatre of the Absurd.\nRandomness in music is generally thought to be postmodern, including John Cage's chance derived Music of Changes, stochastic music, aleatoric music, indeterminate music, or generative music. Other uses Random numbers are also used in situations where \"fairness\" is approximated by randomization, such as selecting jurors and military draft lotteries. In the Book of Numbers (33:54), Moses commands the Israelites to apportion the land by lot.\nOther examples include selecting, or generating, a \"Random Quote",
"sample space can be said to be random.\nMartin-Löf randomness has since been shown to admit many equivalent characterizations — in terms of compression, randomness tests, and gambling — that bear little outward resemblance to the original definition, but each of which satisfy our intuitive notion of properties that random sequences ought to have: random sequences should be incompressible, they should pass statistical tests for randomness, and it should be difficult to make money betting on them. The existence of these multiple definitions of Martin-Löf randomness, and the stability of these definitions under different models of computation, give evidence that Martin-Löf",
"Randomization Applications Randomization is used in statistics and in gambling. Statistics Randomization is a core principle in statistical theory, whose importance was emphasized by Charles S. Peirce in \"Illustrations of the Logic of Science\" (1877–1878) and \"A Theory of Probable Inference\" (1883). Randomization-based inference is especially important in experimental design and in survey sampling. The first use of \"randomization\" listed in the Oxford English Dictionary is its use by Ronald Fisher in 1926. Randomized experiments In the statistical theory of design of experiments, randomization involves randomly allocating the experimental units across the treatment groups. For example, if an experiment compares",
"Poisson clumping Poisson clumping, or Poisson bursts, is the phenomenon wherein random events may appear to have a tendency to occur in clusters, clumps, or bursts. Etymology Poisson clumping is named for the 19th-century French mathematician Siméon Denis Poisson, who is known for his work on definite integrals, electromagnetic theory, and probability theory and is the namesake of the Poisson distribution. History The Poisson process provides a description of random independent events occurring with uniform probability through time or space (or both). The expected number λ of events in a time interval or area of a given measure is proportional",
"Convergence of random variables In probability theory, there exist several different notions of convergence of random variables. The convergence of sequences of random variables to some limit random variable is an important concept in probability theory, and its applications to statistics and stochastic processes. The same concepts are known in more general mathematics as stochastic convergence and they formalize the idea that a sequence of essentially random or unpredictable events can sometimes be expected to settle down into a behavior that is essentially unchanging when items far enough into the sequence are studied. The different possible notions of convergence",
"should be non-random. However, the halting probability Ω is and 1-random; it is only after 2-randomness is reached that it is impossible for a random set to be . Weaker than Martin-Löf randomness Additionally, there are several notions of randomness which are weaker than Martin-Löf randomness. Some of these are weak 1-randomness, Schnorr randomness, computable randomness, partial computable randomness. Yongge Wang showed \nthat Schnorr randomness is different from computable randomness. Additionally, Kolmogorov-Loveland randomness is known to be no stronger than Martin-Löf randomness, but it is not known whether it is actually weaker. \nAt the opposite end of the",
"quantum randomness Quantum indeterminacy is often understood as information (or lack of it) whose existence we infer, occurring in individual quantum systems, prior to measurement. Quantum randomness is the statistical manifestation of that indeterminacy, witnessable in results of experiments repeated many times. However, the relationship between quantum indeterminacy and randomness is subtle and can be considered differently.\nIn classical physics, experiments of chance, such as coin-tossing and dice-throwing, are deterministic, in the sense that, perfect knowledge of the initial conditions would render outcomes perfectly predictable. The ‘randomness’ stems from ignorance of physical information in the initial toss or throw. In",
"random events or phenomena with suitable Poisson point processes. The more rigorous methods involve deriving upper bounds on the probability metrics between the Poisson and non-Poisson point processes, while other methods can be justified by less formal heuristics. Clumping heuristic One method for approximating random events or phenomena with Poisson processes is called the clumping heuristic. The general heuristic or principle involves using the Poisson point process (or Poisson distribution) to approximate events, which are considered rare or unlikely, of some stochastic process. In some cases these rare events are close to being independent, hence a Poisson point",
"mathematicians to formally address randomness in 1909, and introduced normal numbers. In 1919 Richard von Mises gave the first definition of algorithmic randomness via the impossibility of a gambling system. He advanced the frequency theory of randomness in terms of what he called the collective, i.e. a random sequence. Von Mises regarded the randomness of a collective as an empirical law, established by experience. He related the \"disorder\" or randomness of a collective to the lack of success of attempted gambling systems. This approach led him to suggest a definition of randomness that was later refined and made mathematically rigorous",
"address chance and randomness. Around 400 BC, Democritus presented a view of the world as governed by the unambiguous laws of order and considered randomness as a subjective concept that only originated from the inability of humans to understand the nature of events. He used the example of two men who would send their servants to bring water at the same time to cause them to meet. The servants, unaware of the plan, would view the meeting as random.\nAristotle saw chance and necessity as opposite forces. He argued that nature had rich and constant patterns that could not be the",
"one possible outcome of a process.\nMethods for obtaining random numbers have existed for a long time and are used in many different fields (such as gaming). However, these numbers suffer from a certain bias. Currently the best methods expected to produce truly random sequences are natural methods that take advantage of the random nature of quantum phenomena.",
"small expected running time, whatever the input order. Randomness In theory, randomization functions are assumed to be truly random, and yield an unpredictably different function every time the algorithm is executed. The randomization technique would not work if, at every execution of the algorithm, the randomization function always performed the same mapping, or a mapping entirely determined by some externally observable parameter (such as the program's startup time). With such a \"pseudo-randomization\" function, one could in principle construct a sequence of calls such that the function would always yield a \"bad\" case for the underlying deterministic algorithm. ",
"random numbers. It attempts to constantly replenish the pool, depending on the level of importance, and so will issue a random number. In computational complexity In theoretical computer science, a distribution is pseudorandom against a class of adversaries if no adversary from the class can distinguish it from the uniform distribution with significant advantage.\nThis notion of pseudorandomness is studied in computational complexity theory and has applications to cryptography.\nFormally, let S and T be finite sets and let F = {f: S → T} be a class of functions. A distribution D over S is ε-pseudorandom against F if for",
"come from the unexpected — yet humans later convince themselves that these events are explainable in hindsight.\nOne problem, labeled the ludic fallacy by Taleb, is the belief that the unstructured randomness found in life resembles the structured randomness found in games. This stems from the assumption that the unexpected may be predicted by extrapolating from variations in statistics based on past observations, especially when these statistics are presumed to represent samples from a normal distribution. These concerns often are highly relevant in financial markets, where major players sometimes assume normal distributions when using value at risk models, although market returns",
"of random element in which a single outcome is selected from some family of functions, where the family consists some class of all maps from the domain to the codomain. For example, the class may be restricted to all continuous functions or to all step functions. The values determined by a random function evaluated at different points from the same realization would not generally be statistically independent but, depending on the model, values determined at the same or different points from different realisations might well be treated as independent. Random process A Random process is a collection of random variables,",
"short segment than would be predicted by chance, a phenomenon known as insensitivity to sample size. Kahneman and Tversky interpret this to mean that people believe short sequences of random events should be representative of longer ones. The representativeness heuristic is also cited behind the related phenomenon of the clustering illusion, according to which people see streaks of random events as being non-random when such streaks are actually much more likely to occur in small samples than people expect.\nThe gambler's fallacy can also be attributed to the mistaken belief that gambling, or even chance itself, is a fair process that",
"but generally proceeds to discuss the properties of random variables and stochastic sequences assuming some definition of randomness. The Bourbaki school considered the statement \"let us consider a random sequence\" an abuse of language. Early history Émile Borel was one of the first mathematicians to formally address randomness in 1909. In 1919 Richard von Mises gave the first definition of algorithmic randomness, which was inspired by the law of large numbers, although he used the term collective rather than random sequence. Using the concept of the impossibility of a gambling system, von Mises defined an infinite sequence of zeros and",
"at least the length of the string. This is a different meaning from the usage of the term in statistics. Whereas statistical randomness refers to the process that produces the string (e.g. flipping a coin to produce each bit will randomly produce a string), algorithmic randomness refers to the string itself. Algorithmic information theory separates random from nonrandom strings in a way that is relatively invariant to the model of computation being used.\nAn algorithmically random sequence is an infinite sequence of characters, all of whose prefixes (except possibly a finite number of exceptions) are strings that are \"close to\" algorithmically",
"electronic noise studies, engineering, and operations research. Many methods of statistical analysis, such as the bootstrap method, require random numbers. Monte Carlo methods in physics and computer science require random numbers.\nRandom numbers are often used in parapsychology as a test of precognition. Statistical sampling Statistical practice is based on statistical theory which is, itself, founded on the concept of randomness. Many elements of statistical practice depend on randomness via random numbers. Where those random numbers fail to be actually random, any subsequent statistical analysis may suffer from systematic bias. Elements of statistical practice that depend on randomness include: choosing a",
"of sampling variability. Random error is just that: random. It can occur during data collection, coding, transfer, or analysis. Examples of random error include: poorly worded questions, a misunderstanding in interpreting an individual answer from a particular respondent, or a typographical error during coding. Random error affects measurement in a transient, inconsistent manner and it is impossible to correct for random error.\nThere is random error in all sampling procedures. This is called sampling error.\nPrecision in epidemiological variables is a measure of random error. Precision is also inversely related to random error, so that to reduce random error is to increase"
] |
Do cell phone companies limit/throttle data because there actually is a bandwidth shortage, or is it a cash grab? | [
"The incentive to throttle bandwidth is \n1) Generally to ensure everyone using the network has a decent speed \n2) To try to limit the growth of data usage. \n\nThere is only so much data that can be passed through a antenna/radio. The limits are simply physics. Typically, the higher the frequency, the more data per unit time can be transferred. The downside being higher frequencies do not travel as far, nor do they penetrate buildings nearly as well. \nAs more and more people use data more and more intensively, there comes a point when no one can use anything effectively. If you have ever shared wifi, you know what happens. Someone is watching a HD stream, meanwhile, the total available remaining bandwidth is reduced. \nThe two most common solutions are adding more frequencies used (ie adding more data channel). This is very expensive as new antennae must be installed, new radios added (very expensive on their own), etc. And each frequency has its own quirks. \nThe second option is adding more towers to a network. Which is far more expensive then adding equipment. \nAs well, while the cost of data falls every week for cellular providers, they must balance extracting every last dollar they can from their customers against providing effective service to those same customers. If your provider gave truest unlimited data, even for a high price, very soon everyone would start using more data. Eventually this causes everyone on a tower to have download speed issues, as there simply is no room left within the spectrum for data transmission. \nThis is why cell company's deploy temporary cell sites at large festivals. Otherwise there network gets slammed, no one can send a text, let alone place a call and everyone gets angry at their phones. \nThe cell companies are currently undergoing a massive upgrade. Several (several!!!) new frequencies are being added. \nSource: I work in the industry. Also, if you are not afraid of working at heights, willing to work away from home (a lot), you should consider a career change. The industry is booming and a lot of places are having manpower shortages. Plus the pay is good. God bless overtime. \nSource: Overworked guy dealing with industry wide labor shortages.",
"The first statement is the most correct and has the most facts. Cellular bandwidth is simple physics vs consumer usage. Take Sprint for example. Sprint currently owns the 2500, 1900 and 800 hertz spectrum. 2500 and 1900 both cover 3G and 4G LTE data speeds as they are higher frequency the wave will cross the center point more times in the same duration opposed to the 800 hertz frequency which is primarily used for 1x and light 3G speeds. 800 hertz is a slower, stronger wavelength which has much more penetration power, this is why going downtown or in hospitals you will constant see 1x speeds as opposed to 3G. 1x is limited to talk and text as trying to load data is useless. Now that you understand how it works take it into context with consumer usage. You have a buffet restaurant with 50 chairs. If all chairs are full you can't seat anymore customers, some customers decide to eat outside. Those are your 1x customers. It's much more difficult for them to get service because they are in what we will call a deadzone. The other 50 customers inside are all of your 3G and 4G customers. If they all sit there for 6 hours and do nothing but eat then you will have no opportunity to provide the best service to other incoming customers, meaning your profits for the day will rest with those 50 customers. When you set a limit on how much they eat or how long they can stay they will eventually have to get up and go you can serve other customers. This is data throttling on an unlimited plan. If the first 100,000 people in your area each get a seat at unlimited high speed data and leave none for your you're likely to pursue business elsewhere so your needs can be met. Both unlimited plans available through Sprint and T Mobile now stream at lower quality video, the data is still unlimited but you take up as much bandwidth from the tower as you stream at a lower quality however there is a cap at the top 3% of customers over 23GB MAY see reduced speeds in times of heavy traffic. This throttle is to ensure everyone gets what they pay for. If we both pay for unlimited data and I go through 30GB of data and you use 1GB it's only fair you get the opportunity to utilize the data you pay for as well. \n\nCurrent T Mobile Customer and Sprint Equipment Support employee.",
"There is no doubt that the US has some of the highest cell phone/data charges in the world. Verizon are currently advertising 5GB for $55/mo (plus tax), whereas in the UK I can get 5GB on Vodaphone for £17/mo (incl. VAT), which is less than $14.\n\nThere is definitely a cash grab going on somewhere. Whether it is specifically in the area of data limits I don't know. Seems like the general cost of plans is just gargantuan.",
"There's no incentive to artificially throttle bandwidth. If a provider can supply a greater bandwidth than a competitor, they'll do it. If a provider is already providing the greatest bandwidth in the market, then they will still provide the greatest bandwidth they can to drive the competition out. If a provider is the monopoly, then they'll provide the greatest bandwidth that is economical for them to extinguish any rising competition. My theory is there is no cash grab."
] | [
"speed of access to data, slowing down the user's internet use. By region As of October 2015, there were 58 wired broadband providers in the US that used data caps, among them major wireless cell phone providers such as Verizon Wireless and AT&T.\nBefore 2010 there was a trend of providing unlimited data without bandwidth throttling. In the United States the Federal Communications Commission has fined service providers for offering unlimited data in a way that misled consumers. In June 2015, the FCC fined AT&T Mobility US$100,000,000 for misleading consumers. In October 2016 the FCC reached a settlement with T-Mobile in",
"share radio channels and spatial subchannels via short-range wireless links. This means that as the cluster grows, the available instantaneous data bandwidth per user also grows. Thus, instead of the data bandwidth per user being hard-limited by the laws of Physics (i.e., the Shannon-Hartley Theorem), data bandwidth is constrained only by computational processing power, which keeps improving according to Moore’s Law. Despite the great potential for client-side Cooperative MIMO, a user-based infrastructure is more difficult for service providers to monetize, and there are additional technical challenges.\nWhile mobile relays can reduce overall transmission energy, this savings can be offset by circuit",
"data users On August 31, 2015, T-Mobile announced it will ask users who abuse its unlimited on-smartphone data plan by violating T-Mobile's Terms & Conditions regarding tethering (which like unlimited on-smartphone data, remains unlimited, but offers a 14 GB high speed allotment before throttling takes effect), by permanently removing user access to unlimited plans and migrating users to a tiered data plan. By doing so, all plans after a select amount of inclusive high-speed data, result in automatic throttled speeds, preventing unlimited high-speed tethering use and abuse of the network. T-Mobile stated that there are a small handful of users",
"discouraging online usage in users due to the fear of incurring overage charges for any bandwidth consumed once one's data cap has been exceeded. This results in further difficulties for low income families and minority groups regarding being able to afford and make significant use of high speed internet access at home.\nPlans offered by new entrant ISPs frequently have higher data caps than those offered by incumbent ISPs, with some new entrant plans offering unlimited bandwidth during times of the day when overall network use is lower. Some plans offered by new entrant carriers also feature no data cap at",
"massive increases in demand for communications bandwidth due to increased use of the Internet, and commercialization of various bandwidth-intensive consumer services, such as video on demand. Internet protocol data traffic was increasing exponentially, at a faster rate than integrated circuit complexity had increased under Moore's Law. From the bust of the dot-com bubble through 2006, however, the main trend in the industry has been consolidation of firms and offshoring of manufacturing to reduce costs. Companies such as Verizon and AT&T have taken advantage of fiber-optic communications to deliver a variety of high-throughput data and broadband services to consumers' homes.",
"compete in the Internet market. ISPs claimed that many customers transfer a lot of data through their Internet connections due to the explosion of high-definition video streaming options (e.g. YouTube, Netflix, the websites of TV networks, etc.), which placed a strain on their networks. Experts have argued that this is not a valid reason to implement a pay-as-you-go style system to cover costs as each ISP has enough network infrastructure to handle each customer maximizing their bandwidth rate per second simultaneously, and each gigabyte of bandwidth used per customer has a cost as low as $0.03 CAD according to Teksavvy,",
"cell phone, no busy signals when dialing, and no failed downloads on the Internet (for example).\nG-PON and XG-PON access networks are typically oversubscribed, with typical load-factors of approaching 256:1, due its point-to-multipoint architecture. Internet ISPs regularly sell more bandwidth or connectivity than they have. When Internet bandwidth becomes overused, all customers' service tends to be degraded without necessarily failing completely. Web hosting In the web hosting industry, the term is used to describe a situation in which a company provides hosting plans that are unsustainable if every one of its customers uses the full extent of services advertised. The term",
"latency problems, faced by terrestrial IPTV networks with insufficient bandwidth as their customer base grows, may be solved by the high capacity of satellite distribution.\nSatellite distribution does suffer from latency – the time for the signal to travel up from the hub to the satellite and back down to the user is around 0.25 seconds, and cannot be reduced. However, the effects of this delay are mitigated in real-life systems using data compression, TCP-acceleration, and HTTP pre-fetching.\nSatellite latency can be detrimental to especially time-sensitive applications such as on-line gaming (although it only seriously affects the likes of first-person shooters while many",
"be made, subject to the capabilities of that mobile network. Network congestion Users may share access over a common network infrastructure. Since most users do not use their full connection capacity all of the time, this aggregation strategy (known as contended service) usually works well and users can burst to their full data rate at least for brief periods. However, peer-to-peer (P2P) file sharing and high-quality streaming video can require high data-rates for extended periods, which violates these assumptions and can cause a service to become oversubscribed, resulting in congestion and poor performance. The TCP protocol includes flow-control mechanisms that",
"which is the case especially in wireless networking, resources may be assigned to only one or very few data flows per physical channel in the network. If there are many simultaneously active data flows, a majority of the data flows will have to wait until the most inexpensive flows have no more data to transfer, and will suffer from scheduling starvation.\nA maximum throughput scheduling policy may be tempting since it would optimize the resource utilization in a given network, but it would not be likely to maximize profit for the network operator. The levels of customer satisfaction would remain low",
"smartphone sales increased by 42% from 2010.\nMobile operators are facing an explosion in wireless data use, which is projected to grow 18-fold from 2011 to 2016 per the latest Cisco VNI forecast.\nWith the use of mobile devices increasing so rapidly, and almost half of the traffic on mobile internet networks being accounted for by video sessions, mobile service providers have begun to recognize the need to provide higher quality video access while using the lowest possible bandwidth.\nWith the release of the iPhone 5 in September 2012, it has been predicted that LTE networks might experience decreased data speeds as streaming",
"customers who allegedly use excessive bandwidth. Comcast has declined to disclose a numerical bandwidth limit, arguing that the limit is variable on a monthly basis and dependent on the capacity of specific cable nodes. Comcast claims this policy only affects users whose bandwidth consumption is among the top one percent of high-speed internet customers. Statements issued by Comcast in response to press inquiries suggest that excessive usage is generally defined as several hundred gigabytes per month. However, their terms of service state that a customer's use should not \"represent (in the sole judgment of Comcast) an overly large burden on",
"parts of the day, when heavy Internet usage and Internet streaming devices can make telephone calls on this system difficult. However, by utilizing Cable Lab's Packet Cable interface specifications, cable operators are able to diminish the effects of heavy internet usage on call quality. This is done by way of QoS provisions present in the Packet Cable specifications. \nThe second disadvantage it that this service requires power at the subscriber's end. In an emergency, if mains power is lost and without the battery backup unit provided at an additional cost by the cable provider, this telephone",
"which they would pay US$48,000,000 for failing to disclose restrictions on their unlimited data plans. Justification U.S. internet service providers have most recently asserted that data caps are needed in order to provide \"fair\", tiered services at different price points based on speed and usage.\nIn 2016, Sonic.net CEO Dane Jasper criticized the historical assertions that data caps are meant to conserve network capacity, arguing that the cost of actually delivering service had \"declined much faster than the increase in data traffic\". When Sonic was first established in 2008, its infrastructure costs were equivalent to 20% of its revenue, but these",
"companies such as AT&T and Verizon have their own throttling policy because they are sometimes required to limit users’ traffic to maintain the quality of the entire network. Recently, however, throttling has become a controversial issue because some companies infringe upon this policy. For example, AT&T had to pay US$850 to one customer to compensate for slowing down data speeds because they violated the terms of unlimited smartphone data contracts. In response to these complaints from smartphone subscribers, AT&T announced that they would change their policy for unlimited data users. Blocking (port blocking) Port blocking includes the deliberate decision by",
"carriers in the provision of fixed broadband service, mobile virtual network operators (MVNO) also exist which use incumbent infrastructure to provide mobile services in an attempt to make the market more competitive. Data caps Many high speed internet packages offered in Canada have data caps, or online data consumption limits that when surpassed will result in additional charges being applied to a user's monthly bill. Data caps in Canada can be as low as 20GB, which is over six times lower than the lowest data cap in the United States of 150GB. Data caps contribute to the digital divide by",
"bandwidth-delay product is large is that of geostationary satellite connections, where end-to-end delivery time is very high and link throughput may also be high. The high end-to-end delivery time makes life difficult for stop-and-wait protocols and applications that assume rapid end-to-end response.\nA high bandwidth-delay product is an important problem case in the design of protocols such as Transmission Control Protocol (TCP) in respect of TCP tuning, because the protocol can only achieve optimum throughput if a sender sends a sufficiently large quantity of data before being required to stop and wait until a confirming message is received from the receiver,",
"vendor called Sandvine developed the network management technology that throttled P2P file transfers.\nThose that could have their bandwidth throttled are typically someone who is constantly downloading and uploading torrents, or someone who just watches a lot of online videos. Many consider this as an unfair method of regulating the bandwidth because consumers are not getting the required bandwidth even after paying the prices set by the ISPs. By throttling the people who are using so much bandwidth, the ISPs claim to enable their regular users to have a better overall quality of service. Throttling vs. capping Bandwidth throttling works by",
"revenue In the first quarter of 2016 came from 802.11ac devices. Interference Wi-Fi connections can be disrupted or the Internet speed lowered by having other devices in the same area. Wi-Fi protocols are designed to share channels reasonably fairly, and often works with little to no disruption. However, many 2.4 GHz 802.11b and 802.11g access-points default to the same channel on initial startup, contributing to congestion on certain channels. Wi-Fi pollution, or an excessive number of access points in the area, can prevent access and interfere with other devices' use of other access points as well as with decreased signal-to-noise ratio",
"Multi-frequency network Data networks, such as wireless communication networks, have to trade off between services customized for a single terminal and services provided to a large number of terminals. For example, the distribution of multimedia content to a large number of resource limited portable devices (subscribers) is a complicated problem. Therefore, it is important for network operators, content retailers, and service providers to have a way to distribute content and/or other network services in a fast and efficient manner and in such a way as to increase bandwidth utilization and power efficiency.",
"which use less bandwidth. Poor network performance increases customer dissatisfaction and leads to a decline in service revenues.\nDPI allows the operators to oversell their available bandwidth while ensuring equitable bandwidth distribution to all users by preventing network congestion. Additionally, a higher priority can be allocated to a VoIP or video conferencing call which requires low latency versus web browsing which does not. This is the approach that service providers use to dynamically allocate bandwidth according to traffic that is passing through their networks. Tiered services Mobile and broadband service providers use DPI as a means to implement tiered service",
"a tactic that allows information and telecommunication companies to regulate network traffic and control network congestion. This type of measure is viewed as a limitation on users’ upload and download speeds (rates) of content. Comcast, one of the major ISPs, conducted bandwidth throttling on 49% of its customers who were using bandwidth for P2P file sharing. After Comcast’s actions were exposed, the Federal Communications Commission (FCC) ordered the company to stop throttling on a large scale. In particular, this form of net bias frequently targets heavy mobile users who consume large amounts of content (packets), like unlimited data plans. Mobile",
"resource problem The wireless spectrum is a limited resource and shared by all nodes in the range of its transmitters. Bandwidth allocation becomes complex with multiple participating users. Often users are not aware that advertised numbers (e.g., for IEEE 802.11 equipment or LTE networks) are not their capacity, but shared with all other users and thus the individual user rate is far lower. With increasing demand, the capacity crunch is more and more likely to happen. User-in-the-loop (UIL) may be an alternative solution to ever upgrading to newer technologies for over-provisioning. Channel Shannon's theorem can describe the maximum data rate",
"automatically throttle back on the bandwidth being used during periods of network congestion. This is fair in the sense that all users that experience congestion receive less bandwidth, but it can be frustrating for customers and a major problem for ISPs. In some cases the amount of bandwidth actually available may fall below the threshold required to support a particular service such as video conferencing or streaming live video–effectively making the service unavailable.\nWhen traffic is particularly heavy, an ISP can deliberately throttle back the bandwidth available to classes of users or for particular services. This is known as traffic shaping",
"mobile Internet usage on an unlimited plan. Current COO Stewart Lyons claimed that \"If they [Mobilicity customers] use too much data, too quickly, we slow [them] down and then we speed [them] back up.\"\nOn October 19, 2012, Mobilicity addressed the issue of unclear policies by publishing a mobile broadband fair use policy. It states that customers can use a minimum of 6 GB at full basic HSPA speed. By choosing a premium plan or add-on, one can obtain a larger allowance of 20 GB and premium HSPA+ speeds. This policy, similar to the practices of Wind",
"for unused data is credited back to the user's account, while overuse of data results in a charge of $10 per gigabyte. When outside the United States, cellular phone calls cost $0.20 per minute, data costs the same $10 per gigabyte (i.e. there are no extra data charges outside of the US), and texting is free. Data is free at full speeds between 6GB to 15GB for the duration of the billing cycle with Bill Protection. After 15GB, data continues to be free but will be throttled to unspecified speeds. A data-only SIM card can be used on",
"data tiers for specific types of usage. AT&T indicated that tiered pricing may be brought on in the future for LTE data plans. Metro PCS MetroPCS has been accused of violating net neutrality by their proposed tiered cell phone data services. With some of these services being capped at a certain maximum, this violates various agreements for an open Internet. Sprint Sprint is implementing tiered data plans for their mobile broadband products. The plans come in 3GB, 5GB, and 10GB capacities. Sprint previously claimed to have unlimited service, as this is their first venture into tiered pricing schemes. Verizon Verizon",
"total bandwidth. In response some ISPs are considering, are experimenting with, or have implemented combinations of traffic based pricing, time of day or \"peak\" and \"off peak\" pricing, and bandwidth or traffic caps. Others claim that because the marginal cost of extra bandwidth is very small with 80 to 90 percent of the costs fixed regardless of usage level, that such steps are unnecessary or motivated by concerns other than the cost of delivering bandwidth to the end user.\nIn Canada, Rogers Hi-Speed Internet and Bell Canada have imposed bandwidth caps. In 2008 Time Warner began experimenting with usage-based pricing in",
"and devices.\nAlternatively, the User-in-the-loop paradigm mitigates the data crunch by shaping the demand side by involving all the users, which makes expensive over-provisioning obsolete.\nBandwidth allocation can also be used in reference to the computing industry, in scenarios such as allocating bandwidth to a web site running on a server, or allocating bandwidth to a computer on a network. Allocations in computing are often administered/enforced by terminating or temporarily suspending access once the allocated bandwidth has been utilized. Setting it to high increases download speed and the connectivity of other devices on the network. USA The Federal Communications Commission (FCC) is",
"may decrease to around 1 Mbit/s before it drops out altogether. The reason is that wireless devices dynamically negotiate the top speed at which they can communicate without dropping too many data packets."
] |
How does the United States Profit from War? | [
"Increased production, mainly. Government contractors are contracted for not only more equipment, but in general R & D increases in wartime. This in turn increases tax revenue from the various ways corporations and employees are taxed. WWII, for instance, saw a massive boost in manufacturing in the U.S.\n\nWhether or not that can be considered a 'profit' is a whole 'nuther conversation.",
"It depend.\n\nIn WW2 the benefit was that it was pretty much an governmental investment to growth all factories in the country. So after the war, company would have those super huge efficient factory to produce good. Factories that they might not had enough money to build before the war. In the current year, wars usually don't produce a lot of new factories. Some factories growth, but not only for specific type. \n\nThe other advantage is technological advance. Basically, again it's state investment into research and development that create new technology that will be used later in the civilian sector to create new or better product to sell. You can get the same type of return in advanced racing (Formula One) or space exploration.\n\nThird and most importantly, it increase the influence of your country over other country and their resources. Let say that for example that company in your country invested a lot of money to develop oil industry in another country. Let say that company name is APOC for exemple. APOC is selling oil from that other country and giving you a portion of the profit through taxes. But let say that this other country is suddenly deciding that it want to get control over their own oil and keep all the profit for themselves. After all it's their oil.\n\nBut at the same time, the company sent their money to develop the infrastructure to extract and sell that oil so they feel cheated. You are also angry because suddenly you lose a bunch of taxe money. So now as a governement you gonna need to make cuts in your budget or increase taxes on your population. Either of these option will be popular and non popular decision mean less vote in the next election. At the same time, a lot of people use to work for APOC in your country and they might be jobless suddenly. \n\nNow if you could spend a couple of millions or billions to overthrown that government, then the new government will be happy to help you keep control of the oil. People in will keep their jobs, APOC will keep selling oil and you gonna get millions each years in taxes from that.\n\nIf you do nothing. Maybe the new government will be hostile toward you. Maybe they will choose to not sell oil to you and the price of oil in your country will be a little bit higher than others because of that. Slowly down your economy.",
"It's not the nation that profits. It's not the taxpayers that profit. Its not the soldiers that profit. Companies that get contracts with the US government are the ones that profit. \n\nLet's say I sell bullets and missiles. If the US isn't at war, they don't need to buy them or buy that many. If the US is at war, they have to buy them because they are using them and I can get rich by landing a contract to sell the government that equipment.\n\nAdditionally, because I'm making so much money, I can use some of that money to donate to the campaigns of congressmen or representatives that may have some influence on whether or not we go to war or who gets what contracts (both which can increase my sales, and increase their re-election campaign budget).\n\nYou may think, this is wrong! This can't be legal! But it totally happens. This doesn't just happen with ammunition and weapons. It can happen with electrical generators, construction projects, anything that can be contracted. A friend of mine who served two tours in Iraq said the electrical generators for their camps were owned by a company connected to the Cheney family, the then US Vice President. The soldiers in the camp were not trained to nor allowed to repair the generators. Instead they had to call the company that maintained them for repair, and that company was getting paid by the government. \n\nAre you interested in sitting in the desert, in the safety of a base? At one point you could make over 100k for a 1 year contract with a 1 month vacation in the middle, and all you had to do was harass soldiers about how many rounds of ammunition they had and keep a checklist. If you're making that much money, imagine the company paying you got 300k+ to land the contract and create that job."
] | [
"War economy United States The United States alone has a very complex history with wartime economies. Many notable instances came during the twentieth century in which America's main conflicts consisted of the World Wars, Korea, and Vietnam. World War I In mobilizing for World War I, the United States expanded its governmental powers by creating institutions such as the War Industries Board (WIB) to help with military production. Others, such as the Fuel Administration, introduced daylight saving time in an effort to save coal and oil while the Food Administration encouraged higher grain production and “mobilized a spirit of self-sacrifice",
"oil – for military uses, and persuaded businesses to convert to military production.\" Two-thirds of the American economy had been integrated into the war effort by the end of 1943. Because of this massive cooperation between government and private entities, it could be argued that the economic measures enacted prior to and during the Second World War helped lead the Allies to victory. Present Day The United States has been involved in numerous military endeavours within the Middle East and Latin America since the 1960s. Having been in a continuous state of war since the September 11 Attacks and having",
"90% of the people in farming, and only 10% in cities, the American economy proved resilient and able to support a sustained war, which lasted from 1775 to 1783.\nThe American Revolution (1775–1783) brought a dedication to unalienable rights to \"life, liberty, and the pursuit of happiness\", which emphasize individual liberty and economic entrepreneurship, and simultaneously a commitment to the political values of liberalism and republicanism, which emphasize natural rights, equality under the law for all citizens, civic virtue and duty, and promotion of the general welfare.\nBritain's war against the Americans, French and Spanish cost about £100 million. The Treasury borrowed 40%",
"though it was interrupted by economic experiments during the disastrous Great Leap Forward.\nAt the end of the war, the United States produced roughly half of the world's industrial output. The US, of course, had been spared industrial and civilian devastation. Further, much of its pre-war industry had been converted to wartime usage. As a result, with its industrial and civilian base in much better shape than most of the world, the US embarked on an economic expansion unseen in human history. US Gross Domestic Product increased from $228 billion in 1945 to just under $1.7 trillion in 1975.",
"of the most commonly cited benefits for the economy is higher GDP growth. This has occurred throughout all of the conflict periods, other than in the Afghanistan and Iraq war period. Another benefit commonly mentioned is that WWII established the appropriate conditions for future growth and ended the great depression. In previous cases, such as the wars of Louis XIV, the Franco-Prussian War, and World War I, warfare serves only to damage the economy of the countries involved. For example, Russia's involvement in World War I took such a toll on the Russian economy that it almost collapsed and greatly",
"be eleven percent of gross world product (GWP) or 9.46 trillion dollars. Everyday activities of a community or country are disrupted and property may be damaged. When people become misplaced, they cannot continue to work or keep their businesses open, causing damages to the economy of countries involved. A government may decide to direct money to fund war efforts, leaving other institutions with little or no available budget.\nIn some cases war has stimulated a country's economy (World War II is often credited with bringing America out of the Great Depression). According to the World Bank the event that conflicts subside",
"war. Many assets are wasted and in some few cases created specifically to fight a war. War driven demands may be a powerful stimulus for the accumulation of capital and production capability in limited areas and market expansion outside the immediate theatre of war. Often this has induced laws against perceived and real war profiteering.\nThe total hours worked in the United States rose by 34 percent during World War II, even though the military draft reduced the civilian labor force by 11 percent.\nWar destruction can be illustrated by looking at World War II. Industrial war damage was heaviest in Japan,",
"would tax all \"unreasonable\" profits, both corporate and individual, and thereby support his declared need for over $10 billion in revenue for the war and other government measures. Congress overrode Roosevelt's veto to pass a smaller revenue bill raising $2 billion.\nIn 1942, with the United States now in the conflict, war production increased dramatically, but fell short of the goals established by the president, due in part to manpower shortages. The effort was also hindered by numerous strikes, especially among union workers in the coal mining and railroad industries, which lasted well into 1944. Nonetheless, between 1941 and 1945, the",
"four years of the War from $824.8 million in 1913 to $2.25 billion in 1917. Loans from American financial institutions to the Allied nations in Europe also increased dramatically over the same period. Economic activity towards the end of this period boomed as government resources aided the production of the private sector. Between 1914 and 1917, industrial production increased 32% and GNP increased by almost 20%. The improvements to industrial production in the United States outlasted the war. The capital build-up that had allowed American companies to supply belligerents and the American army resulted in a greater long-run rate of",
"to $19 billion in fiscal year 1919. In addition to spending on its own military build-up, the United States provided large loans to the Allied countries, helping to prevent the economic collapse of Britain and France. By the end of the war, the United States had become a creditor nation for the first time in its history. Seeking to avoid the high levels of inflation that had accompanied the heavy borrowing of the American Civil War, the Wilson administration sought to further increase taxes during the war. The War Revenue Act of 1917 raised the top tax rate to 67",
"a military budget over double of its two largest military rivals, some consider the United States to be a war economy or at least a country with an economy largely backed by the Military Industrial Complex. World War I Germany has experienced economic devastation following both World Wars. While this was not a result of faulty economic planning, it is important to understand the ways that Germany approached reconstruction. In World War I, the German agricultural sector was hit hard by the demands of the war effort. Not only were many of the workers conscripted, but lots of the food",
"military build-up, the United States provided large loans to the Allied countries, helping to prevent the economic collapse of Britain and France. By the end of the war, the United States had become a creditor nation for the first time in its history.\nSeeking to avoid the high levels of inflation that had accompanied the heavy borrowing of the American Civil War, the Wilson administration imposed further increase taxes during the war. The War Revenue Act of 1917 and the Revenue Act of 1918 raised the top tax rate to 77 percent, greatly increased the number of Americans paying the income",
"elements that may partially compensate (or at least appear to compensate) for the havoc inflicted and incurred.\" Brief statements about the American Civil War and her engagement in World War II follow, which illustrate how the United States emerged, both times, as an \"economic power\" in the world, after both wars. Washington Post criticism A Washington Post blog published concerns about Rachel Maddow's possible conflict of interest in her published New York Times review of this book.",
"Society initiatives of the 1960s, national policy makers relied principally on fiscal policy to influence the economy.\nDuring the world wars of the twentieth century, the United States fared better than the rest of the combatants because none of the First World War and relatively little of the Second World War was fought on American territory (and none on the then 48 states). Yet, even in the United States, the wars meant sacrifice. During the peak of Second World War activity, nearly 40 percent of U.S. GDP was devoted to war production. Decisions about large swaths of the economy were largely",
"of the Defense Department budget. Overall the U.S. federal government is spending about $1 trillion annually on defense-related purposes.\nIn a 2012 story, Salon reported, \"Despite a decline in global arms sales in 2010 due to recessionary pressures, the United States increased its market share, accounting for a whopping 53 percent of the trade that year. Last year saw the United States on pace to deliver more than $46 billion in foreign arms sales.\" The defense industry also tends to contribute heavily to incumbent members of Congress.\nThe concept of a military–industrial complex has been expanded to include the entertainment and creative",
"Congress since September 2001.\nJoseph Stiglitz, former chief economist of the World Bank and winner of the Nobel Prize in Economics, and Linda Bilmes of Harvard University, have stated the total costs of the Iraq War on the US economy will be three trillion dollars in a moderate scenario, described in their book The Three Trillion Dollar War and possibly more in a study published in March 2008. Stiglitz has stated: \"The figure we arrive at is more than $3 trillion. Our calculations are based on conservative assumptions...Needless to say, this number represents the cost only to the United States. It",
"in the context of the Iraq Wars. Some political analysts maintain that the hidden reason for both 1991 and 2003 wars can be traced to strategic control of international energy resources. Others counter this analysis with the numbers related to its economics. According to the latter group of analysts, U.S. has spent about $336 billion in Iraq as compared with a background current value of $25 billion per year budget for the entire U.S. oil import dependence Policy Energy policy is the manner in which a given entity (often governmental) has decided to address issues of energy development including",
"effort.\nLate in the war, Congress asked individual colonies to equip their own troops, and pay upkeep for their own soldiers in the Continental Army. When the war ended, the United States had spent $37 million at the national level and $114 million at the state level. The United States finally solved its debt problems in the 1790s when Alexander Hamilton founded the First Bank of the United States in order to pay off war debts and establish good national credit.",
"Department of Defense. Defense's share of the overall U.S. economy has generally declined in recent decades, from Cold War peaks of 14.2% of GDP in 1953 and 69.5% of federal outlays in 1954 to 4.7% of GDP and 18.8% of federal outlays in 2011.\nThe proposed base Department of Defense budget for 2012, $553 billion, was a 4.2% increase over 2011; an additional $118 billion was proposed for the military campaigns in Iraq and Afghanistan. The last American troops serving in Iraq departed in December 2011; 4,484 service members were killed during the Iraq War. Approximately 90,000 U.S. troops were serving",
"natural resources such as oil are tied to increased likelihood of conflict onset, and other natural resources such as diamonds are tied to increases in conflict duration. This is because natural resources may lower the startup cost of war, and provide rebels with an easy way of financing prolonged conflicts. Natural resources may also make the state a more lucrative prize for capture, further decreasing the opportunity cost of insurgency. For the same reason, Collier and Hoeffler also conclude that states with low per capita GDP are more likely to experience civil war, because low average income makes wage earning",
"Financial costs of the American Revolutionary War The American Revolutionary War inflicted great financial costs on all of the combatants, including the United States of America, France, Spain and Great Britain. France and Great Britain spent 1.3 billion livres and 250 million pounds, respectively. The United States spent $400 million in wages for its troops. Spain increased its military spending from 454 million reales in 1778 to over 700 million reales in 1779. Initial boycotts The economic warfare between Great Britain and the colonists began well before the colonies declared their independence in 1776. Regulations from the crown were met",
"of the nation. The overall result was a dramatic increase in GDP, the export of vast quantities of supplies to the Allies and to American forces overseas, the end of unemployment, and a rise in civilian consumption even as 40% of the GDP went to the war effort. This was achieved by tens of millions of workers moving from low-productivity occupations to high efficiency jobs, improvements in productivity through better technology and management, and the move into the active labor force of students, retired people, housewives, and the unemployed, and an increase in hours worked. It was exhausting; leisure",
"economy of the Thirteen Colonies combined.\nFollowing the end of the war, Britain had lost some of her most populous colonies. However, the economic effects of the loss were negligible in the long-term, and she became a global superpower just 32 years after the end of the conflict. United States The Americans began the war with significant disadvantages compared to the British. They had no national government, no national army or navy, no financial system, no banks, no established credit, and no functioning government departments, such as a treasury. The Congress tried to handle administrative affairs through legislative committees, which proved",
"2009 was $1.531 trillion U.S. dollars. 46.5% of this total, roughly $712 billion U.S. dollars, was spent by the United States. The privatization of the production and invention of military technology also leadsto a complicated relationship with significant research and development of many technologies. \nIn 2011, the United States spent more (in absolute numbers) on its military than the next 13 nations combined.\nThe military budget of the United States for the 2009 fiscal year was $515.4 billion. Adding emergency discretionary spending and supplemental spending brings the sum to $651.2 billion. This does not include many military-related items that are outside",
"war economy went into high gear, as millions of French women and colonial men replaced the civilian roles of many of the 3 million soldiers. Considerable assistance came with the influx of American food, money and raw materials in 1917. This war economy would have important reverberations after the war, as it would be a first breach of liberal theories of non-interventionism. The damages caused by the war amounted to about 113% of the GDP of 1913, chiefly the destruction of productive capital and housing. The national debt rose from 66% of GDP in 1913 to 170% in 1919,",
"US dollars) is that the Allies spent $147 billion on the war and the Central Powers only $61 billion. Among the Allies, Britain and its Empire spent $47 billion and the U.S. $27 billion (America joined after the war started) while among the Central Powers, Germany spent $45 billion.\nTotal war demanded total mobilization of all the nation's resources for a common goal. Manpower had to be channeled into the front lines (all the powers except the United States and Britain had large trained reserves designed just for that). Behind the lines labour power had to be redirected away from less",
"America. The government paid for this production using techniques of selling war bonds to financial institutions, rationing household items and creating more tax revenues. Some contribution to the US wartime manufacturing boom can be ascribed to the prior creation of the Alcoa plant in the 1930s. The Alcoa plant prepared thousands of tons of aluminum used for the production of 304,000 aeroplanes during the war. The United States quickly adjusted to the levels of production required to equip its military with the millions of war products used during World War II.",
"mobilized 22% of its total population for direct military service, more than any other nation of WWII era. Economic mobilization Economic mobilization is the preparation of resources for usage in a national emergency by carrying out changes in the organization of the national economy.\nIt is reorganizing the functioning of the national economy to use resources most effectively in support of the total war effort. Typically, the available resources and productive capabilities of each nation determined the degree and intensity of economic mobilization. Thus, effectively mobilizing economic resources to support the war effort is a complex process, requiring superior coordination and",
"certain cases, land is ceded to the victorious nations. For example, the territory of Alsace-Lorraine has been traded between France and Germany on three different occasions.\nTypically, war becomes intertwined with the economy and many wars are partially or entirely based on economic reasons. Some economists believe war can stimulate a country's economy (high government spending for World War II is often credited with bringing the U.S. out of the Great Depression by most Keynesian economists) but in many cases, such as the wars of Louis XIV, the Franco-Prussian War, and World War I, warfare primarily results in damage to the",
"therefore use its position of influence to reopen and control the [rules of the] world economy, so as to give unhindered access to all nations' markets and materials. Wartime devastation of Europe and East Asia United States allies—economically exhausted by the war—needed U.S. assistance to rebuild their domestic production and to finance their international trade; indeed, they needed it to survive.\nBefore the war, the French and the British realized that they could no longer compete with U.S. industries in an open marketplace. During the 1930s, the British created their own economic bloc to shut out U.S. goods. Churchill did not"
] |
How do battery indicators on electronic devices work? | [
"Batteries store electric potential energy, just like a loaded spring stores mechanical potential energy and a can of petrol stores chemical potential energy. \n\nHowever, lithium-ion batteries (which most modern personal mobile electronic devices use) aren't like fuel tanks in the sense that there's no way of telling precisely how much energy is left. In order to estimate the amount of energy left, they have sensors that tell when batters is about full and about empty (these are estimates), and ways to determine how much energy is being used or added. \n\nSo, if you have a 10 Wh (Watt-hour, a unit of energy), and you're charging it with 10 Watts of power, you can estimate that it'll be full in 10 hours, and also extrapolate its \"level\" at any given time. Similarly if you have a full battery and are discharging it at a given power.\n\nNow you see how the displayed \"level\" is really just an extrapolation based on when the sensors last reported a full/empty battery and the power used for charging/depleting the battery. If one of those sensors malfunctions, you'll obviously get wrong readings of battery level.",
"The function of battery indicators varies with the type of battery used. The first type is more simple, and is used with alkaline (non rechargeable batteries) and lead-acid (think car battery) batteries. If you discharge these batteries, then the voltage drops. Hav a look at the following [picture](_URL_0_): The red curve describes how the voltage drops when the battery is discharged. To give an example a device would see a voltage of about 1.15V and know that the battery is half empty.\n\nThe graphic also shows that for other battery types (like NiMH) you can't give a good estimate for the state of charge (SOC) by looking at the voltage: In most cases the device would see a battery voltage of about 1.2V and this can mean everything between 90% full to 30% full.\n\nSo what can be done instead? Every time the divice draws energy from the battery, a current flows. If the device needs much power, then the current is bigger than when the device sleeps in standby mode. Current works somewhat like water flow does, so think of the battery like a large tank of water. The tank has one tap where people can fill their bottles, and there is a water meter which measures the water that was removed from the tank. We know how big the tank is (the device knows how big the battery is) and we know that the tank is full (the device can tell this as well). Then every time somebody comes and fills their bottle, the water meter counts the amount of water dispensed. If somebody wants to know how much water is left by calculating the size of the tank minus the amount of water dispensed.\n\nThe battery indicator in the device works in a similar way: Here also a circuit measures the amount of energy used by the device. It also knows the size of the battery and then can calculate the amount of charge left."
] | [
"The simplest form of this indicator is that the wire 2 is connected to the ground side of a bulb that will light up as soon as contact is made with the rotor. This can result in a flickering light for the indicator.\nIn some vehicles an electrical wear indicator of type 2 can be doubled and one sensor is on the 50% mark while the other is when the pad is worn out. The 50% mark is stored in the vehicle ECU and can be used by workshops to estimate if the remaining lifetime of the current pads is sufficient",
"light signal (or turn on a sound alarm) to inform an employee that he or she must leave the contaminated atmosphere and change the cartridge.\nActive indicators used light or audible alarm for employee notification that is triggered by a sensor, that is usually installed in the cartridge. Such indicators allow one to replace the cartridges on time in any light and do not require the worker to pay attention to the color of the indicator. They can also be used by workers who badly distinguish different colors.\nDespite the presence of solutions for technical problems, and the availability of the established",
"starlight etc. Silicon sensors need an amplification circuit and require a power source such as batteries to operate. CdS light meters use a photoresistor sensor whose electrical resistance changes proportionately to light exposure. These also require a battery to operate. Most modern light meters use silicon or CdS sensors. They indicate the exposure either with a needle galvanometer or on an LCD screen.\nMany modern consumer still and video cameras include a built-in meter that measures a scene-wide light level and are able to make an approximate measure of appropriate exposure based on that. Photographers working with controlled lighting and cinematographers",
"indicator lights or LEDs to indicate circuit activation, deactivation or fault conditions. LEDs are used for this purpose in this style switch, being available in several colors and operating at low voltages. Single and ring-shaped groups of LEDs can thus show the current status of equipment or machines. In some products the LEDs can have two colors to show multiple status conditions, such as On (green) / Off (extinguished) / Fault (red).\nHowever, many switches indicate their status by purely mechanical means, such as by the position of a toggle handle, or the visibility of a brightly painted indicator flap. Non-mechanical",
"electrical symbols not only show where something is to be installed, but also what type of device is being installed. For example, a surface ceiling light is shown by one symbol, a recessed ceiling light has a different symbol, and a surface fluorescent light has another symbol. Each type of switch has a different symbol and so do the various outlets. There are symbols that show the location of smoke detectors, the doorbell chime, and thermostat. On large projects symbols may be numbered to show, for example, the panel board and circuit to which the device connects, and also to",
"by mains power and the battery was in a charged state. In the event of a power outage, the battery would supply power to light the sign. Early battery-backup systems were big, heavy, and costly. Modern systems are lightweight, can be installed virtually anywhere, and are integrated into the fixture, rather than requiring a separate box. As batteries improved, so did the amount of time that a fixture could remain lit on batteries.\nWhile exit signs were more visible due to large letters, even a 60-watt incandescent bulb shining through a plastic or glass cover could appear somewhat dim",
"own \"smart\" control electronics. In addition to power and ground, these provide connections for data-in, data-out, and sometimes a clock or strobe signal. These are connected in a daisy chain. Data sent to the first LED of the chain can control the brightness and color of each LED independently of the others. They are used where a combination of maximum control and minimum visible electronics are needed such as strings for Christmas and LED matrices. Some even have refresh rates in the kHz range, allowing for basic video applications. These devices are known by their part number (WS2812 being common)",
"some type of voltage indicator, such as an RF voltmeter or light bulb, attached to a pair of contacts that slide up and down the wires. When the bulb reaches a node, the voltage between the wires goes to zero, so the bulb goes out. If the indicator has too low an impedance it will disturb the standing wave on the line, so a high impedance indicator must be used; a regular incandescent bulb has too low a resistance. Lecher and early researchers used long thin Geissler tubes, laying the glass tube directly across the line. The",
"tends to be used as a value which has been calculated for a particular application for use as a comparator or against an absolute alarm threshold. A dose instrument may be subsequently used if a dose reading is required. To help with this some instruments have both dose and count rate displays.\nBattery operated meters usually have a battery level check. Ratemeters and scalers Survey meters can be ratemeters or scalers\nIn Radiation Protection, an instrument which reads a rate of detected events is normally known as a ratemeter, which was first developed by N.S.Gingrich et al. in 1936. This provided a",
"capacitance, it is good practice to locate the sensing electronics as near the sensor electrodes as possible.\nAnother measurement technique is to apply a fixed-frequency AC-voltage signal across a capacitive divider. This consists of two capacitors in series, one of a known value and the other of an unknown value. An output signal is then taken from across one of the capacitors. The value of the unknown capacitor can be found from the ratio of capacitances, which equals the ratio of the output/input signal amplitudes, as could be measured by an AC voltmeter. More accurate instruments may use a capacitance bridge",
"wording for the product package, so that the consumer can identify products tested to the standard. Testing may be carried out by the manufacturer itself or by a third-party test laboratory.\nThe FL1 standard requires measurements reported on the packaging to be made with the type of batteries packaged with the flashlight, or with an identified type of battery. Initial light output is measured with an integrating sphere photometer, 30 seconds after the light is switched on with fresh (or newly charged) batteries. The total light emitted is reported in lumens. Luminous intensity is determined by measuring the brightest spot in",
"circuit duty required. Normally these contacts are not used in motor circuits. The nomenclature is a letter followed by a three-digit number, the letter designates the current rating of the contacts and the current type (i.e., AC or DC) and the number designates the maximum voltage design values. Lighting control Contactors are often used to provide central control of large lighting installations, such as an office building or retail building. To reduce power consumption in the contactor coils, latching contactors are used, which have two operating coils. One coil, momentarily energized, closes the power circuit contacts, which are then",
"sometimes an indicator light which may be normally on or normally off per the vendor's design). In the US and Canada they are required in many potentially wet locations, including outside outlets, bathrooms, some places in kitchens, basements, and crawl spaces. They work by comparing the current flowing between the live and neutral conductors, and disconnect the circuit if the difference exceeds 4-6 milliamperes. A single receptacle is cheaper than upgrading the circuit breaker to GFCI, and can be wired to feed additional \"downstream\" receptacles so that putting one GFCI receptacle in a circuit protects all the plugs, lights, and",
"Computer monitor A computer monitor is an output device that displays information in pictorial form. A monitor usually comprises the display device, circuitry, casing, and power supply. The display device in modern monitors is typically a thin film transistor liquid crystal display (TFT-LCD) with LED backlighting having replaced cold-cathode fluorescent lamp (CCFL) backlighting. Older monitors used a cathode ray tube (CRT). Monitors are connected to the computer via VGA, Digital Visual Interface (DVI), HDMI, DisplayPort, Thunderbolt, low-voltage differential signaling (LVDS) or other proprietary connectors and signals.\nOriginally, computer monitors were used for data processing while television sets were used for entertainment.",
"context, especially in older documents, it is sometimes called a pole. On circuit diagrams, terminals for external connections are denoted by empty circles. They are distinguished from nodes or junctions which are entirely internal to the circuit, and are denoted by solid circles.\nAll electrochemical cells have two terminals, referred to as the anode and cathode or positive (+) and negative (-). On many dry batteries, the positive terminal (cathode) is a protruding metal cap and the negative terminal (anode) is a flat metal disc . In a galvanic cell such as a common AA battery, electrons flow from the negative",
"interface between the electrodes and the electrolyte. With time, the charge stored in the chemicals at the interface, often called \"interface charge\", spreads by diffusion of these chemicals throughout the volume of the active material.\nIf a battery has been completely discharged (e.g. the car lights were left on overnight) and next is given a fast charge for only a few minutes, then during the short charging time it develops only a charge near the interface. The battery voltage may rise to be close to the charger voltage so that the charging current decreases significantly. After a few hours",
"proximity sensor deactivates the display and touchscreen when the device is brought near the face during a call. This is done to save battery power and to prevent inadvertent inputs via users' faces and ears. An ambient light sensor adjusts the display brightness, which in turn saves battery power. A 3-axis accelerometer senses the orientation of the phone and changes the screen accordingly, allowing users to easily switch between page orientation modes. A geomagnetism sensor provides orientation with respect to Earth's magnetic field. The proximity sensor and the accelerometer can also be used to control and/or interact with third party",
"environment to be monitored, such as temperature or shock during travel or shipping. Also, the distance required to read the information in the tag depends on the strength of the battery. The farther away you want to be able to read the information, the stronger the output will have to be and thus the greater the power supply to accomplish this output. As these tags get more and more complex, the battery requirements will need to keep up. Thin film lithium ion batteries have shown that they can fit into the designs of the tags because of the flexibility of",
"indicates if a device is turned on or not - however it was detected. Some examples of an inherently digital input would be a 24 V DC/AC signal, current switch, an air flow switch, or a volta-free relay contact (dry contact). Digital inputs could also be pulse type inputs counting the frequency of pulses over a given period of time. An example is a turbine flow meter transmitting rotation data as a frequency of pulses to an input.\nNonintrusive load monitoring is software relying on digital sensors and algorithms to discover appliance or other loads from electrical or magnetic characteristics of",
"at the interface between the electrodes and the electrolyte, are initially affected. With time, the charge stored in the chemicals at the interface, often called \"interface charge\" or \"surface charge\", spreads by diffusion of these chemicals throughout the volume of the active material.\nConsider a battery that has been completely discharged (such as occurs when leaving the car lights on overnight, a current draw of about 6 amps). If it then is given a fast charge for only a few minutes, the battery plates charge only near the interface between the plates and the electrolyte. In this case",
"voltage on the appropriate plates. Electrons flow through that digit's grid and strike those plates that are at a positive potential.\nIf the display had been built with every segment being individually connected, the display would have required 49 wires just for the digits, with more wires being needed for all of the other indicators that can be illuminated. By multiplexing the display, only seven \"digit selector\" lines and seven \"segment selector\" lines are needed. The extra indicators (in our example, \"VCR\", \"Hi-Fi\", \"STEREO\", \"SAP\", etc.) are arranged as if they were segments of an additional digit or two or extra",
"test the amount of volts being produced by the battery cell. Take a AA battery and attach it to voltmeter to ensure that it is working properly before testing out the penny battery.\nFor an alternate way of making this that is slightly weaker, click here. This method uses USA pennies from 1945-1980 or 10 cent euro coins, alongside aluminum foil.\nIf the LED is not lighting up or if the voltmeter is not registering any electricity then a few problems could have occurred during set up. First, make sure that the matboard or cardboard pieces are moist. Less electrical energy",
"AC source, both electrodes will glow (each during alternate half cycles). These attributes make neon bulbs (with series resistors) a convenient low-cost voltage tester. By examining which electrode is glowing they can reveal whether a given voltage source is AC or DC, and if DC, the polarity of the points being tested. Voltage regulation The breakdown characteristic of glow-discharge lamps allows them to be used as voltage regulators or overvoltage protection devices. Starting around the 1930s, General Electric (GE), Signalite, and other firms made voltage regulator tubes. A voltage regulator tube was used in the Mark 6 exploder. Switching",
"Light-addressable potentiometric sensor A light-addressable potentiometric sensor (LAPS) is a sensor that uses light (e.g. LEDs) to select what will be measured. Light can activate carriers in semiconductors. History An example is the pH-sensitive LAPS (range pH4 to pH10) that uses LEDs in combination with (semi-conducting) silicon and pH-sensitive Ta₂O₅ (SiO₂; Si₃N₄) insulator. The LAPS has several advantages over other types of chemical sensors. The sensor surface is completely flat, no structures, wiring or passivation are required. At the same time, the \"light-addressability\" of the LAPS makes it possible to obtain a spatially resolved map of the distribution of the",
"electricity meters to programmable logic controllers, HVACs or other control systems. Some modern meters also supply a contact closure that warns when the meter detects a demand near a higher electricity tariff,\nto improve demand side management.\nSome meters have an open collector or IR LED output that give 32-100 ms pulses for each metered amount of electrical energy, usually 1000-10000 pulses per kWh. Output is limited to max 27 V DC and 27 mA DC. These outputs usually follow the DIN 43864 standard.\nOften, meters designed for semi-automated reading have a serial port on that communicates by infrared LED through the faceplate",
"change in battery state of discharge is captured using built-in battery voltage sensors. The first challenging idea is to convert battery voltage readings into power consumption. This is determined by state of discharge (which is total consumed energy by battery) variation within a testing interval captured by voltage sensors that will eventually drive the following equation.\n (10)\nWhere E is the rated battery energy capacity and SOD (Vi) is the battery state of discharge at voltage Vi and P is the average power consumption in the time interval t1 and t2. The state of discharge can be estimated using look up",
"Amplified electronic testers (informally called electrical tester pens, test pens, or voltage detectors) rely on capacitive current only, and essentially detect the changing electric field around AC energized objects. This means that no direct metallic contact with the circuit is required. The user must touch the top of the handle to provide a ground reference (through stray capacitance to ground), at which point the indicator LED will light up or a speaker will buzz, if the conductor being tested is live. Additional energy to light the lamp and power the amplifier is supplied by a small internal battery,",
"in capacitance between a transmitter and receiver that are on opposite sides of the sensor. The transmitter creates an electric field which oscillates at 200–300 kHz. If a ground point, such as the finger, is placed between the transmitter and receiver, some of the field lines are shunted away, decreasing the apparent capacitance. Trackpads such as those found in some Blackberry smartphones work optically, like an optical computer mouse.",
"Electronic signage Electronic signage (also called electronic signs or electronic displays) are illuminant advertising media in the signage industry. Major electronic signage include fluorescent signs, HID (high intensity displays), incandescent signs, LED signs, and neon signs. Besides, LED signs and HID are so-called digital signage. Status Electronic signs may be used indoors or outdoors. The display technologies are varied and changing quickly. Because of new display technologies, electronic signs are able to present more clear, colorful, and vivid images. Animated electronic signs gradually replace traditional static signs and increasingly take signage market share.",
"the load. Modern indicators Modern indicators that rely heavily on their supporting electronics are much more complex than their mechanical counterparts. They can not only detect and measure the shock, but also record the entire spectrum of shocks experienced over a period of several months or even years. They sometimes involve piezo-based accelerometers with low consumption of electrical power."
] |
Why is the United States focusing on job creation within the coal and fossil fuel industries when many jobs could be created in the development of renewable energy? | [
"Because places like west virginia are traditionally coal mining areas. There is no need to put renewable energy jobs there. So they see attacking coal as attacking their livelihood. Its a big shitshow of people basically saying \"Ive been a milkman and my dad was a milkman so you should be forcing people to use milkmen!\"",
"Because it's not solely about job creation, but the location of those jobs. The traditional fuel mining industries are the ones that are most disgruntled and also a significant portion of the Republican base. Renewable energy jobs are generally cropping in Democratic bases (e.g. California) so even if that created 10x the jobs it likely would have minimal benefits for those who have lost their coal mining job."
] | [
"tar sands. Others The impulse of renewable energy can create jobs through the construction of new power plants and the manufacturing of the equipment that they need, as could be seen in the case of Germany and the wind power industry. Studies about fossil fuel phase-out In the Greenpeace and EREC's Energy (R)evolution scenario, the world would eliminate all fossil fuel use by 2090.\nIn December 2015, Greenpeace and Climate Action Network Europe released a report highlighting the need for an active phase-out of coal-fired generation across Europe. Their analysis derived from a database of 280 coal plants and included",
"and wind (6.8 GW). Together, these three sources make up 93 percent of total additions. The shift from fossil fuels to renewables will be mirrored by US employment as workers turn away from jobs like coal mining and towards green jobs. This is made evident by a report published by the Bureau of Land Management published April 17, 2017 that states wind turbine service technicians are currently and projected to continue to be the fastest growing profession in the United States between 2017 and 2024 with projected growth of 108.0 percent Under Reagan Administration 1981-1989 President Reagan said,\"Trees cause",
"renewable energy, such as hydro, wind power, solar power, geothermal energy and biofuel. According to the International Energy Agency renewable energy technologies are essential contributors to the energy supply portfolio, as they contribute to world energy security and provide opportunities for mitigating greenhouse gases. Fossil fuels are being replaced by clean, climate-stabilizing, non-depletable sources of energy. According to Lester R. Brown:\n...the transition from coal, oil, and gas to wind, solar, and geothermal energy is well under way. In the old economy, energy was produced by burning something — oil, coal, or natural gas — leading to the carbon emissions that",
"fuels. With many fossil fuels such as coal, natural gas and oil resulting in 86% of the primary energy produced in the world as of 2006, the EPA has developed many programs that promote efficient energy use and improve environmental quality without disturbing our energy supply. Policies and programs The EPA has created over 40 programs and policies towards helping to deal with biofuels and greenhouse gases as well as find ways to be more energy efficient and help to slow down climate change. Their climate programs provide models and processes to inventory greenhouse gas emissions and evaluate the effects",
"earlier report from UC Berkeley demonstrated that job creation with renewables was far higher than fossil fuels, another argument in favour of the German-style program, which was then considered a great success.\nWith the success of FIT programs, and in response to RESOP issues, a number of stakeholders suggested an expansion of the program with higher rates and various changes to the connection process to simplify the workload. In particular, a number of proposals suggested adding additional classes for very small systems that would have minimal impact on the grid that could be given an express application process and pre-authorized access",
"In the 20th and 21st centuries, the primary use of coal is to generate electricity, providing 40% of the world's electrical power supply in 2005.\nFossil fuels were rapidly adopted during the Industrial Revolution, because they were more concentrated and flexible than traditional energy sources, such as water power. They have become a pivotal part of our contemporary society, with most countries in the world burning fossil fuels in order to produce power.\nCurrently the trend has been towards renewable fuels, such as biofuels like alcohols. Solid fuel Solid fuel refers to various types of solid material that are used as fuel",
"incentives to subsidies for research and development, feed-in tariffs for renewable energy and support to low-income households to pay their electric bills. Coal and Gas Fossil fuels – mainly coal and natural gas – remain the backbone of electricity generation in the U.S., accounting for 68% of installed generation capacity in 2010'\nIn 2007 the Department of Energy estimated the planned additional capacity for 2008-12 at 92 GW, most of which to be fueled by natural gas (48 GW) and coal (19GW). Nuclear power As of 2007 in the United States, there are 104 commercial nuclear reactors in the US, generating approximately 20%",
"them with renewable energy resources but rather with coal or natural gas. \nThis is because unlike renewable energy sources such as wind and solar, coal and natural gas can be used to generate electricity on a 24-hour basis. Industry and academic The American Nuclear Society (ANS) scientific and educational organization has both academic and industry members. The organization publishes a large amount of literature on nuclear technology in several journals. The ANS also has some offshoot organizations such as North American Young Generation in Nuclear (NA-YGN).\nThe Nuclear Energy Institute (NEI) is an industry group whose activities include lobbying, experience sharing",
"prices as well as the increase in regulation and legislation of coal.\nThe industry has also extensively publicized itself. They have done this by first drilling in the sites that would have the best results so that later they could apply this to more critical sites. The energy sector, needing to come up with new sources of energy for the future, embraced natural gas unquestioningly. Also environmental organizations that were trying to get the government to cut carbon emissions but didn't want to call for complete energy cutbacks, settled for advocating natural gas use as a \"bridge fuel\" into a",
"of jobs created in renewable energy will far exceed the number of jobs lost in coal-based generation. Finkel Report In June 2017 Alan Finkel released The Independent Review into the Future Security of the National Electricity Market (commonly referred to as the Finkel Report), which proposed an approach to increasing energy security and reliability through four outcomes. These would be: increased security, future reliability, rewarding consumers, and lower emissions. The report ultimately recommended a Clean Energy Target (CET) to provide incentives for growth in renewable energies.\nThe reaction to the report by scientific experts in the field leaned more towards positive.",
"natural gas in 2008. Employment According to the Financial Post, the boom in US shale oil production, using horizontal drilling and hydraulic fracturing, created thousands of jobs and reduced United States dependence on imported gas. During the 2012 presidential campaign, GOP Primary Candidate Rick Perry cited a study funded by the Marcellus Shale Coalition that fracking the Marcellus Formation is expected to create a quarter million jobs under the current policies of the Obama administration. New York state reported oil and natural gas drilling permit growth doubling from 2000–2008, contributing to 36,000 employment positions and an $8 billion economic impact",
"Employment Johnson believes the main remedy for unemployment is reducing taxation and regulation on private business, pointing to his record on budgetary reform, tax reform, immigration reform, and the environment as ending economic uncertainty. He does not believe that government can actually create jobs, but instead that it can encourage private business, which in turn creates jobs. Energy Johnson favors building new coal-fired and nuclear power plants. He supports private sector research and development of renewable energy, but does not believe that the government should subsidize it. Environment Johnson has stated that the best environmental practices are due",
"the fossil fuel industry and from an incentive to reactivate the coal industry in the US, which has been on a consistent decline from competition of renewables and natural gas. The repeal of President Obama's Stream Protection Rule could possibly endanger species by polluting ecosystems and thereby harming biodiversity. Ecological effects of coal mining include contamination of water, destruction of habitats, leaching, soil erosion and subsidence.\nFurther, on March 28, 2017, Trump signed an executive order to rewrite President Barack Obama's Clean Power Plan. Much of this incentive is driven by expanding the workforce in the coal industry, however it is",
"U.S.\n• 95% of the jobs are in private industry.\n• As many as 37 million jobs can be generated by the renewable energy and energy efficiency industries in the U.S. by 2030 – more than 17% of all anticipated U.S. employment.\n• Hottest sectors by revenue growth include solar thermal, solar photovoltaics, biofuels, and fuel cells.\n• Hot job areas include electricians, mechanical engineers, welders, metal workers, construction managers, accountants, analysts, environmental scientists, and chemists. The vast majority of jobs created by the renewable energy and energy efficiency industries are in the same types of roles seen in other industries (accountants, factory workers,",
"workforce education and community colleges contribute to the overall efforts in the move toward renewable and clean energy. The report gives examples of initiatives currently in effect nationally as well as offering information as to how to implement programs.\nIn response to high unemployment and a distressed economy workers need skills that are relevant to their specific geographical locations. \"Instead of making green jobs we need to make jobs green\" says Ken Warden, an administrator in workforce education.\nThere are a many different solar industry jobs. The SEIA maintains a resource for those looking for solar jobs.\nA 2016 study indicates that",
"existing and future oil and gas wells offers a multifaceted solution to U.S. energy, environmental, and economic challenges. There is no doubt that coal and oil resources are finite. The U.S. is in a strong position to leverage such traditional energy sources to supply future power needs while other sources are being explored and developed. For the coal industry, CO₂ EOR creates a market for coal gasification byproducts and reduces the costs associated with carbon sequestration and storage. Boundary Dam, Canada SaskPower's Boundary Dam project retrofitted its coal-fired power station in 2014 with Carbon Capture and Sequestration (CCS) technology. The",
"this established technology. The United States’ deeply rooted affiliations with the fossil fuel industry have allowed us to remain dependent on unhealthy and dangerous fuels. The East Coast and Great Lakes have an immense opportunity to produce clean energy and boost local economies by accepting offshore wind as a viable, preferable energy resource. It is in the public’s best interest to support offshore wind because of its great potential to improve our health, economy and energy security.\nWhile we as a collaborative support offshore wind as one of the many sources of renewable energy that can meet our needs, we require",
"fossil fuels to renewable energy sources. From 2000–2012 renewable energy grew at a rate higher than any other point in history, with a consumption increase of 176.5 million tonnes of oil. During this period, oil, coal, and natural gas continued to grow and had increases that were much higher than the increase in renewable energy. The following figures illustrate the growth in consumption of fossil fuels such as oil, coal, and natural gas as well as renewable sources of energy during this period. Emissions Global warming emissions resulting from energy production are an environmental problem. Efforts to resolve this include",
"Renewable energy commercialization Rationale for renewables Climate change, pollution, and energy insecurity are significant problems, and addressing them requires major changes to energy infrastructures. Renewable energy technologies are essential contributors to the energy supply portfolio, as they contribute to world energy security, reduce dependency on fossil fuels, and provide opportunities for mitigating greenhouse gases. Climate-disrupting fossil fuels are being replaced by clean, climate-stabilizing, non-depletable sources of energy:\n...the transition from coal, oil, and gas to wind, solar, and geothermal energy is well under way. In the old economy, energy was produced by burning something — oil, coal, or natural gas —",
"mostly in rural communities. According to the Renewable Fuels Association, \"the ethanol industry created almost 154,000 U.S. jobs in 2005 alone, boosting household income by $5.7 billion. It also contributed about $3.5 billion in tax revenues at the local, state, and federal levels\". Third-generation technologies Third-generation renewable energy technologies are still under development and include advanced biomass gasification, biorefinery technologies, hot-dry-rock geothermal power, and ocean energy. Third-generation technologies are not yet widely demonstrated or have limited commercialization. Many are on the horizon and may have potential comparable to other renewable energy technologies, but still depend on attracting sufficient attention and research and",
"represent 0.2% of American jobs a small but beneficial percentage. Environmental benefits The majority of electrical power generation, in the United States, comes from combustion of fossil fuels, which releases carbon dioxide and other pollutants into the atmosphere. 45% of power generation comes from coal, 23% from natural gas, and 1% from petroleum. This totals to about 70% of American electrical consumption being produced from fossil fuels. In the previous section it was discussed that in 2010 3.6 quadrillion BTU's were saved by from the implementation of energy standards. This equates to about 2.52 quadrillion BTU's of",
"fuels that will transition us to the future.\"\nAt the 2015 Renewable Energy Transition event hosted by the International Renewable Energy Agency (IRENA) and the Atlantic Council's Global Energy Center, Hochstein stated that \"unlike oil and gas, the technological advances we’re seeing in renewables are making them cheaper and better.\" He further said: \"U.S. energy security, energy sustainability and climate objectives are mutually reinforcing. As such, we are working to promote energy efficiency, conservation and transformation of energy systems. We are encouraging market reforms, such as the elimination of fossil fuel subsidies, that can address overall energy demand.\"\nHochstein has been interviewed",
"can't be generated nationally.\nAnother impact of a phase-out of fossil fuels is in the employment. In the case of employments in the fossil fuel industry, a phase-out is logically undesired, therefore, people in the industry will usually oppose any measures that put their industries under scrutiny. Endre Tvinnereim and Elisabeth Ivarsflaten studied the relationship between employment in the fossil fuel industry with the support to climate change policies. They proposed that one opportunity for displaced drilling employments in the fossil fuel industry could be in the geothermal energy industry. This was suggested as a result of their conclusion: people and",
"need for labor may be seen as an \"employment dividend\" of organic farming, providing more jobs per unit area than conventional systems. The 2011 UNEP Green Economy Report suggests that \"[a]n increase in investment in green agriculture is projected to lead to growth in employment of about 60 per cent compared with current levels\" and that \"green agriculture investments could create 47 million additional jobs compared with BAU2 over the next 40 years.\" The United Nations Environment Programme (UNEP) also argues that \"[b]y greening agriculture and food distribution, more calories per person per day, more jobs and business opportunities especially",
"came from fossil fuels, 14.1% from nuclear energy, 7% from biofuels, 2.9 from renewable energy resources.\nOverall primary energy consumption in the U.S. in 2015 relied most on petroleum (35 quadrillion British thermal units (3.7×10¹⁶ kJ)), natural gas (29×10¹⁵ BTU (3.1×10¹⁶ kJ)) and coal (16×10¹⁵ BTU (1.7×10¹⁶ kJ)). Renewables contributed 9×10¹⁵ BTU (9.5×10¹⁵ kJ) and nuclear power 8×10¹⁵ BTU (8.4×10¹⁵ kJ).\nIn the same year, about 4 million GWh of electricity were generated in the U.S., 67% of which was generated from fossil fuels (coal, natural gas, and < 1% petroleum), 20% from nuclear power, 6% hydropower and 7% other renewables.\nWhile the rise of global energy consumption with the global population growth",
"and provide appropriate opportunities to encourage renewable energy use in all critical energy market sectors: wholesale and distributed electricity generation, thermal energy applications, and transportation.\nThe report quotes President Bush on the need to diversify America's energy supply:\nIt’s in our vital interest to diversify America’s energy supply – the way forward is through technology. We must continue changing the way America generates electric power, by even greater use of … solar and wind energy. We must continue investing in new methods of producing ethanol, using everything from wood chips to grasses, to agricultural wastes.\n— President George W. Bush, State of the Union, 1-23-2007.\nACORE",
"gone to college.\nAccording to a March 26, 2008 press release from United Press International (UPI), the green-collar job sector is growing in the United States, and could include more than 14 million workers by 2017. Although it is difficult to pin down what constitutes a green-collar job, the American Solar Energy Society said there are around 8.5 million U.S. jobs that involve Earth-friendly enterprises and renewable energy sources. This figure could grow by 5 million in the next 10 years according to Jerome Ringo of the Apollo Alliance.\nGreen For All and other green-energy businesses have been receiving increased press by",
"2011, the breakdown was as follows; coal was 42%, nuclear was 19%, natural gas was 25%, renewable energy was 13% and oil dropped down to 1%. These figures show a dramatic drop in energy from coal, and a significant increase in both natural gas as well as renewable energy. \nAccording to the United States Geological Survey (USGS) data from 2006, hydroelectric power accounted for most of the renewable energy production in the United States. However, increasing government funding, grants, and incentives have been drawing many companies towards the biofuel, wind, and solar energy production industries. Moving towards renewable energy In",
"be unprofitable without subsidies. United States government role in the development of new energy industries From civilian nuclear power to hydro, wind, solar, and shale gas, the United States federal government has played a central role in the development of new energy industries.\nAmerica's nuclear power industry, which currently supplies about 20% of the country's electricity, has its origins in the Manhattan Project to develop atomic weapons during World War II. From 1942 to 1945, the United States invested $20 billion (2003 dollars) into a massive nuclear research and deployment initiative. But the achievement of the first nuclear weapon test in",
"whole.\nPresident Donald Trump pledged to bring back coal jobs during the 2016 US presidential election, and as president he announced plans to reduce environmental protection, particularly by repealing the Clean Power Plan (CPP). However, industry observers have warned that this might not lead to a boom in mining jobs A 2019 projection by the Energy Information Administration estimated that coal production without CPP would decline over coming decades at a faster rate than indicated in the agency's 2017 projection, which had assumed the CPP was in effect."
] |
Do bees know that they will die if they sting? If so, how do they prioritize when to sting and when not to? | [
"No. Bees don't \"know\" things the same way that humans do. They act pretty much entirely on instinct.\n\nAlso, bees only die if they sting mammals. They can sting other insects and be just fine, and protecting the hive against invading insects is the reason that bees have stingers in the first place. They just got unlucky that mammals have thick skin that holds onto the stingers.",
"Maybe just some more FYI information about bee stings...\n\nFemale worker bees don't reproduce - they work, so it doesn't matter if they die. It is the queen bee who reproduces and so she doesn't have a barbed stinger (thus she does not die) moreover she only stings as a very last resort. Her life is the most important, the worker bees will sacrifice themselves so that she can live.\n\n**More on Bee Stings**\n\n* **European Honeybees:** Non-native species to North America that we use pollinate our crops. [Honeybees](_URL_1_) often outcompete native wild bees, and therefore are considered invasive. Honeybees face a number of challenges to their continued survival, including but not limited to: colony collapse disorder, inbreeding, parasites, and poor diet. These guys are true colonial nesters, with a hive consisting of one queen and thousands of female worker bees. Female worker honeybees sting with a barbed stinger, and therefore only sting once. Male drones cannot sting. Queen bees have smooth stingers and can sting more than once.\n\n* **Wild bees:** These native species come in all shapes and sizes. Some are solitary and some are semi-colonial nesters, thus their \"hives\" consist of a female queen and maybe a dozen or so female workers (if any). Examples include [bumblebees](_URL_0_), alfalfa bees, mason bees, orchard bees, & parasitic bees. Female workers and queen bumblebees sting with a smooth stinger, and therefore can attack a person more than once. Male bumblebee drones lack a stinger. Bumblebees are generally less aggressive and don't sting. Some wild bees lack stingers altogether (e.g. many of the solitary bees). \n\n* **Wasps:** There are so many different kinds of wasp species and these are by and large harmless to humans - they are either solitary or parasitic to other insect or other bee/wasp species. These guys don't generally sting and don't look like your \"traditional\" wasp. The social colonial wasps are the ones most people don't like - yellow jackets, hornets, or paper wasps. These wasps can usually sting you multiple times, and only sometimes do they get their stinger lodged in the skin as their barbs are not as pronounced as a honeybee's stinger.\n\n**TL;DR:** If something stings you and leaves behind its stinger, you have probably been stung by a honeybee",
"It'd be a little misleading to say they 'know' anything, though we don't know how they perceive the world.\n\nBut as a part of a swarm, and being mostly genetically identical do others, I think individual bees aren't suppose to assign much value to it's own life beyond as a functional capital investment from the swarm's point of view. Same for ants. So if it's a choice between death or damage to the swarm, it'd choose death. \n\nAgain it might be misleading to say they make this calculation in real time, but in any case, they'd have evolved in such way that the threshold for individual bee choosing death over hive damage is tuned for maximum proliferation... or something."
] | [
"embedded. As the bee tears itself loose, the stinger takes with it the entire distal segment of the bee's abdomen, along with a nerve ganglion, various muscles, a venom sac, and the end of the bee's digestive tract.\nThis massive abdominal rupture kills the bee. Although it is widely believed that a worker honey bee can sting only once, this is a partial misconception: although the stinger is barbed so that it lodges in the victim's skin, tearing loose from the bee's abdomen and leading to its death, this only happens if the skin of the victim is sufficiently thick, such",
"structure of flesh and the stinger's barbs. In this case, the venom bulb stays with the stinger and continues to pump. Upon losing its stinger, the bee will subsequently die since the portion where the stinger bulb was removed rips out part of its insides.\nThe barbs on the stinger will not catch on most animals besides mammals and birds, which means that such animals can be stung many times by the same bee. Stingless bees There are many bees in this group, native to all continents except for Europe and Antarctica, that have workers which do not have stingers.",
"abdomen.\nWhen a honey bee stings a person, it cannot pull the barbed stinger back out. It leaves behind not only the stinger, but also part of its abdomen and digestive tract, plus muscles and nerves. This massive abdominal rupture kills the honey bee. Honey bees are the only bees to die after stinging. Treatment The first step in treatment following a honey bee sting is removal of the stinger itself. The stinger should be removed as quickly as possible without regard to method: a study has shown the amount of venom delivered does not differ whether the sting is pinched",
"death in minutes, this only happens if the skin of the victim is sufficiently thick, such as a mammal's. Honey bees are the only hymenoptera with a strongly barbed sting, though yellow jackets and some other wasps have small barbs.\nBees with barbed stingers can often sting other insects without harming themselves. Queen honeybees and bees of many other species, including bumblebees and many solitary bees, have smoother stingers with smaller barbs, and can sting mammals repeatedly.\nThe sting's injection of apitoxin into the victim is accompanied by the release of alarm pheromones, a process which is accelerated if the bee is",
"strongly barbed and lodge in the flesh of mammals upon use, tearing free from the honey bee's body, killing the bee within minutes. The sting has its own ganglion, and it continues to saw into the target's flesh and release venom for several minutes. This trait is of obvious disadvantage to the individual but protects the hive from attacks by large animals; aside from the effects of the venom, the remnant also marks the stung animal with honey bee alarm pheromone. The barbs of a honey bee's attack are only suicidal if the skin is elastic, as is characteristic of",
"bees, wasps, and ants, may use their stinger to deliver poisonous chemicals to their attacker, effectively killing both the predator and the insect in the colony's defense. This self-destructive and often altruistic defense is known as sting autonomy. The stinger is easily torn from the animal's body, allowing the hazardous stinger to be left stuck in the predator. Suicide-inducing parasitism Certain types of parasites will cause their hosts to commit suicidal behavior, through altering how the intermediate host acts, but this is not considered suicide (at least not considered suicide in a psychological or ethological sense). The change in the",
"attracted to the sting site. The worker dies after the sting becomes lodged and is subsequently torn loose from the bee's abdomen. The honey bee's venom, known as apitoxin, carries several active components, the most abundant of which is melittin, and the most biologically active are enzymes, particularly phospholipase A2.\nBee venom is under laboratory and clinical research for its potential properties and uses in reducing risks for adverse events from bee venom therapy, rheumatoid arthritis, and use as an immunotherapy for protection against allergies from insect stings. Bee venom products are marketed in many countries, but, as of 2018, there",
"Bee sting Honey bee stings A honey bee that is away from the hive foraging for nectar or pollen will rarely sting, except when stepped on or roughly handled. Honey bees will actively seek out and sting when they perceive the hive to be threatened, often being alerted to this by the release of attack pheromones (below).\nAlthough it is widely believed that a worker honey bee can sting only once, this is a partial misconception: although the stinger is in fact barbed so that it lodges in the victim's skin, tearing loose from the bee's abdomen and leading to its",
"barbed, a worker bee is less likely to become lodged into clothing than human skin.\nIf a beekeeper is stung by a bee, there are many protective measures that should be taken in order to make sure the affected area does not become too irritated. The first cautionary step that should be taken following a bee sting is removing the stinger without squeezing the attached venom glands. A quick scrape with a fingernail is effective and intuitive. This step is effective in making sure that the venom injected does not spread, so the side effects of the sting will go away",
"vertebrates such as birds and mammals; honey bees can sting other insects repeatedly without dying. \nThe sting of nearly all other bees and other sting-bearing organisms is not barbed and can be used to sting repeatedly. The description of barbed or unbarbed is not precise: there are barbs on the stings of yellowjacket wasps and the Mexican honey wasp, but the barbs are so small that the wasp can sometimes withdraw its sting apparatus from victim's skin.\nThe stings of some wasps, such as those of the Polistes versicolor, contain relatively large amounts of 5-hydroxytryptamine (5-HT) in its venoms. The",
"ganglion allowing them to continue delivering venom after they are detached, are designed to pull free of the body when they lodge. This apparatus (including barbs on the stinger) is thought to have evolved in response to predation by vertebrates, since the barbs do not function (and the stinger apparatus does not detach) unless the stinger is embedded in elastic material. The barbs do not always \"catch\", so a bee may occasionally pull its stinger free and fly off unharmed (or sting again).\nAlthough the average lifespan of a queen in most subspecies is three to five years, reports from the",
"harmful bees and wasps. Protective behavior If perturbed or threatened, an adult bee moth will fall to the ground and pretend to be dead by lying on their backs in the exact form that they landed. This is beneficial when infiltrating a host wasp or bumblebee nest as the host will be less likely to attack when it believes that the moth is dead. Male/male interactions Male sex pheromones can serve to ward off other competing males by either direct repulsion from the odor or by causing the females to stop their own calling behavior of wing fanning. Males have",
"alarm pheromone emitted when a bee stings another animal smells like a banana.\nDrone bees, the males, are larger and do not have stingers. The female bees (worker bees and queens) are the only ones that can sting, and their stinger is a modified ovipositor. The queen bee has a barbed but smoother stinger and can, if need be, sting skin-bearing creatures multiple times, but the queen does not leave the hive under normal conditions. Her sting is not for defense of the hive; she only uses it for dispatching rival queens, ideally before they can emerge from their cells. Queen",
"mechanically irritated, the ant commits suicide by exploding, spilling out a sticky, entangling substance.\nThe subfamily Dolichoderinae, which also does not possess a stinger, has a different type of defense. The anal gland secretions of this group rapidly polymerize in air and serve to immobilize predators. Leaf beetles Leaf beetles produce a spectrum of chemicals for their protection from predators. In the case of the subtribe Chrysomelina (Chrysomelinae), all live stages are protected by the occurrence of isoxazolin-5-one derived glucosides that partially contain esters of 3-nitropropanoic acid (3-NPA, beta-nitropropionic acid). The latter compound is an irreversible inhibitor of succinate dehydrogenase. Hence,",
"bee is rarely infected since afflicted bees rarely participate in feeding the queen. The most notable symptom is dysentery. This appears as yellow stripes on the outside of the hive and in severe cases, inside the hive. Bees may be unable to fly (\"crawling\") due to disjointed wings.\nFurther symptoms include increased girth of the abdomen, missing sting reflex, and early replacement of the queen. If the queen is infected, her ovaries degenerate and egg production drops due to atrophy of the oocytes, after which she is likely to be superseded. The disease pattern described by Higes et al.. in Spain",
"stings categorized into Pain Level 1 generally is five minutes or less.\nSince many small bees are categorized into a pain level of 1, most toxic polypeptides in bee venom are melittin, apamin, and MCD peptide. Melittin is the main toxin of bee venom, and it damages red blood cells and white blood cells. Apamin is a neurotoxin that augments polysynaptic reflexes. MCD peptide destroys mast cells.\nFeeling only slight pain, Schmidt has described the sting of the white-faced bee, categorized into Pain Level 1, as \"almost pleasant, a lover just bit your earlobe a little too hard.\" Also rated into Pain",
"workers are not fully sexually developed, they do not mate with drones and thus can only produce haploid (male) offspring.\nQueens and workers have a modified ovipositor called a stinger, with which they defend the hive. Unlike bees of any other genus and the queens of their own species, the stinger of worker western honey bees is barbed. Contrary to popular belief, a bee does not always die soon after stinging; this misconception is based on the fact that a bee will usually die after stinging a human or other mammal. The stinger and its venom sac, with musculature and a",
"try to attack it or decapitate the intruder. Guard bees are often responsible for the protection of the nest and will send one member to attack while the others block the entrance with their abdomens.\nNests containing only infected females are in danger of dying out. While infected bees are able to excavate burrows, they are less active than healthy bees and do not collect pollen to make cells.\nGregarine protozoa have been found generally in older specimens of L. zephyrus. It is thought that once a bee is infected, it takes time for the spores to fully develop. These parasites have",
"as a mammal's. The sting of a queen honey bee has no barbs, however, and does not autotomize. All species of true honey bees have this form of stinger autotomy. No other stinging insect, including the yellowjacket wasp and the Mexican honey wasp, have the sting apparatus modified this way, though they may have barbed stings. Two wasp species that use sting autotomy as a defense mechanism are Polybia rejecta and Synoeca surinama. \nThe endophallus and cornua portions of the genitalia of male honey bees (drones) also autotomize during copulation, and form a mating plug, which must be",
"Occasionally, the beetles will bite humans, presumably in an attempt to acquire salt, although many people feel a pricking sensation as a ladybeetle walks across the skin. Bites normally do no more harm than cause irritation, although a small number of people are allergic to bites.\nThese beetles can be difficult to identify because of their variations in color, spot size, and spot count of the elytra. The easiest way to identify H. axyridis f. succinea is to look at the pronotum and see if the black markings look like a letter \"W\" or \"M\". This species has more white markings",
"and instead grow tolerant to such attacks. However, when they detect life-threatening level of danger, the Vespula vulgaris workers will vigorously defend their nest. Unlike honey bees, which die after stinging, Vespula vulgaris can sting multiple times. This makes its sting viable for personal defense when away from the colony, and the common wasp is therefore more apt to sting. However, it will usually not sting without being provoked by sudden movement or other violent behavior.\nResearch indicates the wasps use odor to identify and attack rival wasps from other colonies, and nest odor frequently changes. Vespula vulgaris wasps have been",
"wasps, particularly mammals, are more interested in the larvae rather than the adults. Defense When a social wasp is in distress, it emits a pheromone that triggers nearby colony members into defensive mode, a greatly increased willingness and desire to sting. Wasps can sting repeatedly unlike their close relative, the bee. Stingers, which are actually modified egg-laying organs, are only found in females. Stings Common symptoms of wasp stings in humans are redness, minor swelling, and itching. In the severe allergic reaction to a sting called \"anaphylaxis,\" the body goes into shock in response to venom. This happens shortly after",
"breeders who handle multiple queens and have the queen odor on their hands are sometimes stung by a queen.\nThe main component of bee venom responsible for pain in vertebrates is the toxin melittin; histamine and other biogenic amines may also contribute to pain and itching. In one of the alternative medical uses of honey bee products, apitherapy, bee venom has been used to treat arthritis and other painful conditions. All currently available evidence supporting this practice is either anecdotal, animal studies, or preliminary evidence, most of which has poor methodology. While a preliminary, in-vitro proof of concept has demonstrated that",
"thus reducing swelling and pain. It is administered by direct insect sting, or intramuscular injections. Bee products demonstrate a wide array of antimicrobial factors and in laboratory studies and have been shown to kill antibiotic resistant bacteria, pancreatic cancer cells, and many other infectious microbes. Blister beetle and Spanish fly Spanish fly is an emerald-green beetle, Lytta vesicatoria, in the blister beetle family (Meloidae). It and other such species were used in preparations offered by traditional apothecaries. The insect is the source of the terpenoid cantharidin, a toxic blistering agent once used as an aphrodisiac. Arachnids Like plants",
"to humans due to loud noises, bright colors, and sweet smells, such as food and perfume. Typical paper wasps are relatively unaggressive, only attacking humans and animals if they or their nests are being threatened. Red paper wasps are more aggressive and their stings can be more painful; however, only females have the ability to sting. Unlike bees, wasps do not lose their stingers, thus they are able to sting multiple times. Stings Red wasp stingers do not remain in their victims. A red wasp sting is often painful and causes localized swelling and itchiness. In some cases, people",
"colony, which attracts others and stimulates aggressiveness and flight behaviour. This not only causes an individual to sting any intruders, but it also causes others to do the same. Fortunately, even though the sting is painful, its venom does not activate an allergic reaction very often. Another danger to humans caused by the Saxon wasp is the potential for disease. As stated above, the collected waste below a nest can attract many pathogens. Some examples of the potential dangers include Escherichia coli, which is the pathogen most noted in improperly prepared food; Klebsiella oxytoca, which can cause urinary tract infections;",
"genalis nest, a bee would try to guard the entrance with its abdomen, and the ant would usually retreat, as it was smaller in size than the bee. When the bee encountered larger ants, such as those of the genus Camponotus, they would bite and sting the ant, until they retreated. If this did not work, female worker bees would push out the ant with its abdomen. In contrast, with smaller ants of the genus Crematogaster they would bite and sting the ant until they died. While social colonies may be beneficial in this defense behavior, it is not necessary",
"it's ten times worse than anything else.\nThe sting does not stop several small marsupial species, including the red-legged pademelon, insects and birds from eating the leaves.\nMoroidin, a bicyclic octapeptide containing an unusual C-N linkage between tryptophan and histidine, was first isolated from the leaves and stalks of Dendrocnide moroides, and subsequently shown to be the principal compound responsible for the long duration of the stings.\nThere has been anecdotal evidence of some plants having no sting, but still possessing the hairs, suggesting a chemical change to the toxin. Treatment The recommended treatment for skin exposed to the hairs is to apply",
"that serves as a warning to other predatory species. This coloration pattern that is characteristic of many species of wasps is a somewhat universal sign that an organism stings and should, as a result, be avoided in predation. Diet P. gibbosus spend a significant amount of time loitering around flowers and other plants in search of insect prey to feed their young, most often bee species. Some common bee species that P. gibbosus predates include C. sparsus, O. pura, and E. arcuatus. Stings P. gibbosus is notable in that it stings its prey in a membranous location on the ventral",
"who has deliberately exposed himself to a variety of stinging insects for entertainment and educational purposes, was stung and declared the wasp’s sting to be the most painful one he had ever taken, more painful than that of the bullet ant or the Asian giant hornet. Coyote Peterson also said the sting can cause tissue necrosis around the site of the sting, saying, “My arm was swollen for days, and eventually a small hole rotted in my arm from the venom at the sting site.\""
] |
British Protests Against Article 50 | [
"Article 50 is the official legislation to leave Europe not the referendum. Because the vote was so close (48 to 52) and that there was 68% turn out, there was an argument to challenge the validity of the referendum for the unrepresented voice (if you include those that didn't vote) is theoretically larger than the represented party. This is why there is a protest to promote a strong effort to block this legislature is a last effort attempt to remain in Europe."
] | [
"with the Press Complaints Commission. The News of the World then issued this apology \"Contrary to the claim in our article \"EU blows millions on fact finding freebies for MEPs\" (18 May 2008), Philip Bradbourn MEP did not visit Table Mountain or a wine estate during a South Africa trip. We apologise for any embarrassment.\" Smoking incident On 12 September 2007, an article appeared in The Times referring to an incident which occurred in the European Parliament (a non-smoking building), where Bradbourn was found smoking in a corridor. When it was pointed out to him that he was not permitted",
"the boycott of the conference in protest over the speech. The BBC described the exit as a \"public relations disaster\" for the United Nations. Many of those who remained to listen to Ahmadinejad's speech applauded his remarks. The countries whose delegates participated in the walkout were: Austria, Belgium, Bulgaria, Cyprus, the Czech Republic (which left the conference for good), Denmark, Estonia, Finland, France, Greece, Hungary, Ireland, Latvia, Lithuania, Luxembourg, Malta, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, St. Kitts and Nevis and the United Kingdom.\nThe English text version of the speech, handed out by the Iranian delegation, stated that after World",
"platform of the European Parliament to express the eclipse of reason through disproportionate, unbalanced and illogical statements...\" and said that \"Rather than allowing this, it would be wiser for the EU officials to put an end to it.\"\n3 July, Cancellation of the planned construction, in Taksim area, that sparked the protests was finally made public. The court order was made in mid-June at the height of the protest but inexplicably not released for weeks.\nErdoğan gave a number of speeches dismissing the protesters, and on 3 June left the country on a planned 3-day diplomatic tour of North African countries, a",
"September 1992, and the exposure a few months earlier of an extra-marital affair in which Cabinet Minister David Mellor was involved. A month later, on 14 October, it attacked Michael Heseltine for the mass coal mine closures.\nDespite its initial opposition to the closures, until 1997, the newspaper repeatedly called for the implementation of further Thatcherite policies, such as Royal Mail privatisation, and social security cutbacks, with leaders such as \"Peter Lilley is right, we can't carry on like this\". The paper showed hostility to the European Union (EU) and approval of public spending cuts, tax cuts, and promotion of right-wing",
"States. On December 18, almost three weeks after being retweeted by Trump, the accounts of Britain First, Paul Golding and Jayda Fransen were all suspended by Twitter.\nIn a January 2018 interview with Piers Morgan for Good Morning Britain, Trump said he was not familiar with Britain First when he retweeted them, stating, \"If you are telling me they’re horrible people, horrible, racist people, I would certainly apologise if you’d like me to do that.\" South Africa In August 2018, Trump tweeted that he had asked Secretary of State Mike Pompeo to \"closely study the South Africa land and farm seizures",
"be tough.\" \"Kicking her to death\" comment Grahame Morris was criticised for his remarks in the media again in early 2012 when, during a regular appearance on Sky News Australia's PM Agenda program, he said that Australians \"ought to be kicking [Prime Minister Julia Gillard] to death.\" The comment was made in relation to Gillard's support of two MPs accused of improper and illegal conduct – Craig Thomson and Peter Slipper. Morris later apologised for the comment. The Irish \"can't grow potatoes\" comment Grahame Morris was criticised for his remarks in the media again in 2015 when, during a regular",
"emerged that the graffiti, which said, 'F*** you OMP’ may have been directed at OMP, a eurosceptic Polish think tank that had issued a statement congratulating Britain on its Brexit vote. This incident was also unsuccessfully investigated by the police. In Wales, a Muslim woman was told to leave after the referendum, even though she had been born and raised in the United Kingdom. Other reports of racism occurred as perceived foreigners were targeted in supermarkets, on buses and on street corners, and told to leave the country immediately. All such incidents were widely condemned by politicians and religious leaders.\nBy",
"enter Luxembourg. French Immigration Minister Eric Besson said that in her statement Reding \"intentionally skids, if I may say, that is she uses an expression aimed to shock, that contains an anachronistic fallacy, and that creates a false amalgam\".\nWhile some media coverage and opinion leaders supported her actions, others called for her immediate resignation.\nFollowing her initial statement, and intense discussions in the European Council and in the European Parliament, Mrs Reding announced that the European Commission intended to sue France at the European Court of Justice within two weeks. At the instigation of Mrs Reding, the European Commission later set",
"2013, 90 Queen's Counsels signed a letter sent to the Daily Telegraph that branded the cuts \"unjust\", as they would seriously undermine the rule of law. 6 January 2014 saw the first strike in British history by barristers and solicitors in protest at the cuts. In February 2014, he introduced the Criminal Justice and Courts Act 2015 to the House of Commons. The Bill included measures to outlaw \"revenge porn\". In October 2014, Grayling unveiled the Conservative Party's proposals for reforms to human rights in order to curb the European Court of Human Rights' influence over British court rulings, whilst",
"back to the 1980s. His off-the-cuff reply was that \"I was on the GLC that Mrs. Thatcher abolished, I worked for the NUM and we had the NUM strike, I think I would assassinate Thatcher\". Conservative MP Conor Burns told the BBC that \"[it was] very distasteful\" and \"a very silly remark\". McDonnell told the BBC: \"I'm sorry if I have caused offence to anyone. It was a joke and in that audience it was taken as a joke... it was taken out of context, I can see if people are upset about that and if I have caused offence",
"stand trial beginning on 18 December. Fallaci accused the judge of having disregarded the fact that Smith had called for her murder and defamed Christianity.\nIn France, some Arab-Muslim and anti-defamation organisations such as MRAP and Ligue des Droits de l'Homme launched lawsuits against Oriana Fallaci, charging that The Rage and the Pride and The Force of Reason (La Rage et l'Orgueil and La Force de la Raison in their French versions) were \"offensive to Islam\" and \"racist\". Her lawyer, Gilles William Goldnadel, president of the France-Israel Organization, was also Alexandre del Valle's lawyer during similar lawsuits against del Valle.\nOn 3",
"out in a huff\".\nThe next day, newspapers and other media sources ran headlines stating that the Queen had stormed out during the session. On 12 July, the BBC released a formal apology to both the Queen and Leibovitz. On 16 July, RDF Media admitted it was \"guilty of a serious error of judgement\"; Fincham and RDF Media chief creative officer Stephen Lambert both resigned.\nIn October 2007, the BBC released the report of its investigation into the incident. The investigation concluded that nobody at the BBC \"consciously set out to defame or misrepresent the Queen\" and that there was never a",
"Lamont to carry the can for that day's actions. On the evening of Black Wednesday and for days after, Major contemplated resigning, drafting a statement to that effect, but wrote Lamont a note instructing him not to resign.\nMajor's verdict on the ERM was that it was the medicine that cured Britain of inflation; \"it hurt but it worked.\" Speaking a few days after Black Wednesday, the Governor of the Bank of England, Robin Leigh-Pemberton, argued that \"the decision to join the ERM two years ago in the circumstances; that, having joined, we were right to endeavour to stick it out;",
"Black Wednesday and the scandal of David Mellor's resignation. Heseltine was attacked by Marcus Fox, James Pawsey, Nicholas Winterton, Bill Cash, Rhodes Boyson and his former supporter David Evans who called openly for him to be sacked.\nThe High Court found that Heseltine and British Coal had acted \"unlawfully and irrationally\". Faced with likely defeat in the House of Commons, Heseltine was forced to agree to a moratorium, during which time he attempted, largely unsuccessfully, to seek new markets for British coal and to obtain government subsidies for pits.\nThe band Chumbawamba released the critical song \"Mr Heseltine meets the public\" that",
"lost the case, on the grounds that Article 8 of the European Convention on Human Rights did not require a pre-notification and that such a measure \"might operate as a form of censorship prior to publication\" due to the severity of the civil and criminal penalties and control thereof, violating its own Article 10, \"Freedom of Expression\". Jeremy Clarkson In October 2011, Jeremy Clarkson voluntarily lifted a privacy injunction known as AMM v HXW, which had prevented the UK media from reporting claims by his former wife that they had an affair after he remarried. Clarkson commented: \"Injunctions don’t work.",
"refer the whole case to the European Court of Human Rights in Strasbourg where it was eventually dismissed. Commentary Roger Boyes, of The Times argued the protests are part of a \"new age of rebellion and riot\" in Europe, in the background of similar protests caused by the financial crisis in Latvia, Bulgaria and the civil unrest in Greece, triggered by the police killing a teenager, but with deeper roots related to the financial crisis.\nLondon School of Economics professor Robert Wade said that Iceland's government would fall within the coming days and Fredrik Erixon of the Brussels-based European Centre for",
"costs to a prominent British Muslim they falsely accused of antisemitism. The following year, she resigned from the magazine after it apologised and paid compensation for another of her pieces which, it said, contained an allegation that was \"completely false\".\nSince 2003, she has written a blog, once hosted by The Spectator, but following her resignation from the magazine in June 2011, it is hosted on her website. In September 2013, it emerged that her Mail column was to end, although according to Phillips, the newspaper wanted her to continue to write features and other articles for it.\nIn 2013, she launched",
"comments critical of the president. After receiving criticism from the government, news site La Hora indefinitely suspended the reader comments section on its website. At the president’s request, the comments section was shut down completely. Print and digital news outlet El Comercio faced similar pressure related to its readers’ comments and the comments section was ultimately disabled after President Correa sent a letter of complaint. While there are no official constraints on organizing protests over the Internet, warnings from the president stating that the act of protesting will be interpreted as \"an attempt to destabilize the government\" have undoubtedly discouraged",
"leave the union on 29 March 2019. The European Council subsequently agreed that this deadline could be extended, and UK law changes are planned to do that. Following a ruling in December 2018 by the European Court of Justice that the United Kingdom may legally revoke Article 50, the petition to do so was started on 20 February 2019 by a former college lecturer. At first slow to accrue signatures, it grew in popularity after British Prime Minister Theresa May claimed that she would not be asking the EU for a prolonged extension to Article 50. Objective The petition directly",
"El Abidine Ben Ali's palace on Google Earth to videos about civil liberties in general. The Economist said this \"turned a low-key human-rights story into a fashionable global campaign\".\nThe French intelligence agency DCRI's deletion of the French-language Wikipedia article about the military radio station of Pierre-sur-Haute resulted in the article temporarily becoming the most-viewed page on the French Wikipedia.\nA 2013 libel suit by Theodore Katsanevas against a Greek Wikipedia editor resulted in members of the project bringing the story to the attention of journalists.\nThe government of South Africa stated their intention to ban the 2017 book The President's Keepers, detailing",
"reforms of the public sector, described by the organizers as imbalanced and \"brutal.\" According to CGT 80,000 people participated in the protest in Paris, and 250,000 came out across the country. However, France Police said that 21,000 people participated in the Paris protests and that 35 protesters were detained for various \"offences\". Seven police officers were injured. Police fired tear gas and deployed 2000 officers to the event and the demonstrators were holding placards reading \"Stop Macron!\". Yellow Vests protests On October 2018, Macron announced that the carbon tax would rise in 2019. This was seen as a move crippling",
"an unfair light\", she added. Some criticized Hill's comments, including White House press secretary Sarah Huckabee Sanders, who called them \"a fireable offense by ESPN\"; Trump criticized the network and demanded an apology. Others voiced support for Hill and criticized ESPN and the White House's responses, arguing that Hill's comments were accurate and that a White House official suggesting Hill be fired infringed on the First Amendment. Coverage of the Hong Kong protests On October 8, 2019, in the wake of Chinese boycotts of the NBA after Houston Rockets general manager Daryl Morey made a Twitter post in support of",
"complaints were received by the BBC, including those about comments Bruce Forsyth, then host of Strictly Come Dancing, made about the controversy on a Talksport radio programme, in which he suggested that Britain \"used to have a sense of humour\" about such incidents, and that du Beke's apology should be accepted.\n\nFollowing the incident, and Forsyth's response, the BBC stated:\nRacially offensive language in the workplace is entirely unacceptable. Anton was right to apologise quickly and without reservation and Laila has wholly accepted his apology. Everyone is very clear that there can be no repetition of this behaviour.\nForsyth also clarified his position:\nWhat",
"the United Kingdom but was unsuccessful.\nIn February 2005, it was reported in The Times that Lamont and John Major had held up the release of papers concerning Black Wednesday under the Freedom of Information Act. The two wrote to the paper to deny the reports. Later it emerged that the source of the story had been Damian McBride, then a Treasury civil servant who as a result of this became a special adviser to the then Chancellor, Gordon Brown who in 2009 resigned from a similar position in Number 10 Downing Street following publication of emails indicating a plan to",
"It has happened to me.\" Due to statements like that and the many profanities (albeit replaced with asterisks) that she said during the interview, the article angered the military, and Alfredo Buzaid, Minister of Justice of President Emílio Garrastazu Médici's government, used it as a pretext to decree censorship to all newspapers and magazines in Brazil. The law was known as the \"Leila Diniz decree\" due to this incident. Diniz had her contract with TV Globo terminated under the excuse of \"moral problems,\" but in 1970 she was hired as a juror of TV host Flávio Cavalcanti's show on TV",
"leaving the meeting for the last time, declared \"Gentleman, you are trying to negotiate something you will never be able to negotiate. But, if negotiated, it will not be ratified. And if ratified, it will not work. Au revoir et bonne chance.\" When these alleged remarks were quoted by the then President of the European Commission, Jacques Delors, in late 1991 as illustrating the current attitudes of the British Government they were widely covered in the British press, e.g. \"The Bretherton syndrome of 'Britain knows best'\". The alleged remarks were subsequently repeated in print, on TV and on",
"in expression of opinion) was started as a result of frustration on the part of Afrikaner journalists who thought that the mainstream Afrikaans-language and English-language media lacked the courage to take on the apartheid state in South Africa. The paper was collectively owned by the founder members, who included editor Max du Preez and journalist Jacques Pauw. The editorial staff for the first edition of February 1989 comprised Karien Norval, Du Preez, Elsabe Wessels, Chris du Plessis, Pauw, Victor Munnik, and Koos Coetzee. Threat to apartheid state From the outset the state viewed the upstart paper as a threat. The",
"Burnett said her comment was meant as a joke.\nShortly after joining CNN, Burnett aired an October 4, 2011 segment on the Occupy Wall Street protests titled \"Seriously?\" in which she mocked the protesters. Journalist Glenn Greenwald reacted in a Salon article detailing bias in Burnett's reporting, which he attributed to her previous work experience on Wall Street as well as her partner's employment with Citigroup. In response to the criticism, CNN issued a statement saying, \"We support Erin and the OutFront team and we respect that there will be a range of opinions on any given story.\"\nOn October 18, 2019,",
"of 1 April. Liberal Democrat MP Chris Huhne has noted \"the canteen culture of some parts of the Met\".\nThe National Union of Journalists has considered taking legal action after Section 14 of the Public Order Act 1986 was used against journalists covering the protests on 2 April. The City of London police asked them to leave the area at the Royal Exchange for half an hour, and threatened arrest if they refused. Section 14 is to prevent \"serious public disorder, serious criminal damage or serious disruption to the life of the community\". The police earlier apologised to journalists reporting the",
"civilians. The next day (February 1), the French declared all RDA meetings illegal throughout all of French West Africa. The end result of the year of violence was over 50 dead and 3000 RDA partisans imprisoned.\nAlthough RDA members of the National Assembly stopped going to sessions because they were largely ignored, following the French Army shooting in Dimbokro, Senghor led much of the African membership to demand an inquiry into the incident. The French government secretly informed RDA politicians in March that it had no intentions of implementing the 1 February decree banning all activities by the RDA and gradually"
] |
The whole Bindi Irwin situation where she has to prove to a judge that her dad,the Crocodile Hunter Steve Irwin, is dead | [
"In certain legal systems, parents are entitled to any earnings their underaged kids might have. To prevent the money that she will earn from this show going to her parents, both her parents must sign a form stating they will not be entitled to her money. If one parent is dead, legally, a they must have proof of that. It doesn't matter if her dad was a big famous star, or even if he got killed on TV, you must produce such a certificate. It is for her own protection, and the protection of her future earnings.\n\nIt is just the internet blowing something completely normal way out of proportion. That judge knows her dad is dead, but it is required legally."
] | [
"Irwin, who was known as \"The Crocodile Hunter\". Irwin was killed by a stingray barb, while filming a documentary in 2006. \nThe crocodile park was the world's first-known memorial honoring the sportsman. A life-size plaque depicting Irwin was placed by the Kerala Forest Department at the gate of the park (though it was removed later). The Centre was inaugurated by Benoy Viswam, the Forest Minister in the Government of Kerala. Controversies In 2009, Irwin's estate sent a legal cease-and-desist notice to the park, alleging violation of intellectual property rights and instructing them to cease using Irwin's name and image",
"her pet alligator and slits her wrists after Ronnie found out the next day.\nPriya finds out that Ronnie was at the same bar and he even met Nancy the night she was killed. She feels cheated and betrayed. However, Priya becomes suspicious of Maya, lands up at the outhouse and starts accusing Maya for everything – including Nancy's murder. They get into a brawl. Maya calls Ronnie for help. Ronnie arrives but she attacks him on the head from behind and he suffers a black-out. Maya rushes to leave but finds Inspector Moses outside and kills him after he voices",
"even dodo birds, would be here.\" Trial and conviction Monica pleaded not guilty to two counts of murder, abuse of a corpse, and identity theft. Monica, despite having representation, chose to cross-examine Eric Henderson, the case's lead investigator. During the trial, an Oregon State Police anthropologist testified that Haney's legs had been dismembered with an ax, and that his thigh bones showed signs of \"being gnawed on by an animal.\" The anthropologist stated it was unclear whether Haney had been dead prior to dismemberment of his legs. It was also stated by the anthropologist that Delicino had suffered three to",
"that he will secretly pay them off. They will enforce the agreement by killing a random person and tying the death to his failure to pay.\nStanislas is released to his distraught wife and two daughters who demand explanations for his affairs and gambling, publicity for which they have suffered during his captivity. Only his dog is happy to see him. His business associates explain his reputation prohibits his return and, when he refuses to resign, tell him he will be removed. The authorities suspect that he arranged his own kidnapping to pay off his gambling debts and force him to",
"jail for his role in the dog's starvation death and neglecting the illegal alligator. His girlfriend was acquitted of the aggravated animal cruelty, drug and alligator charges but found guilty of five counts in connection with neglecting Taz. Personal life By his own description of his early family life, Cody grew up poor. His mother worked two jobs, as a traveling nurse and a bus driver, to care for him and his seven younger siblings. His parents were not married, but his father, a construction worker, was a big part of his life until he died in a car",
"that Timothy Masters was not involved in the murder of Peggy Hettrick.\"\nHe continued: \"Masters cooperated fully with our investigation, including the Grand Jury proceedings. Given the nature and extent of the Grand Jury investigation, the time has come for law enforcement to officially exonerate Timothy Masters. The Hettrick case remains open. We have made significant progress in the investigation. Our team will continue to develop evidence and we will continue to work on this case until the murderer is brought to justice. Too many lives have been affected by the events of that day. Justice requires that we continue to",
"failing to provide care for his dog, Taz. He was also found guilty of illegally possessing an alligator and of neglecting the alligator, and also two misdemeanor drug charges related to marijuana and paraphernalia that police found in his former home. The alligator was confiscated, and relocated to a sanctuary. Prosecuting state attorney Adam Lippe alleged Taz suffered more than four weeks of starvation in a cage in Cody's garage.\nOn January 4, 2016, Cody's sentencing was delayed because a psychological evaluation of Cody was being completed at the time.\nOn March 24, 2016, Cody was sentenced to nine months in",
"bribe a Gotham jury. The judge sees through White's attempt to avoid prison and has White admitted to Arkham, which White himself had never even heard of up until that point. He soon realizes the horrors of the place and tries to survive. Ultimately, he is locked in Mr. Freeze's cell and loses his nose and his lips to frostbite while trapped in there, coming to resemble his nickname. He was originally referred to as 'Fish' as new inmates commonly are, but is re-dubbed 'The Great White Shark' by himself. The demonic threat is nullified after the sacrifice of several",
"March 4, 2008, it was revealed that Theresa is alive and wasn't eaten alive by sharks. She was saved by DEA agents presumably looking to prosecute Juanita and was placed into protective custody; however, Theresa quickly escaped and met up with a Mexican woman with a plan to enter the United States illegally via a freight train, eventually returning to Harmony. She then infiltrated the Crane mansion disguised as a frumpy nanny named Gertrude. Little Ethan and Pilar realized that Gertrude was really Theresa, but were persuaded to keep quiet for the sake of the family's staying below Juanita's radar.",
"She expressed her own opinion that the real Bobby Dunbar most likely fell into Swayze Lake during the fishing trip and was eaten by an alligator. She revealed that the results of her investigation had brought joy to Julia Anderson's family as vindication of her claims, as well as to William Walters' family as an exoneration of the kidnapping accusation against him. She also said that her findings had sown discord within her own family, as the majority of her grandfather's children and grandchildren considered themselves to be members of the Dunbar family, cherished their existing familial relationships, and were",
"alligators will consume his corpse.\nMarty later realizes that he left the sheath to his diving knife at the canal. They go to retrieve the sheath, and check on the corpse, which is now being eaten by crabs. Lisa, Derek, Ali, and Heather do not believe they did anything wrong, since they did not directly participate in Bobby's actual death. Lisa decides to dispose of the knife, which is the only evidence linking them to the crime.\nUnable to maintain the secret, Derek and Lisa reveal to their other friends what they've done, while Ali phones in an anonymous tip to the",
"Mr. Hobbs confesses that he has no interest in the diamonds or the money, and wants to ruin the head of the insurance syndicate whose deliberate delay in covering his wife's medical expenses resulted in her death many years before. \nOnce the deadline for the ransom has passed, resulting in the insurance head's suicide, Mr. Hobbs leaves. Miss Quinn finds the rest of diamonds and calls Mr. Finch claiming she followed a hunch. While there is sufficient proof that she was involved in the incident, Mr. Finch is unwilling to press charges against Quinn. Finch instead acts by helping the",
"due to Petricevic's age and the effect the trial and conviction had had on his family. Justice Venning dismissed the request stating that he was not convinced the remorse shown by Petricevic was genuine.\nOn 18 May 2012, Rob Roest was also sentenced to six and a half years in jail by Justice Venning. His lawyer, Paul Dacre, had asked Justice Venning for a lower sentence than Petricevic's due to undisclosed family issues and the fact Petricevic was the ultimate \"boss\" of Bridgecorp. This was again denied with the judge stating that Roest had not shown proper remorse. On the",
"2007 he was sentenced to 15 months in state prison for theft. Fraley continued to visit and interact with him while he was incarcerated. Disappearance On April 7, 2008, Fraley came down with a stomach flu. It was severe enough that she twice sought treatment at a local hospital that day. As she had no driver's license, she relied on a social services worker, and friends and family to take her to and from the hospital.\nAfter returning from the first trip, one of Fraley's friends visited her and picked up her dog, which Fraley had been sitting for her, then",
"the same dog, one count of illegal possession of an alligator, five counts of animal abuse or neglect involving the alligator, one count of possession with intent to use the drug paraphernalia, and one count of possession of marijuana. Cody's agent, Peter Schaffer, denied his client's guilt and said that Cody's dog died of worms and that there was no animal cruelty. The investigating veterinarian said the dog was neglected and starved to death.\nOn November 16, 2015, Cody was found not guilty of two felony counts of aggravated animal cruelty but he was convicted of five other counts related to",
"It was there that Christie experienced one of the lowest moments in his career when he was fired as coach by Northerns' president Hentie Serfontein while he lay in his hospital bed. Christie described this as being fired \"like a dog\".\nBy the end of 1997, his condition worsened to the point that he sought specialised treatment in the U.S. He was able to return to rugby as a technical adviser to the Falcons in early 1998, but his condition worsened once more, entering hospital for the final time on Easter Sunday of 1998. Christie died on 22 April 1998,",
"Mr Coddrington, who has become a new trustee in the Society. He manages to get Connie thrown out of the Society by making her look dangerous. While avoiding everyone in a bid to protect her friends, she stumbles on an abandoned mine where she finds several mythical creatures, including a minotaur, who are crippled and want Connie to heal them. Meanwhile, her friends in the Society have been trying to prove Connie's innocence. She is given an opportunity to prove her innocence at a trial but on the night of her trial, Mr Coddrington helps Kullervo kidnap Connie. Using their",
"and said she was afraid of her husband and that she believed that had she originally told the truth to the police she would also be dead. Her husband had told her that Dennis was dead and instructed her to lie to the doctor.\nThe judge instructed the jury that they could not find Mrs Gough guilty of manslaughter, since only Mr Gough was strong enough to have inflicted the trauma which killed Dennis, but they could still find her guilty of neglect.\nOn 19 March 1945, Reginald Gough was convicted of manslaughter and sentenced to six years in prison. Esther Gough",
"June 2011, three men from Florida and Louisiana were indicted on charges of illegally removing wild alligator gar from the Trinity River in Texas, and attempting to ship them to Japan for private collectors. The indictments resulted from an undercover sting operation by special agents with the U.S. Fish and Wildlife Service, the Texas Parks and Wildlife Department, and the Florida Fish and Wildlife Conservation Commission. The charges included violations of three separate provisions of the Lacey Act, specifically conspiracy to submit a false label for fish transported in interstate commerce; conspiracy to transport fish in interstate commerce in",
"Jerry Walter McFadden Biography Gerald Walter McFadden was born on March 21, 1948 in Haskell County Texas. Criminal Life On May 4, 1986, McFadden (who called himself \"The Animal\") kidnapped 20-year-old Gena Turner, 19-year-old Bryan Boone, and 18-year-old Suzanne Harrison as they took a trip to Lake Hawkins north of Tyler. McFadden raped and strangled Harrison and dumped her body in a park about 25 miles from Lake Hawkins. She was found the next day. He was arrested on 6 May, after a police report from a couple he had attacked by the lake on the day of the murder.",
"The Prisoner of Shark Island Plot A few short hours after the assassination of President Abraham Lincoln (Frank McGlynn Sr.), Dr. Samuel Mudd (Warner Baxter) gives treatment to a man with a broken leg who shows up at his door. Mudd does not know that the president has been assassinated and the man who he is treating is John Wilkes Booth (Francis McDonald). Mudd is arrested for being an accessory in the assassination and is sent to prison on the Dry Tortugas, described as in the West Indies and referred to in the film as \"America's own Devil's Island\".\nAfter a",
"on how she will murder him when he returns.\nJP, voiced by Petros Emmanuel, is a parrot. He has no feathers, since losing to Trevor in a card game where he bet his entire plumage on a pair of fours. He also has two different coloured eyes and can not fly. He has a pet himself, a goldfish who has obviously been dead for a long time, although he does not acknowledge this, and continues to dote on it. He is extremely eccentric, perpetually cheerful and lives in a fantasy world of his own, often rambling on directly to the camera",
"any crimes. The FBI informant, William O'Neal, committed suicide in 1990 after admitting his involvement in setting up the raid. Inquest Shortly afterwards, Cook County coroner Andrew Toman began forming a special six member coroner's jury to hold an inquest into the deaths of Hampton and Clark. On December 23, Toman announced four additions to the jury which included two African-American men: physician Theodore K. Lawless and attorney Julian B. Wilkins, the son of J. Ernest Wilkins, Sr. He stated the four were selected from a group of candidates submitted to his office by groups and individuals representing both Chicago's",
"disappearance that they considered suspicious. The San Diego Police Department had no comment on Johansen, defending its work in the case. Arrest and trial On November 5, 2014, detectives from the San Bernardino County Sheriff's Department arrested Merritt in connection with the deaths of the McStay family after discovering that his DNA had been recovered from their car. His arrest was announced on November 7, 2014. Merritt was charged with four counts of murder, and the district attorney is seeking the death penalty. In July 2015, Merritt's defense attorney filed a request to have the case dismissed because of the",
"he died in an accident and some say he was murdered. Some theories say that he just disappeared.\nKarunananda’s wife lost her mind following her husband’s death and the family was forced onto the streets. Later one of the relatives offered to fund and take care of his family. The Sri Lankan government did not acknowledge his legacy or look after his family.",
"Mr. Bones remembers his mission and stops a perfect putt. Vince retires in disgrace, but meets a local singer, Laleti, afterwards, whom he is stricken with. Mr. Bones notices this, and by impersonating her, he kidnaps Vince.\nThe next day, Wild Boar manages to escape from the hospital and goes on a search for Vince, along with Laleti and her mother. Enraged by Vince Lee's performance, and by the fact that everyone had gone missing, the casino owner mounts a search for them in a helicopter, along with two of his henchmen. After a series of comical mishaps, they all meet",
"Canary Bird. Some of the notable supporting characters introduced are Butch, the unofficial leader among the inmates; Queen, a gay convict who's not all that smart; and Ollie, a smart black convict who's well respected by all the inmates.\nThe next morning Mrs. Bristol returns to see the Warden and this time she had brought more food for her son. She explains how she hasn't heard from her son in a while and is getting worried. The Warden explains, in a coarse manner, that her son had gone insane and had to be killed.\nThe next day, Eva talks to Jim and",
"she is the second to last person but kills the adult holding her instead, both Ellen and Carla run into the water to gather Thea and the other children off the boat, after Thea is safe, Ellen boards Jake's boat to track down the shark, intending to kill it to save the rest of her family. After hearing about what happened, Michael confesses he knew about the shark, infuriating Carla. \nMichael and Jake are flown by Hoagie to search for Ellen, and they find the shark in pursuit of their boat, during the search, Hoagie explains to Michael about Ellen's",
"Correction on January 21, 2011, for violating her probation from a conviction for attempted embezzlement. White stated, \"I just hope that the officials be able to get her in their hands, so we can just hear her side of the story now.\"\nPettway turned herself in to the FBI office at Bridgeport on the morning of January 23, 2011. She had driven from North Carolina to Connecticut to arrange for her biological son to be taken care of. Pettway told federal investigators that she kidnapped White after enduring several miscarriages because of the stress over whether \"she would ever be able",
"her missing. Margarita did claim that she and her family had searched for her daughter but were unable to locate her, for which she became the subject of much criticism and anger when Anjelica was identified in 2013. Other reports reveal that her family also neglected to report her missing because some of the family members, including Margarita, were apparently undocumented immigrants. They feared that if it was discovered that some were in the country without documentation during the course of an investigation, they would be deported. Discovery Anjelica's decomposing body was discovered on July 23, 1991, inside a navy"
] |
Why Do People Fear Darkness? | [
"Its not the darkness itself but what predators might lurk in it.",
"Because you can't see the lego bricks on the carpet",
"I've always felt invisible in the dark. I like it.",
"It's a combination between sensory deprivation and our imaginations. Because you cannot see, you cannot verify that your imagination (is there someone out there waiting for me? etc) is nothing more than a figment of your mind. Thus you think about it more, and you get afraid.\n\nThat said, humans have sufficiently high cognitive abilities to ignore this fear and tell ourselves it is (largely) irrational.",
"People fear what they can not see. And we now have the ability, with technology to transform the environment around us thus we have grown accustom to being able to always see. With time someone would get used to more darkness.",
"because they cant see what is going on around them"
] | [
"the light that strikes it. This is illustrated by Lao Tzu in the Tao Te Ching quite well:\nWhen people see some things as beautiful, other things become ugly. When people see some things as good, other things become bad.\nThe relationship between light and darkness is often used to frame a metaphorical understanding of good and evil. The metaphor can be used to answer the problem of evil: If evil, like darkness, does not truly exist, but is only a name we give to our perception of privatio boni, widespread observation of evil does not preclude the possibility of a",
"“evil.”\" (In: The City of God, XI, chapter 9)\nPerceptions are based on contrast, so that light and dark, good and evil, are imperceptible without each other; in this context, these sets of opposites show a certain symmetry, but a basic study of optics teaches us that light has a physical presence of its own, whereas darkness does not: no \"anti-lamp\" or \"flashdark\" can be constructed which casts a beam of darkness onto a surface that is otherwise well-lit. Instead, darkness appears only when sources of light are extinguished or obscured and ends when an object absorbs a disproportionate amount of",
"that are deemed as less dark are also looked into such as parent/child conflict and the impact of narcissism on family members communicative behaviors. The text uses examples that show how negative interactions between family members may co-exist with positive ones or they might function in ways that are both positive and negative. Olson also examines the darkness at a dynamic level including the role of religion, traditional family values, the media, and the morality of family life.\nLoreen Olson also published an important scholarly journal article titled, Conflict and control: Examining the association between exposure to television portraying interpersonal conflict",
"dark doesn't necessarily always turns to light. It can be dark for a long time, and then will be light, then will be dark again. I'm not just gonna have that message that everyone has of like 'I know you're down in the dumps, but you'll get up and stay up. Don't you worry.' Because it's not true, you can be up and down.\"",
"[particularly with] light and dark. [Like] light and shadows [or] seeing and not seeing. In fact most of my work [is what] that's all about – the idea that darkness, the revered beauty of shadows, is not really \"just\" dark emptiness, but that darkness is actually very much alive, dynamic. So it's about that reciprocity where darkness only exists where there's light and light only exists where there's darkness—they exist in tandem with one another, they define one another much more than being distant opposites.\nFernández continues to visit Japan regularly during the last 18 years and cites her ongoing relationship",
"are inadequate. Our deepest fear is that we are powerful beyond measure. It is our light, not our darkness, that most frightens us. We ask ourselves, who am I to be brilliant, gorgeous, talented, fabulous? Actually, who are you not to be? You are a child of God. Your playing small doesn't serve the world. There's nothing enlightened about shrinking so that other people won't feel insecure around you. We are all meant to shine, as children do. We were born to make manifest the glory of God that is within us. It's not just in some of us; it's",
"fear to manipulate the people into supporting their will. Through keywords and key phrases such as, \"it is for your safety,\" or \"it is for the safety of this country,\" politicians invoke fear within people that their safety is at stake, and people will ultimately follow in line in order for their safety to be restored. Fiction and mythology Fear is found and reflected in mythology and folklore as well as in works of fiction such as novels and films.\nWorks of dystopian and (post)apocalyptic fiction convey the fears and anxieties of societies.\nThe fear of the world's end is about as",
"release of Time of Judgment. The theme of the Classic World of Darkness is described as \"Gothic-Punk\" by the developers.\nThe World of Darkness resembles the contemporary world, but it is darker, more devious and more conspiratorial. The dichotomy between rich and poor, influential and weak, powerful and powerless, is much more pronounced than in the real world. Decadence, cynicism and corruption are common. Humans are unwitting victims or pawns of vast secret organizations of supernatural creatures. Vampires, werewolves and wraiths—among others—struggle with internal factionalism and against other species in secret wars of intrigue for control of reality. The battles in",
"ones from positive emotions, like joy or happiness, and Dark ones from negative ones, like hatred and pain. When a Light Other uses someone's positive emotions, the emotions become weaker. When a Dark Other uses someone's pain or hatred to recharge, those feelings become stronger. Dark Others occasionally choose to remove the cause of the pain or fear from the humans mind (see twilight watch).\nThe Others' magical powers do not come from extra magic they have. In reality, magical force is produced by ordinary living people, and plants, and life - the Others produce less magic, therefore instead of emitting",
"Instead they put it on its stand, and it gives light to everyone in the house. In the same way, let your light shine before men, that they may see your good deeds and praise your Father in heaven.\nThis application of \"light compared with darkness\" also appears in 1 John 1:5 which applies it to God and states: \"God is light, and in him is no darkness at all\". Darkness in the Fourth Gospel \"In John's writings, walking in darkness does not mean committing acts of sin but rather, rejecting God's message of eternal life through Christ\"\nThose who define darkness",
"a famous and mysterious film director.\nMortal fear is as crucial a thing to our lives as love. It cuts to the core of our being and shows us what we are. Will you step back and cover your eyes? Or will you have the strength to walk to the precipice and look out? Do you want to know what is there, or live in the dark delusion that this commercial world insists we remain sealed inside, like blind caterpillars in an eternal cocoon? Will you curl up with your eyes closed and die? Or can you fight your way out",
"elephant, and the Christ. Perils of the Self Von Franz considered that \"the dark side of the Self is the most dangerous thing of all, precisely because the Self is the greatest power in the psyche. It can cause people to 'spin' megalomanic or other delusionary fantasies that catch them up\", so that the victim \"thinks with mounting excitement that he has grasped the great cosmic riddles; he therefore loses all touch with human reality. \nIn everyday life, the Self may be projected onto such powerful figures as the state, God, the universe or fate. When such projections are",
"the dark potentials, for darkness is beginnings: of art, of lives and of visions.\nRoepstorff's practice unfolds an ongoing endeavor to shed light on our shadows, to shape the shapeless and encapsulate time in its passing, coming and being. Essentially, our being stretches far into spaces of the immaterial, and art interweaves all these corners of our existence: from the fluid metaphysical realms of beyond to our bright and dim and tangible reality. Collages Roepstorff’s basis is collages incorporating media images that visualize existing power relations and critically deal with the history and failures of political ideas. By editing and decomposing",
"regarded as a tragic figure and cautionary study in the corruption of a hero who loses sight of the greater good and resorts to evil practices out of fear and desperation. A \"turn to the Dark Side\" has become a popular idiom to describe an (often misguided) individual or institution's embrace of evil out of a desire for power.",
"have fears and for some people, when they get the fears or worries, they turn to a higher power. I just kind of deal with it. And when I go, that's it; I'm gone into the ground and 'goodbye world'. Which isn't depressing; some people might find it depressing. And I might be wrong and that's the good thing because if I'm wrong I'll get into heaven(!)\".",
"It Was Dark at Westminster Abbey. Calling it \"a remarkable work of fiction\" he said it depicts how the world would be if the Resurrection were proved to be a gigantic fraud. \". . .you feel the darkness creeping round the world, you see . . . crime and violence increase in every part of the world. When you see how darkness settles down upon the human spirit, regarding the Christian record as a fable, then you quit with something like adequate thanksgiving, and thank God it is light because of the awful darkness when it was dark.\"\nWhen It Was",
"who do not experience fear, are able to use fear as a tool to manipulate others. People who are experiencing fear, seek preservation through safety and can be manipulated by a person who is there to provide that safety that is being sought after. \"When we're afraid, a manipulator can talk us out of the truth we see right in front of us. Words become more real than reality\" By this, a manipulator is able to use our fear to manipulate us out the truth and instead make us believe and trust in their truth. Politicians are notorious for using",
"is its opposite, then Light must be good. And if I find Darkness, then I may have some kind of idea as to the nature of Light.\"\nBy leaving the safety of the central echo-caster, with only a pair of click stones with which to listen, Jared exposes himself to soubat (once common cave bats that either \"Cobalt or Strontium took ... down to Radiation and made [them] over into ... super-creature[s]\") and Zivvers (people with an apparently unfathomable ability to navigate despite having poor hearing compared to the Survivors; it turns out that Zivvers navigate in darkness using infrared, while",
"with, and exploration of, its limits in the universe to that of native peoples wherever they are taken by surprise by explorers seeking resources in their land.\nA Greater Darkness is in the world. It is unlike anything that humanity has ever faced before. Contact has begun, but it is Contact with a dark purpose. In addition, we are facing converging waves of great change—climate change, environmental deterioration, diminishing food and energy resources and the growing threat of conflict and war.\nMy message has come from the Angels of the Creator who are urgently attempting to enable humanity to recognize this and",
"Guardian's Anne Karpf has characterised as \"facing dark truths while believing unwaveringly in human potential\".",
"and dependent on the daily and seasonally changing patterns of light and darkness. Light is essential for many biological activities such as sight and photosynthesis. These are the focus of the science of photobiology. But the presence of uninterrupted periods of darkness, as well as their alternation with light, is just as important to biological behaviour. Scotobiology studies the positive responses of biological systems to the presence of darkness, and not merely the negative effects caused by the absence of light. Effects of darkness Many of the biological and behavioural activities of plants, animals (including birds and amphibians), insects,",
"and suppress them. That’s because this is a regime which is fundamentally afraid of its own people. And it’s fundamentally hostile to them.",
"darkness, unfamiliar places with indeterminate details of topography, and indeed any powerful phenomenon arouses anxiety in Prus, which prompts him to personify nature. There appears before him a world of living, mysterious, menacing things... full of uncanny experiences, of strange shapes, of striking contrasts of light and shade. The latter realm of sensations, especially, is represented in a most interesting way; extraordinary moments sensitize Prus to changes in light, and the more so to its absence; from this, spring interesting poetic suggestions of the lives of shades in his works (\"Shades\" [1885], \"In the Light of the Moon\" [1884], etc.)....\nBased",
"than some of this season's episodes, which have just featured an unrelenting misanthropic darkness at times without any of the redeeming qualities that this one had. Having something to think about is welcome!\"",
"cope with one's fear. Having something to answer your questions regarding your fears, such as, what happens after death or if there is an afterlife, can help mitigate one's fear of death because there is no room for uncertainty as their questions are answered. Religion offers a method of being able to understand and make sense of one's fears rather than ignore them. Death The fear of the end of life and its existence is in other words the fear of death. The fear of death ritualized the lives of our ancestors. These rituals were designed to reduce that fear;",
"not being the primary religion, and this is why they committed mass murder. Manipulation Fear may be politically and culturally manipulated to persuade citizenry of ideas which would otherwise be widely rejected or dissuade citizenry from ideas which would otherwise be widely supported. In contexts of disasters, nation-states manage the fear not only to provide their citizens with an explanation about the event or blaming some minorities, but also to adjust their previous beliefs.\nFear can alter how a person thinks or reacts to situations because fear has the power to inhibit one's rational way of thinking. As a result, people",
"a genuine denial of evil but rather a horror of it. A person turns his eyes away from human bestiality and the suffering it evokes only if he cannot stand to look at it. By doing so he affirms the evil to be absolute, he looks away only when he feels that nothing can be done about it ... The belief in pure evil, an area of experience beyond the possibility of help or redemption, is automatically a summons to action: 'evil' means 'that which must be attacked ... ' Between races for instance, this belief leads to prejudice. In",
"as simple as Dennis' opposition, and is antithetical in the same degree as light and darkness. Light may accentuate beauty, but either great light or darkness, i. e., the absence of light, is sublime to the extent that it can annihilate vision of the object in question. What is \"dark, uncertain, and confused\" moves the imagination to awe and a degree of horror. While the relationship of sublimity and beauty is one of mutual exclusivity, either can provide pleasure. Sublimity may evoke horror, but knowledge that the perception is a fiction is pleasureful.\nBurke's concept of sublimity was an antithetical contrast",
"must be something real. Only, we can't recognize it.\"\n...\n\"There's a clue [however]. We know that in the Original World - the first world that man inhabited after he left Paradise - we were closer to Light Almighty. In other words, it was a good world. Now let's suppose there's some sort of connection between sin and evil and this Darkness stuff. That means there must be less Darkness in the Original World, Right?\"\n...\n\"Then all I have to do is find something there's less of in the Original World [than there is here].\"\n...\n\"If Darkness is connected with evil and if Light",
"good, just as cold is the state of no heat, darkness is the state of no light, forgetfulness the lacking of memory, ignorance the lacking of knowledge. All of these are states of lacking and have no real existence.\nThus, evil does not exist, and is relative to man. `Abdu'l-Bahá, son of the founder of the religion, in Some Answered Questions states:\n\"Nevertheless a doubt occurs to the mind—that is, scorpions and serpents are poisonous. Are they good or evil, for they are existing beings? Yes, a scorpion is evil in relation to man; a serpent is evil in relation to man;"
] |
Why the George Zimmerman case is so controversial (Not 'why the jury decided to acquit him' as explained in the official thread) | [
"* Racial tension -- white-ish guy in white neighborhood grabs a gun and follows black kid around\n* Intrigue -- the facts of the case are unusual, and make us question the nature of self defense\n* Uncertain outcome -- it is possible to see both sides of the case, to outsiders, it appeared it could go either way, so it gives everyone something to talk about\n* Process of elimination -- there currently no young, photogenic white women involved in any sort of big trial, and Nancy Grace has to talk about something",
"Racial: a white Hispanic male shot and killed an unarmed black minor (whether he is racist is disputed) and was not arrested and investigated immediately. \n\nLegal: Florida's Stand Your Ground law is legally lenient compared to self-defense laws in other states."
] | [
"failed to prove their case beyond a reasonable doubt. Supporters were also outside the courthouse in Sanford, Florida, rejoicing the not guilty verdict. Some supporters at the courthouse said the jury made the right decision because they felt that Zimmerman shot and killed Martin in self-defense.\nCivil rights leader Jesse Jackson said that he was stunned by the decision and that the Department of Justice must intervene to take it to another level. Benjamin Jealous, president of the NAACP, said that he had spoken to senior justice officials about pursuing federal civil rights charges against Zimmerman. Al Sharpton said the verdict",
"\"the right legal verdict\". He said the prosecution had a tough case from the start, and, \"as a legal matter, I don't see how they [the jury] could have reached another verdict, considering how the law works with regard to self-defense\".\nAfter the trial, as calls to prosecute Zimmerman for an alleged federal civil right violation were heard, The Los Angeles Times editorial board wrote that such a move was unwarranted by the evidence and could amount to double jeopardy: \"[Zimmerman] shouldn't have assumed that Martin was up to no good, and he shouldn't have pursued him after a police dispatcher",
"some who did not leave it, although he argued with them about it.\nOn August 18, 1955, Seeger was subpoenaed to testify before the House Un-American Activities Committee (HUAC). Alone among the many witnesses after the 1950 conviction and imprisonment of the Hollywood Ten for contempt of Congress, Seeger refused to plead the Fifth Amendment (which would have asserted that his testimony might be self incriminating) and instead, as the Hollywood Ten had done, refused to name personal and political associations on the grounds that this would violate his First Amendment rights: \"I am not going to answer any questions as",
"for five hours.\nThe police chief said that Zimmerman was released because there was no evidence to refute Zimmerman's claim of having acted in self-defense, and that under Florida's Stand Your Ground statute, the police were prohibited by law from making an arrest. The police chief said that Zimmerman had a right to defend himself with lethal force. As news of the case spread, thousands of protesters across the United States called for Zimmerman's arrest and a full investigation. Six weeks after the shooting, amid widespread, intense, and in some cases misleading media coverage, Zimmerman was charged with murder by a",
"of all blame, the Confederate president suffers an additional blow when Robert E. Lee himself agrees to testify. Lee's appearance catalyzes the Amistad plotters. On August 14, 1866, while Lee testifies in the courthouse, the plotters dynamite the Confederate White House, the destruction of which draws away many of the guards stationed at the courthouse in anticipation of an attack on the inquiry. With the courtroom weakly defended, the Amistad plotters rush the room, and gloatingly hold the famous Confederates hostage. Finally, a firefight erupts in which most of the Amistad group die, but they succeed in killing a number",
"to the Washington Post's having to apologize.\nFollowing the acquittal of George Zimmerman for the shooting of Trayvon Martin in July 2013, Cohen wrote \"a controversial column in which he defends George Zimmerman's suspicion of Travyon Martin and calls on politicians to acknowledge that a disproportionate amount of crimes are committed by black males\". The column went on to say that Cohen \"can understand why Zimmerman was suspicious and why he thought Martin was wearing a uniform we all recognize;\" in any case, he also points out that \"What I'm trying to deal with is, I'm trying to remove this fear",
"Kendle, because he's representing himself, doesn't know how to get that evidence to the trial\".\nKendle told jurors;\"the reason the evidence was fabricated is because I'm white\". Despite a warning from the judge he added: \"The subjects I shot were African American. I can prove that [...] What they're not allowing me to tell you is that I was arrested because of the George Zimmerman shooting.\" Controversy CNN and the Center for Investigative Reporting conducted a year long investigation into the licensing of armed security guards. They reported that there are no federal training standards for armed guards and that no",
"PIN prosecutors \"failed to turn over evidence that could have helped Mr. Stevens win acquittal\".\nAfter this blow to its reputation, it was criticized for \"being gun-shy\" because it had closed out without pressing charges a \"series of long-running investigations into current or former members of Congress,\" including Senator John Ensign of Nevada and Representatives Tom DeLay of Texas, Jerry Lewis of California, Alan Mollohan of West Virginia, and Don Young of Alaska.",
"in Zimmerman's statements, calling the defendant a \"liar\". Defense's argument Mark O'Mara began his closing arguments by asking the jurors to use common sense when considering the evidence in the confrontation between Zimmerman and Martin. O'Mara argued to the jury to not \"fill in the gaps\" or to \"connect the dots\", but to stick to the facts while considering their verdict. O'Mara told the jury that you can't help but have a first impression and \"what you have to do is be vigilant, diligent when deciding this case.\" O'Mara said that Zimmerman is \"not guilty of anything but protecting his",
"to a question from the media, O'Mara also claimed that if Zimmerman \"had been black, he never would have been charged with a crime\".\nWhen asked if Zimmerman had been overcharged in the case, State Attorney Angela Corey told reporters after the verdict that the allegations against Zimmerman \"fit the bill\" for a second-degree murder charge. Prosecutor de la Rionda said that he was disappointed with, but respected, the jury's verdict. Public response Supporters of Zimmerman were happy the jury took the side of Zimmerman's claim that he shot Martin in self-defense, while other supporters said that the prosecution had",
"he had acted in self-defense. A month later National Action Network and other civil rights organizations came to Sanford, FL for a series of protests and marches to call for Zimmerman's arrest. Six weeks after the shooting, Zimmerman was arrested. On July 13, 2013 George Zimmerman was found not guilty of second-degree murder. He was also acquitted of manslaughter, a lesser charge. On July 20, 2013 National Action Network organized rallies in 100 cities around the country to speak out against the Zimmerman verdict and stand-your-ground-laws.\nOn March 10, 2014 the National Action Network led a march to Florida's state capitol",
"own life\". O'Mara also showed a chunk of concrete to the jury, telling them that Martin was not an unarmed teenager when he allegedly hit Zimmerman's head against the sidewalk.\nMark O'Mara asked the jury how many \"coulda beens\" and \"what ifs\" have you heard from the state in this case. O'Mara also told the jury to not give anybody \"the benefit of the doubt except for George Zimmerman.\" Prosecution's rebuttal argument Prosecutor John Guy delivered the state's rebuttal argument after the defense finished their closing argument. Guy told the jury that in order to know what happened that night, they",
"a legal analyst for WKMG Channel 6, an Orlando, Florida television station. After the Zimmerman case was over, he was hired as a legal analyst by CNN, a position he has held for over two years. George Zimmerman trial O'Mara gained national attention while serving as the defense attorney for George Zimmerman, who was found not guilty of second-degree murder in the shooting death of Trayvon Martin.\nIn September 2013, after a domestic altercation between George and Shellie Zimmerman, O'Mara said he was continuing to represent George Zimmerman in a defamation lawsuit against NBCUniversal but was not representing him in the",
"hours before arriving at a verdict, which was read in court shortly after 10 pm EST.\nFollowing the announcement of the verdict, defense attorney Mark O'Mara told reporters at the courthouse that he was ecstatic with the decision by the jury. O'Mara thanked local law enforcement, the jury, and the time and effort they put into the process. Defense attorney Don West said he was still angry that Zimmerman was even brought to trial. West said that the prosecution of Zimmerman was \"disgraceful\" and that he was \"thrilled the jury kept this tragedy from becoming a travesty\". In response",
"in 1952, and frequently criticized the Eisenhower Administration.\nIn 1951, the U.S. Supreme Court upheld the convictions of contempt of the United States Congress against the Hollywood Ten, who had argued unsuccessfully that their First Amendment protections prohibited Congress from asking about their political activities. Thereupon, American Legion presented the movie studios with a list of some 300 people, meant as a de facto blacklist. Those listed were given an opportunity to exonerate themselves by answering the charges against them in a letter. If the blacklisted artists refused to write a letter, they were fired. The studios submitted the letters from",
"including an image of Roof posing with a handgun and a Confederate Battle Flag. In this manifesto, Roof says he became \"racially aware\" as a result of the 2012 shooting of Trayvon Martin, writing that when he learned about the incident, he read about it, concluding that George Zimmerman had been in the right. He didn't understand the controversy about it. He said he searched for \"black on White [sic] crime\" on Google and found the website of the Council of Conservative Citizens, where he read \"pages upon pages\" of cases involving black people murdering white people. Roof wrote",
"of campaigning opportunity. A Reuters article also indicates that some of Zimmerman's neighbors who claimed they saw signs of injury on Zimmerman the day after the shooting \"said they spoke to Sanford police and the FBI in their investigations but did not recall speaking to the office of special prosecutor Angela Corey\". On the other hand, US attorney and legal analyst Kendall Coffey referred to Corey's presentation as \"masterful\" and that she made \"a very compelling statement about her commitment to victims... So, if you were scoring that press conference, I give it an A plus\".\nDershowitz has called for Corey",
"speak his opinion \"without fear of retaliation\". Zimmerman criticized the government and President Obama. He believed Obama inflamed racial tensions. \"He by far overstretched, overreached, even broke the law in certain aspects to where you have an innocent American being prosecuted by the federal government,\" Zimmerman said.\nAccording to Zimmerman's brother Robert Jr. in 2014, in the year following the trial, Zimmerman was both homeless and jobless. Robert Jr. said that, while he believed his brother's \"state of mind\" was better, Zimmerman was \"a very traumatized person because he has had his liberty taken away from him\".\nBetween the shooting of Trayvon",
"not a moral question, it's a legal question and the American law requires that the jury listens to the evidence presented.\"\nBasketball star Charles Barkley said that he agreed with the verdict. He added that he thought that Zimmerman was wrong to pursue, and that racial profiling was involved, but he thought that Martin did \"flip the switch and start beating ... Mr. Zimmerman\". He said that he was sorry Martin was killed, but looking at the evidence, he didn't think Zimmerman should go to jail for the rest of his life.\nA spokesman for the Iranian Ministry of Foreign",
"not guilty.\nAttorney and author Mark Lane said that he interviewed several jurors after the trial. Although these interviews have never been published, Lane said that some of the jurors believed that Garrison had in fact proven to them that there really was a conspiracy to kill President Kennedy, but that Garrison had not adequately linked the conspiracy to Shaw or provided a motive. Author and playwright James Kirkwood, who was a personal friend of Clay Shaw, said that he spoke to several jury members who denied ever speaking to Lane. Kirkwood also cast doubt on Lane's claim that the jury",
"ruled that Underwood had suffered from ineffective counsel and ordered that he be granted a new trial or be released from prison in 180 days. That decision was overturned and the new trial denied by the U.S. Court of Appeals for the Fourth Circuit in January 2011. The appeals court ruled that even if Underwood's lawyers had been ineffective as he claimed, the evidence against him was so overwhelming that his counsels' alleged lack of competence would have been immaterial. Underwood was incarcerated in Marion Correctional Institution in North Carolina until his death on 23 December 2018.",
"2014, the Associated Press and a Jacksonville, Florida photographer Rick Wilson demanded that Zimmerman halt the sale of one of his paintings because the news agency asserted it directly copied a photo owned by the AP. The photo and painting identically show Jacksonville-based prosecutor Angela Corey (whose office prosecuted Zimmerman for the shooting death of Martin) holding her thumb and fingers together. Zimmerman apparently made up the quote that he added to the painting: \"I have this much respect for the American judicial system.\" The controversy was similar to that arising from the use of an AP photo by Shepard",
"Norm Wolfinger not to arrest and charge Zimmerman with a crime triggered outrage fueled by social media including a petition on Change.org calling for his prosecution. Following growing protests, including some 30,000 people in Sanford, Florida, as well as media coverage and engagement of the FBI, both police chief Bill Lee and state attorney Norm Wolfinger resigned from the investigation and state attorney Corey took over. The case added to a national debate over racial profiling, gun control, institutional racism in law enforcement agencies, and the role of American Legislative Exchange Council (ALEC) in advocating for pro-gun laws like Florida's",
"special prosecutor appointed by Governor Rick Scott.\nZimmerman's trial began on June 10, 2013, in Sanford. On July 13, a jury acquitted Zimmerman of the charges of second degree murder and manslaughter. For three years, the U. S. Department of Justice (DOJ) investigated Zimmerman on civil rights charges. In February 2015, the DOJ concluded there was not sufficient evidence that Zimmerman intentionally violated the civil rights of Martin, saying the Zimmerman case did not meet the \"high standard\" for a federal hate crime prosecution.\nAfter DOJ said it would not charge him with a hate crime, Zimmerman said he felt free to",
"bond, and released him from custody in May 1867 (after delivering a long and vituperative speech). Underwood also presided over a grand jury in Norfolk that indicted Confederate General Robert E. Lee on June 7, 1865, but General Ulysses Grant and other federal government officials ignored the indictment as contrary to the surrender terms at Appomattox Courthouse. Salmon P. Chase, who by that time had become Chief Justice of the United States Supreme Court, reportedly worried that after Underwood had testified before Congress (the Joint Committee on Reconstruction) about being able to pack a jury, he was incapable of conducting",
"condemned the film for omitting Robson and Safechuck's lawsuits against the Jackson estate.\nJournalist Charles Thomson, who wrote about media bias against Jackson and has investigative experience in child molestation and child murder cases, told podcast host John Ziegler: \"[Robson and Safechuck] have previously testified under oath, under intense cross-examination, [have] maintained for twenty years a consistent story about Michael Jackson being innocent, and they come forward and completely change their story. That in itself is discrediting.\"\nJackson biographer Mike Smallcombe argued that Safechuck's claims of sexual abuse at Neverland's train station from 1988 to 1992 could not be true because the",
"Boston Massacre. The accused soldiers were arrested on charges of murder. When no other attorneys would come to their defense, Adams was impelled to do so despite the risk to his reputation – he believed no person should be denied the right to counsel and a fair trial. The trials were delayed so that passions could cool.\nThe week-long trial of the commander, Captain Thomas Preston, began on October 24 and ended in his acquittal, because it was impossible to prove that he had ordered his soldiers to fire. The remaining soldiers were tried in December when Adams made his legendary",
"The Prosecution of George W. Bush for Murder Content and themes Bugliosi says that the Bush administration intentionally misled Congress and the American people about the evidence of nuclear weapons which he said mandated the US and allies to invade Iraq in 2003 and overthrow ruler Saddam Hussein. \nBugliosi argues that, under the felony-murder rule, the resulting deaths of over 4,000 American soldiers and 100,000 Iraqi civilians (as of spring 2008) since hostilities began can be charged against Bush as second-degree murder. He said that any of the 50 state attorneys general, as well as any district attorney",
" Anyone who published anything against President John Adams, a Federalist, and/or the war faced imprisonment, including Thomas Adams (of no relation to the president), editor of the Chronicle, and Abijah Adams, his brother and clerk. The Alien and Sedition Acts of 1798 were in effect and Jeffersonian Republicans were deemed traitors, causing his work to take a back seat.\nManning would regain confidence after Thomas Jefferson, a supporter of smaller government, defeated Adams in the election of 1800. His beliefs and actions as president, however, were often overshadowed by Adams’ eleventh hour appointment of John C. Marshall, a Federalist, as",
"accountable for his actions. Therefore, shortly after this confidentiality agreement was announced, Congress decided to introduce a bill that would provide for greater public access to Richard Nixon's records. The conflict The main conflict in this case was whether a federal statute authorizing that the President would have his records inspected by government archivists violated the principles of separation of powers and executive privilege. In addition, there was a conflict in this case whether a President's personal materials were deemed private even though the public had a high level of interest in them. Furthermore, it was debatable whether the government's"
] |
How did the Hitler and his core followers indoctrinate so many Germans into the Nazi ideology and how did those feelings completely go away for the most part after Germany lost WWII? | [
"I am by no means an expert, but I like to think my opinions make some sort of sense. This will probably be pretty long. \n \nThere are many reasons: \n1) Before the Nazis \n1a) Pre WW1\nIf you look at the recent history of Germany, you saw a nation that defeated basically all of its neighbours with surprisingly little difficulty. The apex of this was the war of 1871 where they basically ended up curb stomping France, a nation that was considered to have the best army in the world (might have to fact check that). \n1b) WW1\nAfter such a successful start to the German Empire, WW1 was a strong contrast. Not only had they lost a war they were blamed for it, despite not having begun it (this is arguable yes, but at least in their minds it was defense/aiding an ally). \nAlso, they had not only fought most of \"the civilized world\", but had (in their minds at least) fought well enough that the war never reached Germany proper. In the end, the German empire agreed to a conditional surrender, not an unconditional one. \nWhat came afterwards is well known to everyone, the Treaty of Versailles. It can be argued to be fair or not, but it is easy to construct this as not only an insult, but also a betrayal of the terms of surrender originally agreed upon. \nThese things that I mentioned basically became very effective propaganda in the hands of Mr. Goebbels, see the \"[Dolchstoßlegende](_URL_0_). The target of this myth wasn't just the Jewish, but also those who overthrew the monarchy and thus created the Weimar Republic. \n1c) After WW1 \nAnother important fact was the post-war years. Hyper inflation and the great depression hit Germany hard, I've been told money was burnt for warmth because it was so worthless. The Weimar Republic was considered a failed experiment and again, this was seized upon as propaganda. As I said above, they were blamed for \"backstabbing the German soldier\".\n \n \n\n2) During the Nazis \n2a) Crushing internal resistance \nOne of the first things that the Nazis did was get rid of all organized resistance. Communists and socialists were routed. There are several reasons for this, including the general fear of communism and the feeling that the more socialist Weimar Republic had failed completely. I feel that this is the same reason that, while being very Christian themselves, the Nazis pressured the churches the way they did, because they saw them as a possible organized resistance. \n2b) Indoctrination \nThe insidious nature of Nazi indoctrination was that it was basically all encompassing at some point. If you wanted to take part of social life, you had to act the part. \nMy grandfather told me he was beaten bloody by a teacher once because he was carrying two large jugs of milk and could not properly reply to the Hitler salute in time. \nSimilarly, the Hitler Youth and the Bund Deutscher Mädchen (Hitler Youth for girls) were basically mandatory if you wanted to be part of the community. This brings me back to the churches and why the Nazis didn't like them that much. Anything not under their direct control was bad as it meant that outside ideas could easily flow in. To me this explains all the Book burning, it was simply meant to stop dissident ideas flowing in. \nAnother thing I read about was the Informants. Basically anyone could denounce you for being unpatriotic, meaning even in your own home, you had to be very careful what you said and did. \nBasically, everything was tightly controlled, education, child rearing, social events, etc. \n3c) Creating an enemy \n > “Naturally the common people don't want war; neither in Russia, nor in England, nor in America, nor in Germany. That is understood. But after all, it is the leaders of the country who determine policy, and it is always a simple matter to drag the people along, whether it is a democracy, or a fascist dictatorship, or a parliament, or a communist dictatorship. Voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is to tell them they are being attacked, and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same in any country.” \n\nThis was said by Goebbels and it still rings true today. The Nazis exploited first the widespread antisemitism in Europe by using them as an \"enemy\" and applied the same to Russia. This allowed them to rally the people behind them. Ideas like defending your country against enemies (For the Fatherland) are still seen as noble today in most societies, and these arguably noble ideas were used as levers to get the majority of the population to do what they wanted. \n \nObviously this is all very abbreviated. \nAnyways, this brings me to the other part of your question: why everyone is anti-Nazi? \nAfter WW2, many people obviously felt ashamed by what the Nazis, and by extension they themselves, had done. Horrors that were either unknown or ignored became known and undeniable. Also, Germany was basically several large piles of war torn rubble. \nA strong anti-Nazi and anti-military stance came from the desire not to allow a repetition of such acts. \nPerhaps it was realized that if governments wanted a war, they could use the same levers that the Nazis used to create one.",
"As for Hitler 'indoctrinating' part it was combination of right social-economic conditions and the anti-communist fear mongering, Hitler being quite charismatic leader, and it sorta kinda worked in Italy. \n\nWhen Hitler got to power it actually worked for the majority of the German population, jobs were created in the military industrial complex, infrastructure was built to support it, and it let the Germans to be able to feel that they are a great nation, an Empire the way they used to be, not the way they became after WW I, as for the Jews, communists, Gypsies and other minorities … well they were minority. \n\nAnd even though Germans supported all the crazy sh*t, I don’t think they realized the full scale of it, out of sight out of mind (I think that’s how the saying goes). \n\nWhen the war ended and Germany was in ruins, and the scale of what was done became apparent guess Germans realized what they had done, and how awful it was. Plus the fact that they were occupied and Nazis were hunted helped.\n\nThere was and intresting experiment called \"the third wave\" that whent into how easy it is to get in to that mentality of supremacy. heer is the link: _URL_1_"
] | [
"citizens were dissatisfied with their lot and turned to political extremism.\nAdolf Hitler of the Nazi Party came to power in Germany in 1933. Hitler quickly moved to consolidate and expand his power, adopting severe repressive measures against his political opposition and the German Jewish minority. However, Hitler remained popular with the public because he oversaw the German economic recovery of the 1930s. The new government sponsored many public works programs and a massive rearmament campaign which included the construction of an extensive fortified line of bunkers, Ostwall (today known as the Międzyrzecz Fortified Region) twenty kilometers north of Schwiebus.\nWorld War",
"to power had been largely economic.\nFest explained Hitler's success in terms of what he called the \"great fear\" that had overcome the German middle classes, as a result not only of Bolshevism and First World War dislocation, but also more broadly in response to rapid modernisation, which had led to a romantic longing for a lost past. This led to resentment of other groups—especially Jews—seen as agents of modernity. It also made many Germans susceptible to a figure such as Hitler who could articulate their mood. \"He was never only their leader, he was always their voice ... the people,",
"of a master race, destined to dominate the inferior races of the world. The Nazis were especially hateful of Jews. Another unique aspect of Nazism was its connection with a small movement that supported a return to ancient Germanic paganism. Adolf Hitler, a World War I veteran, became leader of the party in 1921. Gaining support from many disillusioned Germans, and by using intimidation against its enemies, the Nazi party had gained a great deal of power by the early 1930s. In 1933, Hitler was named Chancellor, and seized dictatorial power. Hitler built up Germany's military in opposition to the",
"existing ideology and presented himself as the heir to the Leninist political tradition, Hitler created both his movement and its ideology by himself, claiming to be \"someone sent by Providence, a Messiah whom the German people had been expecting for centuries, even for two thousand years, as Heinrich Himmler enjoyed saying.\" Thus, there could be no real conflict between the Party and the leader in Nazi Germany, because the Nazi Party's entire reason for existence was to support and follow Hitler. However, there was a potential for division between the leader and the state bureaucracy, due to the way that",
"the ideologies of the Nazi Party and those espoused by Hitler. The effect of propaganda on children would last for years after World War II ended.\nDuring the last days of the war in Berlin the Hitler Youth members of Werwolf could be heard singing \"Heute gehoert uns Deutschland und morgen die ganze Welt\" (Today Germany belongs to us, and tomorrow the whole world). Even after the unconditional surrender of the German forces, many German youths continued to fight on behalf of the Nazi Party in Werwolf. The young members of Werwolf strongly believed that they were fighting for a just",
"ethnic Germans leaving the region for Germany. Over the interwar period, the German population decreased even further.\nThe emergence of the Nazi Party in Germany had an important impact on the city. Adolf Hitler revitalized the Völkisch movement, making an appeal to the German minority living outside of Germany's post-World War I borders and recruiting its members for Nazi intelligence. It was Hitler's explicit goal to create a Greater German State by annexing territories of other countries inhabited by German minorities. By March 1939, these ambitions, charges of atrocities on both sides of the German-Polish border, distrust, and rising nationalist sentiment",
"acuity, deceptiveness and cunning converted the party's non-majority but plurality status into effective governing power in the ailing Weimar Republic of 1933.\nOnce in power, the Nazis created a mythology surrounding the rise to power, and they described the period that roughly corresponds to the scope of this article as either the Kampfzeit (the time of struggle) or the Kampfjahre (years of struggle). Early steps (1918–1924) Adolf Hitler became involved with the fledgling Nazi Party after the First World War, and set the violent tone of the movement early, by forming the Sturmabteilung (SA) paramilitary. Catholic Bavaria resented rule from Protestant",
"to failure\" because most SA men were focused on the cult of Hitler and destroying the \"Marxist enemy\".\nAs a former Marxist in his early years, Goebbels once stated \"how thin the dividing line\" was between communism and National Socialism, which had caused many Red Front Fighters to \"switch to the SA\". Goebbels expressed that sentiment in a 1925 public speech, declaring that \"the difference between Communism and the Hitler faith is very slight\". Extent In some cities, the numeral strength of party-switching beefsteak Nazis was estimated to be large. Rudolf Diels (the head of the Gestapo from 1933 to 1934)",
"January 1933 the Nazis took power and lost little time in transforming Germany into a one-party dictatorship. The party's popular support was built on the traditional populist themes of hope and hatred. The principal focus of their hatred was split between the Communists and the Jews. Ida Dehmel was no communist, but she was Jewish. On 20 April 1933 Nazi paramilitaries broke into the meeting room at the Hamburger Hof (hotel) where Dehmel was presiding over the monthly GEDOK meeting: they demanded her resignation. Three weeks later, because of",
"evolution.\"\nHitler's speech signalled his intention to rein in the SA, whose ranks had grown rapidly in the early 1930s. This would not prove to be simple, however, as the SA made up a large part of Nazism's most devoted followers. The SA traced its dramatic rise in numbers in part to the onset of the Great Depression, when many German citizens lost both their jobs and their faith in traditional institutions. While Nazism was not exclusively – or even primarily – a working class phenomenon, the SA fulfilled the yearning of many unemployed workers for class solidarity and nationalist fervour. Many stormtroopers",
"Germany. They showed a sharp decline in civilian morale and in the level of support for the Nazi regime, beginning after Stalingrad and accelerating through 1943 as the military setbacks continued, the economic situation deteriorated and the Allied bombing of German cities grew more intense. By the end of 1943 Himmler knew that most Germans no longer believed that war could be won and that many, perhaps a majority, had lost faith in Hitler. But fear of the Gestapo meant that this disillusionment did not translate into political opposition to the regime — even though, as the Rosenstrasse protest showed,",
"was supplanted by a more command-based economy and forced social integration. Though Adolf Hitler succeeded in garnering the support of many German industrialists, prominent traditionalists openly and secretly opposed his policies of euthanasia, genocide and attacks on organized religion, including Claus von Stauffenberg, Dietrich Bonhoeffer, Henning von Tresckow, Bishop Clemens August Graf von Galen and the monarchist Carl Friedrich Goerdeler.\nMore recently, the work of conservative Christian Democratic Union leader and Chancellor Helmut Kohl helped bring about German reunification, along with the closer European integration in the form of the Maastricht Treaty.\nToday, German conservatism is often associated with politicians such as",
"actions as violating and possibly threatening his leadership, as well as jeopardising the regime by alienating the conservative President Paul von Hindenburg and the conservative-oriented German Army. This resulted in Hitler purging Röhm and other radical members of the SA in 1934, during the Night of the Long Knives. Totalitarianism Under Nazism, with its emphasis on the nation, individualism was denounced and instead importance was placed upon Germans belonging to the German Volk and \"people's community\" (Volksgemeinschaft). Hitler declared that \"every activity and every need of every individual will be regulated by the collectivity represented by the party\" and that",
"Hitler and Röhm had brought into the party personally, or for whom Hitler's oratory had been their reason for joining.\nHitler's talent as an orator and his ability to draw new members, combined with his characteristic ruthlessness, soon made him the dominant figure. However, while Hitler and Eckart were on a fundraising trip to Berlin in June 1921, a mutiny broke out within the party in Munich. Members of its executive committee wanted to merge with the rival German Socialist Party (DSP). Upon returning to Munich on 11 July, Hitler angrily tendered his resignation. The committee members realised that his resignation",
"In its early years, Hitler was more concerned with votes and finances than consistent ideology, and consequently did his best to ease and hasten the process for new members. As a result, Hitler made various assurances to its new and prospective members, stating the movement had room for republicans and monarchists alike and leading them to believe he intended to restore the monarchy. Official member Friedrich Christian was an ardent supporter of the Nazi party, becoming a speaker for the party in 1929, and working vigorously to gain the support of other noble families behind Hitler. He worked closely with",
"respect and honor the men and women who gave them a unique culture. Under Nazi control The Nazi Party took control of Germany in 1933, causing a dramatic change of idealism. This change was not just social; in fact, Adolf Hitler had planned the complete renovation of the city of Berlin. \"Welthauptstadt Germania\", or World Capital Germania, was the idea the Nazis wanted to bring to fruition. The Tiergarten was to be a central location in the new city. The Charlottenburger Chaussee, today known as the Straße des 17. Juni, was to be the central line between the east and",
"Communists and parties on the left were increasingly threatened by the growth of the Nazi movement. Hitler came to power in January 1933 and rapidly consolidated his control over Germany, destroyed the communist and socialist movements in Germany, and rejected the restraints imposed by the Versailles treaty. Stalin in 1934 reversed his decision in 1928 to attack socialists, and introduced his new plan: the \"popular front.\" It was a coalition of anti-fascist parties usually organized by the local Communists acting under instructions from the Comintern. The new policy was to work with all parties on the left and center in",
"the party's absolute leader. Hitler saw the party as a revolutionary organisation, whose aim was the overthrow of the Weimar Republic, which he saw as controlled by the socialists, Jews and the \"November criminals\" who had betrayed the German soldiers in 1918. The SA (\"storm troopers\", also known as \"Brownshirts\") were founded as a party militia in 1921 and began violent attacks on other parties.\nFor Hitler, the twin goals of the party were always German nationalist expansionism and antisemitism. These two goals were fused in his mind by his belief that Germany's external enemies – Britain, France and the Soviet Union –",
"order and prosperity in which those deemed 'worthy' would share.\nIn the case of the Nazis, the Führerprinzip became integral to the Nazi Party in July 1921, when Adolf Hitler forced a showdown with the original leaders of the party after he learned that they were attempting to merge it with the somewhat larger German Socialist Party. Learning of this, and knowing that any merger would dilute his influence over the group, Hitler quit the Nazis. Realizing that the party would be completely ineffective without Hitler as their front man, the founder of the party, Anton Drexler, opened negotiations with Hitler,",
"War, and the Soviet invasion of Czechoslovakia, where somehow Hitler, despite being dead, remained in \"the background\" of all these events. Bracher argued that the obsession with Hitler was due to the \"inevitable and continuing sensational aspect caused by the excessive features of Hitlerism, which can be taken as a kind of modern Genghis Khanism or an example of that combination of cruel efficiency and superhuman will-power which frequently is identified as typically German, to be horrified or admired, or both simultaneously\". Bracher argued that Hitler represented a new type of leader quite divorced from the traditional standards of historical",
"that Germans in the Nazi era were motivated by the especially virulent anti-Semitism that had characterized German culture for centuries. Analyzing the troops of the special police battalion units, who were the ones who directly killed Jews in the mass raids phase of the Holocaust (prior to the death camps), Browning concluded that these typical middle class workers were not ingrained with anti-Semitism, but rather became killers through peer pressure and indoctrination.\nThe debate on the Sonderweg was renewed by American scholar Daniel Goldhagen with his 1996 book, Hitler's Willing Executioners. Goldhagen countered that German society, politics, and life up until",
"born in 1944. Military service The ideology of Nazism brought together elements of antisemitism, racial hygiene, and eugenics, and combined them with pan-Germanism and territorial expansionism with the goal of obtaining more Lebensraum (living space) for the Germanic people. Nazi Germany attempted to obtain this new territory by attacking Poland and the Soviet Union, intending to deport or kill the Jews and Slavs living there, who were considered by the Nazis to be inferior to the Aryan master race.\nMengele joined the Nazi Party in 1937 and the Schutzstaffel (SS; protection squadron) in 1938. He received basic training in 1938 with",
"were controlled by the Jews and that Germany's future wars of national expansion would necessarily entail a war against the Jews. For Hitler and his principal lieutenants, national and racial issues were always dominant. This was symbolised by the adoption as the party emblem of the swastika or Hakenkreuz. In German nationalist circles, the swastika was considered a symbol of an \"Aryan race\" and it symbolised the replacement of the Christian Cross with allegiance to a National Socialist State.\nThe Nazi Party grew significantly during 1921 and 1922, partly through Hitler's oratorical skills, partly through the SA's appeal to unemployed young",
"was what part the now large Nazi Party would play in the Government of the country. The party owed its huge increase to growing support from middle-class people, whose traditional parties were swallowed up by the Nazi Party. The millions of radical adherents at first forced the Party towards the Left. They wanted a renewed Germany and a new organisation of German society. The left of the Nazi party strove desperately against any drift into the train of such capitalist and feudal reactionaries. Therefore, Hitler refused ministry under Papen, and demanded the chancellorship for himself, but was rejected by Hindenburg",
"movement than a political one. He espoused the belief that Adolf Hitler was the gift of an inscrutable divine providence sent to rescue the white race from decadence and gradual extinction caused by a declining birth rate and miscegenation. Hitler's death in 1945 was viewed as a type of martyrdom; a voluntary, Christ-like self-sacrifice, that looked forward to a spiritual resurrection of National Socialism at a later date when the Aryan race would need it the most. These esoteric beliefs led to disputes with the World Union of National Socialists, which Rockwell had founded and whose leader, Danish neo-Nazi Povl",
"national-conservatives aligned to Carl Friedrich Goerdeler broke with Hitler in the mid-1930s. According to Kershaw, they \"despised the barbarism of the Nazi regime. But were keen to re-establish Germany's status as a major power ...\". Essentially authoritarian, they favoured monarchy and limited electoral rights \"resting on Christian family values\". \"Hitlerism is poison for the German soul\", wrote Goerdeler, \"Hitler is determined to destroy Christianity\".\nA younger group, dubbed the \"Kreisau Circle\" by the Gestapo, did not look to German imperialism for inspiration. Religious motivations were particularly strong in the Kreisau Circle of the Resistance. Formed in 1937, though multi-denominational, it had a",
"Adolf Hitler's rise to power Adolf Hitler's rise to power began in Germany in September 1919 when Hitler joined the political party then known as the Deutsche Arbeiterpartei – DAP (German Workers' Party). The name was changed in 1920 to the Nationalsozialistische Deutsche Arbeiterpartei – NSDAP (National Socialist German Workers' Party, commonly known as the Nazi Party). It was anti-Marxist and opposed to the democratic post-war government of the Weimar Republic and the Treaty of Versailles, advocating extreme nationalism and Pan-Germanism as well as virulent anti-Semitism. Hitler's \"rise\" can be considered to have ended in March 1933, after the Reichstag adopted the",
"was obsessed by a fear of German Catholics who, politically united by the Center Party, had defeated Otto von Bismarck's Kulturkampf, during the \"culture struggle\" against the Catholic Church in the 1870s. According to Cornwell, Hitler was \"convinced that his movement could succeed only if political Catholicism and its democratic networks were eliminated\".\nCornwell explains that Hitler had good reason to fear the political power of the German Catholic Church. He asserts that in the early 1930s, the German Center Party, the German Catholic bishops, and the Catholic media had been united in their rejection of National Socialism. The hierarchy instructed",
"outside of Germany. He stated that pain and misery were being forced upon ethnic Germans outside of Germany, and that they dream of common fatherland. He finished by stating they needed to fight for one's nationality. Throughout Mein Kampf, he pushed Germans worldwide to make the struggle for political power and independence their main focus. Nazi propaganda used the Heim ins Reich policy for this, which began in 1938.\nFor months prior to the beginning of World War II in 1939, German newspapers and leaders had carried out a national and international propaganda campaign accusing Polish authorities of organizing or tolerating",
"them as a rival for the loyalty of the working class. Nevertheless, wrote Bullock, the heaviest responsibility lay with the German right wing, who \"forsook a true conservatism\" and made Hitler their partner in a coalition government.\nThe Centre Party's Heinrich Brüning was Chancellor from 1930 to 1932. Brüning and Hitler were unable to reach terms of co-operation, but Brüning himself increasingly governed with the support of the President and Army over that of the parliament. The 84-year-old President von Hindenburg, a conservative monarchist, was reluctant to take action to suppress the Nazis, while the ambitious Major-General Kurt von Schleicher, as"
] |
What is shared by all programming languages which lets them relate? | [
"The closest thing to that is assembly language.\n\nAssembly is a simple, low-level programming language that tells the processor in very explicit detail exactly how to accomplish a task. It has a very limited instruction set.\n\nSo for example, in a high-level programming language you might say \"If the absolute value of this variable is greater than 3, do this action\". In assembly, you might say \"Place the value of this memory location in this CPU register. Place the value of another memory location in another CPU register. Now compare the two values. Place the resulting true / false value in this memory location...\"\n\nIt's a lot like building a sand castle one grain of sand at a time. That's why assembly isn't used except in limited instances where extreme performance efficiency is needed."
] | [
"Language interoperability Language interoperability is the capability of two different programming languages to natively interact as part of the same system. Interoperability is advantageous, because different programming language are optimized for specific tasks, and allowing them to communicate can create better systems.\nThere are many different ways programming languages are interoperable with one another. HTML, CSS, and JavaScript are a form of language interoperability as they work together to render webpages. Some object oriented languages can do this thanks to the hosting virtual machine (e.g. .NET CLI compliant languages in the Common Language Runtime and JVM compliant languages in the Java",
"Non-English-based programming languages Prevalence of English-based programming languages There has been an overwhelming trend in programming languages to use the English language to inspire the choice of keywords and code libraries. According to the HOPL online database of languages, out of the 8,500+ programming languages recorded, roughly 2,400 of them were developed in the United States, 600 in the United Kingdom, 160 in Canada, and 75 in Australia.\nIn other words, over a third of all programming languages were developed in a country with English as the primary language. This does not take into account the usage share of each language,",
"or forever). By coding language Since the development and near-universal adoption of the web, an important distinction that has emerged, has been between web applications — written with HTML, JavaScript and other web-native technologies and typically requiring one to be online and running a web browser, and the more traditional native applications written in whatever languages are available for one's particular type of computer. There has been a contentious debate in the computing community regarding web applications replacing native applications for many purposes, especially on mobile devices such as smartphones and tablets. Web apps have indeed greatly increased in popularity",
"Online word game Internet-only games The advent of the Internet allows for new possibilities, in particular interactive and multiplayer games. Educational games There are a vast array of educational word play websites, useful for learning languages.\nFor example, 'Name, Place, Animal, Thing' - Categories game Name, Place, Animal, Thing Collaborative games An area of increasing popularity are multiplayer games different from the traditional family setting, bringing together total strangers. Those with an element of creativity are good examples of this.",
"language may be based on one or a combination of programming models. For example, High Performance Fortran is based on shared-memory interactions and data-parallel problem decomposition, and Go provides mechanism for shared-memory and message-passing interaction.",
"programming languages include purpose-made languages, variants of Eiffel, Forth, and Lisp, and Command Script facilities which are similar in function to batch/shell programming and other glue languages on computers but generally not as full featured. Ports of other languages like BBC BASIC and development of on-board interpreters for Fortran, REXX, AWK, Perl, Unix shells (e.g., bash, zsh), other shells (DOS/Windows 9x, OS/2, and Windows NT family shells as well as the related 4DOS, 4NT and 4OS2 as well as DCL), COBOL, C, Python, Tcl, Pascal, Delphi, ALGOL, and other languages are at various levels of development.\nSome calculators, especially those",
"programming languages in the TIOBE Programming Community Index where, as of December 2018, it is the third most popular language (behind Java, and C). It was selected Programming Language of the Year in 2007, 2010, and 2018.\nAn empirical study found that scripting languages, such as Python, are more productive than conventional languages, such as C and Java, for programming problems involving string manipulation and search in a dictionary, and determined that memory consumption was often \"better than Java and not much worse than C or C++\".\nLarge organizations that use Python include Wikipedia, Google, Yahoo!, CERN, NASA, Facebook, Amazon, Instagram, Spotify and",
"and the hybrid language in which they are composed—codeworks of this sort \"playfully utilize programming terminology and syntax\" alongside \"human-only\" or so-called natural language, creating a creolised language that combines human language and code. In these works, the primary message is semantically overcoded in such a way that multiple different readings are made possible. For example, the word 'mezangelle' itself is sometimes written as 'm[ez]ang.elle', which itself demonstrates the ways in which punctuation and non-alphabetical symbols (in this case the period and square brackets) disrupt and erupt through the human readable language. The word \"mezangelle\", itself a neologism, is fractured",
"and JavaScript was designed with Java's syntax and standard library in mind. In particular, all Java keywords were reserved in original JavaScript, JavaScript's standard library follows Java's naming conventions, and JavaScript's Math and Date objects are based on classes from Java 1.0, but the similarities end there.\nJava and JavaScript both first appeared in 1995, but Java was developed by James Gosling of Sun Microsystems, and JavaScript by Brendan Eich of Netscape Communications.\nThe differences between the two languages are more prominent than their similarities. Java has static typing, while JavaScript's typing is dynamic. Java is loaded from compiled bytecode, while JavaScript",
"Programming game A programming game is a video game that incorporates elements of computer programming, enabling the player to direct otherwise autonomous units within the game to follow commands in a domain-specific programming language, often represented as a visual language to simplify the programming metaphor. Programming games broadly fall into two areas: single-player games where the programming elements either make up part of or the whole of a puzzle game, and multiplayer games where the player's automated program is pitted against other players' programs. As puzzle games Early games in the genre include System 15000 and Hacker, released in 1984",
"advantages of using multiple languages in development. There are, however, also difficulties associated with this kind of development. These difficulties stem from the observation that the more kinds of artifacts we introduce into our process, the more coordination between developer efforts is needed. We will refer to these difficulties as the Coordination Problem. The Coordination Problem has a conceptual and a technical aspect. Conceptually, the main problem is to understand the different languages and their interaction. To properly design and coordinate models in multiple languages, developers must have a sufficient understanding of how languages interact. Technically, the main problem is",
"Programming language A programming language is a formal language, which comprises a set of instructions that produce various kinds of output. Programming languages are used in computer programming to implement algorithms.\nMost programming languages consist of instructions for computers. There are programmable machines that use a set of specific instructions, rather than general programming languages. Early ones preceded the invention of the digital computer, the first probably being the automatic flute player described in the 9th century by the brothers Musa in Baghdad, during the Islamic Golden Age. Since the early 1800s, programs have been used to direct the behavior of",
"than their own (e.g., an English-speaking player playing a Japanese game) can draw on the context of the game to help them understand what is being said or written within the game. Many video games use repetition in their commands and this enables the player to recognize these words and come to understand what they mean and represent over time. Games transform the learning process from a passive task to one in which individuals engage actively in the experience of learning by focussing first on meaning. Computer games, researchers' argue, supply authentic environments for language learning, complete with ample opportunities",
"chat functions and enable participants to chat with players from all over the world who speak various languages. This can provide players with the opportunity to learn a new language—at least at a basic level—so they can participate more fully in the game with the other players. The social interaction these players engage in while playing the game helps with their understanding of the grammar constructions and conversational ways of the language they are using. In short, gamers may well be using a language they are learning much sooner than they otherwise might, given the highly contetxualised nature of the",
"having been determined to be good enough.\nVariations in spirit exist as well. Functional programming languages, such as Lisp, ML and Haskell, tend to substitute a factorial program for Hello, World, as functional programming emphasizes recursive techniques, whereas the original examples emphasize I/O, which violates the spirit of pure functional programming by producing side effects. Languages otherwise capable of Hello, World (Assembly, C, VHDL) may also be used in embedded systems, where text output is either difficult (requiring additional components or communication with another computer) or nonexistent. For devices such as microcontrollers, field-programmable gate arrays, and CPLD's, \"Hello, World\" may thus",
"with code written in a programming language.\nA programming language provides a structured mechanism for defining pieces of data, and the operations or transformations that may be carried out automatically on that data. A programmer uses the abstractions present in the language to represent the concepts involved in a computation. These concepts are represented as a collection of the simplest elements available (called primitives). Programming is the process by which programmers combine these primitives to compose new programs, or adapt existing ones to new uses or a changing environment.\nPrograms for a computer might be executed in a batch process without human",
"strengths are intimately linked. The combination makes Perl a popular all-purpose language for system administrators, particularly because short programs, often called \"one-liner programs,\" can be entered and run on a single command line.\nPerl code can be made portable across Windows and Unix; such code is often used by suppliers of software (both COTS and bespoke) to simplify packaging and maintenance of software build- and deployment-scripts.\nGraphical user interfaces (GUIs) may be developed using Perl. For example, Perl/Tk and wxPerl are commonly used to enable user interaction with Perl scripts. Such interaction may be synchronous or asynchronous, using callbacks to update the",
"be described in mathematical terms, or modeled in a computer for psychological research. NLG systems can also be compared to translators of artificial computer languages, such as decompilers or transpilers, which also produce human-readable code generated from an intermediate representation. Human languages tend to be considerably more complex and allow for much more ambiguity and variety of expression than programming languages, which makes NLG more challenging.\nNLG may be viewed as the opposite of natural-language understanding: whereas in natural-language understanding, the system needs to disambiguate the input sentence to produce the machine representation language, in NLG the system needs to",
"functions than many scripting languages, and is often thought of as a language in its own right, perhaps because of the prevalence of database manipulation in programming and the amount of mastery required to be an expert in the language.\nFurther blurring this line, many domain-specific languages have exposed APIs, and can be accessed from other programming languages without breaking the flow of execution or calling a separate process, and can thus operate as programming libraries. Programming tools Some domain-specific languages expand over time to include full-featured programming tools, which further complicates the question of whether a language is domain-specific or",
"at some level, as something as obvious as \"print the numbers 1 to 10\". The system would then use the intentions to generate source code, likely something very similar to the code above. The key difference is that the intentional programming systems maintain the semantic level, which the source code lacks, and which can dramatically ease readability in larger programs.\nAlthough most languages contain mechanisms for capturing certain kinds of abstraction, IP, like the Lisp family of languages, allows for the addition of entirely new mechanisms. Thus, if a developer started with a language like C, they would be able to",
"Language game Use Some language games such as Pig Latin are so widely known that privacy is virtually impossible, as most people have a passable understanding of how it works and the words can sound very similar to their English counterpart. Although language games are not usually used in everyday conversation, some words from language games have made their way into normal speech, such as ixnay in English (from Pig Latin), and loufoque in French (from Louchébem). Classification One way in which language games could be organized is by language, for example, Pig Latin, Ubbi Dubbi, and Tutnese could all",
"language for a particular environment; in the case of scripting an application, it is also known as an extension language. Scripting languages are also sometimes referred to as very high-level programming languages, as they operate at a high level of abstraction, or as control languages, particularly for job control languages on mainframes.\nThe term \"scripting language\" is also used loosely to refer to dynamic high-level general-purpose languages, such as Perl, PowerShell, Python, and Tcl with the term \"script\" often used for small programs (up to a few thousand lines of code) in such languages, or in domain-specific languages such as the",
"computing in which a single computer is used to provide apparently simultaneous interactive general-purpose computing to multiple users by sharing processor time. Sharing of resources between processes and threads is the source of most of the difficulties of concurrent programming. The word \"sharing\" is also used in some functional programming communities to refer specifically to sharing of memory between different data items to save space, otherwise known as hash consing. In households Resource sharing—called kaláka in Hungarian—is an old tradition in Hungary. Young couples had to build their house after marriage. Marriage itself was called házasodás in Hungarian (en:",
"(\"Hello World\")\nThis one line of Python code prints \"Hello World\"; no declarative statement like main() is required here.\nA scripting language is usually interpreted from source code or bytecode. By contrast, the software environment the scripts are written for is typically written in a compiled language and distributed in machine code form.\nScripting languages may be designed for use by end users of a program—end-user development—or may be only for internal use by developers, so they can write portions of the program in the scripting language. Scripting languages typically use abstraction, a form of information hiding, to spare users the details of",
".NET languages (such as C#, VB.NET) as well as native C++. The other .NET languages can only communicate with C++ code via PInvoke or COM. But since Managed C++ can communicate directly in both managed and standard C++ contexts, it is often used as a \"bridge\". Comparison with other languages The following contains main points and programmatic standards that differ between Managed C++ and other well known programming languages that are similar in concept.",
"list of requirements, and the most suitable (or least unsatisfactory) chosen.\"\nIt is possible that different programming languages may be appropriate for different aspects of the problem. If the languages or their compilers permit, it may be feasible to mix routines written in different languages within the same program.\nEven if there is no choice as to which programming language is to be used, McConnell provides some advice: \"Every programming language has strengths and weaknesses. Be aware of the specific strengths and weaknesses of the language you're using.\" Coding standards This section is also really a prerequisite to coding, as",
"scripting language in preference to a strictly typed programming language). Programming in the small can also describe an approach to making a prototype software or where rapid application development is more important than stability or correctness.\nIn computer science terms, programming in the small deals with short-lived programmatic behavior, often executed as a single ACID transaction and which allows access to local logic and resources such as files, databases, etc.",
"and web programming.\nOther functional programming languages that have seen use in industry include Scala, F#, (both being functional-OO hybrids with support for both purely functional and imperative programming) Wolfram Language, Lisp, Standard ML and Clojure. In education Functional programming is being used as a method to teach problem solving, algebra and geometric concepts.\nIt has also been used as a tool to teach classical mechanics in Structure and Interpretation of Classical Mechanics.",
"languages, notably Dart (2014), Python (2015), Hack (HHVM), and drafts of ECMAScript 7 (JavaScript), Scala, and C++. List of implementations Some programming languages are supporting futures, promises, concurrent logic variables, dataflow variables, or I-vars, either by direct language support or in the standard library. Coroutines Futures can be implemented in coroutines or generators, resulting in the same evaluation strategy (e.g., cooperative multitasking or lazy evaluation). Channels Futures can easily be implemented in channels: a future is a one-element channel, and a promise is a process that sends to the channel, fulfilling the future. This allows futures to be implemented in",
"A number of languages have been designed for the purpose of replacing application-specific scripting languages by being embeddable in application programs. The application programmer (working in C or another systems language) includes \"hooks\" where the scripting language can control the application. These languages may be technically equivalent to an application-specific extension language but when an application embeds a \"common\" language, the user gets the advantage of being able to transfer skills from application to application. A more generic alternative is simply to provide a library (often a C library) that a general-purpose language can use to control the application, without"
] |
Why do people have allergies? Also why is it that people in certain geographic areas get allergies? | [
"Allergies are basically a mistake made by your immune system.\n\nYou know how people who get certain diseases never have to worry about those diseases again, and how vaccines protect you from diseases you've never had? That's because of two types of white blood cells called T cells and B cells. We'll focus on the B cells for now. Your body is constantly making huge amounts of B cells, but they're all different and unique. Every single one of them is programmed to look for a very specific kind of target, which we can basically describe as being randomly generated and randomly assigned. Most of those B cells will never see the target they're programmed to detect, and they will die. But because there are so many different versions of them, if you get sick or get vaccinated, it's guaranteed that some of the B cells you have at that time will detect their target - the germ infecting you, or the vaccine designed to look like a germ. Those lucky B cells will be _activated_ - they will reproduce, making a lot of themselves, and every one of them will make antibodies that help fight off that specific target.\n\nThese activated B cells kick into high gear if they ever see that target again. This is usually enough to kill those targeted germs before you ever know they're there, but sometimes an even bigger reaction is necessary. Parasites and certain bacteria require that kind of response. There's a special kind of B cell that makes a special kind of antibody - IgE. This IgE antibody tells another kind of white blood cell - a mast cell - that it's time to pull out the big guns. The big guns are not fun for anyone - not for the germ, and not for you, because the results can include swelling and redness and itchiness and snot and tears. You know. Allergy symptoms.\n\nNow, lots of things enter your body all the time that aren't germs - dust, food, whatever. There are going to be B cells that recognize each of those as well, but there are systems in place to make sure that those B cells don't get activated; that they only get activated if the target is present and _also_ looks like it might be dangerous. But that system doesn't always work, and for some people, it's more likely to break down than for others. There are also some things in the world that, for whatever reason, look more \"dangerous,\" or more like germs, than they ought to. That's why some allergies - peanuts, or shellfish, or pollen - are very common. Your body sees them, and it makes a mistake - B cells get activated even though there's nothing that should make you sick. Some of them are going to make IgE, and that's going to activate the mast cells. The mast cells bring out the big guns, and your day is ruined. All because your immune system made a mistake.\n\nNow, to answer the last part of your question, it's true - allergies are more common in some places and less common in others. There are a lot of reasons for that. One is that those tricky substances - the ones that look like germs to your body, but aren't - tend to be in certain parts of the world. People don't eat a lot of peanuts in, say, sub-Saharan Africa. Another reason is that certain kinds of pollution can skew your immune system in one direction or another, making mistakes more or less likely. Different parts of the world have different amounts of pollution. And the third reason is kind of an interesting one called the hygiene hypothesis.\n\nThe idea behind the hygiene hypothesis is that humans evolved in a dirty world. Our immune systems evolved _expecting_ our food to be full of dirt, our hair to be full of lice, and our intestines to be full of parasitic worms. In some parts of the world, this is still at least partly true - especially the bit about the worms. Those immune systems are seeing what they expected to see. In...cleaner parts of the world, we don't have lice or worms, and consequently, our immune systems can get a bit confused. The enemies they were created to fight aren't there as much, so the balance is off. Mistakes get made, and now you can't bring peanut butter cookies to school because there's one kid who will die if he eats them."
] | [
"exposure. If the body is exposed to the allergen multiple times the immune system will react every time the allergen is present. \nThe reason why people get allergies is not known. The allergens are not passed down through generations. It is believed if parents have allergies the child is more likely to be allergic to the same allergens. \nSome common symptoms include itchiness, swelling, running nose, watery eyes, coughing, wheezing, trouble breathing, hives, rashes, mucus production, or a more severe reaction anaphylaxis. Allergic responses and the severity vary from person to person.\nMany substances can trigger an allergic reaction. Common triggers",
"allergies is unclear, in part because studies tend to use different definitions and outcomes, and because of the wide variety among both helminth species and the populations they infect. The infections induce a type 2 immune response, which likely evolved in mammals as a result of such infections; chronic helminth infection has been linked with a reduced sensitivity in peripheral T cells, and several studies have found deworming to lead to an increase in allergic sensitivity. However, in some cases helminths and other parasites are a cause of developing allergies instead. In addition, such infections are not themselves a treatment",
"allergies face tremendous challenges due to lack of public awareness about anaphylactic cat allergies, and do not enjoy the same conscientiousness from the public as those with a food allergy might, due to widespread knowledge of allergies to allergens such as nuts or dairy. Cat allergens Five cat allergens have been described in medical literature. The two major allergens are Fel d 1 (a secretoglobin) and Fel d 4 (a lipocalin). The minor allergens include Fel d 2 (an albumin), Fel d 3 (a cystatin), and cat IgA.\nFel d 4 is the product of the cat major urinary protein gene.",
"production, leading to type I hypersensitivity.\nSensitivities vary widely from one person (or from one animal) to another. A very broad range of substances can be allergens to sensitive individuals. Types of allergens Allergens can be found in a variety of sources, such as dust mite excretion, pollen, pet dander, or even royal jelly. Food allergies are not as common as food sensitivity, but some foods such as peanuts (a legume), nuts, seafood and shellfish are the cause of serious allergies in many people.\nOfficially, the United States Food and Drug Administration does recognize eight foods as being common for allergic reactions",
"Allergic response Mechanism Allergies are an abnormal immune reaction. The human immune system is designed to protect the body from potential harm and in people who have allergies the immune system will react to allergens (substances that trigger an immune response). \nThe immune system will produce immunoglobulin E, IgE, antibodies for each allergen. The antibodies will cause cells in the body to produce histamines. These histamines will act on different areas of the body (eyes, throat, nose, gastrointestinal tract, skin or lungs) to produce symptoms of an allergic reaction. \nThe allergic response is not limited to a certain amount of",
"environmental factors. Host factors include heredity, sex, race, and age, with heredity being by far the most significant. However, there have been recent increases in the incidence of allergic disorders that cannot be explained by genetic factors alone. Four major environmental candidates are alterations in exposure to infectious diseases during early childhood, environmental pollution, allergen levels, and dietary changes. Foods A wide variety of foods can cause allergic reactions, but 90% of allergic responses to foods are caused by cow's milk, soy, eggs, wheat, peanuts, tree nuts, fish, and shellfish. Other food allergies, affecting less than 1 person per 10,000",
"of allergy problems every time they handle a food package, and restaurants have added allergen warnings to menus. School systems have protocols about what foods can be brought into the school. Despite all these precautions, people with serious allergies are aware that accidental exposure can easily occur at other peoples' houses, at school or in restaurants. Food fear has a significant impact on quality of life. Finally, for children with allergies, their quality of life is also affected by actions of their peers. There is an increased occurrence of bullying, which can include threats or acts of deliberately being touched",
"people to be reminded of allergy problems every time they handle a food package, and restaurants have added allergen warnings to menus. The Culinary Institute of America, a premier school for chef training, has courses in allergen-free cooking and a separate teaching kitchen. School systems have protocols about what foods can be brought into the school. Despite all these precautions, people with serious allergies are aware that accidental exposure can easily occur at other peoples' houses, at school or in restaurants. Food fear has a significant impact on quality of life. Finally, for children with allergies, their quality of life",
"Animal allergy In medicine, animal allergy is hypersensitivity to certain substances produced by animals, such as the proteins in animal hair and saliva. It is a common type of allergy. Signs and symptoms Symptoms of an allergic reaction to animals may include itchy skin, nasal congestion, itchy nose, sneezing, chronic sore throat or itchy throat, swollen, red, itchy, and watery eyes, coughing, asthma, or rash on the face or chest.",
"for an allergy. Other ways to test for allergies can be challenge testing, which consists in feeding a very small and measured amount of the allergen to the patient and monitor the reaction (O'Neil, Zanovec and Nickla). This should only be done by a doctor under surveillance. Allergy or intolerance An allergy is different from an intolerance. Food allergies and food intolerances should not be confused because they do not contain the same risks and are not diagnosed the same way. Allergies can be fatal after only a small consumption, while intolerance, although uncomfortable, are not as deadly. An intolerance",
"of direct contact with the allergen—consuming food or drink one is sensitive to (ingestion), breathing in pollen, perfume or pet dander (inhalation), or brushing a body part against an allergy-causing plant (direct contact). Other common causes of serious allergy are wasp, fire ant and bee stings, penicillin, and latex. An extremely serious form of an allergic reaction is called anaphylaxis. One form of treatment is the administration of sterile epinephrine to the person experiencing anaphylaxis, which suppresses the body's overreaction to the allergen, and allows for the patient to be transported to a medical facility. Seasonal allergy",
"perioral itching and local urticaria. Only occasionally have these food-induced allergies induced systemic responses. Researchers suspect that the cross-reactivity of latex with banana, avocado, kiwifruit, and chestnut occurs because latex proteins are structurally homologous with some other plant proteins. Medications About 10% of people report that they are allergic to penicillin; however, 90% turn out not to be. Serious allergies only occur in about 0.03%. Insect stings Typically, insects which generate allergic responses are either stinging insects (wasps, bees, hornets and ants) or biting insects (mosquitoes, ticks). Stinging insects inject venom into their victims, whilst biting insects normally introduce anti-coagulants.",
"with serious allergies are aware that accidental exposure can easily occur at other peoples' houses, at school or in restaurants. Food fear has a significant impact on quality of life. Finally, for children with allergies, their quality of life is also affected by actions of their peers. There is an increased occurrence of bullying, which can include threats or acts of deliberately being touched with foods they need to avoid, also having their allergen-free food deliberately contaminated. Genetically modified food There are concerns that genetically modified foods, also described as foods sourced from genetically modified organisms (GMO), could be responsible",
"was found to differ between allergic and non-allergic Estonian and Swedish children (although this finding was not replicated in a larger cohort), and the biodiversity of the intestinal flora in patients with Crohn’s disease was diminished. Limitations The hygiene hypothesis does not apply to all populations. For example, in the case of inflammatory bowel disease, it is primarily relevant when a person’s level of affluence increases, either due to changes in society or by moving to a more affluent country, but not when affluence remains constant at a high level.\nThe hygiene hypothesis has difficulty explaining why allergic diseases also occur",
"is more severe, allergy immunotherapy may be recommended. \nThere are a number of different kinds of allergies from which dogs may suffer. They may be gut-induced, skin-induced, and respiratory-induced. Gut-induced allergies Gut-induced allergies, or food allergies, are common health concerns. They may be induced by an allergic reaction to the preservatives or artificial coloring used in commercial dog foods, or they may be triggered by the intact protein source used in the food. Protein sources that commonly offend include beef, soy, chicken, and turkey. \nClinical signs of gut-induced allergies include the presence of rashes, itchy or tender skin, gastrointestinal upsets",
"skin. Allergens There is currently no regulation over use of the term \"hypoallergenic\", and even pediatric skin products with the label were found to still contain allergens. Those with eczema are especially vulnerable to an allergic reaction with lotion, as their compromised skin barrier allows preservatives to bind with and activate immune cells.\nThe American Academy of Allergy, Asthma, and Immunology warns that natural lotion containing ingredients commonly found in food (such as goats milk, cow's milk, coconut milk, or oil) may introduce new allergies, and an allergic reaction when those foods are later consumed.",
"light headedness and nausea, while causing people with allergies to be more susceptible allergy triggers like dust or pollen. Many particles in disease fuel are so tiny they are able to penetrate deep into the lungs when inhaled. Importantly, diesel fuel particles appear to have even greater immunologic effects in the presence of environmental allergens than they do alone. \"This immunologic evidence may help explain the epidemiologic studies indicating that children living along major trucking thoroughfares are at increased risk for asthmatic and allergic symptoms and are more likely to have respiratory dysfunction.\" according to Robert Pandya and",
"anemia, constipation, dizziness and tinnitus. Allergies A small percentage of people are allergic to sesame seeds. In Australia the occurrence of allergy to sesame seed was estimated to be 0.42 percent among all children, and in the United Kingdom 0.04 percent of adults. The occurrence of allergy to sesame is much higher in people who have allergies to other foods.",
"environmental influences and changes due to migration. It has been suggested that different genetic loci are responsible for asthma, to be specific, in people of European, Hispanic, Asian, and African origins. Hygiene hypothesis Allergic diseases are caused by inappropriate immunological responses to harmless antigens driven by a TH2-mediated immune response. Many bacteria and viruses elicit a TH1-mediated immune response, which down-regulates TH2 responses. The first proposed mechanism of action of the hygiene hypothesis was that insufficient stimulation of the TH1 arm of the immune system leads to an overactive TH2 arm, which in turn leads to allergic disease. In other",
"Soy allergy Signs and symptoms Food allergies can have fast onset (from seconds to one hour) or slow onset (from hours to several days) depending on mechanism. Symptoms may include: rash, hives, itching of mouth, lips, tongue, throat, eyes, skin, or other areas, swelling of lips, tongue, eyelids, or the whole face, difficulty swallowing, runny or congested nose, hoarse voice, wheezing, shortness of breath, diarrhea, abdominal pain, lightheadedness, fainting, nausea and vomiting. Symptoms of allergies vary from person to person and may vary from incident to incident. Serious danger regarding allergies can begin when the respiratory tract or blood circulation",
"(anaphylaxis) occurs, then epinephrine should be used. People with potential anaphylaxis are recommended to carry auto-injectors at all times. Less severe reaction may be dealt with by taking an antihistamine tablet.\nTotal avoidance is complicated because the declaration of the presence of trace amounts of allergens in foods is not mandatory (see regulation of labelling). Society and culture Whether food allergy prevalence is increasing or not, food allergy awareness has increased, with impacts on the quality of life for children, their parents and their immediate caregivers. In the United States, the Food Allergen Labeling and Consumer Protection Act of 2004 causes",
"states that infants and children who lack exposure to infectious agents are more susceptible to allergic diseases via modulation of immune system development. The theory was first proposed by David P. Strachan who noted that hay fever and eczema were less common in children who belonged to large families. Since then, studies have noted the effect of gastrointestinal worms on the development of allergies in the developing world. For example, a study in Gambia found that eradication of worms in some villages led to increased skin reactions to allergies among children. Vaccines While annual or semi-annual mass antihelminthic administration is",
"expanded beyond allergies, and is also studied in the context of a broader range of conditions affected by the immune system, particularly inflammatory diseases. These include type 1 diabetes, multiple sclerosis, and also some types of depression and cancer. For example, the global distribution of multiple sclerosis is negatively correlated with that of the helminth Trichuris trichiura and its incidence is negatively correlated with Helicobacter pylori infection. Strachan's original hypothesis could not explain how various allergic conditions spiked or increased in prevalence at different times, such as why respiratory allergies began to increase much earlier than food allergies, which did",
"severe than those induced by food allergy, but can include anaphylaxis. Research directions FODMAPs are fermentable oligo-, di-, monosaccharides and polyols, which are poorly absorbed in the small intestine and subsequently fermented by the bacteria in the distal small and proximal large intestine. This is a normal phenomenon, common to everyone. The resultant production of gas potentially results in bloating and flatulence. Although FODMAPs can produce certain digestive discomfort in some people, not only do they not cause intestinal inflammation, but they avoid it, because they produce beneficial alterations in the intestinal flora that contribute to maintain the good health",
"Feline asthma Feline asthma is a common allergic respiratory disease in cats, affecting at least one percent of all adult cats worldwide. It is a chronic progressive disease for which there is no cure. Common symptoms include wheezing, coughing, labored breathing and potentially life-threatening bronchoconstriction. There is conjecture that the disease is becoming more common due to increased exposure to industrial pollutants. Signs and symptoms Feline asthma occurs with the inflammation of the small passageways of a cat's lungs, during the attack the lungs will thicken and constrict making it difficult to breathe. Mucus may be released by the",
"the rapid rise in atopic disorders over the last 30 to 40 years. Strachan further proposed that the reason why this exposure no longer occurs is not only because of the trend towards smaller families, but also \"improved household amenities and higher standards of personal cleanliness\".\nAlthough there is substantial evidence that some microbial exposures in early childhood can in some way protect against allergies, there is no evidence that humans need exposure to harmful microbes (infection) or that it is necessary to suffer a clinical infection. Nor is there evidence that hygiene measures such as hand washing, food hygiene etc.",
"basis: allergic rhinitis, asthma, atopic dermatitis, eosinophilic esophagitis, chronic sinusitis, aspirin-induced asthma, allergic bronchopulmonary aspergillosis, chronic eosinophilic pneumonia, and Kimura's disease.\nCertain types of food allergy disorders may also be associated with eosinophilia or, less commonly, hypereosinophilia. Allergic eosinophilic esophagitis and the Food protein-induced enterocolitis syndrome are commonly associated with increased blood eosinophil levels. Drugs A wide range of drugs are known to cause hypereosinophilia or eosinophilia accompanied by an array of allergic symptoms. Rarely, these reactions are severe causing, for example, the drug reaction with eosinophilia and systemic symptoms (DRESS) syndrome. While virtually any drug should be considered as a",
"vesicles, blisters, and streaking.\nEstimates vary on the percentage of the population that will have an immune system response. Approximately 25 percent of the population will have a strong allergic response to urushiol. In general, approximately 80 percent to 90 percent of adults will develop a rash if they are exposed to .0050 milligrams (7.7×10⁻⁵ gr) of purified urushiol, but some people are so sensitive that it takes only a molecular trace on the skin to initiate an allergic reaction. Genetics Allergic diseases are strongly familial: identical twins are likely to have the same allergic diseases about 70% of the time; the",
"may induce an allergic reaction in such animals which may manifest as gastro-intestinal problems or skin lesions/ scabs.\nIt is commonly used as livestock feed, including poultry and fish. It is a good source of protein, energy and pigments.",
"classical antihistamines that act upon the H₁ histamine receptor. Antihistamines are used as treatment for allergies. Allergies are caused by an excessive response of the body to allergens, such as the pollen released by grasses and trees. An allergic reaction causes release of histamine by the body. Other uses of antihistamines are to help with normal symptoms of insect stings even if there is no allergic reaction. Their recreational appeal exists mainly due to their anticholinergic properties, that induce anxiolysis and, in some cases such as diphenhydramine, chlorpheniramine, and orphenadrine, a characteristic euphoria at moderate doses. High dosages taken to"
] |
What is 'shale oil', and how is it different than other types of oil? | [
"Oil that's found today is found in certain types of special rock formations. It's easy to get oil out of sand because oil and sand are still a liquid so a filter separates them. However, some oil is in shale which is more like a rock sponge. Unlike a sponge you can't squeeze it to get the liquid out. \n\nSo to get the oil out you need to break all the tiny spaces in the shale to create one big hole that allows a large amount of liquid oil to flow. \n\nThe oil in shale was mostly discovered long, long ago, but no one could get to the oil in ways that cost less than the oil (drilling an oil well is very expensive). \n\nRecently, we got better at angled drilling and can drill one well and extend holes in pinwheels away from the center and use a liquid to fracture an enormous amount of the shale around the well, which releases the oil trapped in it and allows it to be collected."
] | [
"Shale oil Shale oil is an unconventional oil produced from oil shale rock fragments by pyrolysis, hydrogenation, or thermal dissolution. These processes convert the organic matter within the rock (kerogen) into synthetic oil and gas. The resulting oil can be used immediately as a fuel or upgraded to meet refinery feedstock specifications by adding hydrogen and removing impurities such as sulfur and nitrogen. The refined products can be used for the same purposes as those derived from crude oil.\nThe term \"shale oil\" is also used for crude oil produced from shales of other very low permeability formations. However,",
"shale is used to produce shale oil, a type of synthetic oil extracted from shale by pyrolysis, which is sufficient to keep Estonia as the second largest shale oil producer in the world after China. In addition, oil shale and its products are used in Estonia for district heating and as a feedstock material for the cement industry.\nThere are two kinds of oil shale in Estonia, both of which are sedimentary rocks laid down during the Ordovician geologic period. Graptolitic argillite is the larger resource, but, because its organic matter content is relatively low, it is not used industrially. The",
"Oil shale The United States has the largest known deposits of oil shale in the world, according to the Bureau of Land Management and holds an estimated 2.175 trillion barrels (345.8 km³) of potentially recoverable oil. Oil shale does not actually contain oil, but a waxy oil precursor known as kerogen. There is significant commercial production of oil from oil shale in the United States. Oil sands There are significant volumes of heavy oil in the oil sands of northeast Utah. There has yet to be any significant production from these deposits.",
"Oil shale reserves Oil shale reserves refers to oil shale resources that are economically recoverable under current economic conditions and technological abilities. Oil shale deposits range from small presently economically unrecoverable to large potentially recoverable resources. Defining oil shale reserves is difficult, as the chemical composition of different oil shales, as well as their kerogen content and extraction technologies, vary significantly. The economic feasibility of oil shale extraction is highly dependent on the price of conventional oil; if the price of crude oil per barrel is less than the production price per barrel of oil shale, it is uneconomic.\nAs source",
"into crude oil. Technically speaking, oil shales are not always shales and do not contain oil, but are fined-grain sedimentary rocks containing an insoluble organic solid called kerogen. The kerogen in the rock can be converted into crude oil using heat and pressure to simulate natural processes. The method has been known for centuries and was patented in 1694 under British Crown Patent No. 330 covering, \"A way to extract and make great quantities of pitch, tar, and oil out of a sort of stone.\" Although oil shales are found in many countries, the United States has the world's largest",
"Shale band In the economics of petroleum extraction, the term shale band refers to the range of global oil prices that can support current levels of United States shale oil extraction via hydraulic fracturing techniques. Price range The term was defined on May 8, 2015 by Olivier Jakob, the director of Petromatrix, a Swiss-based consultancy company that publishes a daily note on the oil markets. Petromatrix described the shale band as a price range between $45 and $65 per barrel for West Texas Intermediate (WTI) crude oil. Below $45 per barrel, production of US shale oil would fall sharply, and",
"oil shale industry failed because of competition from cheaper petroleum.\nAs of 2014, there are a number of companies doing research and development on oil shale deposits in Colorado and Utah, but there is no commercial production of oil from shale in the United States. US oil shale resources The United States has not had a viable oil shale industry for more than 150 years, yet it contains the largest oil shale resource in the world. Eastern resources There are two types of oil shale resources in the United States east of the Mississippi River. The first is cannel coal, which",
"Oil shale economics Oil shale economics deals with the economic feasibility of oil shale extraction and processing. Although usually oil shale economics is understood as shale oil extraction economics, the wider approach evaluates usage of oil shale as whole, including for the oil-shale-fired power generation and production of by-products during retorting or shale oil upgrading processes.\nThe economic feasibility of oil shale is highly dependent on the price of conventional oil, and the assumption that the price will remain at a certain level for some time to come. As a developing fuel source the production and processing costs for oil",
"chemicals and industrial resins, and as a railroad wood preservative. As of 2008, it is primarily used as a heating oil and marine fuel, and to a lesser extent in the production of various chemicals.\nShale oil's concentration of high-boiling point compounds is suited for the production of middle distillates such as kerosene, jet fuel and diesel fuel. Additional cracking can create the lighter hydrocarbons used in gasoline. Reserves and production Global technically recoverable oil shale reserves have recently been estimated at about 2.8 to 3.3 trillion barrels (450×10⁹ to 520×10⁹ m³) of shale oil, with the largest reserves in the United",
"Spent shale Spent shale or spent oil shale (also known as retorted shale) is a solid residue from the shale oil extraction process of producing synthetic shale oil from oil shale. It consists of inorganic compounds (minerals) and remaining organic matter known as char—a carbonaceous residue formed from kerogen. Depending on the extraction process and the amount of remaining organic matter, spent shale may be classified as oil shale coke, semi-coke or coke-ash residue, known also as oil shale ash. According to the European Union waste list all these types of spent shale are classified as hazardous waste.\nOil shale coke",
"carbon, and oxygen content of oil shales' original organic matter. The most commonly used classification of oil shales, developed between 1987 and 1991 by Adrian C. Hutton, adapts petrographic terms from coal terminology. This classification designates oil shales as terrestrial, lacustrine (lake-bottom-deposited), or marine (ocean bottom-deposited), based on the environment of the initial biomass deposit. Known oil shales are predominantly aquatic (marine, lacustrine) origin. Hutton's classification scheme has proven useful in estimating the yield and composition of the extracted oil. Resource As source rocks for most conventional oil reservoirs, oil shale deposits are found in all world oil",
"History of the oil shale industry The history of the oil shale industry started in ancient times. The modern industrial use of oil shale for oil extraction dates to the mid-19th century and started growing just before World War I because of the mass production of automobiles and trucks and the supposed shortage of gasoline for transportation needs. Between the World Wars oil shale projects were begun in several countries.\nAfter World War II, the oil shale industry declined due to increased accessibility to conventional crude oil. As of 2010, oil shale was commercially used in Estonia, China and Brazil,",
"An Assessment of 137 Shale Formations in 41 Countries Outside the United States.\" The inventory is incomplete due to exclusion of tight oil and gas from sources other than shale such as sandstone or carbonates, formations underlying the large oil fields located in the Middle East and the Caspian region, off shore formations, or about which there is little information. Amounts include only high quality prospects which are likely to be developed.\nIn 2012, at least 4,000 new producing shale oil (tight oil) wells were brought online in the United States. By comparison, the number of new producing oil and gas",
"oil and gas resources, analysts distinguish between oil shale resources and oil shale reserves. \"Resources\" refers to all oil shale deposits, while \"reserves\", represents those deposits from which producers can extract oil shale economically using existing technology. Since extraction technologies develop continuously, planners can only estimate the amount of recoverable kerogen.\nAlthough resources of oil shale occur in many countries, only 33 countries possess known deposits of possible economic value.\nWell-explored deposits, potentially classifiable as reserves, include the Green River deposits in the western United States, the Tertiary deposits in Queensland, Australia, deposits in Sweden and Estonia, the El-Lajjun deposit in Jordan, and",
"yield a lower API gravity shale oil than the in situ processes. Shale oil serves best for producing middle-distillates such as kerosene, jet fuel, and diesel fuel. Worldwide demand for these middle distillates, particularly for diesel fuels, increased rapidly in the 1990s and 2000s. However, appropriate refining processes equivalent to hydrocracking can transform shale oil into a lighter-range hydrocarbon (gasoline). Economics The amount of economically recoverable oil shale is unknown. The various attempts to develop oil shale deposits have succeeded only when the cost of shale-oil production in a given region comes in below the price of crude",
"shale are high due to the small nature of the projects and the specialist technology involved. A full-scale project to develop oil shale would require heavy investment and could potentially leave businesses vulnerable should the oil price drop and the cost of producing the oil would exceed the price they could obtain for the oil.\nDue to the volatile prices and high capital costs few deposits can be exploited economically without subsidies. However, some countries, such as Estonia, Brazil, and China, operate oil-shale industries, while some others, including Australia, United States, Canada, Jordan, Israel, and Egypt, are contemplating establishing or re-establishing",
"of shale oil) and the United Kingdom (500 million metric tons of shale oil). There are oil shale reserves also in Germany, Luxembourg, Spain, Bulgaria, Hungary, Poland, Serbia, Austria, Albania, and Romania. Middle East Significant oil shale deposits are located in Israel (equal to about 250 billion barrels (4.0×10¹⁰ cubic metres) of shale oil) and in Jordan (equal to about 102 billion barrels (1.62×10¹⁰ cubic metres) of shale oil). In 2008, these resources were estimated 4 billion barrels (640,000,000 cubic metres) of shale oil and 34.172 billion barrels (5.4329×10⁹ cubic metres) of shale oil correspondingly. Jordan oil shales are high quality, comparable to western",
"in the case of phospholipids and steroids. Mineral oils Crude oil, or petroleum, and its refined components, collectively termed petrochemicals, are crucial resources in the modern economy. Crude oil originates from ancient fossilized organic materials, such as zooplankton and algae, which geochemical processes convert into oil. The name \"mineral oil\" is a misnomer, in that minerals are not the source of the oil—ancient plants and animals are. Mineral oil is organic. However, it is classified as \"mineral oil\" instead of as \"organic oil\" because its organic origin is remote (and was unknown at the time of its discovery), and",
"History of the oil shale industry in the United States The history of the oil shale industry in the United States goes back to the 1850s; it dates back farther as a major enterprise than the petroleum industry. But although the United States contains the world's largest known resource of oil shale, the US has not been a significant producer of shale oil since 1861. There were three major past attempts to establish an American oil shale industry: the 1850s; in the years during and after World War I; and in the 1970s and early 1980s. Each time, the",
"Petroleum Petroleum (/pəˈtroʊliəm/) is a naturally occurring, yellowish-black liquid found in geological formations beneath the Earth's surface. It is commonly refined into various types of fuels. Components of petroleum are separated using a technique called fractional distillation, i.e. separation of a liquid mixture into fractions differing in boiling point by means of distillation, typically using a fractionating column.\nIt consists of naturally occurring hydrocarbons of various molecular weights and may contain miscellaneous organic compounds. The name petroleum covers both naturally occurring unprocessed crude oil and petroleum products that are made up of refined crude oil. A fossil fuel, petroleum is",
"Oil shale in Australia There are oil shale deposits in Australia which range from small deposits to large reserves. Deposits, varying by their age and origin, are located in about a third of eastern Australia. In 2012, the demonstrated oil shale reserves were estimated at 58 billion tonnes. The easiest to recover deposits are located in Queensland.\nThe developments started in the 1860s exploiting deposits in New South Wales and Tasmania. The oil shale industry stopped in 1952 and restarted in the late 1990s. In 2012, one pilot shale oil plant and several development projects operated in Queensland and Tasmania. Geology and",
"Oil shale in China Oil shale in China is an important source of unconventional oil. A total Chinese oil shale resource amounts of 720 billion tonnes, located in 80 deposits of 47 oil shale basins. This is equal to 48 billion tonnes of shale oil. At the same time there are speculations that the actual resource may even exceed the oil shale resource of the United States.\nThe oil shale industry was established in China already in the 1920s. After decrease in the production, the industry started to increase and as of 2008; several companies are engage in the shale oil production or the",
"is the Monterey shale, thought by some to contain more than 400 billion barrels of oil in place. The formation has for many years yielded oil in areas where it is naturally fractured, and oil companies are investigating ways to make the shale in currently non-productive areas give up the oil through artificial fracturing. Over some large areas, California's geologic layers are complexly folded, making horizontal drilling difficult. As of 2013, the Monterey shale has resisted attempts to obtain economic production of oil through hydraulic fracturing, fracking, which involves injecting water, sand, and chemicals into the shale under high pressure,",
"Shale gas by country Shale gas is natural gas produced from shale, a type of sedimentary rock. Shale gas has become an increasingly important source of natural gas in the United States over the past decade, and interest has spread to potential gas shales in Canada, Europe, Asia, and Australia. One analyst expects shale gas to supply as much as half the natural gas production in North America by 2020.\nIn a 2013 report, the US Energy Information Administration estimated the quantity of technically recoverable shale gas for 41 countries. North America leads the worldwide production of shale gas, with the",
"Oil shale in Israel Oil shale in Israel is widespread but an undeveloped resource, largely because of economic and technological constraints. Israeli oil shales belong to the group of Upper Cretaceous marinite deposits. Although oil-shale deposits may lie under as much as 15% of the country, only a small part of these are mineable. According to the Geological Survey of Israel, deposits that could have the biggest economic potential are located in the northern Negev, the largest being the Rotem-Yamin formation. For several decades, oil shale was used for small-scale power generation at Mishor Rotem. Several Israeli companies",
"extraction byproducts. Between 1946 and 1952, a marine type of Dictyonema shale served for uranium production in Sillamäe, Estonia, and between 1950 and 1989 Sweden used alum shale for the same purposes. Oil shale gas has served as a substitute for natural gas, but as of 2009, producing oil shale gas as a natural-gas substitute remained economically infeasible.\nThe shale oil derived from oil shale does not directly substitute for crude oil in all applications. It may contain higher concentrations of olefins, oxygen, and nitrogen than conventional crude oil. Some shale oils may have higher sulfur or arsenic content.",
"rocks for most conventional oil reservoirs, oil shale deposits are found in all world oil provinces, although most of them are too deep to be exploited economically. There are more than 600 known oil shale deposits around the world. Although resources of oil shale occur in many countries, only 33 countries possess known deposits of possible economic value.\nMany deposits need more exploration to determine their potential as reserves. Well-explored deposits, which could ultimately be classified as reserves, include the Green River deposits in the western United States, the Tertiary deposits in Queensland, Australia, deposits in Sweden and Estonia, the El-Lajjun",
" The most important and investigated deposits are located in west-central Jordan, where they occur at the surface and close to developed infrastructure.\nAlthough oil shale was utilized in northern Jordan prior to and during World War I, intensive exploration and studies of Jordan's oil shale resource potential started in the 1970s and 1980s, being motivated by higher oil prices, modern technology and better economic potential. As of 2011, no oil shale industry exists in Jordan, but several companies are considering both shale oil extraction and oil shale combustion for thermal power generation.\nA series of projects is set to make available",
"shale oil from oil shale was 930,000 tonnes, equal to 17,700 barrels per day (2,810 m³/d), of which China produced 375,000 tonnes, Estonia 355,000 tonnes, and Brazil 200,000 tonnes. In comparison, production of the conventional oil and natural gas liquids in 2008 amounted 3.95 billion tonnes or 82.1 million barrels per day (13.1×10⁶ m³/d). Extraction and processing Most exploitation of oil shale involves mining followed by shipping elsewhere, after which one can burn the shale directly to generate electricity, or undertake further processing. The most common methods of surface mining involve open pit mining and strip mining. These procedures remove most of the overlying material to",
"have proposed shale oil extraction; testing of the viability of the oil shale industry is currently being undertaken by Israel Energy Initiatives. However, as of 2011, there are no commercial oil shale operations in Israel. Resource Oil shale in Israel is Upper Cretaceous marinite, which kerogen is most-likely formed from marine phytoplankton. According to government agencies in Israel, oil shale within the nation is not at present a viable energy resource, given currently available technologies. Further study and analysis are needed to determine the full potential.\nOil shale deposits cover approximately 15% of Israel, mainly in the northern and"
] |
Why is sustained unpleasant noise, such as a crowd of screaming children or loud machinery so physically tiring? | [
"Here are two possible solutions: first it is due to coincidence, or it may be due to an induced stress response. What I mean by coincidence is, a crowd of screaming children or loud machinery often comes with chasing around children or doing work with the machines. This is what tires you, the noise is just something you associate with the tiredness. The second explanation is has to do with your body releasing flight or fight hormones, including adrenaline in response to a loud, stressful environment. After leaving the loud environment, the hormones wear off and you are left in a state of minor withdrawal, like a sugar high and subsequent crash. \n\nTLDR: tired from the activity, not the noise or crash after adrenaline rush."
] | [
"a high pitched tinnitus and low frequency hearing loss causes a roaring tinnitus. Noise-induced tinnitus can be temporary or permanent depending on the type and amount of noise a person was exposed to. Cardiovascular effects Noise has been associated with important cardiovascular health problems, particularly hypertension. Noise levels of 50 dB(A) at night may also increase the risk of myocardial infarction by chronically elevating cortisol production.\nRoadway noise levels are sufficient to constrict arterial blood flow and lead to elevated blood pressure. Vasoconstriction can result from elevated adrenaline levels or through medical stress reactions. Psychological impacts of noise Causal relationships have been",
"an actual sound.\nReactions to the triggers can include aggression toward the origin of the sound, leaving, remaining in its presence but suffering, trying to block it or trying to mimic the sound.\nThe first misophonic reaction may occur when a person is young and can originate from someone in a close relationship, or a pet.\nParticularly severe cases of misophonia may result in violent impulses toward the source of the sound. One such case described in the journal Psychiatry and Clinical Psychopharmacology detailed 'involuntary violence' exhibited by a sufferer in response to a trigger in the form of another person eating loudly.\nPeople",
"noise on a daily basis, they may be exposed to noise sources such as firearms, music, power tools, sports, and noisy toys. All of these encounters with noise cumulatively increases their risk for developing Noise-induced hearing loss. With NIHL being a fully preventable ailment, providing children with this type of education has the potential to reduce future incidence of this condition. There are multiple organizations in existence that provide educators with the appropriate material to teach this topic; teachers simply need to be proactive about accessing them. Below are examples of hearing conservation programs that have been designed specifically for",
"signals and impede concentration. High intensity noise interferes with vital workplace communication which increases the chance of accidents and decreases productivity.\nNoise may also act synergistically with other hazards to increase the risk of harm to workers. In particular, toxic materials (e.g. some solvents, metals, asphyxiants and pesticides) have some ototoxic properties that may affect hearing function.\nModern thinking in occupational safety and health further identifies noise as hazardous to workers' safety and health. This hazard is experienced in various places of employment and through a variety of sources.\nNoise, in the context of industrial noise, is hazardous to a persons hearing because",
"Shrillness Shrillness is a word used to describe the quality of sounds that have a high-pitched, strident, raucous, screeching or harsh character, such as those produced by a trumpet or piccolo, but it can also be used to describe a widely recognised and puzzling phenomenon whereby certain sounds are perceived as psychologically painful or aversive to a degree that cannot be accounted for simply in terms of frequency content or loudness. Such sounds include the sound of fingernails scraping a chalkboard, the sound of chalk on a blackboard, the sound of glass being scratched, and possibly the sound of",
"react as a listener to their own speech under conditions where the emission of verbal responses is very quick. The speed may be a function of strength or of differential reinforcement. Physical interruption may arise as in the case of those who are hearing impaired, or under conditions of mechanical impairment such as ambient noise. Skinner argues the Ouija board may operate to mask feedback and so produce unedited verbal behavior.",
"suffering associated with a traumatic event.\nIf the individual is shy or bashful and appears nervous when talking, they are likely to exhibit nervous laughter. Individuals who are shy and introverted who find themselves the center of conversational attention often become \"giddy\" with nervous laughter; this is a subconscious response caused by the brain over-thinking due to social anxiety or inexperience.",
"discovered between noise and psychological effects such as annoyance, psychiatric disorders, and effects on psychosocial well-being. Exposure to intense levels of noise can cause personality changes and violent reactions. Noise has also been shown to be a factor that attributed to violent reactions. The psychological impacts of noise also include an addiction to loud music. This was researched in a study where non-professional musicians were found to have loudness addictions more often than non-musician control subjects.\nPsychological health effects from noise include depression and anxiety. Individuals who have hearing loss, including noise induced hearing loss, may have their symptoms alleviated",
"will create noise in an attempt to distract other teams, and some sports teams have been known to create artificial noise in an attempt to make the stadium louder. In doing that, workers, teams, and fans may be at potential risk for damage to the auditory system.\nNIOSH conducted a health hazard evaluation and studies at Monster Trucking and Stock Car racing events, spectators average noise levels ranged from 95 to 100 dBA at the Monster Truck event and over 100 dBA at the stock car racing event. NIOSH researchers also published noise exposure levels for drivers, crew members, and staff.",
"react when the ball is snapped, and his eventual response may be weaker than normal because each play is begun \"with some indecision and doubt\". The noise can also prevent players from hearing audibles and can make it difficult for the team's offense to coordinate plays in the huddle. The effect of the noise can often be measured in mistakes, such as false start penalties.\nCoaches can take steps to minimize the effect of the crowd noise on their teams. Some American football teams bring large speakers to their practice fields and broadcast loud noises such as jet engines to prepare",
"nonlinearities in sounds make them more frightening.",
"recreational activities. Physical noise Physical noise is any external or environmental stimulus that distracts us from receiving the intended message sent by a communicator (Rothwell 11). Examples of physical noise include: others talking in the background, background music, a startling noise and acknowledging someone outside of the conversation. Semantic noise This is noise caused by the sender. i.e., the encoder. This type of noise occurs when grammar or technical language is used that the receiver (the decoder) cannot understand, or cannot understand it clearly.\nIt occurs when the sender of the message uses a word or a phrase that we don't",
"2004 study claimed that the blackboard sound was very similar to the warning cry of Siamang gibbons and hypothesized that a vestigial reflex is what causes the fight or flight reaction in humans. Other sounds, such as a person coughing or vomiting, provoke responses of disgust. These emotional reactions are thought to be caused by the body's natural tendency to avoid disease. Positive Stimulation There are various sounds that correspond to positive physical and emotional reactions as well. Therapists use these soothing sounds for therapy in stress relief and relaxation. However, most of the sounds that invoke positive responses tend",
"situation was pleasant and/or non-threatening, and to help prevent it escalating into something like a real fight. This, according to psychologists, is the reason why laughter exists in the first place, suggesting these noises were the dolphin equivalent of a human laugh.",
"Misophonia Signs and symptoms As of 2016 the literature on misophonia was limited. Some small studies show that people with misophonia generally have strong negative feelings, thoughts, and physical reactions to specific sounds, which the literature calls \"trigger sounds\". These sounds are apparently usually soft, but can be loud. One study found that around 80% of the sounds were related to the mouth (eating, slurping, chewing or popping gum, whispering, whistling, etc.), and around 60% were repetitive. A visual trigger may develop related to the trigger sound. It also appears that a misophonic reaction can occur in the absence of",
"cause of noise is due to the exocytosis of neurotransmitters from the synaptic terminals that provide input to a given neuron. This occurrence happens in the background while a cell is at resting membrane potential. Since it is happening in the background, the release is not due to a signal, but is random. This unpredictability adds to the synaptic noise level.\nSynaptic noise shows up as miniature postsynaptic current, which is observed without any presynaptic input. These spontaneous currents are due to randomly released neurotransmitter vesicles. This is caused by the stochastic \"opening of intracellular Ca²⁺ stores, synaptic Ca²⁺-channel noise, spontaneous",
"to noise in learning environments experienced trouble with word discrimination, as well as various cognitive developmental delays. In particular, the writing learning impairment dysgraphia is commonly associated with environmental stressors in the classroom.\nHigh noise levels have also been known to damage the physical health of small children. Children from noisy residences often have a heart rate that is significantly higher (by 2 beats/min on average) than those of children from quieter homes. Prevention A hearing protection device (HPD) is an ear protection device worn in or over the ears while exposed to hazardous noise to help prevent noise-induced hearing",
"Noise-induced hearing loss Signs and symptoms The first symptom of NIHL may be difficulty hearing a conversation against a noisy background. The effect of hearing loss on speech perception has two components. The first component is the loss of audibility, which may be perceived as an overall decrease in volume. Modern hearing aids compensate this loss with amplification. The second component is known as \"distortion\" or \"clarity loss\" due to selective frequency loss. Consonants, due to their higher frequency, are typically affected first. For example, the sounds \"s\" and \"t\" are often difficult to hear for those with hearing loss,",
"increasing levels of aggression, hypertension and stress. In the extreme, excessive levels or periods of noise can have long-term negative health effects such as hearing loss, tinnitus, sleep disturbances, a rise in blood pressure, an increase in stress and vasoconstriction, and an increased incidence of coronary artery disease. In animals, noise can increase the risk of death by altering predator or prey detection and avoidance, interfering with reproduction and navigation, and contributing to permanent hearing loss.\nVarious cures are available to combat Environmental Noise; Roadway noise can be reduced by the use of noise barriers, limitation of vehicle speeds, alteration of",
"witnessing others' pain. For instance, in Stanley Milgram's obedience experiment, subjects (\"teachers\") were told to shock \"learners\" every time the learners answered a question incorrectly. Although the \"learners\" were not actually shocked, the subjects believed they were. As they were going through the study, many of the \"subjects showed signs of extreme tension and conflict\". Milgram observed some subjects laughing nervously when they heard the \"learners'\" false screams of pain. In A Brief Tour of Human Consciousness, neuroscientist V.S. Ramachandran suggests that laughter is used as a defense mechanism used to guard against overwhelming anxiety. Laughter often diminishes the",
"Dysfunction Disorder may feel that certain noises are painful or overwhelming. They may need to cover their ears when hearing a sound or in anticipation of what they think will be an offensive sound. They can find certain music to be soothing and become mesmerized by it. However, they may become overstimulated and upset if they hear something for which they are unprepared. Visual system The visual system involves sight. A child with Sensory Dysfunction Disorder may or may not be able to see an item that is directly in front of them. He or she may be sensitive to",
"debate about the precise physical mechanisms of the process. Other causes have also been proposed, relying on electrodynamic effects of the massive current acting on the plasma in the bolt of lightning. Consequences The shock wave in thunder is sufficient to cause property damage and injury, such as internal contusion, to individuals nearby. Thunder can rupture the eardrums of people nearby, leading to permanently impaired hearing. Even if not, it can lead to temporary deafness. Types Vavrek et al. (n.d.) reported that the sounds of thunder fall into categories based on loudness, duration, and pitch. Claps are loud sounds lasting",
"off the noise rarely bothered to do so, yet they performed better than those who could not turn off the noise. Simply being aware of this option was enough to substantially counteract the noise effect. In 2011, an animal study found that animals with control over stressful stimuli exhibited changes in the excitability of certain neurons in the prefrontal cortex. Animals that lacked control failed to exhibit this neural effect and showed signs consistent with learned helplessness and social anxiety. Neurobiological perspective Research has shown that increased 5-HT (serotonin) activity in the dorsal raphe nucleus plays a critical role",
"the forest or woods, a sudden sound can create an immediate response of fear, while the physical symptoms of fear follow that feeling, and do not precede it. James–Lange theory The James–Lange theory describes how emotion is caused by the bodily changes which come from the perception of the emotionally arousing experience or environment. This theory states that events cause the autonomic nervous system to induce physiological arousal, characterized by muscular tension, heart rate increases, perspiration, dryness of mouth, tears, etc. According to James and Lange, the emotion comes as a result of the physiological arousal. The bodily feeling as",
"groaning and are coiling themselves up. […] One screams as result of all the other times when it had to stay still, was making fun of, was humiliated or was beaten up”. Janov also says that the primal scream has series of reactions; “the patients that could not even say “piep” at home, suddenly feels powerful. The scream seems to be a liberating experience”. Janov noticed this with all his patients. Women who seem to have baby-voices during the therapy are developing with their primal scream a very low voice. As focus of power Gregory Whitehead, founder",
"to feel painful than for non-industry workers), but the sound is just as harmful to their ears. Industry workers often suffer from NIHL because the discomfort threshold is not a relevant indicator of the harmfulness of a sound. Gradually developing Gradually developing NIHL refers to permanent cochlear damage from repeated exposure to loud sounds over a period of time. Unlike acoustic trauma, this form of NIHL does not occur from a single exposure to a high-intensity sound pressure level. Gradually developing NIHL can be caused by multiple exposures to excessive noise in the workplace or any source of repetitive, frequent",
"University, reported in the Journal of Neuroscience, has shown that certain sounds produced a strong activation of the amygdala, a region of the brain involved in fear and emotion. The sound of a knife on a glass bottle was rated the most unpleasant, followed by a fork on a glass, then chalk on a blackboard, a ruler on a bottle, and fingernails on a blackboard, respectively. They note that the sounds share characteristics with screams and babies cries.\nA student project carried out on the internet at the University of Salford and reported on BBC Radio 4 asked people to rate",
"tired, anxious or intoxicated. During live broadcasts on TV or on the radio, for example, nonprofessional speakers and even hosts often make speech errors because they are under stress. Some speakers seem to be more prone to speech errors than others. For example, there is a certain connection between stuttering and speech errors. Charles F. Hockett explains that \"whenever a speaker feels some anxiety about possible lapse, he will be led to focus attention more than normally on what he has just said and on what he is just about to say. These are ideal breeding grounds for stuttering.\" Another",
"Hyperacusis Signs and symptoms In hyperacusis, the symptoms are ear pain, annoyance, and general intolerance to many sounds that most people are unaffected by. Crying spells or panic attacks may result from the experience of hyperacusis. It may affect either or both ears. Hyperacusis can also be accompanied by tinnitus. Hyperacusis can result in anxiety, stress and phonophobia. Avoidant behaviour is often a response to prevent the effects of hyperacusis and this can include avoiding social situations. Causes The most common cause of hyperacusis is overexposure to excessively high decibel (sound pressure) levels.\nSome sufferers acquire hyperacusis suddenly as",
"is sound. Sound increases the believability of an action for the audience. There are two kinds of sounds that can be made. One is vocal reactions. By adding a gasp, groan, or grunt when struck, the combatants make the moves come to life. The other kind of sound is a knap or a percussive sound made by hitting a resonant part of the body. This is timed to the moment an impact would happen and is staged so it is hidden from the audience. This allows the audience to believe that an actual blow or slap has landed because they"
] |