question
stringlengths
1
296
answers
sequence
ctxs
sequence
How a recession causes lower gas prices.
[ "Gas prices are largely driven by gas demand. The *demand* for gas however isn't usually driven by prices. That is, most people don't travel less just because gas costs more, they have a set number of miles they *have to* travel to live their lives.\n\nWell, if a bunch of people don't have jobs, and don't have any reason to shop, and can't afford to travel, suddenly they use less gas.\n\nGas has to become cheaper to sell all the gas they can make that isn't being used." ]
[ "the US had driven US gas prices down to 29% of natural gas prices in Europe, and to one-fifth of natural gas prices in Japan. Lower natural gas prices in the US have encouraged the replacement of coal- with gas-fired power plants, but have also discouraged the switch to renewable sources of energy. Facing a supply glut and consequent further price drops in 2012, some large US gas producers announced plans to cut natural gas production; however, production rates rose to all-time highs, and natural gas prices remained near ten-year lows. The high price of gas overseas has provided a", "and distribution/marketing accounted for 12% and 14% respectively.\nAfter Hurricane Katrina and Hurricane Rita, gas prices started rising to record high levels. In terms of the aggregate economy, increases in crude oil prices significantly predict the growth of real gross domestic product (GDP), but increases in natural gas prices do not.\nIn August 2005, after the damages from Hurricane Katrina ran up gas prices, on August 30th, a day after Katrina's landfall, prices in the spot market, which typically include a premium above the wellhead price, had surged past $11 per gigajoule ($12 per million British thermal units), and on 22 September", "for the recession. Hamilton acknowledged that this was probably not the entire cause but maintained that it showed that oil price increases made a significant contribution to the downturn in economic growth. Overproduction It has also been debated that the root cause of the crisis is overproduction of goods caused by globalization. Overproduction tends to cause deflation and signs of deflation were evident in October and November 2008, as commodity prices tumbled and the Federal Reserve was lowering its target rate to an all-time-low 0.25%. On the other hand, ecological economist Herman Daly suggests that it is not actually an", "of demand during recessions causes a fall in the price of raw materials, so the parameter goes down. The argument is symmetrical during the boom: prices of raw materials rise ( parameter increases) while the strength of unions due to increased employment level causes the degree of monopoly and thereby the mark-up level, to fall. The conclusion is that the α parameter is roughly constant over the business cycle.\nFinally, we need an equation that determines the total product of an economy:\nwhich is to say that the share of profits and salaries are the complement of the share of", "not caused significant changes in oil prices and that fundamental supply and demand factors provide the best explanation for the crude oil price increases. The report found that the primary reason for the price increases was that the world economy had expanded at its fastest pace in decades, resulting in substantial increases in the demand for oil, while the oil production grew sluggishly, compounded by production shortfalls in oil-exporting countries.\nThe report stated that as a result of the imbalance and low price elasticity, very large price increases occurred as the market attempted to balance scarce supply against growing demand, particularly", "gas stations.\nThe Mexican government planned to transition to market prices gradually throughout 2017. Finance Minister José Antonio Meade explained that the price hike was \"an important change\" which would \"allow prices to reflect costs, and avoid artificial distortions.\" The rise in gasoline prices was also a result of the government ending subsidies to the oil industry, and may have been motivated by projected budget deficits due to the peso's weakening value compared to the United States dollar.\nThe price hike—scheduled to begin on 1 January 2017—coincided with an economy marked by high inflation in addition to the weak peso. Donald Trump's", "these price increases to many factors, including reports from the United States Department of Energy and others showing a decline in petroleum reserves, worries over peak oil, Middle East tension, and oil price speculation.\nFor a time, geopolitical events and natural disasters indirectly related to the global oil market had strong short-term effects on oil prices. These events and disasters included North Korean missile tests, the 2006 conflict between Israel and Lebanon, worries over Iranian nuclear plants in 2006 and Hurricane Katrina. By 2008, such pressures appeared to have an insignificant impact on oil prices given the onset of the global", "oil market changed significantly. Before 2005 a small increase in oil price lead to an noticeable expansion of the production volume. Later price rises let the production grow only by small numbers. This was the reason to call 2005 a tipping point.\nAfter the destruction of Hurricane Katrina in the United States, gasoline prices reached a record high during the first week of September 2005. The average retail price was, on average, $3.04 per U.S. gallon. The average retail price of a liter of petrol in the United Kingdom was 86.4p on October 19, 2006, or $6.13 per gallon. ", "a lack of refining capacity would only seem to explain high gasoline prices not high crude oil prices. Indeed, if the refineries were unable to process available crude oil then there should be a crude oil glut that would reduce crude prices on international crude oil markets. Then again, sharp changes in crude oil prices can also be due to stock market volatility and fear over the security of future supplies, or, on the other hand, an anticipation by investors of a rise in the value of crude oil once refining capacity picks up again.\nAs for the global usefulness", "economy. A higher leverage implies fewer investors and more lenders. Therefore, asset prices in such an economy will be set by only a small group of investors.\nAccording to Tobin's Q, asset prices can affect economic activity. When prices of assets are high, new productive activity can be stimulated that can lead to over production. Alternatively, when asset prices crash, production may come to a standstill. Therefore, the leverage cycle has the potential to amplify real economic activity.\nWhen financially constrained arbitrageurs receive a bad shock, they are forced to shift to low volatility – low margin assets from high volatility -", "earlier but 96.8 cents above a year earlier. On June 24, the price of gas was $3.62.8 and expected to go much lower due to the opening of the Strategic Petroleum Reserve. U.S. oil prices fell below $90 before rising again, and Brent crude fell 2%.\nIn August, the same pessimistic economic news that caused stock prices to fall also decreased expected energy demand. On August 8, oil fell over 6%, in its largest drop since May, to $81, its lowest price of the year.\nDuring October, the price of oil rose 22%, the fastest pace since February, as worries over the", "2006, Hurricane Katrina, and various other factors. By 2008, such pressures appeared to have an insignificant impact on oil prices given the onset of the global recession. The recession caused demand for energy to shrink in late 2008, with oil prices falling from the July 2008 high of $147 to a December 2008 low of $32. Oil prices stabilized by October 2009 and established a trading range between $60 and $80.\nThe price of oil nearly tripled from $50 to $147 from early 2007 to 2008, before plunging as the financial crisis began to take hold in late 2008. Experts debate", "Once the bubble bursts, the fall in prices causes the collapse of unsustainable investment schemes (especially speculative and/or Ponzi investments, but not exclusively so), which leads to a crisis of consumer (and investor) confidence that may result in a financial panic and/or financial crisis; if there is monetary authority like a central bank, it may be forced to take a number of measures in order to soak up the liquidity in the financial system or risk a collapse of its currency. This may involve actions like bailouts of the financial system, but also others that reverse the trend of", "expansion of shale gas production in the US has caused prices to drop relative to other countries. This has caused a boom in energy intensive manufacturing sector exports, whereby the average dollar unit of US manufacturing exports has almost tripled its energy content between 1996 and 2012.\nA \"master gas system\" was invented in Saudi Arabia in the late 1970s, ending any necessity for flaring. Satellite observation, however, shows that flaring and venting are still practiced in some gas-extracting countries.\nNatural gas is used to generate electricity and heat for desalination. Similarly, some landfills that also discharge methane gases have been", "US business leaders that led to \"America’s contemporary economic malaise.\" Commodity price volatility A commodity price bubble was created following the collapse in the housing bubble. The price of oil nearly tripled from $50 to $140 from early 2007 to 2008, before plunging as the financial crisis began to take hold in late 2008. Experts debate the causes, which include the flow of money from housing and other investments into commodities to speculation and monetary policy. An increase in oil prices tends to divert a larger share of consumer spending into gasoline, which creates downward pressure on economic growth in", "what consumers pay at the pump, and why gas prices seem to 'rocket up' but feather down.\"\nLeibowitz was the one commissioner to dissent on a 2007 FTC Report on Spring/Summer 2006 Nationwide Gasoline Price Increases, which found that the increase could be explained by market forces. Leibowitz suggested that the plausible explanation for the increase in gasoline prices, that the Commission found, was not necessarily the only explanation. \"The question you ask determines the answer you get,\" he wrote, \"whatever theoretical justifications exist don't exclude the real world threat that there was profiteering at the expense of consumers.\" ", "of the study \"suggest new oil and gas extraction led to an increase in aggregate US employment of 725,000 and a 0.5 percent decrease in the unemployment rate during the Great Recession\". Research shows that shale gas wells can have a significant adverse impact on some house prices, with groundwater-reliant homes declining 13% in value whereas piped-water homes will see an increase of 2–3%. The price increase of the latter is most likely due to the royalty payments that property owners get from gas extracted under their land.\nThe issue of whether to export natural gas has split the business community.", "from $35 to $140 per barrel ($220 to $880/m³), causing a corresponding increase in gas prices. On the supply side, OPEC (or the Organization of the Petroleum Exporting Countries) has a great deal to do with the price of gasoline, both in the United States and around the world. The speculation of oil commodities can also affect the gasoline market. Taxes Taxes are the next biggest contributor to gasoline prices at around 12%. In the United States, both state and federal taxes apply to gasoline. In addition, other taxes may be placed on gas including applicable state sales taxes, gross", "is no longer a good indicator of a recession ahead.\"\nAn empirical study by John B. Taylor concluded that the crisis was: (1) caused by excess monetary expansion; (2) prolonged by an inability to evaluate counter-party risk due to opaque financial statements; and (3) worsened by the unpredictable nature of government's response to the crisis. Oil prices Economist James D. Hamilton has argued that the increase in oil prices in the period of 2007 through 2008 was a significant cause of the recession. He evaluated several different approaches to estimating the impact of oil price shocks on the economy, including some", "price bubble and following depression being necessary purging of the previous excesses.\nIn debt deflation (most associated with Post-Keynesian economics, but with some mainstream interest), price bubbles are particularly associated with excess private credit growth, especially extension of credit by commercial banks. While the price bubble itself is neutral, people then borrow against these inflated asset prices (as via a home equity line of credit), which increases the credit bubble, and it is the elevated level of debt that is the underlying cause of the ensuing depression. Related distinctions Assets can be distinguished as real (physical) assets, notably property, plant, and", "in margins mean that leverage falls. Hence, price falls more than they otherwise would due to the existence of leverage. Therefore, due to the leverage cycle (over-leveraging in good times and de-leveraging in bad times) there exists a situation that can lead to a crash before or even when there is no crash in the fundamentals. This was true in the quant hedge fund crisis in August 2007, where hedge funds hit their capital constraints and had to reduce their positions, at which point prices were driven more by liquidity considerations rather than movement in the fundamentals.\nIn the financial crisis", "prices, but it may mitigate the decline in oil production by retaining a partial amount of Iraq's oil reserves. As a direct consequence, the oil production capacity was diminished to 2 million barrels (320,000 m³) per day. 2004 to 2008: rising costs of oil After retreating for several months in late 2004 and early 2005, crude oil prices rose to new highs in March 2005. The price on NYMEX has been above $50 per barrel since March 5, 2005. In June 2005, crude oil prices broke the psychological barrier of $60 per barrel.\nFrom 2005 onwards, the price elasticity of the crude", "disrupt oil and gas production and create shortages. Fuel shortage can also be due to the excess and useless use of the fuels. Emerging oil shortage “Peak oil” is the period when the maximum rate of global petroleum extraction is reached, after which the rate of production enters terminal decline. It relates to a long-term decline in the available supply of petroleum. This, combined with increasing demand, significantly increases the worldwide prices of petroleum derived products. Most significant is the availability and price of liquid fuel for transportation.\nThe US Department of Energy in the Hirsch report indicates that", "increase in price will do the opposite. This works well for most assets but it often works in reverse for stocks due to the mistake many investors make of buying high in a state of euphoria and selling low in a state of fear or panic as a result of the herding instinct. In case an increase in price causes an increase in demand, or a decrease in price causes an increase in supply, this destroys the expected negative feedback loop and prices will be unstable. This can be seen in a bubble or crash.", "U.S. economy decreased, leading to predictions of $4 by early 2012. As of November 8, the price reached $96.80. Gas prices were not following the increase, due to lower demand resulting from the economy, the normal decrease in travel, lower oil prices in other countries, and production of winter blends which cost less. The average rose slightly to $3.41. 2012 The CIBC reported that the global oil industry continued to produce massive amounts of oil in spite of a stagnant crude oil market. Oil production from the Bakken formation was forecast in 2012 to grow by 600,000 barrels every year", "declining due to a significant increase in oil production in USA, and declining demand in the emerging countries. The oil glut—caused by multiple factors—spurred a sharp downward spiral in the price of oil that continued through February 2016. By February 3, 2016 oil was below $30— a drop of \"almost 75 percent since mid-2014 as competing producers pumped 1–2 million barrels of crude daily exceeding demand, just as China's economy hit lowest growth in a generation.\" Some analysts speculate that it may continue to drop further, perhaps as low as $18\nAccording to a report released on February 15, 2016 by", "this is yet another cycle and oil prices will recover sooner rather than later.\nA 2016 survey of the academic literature finds that \"most major oil price fluctuations dating back to 1973 are largely explained by shifts in the demand for crude oil\". As the global economy expands, so does demand for crude oil. The authors note that the price of oil has also increased at times due to greater \"demand for stocks (or inventories) of crude oil... to guard against future shortages in the oil market. Historically, inventory demand has been high in times of geopolitical tension in the Middle", "be passed in the course of the year. In July 2008, oil peaked at $147.30 a barrel and a gallon of gasoline was more than $4 across most of the US. The high of 2008 may have been part of broader pattern of spiking instability in the price of oil over the preceding decade. This pattern of instability in oil price may be a product of peak oil. There is concern that if the economy was to improve, oil prices might return to pre-recession levels.\nIn testimony before the Senate Committee on Commerce, Science, and Transportation on 3 June 2008, former", "buying smaller and more efficient cars, gradually reducing per-capita demand for gasoline. If the price rise were caused by a temporary lack of supply, and the price then subsequently goes back down as supply returns to normal, the quantity of gas consumed in this case does not immediately go back to its previous level, since the smaller cars that had been sold remain in the fleet for some time. Demand thereby has been \"destroyed\", shifting the demand curve.\nThe expectation of future prices and their long-term maintenance at non-economic levels for a certain quantity of consumption also affects vehicle decisions.", "the Gaza Strip. From mid January to February 13, oil fell to near $35 a barrel. 2010 On May 21, 2010, the price of oil had dropped in two weeks from $88 to $70 mainly due to concerns over how European countries would reduce budget deficits; if the European economy slowed down, this would mean less demand for crude oil. Also, if the European economic crisis caused the American economy to have problems, demand for oil would be reduced further. Other factors included the strong dollar and high inventories. According to the U.S. Energy Information Administration, gas prices nationwide averaged" ]
Why trees produce different shapes/sizes of leaves.
[ "A thing to remember about evolution (that I often see is either forgotten or never realized) is that so long as a trait works well enough, and doesn't kill an organism or weaken it to the point of applying direct evolutionary pressure, it will remain.\n\nLeaves are a balance between energy expenditure (to grow) and energy production. Trial and error from mutation and different plant branches of the evolutionary tree will lead to variety.", "Sometimes nature just does stuff because some component of an organism's genetics (its instruction book, if you will) changes due to a mutation and that mutation carries on to its descendants. If it's a mutation that adds some advantage, odds are a little better that it'll be retained in the long term than if it's a mutation that doesn't convey any advantage because the organisms with it are a little better off than the organisms without it. But the \"harmless\" mutations can still occur, and can still get carried on.\n\nTree leaves are like this. Sometimes their leaves have become adapted to specific circumstances that are best for their environment (example: conifers, that put their needles to sleep for the winter rather than losing them), and sometimes their shape isn't really part of some grand survival strategy to work better than other leaves. \n\nSo a maple leaf has lobes but an elm leaf does not. And a birch leaf has teeth around its outside but a lilac bush does not. And an ash tree will have compound leaves with lots of leaflets but a beech's leaves are simple. Each might convey SOME advantage or other, but regardless of whether or not that's true, each does its job and the customized shape isn't enough of a disadvantage to cause that tree to die out." ]
[ "tree shape – vary considerably among individuals and are habitat-dependent characteristics. Frequently, guanacaste trees grow as single specimens in a sunny pasture. Under these conditions, massive, extended, horizontal limbs emerge low on the boles, forming giant, hemispherical, widely spreading crowns. In the forest (where competition for light is intense) trees tend to become taller, and branching occurs at a higher level. Tree forms then become somewhat narrower, though crowns are still rounded, and hemispherical shapes are maintained by those that have reached the canopy.\nThe alternate leaves are bipinnate compound, 15–40 cm long and 17 cm broad with a 2–6 cm petiole bearing 4–15", "the crown of the tree, the height of the tree, and any other measurements the investigator deems appropriate. These measurements would then be supplemented by a narrative description and photographs. The goal in all of these cases of trees with unusual forms is to document their characteristics. Tree shape Different tree species tend to have different shapes and tree shapes also vary within a single tree species. As a general observation trees growing in an open setting tend to be shorter and have broader crowns, while those growing in a forested setting tend to be taller and have narrower crowns.", "LAD describes the statistical distribution of these angles. Examples of Leaf Angle Distributions Different plant canopies exhibit different LADs: For instance, grasses and willows have their leaves largely hanging vertically (such plants are said to have an erectophile LAD), while oaks tend to maintain their leaves more or less horizontally (these species are known as having a planophile LAD). In some tree species, leaves near the top of the canopy follow an erectophile LAD while those at the bottom of the canopy are more planophile. This may be interpreted as a strategy by that plant species to maximize exposure to", "are generally 3–5 cm long (1.2–2.0-inch) and 0.8–2 cm wide (0.3–0.8-inch), although narrower in some populations. The overall leaf shape is oblate, a rounded shape longer than it is wide, to lanceolate, shaped like the head of a lance. They are pinnatipartite, with a deeply incised leaf margin that may be either wavy or sharp-toothed; even within a single community of P. atriplicifolia, there can be considerable variation in the details of leaf shape. Leaves near the top of branches may merge into bracts. The foliage is aromatic, especially when crushed, with a fragrance described as sage-like, a blend of sage", "a rigid, leathery lineament. Variation in terms of colour, shape, texture and arrangement is however considerable. Foliage colour varies from a greyish green to distinctly blue, and the leaf shape varies from lanceolate to obovate. New branches and foliage are covered in rust-brown scales (gland granules), while mature leaves may be hairy or glabrous. Leaves may be opposite, sub-opposite or rarely alternate. The slender petiole is 1.5 to 2 mm long, and the leaves measure up to 5 x 1.5 cm. The leaf veins are clear and transparent against light, unlike the opaque venation of Wild olive trees. Leaves may also resemble", "and grow individually in species with large heads or with two to ten together in species with smaller heads, in the axils of the leaves near the end of the branches. The general shape of the heads is a flattened, round, egg- or cone-shaped sphere of 2–15 cm (0.79–5.91 in) in diameter. The position not at the very tip of the branches helps to distinguish Leucospermum from related genera such as Diastella, while the more than one head per branch helps to distinguish the sections Diastelloides and Hamatum from the other sections. The involucral bracts are green in fresh specimens, and inconspicuous.", "have a single trunk, and others pose additional measurement problems because of their size or configuration. The odd forms include those forms that grew because of unusual circumstances that affected the tree, or those trees that simply have an unusual growth form not seen in most other tree species. Frank proposed a classification system for various tree forms: 1) Single Trunk Trees; 2) Multitrunk Trees; 3) Clonal Coppices; 4) Clonal Colonies; 5) Conjoined and Hugging Trees; 6) Fallen Trees; 7) Tree complexes, and 8) Banyan-like trees; 9) Trees with Large Aerial Root Systems; and 10) Epiphytic Trees. This initial framework", "in length. These leaves are partially or entirely fused along their centers. Each leaf pair (together referred to as a body) ranges in shape from \"bilobed\" to spherical to ovoid to tubular to conical. Some species have epidermal windows on the top of their leaves. To the naked eye the epidermis ranges from very smooth to slightly rough to hairy, depending on the microscopic epidermal cell shape and structure. In their normal, natural state each stem has only one pair of leaves at a time though one plant may have dozens of stems and thus", "significantly different. In fact, considerable taxonomic difficulty has occurred in the past due to these differences, causing juvenile and adult plants to mistakenly be classified as different species. The trigger for the transformation to adult leaves can vary considerably. One possible trigger is the height of the plant. Secondary hemiepiphytes start off on the dark forest floor and climb their way up a tree, displaying their juvenile type leaves along the way. Once they reach a sufficient height, they begin developing adult type leaves. The smaller juvenile leaves are used for the darker forest floor where light is in scarce", "base of the branch will differ from leaves produced at the tip of the plant, and this difference is consistent from branch to branch on a given plant and in a given species. This difference persists after the leaves at both ends of the branch have matured, and is not the result of some leaves being younger than others. Environmental effects The way in which new structures mature as they are produced may be affected by the point in the plants life when they begin to develop, as well as by the environment to which the structures are exposed.", "can be minor, just being called \"ridges\", or prominent, being called \"wings\". Terete, two-lined, and six-lined stems can occur occasionally. When a species has a tree or shrub habit, the internodes become mostly terete with age, though some trace of lines can still be detected in mature plants. The number of lines is an important distinguishing characteristic; for example, H. perforatum and Hypericum maculatum are easily confused save for H. perforatum having two lines and H. maculatum having four. The pale and dark glands are present on stems of various species, and other various species have stems without any glands.", "phytoliths, lignins, tannins or poisons to discourage herbivory. Trees have evolved leaves in a wide range of shapes and sizes, in response to environmental pressures including climate and predation. They can be broad or needle-like, simple or compound, lobed or entire, smooth or hairy, delicate or tough, deciduous or evergreen. The needles of coniferous trees are compact but are structurally similar to those of broad-leaved trees. They are adapted for life in environments where resources are low or water is scarce. Frozen ground may limit water availability and conifers are often found in colder places at higher altitudes and higher", "Lepidodendron Description and biology Lepidodendron species were comparable in size to modern trees. The plants had tapering trunks as wide as 2 m (6 ft 7 in) at their base that rose to about 100 ft (30 m), arising from an underground system of horizontally spreading branches that were covered with many rootlets. Though the height of the trees make the plants similar to modern trees, the constant dichotomy of branches created a habit that contrasts with that of modern trees. At the ends of branches were oval-shaped cones that had a similar shape to modern cones of a spruce or fir.\nThe stem of the", "by the direction their tips curl: tips of leaf stems curl upwards, while tips of flower stems curl downwards.\nThe shape of the leaves varies between the species, and even between different specimens of the same species. Cyclamen hederifolium and Cyclamen repandum usually have leaves shaped like ivy, with angles and lobes, Cyclamen coum has nearly round leaves, and Cyclamen persicum has heart-shaped leaves with a pointed tip. The leaf margin may be smooth, as in Cyclamen coum subsp. coum, or finely toothed, as in Cyclamen graecum.\nThe color of the upper side of leaves is variable, even within a species. Most", "Long narrow leaves bend more easily than ovate leaf blades of the same area. Monocots typically have such linear leaves that maximize surface area while minimising self-shading. In these a high proportion of longitudinal main veins provide additional support. Interactions with other organisms Although not as nutritious as other organs such as fruit, leaves provide a food source for many organisms. The leaf is a vital source of energy production for the plant, and plants have evolved protection against animals that consume leaves, such as tannins, chemicals which hinder the digestion of proteins and have an unpleasant taste. Animals that", "shape. In general, leaf size varies and can be up to eight inches, or 20 centimeters, long and four inches, or ten centimeters, across. In addition, they are taper-pointed at the tip and wedge-shaped at the base with a short petiole of up to ¾ inches, or 2 centimeters. Furthermore, leaves are arranged in an alternative pattern. Leaves have pinnate venation. Moreover, stamens and carpels are spirally arranged. Flowers and fruit Flowers of Magnolia biondii are small and white and have strong fragrance associated to them. They can grow up to 3 ¼ inches, or eight centimeters across. Flowers parts", "by very short petioles. The leaves are opposite from each other. The leaves are 7 – 12 mm long.\nOn any individual plant, the leaves vary in size and shape. This can depend on maturity. The common broad shape leaves are orbicular. The leaves narrow quickly into the petiole. The petioles are pubescent, with small hairs covering the petiole entirely. The hairs continue onto the lower area of the leaf ).\nThe stipule at the base of the leaf is pubescent. It has a sharp denticle on the apex. The stipules are almost microscopic. \nThe", "Lepidoziaceae Family description Species may range from a light to dark green, with some species of Bazzania bluish-green to brown. When the plants branch, the branches do not grow from the underside of the stem.\nThe leaves are not folded, but are lobed or divided. Species which grow as larger plants have the leaf tips divided in two to three lobes or teeth. Smaller species typically have their leaves divided all the way to the base in two to five thread-like strands of cells. The underleaves vary as well, but typically resemble smaller versions of the lateral leaves.\nThe", "Polyscias murrayi Description This small to medium size tree grows to 25 metres tall with a trunk diameter of 50 cm. It is unbranched at the end of the main trunk, then breaks out into a many branched crown. The cylindrical trunk is mostly smooth, greyish or brown. The base of the tree is not flanged, fluted or buttressed.\nLeaves are alternate and pinnate with 8 to 30 leaflets, opposite on the leaf stalk, entire or toothed, ovate lanceolate in shape, 8 to 15 cm long. However, leaves may be much larger on younger trees. Leaf stalks are up to 120 cm long and", "with leaves crowded towards the end of the branches.\nThe bark is fairly smooth on younger trees, but becomes scaly and rougher on larger trees. Small rows of vertical lenticels may appear on the trunks of younger trees. Older bark tends to fall off in irregular scales. Small branches are fairly thick and smooth, with a fawny down on the new leaf buds. When cut, a white milky sap may be seen.\nLeaves are alternately arranged on the stem, without serrated edges. They are oval elliptic or oblong elliptic in shape, 9 to 20 cm (3.6–8 in) long, and 3 to 6 cm (1.2-2.4 in) wide.", "Caulophyllum Description These large, smooth plants (0.3–0.9 m tall) have a single to few stems with each stem bearing normally one, but on large stems two, large triple-compound leaves which the casual observer might assume to be several smaller leaves arranged on three separate branches. Each leaflet ends in three to five distinct tips. Plants produce under ground stems called rhizomes that give rise to the leaves each spring and in the fall when the foliage dies back a scar is left on the rhizome and a new bud is formed that will grow into the foliage next spring. ", "such as in Prostanthera lasianthos are large and thin, and may involve the need for multiple leaves rather single large leaves because of the amount of veins needed to support the periphery of large leaves. But large leaf size favors efficiency in photosynthesis and water conservation, involving further trade offs. On the other hand, I-beam leaves such as Banksia marginata involve specialized structures to stiffen them. These I-beams are formed from bundle sheath extensions of sclerenchyma meeting stiffened sub-epidermal layers. This shifts the balance from reliance on hydrostatic pressure to structural support, an obvious advantage where water is relatively scarce.\n", "a plant varies widely from species to species, though they are often located near the base of a leaf. Stipules are most common on dicotyledons, where they appear in pairs alongside each leaf. Some monocotyledon plants display stipule-like structures, but only display one per leaf. A relationship exists between the anatomy of the stem node and the presence or absence of stipules: most plants with trilacunar nodes have stipules; species with unilacunar nodes lack stipules.\nStipules are morphologically variable and might appear as glands, scales, hairs, spines, or laminar (leaf-like) structures.\nIf a single stipule goes all the way around the stem,", "the soil. Leaves are usually smaller at anthesis (flowering), but increase as the growing season progresses. Typical reniform lamina at maturity are 1.5 cm (0.6 in) long and 2 cm (0.8 in) wide, with leaves on older specimens being as wide as 3 cm (1.2 in). It is unique in the subgenus because of its large leaves that are typically flat against the soil. Retentive mucilage-producing glands held on stalks – structures known as tentacles – appear on the margin of the lamina with shorter glands in the center of the leaf. The abaxial (underside) surface of the leaf is noticeably veined and sparsely covered with", "usually crowded together at the upper end of branches, giving the canopy a thin, sparse appearance. The leaves themselves are dark glossy green above and light green below, 7 to 20 centimetres (2.8 to 7.9 in) (rarely up to 26 centimetres (10 in)) long by 2 to 4 cm (0.8 to 1.6 in) (rarely up to 4.5 cm (1.8 in)) wide, and oblong to obovate (egg-shaped) in shape. The leaf margins are serrated, except near the base, with lobes between 1 and 3 millimetres (0.04 and 0.12 in) deep.\nCylindrical flower spikes, or inflorescences, grow from the ends of 1–2 year-old branchlets and have leaves at their base.", "tip can be pointed or rounded. They usually range from 4.8 to 12.7 centimetres (1.9 to 5.0 in) in length, occasionally reaching lengths of 21.5 cm (8.5 in), and are 1.6 to 3.4 cm (0.63 to 1.34 in) wide. Young leaves are often covered with dense, reddish hairs while older leaves tend to have smooth surfaces with hairs concentrated along the main veins on the lower surface of the leaf. Plants have a terminal or lateral conflorescence (a type of inflorescence). The inflorescences, which are usually 7 to 17.5 cm (2.8 to 6.9 in) long ;but occasionally as much as 38 cm (15 in), bear flowers that can be", "ligule. The leaves alternate up the stem and may be two-ranked or spirally arranged. The leaf blades are simple and entire (that is, they lack any teeth or lobes), they sometimes narrow at the base, and they are often succulent. The way in which the leaves typically unfurl from bud is a distinctive feature of the family: it is termed involute, and means that the margins at the leaf base are rolled in when they first emerge. However, some groups are supervolute or convolute.\nThe inflorescences occur either as a terminal shoot at the top of the plant, or as terminal", "Cupressaceae Description The leaves are arranged either spirally, in decussate pairs (opposite pairs, each pair at 90° to the previous pair) or in decussate whorls of three or four, depending on the genus. On young plants, the leaves are needle-like, becoming small and scale-like on mature plants of many genera; some genera and species retain needle-like leaves throughout their lives. Old leaves are mostly not shed individually, but in small sprays of foliage (cladoptosis); exceptions are leaves on the shoots that develop into branches. These leaves eventually fall off individually when the bark starts to flake. Most are evergreen with", "Aloiampelos ciliaris Appearance They can be differentiated from other Aloiampelos species by the way that the soft, white, hair-like teeth (=ciliaris) that grow along the margins of the leaves, extend all the way around the stem, at the base of the leaf.\nThe fleshy leaves themselves are strongly recurved (helping to anchor the tall stems in dense thickets and assist the plant in climbing). The leaf sheaths are conspicuously striped green and white.\nThese plants grow very quickly, producing long, thin, untidy stems that shoot upwards, producing large bright orange-red flowers once they reach the sun. If there are no nearby trees", "infinite variety of plant leaves is generated is a subject of intense research. Some common themes have emerged. One of the most significant is the involvement of KNOX genes in generating compound leaves, as in tomato (see above). But this again is not universal. For example, pea uses a different mechanism for doing the same thing. Mutations in genes affecting leaf curvature can also change leaf form, by changing the leaf from flat, to a crinky shape, like the shape of cabbage leaves. There also exist different morphogen gradients in a developing leaf which define the leaf's axis. Changes in" ]
The five lesser-known types of magnetism?
[ "Basically, magnetic fields happen because electrons have small magnetic fields. There are various ways they can prefer to behave in a material, giving rise to their magnetic properties.\n\nDiamagnetism is most noticeable when there are no unpaired electrons in a material. This negates the magnetic moment of the electrons (each one has a partner that negates it). It opposes any external magnetic fields by messing with the magnetic moment of the electrons' orbit. Every material will do this, but most of the time, other effects overwhelm it.\n\nParamagnetism is sort of the opposite, when there are unpaired electrons. Those unpaired ones can point any which way they please and thus, can line up with an external magnetic field, amplifying it. The magnetic moment of an electron is much greater than the magnetic moment of it's orbit, so this effect outweighs diamagnetism if there are unpaired electrons.\n\nFerromagnetism is like paramagnetism, except that it's so strong, the amplified field can sustain itself. The field generated by other electrons in the material is strong enough to get other electrons in the material to also line up, so it can keep the field by itself.\n\nAntiferromagnetism is the opposite, the unpaired electrons want to oppose eachother, so they have no magnetic field. The reasons why this would happen instead of ferromagnetism have to do with complicated energy level nonsense in various materials.\n\nFerrimagnetism forms sheets, kind of. Antiferromagnetic materials have every electron trying to be opposite of it's neighbor, so it forms a checkerboard. Ferrimagnetic materials form rows as they try to be the same alignment in one direction but opposite alignment in the other direction. This usually results in a net magnetic field like a ferromagnet.\n\nSuperparamagnetism is only found in tiny pieces of ferro or ferrimagnetic materials. They're small enough that their temperature causes them to switch the alignment of their magnetic field too quickly to produce a stable magnetic field in any given direction. But when an external field is applied, they align. It's like paramagnetism, but because the material is a better magnet in the first place, it's stronger than normal paramagnetism." ]
[ "a legend about a Magnes the shepherd on the island of Crete whose iron-studded boots kept sticking to the path. The earliest ideas on the nature of magnetism are attributed to Thales (c. 624 BC – c. 546 BC).\nIn classical antiquity, little was known about the nature of magnetism. No sources mention the two poles of a magnet or its tendency to point northward. There were two main theories about the origins of magnetism. One, proposed by Empedocles of Acragas and taken up by Plato and Plutarch, invoked an invisible effluvium seeping through the pores of materials; Democritus of Abdera replaced", "Magnetism History Magnetism was first discovered in the ancient world, when people noticed that lodestones, naturally magnetized pieces of the mineral magnetite, could attract iron. The word magnet comes from the Greek term μαγνῆτις λίθος magnētis lithos, \"the Magnesian stone, lodestone.\" In ancient Greece, Aristotle attributed the first of what could be called a scientific discussion of magnetism to the philosopher Thales of Miletus, who lived from about 625 BC to about 545 BC. The ancient Indian medical text Sushruta Samhita describes using magnetite to remove arrows embedded in a person's body.\nIn ancient China, the earliest literary reference to magnetism lies in", "were first generalized and explained by Dr. Gilbert, whose book on magnetism published in 1600, is one of the finest examples of inductive philosophy that has ever been presented to the world. It is the more remarkable, because it preceded the Novum Organum of Bacon, in which the inductive method of philosophizing was first explained.\nWilliam Whewell writes in his History of the Inductive Sciences (1837/1859):\nGilbert... repeatedly asserts the paramount value of experiments. He himself, no doubt, acted up to his own precepts; for his work contains all the fundamental facts of the science [of magnetism], so fully examined, indeed, that", "express a historical-political tradition, but also occult natural forces that are explained by his magical theory of the Astral Light. He developed this notion in the context of what has been called \"spiritualist magnetism\": theories that stressed the religious implications of magnetism. Often, their representatives were socialists that believed in the social consequences of a \"synthesis\" of religion and science that was to be achieved by the means of magnetism. Spiritualist magnetists with a socialist background include the Baron du Potet and Henri Delaage, who served as main sources for Lévi. At the same time, Lévi polemicized against famed Catholic", "He experimented with magnets to affect this field in order to produce healing. By around 1774, he had concluded that the same effect could be created by passing the hands in front of the subject's body, later referred to as making \"Mesmeric passes\". The word \"mesmerize\", formed from the last name of Franz Mesmer, was intentionally used to separate practitioners of mesmerism from the various \"fluid\" and \"magnetic\" theories included within the label \"magnetism\".\nIn 1784, at the request of King Louis XVI, a Board of Inquiry started to investigate whether animal magnetism existed. Among the board members were founding father", "are the same in both cases.\n...Magnetism ought to be allowed a place within the circle of medical sciences... Mesmerism and hypnotism Abbé Faria was one of the disciples of Franz Anton Mesmer who continued with Mesmer's work following the conclusions of the Royal Commission. In the early 19th century, Abbé Faria is said to have introduced oriental hypnosis to Paris and to have conducted experiments to prove that \"no special force was necessary for the production of the mesmeric phenomena such as the trance, but that the determining cause lay within the subject himself\"—in other words, that it worked purely", "Electricity, the authors write: \n'Magnet' is derived from the legend of Magnes, or from the territory of Magnesia. Pliny states that Magnes, the shepherd, discovered it, and the legend told of him is that while carrying a message over Mount Ida he felt his feet clinging to the earth, to the iron ore which lay thickly upon the hill. Hence the name of the Magnet. But Magnesia was a territory whence this native iron was for hundreds of years exported, and the name \"Magnet\" is, no doubt, due to this place.", "refused to be drawn into the controversy. Magnetic crusade During the decades that the Royal Navy and Royal Society devoted much energy to magnetic variation and its problems, magnetism came to be seen as an eminently \"British\" science. There was intense interest in figuring out what many called \"the great remaining physical mystery since Newton's work on gravitation\". By the beginning of the nineteenth century, it was widely recognized that the Earth's magnetic field was continually changing over time in a complicated way that interfered with compass readings. It was a mystery which some scientists believed might be associated with", "called elektron in Greek, and electrum in Latin, so Gilbert decided to refer to the phenomenon by the adjective electricus, giving rise to the modern terms \"electric\" and \"electricity\".\nDe Magnete was influential because of the inherent interest of its subject matter, but also for the rigorous way in which Gilbert described his experiments and his rejection of ancient theories of magnetism. Gilbert nevertheless acknowledged his debt to Peter of Maricourt and incorporated this 13th-century scientist's experiments on magnetism into his own treatise. Although Gilbert's thinking was influenced by the mysticism of his time he is regarded as a", "magnets by their opposite poles. Either society must perish, or it must destroy property. If property is a natural, absolute, imprescriptible, and inalienable right, why, in all ages, has there been so much speculation as to its origin? – for this is one of its distinguishing characteristics. The origin of a natural right! Good God! who ever inquired into the origin of the rights of liberty, security, or equality?\n\nIn What Is Mutualism, Clarence Lee Swartz says: \nIt is, therefore, one of the purposes of Mutualists, not only to awaken in the people the appreciation of and desire for freedom, but", "magnetic effects. This sense of the term is found, for example, in the expression of Antoine Joseph Gorsas: \"The magnetizer is the imam of vital energy\". \"Mesmerism\" A tendency emerged amongst British magnetizers to call their clinical techniques \"mesmerism\"; they wanted to distance themselves from the theoretical orientation of animal magnetism that was based on the concept of \"magnetic fluid\". At the time, some magnetizers attempted to channel what they thought was a magnetic \"fluid\", and sometimes they attempted this with a \"laying on of hands\". Reported effects included various feelings: intense heat, trembling, trances, and seizures.\nMany practitioners took", "magnetism), which became known as mesmerism. The evolution of Mesmer's ideas and practices led Scottish surgeon James Braid (1795–1860) to develop hypnotism in 1841.\nSpiritism incorporated various concepts from Mesmerism, among them faith healing and the energization of water to be used as a medicine. Difference from spiritualism Spiritism differs from Spiritualism primarily in that it believes in reincarnation. Spiritism was not accepted by UK and US Spiritualists of the day as they were undecided whether or not to agree with the Spiritist view on reincarnation.\nIn What Is Spiritism?, Kardec calls Spiritism a science dedicated to the relationship between incorporeal", "and magnetism, asserting that \"there are some things in the power of magnetism very similar to those of electricity\" but he did \"not by any means think them the same\". In 1760 he similarly claimed that in 1750 he had been the first \"to think how the electric fire may be the cause of thunder\". Among the more important of the electrical research and experiments during this period were those of Franz Aepinus, a noted German scholar (1724–1802) and Henry Cavendish of London, England.\nFranz Aepinus is credited as the first to conceive of the view of the reciprocal relationship of", "they possessed magnetic powers. Many scientists and proponents of science, including James Randi, claim that this ability can be explained by friction and is caused by unusually sticky skin. To prove that Randi has demonstrated that human magnets lose their powers when they are covered in talc.", "authors such as Jules-Eudes de Mirville and Roger Gougenot des Mousseaux who regarded magnetism as the workings of demons and other infernal powers. The paragraph just before the passage cited in the previous section has to be seen against this background:\nLet us state now for the edification of the vulgar, for the satisfaction of M. le Comte de Mirville, for the justification of the demonologist Bodin, for the greater glory of the Church, which persecuted Templars, burnt magicians, excommunicated Freemasons, &c. let us state boldly and precisely that all the inferior initiates of the occult sciences and profaners of the", "well as to Galileo Galilei who ten centuries later, during the Scientific Revolution, extensively cited Philoponus in his works while making the case as to why Aristotelian physics was flawed. It is the intellectual precursor to the concepts of inertia, momentum and acceleration in classical mechanics.\nThe first extant treatise of magnetism (13th century)\nThe first extant treatise describing the properties of magnets was done by Petrus Peregrinus de Maricourt when he wrote Epistola de magnete.\nArabic numerals (13th century)\nThe first recorded mention in Europe was in 976, and they were first widely published in 1202 by Fibonacci with his Liber Abaci.\nUniversity\nThe", "Animal magnetism \"Magnetizer\" The terms \"magnetizer\" and \"mesmerizer\" have been applied to people who study and practice animal magnetism. These terms have been distinguished from \"mesmerist\" and \"magnetist\", which are regarded as denoting those who study animal magnetism without being practitioners; and from \"hypnotist\", someone who practises hypnosis.\nThe etymology of the word magnetizer comes from the French \"magnetiseur\" (\"practicing the methods of mesmerism\"), which in turn is derived from the French verb magnetiser. The term refers to an individual who has the power to manipulate the \"magnetic fluid\" with effects upon other people present that were regarded as analogous to", "referred to as unification of theories. For example, electricity and magnetism are now known to be two aspects of the same phenomenon, referred to as electromagnetism.\nWhen the predictions of different theories appear to contradict each other, this is also resolved by either further evidence or unification. For example, physical theories in the 19th century implied that the Sun could not have been burning long enough to allow certain geological changes as well as the evolution of life. This was resolved by the discovery of nuclear fusion, the main energy source of the Sun. Contradictions can also be explained as the", "Inductance History The history of electromagnetic induction, a facet of electromagnetism, began with observations of the ancients: electric charge or static electricity (rubbing silk on amber), electric current (lightning), and magnetic attraction (lodestone). Understanding the unity of these forces of nature, and the scientific theory of electromagnetism began in the late 18th century.\nElectromagnetic induction was first described by Michael Faraday in 1831. In Faraday's experiment, he wrapped two wires around opposite sides of an iron ring. He expected that, when current started to flow in one wire, a sort of wave would travel through the ring and cause some electrical", "this effluvium by atoms, but the mechanism was essentially the same. The other theory evoked the metaphysical principle of sympathy between similar objects. This was mediated by a purposeful life force that strove toward perfection. This theory can be found in the writings of Pliny the Elder and Aristotle, who claimed that Thales attributed a soul to the magnet. In China, a similar life force, or qi, was believed to animate magnets, so the Chinese used early compasses for feng shui.\nLittle changed in the view of magnetism during the Middle Ages, and some classical ideas lingered until well after the", "and the United States. It originated almost simultaneously in Transylvania and the Polish-Lithuanian Commonwealth. Interdenominational movements There are also Christian movements which cross denominational lines and even branches, and cannot be classified on the same level previously mentioned forms. Evangelicalism is a prominent example. Some of those movements are active exclusively within Protestantism, some are Christian-wide. Transdenominational movements are sometimes capable of affecting parts of the Roman Catholic Church, such as does it the Charismatic Movement, which aims to incorporate beliefs and practices similar to Pentecostals into the various branches of Christianity. Neo-charismatic churches are sometimes regarded as a subgroup", "those of mesmerism.\nDuring the Romantic period, mesmerism produced enthusiasm and inspired horror in the spiritual and religious context. Though discredited as a credible medical practice by many, mesmerism created a venue for spiritual healing. Some animal magnetists advertised their practices by stressing the \"spiritual rather than physical benefits to be gained from animal magnetism\" and were able to gather a good clientele from among the spiritually inspired population.\nSome researchers, including Johann Peter Lange and Allan Kardec, suggested that Jesus was the greatest of all magnetizers, and that the source of his miracles was animal magnetism. Other writers, such as John", "a scientific approach, such as Joseph Philippe François Deleuze (1753–1835), a French physician, anatomist, gynecologist, and physicist. One of his pupils was Théodore Léger (1799–1853), who wrote that the label \"mesmerism\" was \"most improper\". (Léger moved to Texas around 1836).\nNoting that, by 1846, the term \"galvanism\" had been replaced by \"electricity\", Léger wrote that year:\nMesmerism, of all the names proposed [to replace the term animal magnetism], is decidedly the most improper; for, in the first place, no true science has ever been designated by the name of a man, whatever be the claims he could urge in his favor;", "Hypnosurgery History Mesmerism, also called animal magnetism, is the term given by Frank Mesmer for what he believed to be an invisible natural force in animals. He also believed that it could have physical effects such as healing.\nJames Braid who is credited for pioneering hypnosurgery, first observed mesmerism while he was attending a public performance on magnetism by Charles Lafontaine. After attending two more shows he came to the conclusion that although there were observable physical effects, it was not caused by any magnetic interference. Braid then used self-experiment to prove his idea that mesmerism was achieved by vision and", "Tellure (On the Magnet and Magnetic Bodies, and on the Great Magnet the Earth). In this work he describes many of his experiments with his model earth called the terrella. From his experiments, he concluded that the Earth was itself magnetic and that this was the reason compasses pointed north (previously, some believed that it was the pole star (Polaris) or a large magnetic island on the north pole that attracted the compass).\nAn understanding of the relationship between electricity and magnetism began in 1819 with work by Hans Christian Ørsted, a professor at the University of Copenhagen, who discovered by", "in Franz Mesmer, who postulated the theory of animal magnetism, a force flowing among humans. The narrator invokes Mesmer twice in the text, and describes a section of the Traité de la Volonté which reflects the animal-magnetic theory. Religion Balzac's spiritual crisis at the time of his first communion led him to explore the first Christian thinkers and the question of evil. As the French critic Philippe Bertault points out, much of the mysticism in Louis Lambert is related to that of early Christianity. In his letters, Lambert describes exploring the philosophies of Christianity, Hinduism, Buddhism, Islam, and Confucianism, among", "with Hellen's three sons Dorus, Xuthus (with his sons Ion and Achaeus) and Aeolus, comprised the set of progenitors of the ancient tribes that formed the Greek/Hellenic nation. Magnes ruled the area and people under his name. Magnesia is also homeland of the mythical heroes Jason, Peleus and his son Achilles.\nThe Magnetes contributed to the Greek colonization, with their main colonies being established before the 7th century BC, under the names of Magnesia beside Sipylus in Lydia and Magnesia on the Maeander in Ionia. Nomenclature The word magnet comes from the Greek \"magnítis líthos\" (μαγνήτης λίθος), which means \"magnesian stone\".", "Étienne Félix d'Henin de Cuvillers Étienne Félix d'Henin de Cuvillers (1755–1841) was a French magnetizer who was an early practitioner of mesmerism as a scientific discipline.\nHénin de Cuvillers was a follower of Franz Anton Mesmer (1734–1815). However, unlike Mesmer he did not believe in the existence of a \"magnetic fluid\" in animal magnetism, and instead emphasized the role of mental processes in mesmerism. In his book Le magnétisme éclairé (The Enlightened Magnetism), he describes accounts of mesmeric effects in terms of belief and suggestibility.\nHe is credited for popularizing a system of scientific nomenclature by using the prefix \"hypn\" in words", "\"magnet\" may come from lodestones found in Magnesia.\nIn the time of the Romans, Magnesia was added to the kingdom of Pergamon, after Antiochus had been driven eastward beyond Mount Taurus. After this time the town seems to have declined and is rarely mentioned, though it is still noticed by Pliny and Tacitus. Hierocles ranks it among the bishoprics of the province of Asia, and later documents seem to imply that at one time it bore the name of Maeandropolis. The existence of the town in the time of the emperors Aurelius and Gallienus is attested to by coins. Modern excavations", "and magnetism. Some suggest that it was Magnesia ad Sipylum, others that it was the Magnesia regional unit in Thessaly; this has been debated both in modern times and in antiquity without resolution." ]
How does my cat know to look at my eyes/face when communicating something?
[ "It's been a common thing for workers in parts of the world to have to wear face masks on the back of their head because tigers won't attack if they think a person is looking at them. So this goes past domestication and is a hunter instinct.\n\n_URL_0_\n\nAnd just as a tip for owning cats, look them int he eyes every now and then and deliberately blink. It's a sign of trust, as cats stare unblinkingly at people they don't trust.", "It's the other way around. We don't make pets of animals that don't relate to us in this way. If they don't look at us in the face to communicate, then we lose interest in them or find them creepy." ]
[ "of its ears or head toward the source of the sound may be a better indication of the cat's awareness that a sound was made in their direction. \nWhen cats greet another cat in their vicinity, they can do a slow, languid, long blink to communicate affection if they trust the person or animal they are in contact with. It is a sign of trust. A way to communicate love and trust to your cat from a human perspective is to say their name, and get their attention, and then look them in the eyes and slowly blink at them", "humans into what they want and need. Body language Cats rely strongly on body language to communicate. A cat may rub against an object, lick a person, and purr. Much of a cat's body language is through its tail, ears, head position, and back posture. Cats flick their tails in an oscillating, snake-like motion, or abruptly from side to side, often just before pouncing on an object or animal in what looks like \"play\" hunting behavior. If spoken to, a cat may flutter its tail in response, which may be the only indication of the interaction, though movement", "a similar origin to the communication we have.\nHumans also often seek to mimic animals' communicative signals in order to interact with them. For example, cats have a mild affiliative response of slowly closing their eyes; humans often mimic this signal towards a pet cat to establish a tolerant relationship. Stroking, petting and rubbing pet animals are all actions that probably work through their natural patterns of interspecific communication.\nDogs have shown an ability to understand human communication. In object choice tasks, dogs utilize human communicative gestures such as pointing and direction of gaze in order to locate hidden food and toys.", "Eyes A direct stare by a cat usually communicates a challenge or threat and is more likely to be seen in high-ranking cats; lower-ranking cats usually withdraw in response. The direct stare is often used during predation or for territorial reasons.\nIn contrast to a direct stare, cats will lower their eyelids or slowly blink them to show trust and affection to their owners. According to Gary Weitzman, a licensed veterinarian and animal author, this type of feline body language is similar to a \"kitty kiss\". He further explains in his book, \"How To Speak Cat: A Guide to Decoding Cat", "It has also been shown that dogs exhibit a left gaze bias when looking at human faces, indicating that they are capable of reading human emotions. Dogs do not make use of direction of gaze or exhibit left gaze bias with other dogs.\nA new approach in the 21st century in the field of animal communication uses applied behavioural analysis, specifically functional communication training. This form of training previously has been used in schools and clinics with humans with special needs, such as children with autism, to help them develop language. Sean Senechal at the AnimalSign Center has been using an", "until the cat starts to salivate when the bell rings. If we then added a stimulus of a flash of light after the bell rings, and then followed it by a reinforcement (the cat food), it may result in little to no response to a second stimulus.", "of nonverbal communication. Animal researchers have also found that, in the course of their domestication, dogs have also developed the ability to pick up visual cues from the eyes of humans. Dogs do not seem to use this form of communication with one another and only look for visual information from the eyes of humans. Trauma The bony area that makes up the human eye socket provides exceptional protection to the sclera. However, if the sclera is ruptured by a blunt force or is penetrated by a sharp object, the recovery of full former vision is usually rare. ", "verbal/non-verbal communication or a form of telepathy is not yet known.\nAnimals sense that Chat can understand them and become very friendly around her. Even when an animal is normally aggressive, Chat can gain that animal's loyalty (she once got a criminal's bulldog to turn on his owner by telling him his master was \"bad\"). Chat often uses this power to calm down nervous and wounded animals at animal rescue centers.\nHer natural affinity with animals, along with Chat's tendency to feed any stray who visits her, makes animals very accommodating when Chat asks them to do favors for her. In the", "a cat, the trainer clicks at the exact moment that the cat does the desired behavior and rewards with a treat immediately after the click. The cat will begin to associate the sound with the treat, and understand that the sound means she has done the right thing. Clicker training is popular in the cat training field because the clicker (or other sound) allows a trainer to tell the cat immediately when she has performed correctly, and makes it easier for the cat to identify exactly which action/behavior she is being rewarded for. Problem behaviors A veterinarian can rule out", "the animal can see who does the baiting, but not where the food has been placed. After baiting, the Guesser returns to the room, the screen is removed, and each human points directly at a container. The Knower points at the baited container, and the Guesser at one of the other three, chosen at random. The animal is allowed to search one container and to keep the food if it is found. Competitive feeding paradigm The competitive feeding paradigm approach is considered by some as evidence that animals have some understanding of the relationship between \"seeing\" and \"knowing\".\nAt the beginning", "can also track what a human is looking at. This allows the robot to interact with a human and objects in the environment. Naturally, humans will follow a pointing gesture and/or gaze and understand that what is being pointed at or looked at is the object the other human is concerned with and about to discuss or do something with. The Personal Robots Group has used Leonardo’s tracking ability and programmed the robot so it can act human-like, bringing its gaze to an object the human is paying attention to. Matching the human’s gaze is one way Leonardo seems to", "Cat behavior Communication Kittens need vocalization early on in order to develop communication properly. The change in intensity of vocalization will change depending on how loud their feedback is. Some examples of different vocalizations are described below.\nPurring or a soft buzz, can mean that the cat is content or possibly that they are sick. Meows are a frequently used greeting. Meows occur when a mother is interacting with her young. Hissing or spitting indicate the cat is angry or defensive. Yowls can mean that the cat is in distress or feeling aggressive. Chattering occurs when they are hunting or being", "nursing home that Julie's psychic brother is living in.\nThere are indications that he also has latent telepathic abilities but these are undeveloped, and he only uses them on a limited basis.\nViolet and Verbina Pollard\nFrank and Candy's identical twin sisters form a sort of hive mind, each of the pair knowing what the other is thinking, seeing, and sharing their physical sensations. They share this mind-link with the dozens of cats that occupy their home, and are able to extend their senses to any other animals they reach out to. Only humans are immune to the sisters' mental influence,", "One can \"trust\" the signal not because the cat is inclined to be honest, but because it just can't fake that sound. Primate vocal calls may be slightly more manipulable, but they remain reliable for the same reason — because they are hard to fake. Primate social intelligence is Machiavellian — self-serving and unconstrained by moral scruples. Monkeys and apes often attempt to deceive one another, while at the same time constantly on guard against falling victim to deception themselves. Paradoxically, it is precisely primates' resistance to deception that blocks the evolution of their vocal communication systems along language-like lines. Language is", "about the characteristics of a cat.\nThis type of pattern recognition can result in apophenia based on the fact that since the brain is not looking for exact matches, it can pick up some characteristics of a match and assume it fits. This is more common with pareidolia than data collection. Feature analysis The stimulus is broken down into its features and allowed to process the information. This model of pattern recognition comes from the result of four stages, which are: detection, pattern dissection, feature comparison in memory, and recognition. Evolution One of the explanations put forth by evolutionary psychologists for", "action is combined with olfactory communication as the contact leaves scent from glands located around the mouth and cheeks. Cats also sometimes \"head-bump\" humans or other cats with the front part of the head; this action is referred to as \"bunting\". Again this communication might have an olfactory component as there are scent glands in this area of the body, and is possibly for seeking attention when the cat turns their head down or to the side while doing so.\nHead-bumping and cheek rubbing may be displays of social dominance as they are often exhibited by a dominant cat towards", "Visual perception As the eyes of humans and other animals are in different positions on the head, they present different views simultaneously. This is the basis of stereopsis, the process by which the brain exploits the parallax due to the different views from the eye to gain depth perception and estimate distances to objects. Animals also use motion parallax, in which the animals (or just the head) move to gain different viewpoints. For example, pigeons (whose eyes do not have overlapping fields of view and thus cannot use stereopsis) bob their heads up and down to see depth.\nThe motion parallax", "This indicates that the eyes are an important way to communicate, even before spoken language is developed. People must detect and orient to people's eyes in order to utilize and follow gaze cues. Real-world examples show the degree to which we seek and follow gaze cues may change contingent on how close the standard is to a real social interaction. People may use gaze following because they want to avoid social interactions. Past experiments have found that eye contact was more likely when there was a speaker's face available, for longer periods of real-world time. Individuals use gaze following", "hearing on the low end of the scale, but cats can hear much higher-pitched sounds, up to 64 kHz, which is 1.6 octaves above the range of a human, and even 1 octave above the range of a dog. When listening for something, a cat's ears will swivel in that direction; a cat's ear flaps (pinnae) can independently point backwards as well as forwards and sideways to pinpoint the source of the sound. Cats can judge within three inches (8 cm) the location of a sound being made one yard (1 m) away—this can be useful for locating their prey.\nAlthough it was", "instinctive to cats and in adults, is presumably derived from the action used to stimulate milk let-down by the mother during nursing. Cats often purr during this behaviour, usually taken to indicate contentment and affection.\nCats have scent glands on the underside of their paws. When they knead or scratch objects or people, it is likely these pheromones are transferred to the person or object being kneaded or scratched.\nTouching noses, sometimes referred to as \"sniffing noses\", is a friendly, tactile greeting for cats.\nSome cats rub their faces on humans, apparently as a friendly greeting or indicating affection. This tactile", "have been responding to patterns in the owner's journeys. Blackmore interpreted the results of the randomised tests as starting with a period where the dog \"settles down and does not bother to go to the window,\" and then showing that the longer the owner was away, the more the dog went to look. The Sense of Being Stared At (2003) Sheldrake's The Sense of Being Stared At explores telepathy, precognition, and the \"psychic staring effect.\" It reported on an experiment Sheldrake conducted where blindfolded subjects guessed whether persons were staring at them or at another target. Sheldrake reported subjects exhibiting", "a given animal actor. VisionArt believed that key to creating successful talking animals was keeping a real animal's eyes, even when much of the animal's face was CG: \"The eyes are so much of what brings them to life,\" said Josh Rose, executive vice president of VisionArt, adding \"On many of the close-up shots of Rodney the guinea pig, we ended up doing muzzle replacements; almost two-thirds of his head was 3-D, but we kept his real eyes. For the cat, the real eyes were also kept — the computer graphics feathered off about half an inch all the way", "role of the SC in controlling eye movements is understood in much greater depth than any other function.\nBehavioral studies have shown that the SC is not needed for object recognition, but plays a critical role in the ability to direct behaviors toward specific objects, and can support this ability even in the absence of the cerebral cortex. Thus, cats with major damage to the visual cortex cannot recognize objects, but may still be able to follow and orient toward moving stimuli, although more slowly than usual. If one half of the SC is removed, however, the cats will", "verbal forms of language. Mirror neurons become activated when an animal is acting in a particular way or watching another individual act in the same manner. These mirror neurons are important in giving an individual the ability to mimic movements of hands. Broca's area of speech production has been shown to contain several of these mirror neurons resulting in significant similarities of brain activity between sign language and vocal speech communication. Facial communication is a significant portion of how animals interact with each other. Humans use facial movements to create, what other humans perceive, to be faces of emotions. While", "eye signaling as well. In general, dogs seems to use human cues as an indication on where to go and what to do. Overall, dogs appear to have several cognitive skills necessary to understand communication as information; however, findings on dogs' understanding of referentiality and others' mental states are controversial and it is not clear whether dog themselves communicate with informative motives. \nFor canines to perform well on traditional human-guided tasks (e.g. following the human point) both relevant lifetime experiences with humans—including socialization to humans during the critical phase for social development—and opportunities to associate human body parts with", "as a kat aal or cat-eel, which were fed to cats as they were not worth eating. In this case it would be the boy who had enticed the cat into his grasp and he would be getting what was coming to him. Yet another interpretation is that the girl is waving her finger to make the viewers feel that she is reprimanding her brother for teasing the cat, and she is thereby distracting their attention from her own misbehaviour, which is pulling the cat's tail, making it nervous, and about to scratch. There are other examples of Dutch paintings", "Knowing a guide dog's laterality can also be useful for training because the dog may be better at walking to the left or the right of their blind owner.\nDomestic cats (Felis silvestris catus) show an individual handedness when reaching for static food. In one study, 46% preferred to use the right paw, 44% the left, and 10% were ambi-lateral; 60% used one paw 100% of the time. There was no difference between male and female cats in the proportions of left and right paw preferences. In moving-target reaching tests, cats have a left-sided behavioural asymmetry. One study indicates that laterality", "emotion in domestic dogs. The postures of dogs may indicate their emotional state. In some instances, the recognition of specific postures and behaviors can be learned.\nPsychology research has shown that when humans gaze at the face of another human, the gaze is not symmetrical; the gaze instinctively moves to the right side of the face to obtain information about their emotions and state. Research at the University of Lincoln shows that dogs share this instinct when meeting a human, and only when meeting a human (i.e. not other animals or other dogs). They are the only non-primate species known", "forth, and the two cats mimic each other (imitating the \"mirror scene\" in Duck Soup). When Tom crosses again imitating a train, Dupli-cat does likewise making a train whistle sound. Surprised, Tom repeats the sound, then tricks Dupli-cat into opening his mouth: Jerry is inside it. Tom walks away and then catches on.\nTom chases Dupli-cat off the ship and along a pier, where Dupli-cat is cornered and cowers, holding out Jerry for Tom to take. As Tom reaches out, Dupli-cat stomps open a trap-door, causing Tom to falls through it into the water. Tom angrily climbs up the ladder, but", "able to differentiate between seeing themselves in a mirror versus seeing other animals. The classic example involves placing a spot of coloring on the skin or fur near the individual's forehead and seeing if they attempt to remove it or at least touch the spot, thus indicating that they recognize that the individual they are seeing in the mirror is themselves. Humans (older than 18 months) and other great apes, bottlenose dolphins, killer whales, pigeons, European magpies and elephants have all been observed to pass this test. Neural correlates A major part of the scientific literature on consciousness consists" ]
OJ and the recently discovered knife can we still prosecute him or no since double jeopardy?
[ "Without considering the Double Jeopardy, the knife was supposedly found years ago and kept by as a souvenir by a cop. It was only recently brought forward as evidence. Pure speculation, but it could be real hard to use it as evidence in court since it was handled improperly. \n\nEdit: improperly", "We couldn't prosecute him for murder. It's possible he could be prosecuted for tampering with evidence if it was proven he knew about the knife or buried it.", "The story is mostly bullshit. The alleged source of the knife and the sloppy chain of custody of it makes it worthless as legal evidence even if they find anything on it.", "Double jeopardy is meaningless. The chain of evidence is hopelessly fouled. This could never be brought as evidence against him.", "Hypothetically speaking: Say you have a man accused of murder, and he goes to trial. The jury then finds him not guilty due to lack of evidence.\n\nA year later, a video appears. In well-lit, high resolution video, the man who was found not guilty is very clearly shown committing the murder. There is no doubt that the video is authentic, it hasn't been faked in any way, and it clearly shows that the defendant is guilty.\n\n**Would the double jeopardy laws still prevent the murderer from being prosecuted?**\n\n.\n\n^^For ^^the ^^sake ^^of ^^argument, ^^let's ^^say ^^that ^^the ^^video ^^was ^^shot ^^through ^^a ^^window ^^by ^^a ^^crazy ^^old ^^woman. ^^She ^^never ^^reported ^^its ^^existence, ^^but ^^her ^^son ^^found ^^the ^^video ^^in ^^her ^^house ^^when ^^the ^^woman ^^died. ^^Turns ^^out, ^^the ^^woman ^^had ^^been ^^secretly ^^filming ^^her ^^neighbors ^^for ^^decades.", "No - double jeopardy doesn't allow OJ do be re-tried. However - the case to determine the cause of death for Nicole Simpson is still open, so it could be submitted as evidence for that. However - regardless, it would not result in OJ being re-tried.", "The feds possibly could prosecute him; the state of California had its shot and blew it.\n\n[\"Separate Sovereigns\"](_URL_0_)." ]
[ "Attorney General, Kamala Harris, continued to appeal. Based largely on eyewitness identification by two police officers, Larsen was convicted in 1999 of being in possession of a concealed knife under California's Three Strikes Law. Because he had prior felony convictions, Larsen was sentenced to 28 years to life in prison. The California Innocence Project, which began representing Larsen in 2002, found witnesses, including a former chief of police and the actual owner of the knife, who testified seeing a different man holding the knife.\nIn 2010, a judge ordered Larsen's release, finding that he was \"actually innocent\" of the crime and", "convicted in 1999 of being in possession of a concealed knife under California's Three Strikes Law. Because he had prior felony convictions, Larsen was sentenced to 28 years to life in prison. The California Innocence Project, which began representing Larsen in 2002, found witnesses, including a former chief of police and the actual owner of the knife, who testified seeing a different man holding the knife. In 2010, a judge ordered Larsen's release, finding that he was \"actually innocent\" of the crime and that Larsen's constitutional rights were violated, because his attorney was incompetent.\nDespite the ruling, Larsen remained in prison", "were not notified about the existence of the weapon, and the police destroyed it without any testing. In the original investigation, police found a broken, straight-edged knife in a nearby yard. No physical evidence connected the weapon to the crime, but prosecutors argued that it was the murder weapon. Rivera confessed that he had broken the knife during the crime and then discarded it.\nAccording to Russell Ainsworth, one of Rivera's lawyers:\nThe knife is hugely important. It's the potential murder weapon in the case. It could have had the real killer's DNA on it, and it could exclude without any doubt", " stabbed him 9 times using the knife. On April 4, the Criminal Investigation Division (CID) received an anonymous report and arrested Patterson. In April 6, after seeing Edward Lee on TV, Lee's father who returned from a business trip investigated him, as Lee denied his crime they met with a lawyer and confessed the crime on the April 8th. Current status After the murder case, Jo Jong-pil's parents requested a reinvestigation and Patterson the lead suspect who left to another country to attend, but the Ministry of Justice and Ministry of Foreign Affairs responded they couldn't find him which", "until 8 the following morning, telling him that they believed his knife was the murder weapon. They interrogated him again two weeks later, a 10-hour interview during which Treadway gave a detailed confession to participating in the murder with the other two boys. Treadway was then arrested.\nAaron Houser was then arrested and questioned. He did not actually confess and steadfastly denied any involvement, but he did present a \"hypothetical\" account of how the crime might have happened, under prompting by police interrogators using the Reid technique. All three boys subsequently recanted their statements claiming coercion. The majority of Michael Crowe's", "David Jones' murder, the investigation established that the knife found on Maxwell had the same width and length as the one used by the killer. A graphological examination was also conducted, which concluded that Maxwell had left the note in the Bus Terminal building, confessing to the murders. On the basis of these unreliable testimonies, with unconvincing or circumstantial evidence, Bobby Joe Maxwell was found guilty of two murders at the end of 1984, and was sentenced to life imprisonment without a chance of parole. Despite the fact that there was no material evidence found in the other murders, the", "brother claimed he believed the knife had been used to kill Murray. Several days after the knife was given to Murray's father, the man's brother allegedly scrapped his Volvo. Family members of the man who turned in the knife claimed he had made up the story in order to obtain reward money in the investigation, and that he had a history of drug use.\nIn 2005, Fred Murray petitioned New Hampshire Governor Craig Benson for help in the search, and appeared on The Montel Williams Show in November 2004 to publicize the case. On February 9, 2005, the one-year anniversary of", "always assumed that my son's murderer had taken the knife during the crime. I could not believe it was in Terry's things. He had never told me that he had it.\n18. Also, my sister Jo Lynn told me that she saw Terry wash clothes, bed linens and curtains from Stevie's room at an odd time around the time of the Murders.\n19. There was additional new evidence discovered in 2007 that I cannot now recall. Foreman and jury misconduct (2008) In July 2008, it was revealed that Kent Arnold, the jury foreman on the Echols-Baldwin trial, had discussed the case with", "for first degree murder, even though the original jury had refused to find him guilty on that charge and it was in no way involved in his appeal. For the reasons stated hereafter, we conclude that this second trial for first degree murder placed Green in jeopardy twice for the same offense in violation of the Constitution.\n\nThat the jury did not explicitly return an acquittal on first degree murder in its verdict is immaterial:\nIn brief, we believe this case can be treated no differently, for purposes of former jeopardy, than if the jury had returned a verdict which expressly read:", "Roy Michael Roberts Roy Michael \"Hog\" Roberts (December 18, 1952 – 10 March 1999) was executed in Missouri by lethal injection, for assisting the murder of a correctional officer named Tom Jackson in Missouri's Moberly Correctional Center in July 1983.\nA 2005 investigation was opened to investigate the possibility of Roberts' innocence. No physical evidence connected Roberts to the crime. Four eyewitnesses, including three corrections officers, testified that Roberts had participated in the murder, while nine witnesses, including another corrections officer, had testified that Roberts had been elsewhere at the moment of the stabbing.", "might have been self-inflicted. Tom Bevel testified that cast-off blood found on the back of Routier's nightshirt indicated that she had raised the knife over her head as she withdrew it from each boy to stab again.\nRoutier was convicted of murdering Damon. On February 4, 1997, she was sentenced to death by lethal injection. Post-trial claims and appeals Defense attorneys allege numerous errors were made during Routier's trial and in the official transcript of it, as well as the investigation of the murders, especially at the crime scene. An appeals court dismissed these claims, as did a court ruling on", "two counts of first degree murder in the deaths of the Likneses and a second-degree murder charge for allegedly killing O'Brien. The second degree charge for Nathan O'Brien was upgraded by the court to a first degree charge in May 2015. Trial The murder trial for Garland began on January 16, 2017. The trial drew to a close on February 16, 2017, and it took the jurors just over nine hours to reach a verdict of guilty on all three counts of first degree murder.\nThe following morning, Garland was sentenced, with only the minimum sentence being determined, as first degree", "with little ballistics training and limited by having one eye; he admitted in court to having trouble in operating the microscope.\nAfter the Supreme Court ruling, on April 1, 2015 the Jefferson County district attorney’s office moved to drop the case. Their forensics experts were unable to match crime-scene bullets to Hinton's mother's gun. Prosecutors admitted that they could not match four bullets found at the crime scene with Hinton's gun, and that this was the only evidence offered in the original murder trial.\nOn April 3, 2015, Hinton was released from prison after Laura Petro, Jefferson County Circuit judge, overturned his", "the scene testified that he saw no blood on it. No forensic testing was done on the knife. Law enforcement never attempted to find the men who intervened in the melee. The defense claimed the video footage showed Buckle initiating the altercation.\nThe prosecutor's case was based on video that showed Johnson calmly stepping out of the fray, removing her knife from her bag, then stepping back into the group attack. Johnson alone was charged with attempted murder.\nThe trial itself was lengthy, lasting nearly a year. The all-white jury of 10 women and two men deliberated for only five hours, finding", "evidence relied mainly on hearsay, investigators wanted to gather more evidence before pressing charges.\nHis revolvers and a seven-inch knife, found inside his waistcoat, were confiscated when he was brought in. The desk sergeant remarked that the gangster's knife could have been the possible murder weapon although it was later found that the knife had not been recently used. The detectives hoped to get a confession out of Lewis and, having yet to inform him as to why he had been arrested, they put him in the back of a paddy wagon and drove him to the city morgue. Once there,", "to him on 26 August, Sangret emphatically denied he had been given the knife the prosecution contended he had used in her murder on this date, and insisted he had been given a distinctly different, Canadian-issue knife introduced into evidence as Exhibit 34.\nUpon completion of defence counsel questioning, Sangret was subjected to an intense cross-examination by Eric Neve, who repeatedly raised the inconsistencies, contradictions and \"convenience\" in Sangret's claims—both in his trial testimony and the two statements he had given to Inspector Greeno—as opposed to the witness testimony and forensic evidence presented. These questions related to such issues as Sangret's", "knife under Wade's seat and forces him to deny knowledge of it. As a result, Wade is sent to solitary confinement until the stabbing can be investigated. Lieutenant Jackson, (Harold Perrineau), interrogates Wade about the stabbing but he doesn't cooperate with the investigation. Jackson decides to send Wade to the Security Housing Unit (SHU) where he is the commanding officer.\nJohn Smith (Val Kilmer), an inmate who is serving a life sentence becomes Wade's cellmate in \"the SHU\". \nLife is tough in the SHU for Wade. Inmates are under 23-hour lock-down, and he can't have visitors for the first three months.", "subsequent interview. Two separate, private polygraph examiners found his answers inconclusive to questions about his role in the deaths. The .38-caliber weapon used in all three shootings belonged to Spangler, and evidence of gunshot residue was found on his right palm. On January 3, 1979, the Arapahoe County coroner closed the case as a double homicide/suicide. The sheriff's office was unable to overcome the coroner's findings, and they had exhausted all investigative leads; therefore, they were forced to close the case. Most of the evidence was either returned to Spangler or destroyed.\nSeven months later, Spangler married Sharon Cooper and moved", "a false confession. The jury was also led to believe that Rivera failed a polygraph test. The defense was precluded from telling the jury the actual results, which were inconclusive.\nFollowing the reversal, the appellate court took the extraordinary step of barring prosecutors from retrying the defendant. Knife In 2014, former Waukegan police chief Dan Greathouse, who is handling the re-investigation of the Staker case, told Rivera's attorneys that a knife was found a decade before near the crime scene. In 1994, a neighbor uprooted a bush between his house and the murder scene and found a serrated knife. Rivera's attorneys", "he claimed, had both a marlin spike and a can opener, and he had been informed by Wolfe that the knife had been given to her by Francis Hearn. In addition, Sangret insisted he had never taken his own army-issue knife off barracks.\nTwo of the prosecution's main witnesses were Drs Keith Simpson and Eric Gardner, who testified on the second and third days of the trial respectively. Both pathologists testified as to the recovery of Wolfe's body—which they noted had been \"covered, rather than buried\"—and their subsequent examination of her remains, both in situ on the common, and—with regards to", "both such imprisonment and fine.\n(2) The importation of any such knife as is described in the foregoing subsection is hereby prohibited.\nIn late 1959, the claimant, a chief inspector of police, brought forward information against the defendant alleging he contravened section 1(1) by offering the flick knife for sale. Bristol Justices At first instance, the Prosecutor submitted that the Defendant has displayed the knife and ticket in the window with the objective of attracting a buyer, and that this constituted an offer of sale sufficient to create a criminal liability under section 1(1) of the Act. Mr Obby Simakampa submitted that", "of his book said to contain his \"personal file\" of the assassination. During the interview, Curry expressed his doubts about the Warren Commission's single bullet theory and their finding of a lone assassin. Curry stated: \"I'm not sure about it. No one has ever been able to put him (Oswald) in the Texas School Book Depository with a rifle in his hand.\" Curry reasoned in another interview: \"I think there's a possibility that one [shot] could have come from in front [of the limousine]. We've never, we've never been able to prove that, but just in my mind and by", "from a cardboard box to demonstrate for the jury just how this knife fitted the wounds discovered in Wolfe's skull, and how the channel tracts to the right of each wound again matched the dimensions of Exhibit 4. Simpson also explained to the jury how the positioning of these wounds indicated she had likely been facing her right-handed attacker when these wounds were delivered. Although both Simpson and Gardner conceded the knife introduced as Exhibit 4 may not have been the actual murder weapon as opposed to another, precise replica issue, both pathologists dismissed the possibility that any standard-issue American", "pending. Murder and a second attempted murder charges could be filed if evidence can tie Phillips with the shootings of Troopers Baker and Longobardo.\nIt was announced on September 11 that New York State Police found a .308 rifle on September 10 in the woods where Phillips was believed to have spent time before his capture on September 8. Forensic tests were conducted on the weapon.\nOn November 29, 2006, Phillips pleaded guilty (or, in his own words, \"guilty as hell\") to charges of aggravated murder (for the shooting of Joseph Longobardo) and attempted aggravated murder (for the shooting of Donald Baker", "doctors failed to notice one of Rosenbaum's four stab wounds for almost an hour. Murder trial (1992) Nelson was tried on charges of murder as a hate crime in a New York state court in 1992. Nelson pleaded not guilty to the charge and denied stabbing Rosenbaum.\nPolice testified that Nelson had confessed to murdering Rosenbaum to police officers. Prosecutors claimed Nelson had been carrying a blood-stained knife inscribed with the word \"KilleR\" at the time he was arrested, but Nelson's defense denied the knife was his and suggested police officers had found it elsewhere. No evidence of fingerprints on the", "murders, and it was turned over to the police. As details of the crime came out in the weeks that followed, the boy's father made several calls to the police, suggesting that the missing murder weapon was the same broken, long-barreled gun his son had found. Finally, fed up with months of being ignored by the LAPD, he asked Clete Roberts to intervene in December 1969. The book does not say whether the call from Roberts finally did the trick. Acting career Roberts also carried his polish and expertise onto the \"silver screen\" and television as well, most notably", "Powell carried two knives on that day which he gave to each of his friends to be held for him. On the scene he asked for the knives back. Upon Dudley's refusal he asked Cliff who asked him why he wanted it back? and then handed it over.\nThe knife, which was not seen on the crime scene at the moment of the incident, was later found by a teacher, according to school principal Francke. The knife was situated in the gutter about eight feet from the body. Lieutenant Thomas Gilligan Lieutenant Thomas Gilligan served seventeen years in the Police Department", "to demonstrate how difficult it would be to shoot the knife from an attacker's hand to explain why police are trained to shoot at the attacker's torso and not the weapon, but observers in the courtroom felt the testimony was highly prejudicial as the instructor was wielding a combat-style training knife. Other police training instructors testified to the danger of any edged tool, stating that a charging attacker could stab an officer within 1.5 seconds from a distance of 7 yards (6.4 m).\nOn October 30, 2003, the grand jury declined to indict Marshall after two hours of deliberation on charges of", "some 4 miles (6 km) from his bicycle. He had been stripped to his underwear, his feet and hands had been bound, and his mouth had been taped with surgical tape. Knife wounds across his body suggested he had been tortured before death. In addition, Joubert had stabbed him nine times. As a kidnapping, the crime came under the jurisdiction of the federal government of the United States, so the FBI was called in.\nThe investigation followed several leads, including a young man who was arrested for molesting two young boys about a week after the crime. He failed a polygraph test", "Walter Holmes Walter Holmes (died April 29, 1932) was a murderer who was executed in Kentucky's electric chair. Crime and arrest Holmes, a black man originally from Chicago, Illinois, murdered a farmer, 55-year-old Thomas Tillery, on April 3, 1931 by shooting him with two accomplices, Walter Dewberry and Charles Rodgers. The trio had been on a crime spree across Kentucky committing a series of robberies and assaults in Louisville, Fulton County, and some sections of southern Illinois. When first apprehended, they tried to claim that the three of them committed a robbery while an unknown man fired" ]
Why do the body-cells age?
[ "A few reasons. The most straightforward is that every time a cell copies it's DNA, it uses up a piece of the tail at the end of the DNA called the *telomere*. \n\nWhen a cell is out of telomere, fragments of the DNA itself start getting used and the cell goes into *telomere panic*. Each copy does damage to the DNA after that.", "DNA strands have a bunch of junk code on each end called telomerase. It's basically a buffer that prevents encoding damage to the strand during transcription. This is shortened each time the cell divides. As it shortens, the cell becomes more and more susceptible to damage during division." ]
[ "This implies that if cells are not shunted into senescence by the external pressures described above, they would still continue to age. This is consistent with the fact that mice with naturally long telomeres still age and eventually die even though their telomere lengths are far longer than the critical limit, and they age prematurely when their telomeres are forcibly shortened, due to replicative senescence. Therefore, cellular senescence is a route by which cells exit prematurely from the natural course of cellular aging. Effect of sex and race/ethnicity Men age faster than women according to epigenetic age acceleration in blood,", "of senescent cells slowed down aging. However, the epigenetic clock analysis of senescence suggests that cellular senescence is a state that cells are forced into as a result of external pressures such as DNA damage, ectopic oncogene expression and exhaustive proliferation of cells to replenish those eliminated by external/environmental factors. These senescent cells, in sufficient numbers, will probably cause the deterioration of tissues, which is interpreted as organism ageing. However, at the cellular level, aging, as measured by the epigenetic clock, is distinct from senescence. It is an intrinsic mechanism that exists from the birth of the cell and continues.", "by a DNA damage response which results from the shortening of telomeres during each cellular division process. Cells can also be induced to senesce independent of the number of cellular divisions via DNA damage in response to elevated reactive oxygen species (ROS), activation of oncogenes and cell-cell fusion. The number of senescent cells in tissues rises substantially during normal aging.\nAlthough senescent cells can no longer replicate, they remain metabolically active and commonly adopt an immunogenic phenotype consisting of a pro-inflammatory secretome, the up-regulation of immune ligands, a pro-survival response, promiscuous gene expression (pGE) and stain positive for senescence-associated β-galactosidase activity.", "pathological role in age-related diseases. Cellular senescence in mammalian disease Biomarkers of cellular senescence have been shown to accumulate in tissues of older individuals. The accumulation of senescent cells in tissues of vertebrates with age is thought to contribute to the development of ageing-related diseases, including Alzheimer's disease, type 2 diabetes, and various cancers. Organisms lacking senescence Cellular senescence is not observed in some organisms, including perennial plants, sponges, corals, and lobsters. In those species where cellular senescence is observed, cells eventually become post-mitotic when they can no longer replicate themselves through the process of cellular mitosis; i.e., cells experience", "rDNA circles (ERCs) in mother cells (but not daughter cells) upon every subsequent division is an identifiable type of DNA damage that is associated with replication. These ERCs accumulate over time and eventually trigger replicative senescence and death of the mother cell. Growth and aging There is a large body of evidence indicating the negative effects of growth on longevity across many species. As a general rule, individuals of a smaller size generally live longer than larger individuals of the same species. Animal models In dwarf models of mice, such Snell or Ames mice, mutations have arisen, either rendering them", "their aging can lead to heart failure. Findings of the study indicate that diabetes leads to premature myocyte senescence and death and together they result in the development of cardiomyopathy due to decreased muscle mass.\nBehrens et al. have reviewed evidence that age-dependent accumulation of DNA damage in both stem cells and cells that comprise the stem cell microenvironment is responsible, at least in part, for stem cell dysfunction with aging. Hematopoietic stem cell aging Hematopoietic stem cells (HSCs) regenerate the blood system throughout life and maintain homeostasis . DNA strand breaks accumulate in long term HSCs during aging. ", "inflammation that occurs as a result of aging. It affects the start and the progression of diseases that occur as a result of aging e.g. type 2 diabetes. It occurs in the skin because when exposed to the UV radiation it leads to the damaging of the epidermal cells which in turn cause inflammation to occur. Collagen loss due to increase in age When an individual ages the outermost layer of skin becomes thin despite the number of layers of the cell remains unchanged, also the number of cells that contain a pigment reduces and the melanocytes that remain increase", "the cells and the tissue becomes an ulcer. Cancer, especially squamous cell carcinoma, may also form as the result of chronic wounds, probably due to repetitive tissue damage that stimulates rapid cell proliferation.\nAnother factor that may contribute to chronic wounds is old age. The skin of older people is more easily damaged, and older cells do not proliferate as fast and may not have an adequate response to stress in terms of gene upregulation of stress-related proteins. In older cells, stress response genes are overexpressed when the cell is not stressed, but when it is, the expression", "cells when co-expressed with transcription factors Oct4, Sox2, Klf4 and Myc. with a 100-fold increase in iPS cell reprogramming efficiency, involving 95% of the population.\nFurthermore, C/EBPa can convert selected human B cell lymphoma and leukemia cell lines into macrophage-like cells at high efficiencies, impairing the cells' tumor-forming capacity. Thymic epithelial cells rejuvenation The thymus is the first organ to deteriorate as people age. This shrinking is one of the main reasons the immune system becomes less effective with age. Diminished expression of the thymic epithelial cell transcription factor FOXN1 has been implicated as a component of the mechanism regulating age-related", "a decrease in the productivity of cells is known as cellular senescence. Research shows that in skin that has aged intrinsically does not only degenerate collagens, elastin etc., but also oligosaccharide which affects the skin's ability to retain moisture.\nBesides the internal factors that may cause skin aging, external factors such as been exposed to sunlight also causes the skin to age. 80% of the cases of skin aging have been caused by been exposed to the ultraviolet radiation which is the primary cause of extrinsic aging of the skin. In contrast to the thinning of the epidermis in internally aged", "sterile.\n- IGC scientists led by Miguel Godinho Ferreira found that certain organs, such as the gut, start to age before other tissues because its cells have a \"timekeeper\" with a faster pace. The results published in the journal PLoS Genetics in January 2016 also showed that monitoring the pace of these timekeepers can be a good indicator for the aging of the whole organism since the appearance of local age-related lesions anticipates the onset of age-associated diseases, such as cancer.\n- Research led by Raquel Oliveira, has elucidated how cells are almost blind to chromosome cohesion defects. The results published in", "other words, aging is not a matter of the increase in damage, but a matter of failure to replace it due to a decreased number of stem cells. Stem cells decrease in number and tend to lose the ability to differentiate into progenies or lymphoid lineages and myeloid lineages.\nMaintaining the dynamic balance of stem cell pools requires several conditions. Balancing proliferation and quiescence along with homing (See niche) and self-renewal of hematopoietic stem cells are favoring elements of stem cell pool maintenance while differentiation, mobilization and senescence are detrimental elements. These detrimental effects will eventually cause apoptosis.\nThere are also several", "the whole organism, because such mutant cells can give rise to cancer. Thus DNA damages in frequently dividing cells, because they give rise to mutations, are a prominent cause of cancer. In contrast, DNA damages in infrequently dividing cells are likely a prominent cause of aging.\nThe first person to suggest that DNA damage, as distinct from mutation, is the primary cause of aging was Alexander in 1967. By the early 1980s there was significant experimental support for this idea in the literature. By the early 1990s experimental support for this idea was substantial, and furthermore it had become increasingly evident", "after analyzing human case of Hutchinson's Gilford syndrome and mouse models of accelerated aging.\nStem cells will turn into certain cells as the body needs them. Stem cells divide more than non stem cells so the tendency of accumulating damage is greater. Although they have protective mechanisms, they still age and lose function. Matthew R. Wallenfang, Renuka Nayak and Stephen DiNardo showed this in their study. According to their findings, it is possible to track male GSCs labeled with lacZ gene in Drosophila model by inducing recombination with heat shock and observe the decrease in GSC number with aging. In order", "one of the cells, leaving the other cell rejuvenated. One lineage then undergoes cellular senescence faster than the other.\nCancer cells avoid replicative senescence to become immortal. In about 85% of tumors, this evasion of cellular senescence is the result of up-activation of their telomerase genes. Cancer versus cellular senescence tradeoff theory of aging Senescent cells within a multicellular organism can be purged by competition between cells, but this increases the risk of cancer. This leads to an inescapable dilemma between two possibilities—the accumulation of physiologically useless senescent cells, and cancer—both of which lead to increasing rates of mortality with age.", "muscles of adult mammals, and can cause aging. (Also see DNA damage theory of aging.) In replicating cells, such as cells lining the colon, errors occur upon replication past damages in the template strand of DNA or during repair of DNA damages. These errors can give rise to mutations or epigenetic alterations. Both of these types of alteration can be replicated and passed on to subsequent cell generations. These alterations can change gene function or regulation of gene expression and possibly contribute to progression to cancer.\nThroughout the cell cycle there are various checkpoints to ensure the", "that oxidative DNA damage, in particular, is a major cause of aging.\nIn a series of articles from 1970 to 1977, PV Narasimh Acharya, Phd. (1924–1993) theorized and presented evidence that cells undergo \"irreparable DNA damage\", whereby DNA crosslinks occur when both normal cellular repair processes fail and cellular apoptosis does not occur. Specifically, Acharya noted that double-strand breaks and a \"cross-linkage joining both strands at the same point is irreparable because neither strand can then serve as a template for repair. The cell will die in the next mitosis or in some rare instances, mutate.\" Age-associated accumulation of DNA", "RS and OIS activate the cellular DNA damage response pathway. These results highlight the independence of cellular senescence from epigenetic aging. Consistent with this, telomerase-immortalised cells continued to age (according to the epigenetic clock) without having been treated with any senescence inducers or DNA-damaging agents, re-affirming the independence of the process of epigenetic ageing from telomeres, cellular senescence, and the DNA damage response pathway.\nAlthough the uncoupling of senescence from cellular aging appears at first sight to be inconsistent with the fact that senescent cells contribute to the physical manifestation of organism ageing, as demonstrated by Baker et al., where removal", "Significance It is becoming more evident that the cellular capacity to maintain proteostasis declines with age, thereby causing the late onset of neurodegenerative diseases. In such diseases (e.g. Huntington's disease), a mutated protein misfolds and becomes toxic to the cellular environment by various ways such as denaturating cytosolic proteins. Incompetent of degrading those toxic species, the cell must isolate them to avoid their hazardous interaction with the cellular proteome. The IPOD was shown to be the sub-cellular site to which toxic amyloidogenic proteins are sequestered to, hereby serving as a protective quality control compartment.\nIn addition, it was suggested by", "Sierra Sciences Background In humans, aging is strongly correlated with the length of an individual's telomeres, the repetitive DNA at the ends of each chromosome. Each time a cell in the body divides, its telomeres become shorter. Eventually, telomeres shorten to the point where the cell is unable to divide (the \"Hayflick limit\"). The enzyme telomerase adds these DNA sequence repeats to the telomere, re-lengthening it. In humans, telomerase is expressed in embryonic stem cells and some other cells, but most somatic cells do not express it.\nWhile working at Geron Corporation, Andrews co-discovered the RNA component of", "of the stem-cell niche and results in stem cell exhaustion, another theorized mechanism of aging. Reproduction and somatic maintenance While reproduction inhibits lifespan with regard to multicellular organisms, the precise mechanism responsible for this effect remains unclear. Although many models do illustrate an inverse relationship, and the theory makes sense from an evolutionary perspective, the cellular mechanisms have yet to be explored. However, with regards to cellular replication, the progressive shortening of telomeres is a mechanism which limits the amount of generations of a single cell may undergo. Furthermore, in unicellular organisms like Saccharomyces cerevisiae, the formation of extrachromosomal", "Start (beginning of cell cycle) is responsive to growth when the G2/M control is lost. Furthermore, cells in poor nutrient conditions grow slowly and therefore take longer to double in size and divide. Low nutrient levels also reset the growth threshold so that cell progresses through the cell cycle at a smaller size. Upon exposure to stressful conditions [heat (40 °C) or the oxidizing agent hydrogen peroxide] S. pombe cells undergo aging as measured by increased cell division time and increased probability of cell death. Finally, wee1 mutant fission yeast cells are smaller than wild-type cells, but take just as", "and being damaged by ROS, leading him to the conclusion that mitochondria determine ageing. In 1972, he published his theory in the Journal of the American Geriatrics Society. Evidence It has been observed that with age, mitochondrial function declines and mitochondrial DNA mutation increases in tissue cells in an age-dependent manner. This leads to increase in ROS production and potential decrease in the cell’s ability to remove ROS. \nMost long-living animals have been shown to be more resistant to oxidative damage and have lower ROS production, linking ROS levels to lifespan. Overexpression of antioxidants, which function to remove ROS has", "which also, once they progress far enough, increasingly disrupt metabolism, resulting in pathology and death.\" The current causes of aging in humans are cell loss (without replacement), DNA damage, oncogenic nuclear mutations and epimutations, cell senescence, mitochondrial mutations, lysosomal aggregates, extracellular aggregates, random extracellular cross-linking, immune system decline, and endocrine changes. Eliminating aging would require finding a solution to each of these causes, a program de Grey calls engineered negligible senescence. There is also a huge body of knowledge indicating that change is characterized by the loss of molecular fidelity. Disease Disease is theoretically surmountable via technology. In short, it", "DNA damage in frequently dividing cells, because it gives rise to mutations, is a prominent cause of cancer. In contrast, DNA damage in infrequently-dividing cells is likely a prominent cause of aging. Mechanisms Cells cannot function if DNA damage corrupts the integrity and accessibility of essential information in the genome (but cells remain superficially functional when non-essential genes are missing or damaged). Depending on the type of damage inflicted on the DNA's double helical structure, a variety of repair strategies have evolved to restore lost information. If possible, cells use the unmodified complementary strand of the DNA or the sister", "damage and decline in gene expression In tissues composed of non- or infrequently replicating cells, DNA damage can accumulate with age and lead either to loss of cells, or, in surviving cells, loss of gene expression. Accumulated DNA damage is usually measured directly. Numerous studies of this type have indicated that oxidative damage to DNA is particularly important. The loss of expression of specific genes can be detected at both the mRNA level and protein level. Brain The adult brain is composed in large part of terminally differentiated non-dividing neurons. Many of the conspicuous features of aging reflect a decline", "(Frade and Ovejero-Benito, 2015). The presence of these core cell cycle factors can be explained through their role in neuronal migration, maturation, and synaptic plasticity (Christopher L. Frank1 and Li-Huei Tsai1, 2009). However, it is also possible that, under certain conditions, these factors can induce cell cycle re-entry. Under conditions such as DNA damage, oxidative stress, and activity withdrawal these factors have been shown to be upregulated. However the cells usually die in the G1/S checkpoint before DNA has been replicated (Park et al., 1998). \nThe process by which the cell re-enters the cell cycle and dies is called “abortive", "is regenerated from specialized muscle cells that dedifferentiate and forget the type of cell they had been. This capacity to regenerate does not decline with age and may be linked to their ability to make new stem cells from muscle cells on demand.\nA variety of nontumorigenic stem cells display the ability to generate multiple cell types. For instance, multilineage-differentiating stress-enduring (Muse) cells are stress-tolerant adult human stem cells that can self-renew. They form characteristic cell clusters in suspension culture that express a set of genes associated with pluripotency and can differentiate into endodermal, ectodermal and mesodermal cells both in vitro", "with increased epigenetic age acceleration in blood. Cellular senescence versus epigenetic aging A confounding aspect of biological aging is the nature and role of senescent cells. It is unclear whether the three major types of cellular senescence, namely replicative senescence, oncogene-induced senescence and DNA damage-induced senescence are descriptions of the same phenomenon instigated by different sources, or if each of these is distinct, and how they are associated with epigenetic aging.\nInduction of replicative senescence (RS) and oncogene-induced senescence (OIS) were found to be accompanied by epigenetic aging of primary cells but senescence induced by DNA damage was not, even though", "are present in virtually all adult tissues, including lung, brain, kidneys, muscles, and pancreas Co-purification of BLSC's and VSEL cells with other populations of adult stem cells may explain the apparent pluripotency of adult stem cell populations. However, recent studies have shown that both human and murine VSEL cells lack stem cell characteristics and are not pluripotent. Aging Stem cell function becomes impaired with age, and this contributes to progressive deterioration of tissue maintenance and repair. A likely important cause of increasing stem cell dysfunction is age-dependent accumulation of DNA damage in both stem cells and the cells that" ]
What is involved in porting a PS2 game like Metal Gear Solid 2 to Xbox 360/PS3 for an HD Collection?
[ "PS2 and X360/PS3 have different processor architectures. Which means that the same piece of code means different things to those machines. That's where emulators come in. An emulator is a software that reads a code that's written for a certain processor and \"translates\" it to work on another processor. Now to make an emulator work, you have to have a very good understanding of how both processors work, so you can make the translation process as smooth as possible. If an indie team consisting of programmers who know how those architecture work at the lowest level, they can make it work, within the limits of both processors' capabilities of course." ]
[ "Advanced Warfare received a Blacksmith armor shader in Destiny. Those who purchased the digital PlayStation 3 or Xbox 360 versions of the game were allowed to download the PlayStation 4 or Xbox One clients respectively at no additional cost, until January 15, 2015.\nSome of the game's initial content, including certain items and missions, were timed exclusives for PlayStation platforms. These included the \"Dust Palace\" strike, the \"Exodus Blue\" Crucible map, two exotic weapons (the auto rifle \"Monte Carlo\" and hand cannon \"Hawkmoon\"), a rare gear set for each class (Manifold Seeker for Warlock, Vanir for Titan, and Argus for Hunter),", "Metal Gear Solid HD Collection Features The core play mechanics and story for all games remains unchanged with the HD Editions. For the remastering, all three games underwent graphics overhaul to allow them to support modern 720p resolution and 60fps framerate on home consoles, and qHD resolution on PS Vita. The PS3 and PS Vita versions have Trophy support, while the Xbox 360 versions include Achievements.\nThe controls for each game have been modified to suit the different configurations of each platform. Since the Xbox 360 and PS Vita version lack the pressure-sensitive buttons featured on the PS2 controllers, the ability", "as the system's DVD-ROM optical drive and DualShock 2 controller, provide the software and user control input.\nPlayStation 2 software is distributed on CD-ROM and DVD-ROM. In addition, the console can play audio CDs and DVD movies, and is backwards compatible with original PlayStation games. This is accomplished through the inclusion of the original PlayStation's CPU which also serves as the PS2's I/O processor. The PS2 also supports limited functionality with the original PlayStation memory cards and controllers. The PS2's DualShock 2 controller is an upgraded version of the PlayStation's DualShock with analog face, shoulder and D-pad buttons replacing the digital", "in North America. It requires the Network Adaptor to connect to the PlayStation 2 and to receive power. The HDD has a 40 GB capacity that can be used by games to reduce load time by putting data on the hard drive temporarily, or back up memory card data. Due to MagicGate copyright protection, programs that are bootable directly from the HDD (e.g. PlayStation Broadband Navigator, PlayOnline Viewer, Pop'n Music Puzzle-dama Online) are keyed to the system when that system installs them. The HDD can be transferred to another PlayStation 2 system and files on the HDD can be accessed, but", "the Special Missions disc to proceed through the rest of the game. This requirement renders Special Missions incompatible with PlayStation 2 consoles made before the SCPH-70000 model. PC version The PC version of Metal Gear Solid was released in North America, Europe, and Asia in late 2000. This version was published by Microsoft Game Studios and developed by Digital Dialect. It supports the use of a keyboard or a USB game controller with at least six buttons (with the manual recommending the Sidewinder Game Pad Pro). It also supports Direct3D-capable video cards, allowing for a high resolution of up to", "November 10, 2009. It was also ported to macOS by Aspyr years after the game's original release. This version was released on May 20, 2014, alongside the macOS port for Call of Duty: Modern Warfare 3. The Xbox 360 version of Modern Warfare 2 was made backward compatible with the Xbox One on August 28, 2018. Downloadable content Activision announced that two downloadable map packs would be released for Modern Warfare 2. At E3 2009, Microsoft stated that these map packs would first be made available for the Xbox 360 via Xbox Live before they would be released for other", "Solid 2 and 3 have a \"Transfarring\" feature, which allows users to transfer their save file between both platforms via a Wi-Fi connection or through a cloud storage, allowing continuous play of the same save file on a different platform. The PS3 version of Peace Walker has a similar connectivity with the PSP version of the game, allowing the transferring of save files through a USB connection. Regional differences The Japanese release of the compilation, titled Metal Gear Solid HD Edition, only includes Metal Gear Solid 2 and Metal Gear Solid 3, even on the home console versions. Metal Gear", "Xbox 360 Edition does not support player-made mods or custom maps. A cross-promotional resource pack based on the Super Mario franchise by Nintendo was released for the Wii U Edition worldwide on 17 May 2016. A mash-up pack based on Fallout was announced for release on the Wii U Edition.\nIn June 2017, Mojang released an update known as the \"Discovery Update\". The update includes a new map, a new game mode, the \"Marketplace\", a catalogue of user-generated content that gives Minecraft creators \"another way to make a living from the game\", and more. Personal computer versions The game can run", "the controller allow players to use the PSP Go as a portable device and as a console, although the output is not upscaled. PlayStation 1 games can be played in full screen using the AV/component cable or the cradle.\nThe PSP Go lacks a UMD drive, and instead has 16 GB of internal flash memory, which can be extended by up to 32 GB with the use of a Memory Stick Micro (M2). Games must be downloaded from the PlayStation Store. The removal of the UMD drive effectively region-locks the unit because it must be linked to a single, region-locked PlayStation Network account.", "aspects of the game, was released on July 24, 2015. PlayStation 4 and Xbox One port A console port was announced in 2016 for a 16 September 2016 release, to be published in Europe by Ravenscourt. The port was to have no major upgrades on the original, and lack the Viking Conquest and Napoleonic Wars expansions. Modding is not supported in the ported versions. A digital release for North America was also scheduled for September 16, 2016.", "the original Xbox 360 version, the Bethesda re-release does not include the port of Quake II.\nLike its predecessors, Quake 4 can be modified. This led to Quake 4 versions of popular mods from previous versions of Quake, such as Rocket Arena, and Quake 4 Fortress (the Quake 4 version of Team Fortress Classic). Quake 4 Fortress was abandoned before its creators considered it complete; instead they released an alpha version complete with source code. In the competitive gaming scene, there were two principal mods, Q4Max and X-Battle. The online Quake 4 competitive community was split between the two mods. A", "the PlayStation Network. It features the same level design and general premise but contained 3D-rendered graphics, more fluid movements, and Sands of Time aesthetics. The gameplay and controls were slightly adjusted to include a wall-jump move and different swordplay. New game modes were also added, such as \"Time Attack\" and \"Survival\". The game has also been released on Android.\nReverse engineering efforts by fans of the original game have resulted in detailed documentation of the file formats of the MS-DOS version. Various level editors have been created that can be used to modify the level files of the game. With", "five exclusive maps, two exclusive characters, a two-player split screen mode, and all the downloadable content released by Epic already on the disc. With the release of the PS3 and PC \"Titan Upgrade\" patch on March 5, these versions offered the formerly exclusive Xbox 360 content, as well as other content. The Xbox 360 version does not support user-generated mods, as additional content has to be verified by Microsoft before being released. It is the only version to support controllers only. Cancelled Linux and Mac OS X versions The Linux and Mac OS X versions of the game were planned", "and Xbox 360 (May 2011), Green Lantern: Rise of the Manhunters for PS3 and Xbox 360 (June 2011), Captain America: Super Soldier for PS3 and Xbox 360 (July 2011). Gears of War 3 for Xbox 360 (September 2011), Batman: Arkham City for PS3 and Xbox 360 (October 2011), Assassin's Creed: Revelations for PS3 and Xbox 360 (November 2011), and Assassin's Creed III for Wii U (November 2012). The first DVD/Blu-ray including Inficolor 3D Tech is: Battle for Terra 3D (published in France by Pathé & Studio 37 - 2010).\nMost other games can be played in this format with Tridef 3D", "the only officially retailed PlayStation with no regional lockout; it would play games from any territory. It would not however play CD-R discs, so it was not possible to create self-booting Yaroze games without a modified PlayStation. Quality of construction The first batch of PlayStations used a KSM-440AAM laser unit whose case and all movable parts were completely made out of plastic. Over time, friction caused the plastic tray to wear out—usually unevenly. The placement of the laser unit close to the power supply accelerated wear because of the additional heat, which made the plastic even more vulnerable to friction.", "The PS3 version of the HD Collection was made available on the PlayStation Now streaming service in February 2019. The Legacy Collection On April 22, 2013, Konami announced a new version of the collection titled Metal Gear Solid: The Legacy Collection, exclusive to PS3. This later collection includes all the games featured on the HD Collection on the first disc, along with Metal Gear Solid 4: Guns of the Patriots on a second disc and voucher codes for the original Metal Gear Solid and Metal Gear Solid: VR Missions. The Legacy Collection was released in North America on July", "late 2004, Sony released a series of PSP demo games, including Duck In Water, world/ball, Harmonic City, and Luga City. Demos for commercial PSP games could be downloaded and booted directly from a Memory Stick. Demos were sometimes issued in UMD format and mailed out or given to customers at retail outlets. In addition, several older PlayStation games were re-released; these can be played on the PSP using emulation. As of 2008, this feature could be officially accessed through the PlayStation Network service for PlayStation 3, PSP, PlayStation Vita (or PlayStation TV), or a personal computer. Emulation of the PSP", "midway through development. The Xbox 360 version of Battlefield 3 is shipped on two discs due to the disc size limit; however, the PS3 version ships on one Blu-ray Disc. It is the first game in the series that does not support versions of Windows prior to Windows Vista as the game only supports DirectX 10 and 11. The PC version is exclusive to EA's Origin platform, through which PC users also authenticate when connecting to the game.\nBattlefield 3 debuts the new Frostbite 2 engine. This updated Frostbite engine can realistically portray the destruction of buildings and scenery to a", "without controversy. HDLoader bypasses the usual copy protection mechanisms built into the console, allowing for piracy. Linux kit The Linux Kit for PlayStation 2 was released in 2002 and included the PlayStation 2 Linux software, keyboard, mouse, VGA adapter (which requires an RGB monitor with sync-on-green), Network Adaptor (Ethernet only) and a 40 GB hard disk drive. It allows the PlayStation 2 to be used as a personal computer. Hacking and modding As of mid 2010, it is possible to install and use the PlayStation BB Navigator (PS-BBN) and the HDD-OSD (HDD Utility-Disc) on every PlayStation 2 Console from every", "a hardware on-the-fly zlib decompression module. The original PS4 model can output in 4K and play multimedia in the format, but does not play games in 4K. The console includes a 500 gigabyte hard drive for additional storage, which can be upgraded by the user. System Software 4.50, which was released on March 9, 2017, enabled the use of external USB hard drives up to 8 TB for additional storage.\nThe PlayStation 4 features Wi-Fi and Ethernet connectivity, Bluetooth, and two USB 3.0 ports. An auxiliary port is also included for connection to the PlayStation Camera, a motion detection digital camera device", "Xbox 360 and PlayStation 3 was released on June 3, 2014, with the full retail versions to follow on August 5. The PC versions (both digital and retail) were released on August 8, the PC port being delayed to get the console versions ready in time for the 2014 Evolution Championship Series. The PC version of Ultra Street Fighter IV was the first game in the series to use Steam from day one, following the discontinuation of Games for Windows – Live.\nThe update introduces six new stages, a different announcer and five new characters: Rolento, Elena, Hugo and Poison (all", "ports to PC more effective. Eidos officially announced the game E3 2002; the platforms listed were PC, Xbox and PS2. It was later revealed that Ion Storm were struggling to work out how to port the game to PS2 given the extensive hardware differences between the three platforms, and were reluctant to do so due to these issues. Following the game's release, it was clarified that no PS2 version would be developed. As part of the promotion, the soundtrack was made available for download through the game's website. A demo was released in November 2003. The game was released in", "a full version. This version is also included on the disc that comes with the Xbox Arcade bundle for the Xbox 360, alongside Pacman Championship Edition, UNO, Luxor 2, and Boom Boom Rocket. The Xbox 360 Pro and Elite versions include this version as one of the 16 game demos preloaded on the hard drive.\nAn arcade version was released by UltraCade Technologies which featured a ticket redemption system and an automated difficulty tuning system. The arcade cabinet also features built in bubbler tanks on both sides with flowing water and artificial fish. Reception A review by IGN criticized the", "support Unlike the Japanese release of the game, the North American and European release of the game include PlayStation Move support at launch. This is the only difference between the PlayStation 3 and Xbox 360 versions of the game. Players can use the PlayStation Move controller to recharge the katana, since the beam katanas run on batteries, as well as control it to execute attacks and advanced combos, much like the Wii version. Development On November 17, 2009, Famitsu magazine revealed that No More Heroes would receive a port to both the PlayStation 3 and Xbox 360 from the company", "first introduced on the PS3. A mono headset, which can be plugged into the DualShock 4, is bundled with the system. Audio/video output options include HDMI TV and optical S/PDIF audio. The console does not have an analog audio/video output.\nThe PS4 features a \"Rest mode\" feature. This places the console in a low-power state, while allowing users to immediately resume their game or app once the console is awoken. The console also is able to download content such as game and OS updates while it is in this state. Controllers The DualShock 4 is PlayStation 4's primary controller; it maintains", "PlayStation 3 and Xbox 360 on September 23, 2008 in North America, and was in stores on September 20, 2008. The Microsoft Windows version was released two weeks later, on October 7, 2008. It was made available on Steam on October 8, 2008.\nGearbox officially announced a special, limited edition version of the game which included a 6-inch Sergeant Matt Baker figure with 13 accessories, a blister pack holding the figure and accessories, a 32-page Brothers in Arms First Edition comic book, a full-color map of Operation Market Garden, special packaging, and 2 more playable multiplayer characters. Novelization On July 29,", "through the story mode, although they play the same when in Toy Box mode. The PS2 and PSP versions also allow the player to control the Aliens and Andy's soldier toys during certain levels. The PS3 and Xbox 360 versions have eight story mode levels, while the PS2 and PSP version includes 13 levels in story mode. In the latter versions, after the player has completed a level in Story Mode, they can go back and replay it to try the two Challenge modes, which are Cube Destruction and Time Attack, that allow the player to win coins and unlock", "PlayStation 2 accessories Various accessories for the PlayStation 2 video game console have been produced by Sony, as well as third parties. These include controllers, audio and video input devices like microphones and video cameras, and cables for better sound and picture quality. DualShock 2 The DualShock 2 Analog Controller (SCPH-10010) is the standard controller for the PlayStation 2 and is almost identical to the original DualShock controller for the original PlayStation console with only minor changes. All the buttons other than L3, R3 and \"Analog\" feature analog pressure sensitivity; the connecting cable is slightly longer than the original", "as soon as possible, the 360 version was originally planned as a series of downloadable segments through the Xbox Live Arcade, with a later full retail release. To download, players needed a copy of Legend for the 360, which was explained by Eidos as a means of bringing the game to players as quickly as possible. This plan was later changed so the Xbox Live version would release the month after the retail version.\nAnniversary was the first Tomb Raider title for the Wii, developed to expand Eidos's game catalogue into new Nintendo consoles. Due to receiving Wii development kits fairly", "PlayStation Underground Content Each issue consists of two CD-ROMs that can be played on a PlayStation or a PlayStation 2 console, or an emulator. Disc two The second disc contains mostly demos of upcoming games as well as game trailers. For example, in the second issue of PlayStation Underground the second disc was a Square themed disc containing demos to Final Fantasy VII and Bushido Blade as well as exclusive upcoming trailers of new Square games." ]
Why does the water spray from the shower feel cold when you're standing next to the beam itself, even if the water is warm?
[ "I believe you are feeling tiny borderline microscopic droplets of water which due to their size lose their heat to the environment extremely quickly" ]
[ "a shower head causes the air through which the water moves to start flowing in the same direction as the water. This movement would be parallel to the plane of the shower curtain. If air is moving across the inside surface of the shower curtain, Bernoulli's principle says the air pressure there will drop. This would result in a pressure differential between the inside and outside, causing the curtain to move inward. It would be strongest when the gap between the bather and the curtain is smallest - resulting in the curtain attaching to the bather.", "be seen to be believed. As the water falling from a vibrating shower head is illuminated by a strobe, the droplets are caught dancing in response to sound; at certain strobe speeds, the droplets appear to be moving upwards, violating all rules of gravity. Living Fountain (1980-88) is a yet larger water sculpture, incorporating a showerhead three feet in diameter, plus three concentric circles of water jets, all installed above a basin twelve by sixteen feet. Here the strobe is designed to respond to combinations of changes in audible music, random sensors, audio-feedback controls, and a computer program. \nIn conclusion,", "hot water faucet elsewhere, the relatively higher pressure in the cold water supply line will cause the shower temperature to drop suddenly. This is described in US patent 3674048.\nThe pressure-balanced shower valve compensates for changes in water pressure. It has a diaphragm or piston inside that reacts to relative changes in either hot or cold water pressure to maintain balanced pressure. As water pressure drops on one supply line, the valve reduces the pressure in the other supply line to match. A side effect of this is that the pressure and flow at the shower head or", "Shower-curtain effect The shower-curtain effect in physics describes the phenomenon of how a shower curtain gets blown inward with a running shower. The problem of identifying the cause of this effect has been featured in Scientific American magazine, with several theories given to explain the phenomenon but no definite conclusion.\nThe shower-curtain effect may also be used to describe the observation how nearby phase front distortions of an optical wave are more severe than remote distortions of the same amplitude. Buoyancy hypothesis Also called Chimney effect or Stack effect, observes that warm air (from the hot shower) rises out over the", "shower curtain as cooler air (near the floor) pushes in under the curtain to replace the rising air. By pushing the curtain in towards the shower, the (short range) vortex and Coandă effects become more significant. However, the shower-curtain effect persists when cold water is used, implying that this cannot be the only mechanism at work.\nSee also Cooling tower. Bernoulli effect hypothesis The most popular explanation given for the shower-curtain effect is Bernoulli's principle. Bernoulli's principle states that an increase in velocity results in a decrease in pressure. This theory presumes that the water flowing out of", "Shower A shower is a place in which a person bathes under a spray of typically warm or hot water. Indoors, there is a drain in the floor. Most showers have temperature, spray pressure and adjustable showerhead nozzle. The simplest showers have a swivelling nozzle aiming down on the user, while more complex showers have a showerhead connected to a hose that has a mounting bracket. This allows the showerer to hold the showerhead by hand to spray the water at different parts of their body. A shower can be installed in a small shower stall or bathtub with a", "water over solid angle a focal point of use, generally overhead the bather. A shower uses less water than a full immersion in a bath. Some shower heads can be adjusted to spray different patterns of water, such as massage, gentle spray, strong spray, and intermittent pulse or combination modes. Hard water may result in calcium and magnesium deposits clogging the head, reducing the flow and changing the spray pattern. For descaling, various acidic chemicals or brushes can be used or some heads have rubber-like jets that can be manually descaled. A homemade remedy is to immerse it in a", "Dousing Cold water dousing Cold water dousing is used to \"shock\" the body into a kind of fever. The body's reaction is similar to the mammalian diving reflex or possibly temperature biofeedback. Several meditative and awareness techniques seem to share similar effects with elevated temperature, such as Tummo. Compare cold water dousing with ice swimming.\nThe effects of dousing are usually more intense and longer-lasting than just a cold shower. Ending a shower with cold water is an old naturopathic tradition. There are those who believe that this fever is helpful in killing harmful bacteria and leaving the hardier beneficial bacteria", "causes higher air pressure on the outside to force the shower curtain inwards to equalise the air pressure, this can be observed simply when the bathroom door is open allowing cold air into the bathroom. Solutions Many shower curtains come with features to reduce the shower-curtain effect. They may have adhesive suction cups on the bottom edges of the curtain, which are then pushed onto the sides of the shower when in use. Others may have magnets at the bottom, though these are not effective on acrylic or fiberglass tubs.\nIt's possible to use a telescopic shower curtain rod to block", "of the shower mist created by dropping dry ice into warm water and funneling the vapors into the shower by a hidden tube. Khambatta had to leave the location repeatedly to avoid hypercapnia. One scene required the Ilia probe to slice through a steel door in the sickbay; doors made out of paper, corrugated cardboard covered in aluminum foil, and cork were tested before the proper effect was reached. The illuminated button in the hollow of the probe's throat was a 12–volt light bulb that Khambatta could turn on and off via hidden wires; the bulb's heat eventually caused a", "Shower splash guard A shower splash guard is a permanently installed, fixed, rigid fitting made of plastic or glass that prevent water from a shower from splashing out of the bathtub and onto the floor. Typically, the shower splash guard is a small triangular piece of plastic that is used in combination with a shower curtain, to prevent water escaping at the corners, but it may be a much larger piece that is used by itself. Typical design and use They are commonly installed on rectangular drop-in bathtubs with a shower head combination. In this arrangement, the bathtub", "fine glass siphon, and through this it rushes accordingly and discharges itself upon the paper. The natural repulsion between its like-electrified particles causes the shower to issue in spray. As the paper moves over the pulleys a delicate hair line is marked, straight when the syphon is stationary, but curved when the siphon is pulled from side to side by the oscillations of the signal coil.\nPower to pull the roll of paper tape through the syphon recorder was usually supplied by one Froment's mouse mill motors. These also drove an electrostatic machine to generate the electricity to power", "and puddles on the floor, near the wall at the end of the shower curtain, particularly at the end where the shower head was located.\nThe shower splash guard is designed to solve the problem of containing water, mostly at the shower head end of the bathtub. Like the shower curtain, it dates back to the early 1900s.", "rate at which they can produce it is limited by the thermodynamics of heating water from the available fuel supplies. Electric shower heads An electric shower head has an electric heating element which heats water as it passes through. These self-heating shower heads are specialized point-of-use (POU) tankless water heaters, and are widely used in some countries.\nInvented in Brazil in the 1930s and used frequently since the 1940s, the electric shower is a home appliance often seen in South American countries due to the higher costs of gas distribution. Earlier models were made of chromed copper or brass, which were", "lost this way. Comfort increase A typical shower delivers 9.5 liters per minute (2.5 gallons per minute). Scientific studies that monitored hundreds of homes across the nation have shown that flow rates have little influence on the duration of the shower.", "Particle shower In particle physics, a shower is a cascade of secondary particles produced as the result of a high-energy particle interacting with dense matter. The incoming particle interacts, producing multiple new particles with lesser energy; each of these then interacts, in the same way, a process that continues until many thousands, millions, or even billions of low-energy particles are produced. These are then stopped in the matter and absorbed. Types There are two basic types of showers. Electromagnetic showers are produced by a particle that interacts primarily or exclusively via the electromagnetic force, usually a photon", "not high, provided they are properly maintained, although some splashing and aerosol formation can occur during flushing, particularly when someone has diarrhea. Pathogens can survive in the scum or scale left behind on baths, showers and wash basins after washing and bathing.\nWater left stagnant in the pipes of showers can be contaminated with pathogens that become airborne when the shower is turned on. If a shower has not been used for some time, it should be left to run at a hot temperature for a few minutes before use.\nThorough cleaning is important in preventing the spread of fungal infections. Molds", "free time without the use of grants. The Coandă effect The Coandă effect, also known as \"boundary layer attachment\", is the tendency of a moving fluid to adhere to an adjacent wall. Condensation A hot shower will produce steam that condenses on the shower side of the curtain; lowering the pressure there. In a steady state the steam will be replaced by new steam delivered by the shower but in reality the water temperature will fluctuate and lead to times when the net steam production is negative. Air pressure Colder dense air outside and hot less dense air inside", "link.\nSpangles Muldoon reported:\nIt seems they're gonna spray water onto the antenna, which apart from tripping out our transmitter, would give whoever did it a very lethal shock. . .. So by all means, spray the aerial with water, if it makes you feel any better.\nAndy Archer:\n. . . and the banging you can hear in the background is that we are taking all security precautions, and locking up the hatches to save anybody from coming down into the studio itself. So once more we must tell you that there's a raid taking place at the moment. . . an unauthorized", "to function before the thermostat opens. Another benefit is that there is still some flow through the radiator if the thermostat fails. Shower and other hot water controls A thermostatic mixing valve uses a wax pellet to control the mixing of hot and cold water. A common application is to permit operation of an electric water heater at a temperature hot enough to kill Legionella bacteria (above 60 °C (140 °F)), while the output of the valve produces water that is cool enough to not immediately scald (49 °C (120 °F)). Analysis A wax pellet driven valve can be analyzed through graphing the", "Pressure-balanced valve A pressure-balanced valve provides water at nearly constant temperature to a shower or bathtub, despite pressure fluctuations in either the hot or cold supply lines.\nIf, for example, someone flushes a toilet while the shower is in use, the fixture suddenly draws a significant amount of cold water from the common supply line, causing a pressure drop. In the absence of a compensating mechanism, the relatively higher pressure in the hot water supply line will cause the shower temperature to rise just as suddenly, possibly reaching an uncomfortable or even dangerous level. Conversely, if someone opens a", "of water bath relies primarily on convection instead of water being uniformly heated. Therefore, it is less accurate in terms of temperature control. In addition, there are add-ons that provide stirring to non-circulating water baths to create more uniform heat transfer. Shaking Water Baths This type of water bath has extra control for shaking, which moves liquids around. This shaking feature can be turned on or off. In microbiological practices, constant shaking allows liquid-grown cell cultures grown to constantly mix with the air.\nSome key benefits of shaking water bath are user-friendly operation via keypad , convenient bath drains, adjustable shaking", "the shower when water is necessary. This can be facilitated when the plumbing or showerhead allow turning off the water without disrupting the desired temperature setting (common in the UK but not the United States). Dishwashers and sinks On average, sinks were 15% of U.S. indoor water use in 1999. There are, however, easy methods to rectify excessive water loss. Available for purchase is a screw-on aerator. This device works by combining water with air thus generating a frothy substance with greater perceived volume, reducing water use by half. Additionally, there is a flip-valve available that allows flow to", "force of the spray can be relatively strong (especially close to the point where the water emerges) or may have more resemblance to rainfall or even a fine mist. Many splash pads have some features such as fine mist, that are designed to be moderate enough for children. Other splash fountains are designed for adults, e.g. for joggers or concert goers to cool off in. Drainage The area beneath a spray pool typically has drain openings so that the water it produces will not flood the surrounding landscape. In some instances, the water collected in these drains is recycled", "Charcot Shower Device The Sharko Shower projects water under high pressure from a shower-like device for an extra-strong massage over the patient's entire body. The device is applied from a distance of 3.0 - 3.5m (8.5 – 10 feet). It uses a pressure of 1.5-3 atmospheres. The water is at a temperature of 15°–20 °C (60° - 68 °F). The procedure can cause haematoma (bruising), so it should not be done during the suntan season.", "right opens the cold water passages (using the standard North American convention of the hot water control on the left).\nLater Moen bathtub/shower controls with single handles use a larger cartridge with a pressure balancing mechanism which compensates for sudden pressure changes in either the hot or cold water supply (as caused by a toilet being flushed while someone is showering). The design goal is to maintain the temperature of the shower for safety and comfort reasons, even if the volume of water is reduced. The cartridge is known as the 1222. The operation is similar to the 1225 (above), though", "of air showers. To do this, Rossi enlisted his student, George W. Clark, who completed a PhD in 1952, and Piero Bassi, who was a visitor from the University of Padua. Because solid scintillating material was unavailable, they decided to use terphenyl dissolved in benzine, which is an efficient liquid scintillator. With the aid of three counters deployed on the roof of the MIT Physics building during the winter of 1952/53, they found that shower particles arrived within only one or two meters of a disk, which travels at nearly the speed of light in the direction", "of the volume of water falling. Adding the aerator does two things: reducing the volume of falling water which reduces the splash distance, and creating multiple \"mini-streams\" within the main stream. Each mini-stream, if it were falling by itself would splash or flow in a unique and different way when it hit the surface, as compared to the other mini-streams. Because they are all falling at the same time, the streams will splash in their own way but end up hitting other splash streams. The resulting interference cancels out the majority of the splashing effect. Conservation and energy reduction Because", "standby heat. Safety There is a wide range of electric showers, with various types of heating controls. The heating element of an electric shower is immersed in the water stream, using a nichrome resistance element which is sheathed and electrically isolated, like the ones used in oil heaters, radiators or clothes irons, providing safety. Due to electrical safety standards, modern electric showers are made of plastic instead of using metallic casings like in the past. As an electrical appliance that uses more electric current than a washer or a dryer, an electric shower installation requires careful planning, and generally is", "hair is washed as part of a shower or bathing with shampoo, a specialized surfactant. Shampoos work by applying water and shampoo to the hair. The shampoo breaks the surface tension of the water, allowing the hair to become soaked. This is known as the wetting action. The wetting action is caused by the head of the shampoo molecule attracting the water to the hair shaft. Conversely, the tail of the shampoo molecule is attracted to the grease, dirt and oil on the hair shaft. The physical action of shampooing makes the grease and dirt become an" ]
why do empty folders contain 0 bytes of data? Don't folder names contain (even a few) bytes of data?
[ "The contents of the folders are 0 bytes of data (no contents). It's like saying a real-life box contains 0 pounds. But the box itself isn't 0 pounds.", "Well since no one else has answered yet here is what you seek:\n\nThe folder names are actually stored in a large table, in some constructs called a master file table. Nothing on your disk is really inside any folder, the concept of a folder is just for conveniences sake. It is like those old library index drawers, everything seems to have this logical method to find the data, but on the shelf they're right next to other books without any preceding data.\n\nThe tiny folder name takes up a few bytes or kb on in the index in the file table (the size it takes up cannot easily be found by an end user) and so no, one could not have unlimited folders. It would be like the index drawer occupying the whole building but with no entries under any of the headings.\n\nAnywho, I hoped that helped answer your question, let me know if you'd like more detail?" ]
[ "filesystem structure.\nIf one is referring to a container of documents, the term folder is more appropriate. The term directory refers to the way a structured list of document files and folders is stored on the computer. The distinction can be due to the way a directory is accessed; on Unix systems, /usr/bin/ is usually referred to as a directory when viewed in a command line console, but if accessed through a graphical file manager, users may sometimes call it a folder.", "as a synonym for \"directory\", while the word \"file\" is universally used for actual data items on a disk (sometimes called \"documents,\" especially on the Apple Macintosh). In Unix-like systems, this is resolved to some degree by the creed \"everything is a file\"; folders are themselves just a special type of file, and many commands (to copy, delete, move, or rename) can be executed without knowing whether the file identifies an entire folder or not. Tab positions Because tabs can be cut in different positions, the position of the tab can be referred to as well. For instance, for the", "file size but only allocating blocks that are actually used. A detriment of this method is the disk may have free space (unallocated blocks) but data cannot be appended to a file because all directory entries are used. Errata The Commodore DOS used a similarly named but significantly different Block availability map.", "and other objects only as a stream of bytes, and have little or no information about the data stored in the files. Such file systems also provide only a single way of organizing the files, namely via directories and file names.\nBecause a file system has no knowledge about the data it stores, applications tend to use their own, often proprietary, file formats. This hampers sharing of data between multiple applications. It becomes difficult to create an application which processes information from multiple file types, because the programmers have to understand the structure and semantics of all the files. Using", "the files in one directory in one place—the directory table for that directory—which is often stored like any other file.\nMany file systems put only some of the metadata for a file in the directory table, and the rest of the metadata for that file in a completely separate structure, such as the inode.\nMost file systems also store metadata not associated with any one particular file.\nSuch metadata includes information about unused regions—free space bitmap, block availability map—and information about bad sectors.\nOften such information about an allocation group is stored inside the allocation group itself.\nAdditional attributes can be associated on file systems,", "more modular.\nData storage devices and many modern programming languages support namespaces. Storage devices use directories (or folders) as namespaces. This allows two files with the same name to be stored on the device so long as they are stored in different directories. In some programming languages (e.g. C++, Python), the identifiers naming namespaces are themselves associated with an enclosing namespace. Thus, in these languages namespaces can nest, forming a namespace tree. At the root of this tree is the unnamed global namespace.", "Digital container format Properties Since the container does not describe how data or metadata is encoded, a program able to identify and open a container file might not be able to decode the contained data. This may be caused by the program lacking the required decoding algorithm.\nBy definition, a container format could wrap any kind of data. Though there are some examples of such file formats (e.g. Microsoft Windows's DLL files), most container formats are specialized for specific data requirements. For example, a popular family of containers is found for use with multimedia file formats. Since audio and video streams", "some platforms the format is usually indicated by its filename extension, specifying the rules for how the bytes must be organized and interpreted meaningfully. For example, the bytes of a plain text file (.txt in Windows) are associated with either ASCII or UTF-8 characters, while the bytes of image, video, and audio files are interpreted otherwise. Most file types also allocate a few bytes for metadata, which allows a file to carry some basic information about itself.\nSome file systems can store arbitrary (not interpreted by the file system) file-specific data outside of the file format, but linked to the file,", "COM Structured Storage Motivation Structured storage addresses some inherent difficulties of storing multiple data objects within a single file. One difficulty arises when an object persisted in the file changes in size due to an update. If the application that is reading/writing the file expects the objects in the file to remain in a certain order, everything following that object's representation in the file may need to be shifted backward to make room if the object grows, or forward to fill in the space left over if the object shrinks. If the file is large, this could result in a", "attempt is made to create too many files with the same first six letters. Also, one is more likely to encounter issues creating files or folders in the root directory, since FAT12 and FAT16 only allocate space for 512 root directory entries on hard disks. Since long filenames use more than one directory entry, this problem may occur with fewer than 512 files or folders in the root directory. There is space only for 25 long filenames of maximum length (512/20). This problem does not exist for FAT32 volumes.\nThe long filename system allows a maximum length of 255 UCS-2", "number of bytes, is the minimum unit of storage that is read from and written to a disk by a disk driver. The earliest disk drives had fixed block sizes (e.g. the IBM 350 disk storage unit (of the late 1950s) block size was 100 6 bit characters) but starting with the 1301 IBM marketed subsystems that featured variable block sizes: a particular track could have blocks of different sizes. The disk subsystems on the IBM System/360 expanded this concept in the form of Count Key Data (CKD) and later Extended Count Key Data (ECKD); however the use of variable", "the format has to be converted from filesystem to filesystem. While this is also true to an extent with filename extensions—for instance, for compatibility with MS-DOS's three character limit—most forms of storage have a roughly equivalent definition of a file's data and name, but may have varying or no representation of further metadata.\nNote that zip files or archive files solve the problem of handling metadata. A utility program collects multiple files together along with metadata about each file and the folders/directories they came from all within one new file (e.g. a zip file with extension .zip). The new file is", "index file contains pointers to each unexpunged message in the message data files, along with flags, size, and IMAP internaldate data. The status file contains per-message flags and keywords.\nAll these files may be hidden files in a directory (with the directory name being the name of the mailbox). Thus a directory\nwith gigabytes of mail in it may appear to be empty if examined with tools that don't show hidden files. This is a common source of confusion for system administrators encountering MIX for the first time.\nBy design, it is possible to recover the mailbox into a usable state if", "many file formats are the Rich Text Format, Microsoft Word, Microsoft Excel, Microsoft Works, and many more.\nAnother consequence of the data-object soup is that objects can extend built-in applications such as the address book so seamlessly that Newton users can sometimes not distinguish which program or add-on object is responsible for the various features on their own system, because the advanced nature of Newton devices makes it easy to accept such add-ons. A user rebuilding their system after extended usage might find themselves unable to manually restore their system to the same functionality because some long-forgotten downloaded extension was missing.", "Unlike other operating systems, the file naming hierarchy is independent of the location of a file on a particular tape or disk volume. In days where there was more need for offline storage, this made it easy to keep track of files regardless of their location, and to move files between locations without renaming them. As well as files, the Catalogue keeps track of users and user groups, volumes, devices, network connections, and many other resources. Metadata for files can be held in an object called a File Description. The Catalogue was probably the first example of what would later", "storage. A given value uses only as many bytes as needed. For example, in another record of the same file, JOHN JONES (10 bytes) may be replaced by MARJORIE Q. HUMPERDINK (21 bytes) yet each name uses only as much storage as it needs, plus one for the field mark.\nFields may be broken down into values and even subvalues. Values are separated by value marks (character xFD); subvalues are separated by subvalue marks (character xFC). Thus, if John Jones happened to get a second email address, the record may be updated to:\n123-45-6789^JOHN JONES^jjones@example.com]johnnyjones@example.net^432100^...\n\nwhere the close bracket (]) represents a value", "Data file Data file categories Closed data file formats, frequently referred to as proprietary format files, have their metadata data elements hidden, obscured or unavailable to users of the file. Application developers do this to discourage users from tampering with or corrupting the data files or importing the data into a competitor's application.\nOpen data format files have their internal structures available to users of the file through a process of metadata publishing. Metadata publishing implies that the structure and semantics of all the possible data elements within a file are available to users.\nExamples of open data files include", "might be \"cat\" or \"olive\" or \"42\". It can be an arbitrary sequence of bytes of arbitrary length. Data (called a value in this parlance) does not need to be a fixed size and also can be an arbitrary sequence of bytes of arbitrary length. One stores data by presenting the key and data (value) to the data store and can later retrieve the data by presenting the key. This concept is seen in programming languages. Python calls them dictionaries, Perl calls them hashes, Java and C++ call them maps, etc. Several data stores also implement key-value stores such as", "are stored alongside in separate items.\nWithin each directory, directory entries appear as directory items, whose right-hand key values are a CRC32C hash of their filename. Their data is a location key, or the key of the inode item it points to. Directory items together can thus act as an index for path-to-inode lookups, but are not used for iteration because they are sorted by their hash, effectively randomly permuting them. This means user applications iterating over and opening files in a large directory would thus generate many more disk seeks between non-adjacent files—a notable performance drain in", "system on which the deleted file was stored. Some file systems, such as HFS, cannot provide an undeletion feature because no information about the deleted file is retained (except by additional software, which is not usually present). Some file systems, however, do not erase all traces of a deleted file, including FAT file systems: NTFS file systems NTFS stores file information as a set of fixed-size records (typically, 1KB) within the so-called Master File Table (MFT). File name and file allocation information are encapsulated into these records, providing complete information about each specific file. When the system deletes a", "hardware and open source software.\nMany operating systems compute file size in mebibytes, but report the number as MB (megabytes). For example, all versions of the Microsoft Windows operating system show a file of 2²⁰ bytes as \"1.00 MB\" or \"1,024 KB\" in its file properties dialog and show a file of 10⁶ (1000000) bytes as 976 KB.\nAll versions of Apple's operating systems had the same behavior until 2009 with Mac OS X version 10.6, which instead uses megabytes for all file and disk sizes, so it reports a 10⁶ byte file as 1 MB.\nThe Ubuntu developer Canonical implemented an updated", "to the same directory. Disc structure The catalogue (file table) occupies the first two disc sectors: one for the names and directories of each file, and a matching sector holding the file locations, sizes and metadata. Eight bytes of each sector are used for each file. With a further eight bytes from each sector reserved for the 12-byte disc title and the volume information, the total number of files on the disc (irrespective of which directory each file is in) is limited to 31. In the interests of saving space, the most significant bit of the directory letter for a", "the file is allowed to have them.\nDatabase applications, for instance, may use sparse files. As with compressed files, the actual sizes of sparse files are not taken into account when determining quota limits. Volume Shadow Copy The Volume Shadow Copy Service (VSS) keeps historical versions of files and folders on NTFS volumes by copying old, newly overwritten data to shadow copy via copy-on-write technique. The user may later request an earlier version to be recovered. This also allows data backup programs to archive files currently in use by the file system. On heavily loaded systems, Microsoft recommends setting up a", "also contain other folders. These other folders are referred to as subfolders. Subfolders can contain still more files and folders and so on, thus building a tree-like structure in which one \"master folder\" (or \"root folder\" — the name varies from one operating system to another) can contain any number of levels of other folders and files. Folders can be named just as files can (except for the root folder, which often does not have a name). The use of folders makes it easier to organize files in a logical way.\nWhen a computer allows the use of folders, each file", "it was last accessed, the time the file's metadata was changed, or the time the file was last backed up. Other information can include the file's device type (e.g. block, character, socket, subdirectory, etc.), its owner user ID and group ID, its access permissions and other file attributes (e.g. whether the file is read-only, executable, etc.).\nA file system stores all the metadata associated with the file—including the file name, the length of the contents of a file, and the location of the file in the folder hierarchy—separate from the contents of the file.\nMost file systems store the names of all", "file is used as the locked (read-only) flag. Volume size Although physical disks are usually formatted as either 100 KB or 200 KB, DFS supports volume sizes up to 256 KB.\nThe largest DFS file size allowed is the volume size minus ½ KB for the catalogue, as file sizes are stored as an 18-bit quantity. File allocation The DFS does not support data fragmentation, meaning a file's data must be stored in a single run of consecutive sectors, but free space is prone to becoming fragmented. Random-access file writes fail when the end of the file reaches the beginning", "Write Anywhere File Layout Design WAFL stores metadata, as well as data, in files; metadata, such as inodes and block maps indicating which blocks in the volume are allocated, are not stored in fixed locations in the file system. The top-level file in a volume is the inode file, which contains the inodes for all other files; the inode for the inode file itself, called the root inode, is stored in a block with a fixed location. An inode for a sufficiently small file contains the file's contents; otherwise, it contains a list of pointers to file data blocks", "volume within a container volume. The container volume is first formatted by filling it with encrypted random data, and then initializing a filesystem on it. The user then fills some of the filesystem with legitimate, but plausible-looking decoy files that the user would seem to have an incentive to hide. Next, a new encrypted volume (the hidden volume) is allocated within the free space of the container filesystem which will be used for data the user actually wants to hide. Since an adversary cannot differentiate between encrypted data and the random data used to initialize the outer volume, this inner", "directory metadata, directory entries, or symbolic links. Every dataspace in a file system has a unique handle. Any client or server can look up which server holds the dataspace based on the handle. A dataspace has two components: a bytestream and a set of key/value pairs. The bytestream is an ordered sequence of bytes, typically used to hold file data, and the key/value pairs are typically used to hold metadata. The object-based design has become typical of many distributed file systems including Lustre, Panasas, and pNFS. Separation of data and metadata PVFS is designed so that a client", "of 4 bytes (2 integers representing the address and length of the save). However, since one of the holes was at the very end of the buffer, it could safely be omitted from the save, keeping the entire package inside of 8 kB (with 4 bytes to spare), which avoided the file taking another 256 byte block just for those 4 bytes of metadata. Under ProDOS the metadata is stored in the directory entry, so is not even an issue.\nVarious prefixes and suffices (such as \"PIC\", \"HPIC\", or \"HGR\") were used to indicate that the file was a graphics screen" ]
Do caterpillars know they they are going to become butterflies? Or do they just get in a cocoon thinking, what the fuck am I doing?
[ "You're giving them too much credit. When you get to insects that small, and insects in general, scientist aren't even sure they're capable of abstract thought like that, they're closer to biological machine, who just do what they do on instinct alone, their brains aren't really complicated enough to make it seem credible that they can think like we can.\n\nAlso, whoever commented bfore me, I'm pretty sure you've been shadow banned.", "The caterpillar, if not entirely, then almost entirely dies. It has been controversially suggested by respected scientists that caterpillars and butterflies are two separate species that have become a chimera - a hybrid of the two. [Source](_URL_0_)", "WHERE DID YOU LEARN THAT KIND OF LANGUAGE YOUNG MAN!? Go to your time out corner this instant. And no, a caterpillar probably doesn't know it's going to turn into a butterfly. It likely gets into the cocoon for the same reason people go to sleep during the night: because it's body is telling it to do it." ]
[ "pratensis.\nThe caterpillar may be parasitized by other insects, particularly by Tachinidae species (especially Bithia demotica and Bithia proletaria, Bithia glirina and Leskia aurea).\nMales are attracted by certain molecules, some of which also attract other species of butterflies (Tineidae et Choreutidae).", "transformed into a butterfly and flies into the sky effortlessly. She has found the real answer to the feeling that there must be more to life than eating leaves, and who caterpillars really are. She is waiting for the disillusioned Stripe as he descends the pillar and eventually reaches the ground again. She shows Stripe her empty cocoon, and he eventually realizes what he needs to do. Stripe makes a cocoon of his own. Yellow waits for him. Stripe emerges transformed into a butterfly, and they fly off together. Musical adaptations A two-act musical", "parents were. Thus the butterfly lays an egg, which egg can become a caterpillar, which caterpillar can become a chrysalis, which chrysalis can become a butterfly; and though I freely grant that the machines cannot be said to have more than the germ of a true reproductive system at present, have we not just seen that they have only recently obtained the germs of a mouth and stomach? And may not some stride be made in the direction of true reproduction which shall be as great as that which has been recently taken in the direction of true feeding?\n“It", "caterpillar species of Phengaris, such as P. rebeli and P. alcon, will secrete pheromones that are specific to their respective hosts. The purpose of such behaviour is to mimic the pheromones of ant larvae that will become workers in the future. By successfully mimicking ant larvae, the caterpillars are taken back to the host nest and fed by the ants. Originally it was thought that the large blue butterfly behaved differently in that some believed it either secreted a poor pheromone mimic, or did not secrete one at all. Today it has been determined that it still secretes semiochemicals as", "the caterpillars are ready to pupate they spin loose cocoons in plant litter near their host plant.", "caterpillars lack the camouflage of their immature state. Instead, when threatened by a bird or other predator, they produce a forked, orange-coloured organ known as an osmeterium. The organ emits a strong smell which acts as a discouragement to the predator. The larvae are sometimes known as 'orange dogs'. Pupa The caterpillars attach themselves to branches with silk, transforming into pupae. They remain in the pupal form for two to three weeks before emerging as adults. Adult Adult butterflies have black and yellow markings with red and blue eyespots. Female butterflies tend to be larger than males. Natural enemies As", "by diffraction and interference of light by microscopic repeating structures forming a diffraction grating in the wing scales. The caterpillars are green with yellow markings along the back. Like other members of the family they are rather sluglike. Life cycle and behavior These butterflies can be found at the end of March, with flight time usually lasting until the end of June, but they are sometimes seen in July and early August. They never rest with their wings open, to maintain their green camouflage. The males exhibit territorial behavior.\nThe eggs are laid singly. The caterpillars are not known to be", "living caterpillars, inspiring A. E. Van Vogt's 1939 story \"Discord in Scarlet\", Robert Heinlein's 1951 novel The Puppet Masters, and Ridley Scott's 1979 film Alien. The eponymous Alien has a \"dramatic\" life-cycle. Giant eggs hatch into face-huggers that grasp the host's mouth, forcing him to swallow an embryo. It rapidly grows in his intestines, soon afterwards erupting from his chest and growing into a gigantic predatory animal resembling an insect. Guarino cites the parasitologist Michael J. Smout as saying that the \"massive changes\" are feasible, giving the example of flatworms that transform from an egg to a tadpole-like form to", "anything else. Unlike most butterflies this species lays as many as twenty or thirty eggs on one leaf, in parallel rows, with equal intervals, and the larvae continue in some measure gregarious to the last, so that a large number of pupae are often found, at a little distance from each other, on a wall, or the trunk of a tree.\"\nWhen born, they first make a meal of their eggshell and wander off to the nearest leaf-margin where they devour the leaf, side by side, and then move on to the next one. Leaf after leaf is collectively devoured by", "spaces. Egg These butterflies lay their eggs one by one on the underside of host plants. The eggs are very small, are pale green in color and shaped like dew drops. The eggs are laid so that the caterpillars may feed as soon as they hatch. Caterpillars These social caterpillars feed on Erythroxylum, Dalbergia, and Fabaceae, and may prefer to feed on new leaves of host plants since these new leaves are easier and more nutritious to eat. The caterpillars are red brown in color with bright green spots. They are covered with bristles that release an irritant upon contact.", "diapause (resting) stage, and the hatching may take place only in spring. Some temperate region butterflies, such as the Camberwell beauty, lay their eggs in the spring and have them hatch in the summer. Caterpillar larva Butterfly larvae, or caterpillars, consume plant leaves and spend practically all of their time searching for and eating food. Although most caterpillars are herbivorous, a few species are predators: Spalgis epius eats scale insects, while lycaenids such as Liphyra brassolis are myrmecophilous, eating ant larvae.\nSome larvae, especially those of the Lycaenidae, form mutual associations with ants. They communicate with the ants using vibrations that", "emerge, the caterpillar takes up position near the cocoons of the pupae, arches its back, and ceases to move or feed. It will occasionally spin silk over the pupae. However, when disturbed, it begins to thrash violently. No longer inclined to eat, the affected caterpillar eventually dies. It has been demonstrated in experimental research (Grosman, et al.) that this behavior is to strike at and repel possible predators of the pupae, such as the shield bug Supputius cincticeps, thus improving their survival odds. Only about one in twenty non-parasitized caterpillars responded in this fashion. In 60% of cases, the parasitized", "not enter the pods immediately after they hatch. During the first larval instars, caterpillars feed on leaves and it is not until the second or third instar that they enter the pods. The evolutionary benefits of this strategy are not understood. When caterpillars metamorphose into adult moths, they carry the alkaloids with them, which continue to protect them during the adult stage.\nPAs render the bella moth unpalatable to many of its natural enemies like spiders and insectivorous bats. Spiders that capture bella moth larvae or adults release them soon after, leaving them unharmed. In contrast, bella moth individuals grown on", "caterpillars of the butterfly family Lycaenidae (e.g., blues, coppers, or hairstreaks) are herded by the ants, led to feeding areas in the daytime, and brought inside the ants' nest at night. The caterpillars have a gland which secretes honeydew when the ants massage them. Some caterpillars produce vibrations and sounds that are perceived by the ants. A similar adaptation can be seen in Grizzled skipper butterflies that emit vibrations by expanding their wings in order to communicate with ants, which are natural predators of these butterflies. Other caterpillars have evolved from ant-loving to ant-eating: these myrmecophagous caterpillars secrete a pheromone", "they feed on both new and old foliage. The movement of the caterpillars is the main means of biological dispersal. They produce long, silky threads which can catch the wind when they drop from one branch to another. They produce loose webbing which forms a netting. In this cocoon, they pupate in July or August. Adults emerge and are active as late as November. The flightless females stay near the cocoons from which they emerged and mate straight away. Eggs are spherical and white and are laid in a mass which protects them through winter. Because the female is sedentary,", "Raphistemma species and Tylophora species (Asclepiadaceae). \nAfter about 14 days and five instars the caterpillars pupate, anchoring themselves to the stem or leaves the host plant. The pupa is light green with black dots. After about eight days the adult butterflies emerge.", "This mutualistic relationship benefits the adult butterfly by reducing the need for parental investment. Once the eggs hatch, the ants chaperone the larvae, averting the attacks of predatory organisms like wasps and spiders as well as parasites. In return, the ants receive a saccharine secretion fortified with amino acids from an eversible gland on the larvae’s back. As first instar larvae prepare to pupate, the ants carry the larvae into their nests. Once the larvae become pupae, the ants continue to provide protection against predation and parasitism. The butterfly leaves the nest when it emerges in June.", "of other butterflies, likely due to the thick chorion that has evolved to protect the overwintering egg from predators, parasitoids, and adverse environmental conditions. Around 75 eggs are produced per female. However, the eggshells are not consumed upon hatching, despite its high nutrient content. The eggs are generally laid on the underside of flower heads, leaves, sticks, stones, moss, clumps of dirt, and sometimes on the larval foodplant. The female may or may not oviposit on the foodplant itself, and may often lay her eggs over a meter away from the plant. The embryo develops into first instar larva within", "cyanogenic glycosides that make the butterfly unpalatable to its predators, which come from a mixture of storage from their hostplant and larval synthesis. The mimicry in D. iulia involves other butterfly species having evolved to look similar to the Julia butterfly in order to convey their presumed unpalatability. Egg Julia butterfly eggs tend to be a light yellow color when laid, which turns to a darker orange or brown shade before hatching. Each of the butterfly's eggs are separately laid onto new leaf tendrils of its host plant, usually the passionflower vine.\nThe egg of the butterfly measures about 1.2 mm in", "many caterpillars. They are distinguished by the thin yellow lines running across the body between segments. When maturity is reached, they pupate between two leaves, in a white cocoon made of silk.", "When the caterpillar is fully mature it spins a dark brown silken cocoon on a branch which usually has a leaf to protect it with. When spinning is complete, the caterpillar sheds its final skin and takes the form of its pupall life stage. Within a day of spinning completion, the cocoon sets to a hard waterproof shell with a rough exterior and a smooth interior wall. Air holes can be seen along the side of the cocoon indicating that the cocoon is probably otherwise airtight. The moth usually emerges from the cocoon the following year (in Spring or early", "(which produces volatile secretions that attract and alert attendant ants if a caterpillar is alarmed). However, larvae are also heavily preyed upon by another species of ant, Crematogaster aegyptiaca. This ant is very influential to the local distribution of the butterfly because in areas where it is found, no butterflies survive.\nLarval development takes about 21 days. On reaching full size, larvae descend to the bottom of the thyme plant and pupate. The pupae spend the whole autumn and winter in their cocoons, and when the temperature rises in late spring (during April to June), the adults emerge and males begin", "fertilization.\nMany if not all insect species, such as the ant Leptothorax acervorum, the moths Helicoverpa zea and Agrotis ipsilon, the bee Xylocopa varipuncta and the butterfly Edith's checkerspot release sex pheromones to attract a mate, and many lepidopterans (moths and butterflies) can detect a potential mate from as far away as 10 km (6.2 mi). Some insects, such as ghost moths, use pheromones during lek mating. Traps containing pheromones are used by farmers to detect and monitor insect populations in orchards. In addition, Colias eurytheme butterflies release pheromones, an olfactory cue important for mate selection.\nThe effect of Hz-2V virus infection on", "of her favorites, where butterflies would fly around her and a flower would eventually sprout.", "the predator gets only \"a mouthful of hindwing\" instead of an insect meal. In Poulton's words:\nEach hind wing in these [hairstreak] butterflies is furnished with a 'tail', which in certain species is long, thin, and apparently knobbed at the end. When the butterfly is resting on a flower the wings are closed and the hind wings are kept in constant motion ... This movement, together with their appearance, causes the 'tails' to bear the strongest likeness to the antennae of a butterfly; the real antennae being held [downwards] so as not to attract attention. Close to the base of the", "in a caterpillar originates, in part, from the following of pheromones left by other caterpillars. Each caterpillar secrets marker pheromones secreted from glands by the spinnerets, no other regions of the body have been shown to secrete pheromones. Experiments have shown that caterpillars are capable of following trails prepared with gland extracts, but such trails were markedly less effective than originally-intact control trails. Also, caterpillars display a preference for silk-like trails. When presented with a variety of pheromone-trail mediums, from nonporous steel, to cotton, to the original trail, experimental caterpillars preferred the original silk trail. Interactions with humans Ugly-nest caterpillars", "Myrmica is essential for the caterpillar survival, female butterflies must lay eggs in areas where the larvae can be found by ant workers of the correct species. In the past it was unclear if Phengaris butterflies were capable of identifying areas of specific Myrmica species. It was believed that the certain species of Phengaris could detect specific odours to identify Myrmica species. It was also thought that certain species of Phengaris were capable of avoiding overcrowding on food plants by detecting high egg loads. New studies indicate that female egg laying is merely attuned to the Myrmica species, and that", "is known as the larval exuvia. Chrysalis or pupa A cocoon is a casing spun of silk by many moth caterpillars, and numerous other holometabolous insect larvae as a protective covering for the pupa. Most Lepidoptera larvae will either make a cocoon and pupate inside them or will pupate in a cell under the ground, with the exception of butterflies and advanced moths such as noctuids, whose pupae are exposed. The pupae of moths are usually brown and smooth whereas butterfly pupae are often colourful and their shape varies greatly. In butterflies, the exposed pupa is often referred to as", "immobile non-feeding stage of development between larva and adult, and pupating is when many internal changes occur in the pupa stage) and remain in their chrysalis until the following spring. Some caterpillars hibernate in their chrysalids, and they can remain dormant for up to two years. Before the females can lay the eggs however, they must mate with a male. The male butterflies patrol in tree canopies looking for any receptive females. Development The adult emergence of this species is commonly triggered by rainfall. Their primary flight sequences frequently begin in late April to mid-June; however, some adults fly in", "displays. Scientists were unsure of why this phenomenon didn’t occur in the lab, but laboratory raised larvae were usually reared on commercially available food which lacks PAs. The authors suggest that the PAs are used by the males to attract other moths by releasing the volatile PA hydroxydanaidal into the air. It is suggested in this study that this strategy of mate attraction came about by tapping into the PA affinity already programmed into the moths for feeding, which is further supported by the observation that E. acrea females release their pheromones a little bit later in the evening than" ]
Why do a majority of films that have action scenes usually have the action extremely loud and have all the talking quiet?
[ "Most films are made with the movie theater in mind, or high-end home theaters. Those are usually multi-speaker setups, with a center speaker containing most of the dialog (not all), the other speakers doing sound effects, music and and ambiance, and a big ol' subwoofer (or two) for rumbling bass.\n\nSo when that movie is in the theater, there's plenty of dynamic range (i.e. loud parts are loud, quiet parts are quiet). It sounds great. When the Joker is telling Harvey Dent about chaos, it's quieter than when the hospital blows up. But when that hospital goes kablooey, it fills up the theater with big, loud, wonderful booming sounds.\n\nBut it all comes out crystal clear, because the speakers are designed to do such things. The louder stuff is *that much more powerful* because your ears have the quieter stuff to compare it to.\n\nBut then...\n\nTake that same multi-channel audio track, and push it through a pair of built-in TV speakers that *at most* have 5-10 watts.\n\nHere's what's going on:\n\n1. Your six-plus speaker setup is now only two speakers. Your setup now has to figure where to shoehorn everything.\n2. Those speakers are a lot less powerful.\n3. Built-in TV speakers aren't exactly powerhouses of rumbling bass.\n\nSo you wind up with overall weaker sound. You turn up the volume because you can't understand what Batman is whispering about. Then suddenly something blows up and you go rushing for your TV remote before the neighbors come pounding on your door.\n\nUnless you have a nice surround-sound setup at home, you've been there. I know I have.\n\nSometimes on DVDs and Blu-Rays, you can go to the \"setup\" menu and you see the production company has been gracious enough to provide you with a 2.0 option (this means two speakers, no subwoofers). Use that if you can.\n\nOtherwise, check your TV menu. Some televisions have some sort of built-in audio compression to lessen the disparity between loud parts and quiet parts.", "Action scenes (explosions, revving engines, guns) are, in fact, a lot louder than speech. \nWe're just used to most TV programs applying a generous level of dynamic compression so that speech is about the same volume as an explosion. So when a movie does it right it seems too loud.", "It is not so much the levels of the audio, but the capabilities of the system playing it back.\n\nI also have a suspicion most audio designers(for lack of a better label) wear headphones, because I wear them almost exclusively when watching something and I never have an audio problem when I do, but playing the same file back with speakers, and the problem sticks out.\n\nYou lose a lot of nuance/quiet detail when broadcasting a sound through larger gaps of open air. The quiet words will not carry as well unless your audio system is tuned just so. That doesn't matter so much with headphones because the speakers are right by your ears." ]
[ "Owen Gleiberman said, \"A Quiet Place is a tautly original genre-bending exercise, technically sleek and accomplished, with some vivid, scary moments, though it's a little too in love with the stoned logic of its own premise.\" Michael Phillips of the Chicago Tribune gave the film 2.5 out of 4 and said, \"My favorite moment, an encounter between Regan and one of the monsters in a cornfield, plays with sound and image and tension, creatively. Other bits are more shameless...I don't know if I'd call A Quiet Place enjoyable; it's more grueling than cathartic.\"\nAuthor Stephen King praised the film in a", "humorous situations. Because it relies predominately on visual depictions of events, it does not require sound. Accordingly, the subgenre was ideal for silent movies and was prevalent during that era. Popular silent stars of the slapstick genre include Buster Keaton, Charlie Chaplin, Roscoe Arbuckle, and Harold Lloyd. Some of these stars, as well as acts such as Laurel and Hardy and the Three Stooges, also found success incorporating slapstick comedy into sound films. Fish Out of Water In a fish out of water comedy, the main character or character finds himself in an unusual environment, which drives most of the", "station or the sounds of moving cars in quiet garages. In addition, the absence of sound also is of use, emphasizing extreme loneliness of the characters feelings. Camera shots, close-ups and proximity All sorts of camera shots are used in the film. Some of which include extreme long shots, medium long shots, full-body shots, close-ups, medium close-up, and so on. An example of a close-up shot used in the film could be the main character’s spontaneous yells while driving. By this, would emphasize pure happiness and freedom that he had not felt in a long time. Premiere For the film's", "and possibly shout things at the actors to get them in the mood. Leone cared more for visuals than dialogue (his English was limited, at best). Given the technical limitations of the time, it would have been difficult to record the sound cleanly in most of the extremely wide shots Leone frequently used. Also, it was standard practice in Italian films at this time to shoot silently and post-dub. Whatever the actual reason, all dialogue in the film was recorded in post-production.\nLeone was unable to find an actual cemetery for the Sad Hill shootout scene, so the Spanish pyrotechnics chief", "synchronized sounds (e.g., the sound of rolling dice on a game board) could be recorded; the sounds were amplified in post-production. A traditional musical score was also added, which Krasinski justified in wanting audiences to remain familiar with watching a mainstream film, and not feel like part of a \"silence experiment.\"\nSupervising sound editors Erik Aadahl and Ethan Van der Ryn worked on A Quiet Place. For scenes from the perspective of the deaf daughter, sound was removed to put greater focus on the visual. They also advised on organizing shots to reflect the creatures' perspective, like showing them noticing a", "accurately clocked as For Viewers Who Liked A Quiet Place... the demographic they're really after would be something closer to Viewers Who Have Trouble Telling Similar Things Apart.\" Decider's Anna Menta compared the films, \"The Silence is much darker and gorier than A Quiet Place,\" and found The Silence to look low-budget in production values. Menta said The Silence was started before the invasion while A Quiet Place was set fully after the invasion. She noted the criticism of The Silence for having a hearing actor as a deaf character and highlighted its additional elements, a teen romance and a", "loud scenes, though IGN found volume irregularity between the loud scenes and the quiet scenes. IGN called the commentary \"a pretty straight-up behind-the-scenes take on the movie and a bit over-congratulatory\". It found the \"most fascinating\" featurette to be about visual effects, while deeming the other featurettes skippable.", "cinematography to keep the film interesting to the audience, especially given the mute nature of the protagonist; to this end, Flanagan used a Steadicam to follow Siegel's every move, along with a boom mic and a spotter, to make the movement more \"dynamic\". The resulting audio for these scenes could not be used and had to be redone in post, with Flanagan noting that the audio initially \"sounded like a herd of elephants.\"\nTo represent Maddie's world, various ambient sounds were used, such as the sound of ultrasound machines. Flanagan did not want to use pure silence for these scenes, as", "War was written and filmed in May 1929. Most of the film was shot at Hollenbeck Park in Los Angeles, while the soda fountain scene was shot at the Hal Roach studio. The song \"Runnin' Wild\" was featured over the opening credits for this film as well as They Go Boom.\nThe difficulties of filming on location during the early sound era were present during the making of Men O' War. Offscreen laughing from passersby present in Hollenbeck Park during filming can be heard, and the sound quality itself suffers from echoing and background noise.\nThis was James Finlayson's first sound film,", "improvised dialogue, swift scene changes and shots that went past the standard 180 degrees axis. Besides, the camera was not utilized to captivate the audience with a detailed narrative and extreme visuals but instead was used to play with the anticipations of the cinema. Classically, conventions highlighted tense control over the film making procedure. Besides, the New Wave intentionally shunned this. Movies were usually shot in public locations with invented dialogue and plots built on the fly. In several means, it appeared sloppy, but it also captured an enthusiasm and impulsiveness that no famous film could expect to equate. Moreover,", "while you took the scene. Real sound does not merely add to the images, it multiplies it.\" Regarding Rashomon, Kurosawa said, \"I like silent pictures and I always have... I wanted to restore some of this beauty. I thought of it, I remember in this way: one of the techniques of modern art is simplification, and that I must therefore simplify this film.\"\nAccordingly, there are only three settings in the film: Rashōmon gate, the woods, and the courtyard. The gate and the courtyard are very simply constructed and the woodland is real. This is partly due to the low budget", "News, who felt the film \"should never have been a talkie,\" elaborating that the dialogue episodes \"retard the action\" and \"are not well done.\" The Montana Standard noted that the film \"presents many thrills\" and was widely enjoyed by the audiences at the film's premiere in Butte. A critic of the Hartford Courant alternately felt that, \"as a talking picture, the film retains all the chill values of the play, with its eerie noises, screams, fright-fraught dialogue and general noise and excitement,\" but conceded that \"it decidedly is not the scary kind of mystery play that the average person would", "Picture was announced, many synthesizer artists submitted demo tapes to Paramount. Ramsay and Wise consulted and decided that the film should have a unique audio style; they were particularly concerned to avoid sounds that had become pervasive and cliché from repetitive use in other science-fiction movies. Events such as Enterprise bridge viewscreen activation were kept silent to provide a more comfortable atmosphere. In contrast, almost every action on the Klingon bridge made noise to reflect the aliens' harsh aesthetic. While much of the effects were created using digital synthesizers, acoustic recordings were used as well. The wormhole's sucking sounds were", "Voice's Nick Pinkerton said \"the action scenes are often too cluttered for legibility, and, curious to say of a movie made by a musician, the film has broad swaths without tempo\", and added that it has a homemade charm that he found \"curiously touching\".\nUSA Today's Scott Bowles was critical of the film, awarding it 1.5 stars out of 4. He said that the film is \"heavy on bloody kung fu action...and light on just about everything else\", that it \"doesn't have enough tension to be taken seriously, or enough laughs to be taken lightly\", and called it \"slick and hip\".", "Monagle said Krasinski, who had directed two previous films, was \"making an unusual pivot into a genre typically reserved for newcomers\", and considered it to be part of a movement toward horror films layered \"in storytelling, [with] character beats not typically found in a horror movie\". Tatiana Tenreyro, writing for Bustle, said while A Quiet Place was not a silent film, \"It is the first of its kind within the modern horror genre for how little spoken dialogue it actually has.\" She said the rare moments of spoken dialogue \"give depth to this horror movie, showing how the narrative defies", "of The New York Times stressed that \"there is virtually no music on the soundtrack of this tense, methodical thriller. Long passages are entirely wordless. In some of the most gripping sequences what you hear mostly is a suffocating silence.\" Skip Lievsay, the film's sound editor called this approach \"quite a remarkable experiment,\" and added that \"suspense thrillers in Hollywood are traditionally done almost entirely with music. The idea here was to remove the safety net that lets the audience feel like they know what's going to happen. I think it makes the movie much more suspenseful. You're not guided", "the film are either shallow in terms of setup, or they just pop them in as time fillers. There's nothing particularly coherent about this film that screams 'solid'.\"", "no dialogue or sound effects but instead played music, much like silents films from the early 20th century. The films run from 10 to 20 minutes in length and had many lengthy fight sequences. They were distributed largely over the internet where they gained popularity. Other early films included a series called Damn, Kid Gusto vs The Matrix, and US vs HK. After producing their earlier films, the group began to release films less frequently but increased the production level by using higher-quality cameras, adding more dialogue and incorporating more plot elements than before.", "with directors, including Ben Wheatley, about the possibility of producing television without speech. The directors had expressed doubts, Shearsmith explained, because the success of dialogue-free television comes down entirely to the visuals and filming. \"A Quiet Night In\" was inspired by an idea Shearsmith and Pemberton had discussed for Psychoville. The writers had considered omitting dialogue from a ten-minute section in an episode, or even from the whole episode. Pemberton explained that this was not possible as there were \"too many good jokes\" which they wanted to fit into the sequence. This episode, like \"A Quiet Night In\", dealt with", "Characters often talk at once or talk over each other's lines. One example of the dense soundtrack is the party scene, which includes dialogue over screams, gunfire and music. Except for the opening credits and the very end of the film, all of the music heard in the film is incidental. The sound engineer was Joseph de Bretagne. Music used in the film includes Mozart's Three German Dances, Monsigny's Le déserteur, Louis Byrec, Léon Garnier and Eugène Rimbault's En revenant de la revue, Strauss's Die Fledermaus, Saint-Saëns's Danse macabre, Chopin's Minute Waltz and Scotto's À Barbizon. The music was arranged", "with some improvisation of lines and actions, with Hawks giving the actors freedom to experiment as he did with his comedies more than his dramas. The film is noted for its rapid-fire repartee, using overlapping dialogue to make conversations sound more realistic, with one character speaking before another finishes. Although overlapping dialog is specified and cued in the 1928 play script by Hecht and MacArthur, Hawks told Peter Bogdanovich:\nI had noticed that when people talk, they talk over one another, especially people who talk fast or who are arguing or describing something. So we wrote the dialogue in a way", "religious cult.\nWriting for Comic Book Resources, Renaldo Matadeen contrasted The Silence from A Quiet Place, writing, \"There are quite a few plot threads which make it clear the Netflix movie is far from a rip-off and is, in fact, it's [sic] own thing.\" Matadeen said The Silence's deaf teenage girl can read lips and speak, \"After a while, you almost forget Ally is deaf, resulting in the film lacking some of the genuine tension of A Quiet Place. He found the creatures \"totally different\" as well as the times compared to the creature invasion. While both films have \"a somewhat", "and in articulate, it gets many unintentional laughs and might easily be mistaken for burlesque and parody.\nThe Monthly Film Bulletin called it:\nA thoroughly boring film which has absolutely nothing to justify its production. The story is weak, the settings are extremely monotonous, being almost entirely restricted to the interior of a house, and all the sound effects come from \"off stage\". In fact, this might well have been a photographed play, amateurishly produced. The cast are stiff and do little to bring to life the characters they play. Any semblance of good dialogue there might have been is lost by", "in which the audio drops out, creating a heightened sense of drama, as an example of how Barnet used \"aural flourishes\" in his storytelling. However, Nield also noted that the director, who had only made one sound film prior to By the Bluest of Seas, had not yet divorced himself from silent film techniques, such as the occasional use of intertitles and a reliance on facial expressions. Illustrating Barnet's skill as a visual storyteller, Nield pointed to the simplistic manner in which the opening scene is told, the \"rocking, ill-angled\" cinematography used to capture a storm, and the abstract conveyance", "one in the studio that lets us pick up smaller pieces, like idles, and then we have a dedicated stage at Sony Studios, and that's where we get both the motion capture and the audio – because we do all of the dialogue at the same time – for both gameplay and cinematics. It's big enough for us to set up and perform everything from rehearsals to the final performances, and that approach, which is basically the same as producing a major motion picture, is what makes the performances so fluid and realistic in our games. When we're in full", "of a second\". Close up shots were also incorporated, often when the residents of the mansion are frightened and trying to figure out where the mysterious noises are coming from, the camera \"zooms in\" on the actors faces, and when The Bat is creeping up to Dale Van Gorder in the secret room. Production background An early talkie, this film is the second film version of the 1920 hit Broadway play The Bat, written by Mary Roberts Rinehart and Avery Hopwood, based on Roberts 1908 book The Circular Staircase. The first film version of the play, The Bat (1926), was", "The Quiet Man, an action-adventure beat-em-up published by Square Enix which features full-motion video cutscenes.", "to do; clearly, neither are they. The suspense makes the 88-minute running time seem at least 20 minutes longer (in a good way), as laughs and horror balance on a knife edge.\"\n\nNorman Wilner also calls the film \"talky,\" but suggests the film has \"more circular conversations than might be strictly necessary, and a late plot twist that feels like Thomas just wants to complicate his thought experiment\", but praises Sullivan, Carrick, and Baessato equally: \"all three actors are solid and even if Ally Was Screaming occasionally feels like a short film that doesn’t know when to stop, I was", "of the country's leading directors, Mikio Naruse and Yasujirō Ozu, did not make their first sound films until 1935 and 1936, respectively. As late as 1938, over a third of all movies produced in Japan were shot without dialogue.\nThe enduring popularity of the silent medium in Japanese cinema owed in great part to the tradition of the benshi, a live narrator who performed as accompaniment to a film screening. As director Akira Kurosawa later described, the benshi \"not only recounted the plot of the films, they enhanced the emotional content by performing the voices and sound effects and providing evocative", "because Frankenheimer thought music and sound effects do not blend well. Sound engineer Mike Le Mare recorded all of the film's cars on a racetrack, mixing them later in post-production. \nFrankenheimer refused to film the gunfights in slow motion, believing onscreen violence should be depicted in real time. Mick Gould, the film's technical advisor and a former member of the Special Air Service, shared his experiences of weapon-handling and military tactics with the actors. The physical stunts were coordinated by Joe Dunne. Alternative endings Frankenheimer filmed two versions of the film's ending. In the first, Deirdre (McElhone) waits on the" ]
What exactly causes Mouth ulcers?
[ "Most are caused by unintentional damage such as biting. Recurring ones can be a sign of an underlying health issue. This may help\n_URL_0_" ]
[ "of oral ulceration. Mucous membrane pemphigoid, an autoimmune reaction to the epithelial basement membrane, causes desquamation/ulceration of the oral mucosa.\nNumerous aphthous ulcers could be indicative of an inflammatory autoimmune disease called Behçet's disease. This can later involve skin lesions and uveitis in the eyes. Vitamin C deficiency may lead to scurvy which impairs wound healing, which can contribute to ulcer formation. For a detailed discussion of the pathophysiology of aphthous stomatitis, see Aphthous stomatitis#Causes. Diagnostic approach Diagnosis of mouth ulcers usually consists of a medical history followed by an oral examination as well as examination of any other involved area.", "the mouth and sometimes only the mouth, sparing the skin. The different environmental conditions (saliva, thinner mucosa, trauma from teeth and food), mean that some cutaneous disorders which produce characteristic lesions on the skin produce only non specific lesions in the mouth. The vesicles and bullae of blistering mucocutaneous disorders progress quickly to ulceration in the mouth, because of moisture and trauma from food and teeth. The high bacterial load in the mouth means that ulcers may become secondarily infected. Cytotoxic drugs administered during chemotherapy target cells with fast turnovers such as malignant cells. However, the epithelia of the mouth", "(swelling) around the ulcer. Chronic trauma may produce an ulcer with a keratotic (white, thickened mucosa) margin. Malignant lesions may ulcerate either because the tumor infiltrates the mucosa from adjacent tissues, or because the lesion originates within the mucosa itself, and the disorganized growth leads to a break in the normal architecture of the lining tissues. Repeat episodes of mouth ulcers can be indicative of an immunodeficiency, signaling low levels of immunoglobulin in the oral mucous membranes. Chemotherapy, HIV, and mononucleosis are all causes of immunodeficiency/immunosuppression with which oral ulcers may become a common manifestation. Autoimmunity is also a cause", "trauma and ulceration are xerostomia (dry mouth – as saliva usually lubricates the mucous membrane and controls bacterial levels) and epithelial atrophy (thinning, e.g., after radiotherapy), making the lining more fragile and easily breached. Stomatitis is a general term meaning inflammation within the mouth, and often may be associated with ulceration.\nPathologically, the mouth represents a transition between the gastrointestinal tract and the skin, meaning that many gastrointestinal and cutaneous conditions can involve the mouth. Some conditions usually associated with the whole gastrointestinal tract may present only in the mouth, e.g., orofacial granulomatosis/oral Crohn's disease.\nSimilarly, cutaneous (skin) conditions can also involve", "a non specific term that refers to an ulcer of the mouth. The word is derived from the Greek word aphtha meaning \"eruption\" or \"ulcer\". The lesions of several other oral conditions are sometimes described as aphthae, including Bednar's aphthae (infected, traumatic ulcers on the hard palate in infants), oral candidiasis, and foot-and-mouth disease. When used without qualification, aphthae commonly refers to lesions of recurrent aphthous stomatitis. Since the word aphtha is often taken to be synonymous with ulcer, it has been suggested that the term \"aphthous ulcer\" is redundant, but it remains in common use. Stomatitis is also a", "Behçet's disease Skin and mucosa Nearly all people with Behçet's disease present with some form of painful ulcerations inside the mouth. They are a form of aphthous ulcers or non-scarring oral lesions. The oral lesions are similar to those found in inflammatory bowel disease and can be relapsing. Painful genital ulcerations usually develop around the anus, vulva, or scrotum and cause scarring in 75 percent of the patients. Additionally, patients may present with erythema nodosum, cutaneous pustular vasculitis, and lesions similar to pyoderma gangrenosum. Eyes Inflammatory eye disease can develop early in the disease course and lead to permanent vision", "Mouth ulcer Definition An ulcer (/ˈʌlsər/; from Latin ulcus, \"ulcer, sore\") is a break in the skin or mucous membrane with loss of surface tissue and the disintegration and necrosis of epithelial tissue. A mucosal ulcer is an ulcer which specifically occurs on a mucous membrane. An ulcer is a tissue defect which has penetrated the epithelial-connective tissue border, with its base at a deep level in the submucosa, or even within muscle or periosteum. An ulcer is a deeper breach of epithelium compared to an erosion or excoriation, and involves damage to both epithelium and lamina propria.\nAn erosion is", "if the tongue protrudes constantly from the mouth. Caliber persistent artery describes a common vascular anomaly where a main arterial branch extends into superficial submucosal tissues without a reduction of diameter. This commonly occurs in elderly people on the lip and may be associated with ulceration. Pathophysiology The exact pathogenesis is dependent upon the cause. Ulcers and erosions can be the result of a spectrum of conditions including those causing auto-immune epithelial damage, damage because of an immune defect (e.g., HIV, leukemia, infections e.g. herpes viruses) or nutritional disorders (e.g., vitamin deficiencies). Simple mechanisms which predispose the mouth to", "mouth and lips may manifest as erosions; however, such reactions usually do not produce frank ulceration. An example of one common allergen is Balsam of Peru. If individuals allergic to this substance have oral exposure they may experience stomatitis and cheilitis (inflammation, rash, or painful erosion of the lips, oropharyngeal mucosa, or angles of their mouth). Balsam of Peru is used in foods and drinks for flavoring, in perfumes and toiletries for fragrance, and in medicine and pharmaceutical items for healing properties. Other causes A wide range of other diseases may cause mouth ulcers. Hematological causes include anemia, hematinic", "Occasionally, the disease may spread by penetrating the underlying tissues to involve the liver and other organs.\nThe early lesions in the mouth are small, yellowish, circumscribed plaques on the mucosa. More velogenic strains can cause caseated abscessation of the oropharynx. Eventually these space occupying lesions obstruct the esophagus and trachea resulting in emaciation and asphyxiation.\nAlthough lesions are usually seen in the mouth and oropharynx in raptors, it can also affect other mucus membranes. Jessup reports one owl having eye lesions from infection spreading into the nasolacrimal duct. Bony involvement can occur after soft tissue destruction. The organism does not survive", "lesions.\nAssociated swelling may be from either local inflammation or lymphoedema (obstruction of local lymphatic vessels by the lesion). Skin lesions may be quite disfiguring for the sufferer, and a cause of much psychosocial pathology. Mouth The mouth is involved in about 30% of cases, and is the initial site in 15% of AIDS-related KS. In the mouth, the hard palate is most frequently affected, followed by the gums. Lesions in the mouth may be easily damaged by chewing and bleed or suffer secondary infection, and even interfere with eating or speaking. Gastrointestinal tract Involvement can be common in those with", "in other parts of the mouth on keratinized mucosal surfaces. The least common type is herpetiform ulceration, so named because the condition resembles primary herpetic gingivostomatitis. Herpetiform ulcers begin as small blisters (vesicles) which break down into 2-3mm sized ulcers. Herpetiform ulcers appear in \"crops\" sometimes hundreds in number, which can coalesce to form larger areas of ulceration. This subtype may cause extreme pain, heals with scarring and may recur frequently.\nThe exact cause of aphthous stomatitis is unknown, but there may be a genetic predisposition in some people. Other possible causes include hematinic deficiency (folate, vitamin B, iron), stopping smoking,", "conducted by the university of Oslo on recurrent aphthous ulcers, it was found that SLS has a denaturing effect on the oral mucin layer, with high affinity for proteins, thereby increasing epithelial permeability. In a double-blind cross-over study, a significantly higher frequency of aphthous ulcers was demonstrated when patients brushed with an SLS-containing versus a detergent-free toothpaste. Also patients with Oral Lichen Planus who avoided SLS-containing toothpaste benefited. Alteration of taste perception After using toothpaste, orange juice and other juices have an unpleasant taste. Sodium lauryl sulfate alters taste perception. It can break down phospholipids that inhibit taste receptors for", "for 5% of cases, where ulcers may be present on the genital mucosa in addition to mouth, healing is slower and pain is more severe. A more common method of classifying aphthous stomatitis is into three variants, distinguished by the size, number and location of the lesions, the healing time of individual ulcers and whether a scar is left after healing (see below). Minor aphthous ulceration This is the most common type of aphthous stomatitis, accounting for about 80–85% of all cases. This subtype is termed minor aphthous ulceration (MiAU), or minor recurrent aphthous stomatitis (MiRAS). The lesions themselves may", "Eosinophilic ulcer of the oral mucosa Causes It is often associated with trauma. However, other causes are suspected, such as drugs, inherent predisposition, immune reaction, or lymphoproliferative disorder. Differential Diagnosis Squamous Cell Carcinoma, Pyogenic granulomas, Lesions of a chronic granulomatous disease and Mesenchymal tumors Definition Traumatic eosinophilic granuloma of the tongue (TEGT) is a reactive condition that commonly occurs on the ventral tongue. Treatment When the lesion is excised, recurrence often occurs. Palliative care with nonsteroidal anti-inflammatory drugs (NSAIDs) may be used, and topical steroids can be curative. If the lesion does not respond to treatment, biopsy is required.", "be referred to as minor aphthae or minor aphthous ulcers. These lesions are generally less than 10 mm in diameter (usually about 2–3 mm), and affect non-keratinized mucosal surfaces (i.e. the labial and buccal mucosa, lateral borders of the tongue and the floor of the mouth). Usually several ulcers appear at the same time, but single ulcers are possible. Healing usually takes seven to ten days and leaves no scar. Between episodes of ulceration, there is usually an ulcer-free period of variable length. Major aphthous ulceration This subtype makes up about 10% of all cases of aphthous stomatitis. It is termed major", "at sites of healed lesions, and functional limitations secondary to scarring may occur. As examples, CP involving the ocular mucosa can lead to symblepharon, ankyloblepharon, and eventual blindness, and progressive laryngeal and tracheal involvement can result in asphyxiation. Oral disease Most commonly affecting the mouth, including the buccal mucosa, gingiva, tongue, vermillion lips, and palate. Desquamative gingivitis is the most frequent manifestation. The gingiva is erythematous, in which patients usually complaint of bleeding upon brushing. Rupturing of oral vesiculobullous lesions leave clean, noninflamed, painless erosions. The vermilion border of the lips is spared, which is typical in pemphigus. Hoarseness due", "This type of ulcer is especially dangerous and can result in perforation.\nThe location of the ulcer depends somewhat on the cause. Central ulcers are typically caused by trauma, dry eye, or exposure from facial nerve paralysis or exophthalmos. Ulcers in the inferior nasal cornea may be caused by foreign material trapped under the third eyelid. Entropion or distichiae may cause ulceration of the peripheral cornea. Immune-mediated eye disease can cause ulcers at the border of the cornea and sclera. Symptoms Corneal ulcers are painful due to nerve exposure, and can cause tearing, squinting, and pawing at the eye. There may", "protect the mucous membrane of the stomach from acids released during digestion. Ulcers can develop as a result of damage caused to the gastric mucosal barrier. Duodenal ulcers have been shown to develop in sites that are in direct contact with pepsin and acids. To prevent damage and protect the mucus epithelium, alkaline mucus secretions increase in the digestive system when food is being eaten.\nIn the cervix, alkaline mucus has been shown to possess bactericidal properties to protect the cervix, uterus, peritoneal cavity, and vagina from microbes.", "Islands. Risks of licking an eyeball The practice is associated with significant health risks, as tongues are coated with a film of microorganisms, which may cause infections in the eye, such as conjunctivitis, herpes and chlamydia. It also carries the risk of corneal abrasion and corneal ulcers. Oral bacteria on the tongue can potentially enter corneal scratches caused by licking the eye, which then lead to infection.\nFurthermore, there is also the risk of blindness from the resulting infections, as well as styes. The difference in bacteria between the eye and mouth is why it is no longer recommended to lick", "ulcers. Perianal candidiasis can cause anal itching; the lesion can be red, papular, or ulcerative in appearance, and it is not considered to be a sexually transmissible disease. Abnormal proliferation of the candida in the gut may lead to dysbiosis. While it is not yet clear, this alteration may be the source of symptoms generally described as the irritable bowel syndrome, and other gastrointestinal diseases. Causes Candida yeasts are generally present in healthy humans, frequently part of the human body's normal oral and intestinal flora, and particularly on the skin; however, their growth is normally limited by the human immune", "stress, menstruation, trauma, food allergies or hypersensitivity to sodium lauryl sulphate (found in many brands of toothpaste). Aphthous stomatitis has no clinically detectable signs or symptoms outside the mouth, but the recurrent ulceration can cause much discomfort to sufferers. Treatment is aimed at reducing the pain and swelling and speeding healing, and may involve systemic or topical steroids, analgesics (pain killers), antiseptics, anti-inflammatories or barrier pastes to protect the raw area(s). Drug-induced Many drugs can cause mouth ulcers as a side effect. Common examples are alendronate (a bisphosphonate, commonly prescribed for osteoporosis), cytotoxic drugs (e.g. methotrexate, i.e. chemotherapy), non-steroidal anti-inflammatory", "mixed inflammatory infiltrate composed of lymphocytes, histiocytes and polymorphonuclear leukocytes. The epithelium on the margins of the ulcer shows spongiosis and there are many mononuclear cells in the basal third. There are also lymphocytes and histiocytes in the connective tissue surrounding deeper blood vessels near to the ulcer, described histologically as \"perivascular cuffing\". Classification Aphthous stomatitis has been classified as a type of non-infectious stomatitis (inflammation of the mouth). One classification distinguishes \"common simple aphthae\", accounting for 95% of cases, with 3–6 attacks per year, rapid healing, minimal pain and restriction of ulceration to the mouth; and \"complex aphthae\", accounting", "ulcer-causing bacterium H. pylori. Another possible mechanism for the development for peptic ulcer is increased histamine release and gastric hyperacidity related with polycythemia vera.\nA classic symptom of polycythemia vera (and the related myeloproliferative disease essential thrombocythemia) is erythromelalgia. This is a burning pain in the hands or feet, usually accompanied by a reddish or bluish coloration of the skin. Erythromelalgia is caused by an increased platelet count or increased platelet \"stickiness\" (aggregation), resulting in the formation of tiny blood clots in the vessels of the extremity; it responds rapidly to treatment with aspirin.\nPatients with polycythemia vera are prone to the", "Sparganosis Symptoms Clinical presentation of sparganosis most often occurs after the larvae have migrated to a subcutaneous location. The destination of the larvae is often a tissue or muscle in the chest, abdominal wall, extremities, or scrotum, although other sites include the eyes, brain, urinary tract, pleura, pericardium, and spinal canal. The early stages of disease in humans are often asymptomatic, but the spargana typically cause a painful inflammatory reaction in the tissues surrounding the subcutaneous site as they grow. Discrete subcutaneous nodules develop that may appear and disappear over a period of time. The nodules usually itch, swell, turn", "or the gingiva (gums). The soft palate or the fauces (back of the throat) may also be involved, the latter being part of the oropharynx rather than the oral cavity. Compared to minor aphthous ulceration, major aphthae tend to have an irregular outline. Herpetiform ulceration Herpetiform ulcers, (also termed stomatitis herpetiformis, or herpes-like ulcerations) is a subtype of aphthous stomatitis so named because the lesions resemble a primary infection with herpes simplex virus (primary herpetic gingivostomatitis). However, herpetiform ulceration is not caused by herpes viruses. As with all types of aphthous stomatitis, it is not contagious. Unlike true herpetic ulcers,", "because the mouth is coated in saliva, which washes away antigens and acts as a barrier. The oral mucosa is also more vascular (has a better blood supply) than skin, meaning that any antigens are more quickly removed from the area by the circulation. Finally, there is substantially less keratin in oral mucosa, meaning that there is less likelihood that haptens will form.\nAllergic contact stomatitis appears as non-specific inflammation, so it may be mistaken for chronic physical irritation. There may be burning or soreness of the mouth and ulceration. Chronic exposure to the allergen may result in a lichenoid lesion.", "in the case of the 3rd molars.\nPericoronal infection is normally caused by a mixture of bacterial species present in the mouth, such as Streptococci and particularly various anaerobic species. \nThis can result in abscess formation. Left untreated, the abscess can spontaneously drain into the mouth from beneath the operculum. In chronic pericoronitis, drainage may happen through an approximal sinus tract.\nThe chronically inflamed soft tissues around the tooth may give few if any symptoms. This can suddenly become symptomatic if new debris becomes trapped or if the host immune system becomes compromised and fails to keep the chronic infection in check", "begins affecting the body can vary from minutes to a few hours after the bite. At first, the venom will cause weakness as a consequence of the nerve transmission blocking. The first real symptoms of paralysis will be palpebral ptosis (drooping of the eyelids) and external ophthalmoplegia, which is also an eye movement disorder. The reason for this is that the ocular muscles are more susceptible, in comparison with other muscles, for the nerve transmission blocking. The next muscles affected are the facial and neck muscles followed by the respiratory muscles and the limbs after another few hours. By then,", "as a consequence of immunosuppressive therapy for other diseases generally have a remission after the dosages of the drugs used in their imunosuppressive treatment regimens are reduced. Most of these patients do not experience a relapse. Traumatic ulceration Most mouth ulcers that are not associated with recurrent aphthous stomatitis are caused by local trauma. The mucous membrane lining of the mouth is thinner than the skin, and easily damaged by mechanical, thermal (heat/cold), chemical, or electrical means, or by irradiation. Mechanical Common causes of oral ulceration include rubbing on sharp edges of teeth, fillings, crowns, false teeth (dentures), or braces" ]
Why does food (meat, cheese, bread, vegetables) taste different when sliced thin vs thick?
[ "I would guess it's because there's a greater surface area to volume ratio, so comparatively more of the food gets exposed to the air. The surface of the food will interact with oxygen in the air, affecting the flavor of whatever you are eating.", "In a nutshell, it's surface area. The more surface area there is, the more of the thing you're smelling is in the air." ]
[ "enjoyment of eating foods. Contrasts in textures, such as something crunchy in an otherwise smooth dish, may increase the appeal of eating it. Common examples include adding granola to yogurt, adding croutons to a salad or soup, and toasting bread to enhance its crunchiness for a smooth topping, such as jam or butter. Contrast in taste Another universal phenomenon regarding food is the appeal of contrast in taste and presentation. For example, such opposite flavors as sweetness and saltiness tend to go well together, as in kettle corn and nuts. Food preparation While many foods can be eaten raw, many", "occurs because of effects on taste buds that are mostly located in the tongue. Sometimes, only partial recovery of taste occurs. Common complaints are of food tasting too sweet or too bitter or of a continuous metallic taste. Complications Sores or ulcerations can become infected by virus, bacteria or fungus. Pain and loss of taste perception makes it more difficult to eat, which leads to weight loss. Ulcers may act as a site for local infection and a portal of entry for oral flora that, in some instances, may cause septicaemia (especially in immunosuppressed patients). Therefore, oral mucositis can be", "according to taste. Ingredients might be varied by regions due to their availability.", "vegetables, a Barolo will overwhelm the food; its tannins will react with the proteins on the tongue and sides of the mouth, accentuating the bitterness and drying the palate. In Piedmont, the wines are often paired with meat dishes, heavy pastas and rich risottos; the tannins bind to the food proteins and come across as softer.", "are detected by auditory receptors (cilia or hair cell receptors) in the ear. Different patterns of cilia movement lead to different neural codes, which ultimately lead to hearing different loudness, pitch, and timbre of sounds. Deafness or hearing loss may occur in one or both ears. Gustatory Taste receptors (i.e., taste buds or papillae) are activated by the presence of food or another object on the tongue. Four basic tastes include sweet, salty, sour, and bitter. There is some debate on whether umami, or meatiness, is a fifth basic flavor. Aging is associated with loss of intensity in taste. Complete", "taste that remains in the mouth after its soft and uniform centre has been enjoyed. It is an essential ingredient of tartiflette, a Savoyard gratin made from potatoes, bacon (lardons), and onions.\nIn 2002, 17.4 million kilograms of Reblochon were produced.", "to be higher in protein and lower in fibre and poisons than mature leaves. The 'sweet tooth' thus has an ancient evolutionary heritage, and while food processing has changed consumption patterns, human physiology remains largely unchanged. Sweetness modifiers A few substances alter the way sweet taste is perceived. One class of these inhibits the perception of sweet tastes, whether from sugars or from highly potent sweeteners. Commercially, the most important of these is lactisole, a compound produced by Domino Sugar. It is used in some jellies and other fruit preserves to bring out their fruit flavors by suppressing", "that these five tastes exist and are distinct from one another. Taste buds are able to differentiate among different tastes through detecting interaction with different molecules or ions. Sweet, umami, and bitter tastes are triggered by the binding of molecules to G protein-coupled receptors on the cell membranes of taste buds. Saltiness and sourness are perceived when alkali metal or hydrogen ions enter taste buds, respectively.\nThe basic tastes contribute only partially to the sensation and flavor of food in the mouth—other factors include smell, detected by the olfactory epithelium of the nose; texture, detected through a variety of mechanoreceptors, muscle", "Astringent (taste) Astringent is a taste that puckers the mouth, numbs the tongue, and constricts the throat. This taste is caused by astringents such as tannins. \nThe astringent taste is in unripened bananas, unripe persimmons and acorns dominantly, which prevents them from being eaten. It is also present in pomegranates, cranberries, crabapples, quinces as one among others, and in vegetables and beans as a secondary taste. It is also present in red meat, burnt and smoked food, and amla. Astringent foods are dry, cool, and heavy. \nSquirrels, wild boars, insects can eat astringent food as their tongues are able to", "man; and for that reason they eat it with great eagerness ... The flavor of its flesh is excellent, but changeable, according to the kind of food. If it eats cashew nuts, the flesh has an agreeable flavor of garlic; if 'bois des inde' it has a flavor of cloves and cinnamon; if on bitter fruits, it becomes bitter like gall. If it feeds on genips, the flesh becomes wholly black, but that does not prevent its having a very fine flavor. When it feeds on guavas it is at its best, and then the French commit great havoc among them.\nClark", "levels and make them taste more like chicken. Modern poultry, particularly mass-produced chicken and turkey, is particularly bland in taste, as animals are bred for large muscle mass that grows faster than naturally breeding fowl; trace chemicals in the meat that would give it a distinctive flavor would thus be dispersed through larger amounts of muscle with less time to accumulate, thus giving lower concentrations per ounce of meat and creating a more generic taste.\nAnother suggestion, made by Joe Staton of the Museum of Comparative Zoology, is that meat flavors are fixed based on the \"evolutionary origin\" of the animal.", "that are used for meat. The taste difference is usually attributed to low concentrations of the iron-containing protein myoglobin, a high concentration being more typical of vertebrates and tissues adapted for slow, sustained exertion. Myoglobin-rich meat is contrariwise often called red meat.", "is combined with the hearty and rich bacon broth. In some dishes this taste combination is accomplished by stewing meat for a long time together with vegetables and is then being served e.g. with caramelized potatoes or some sugar to add and adjust sweetness after the cooking process. Often the sweetness is also due to dried fruit such as plums or raisins which are not only used as a stuffing for poultry but can also be served as a side dish to grilled meats or fish or being featured in chicken or beef broth.", "swollen gums, and constipation.\nIn more systematic understandings, each medicine or food item has one of five flavors: sour, sweet, bitter, pungent (or \"acrid\"), and salty. Besides describing the taste of food, each of these \"flavors\" purportedly has specific effects on particular viscera. The sour flavor, for instance, has \"constriction and emollient effects\" and \"can emolliate the liver and control diarrhea and perspiration\", whereas \"bitter\" food can \"purge the heart 'fire', reduce excessive fluids, induce diarrhea, and reinforce the heart 'Yin'\". Scientific assessments There are few studies in English on the scientific validity of these beliefs and practices. A few studies", "bread are usually the strongest in sourdough flavour.\nLikely even more important are differences with respect to what is eaten on top of a Butterbrot or in a sandwich. Although exceptions exist, a Butterbrot is commonly not expanded the way sandwiches are. One slice of cheese and one or (in case of thin slices) maybe two slices of cold meat are commonly considered sufficient; adding lettuce, tomato, pickles, onions, mustard, mayonnaise etc. happens only following individual preferences. Also the ratio of bread and \"topping\" is relatively constant, thick fancy sandwich fillings have almost no equivalent for the Butterbrot.\nGerman speakers differentiate between", "Distinct types of taste receptor cells respectively detect substances that are sweet, bitter, salty, sour, spicy, or taste of umami. Umami receptor cells are the least understood and accordingly are the type most intensively under research. Mastication The tongue is an important accessory organ in the digestive system. The tongue is used for crushing food against the hard palate, during mastication and manipulation of food for softening prior to swallowing. The epithelium on the tongue’s upper, or dorsal surface is keratinised. Consequently, the tongue can grind against the hard palate without being itself damaged or irritated. Speech The intrinsic muscles", "life and other important factors, including sensory properties that appeal to consumers. Because foods are structurally complex, often a mixture of fluid and solids with varying properties within a single mass, the study of food rheology is more complicated than study in fields such as the rheology of polymers. However, food rheology is something we experience every day with our perception of food texture (see below) and basic concepts of food rheology well apply to polymers physics, oil flow etc. For this reason, examples of food rheology are didactically useful to explain the dynamics of other materials", "bite to it, there is quite some flavour with the browning. I know there is no fat in it so I didn't really know how juicy it would be, but there is quite some intense taste; it's close to meat, it's not that juicy, but the consistency is perfect. This is meat to me... It's really something to bite on and I think the look is quite similar.\nRützler added that even in a blind trial she would have taken the product for meat rather than a soya copy. Personal life Rützler is married to cultural scholar, playwright and journalist", "the food is spicy enough) but not so great for people who want relatively bland foods. The downside to the concept is that the flavors could easily get \"muddled\" by selecting the wrong combinations of components.\nA food writer for Forbes Magazine who was born in Malaysia and specializes in writing about Asian cuisine, gave the chain a mixed review. Although she thought the individual components had great flavor, she believed that it is a big mistake for ShopHouse to allow the individual components to be mixed together in a single bowl and suggests that the food would taste better if", "is perceived, they might actually eat less. \"We used to have foods that we chewed for 15, 20 or 30 times before we swallowed; it took more work to eat.\" Today she says \"There is rarely a food out there, outside of a sweet chewy candy, you have to chew more than 12 times and it is gone; so, you're in for the next hit to get more pleasure.\" She directed the radio audience to the value of the texture experience in food and the connection it has in the overall satisfaction of the consumer. In conclusion, she suggested", "that low concentrations of these fatty acids can create an overall better flavor in a food, much like how small uses of bitterness can make certain foods more rounded. However, a high concentration of fatty acids in certain foods is generally considered inedible. To demonstrate that individuals can distinguish fat taste from other tastes, the researchers separated volunteers into groups and had them try samples that also contained the other basic tastes. Volunteers were able to separate the taste of fatty acids into their own category, with some overlap with savory samples, which the researchers hypothesized was due to poor", "smaller portions. (Slicing hard cheese is considered improper by connoisseurs, since the cheese - when broken apart - has more surface area, and thus more air contact, which strengthens the apparent scent and taste of the cheese.) Santoku The Santoku has a straighter edge than a chef's knife, with a blunted sheepsfoot-tip blade and a thinner spine, particularly near the point. From 12 cm to 18 cm (5 to 7 inches) long, a Japanese Santoku is well-balanced, normally flat-ground, and generally lighter and thinner than its Western counterparts. This construction allows the knife to more easily slice thin-boned and boneless meats, fish,", "yet tasteless according to Murrill, who also noted \"this is one of the most difficult species to preserve, owing to its extremely juicy consistency\". In contrast, modern field guides suggest this species to be an excellent edible. The Polish Heritage Cookery book opines that in taste, only Boletus edulis surpasses it. When sauteed in butter, the flesh has been noted to have a lemony taste. However, field specimens covered with a white mold, Sepedonium ampullosporum, should not be consumed. Chemical reactions Chemical tests are sometimes used to rapidly distinguish between closely related or morphologically similar species of mushrooms, or, in", "Meat tenderness Tenderness is a quality of meat gauging how easily it is chewed or cut. Tenderness is a desirable quality, as tender meat is softer, easier to chew, and generally more palatable than harder meat. Consequently, tender cuts of meat typically command higher prices. The tenderness depends on a number of factors including the meat grain, the amount of connective tissue, and the amount of fat. Tenderness can be increased by a number of processing techniques, generally referred to as tenderizing or tenderization. Influencing factors Tenderness is perhaps the most important of all factors impacting meat eating quality, with", "so if soft, eat them. If the fruit is older the skin can be hard to cut in half until cooked. Spike to avoid them cracking during cooking if not cut in half. Unlike Zuchinni, it is not palatable half cooked, al-dente and must be cooked until it is soft. The fruit can be harvested at any stage. The young fruit is often harvested before it is ripe (about golf ball size or tennis ball size) due to its having a more delicate flavour and texture.\nIt is commonly served as a vegetable in South Africa, often boiled or baked. The", "been consumed historically due to their high sugar content and sweet taste, and a longer shelf-life from drying. Fruits may be used differently when dried. The plum becomes a prune, the grape a raisin. Figs and dates may be transformed into different products that can either be eaten as they are, used in recipes, or rehydrated.\nFreeze-dried vegetables are often found in food for backpackers, hunters, and the military. Garlic and onion are often dried. Edible mushrooms, as well as other fungi, are also sometimes dried for preservation purposes or to be used as seasonings. Preparation Home drying of vegetables, fruit", "bites into it, and texture are all factors that contribute to a person’s perception of food. In addition, culture provides a context to food. All these experiences put together can affect a person’s description of the food item.\nFlavor lexicons seek to provide an objective word bank for food. This streamlines the variations created by the different language ascribed to food.\nThe development of flavor language allows tasters to pinpoint descriptions about the food they taste. There are three major descriptive analysis techniques used by professional taste testers: Flavor Profile Method (FPM); Quantitative Descriptive Analysis (QDA); and the Spectrum method. Taste testing", "harder its crust get, making the taste of this product more pungent and striking.\nThere can be a formation of small white mold in its external part, but that does not affect the quality of the product. This problem can be solved by storing it in environments of low relative humidity. Usually this cheese is consumed accompanied by red wines, or it can also be used for cooking, especially in pizzas, lasagnas and other pastas. Features Description: mildly spicy, lactic-tasting, close dough, pale yellow colour. Produced without the use of dyes or preservatives.\nConsistency: hard or semi-hard outside. Soft, fairly creamy inside,", "the rind. By contrast, camembert is ripened as a small round cheese 10.2 cm (4 in) in diameter by 3.2 cm (1.26 in) thick and fully covered by rind. This ratio change between rind and paste makes camembert slightly stronger when compared to a brie ripened for the same amount of time. Once the rind is cut on camembert it typically has a more pungent aroma than brie. In terms of taste, camembert has a stronger, slightly sour, and sometimes chalky taste. The texture of camembert is softer than brie, and if warmed camembert will become creamier, whereas brie warms without losing as", "sourness, saltiness, bitterness, and umami. Scientific experiments have demonstrated that these five tastes exist and are distinct from one another. Taste buds are able to distinguish between different tastes through detecting interaction with different molecules or ions. Sweet, savory, and bitter tastes are triggered by the binding of molecules to G protein-coupled receptors on the cell membranes of taste buds. Saltiness and sourness are perceived when alkali metal or hydrogen ions enter taste buds, respectively.\nThe basic tastes contribute only partially to the sensation and flavor of food in the mouth—other factors include smell, detected by the olfactory epithelium of" ]
what is the real difference between a Prime Minister, President & a Premier of a country?
[ "Many parliamentary democracies are republics as well, although some still have monarchs as their head of state (i.e., not republics). That last thing -- *head of state* -- is a key term here. The other term that goes with it is the *head of government*.\n \nThe head of government heads the cabinet of ministers, and is often called the *prime* minister or simply the premier (the first/highest among the ministers, who heads the cabinet instead of a specific resort like foreign affairs, finance or the economy), but can also go by other titles, like chancellor. In some countries, like the US, this person is also the head of state in personal union. In others, like in most European countries, there is a distinct role as the head of state. Usually this is a president if it's a republic, or a monarch if not. If the role is distinct, it's usually mostly ceremonial, with some additional constitutional roles (e.g., some countries require the head of state to sign laws instead of the head of government, to have an additional safeguard). Queen Elisabeth II, for example, is the head of state of well over a dozen countries from all over the world, but not the head of government in any of them.\n\nSo, the important distinction here is between the head of state and the head of government, what they're called is just a matter of nomenclature and often rooted in tradition.", "In general the Prime Minister is the head of government, while the president is the head of state (or, in some countries, both).\n\nThe head of state is the person that's theoretically in charge - they're the source of all executive power in the country, and nothing can be done without their agreement.\n\nThe head of government is the person that organizes and runs everything - in the Westminster system they are typically from the lower house, and leads the cabinet (heads of department/ministers/whatevers, depending on country). They can appoint or dismiss ministers, and have a strong degree of influence over the how the government runs. They may be elected directly, or be the leader of the party that holds the most seats.\n\nThis is where countries differ - in some countries (notably the US), the head of state and head of government are the same person - the president. They have all the power, and the ability to use it.\n\n In other countries, these are different people, and they wield power equally. The first country that comes to mind is Russia, who has a president (Medvedev) and a Prime Minister (Putin). Theoretically, Putin organises the government, whereas Medvedev is the true leader. In practice, things may work a little differently.\n\nFinally, some countries (UK, Australia, Canada etc) have a separate head of state and head of government, but with only one wielding power. The head of state is usually a figurehead (Queen Elizabeth II), and their power is implemented through the head of government (Cameron, Gillard, Harper)." ]
[ "prime minister, is informally referred to as the \"Premier\".\nIn North Macedonia the head of the government is named premier (Macedonian премиер, premier), usually translated in English as prime minister.\nA premier will normally be a head of government, but is not usually the head of state. In presidential systems, the two roles are often combined into one, whereas in parliamentary systems of government the two are usually kept separate. \nAn example of nations that have separate roles for the premier/prime minister and the president are the Fifth French Republic, South Korea and China.\nIn the Soviet Union, the title of premier was", "\"First Minister\", \"Premier\", \"Chief Minister\", \"Chancellor\", \"Taoiseach\", \"Minister of State (Statsminister)\", \"President of the Government\", \"President of the Council of Minister\" and \"Secretary of State\": alternative titles usually equivalent in meaning to, or translated as, \"prime minister\".\nThis contrasts with the presidential system, in which the president (or equivalent) is both the head of state and the head of the government. In some presidential and all semi-presidential systems, such as those of France, Russia or South Korea, the prime minister is an official generally appointed by the president but usually approved by the legislature and responsible for carrying out the directives", "that, though, the president is a primus inter pares, having no power above and beyond the other six councillors. United Kingdom The term \"prime minister\" can be compared to \"primary minister\" or \"first minister\". Because of this, the prime ministers of many countries are traditionally considered to be \"first among equals\" – they are the chairman or \"head\" of a Cabinet rather than holding an office that is de jure superior to that of ministers.\nThe Prime Minister of the United Kingdom has frequently been described as \"first among equals\". In the UK, the executive is the Cabinet, and during", "differentiate between premier and prime minister and therefore federal prime ministers and provincial, state or colonial premiers are all called premier ministres.\nIn Cambodia, \"Premier\" means the \"Prime Minister\".\nIn the Czech Republic, \"Premiér\" means the \"Prime Minister\" and the Czech language translates both \"Premier\" and \"Prime Minister\" as \"Premiér\".\nIn Croatia, the head of government is officially called \"President of the Government\" (predsjednik vlade) but \"Premier\" (premijer) is colloquially used.\nIn Serbia, the head of government is officially called \"President of the Government\" (predsednik vlade) but \"Premier\" (premijer) is colloquially used.\nIn Italy, the President of the Council of Ministers, an office equivalent to", "President can be countered by the strong support/opposition of the parties. With a proportionally elected House, a President may strong-arm certain political issues.\nA Prime-Minister is never elected, but is a 'derivative' of the general election. In most cases, the power of the government is not split among different sections of the government (of President, Senate and House) and power is found with just the House. A Prime-Minister can be seen more as a manager than as a straight-out leader. Nations with district elections (such as the UK) and nations with proportionally elected representatives (such as Spain) can have a Prime-Minister.", "Premier Examples by country In many nations, \"premier\" is used interchangeably with \"prime minister\".\nIn the People's Republic of China, \"premier\" is more common and official, but \"prime minister\" is still used (see Premier of the People's Republic of China).\nIn five of the British overseas territories (Bermuda, the Cayman Islands, Montserrat, the Turks and Caicos Islands, and the British Virgin Islands), the elected heads of government are styled as \"Premier\". In other overseas territories the equivalent post is styled as Chief Minister.\n\"Premier\" is also the title of the heads of government in sub-national entities, such as the provinces and territories of", "Minister-president A minister-president or minister president is the head of government in a number of European countries or subnational governments with a parliamentary or semi-presidential system of government where they preside over the council of ministers. It is an alternative term for prime minister, premier, chief minister, or first minister and very similar to the title of president of the council of ministers. Terminology In English-speaking countries, similar institutions may be called premiers or first ministers (typically at the subnational level) or prime ministers (typically at the national level). The plural is sometimes formed by adding an s to minister", "or political group that has the majority in the National Assembly.\nThe prime minister has a secondary role in the executive branch, when he or she is from the same party as the president, as the head of the executive is constitutionally the President. However, when there is cohabitation (i.e., when the president is of one party while another party controls the National Assembly) the prime minister's importance is enhanced because the president has little power to be exercised by himself or herself alone. Requirements The constitution does not expressly outline any direct requirement for this position. The only litmus is", "minister would be appointed from a party different from the president's. In such a situations the prime minister would serve as the de facto head of government. In 2015, the nineteenth amendment restored certain degree of powers to the premiership.\nThe prime minister is the second in the order of precedence after the president and head of the cabinet of ministers. The prime minister would be a member of the constitutional council, national security council and the most senior member of the cabinet of ministers. Presidential succession As per the constitution, if the office of president becomes vacant, the prime minister", "President of the Council (Prime Minister) and Ministers. The President of Italy appoints the Prime Minister and, on his proposal, the Ministers that form its cabinet. The appointee is usually the leader of the majority coalition that won the election, but it can also be a new leader emerging from a post-election leadership challenge within the majority coalition, or a person instructed by the President to form a national unity government in times of political crisis, such as a coalition shift or a hung parliament. In any event, the government must receive the confidence of both Houses, so the Executive", "a republic, the head of state nowadays usually bears the title of President, but some have or had had other titles. Titles commonly used by monarchs are King/Queen or Emperor/Empress, but also many other; e.g., Grand Duke, Prince, Emir and Sultan.\nThough president and various monarchical titles are most commonly used for heads of state, in some nationalistic regimes, the leader adopts, formally or de facto, a unique style simply meaning \"leader\" in the national language, e.g., Germany's single national socialist party chief and combined head of state and government, Adolf Hitler, as the Führer between 1934 and 1945.\nIn 1959, when", "Third, the executive branch of government is led by the Prime Minister who must be able to command a majority in the House of Commons. The Cabinet of Ministers is appointed by the Prime Minister to lead the main departments of state, such as the Treasury, the Foreign Office, the Department of Health and the Department of Education. Officially the \"head of state\" is the monarch, but all prerogative power is exercised by the Prime Minister, subject to judicial review. Fourth, as the UK matured as a modern democracy, an extensive system of civil servants, and public service institutions developed", "British Prime Minister has to all intents and purposes turned, not into a British version of an American president, but into an authentically British president.\nThe thesis has been widely applied to the premiership of Tony Blair as many sources such as former ministers have suggested that decision-making was controlled by him and Gordon Brown, and the Cabinet was no longer used for decision-making. Former ministers such as Clare Short and Chris Smith have criticised the lack of decision-making power in Cabinet. When she resigned, Short denounced \"the centralisation of power into the hands of the Prime Minister and an increasingly", "been appointed by the President but not yet confirmed by the National Assembly is informally called as the acting Prime Minister. The term may also be applied to a Prime Minister that has resigned but in the interim remains in office in a caretaker role.\nThe Prime Minister is supported by two deputy prime ministers. The Prime Minister of South Korea sometimes holds some professional or technological knowledge whereas the President is always a sole politician.", "Canada, states of the Commonwealth of Australia, provinces of South Africa, the island of Nevis within the Federation of Saint Kitts and Nevis, and the nation of Niue. In some of these cases, the formal title remains \"Prime Minister\" but \"Premier\" is used to avoid confusion with the national leader. In these cases, care should be taken not to confuse the title of \"premier\" with \"prime minister\". In these countries, terms such as \"Federal Premier\", \"National Premier\" or \"Premier of the Dominion\" were sometimes used to refer to prime ministers, although these are now obsolete. The French language does not", "Prime Minister of the United Kingdom Authority The Prime Minister is the head of the United Kingdom government. As such, the modern Prime Minister leads the Cabinet (the Executive). In addition, the Prime Minister leads a major political party and generally commands a majority in the House of Commons (the lower House of the legislature). The incumbent wields both significant legislative and executive powers. Under the British system, there is a unity of powers rather than separation. In the House of Commons, the Prime Minister guides the law-making process with the goal of enacting the legislative agenda of their political", "Prime Minister of Croatia Name The official name of the office, literally translated, is \"President of the Government\" (Predsjednik Vlade), rather than \"Prime Minister\" (Prvi Ministar). When the office was first established in 1945, the name \"President of the Government\" was introduced. The name of the office was changed 8 years later with the Yugoslav constitutional reforms of 1953, into \"President of the Executive Council\" (Predsjednik Izvršnog vijeća). After another round of constitutional reforms in 1990, the office was renamed back to its original 1945-1953 title of \"President of the Government\". For all periods, however, the term \"Prime Minister\" is", "in 1976. The head of government is the Prime Minister, currently Keith Rowley. The President is elected by an Electoral college consisting of the full membership of both houses of Parliament.\nThe Prime Minister is elected following a general election which takes place every five years. The President is required to appoint the leader of the party who in his or her opinion has the most support of the members of the House of Representatives to this post; this has generally been the leader of the party which won the most seats in the previous election (except in the case of", "the executive branch of government is led by the Prime Minister who must be able to command a majority in the House of Commons. The Cabinet of Ministers is appointed by the Prime Minister to lead the main departments of state, such as the Treasury, the Foreign Office, the Department of Health and the Department of Education. Officially the \"head of state\" is the monarch, but all prerogative power is exercised by the Prime Minister, subject to judicial review. Fourth, as the UK matured as a modern democracy, an extensive system of civil servants, and public service institutions developed to", "position of prime minister, the UK's head of government, belongs to the person most likely to command the confidence of the House of Commons; this individual is typically the leader of the political party or coalition of parties that holds the largest number of seats in that chamber. The prime minister chooses a cabinet and its members are formally appointed by the monarch to form Her Majesty's Government. By convention, the monarch respects the prime minister's decisions of government.\nThe cabinet is traditionally drawn from members of the prime minister's party or coalition and mostly from the House of Commons but", "different from that of the president. When it arises, such a state of affairs is usually referred to as (political) cohabitation. Organisational structure The Prime Minister's executive office is usually called the Office of the Prime Minister in the case of the Canada and other Commonwealth countries, it is called Cabinet Office in United Kingdom. Some Prime Minister's office do include the role of Cabinet. In other countries, it is called the Prime Minister's Department or the Department of the Prime Minister and Cabinet as for Australia. In Israel, the Prime Minister's executive office is officially titled the \"Prime Minister's", "to the Chamber of Deputies or the Senate reports and statements on Government policy, to be debated. As head of the government, the Prime Minister is charged with directing the internal policy of the country and leads the public administration. In this regard, the government cooperates with other interested social actors.\nAs with any other office of public authority, the office of Prime Minister is incompatible with any other office, except that of deputy or senator and is also incompatible with a professional position in a commercial organization. The term of a Prime Minister ends with the individual's resignation, dismissal following", "state and the prime minister is the head of government. Power is separated among the legislative, executive and judicial branches of government, as defined by the Constitution, which serves as the country's supreme legal document.\nThe monarch officially retains executive power. But following the introduction of a parliamentary system of government, the duties of the monarch have since become strictly representative and ceremonial, such as the formal appointment and dismissal of the Prime Minister and other ministers in the executive government. Accordingly, the Monarch is commander-in-chief of the Norwegian Armed Forces, and serves as chief diplomatic official abroad and as a", "republican head of state is the president of Israel, which holds no reserve powers whatsoever. The least ceremonial powers held by the president are to appoint the prime minister, to approve the dissolution of the Knesset made by the prime minister, and to pardon criminals or to commute their sentence. Executive model Some parliamentary republics (like South Africa, Botswana and Myanmar) have fused the roles of the head of state with the head of government (like in a presidential system), while having the sole executive officer, often called a president, being dependent on the Parliament's confidence to rule (like in", "confirmed him in that position. Some reporters have suggested that in such circumstances, the term prime minister-presumptive would be more suitable than either \"in-waiting\" or \"designate\" since the prospects of accession are typically similar to that of a heir presumptive in a monarchy or a presumptive nominee in a United States presidential election.\nThe title \"Premier-designate\" often has the same meaning in governments that use the title \"Premier\" to describe a role equivalent to a Prime Minister. Constitutionally specified roles In Israel between 1996 and 2001 (when direct prime-ministerial elections were held) the role and duration of the Prime Minister-elect was", "second amendment to the Republican Constitution of 1972 much of the powers of the premiership was transferred to the executive presidency as head of government and head of the cabinet of ministers in addition to being the head of state. As a result, the Prime Minister became a senior most member cabinet of ministers and successor to the President. The prime minister would serve as the deputy to the president if both are from the same political party. In certain occasions, when the president is not from the majority party in parliament or a national government is formed, the prime", "Chief minister Meaning and role The title has a similar construction and role as a prime minister, first minister or minister-president but usually with a lower rank. The role has context within the Westminster system of government where a constitutional head of state (usually sub-national) is advised by ministers who usually head executive government departments (ministries). A chief minister is understood to be \"first among equals\". They would be the chief adviser to the nominal head of their state, the chair of cabinet and leader of the main governing political party in the legislature.", "indication of their respective roles.\nDuring the height of the Commission President's powers in the late-1980s and 1990s, the Commission President was sometimes referred to as the Europe's Prime Minister and the role of the President is similar to that of a national Prime Minister chairing a cabinet. The formulation of titles is not without precedent in Europe; for comparison, the title for the Prime Minister of Spain in Spanish is the Presidente del Gobierno (\"President of the Government\"), not Prime Minister. Roles Whilst distinct, each president is required to closely co-operate with one another in a complex political system. Under", "to appoint a prime minister, on the basis of the balance of power in the parliament. The appointed candidate is in turn required to seek confirmation from the parliament through a confidence vote, in order to receive a mandate to lead the Croatian Government (after given confidence by the absolute majority of the MPs, the President formally appoints the candidate as Prime Minister, while PM appoints ministers; all with the countersignature of the Speaker of the Croatian Parliament). The president may also call referenda, grant pardons and award decorations and other forms of recognition defined by legislation. Foreign affairs The", "Prime Minister of Italy Functions As the President of the Council of Ministers, the modern Prime Minister leads the Cabinet (the Council of Ministers). In addition, the Prime Minister often leads a major political party and is required by the Constitution to have the confidence of the majority of the voting members of the Parliament.\nIn addition to powers inherent in being a member of the Cabinet, the Prime Minister holds specific powers, most notably being able to nominate a list of Cabinet ministers to be appointed by the President of the Republic and the countersigning of all legislative instruments having" ]
Nolo contendere, or Plea of No Contest
[ "Normally, there are two possible pleas in court. Guilty or not guilty; \"I admit I did it, go ahead and punish me\" or \"I don't admit I did anything, prove me wrong\".\n\nIn some cases, you are allowed to take a plea of no contest. This plea is saying \"I don't admit I did it, but I'll let you go ahead and punish me anyway\". While the immediate effect is the same as a guilty plea, depending on your jurisdiction there may be some secondary benefits to *nolo contendere*. For instance, under US federal rules, a guilty plea can be taken as an admission of guilt in some later court case, while a no contest plea cannot be." ]
[ "Nolo contendere United States In the United States, State law determines whether, and under what circumstances, a defendant may plead no contest in state criminal cases. In federal court, the Federal Rules of Criminal Procedure only allow a nolo contendere plea to be entered with the court's consent; before accepting the plea, the court is required to \"consider the parties' views and the public interest in the effective administration of justice\". Residual effects A nolo contendere plea has the same immediate effects as a plea of guilty, but may have different residual effects or consequences in future actions. For instance,", "1A Gillespie Michigan Criminal Law & Procedure, § 16:15.\nA no contest plea prevents the court from eliciting a defendant's admission of guilt, but the result of the defendant's plea not to contest the charges against him or her is the same as if the defendant had admitted guilt. If a defendant pleads no contest to a charged offense, with the exception of questioning the defendant about his or her role in the charged offense, the court must proceed in the same manner as if the defendant had pleaded guilty. MCL 767.37. A plea of no contest to a felony offense", "a conviction arising from a nolo contendere plea is subject to any and all penalties, fines, and forfeitures of a conviction from a guilty plea in the same case, and can be considered as an aggravating factor in future criminal actions. However, unlike a guilty plea, a defendant in a nolo contendere plea may not be required to allocute the charges. This means that a nolo contendere conviction typically may not be used to establish either negligence per se, malice, or whether the acts were committed at all in later civil proceedings related to the same set of facts as", "individual to create an affray, that they had to fight by consent. Ochiltree dismissed this contention, noting that fighting by consent was not part of the offense, but fight in public was, although not all parties need consent to the fight to be involved. Even if the others were acquitted, the conviction against Hiram Saddler was affirmed.", "the challenge could include that it was frivolous, or that the challenger was not generally recognized as a \"gentleman\" since dueling was limited to persons of equal social station. However care had to be taken before declining a challenge, as it could result in accusations of cowardice or be perceived as an insult to the challenger's seconds if it was implied that they were acting on behalf of someone of low social standing. Participation in a duel could be honorably refused on account of a major difference in age between the parties and, to a lesser extent, in cases of", "No-contest clause No-contest clause in wills The Uniform Probate Code (UPC) §§ 2-517 and 3‑905 allow for no contest clauses so long as the person challenging the will doesn't have probable cause to do so. The full wording is:\nA provision in a will purporting to penalize an interested person for contesting the will or instituting other proceedings relating to the estate is unenforceable if probable cause exists for instituting proceedings.\n— UPC §§ 2-517 and 3‑905 \nThe UPC has been adopted in several smaller states, including Alaska, Idaho, Montana, and New Mexico, but also by Florida, one of the larger states", "requires the court's consent. MCR 6.301(B).\nA defendant's no contest plea to criminal charges does not estop that defendant from denying responsibility in a later civil action arising from the same conduct. Lichon, 435 Mich at 417. Texas In Texas, the right to appeal the results of a plea bargain taken from a plea of either nolo contendere or \"guilty\" is highly restricted. Defendants who have entered a plea of nolo contendere may only appeal the judgment of the court if the appeal is based on written pretrial motions ruled upon by the court. Virginia The Virginia Rules of Evidence differ", "court that the criminal defendant does not wish to contest the state's accusations and will acquiesce in the imposition of punishment.\" Lichon v American Universal Insurance Co., 435 Mich 408, 417 (1990). A nolo contendere plea may be appropriate \"where the defendant would not be able to supply a sufficient factual basis for a guilty plea because he or she was intoxicated on the night of the incident, where there is the possibility of future civil litigation resulting from the offense, or where a defendant cannot remember the events which led to his or her being charged with a crime\".", "595. The state Board of Pharmacy considers a plea of nolo contendere to be deemed a conviction with regard to issuing licenses for pharmacies, pharmacists and drug wholesalers.\nA nolo contendere plea to any felony is considered exactly equivalent to a guilty plea for the purposes of civil actions; this plea to any non-felony is not admissible to a civil action. Florida In Florida, the Supreme Court held in 2005 that no-contest convictions may be treated as prior convictions for the purposes of future sentencing. Michigan In Michigan, \"A nolo contendere plea does not admit guilt, it merely communicates to the", "from the parallel federal rules in that a nolo contendere plea entered in a criminal case is admissible in a related civil proceeding. Commonwealth In the Commonwealth countries—such as England and Wales, Canada, and Australia—the plea of nolo contendere is not permitted. The defendant must enter a plea of \"guilty\" or \"not guilty\". If a defendant refuses to enter a plea, the court will record a plea of \"not guilty\".", "cases. At the arraignment, the complaint or information is read out loud unless the defendant waives reading, and in a felony case the district attorney gives the defendant a copy of the information. The court then asks the defendant to submit a plea. The defendant may plead \"guilty\", \"no contest\", \"not guilty\", or \"not guilty by reason of mental disease or defect\". A plea of no contest has the same effect in a criminal case as a guilty plea, except it cannot be used as an admission of criminal action in a civil case. The defendant may not enter a", "against Ganley in civil court, accusing him of sexual assault and attempted rape. The lawsuit alleges that Ganley propositioned and groped the woman, whom he met at a Tea Party rally, when she approached him about volunteering for his campaign. She later amended the complaint to include employment discrimination, based on her claim that Ganley wouldn't give her a job because she refused his sexual advances. Ganley's attorney said that the charges amounted to extortion and that they were motivated by politics. The woman, a Republican Tea Party activist, sought more than $25,000 in damages. On March", "a message of, \"Guilt implies wrong-doing. I feel I have done no wrong. I may have violated some specific laws, but I am guilty of doing no wrong. I therefore plead not guilty.\" A plea of no contest is sometimes regarded as a compromise between the two. One defendant accused of illegally protesting nuclear power, when asked to enter his plea, stated, \"I plead for the beauty that surrounds us\"; this is known as a \"creative plea,\" and will usually be interpreted as a plea of not guilty.\nWhen the Committee for Non-Violent Action sponsored a protest in August 1957, at", "August 12, 2016, Cohen pleaded no contest to the felony charges against him due to poor health and lack of energy to contest the charges.", "the same.\nThe next morning, all assemble for the duel between Arsace and \"Eurimene\". Arsace is in a dilemma as he has solemnly sworn not to reveal Rosmira's identity but he cannot bring himself to fight a duel with a girl. Suddenly seized by an inspiration, he says that as the person who was challenged, he is allowed to decide how the duel will be fought - and demands they fight without their shirts on. \"Eurimene\" hesitates, but all the others tell \"him\", yes, that is correct, Arsace can say how the duel will be fought, so go on, take your", "Challenge (competition) A challenge is a request made to the holder of a competitive title for a match between champion and challenger, the winner of which will acquire or retain the title. In some cases the champion has the right to refuse a challenge; in others, this results in forfeiting the title. The challenge system derives from duelling and its code of honour. While many competitive sports use some form of tournament to determine champions, a challenge match is the normal way of deciding professional boxing titles and the World Chess Championship. Some racket sports clubs have a reigning", "Nolle prosequi Nolle prosequi, abbreviated nol or nolle pros, is legal Latin meaning \"to be unwilling to pursue\". In Commonwealth and US common law, it is used for prosecutors' declarations that they are voluntarily ending a criminal case before trial or before a verdict is rendered; it is a kind of motion to dismiss and contrasts with an involuntary dismissal. Application in United States law Nolle prosequi as a declaration is most often used in criminal cases, but in jurisdictions making use of nolle prosequi in civil lawsuits, it is used by a plaintiff that voluntarily drops its claims. In", "formed. Challenge The accused person can challenge and dismiss a juror for good cause. In addition to the unlimited number of challenge of juror for cause, the accused person is granted the power to challenge and dismiss up to 5 jurors without any reasons (peremptory challenge). However, the Secretary for Justice, who prosecutes the accused and initiates the criminal proceeding, also has the right to challenge and dismiss a juror for cause but no right to give pre-emptive challenge.\nIn the Donald Tsang case, a candidate juror (a man) applied for exemption (take care of baby after midnight). Initially the Judge", "case to be nolle prosse after a declaration or motion by the prosecution.\nIn criminal cases in the United States it has been held improper for a court to enter an order of nolle prosequi on its own, without a motion by the prosecutor, but as to sentencing discrepancies involved in a sentence recommendation, a trial judge is authorized to reject an underlying guilty plea based upon concerns of fairness and justice or because it is presented after the plea cutoff date. The notes to Rule 48 of the US Federal Rules of Criminal Procedure (FRCRP) draw attention to the effect", "and that the special prosecutor was out to get him because of a personal vendetta. Morrissey said he rejected a plea bargain for a single misdemeanor in December 2013. He vowed to fight the charges in court, declaring that he would be vindicated, and rejected calls to resign his House seat.\nMorrissey's case made national headlines in July 2014 when he used an obscenity on live television while reading a text message he claimed was planted on his phone by hackers. He entered into a plea agreement in which he made an Alford plea to one misdemeanor charge and received an", "give testimony against himself. ... \" To \"plead the Fifth\" is to refuse to answer any question because \"the implications of the question, in the setting in which it is asked\" lead a claimant to possess a \"reasonable cause to apprehend danger from a direct answer\", believing that \"a responsive answer to the question or an explanation of why it cannot be answered might be dangerous because injurious disclosure could result.\"\nHistorically, the legal protection against compelled self-incrimination was directly related to the question of torture for extracting information and confessions.\nThe legal shift away from widespread use of torture and forced confession", "the criminal prosecution.\nUnder the Federal Rules of Evidence, and in those states whose rules of evidence are similar or identical to them, nolo contendere pleas may not be used to defeat the hearsay prohibition if offered as an \"admission by [a] party-opponent\". Assuming the appropriate gravity of the charge, and all other things being equal, a guilty plea to the same charge would cause the reverse effect: An opponent at trial could introduce the plea, over a hearsay objection, as evidence to establish a certain fact. Alaska In Alaska, a criminal conviction based on a nolo contendere plea may be", "must be no break in the chain of causation. In R v Button the defendant falsely represented that he was not a good runner and so obtained a better handicap than he deserved for the race which he won. He was arrested as he attempted to collect the prize but the deception merely gave him the opportunity to run from an advantageous position, whereas the cause of the attempt to collect the prize was that he had won the race.\nThe deception must operate on a human mind for the causation element to be proved. The fact that a machine may", "whether he admitted or denied the plaintiff's facts (every averment not traversed being taken to be admitted), and any additional facts and legal defences on which he relied. The plaintiff might then reply, and the defendant rejoin, and so on until the pleaders had exhausted themselves. This system of pleading was not a bad one if accompanied by the right of either party to demur to his opponent's pleading, i.e. to say, \"admitting all your averments of fact to be true, you still have no cause of action\", or \"defence\" (as the case may be).\nIt may be, however, that the", "plea of no contest without approval from the court. If the defendant pleads guilty or no contest, the court sentences the defendant or places the defendant on probation. If the defendant pleads not guilty or not guilty by reason of mental disease or defect, the case proceeds to trial. Grand jury and John Doe proceedings Although the vast majority of criminal cases in Wisconsin are begun by a district attorney filing a criminal complaint, some cases are commenced as the result of a grand jury or John Doe investigation. Grand jury and John Doe investigations are secret proceedings for which", "the no-compete clause from the WWE. The show ended with El Patrón attacking Los Perros del Mal leader El Hijo del Perro Aguayo, after his win in the main event. In early September 2014, Rodríguez's lawyers had resolved his issues with WWE and he was no longer restricted by the 90-day no-compete clause. On September 14, Rodríguez, now billed as \"El Patrón Alberto\", made his AAA in-ring return teaming with Myzteziz and La Parka in a six-man tag team main event, where they defeated Aguayo, Averno and El Texano Jr. Alberto then began feuding with El Texano Jr. over the", "by Matthew Riddle. Clements lost the fight via arm-triangle choke in the third round. However, on October 20, 2012, it was revealed that Riddle has tested positive for a banned substance (Marijuana) and the result was overturned and changed to a No Contest.\nClements next fought Stephen Thompson on September 21, 2013 at UFC 165. He lost the fight via knockout in the second round.\nClements faced Vik Grujic on November 8, 2014 at UFC Fight Night 55. Clements won the fight via TKO in the first round.\nClements faced Nordine Taleb on April 25, 2015 at UFC 186 after Taleb's original opponent,", "Interlocutory appeal United States An appeal is described as interlocutory when it is made before all claims are resolved as to all parties. For instance, if a lawsuit contains claims for breach of contract, fraud and interference with contractual advantage, and if there are three defendants in this lawsuit, then until all three claims are resolved as to all three defendants, any appeal by any party will be considered interlocutory. The American courts disfavor such appeals, requiring parties to wait until all the claims as to all parties are resolved before any appeal can be brought to challenge any of", "plea bargaining. In the United Kingdom and Germany, guidelines state that only the timing of the guilty plea can affect the reduction in the punishment, with an earlier plea resulting in a greater reduction.\nIn the United States, a Nolo contendere (no contest) plea is when the defendant submits a plea that neither admits nor denies the offense. It has the same immediate effect of a guilty plea, in that the trial avoids determining the defendant's guilt. No plea entered A defendant who refuses to enter a plea is usually interpreted as giving a plea of not guilty; the Federal Rules", "used against the defendant in future civil actions. The Alaska Supreme Court ruled in 2006 that a \"conviction based on a no contest plea will collaterally estop the criminal defendant from denying any element in a subsequent civil action against him that was necessarily established by the conviction, as long as the prior conviction was for a serious criminal offense and the defendant in fact had the opportunity for a full and fair hearing\". California In California, a nolo contendere plea is known as a West plea after a seminal case involving plea bargains, People v. West (1970) 3 Cal.3d" ]
CFL bulb maximum wattage.
[ "1 watt isn't a big deal. 25 watts would create more heat than the fixture is designed for." ]
[ "watt light bulb at roughly 90% efficiency at a distance of 3 feet. On closer examination, this is a claim based on a graph presented on Page 35 of the above-mentioned MIT thesis, but the entire thesis contains no numbers stating the actual power drawn from the wall for different separations, except in the case of 7 feet separation, where it is stated that as per their estimates, not measurements, \"400 Watts\" were being drawn from the wall when powering the \"60 Watt\" bulb. It seems these numbers too were rounded up to the nearest 10 or 100 Watt, since", "charged tube; electricity passes through the tube to create a chemical reaction that yields light. This cooler source focuses almost all its energy on light production, itself.\nBenefits\nUse Less Energy: CFLs require 66 to 75 percent less electricity than the normal incandescent bulb.\nReduce Pollution and Energy Bill: Each reduced watt of power simultaneously reduces its complementary unit of pollution.\nLast Longer: CFLs stick around for 8,000 to 10,000 more hours than the common incandescent. This survival rate doesn't call for a bulb changin' for up to 7 years!\nLong Term Cost Benefits > Short Term Added Cost: Because CFLs are produced as a", "Compact fluorescent lamp A compact fluorescent lamp (CFL), also called compact fluorescent light, energy-saving light, and compact fluorescent tube, is a fluorescent lamp designed to replace an incandescent light bulb; some types fit into light fixtures designed for incandescent bulbs. The lamps use a tube which is curved or folded to fit into the space of an incandescent bulb, and a compact electronic ballast in the base of the lamp.\nCompared to general-service incandescent lamps giving the same amount of visible light, CFLs use one-fifth to one-third the electric power, and last eight to fifteen times longer. A CFL has a", "either to use \"reflector CFLs\" (R-CFL), cold-cathode CFLs or to replace such fixtures with those designed for CFLs. A CFL will thrive in areas that have good airflow, such as in a table lamp. Lifespan CFLs typically have a rated service life of 6000–15,000 hours, whereas standard incandescent lamps have a service life of 750 or 1000 hours. However, the actual lifetime of any lamp depends on many factors, including operating voltage, manufacturing defects, exposure to voltage spikes, mechanical shock, frequency of cycling on and off, lamp orientation, and ambient operating temperature, among other factors.\nThe life of a CFL is", "sconces in a dining area. Below the 20% limit, the lamp may remain at 20% or flicker or the starter circuitry may stop and restart. Above 80%, the bulb may operate at 100%. However, recent products have solved these problems so that they perform more like incandescent lamps. Dimmable CFLs are more expensive than standard CFLs due to the additional circuitry.\nCold-cathode CFLs can be dimmed to low levels, making them popular replacements for incandescent bulbs on dimmer circuits.\nWhen a CFL is dimmed, its color temperature (warmth) stays the same. This is counter to most other light sources (such as incandescents)", "draws only 7.5 W of power, and predicted widespread adoption of the bulb would cut energy usage worldwide by one-tenth. Initially, the bulb is targeted at owners of public buildings that need to be lit continuously, in order to save costs associated with having to purchase and replace incandescent bulbs.\nReviews of the bulb reflected positively on its energy usage and lifespan but criticized the lights' unnatural color and their high cost when compared to standard incandescent and compact fluorescent bulbs.", "regions with higher electric rates and, to a lesser extent, also in regions with higher than U.S. average cooling requirements. However, frequent on-off cycling (turning on and off) of CFLs greatly reduces their lifespan.\nThe current price of CFLs reflects the manufacturing of nearly all CFLs in China, where labour costs less. In September 2010, the Winchester, Virginia, General Electric plant closed, leaving Osram Sylvania and the tiny American Light Bulb Manufacturing Inc. the last companies to make standard incandescent bulbs in the United States. At that time, Ellis Yan, whose Chinese company made the majority of CFLs sold in the", "the program is to reduce consumer concerns about efficient light bulbs due to variable quality of products. Those CFLs with a recent Energy Star certification start in less than one second and do not flicker.\nIn January 2011, the province of British Columbia banned retailers from ordering 75- or 100-watt incandescent bulbs.\nCanada's Energy Efficiency Regulations are published on the Natural Resources Canada website.\nThe Canadian federal government banned the import and sale of 75- and 100-watt incandescent bulbs, effective 1 January 2014. On 1 January 2015, 40- and 60-watt bulbs were also banned. Retailers will be allowed to sell their existing inventories", "back down. HPL incandescent The proprietary HPL (High Performance Lamp) lamp uses a compact filament, which concentrates the most light where it is efficient in an ellipsoidal reflector. At 575 watts, the HPL lamp in a Source Four produces light equivalent to a 1000 watt spotlight using previous technology. This lower energy consumption saves electricity and creates less heat. The HPL lamp also gives the fixture its name. The lamp (light source) has four filament strands, hence Source Four. It is also available in 375 W and 750 W versions, at a variety of rated supply voltages. HPL", "maximum available energy of only about 98 joules; dividing by a desired illumination time of just 5 minutes would return a usable power of only 0.32 watts. Moreover, this would be for an unrealistic 100% conversion efficiency; that of the University of Alabama prototype was closer to 50%, which in our example would further reduce usable power to just 0.16 watts. At 5.5 operating voltage of an LED, that left only 20 milliamperes for the LED. This is sufficient to light an LED, but the available light from the LED would not likely be useful for reading or night activities.", "a 75 Watt incandescent lamp without a voltage optimiser (1312.5 lumens assuming 17.5 l/W). The LED lamp could also be reduced in size to 8W, if only 1210 lumens is required.", "lamp base). The remainder is emitted as radiation, mostly in the infrared. Thus, a 60 watt light bulb emits a total radiant flux of about 45 watts. Incandescent bulbs are, in fact, sometimes used as heat sources (as in a chick incubator), but usually they are used for the purpose of providing light. As such, they are very inefficient, because most of the radiant energy they emit is invisible infrared. A compact fluorescent lamp can provide light comparable to a 60 watt incandescent while consuming as little as 15 watts of electricity.\nThe lumen is the photometric unit of light output.", "filament's length, thickness, and material. For two bulbs of the same voltage, type, color, and clarity, the higher-powered bulb gives more light.\nThe table shows the approximate typical output, in lumens, of standard incandescent light bulbs at various powers. Light output of a 230 V version is usually slightly less than that of a 120 V version. The lower current (higher voltage) filament is thinner and has to be operated at a slightly lower temperature for same life expectancy, and that reduces energy efficiency. The lumen values for \"soft white\" bulbs will generally be slightly lower than for clear bulbs at the same", "diminished, or just burn out. HPS lights come in wattages of 35, 50, 70, 100, 150, 200, 250, 310, 400, 600, 750, and 1,000 watt sizes, while LPS lights come in wattages of 18, 35, 55, 90, 135, and 180 watt sizes.\nAlthough the use of HPS is dramatically decreasing in many large cities, it is still a popular form of use in grow lights, as seen in greenhouses, aquariums and planetariums. Metal halide In recent years, metal halide lamp (MH) streetlights have illuminated roadways and parking lots. Metal halide has long been popular in business installations and can be found", "converted to high frequency AC by the transistors, connected as a resonant series DC to AC inverter. The resulting high frequency is applied to the lamp tube. Since the resonant converter tends to stabilize lamp current (and light produced) over a range of input voltages, standard CFLs do not respond well in dimming applications and will experience a shorter lifespan and sometimes catastrophic failure. Special electronic ballasts (integrated or separate) are required for dimming service.\nCFL light output is roughly proportional to phosphor surface area, and high output CFLs are often larger than their incandescent equivalents. This means that the CFL", "by the 60-watt bulb being turned off followed by the 100-watt bulb being turned off, the NIALM unit will match the on and off signals from the 60-watt bulb and the on and off signals from the 100-watt bulb to determine how much power was used by each bulb and when. The system is sufficiently sensitive that individual 60-watt bulbs can be discriminated due to the normal variations in actual power draw of bulbs with the same nominal rating (e.g. one bulb might draw 61 watts, another 62 watts).\nThe system can measure both reactive power and real power. Hence two", "Although most consumers still think of light in terms of power consumed by the bulb, in the U.S. it has been a trade requirement for several decades that light bulb packaging give the output in lumens. The package of a 60 watt incandescent bulb indicates that it provides about 900 lumens, as does the package of the 15 watt compact fluorescent.\nThe lumen is defined as amount of light given into one steradian by a point source of one candela strength; while the candela, a base SI unit, is defined as the luminous intensity of a source of monochromatic radiation, of", "Compact fluorescent lamps (CFLs), lowering the consumption of energy by 50 million kW·h per year. The plan of action includes giving away, in a three-phased operation, a free 20 W CFL bulb to 800,000 households (the majority of Honduran households still use inefficient 60 W, 75 W, and 100 W bulbs).\nThe Inter-Institutional Group for the Efficient Use of Energy (GIURE) has set out a plan with the objective of reducing national electricity demand by 100 MW in 2008. This would entail an 8% reduction of the maximum demand forecast by ENEE. Some of the main activities included in GIURE's program", "a unit of power. We are accustomed to thinking of light bulbs in terms of power in watts. This power is not a measure of the amount of light output, but rather indicates how much energy the bulb will use. Because incandescent bulbs sold for \"general service\" all have fairly similar characteristics (same spectral power distribution), power consumption provides a rough guide to the light output of incandescent bulbs.\nWatts can also be a direct measure of output. In a radiometric sense, an incandescent light bulb is about 80% efficient: 20% of the energy is lost (e.g. by conduction through the", "grow lights deliver more energy in the red part of the light spectrum, they may promote blooming and fruiting. They are used as a supplement to natural daylight in greenhouse lighting and full-spectrum lighting(metal halide) or, as a standalone source of light for indoors/grow chambers.\n\nHPS grow lights are sold in the following sizes: 150W, 250W, 400W, 600W and 1000W. Of all the sizes, 600W HID lights are the most electrically efficient as far as light produced, followed by 1000W. A 600W HPS produces 7% more light (watt-for-watt) than a 1000W HPS. \nAn HPS bulb produces 60-140 lumens/watt, depending on the", "amount of visible light, CFLs use one-fifth to one-third the electric power, and may last eight to fifteen times longer. Newer phosphor formulations have improved the perceived color, with \"soft white\" CFLs judged subjectively similar to standard incandescent lamps. Objections more specifically relating to compact fluorescent light bulbs include the different quality of light produced by phosphor-based lamps compared to incandescent lamps and that compact fluorescent light bulbs contain small amounts of mercury, a potent neurotoxin, which is especially dangerous to children and pregnant women, and made more serious by the confined area mercury would be dispersed in the", "types. This limit was moved down to lower wattages, and the efficiency levels raised by the end of 2012.\nIn practice, some manufacturers and retailers have found a loophole in the new rules so that some incandescents are still available, marketed as \"rough-service\" or \"shock-resistant\" bulbs for industrial use only. Such bulbs are widely available in markets and hardware stores at much lower cost than official alternatives such as CFLs. After bans were first introduced prices of these bulbs rose by 20–25%. A German importer simply reclassified the lamps as \"mini heaters\" branded \"Heatballs\", but that was banned shortly afterwards.\nThe", "a current of 30 to 50 kiloamperes, transfers a charge of 5 coulombs, and dissipates 500 megajoules of energy (120 kg TNT equivalent, or enough to light a 100-watt light bulb for approximately 2 months). However, an average bolt of positive lightning (from the top of a thunderstorm) may carry a current of 300 to 500 kiloamperes, transfer a charge of up to 300 coulombs, have a potential difference up to 1 gigavolt (a billion volts), and may dissipate 300 GJ of energy (72 tons TNT, or enough energy to light a 100-watt light bulb for up to 95 years). A negative", "consumption is 57 watts (with heaters on) when receiving and 292 watts when transmitting. The transceiver's peak envelope power output on SSB and CW is about 100 watts, and about 60 watts on FSK. Its tubes are tuned manually, using the transceiver's drive, plate and load controls.", "the light output degrades as the bulb ages though somewhat more slowly. Dimmable white LED bulbs are available. Cold-cathode fluorescent lamps Cold-cathode fluorescent lamps (CCFLs) have been made available in the form of CFLs. CCFLs use electrodes without a filament. The voltage of CCFLs is about 5 times higher than CFLs, and the current is about 10 times lower. CCFLs have a diameter of about 3 millimeters. CCFLs were initially used for document scanners and also for back-lighting LCD displays, and later manufactured for use as lamps. The efficacy (lumens per watt) is about half that of CFLs. CCFLs rely", "different amounts of light. A typical 3-way incandescent bulb is a 50 W / 100 W / 150 W bulb. It has a low-power 50 W filament and a medium-power 100 W filament. When they are both energized at the same time, 150 W of power is delivered, and a high level of light is produced. Usually screw-base 3-way bulbs fit into regular Type A sockets. Larger 3-way bulbs (up to 300 W) have a larger \"mogul\" base. These 3 way bulbs can also come in spiral designs. \nSome compact fluorescent lamps have similar circuitry to produce the different amounts", "For the same amount of light generated, they typically use around one-quarter to one-third the power of an incandescent.", "of 100–120 volts, or of type E27 (i.e. 27 millimeters in diameter) in countries with 220–240 volts AC. A-series light bulbs using the older B22 bayonet twist type base are less common; they can be found in the UK and many British Commonwealth countries. Specifications IEC/TR 60887:2010 defines the A bulb shape as: \"A bulb shape having a spherical end section that is joined to the neck by a radius that (a) has a centre outside the bulb, (b) has a magnitude greater than the radius of the spherical section, (c) and is tangent to both the neck and the curve of", "month, a small low-powered lamp had been installed, operating on batteries.\nIn 1986, it was listed on the now-defunct Register of the National Estate.\nIn May 1982 standby diesel powered alternators were installed. In July 1982 the tower was finally fully electrified, and a powerful 1,000,000 cd lamp was installed. This was later replaced by a much lower power, but also lower cost, solar powered light.\nThe current light source is a solar powered 12 volt Halogen Lamp, with an intensity of 37,000 cd. The light characteristic shown is a white flash every five seconds (Fl.W. 5s). The light is visible for 17 nautical miles (31 km;", "with a 5-year plan of phasing-out incandescent light bulbs over 100 watts starting 1 October 2012, and gradually extend the ban to those over 15 watts on 1 October 2016.\nAnother source, however, has indicated that by 1 October 2016, all incandescent light bulbs will be banned.\nAccording to this source, 1 November 2011 to 30 September 2012 will be a transitional period and as of 1 October 2012, imports and sales of ordinary incandescent bulbs of 100 watts or more will be prohibited. The first phase will be followed by a ban on 60-watt-and-higher incandescent light bulbs starting in October 2014." ]
Who pays for anti-smoking ads, and why do they want us to quit?
[ "Fun fact: the Truth anti-smoking ads are actually funded (unwillingly) by the big tobacco comapnies. In the late 90's 47 states sued the tobacco industry for the medical financial burden their products put on the state's healthcare systems. Part of the settlement was that the tobacco companies had to fund the [American Legacy Foundation](_URL_0_), a not-for-profit organization dedicated to the eradication of smoking. The ALF is responsible for the Truth advertising campaign.", "Smokers pay for those commercials with the tax they put on the cigarettes", "usually the government. they prefer having a healthy population so that tax money doesnt get lost trying to treat cancers and emphysemas.", "We all benefit from fewer people smoking. People who quit obviously reduce their risk of having smoking-related health issues, which in turn lowers the cost of the public health system taking care of people suffering such issues.", "In Australia, they're paid for by the Cancer Council of Australia (not for profit organization.)", "Yes a very good question.\nSmoking is indeed dangerous but so are motorbikes. Should they be banned. Many countries have NO public places where people can smoke, not even private clubs. This actually forces people to congregate in smoky huddles on pavements which then really does expose the public to the smoke.The public is not that stupid; everyone knows smoking isn't great for you. Btw does anyone know when exactly Barack Obama quit? Smoking that is." ]
[ "banned by the Advertising Standards Authority, after complaints from ASH (Action on Smoking and Health) and Cancer Research. The ASA found the ads were \"misleading\" and lacking \"substantiation\".\nJorge da Motta, the managing director of JTI UK, said: \"We are using this media campaign to demonstrate that in 2011, even the Department of Health accepted that these proposals are not supported by any hard evidence. We hope common sense will prevail and that the Government will disregard this proposal, before embarking on a process which will do nothing more than deprive the Treasury of much-needed revenue and make hundreds of millions", "Nicotine marketing Effects The effectiveness of tobacco marketing in increasing consumption of tobacco products is widely documented. Advertisements cause new people to become addicted, mostly when they are minors. Ads also keep established smokers from quitting. Advertising peaks in January, when the most people are trying to quit, although the most people take up smoking in the summer.\nThe tobacco industry has frequently claimed that ads are only about \"brand preference\", encouraging existing smokers to switch to and stick to their brand. There is, however, substantial evidence that ads cause people to become, and stay, addicted.\nMarketing is also used to oppose", "their scheme to defraud by denying the adverse health effects of smoking, denying the addictiveness of nicotine, denying their manipulation of the nicotine content of cigarettes, and denying that their marketing targeted youth as new smokers. The companies also suppressed and destroyed information related to the dangers of smoking in order to maximize their profits and enhance the market for cigarettes. Complaint On September 22, 1999, the United States Department of Justice brought a lawsuit against nine cigarette manufacturers and two tobacco industry trade associations in the United States District Court of the District of Columbia (\"District Court\"). The", "quitting smoking tool have been seen in e-cigarette advertisements in the US, UK, and China, despite such assertions had not been supported by regulatory bodies. Marketing expenditure In contrast to cigarette and smokeless tobacco businesses, e-cigarette businesses are not mandated to provide their marketing and promotional spending to the US Federal Trade Commission, therefore, the total amount they spend is uncertain, as of 2018. E-cigarette businesses have largely expanded their marketing spending. As of 2017, e-cigarette advertisement spending across every media channel is rising every year. As of 2016, the majority of the large tobacco businesses own at least one", "through an emphasis on informed choice and \"anti-teen-smoking\" campaigns, although such ads have been criticized as counterproductive (causing more smoking) by independent groups.\nMagazines, but not newspapers, that get revenue from nicotine advertising are less likely to run stories critical of nicotine products. Internal documents also show that the industry used its influence with the media to shape coverage of news, such as a decision not to mandate health warnings on cigarette packages or a debate over advertising restrictions.\nCounter-marketing is also used, mostly by public health groups and governments. The addictiveness and health effects of nicotine use are generally described, as", "branded to suggest that it is less harmful or addictive (\"mild\", \"light\", \"low-tar\", \"filtered\" etc.) is, in terms of health effects, meaningless. Recapturing former smokers Companies have also sought to recapture people who have successfully broken a nicotine dependency. Ex-smokers tend to view these attempts very negatively, and their existence has frequently been denied. Methods discussed in industry documents include price drops, increasing acceptance of smoking by nonsmokers, making products more socially acceptable, and making \"healthier\" cigarettes (scare quotes in original). Economics As tobacco companies keep spending money on marketing until it stops being profitable, marginal changes in marketing typically", "industry with most new addicts.\nAnother method of evading restrictions is to sell less-regulated nicotine products instead of the ones for which advertising is more regulated. For instance, while TV ads of cigarettes are banned in the United States, similar TV ads of e-cigarettes are not.\nThe most effective media are usually banned first, meaning advertisers need to spend more money to addict the same number of people. Comprehensive bans can make it impossible to effectively substitute other forms of advertising, leading to actual falls in consumption. However, skillful use of allowed media can increase advertising exposure; the exposure of U.S. children", "problems, but industry marketing has claimed that nicotine is both less harmful and therapeutic for people with mental illness, and is a form of \"self-medication\". Marketing has also claimed that quitting will worsen rather than improve mental health symptoms. These claims have been criticised by independent researchers as inaccurate.\nIt is thought that nicotine withdrawal is worse for those who are already stressed or depressed, making quitting more difficult. About 40% of the cigarettes sold in the U.S. are smoked by people with mental health issues. Smoking rates in the U.S. military were also high, and over a third started smoking", "nicotine products instead of the ones for which advertising is more regulated. For instance, while TV ads of cigarettes are banned in the United States, similar TV ads of e-cigarettes are not.\nThe most effective media are usually banned first, meaning advertisers need to spend more money to addict the same number of people. Comprehensive bans can make it impossible to effectively substitute other forms of advertising, leading to actual falls in consumption. However, skillful use of allowed media can increase advertising exposure; the exposure of U.S. children to nicotine advertising is increasing as of 2018.\nIn the US, sport and event", "of smokers, who commonly feel trapped by their addiction and unable to quit. Mention of addiction is avoided in nicotine advertising. \nReactance can be eliminated by successfully concealing attempts to manipulate or control behaviour. Unlike conventional advertising, stealth marketing is not openly attributed to the organization behind it. This neutralizes mistrust of tobacco companies, which is widespread among children and the teenagers who provide the industry with most new addicts. The internet and social media are particularly suited to stealth and viral marketing, which is also cheap; nicotine companies now spend tens of millions per year on online marketing.\nCounter-advertising also", "smoke, they suppressed research, they destroyed documents, they manipulated the use of nicotine so as to increase and perpetuate addiction, they distorted the truth about low tar and light cigarettes so as to discourage smokers from quitting, and they abused the legal system in order to achieve their goal – to make money with little, if any, regard for individual illness and suffering, soaring health costs, or the integrity of the legal system.\"\n\nBut the Court also directly addressed the law firm Covington & Burling specifically: \"Covington & Burling was counsel for the Tobacco Institute and was also described as counsel", "content of the paper and where it should be published.\"\nIn January 1994 Luik published \"Do Tobacco Advertising Bans Really Work? A Review of the Evidence. He is credited as a scholar with the Niagara Institute, with assistance from the International Advertising Association. \nIn mid 1996 Luik was hired by the Australian tobacco industry to 'criss-cross the country' promoting his book Smokescreen: Passive Smoking and Public Policy which attacked the US Environmental Protection Agency's risk assessment which had determined that second-hand tobacco smoke (Environmental Tobacco Smoke, or ETS) as a \"Known carcinogen\". His book was published and promoted by the Institute", "smoking with anti-smoking campaigns in mass media stressing the harmful long-term effects of smoking. Passive smoking, or secondhand smoking, which affects people in the immediate vicinity of smokers, is a major reason for the enforcement of smoking bans. These are laws enforced to stop individuals from smoking in indoor public places, such as bars, pubs and restaurants, thus reducing nonsmokers’ exposure to secondhand smoke. A common concern among legislators is to discourage smoking among minors and many states have passed laws against selling tobacco products to underage customers (establishing a smoking age). Many developing countries have not adopted anti-smoking policies,", "risks. Much of the work that these organizations did to reduce smoking was not successful among the population because of big tobacco companies having a greater political presence such as Philip Morris International and British American Tobacco. For instance, the bill in 1992 which would have made workplaces completely smoke free and stop tobacco companies from advertising cigarettes, was weakened by these companies and lead to the law in 1995 which allowed designated areas for smoking at workplaces and other public places and had weak restrictions when it came to the advertisement of tobacco products. Again in 2001 and 2002,", "The period after nicotine advertising restrictions were brought in is characterised by ingenious circumvention of progressively stricter regulations. The industry continued to dispute medical research: denying, for instance, that nicotine was addictive, while deliberately spiking their cigarettes with additional nicotine to make them more addictive.\nAdvertising restrictions typically shift advertising spending to unrestricted media. Banned on television, ads move to print; banned in all conventional media, ads shift to sponsorships; banned as in-store advertising and packaging, advertising shifts to shill (undisclosed) marketing reps, sponsored online content, viral marketing, and other stealth marketing techniques.\nAnother method of evading restrictions is to sell less-regulated", "now rejecting nicotine funding as a matter of policy.\nIn 1954, tobacco companies ran the ad \"A Frank Statement.\" The ad was the first in a disinformation campaign, disputing reports that smoking cigarettes could cause lung cancer and had other dangerous health effects. It also referred to \"research of recent years\", although solid statistical evidence of a link between smoking and lung cancer had first been published 25 years earlier.\nPrior to 1964, many of the cigarette companies advertised their brand by claiming that their product did not have serious health risks. A couple of examples would be \"Play safe with Philip", "that the three advertisements did not clearly indicate that nicotine is used in the products. In 2014, the Advertising Standards Authority banned a Ten Motives television advertisement for e-cigarettes for making unproven health claims. The Advertising Standards Authority determined that additional evidence provided by Ten Motives that they reviewed did not support that vaping or for their products explicitly as being safer than traditional cigarettes. The Advertising Standards Authority came to the conclusion that the statements \"the healthier smoking alternative\" and \"you can still enjoy smoking without worrying about the effects on your health\" were not accurate. In 2014, the", "being employed so frequently works against the ban because it increases attention attracted to smoking by disrupting the concentration of viewers.\"", "endorsing a product that directly profits the tobacco industry. There is no evidence that the cigarette brands are selling e-cigarettes as part of a plan to phase out traditional cigarettes, despite some stating to want to cooperate in \"harm reduction\". E-cigarette advertising for using e-cigarettes as a quitting tool have been seen in the US, UK, and China, which have not been supported by regulatory bodies. In the US, six large e-cigarette businesses spent $59.3 million on promoting e-cigarettes in 2013. In the US and Canada, over $2 million is spent yearly on promoting e-cigarettes online. E-cigarette websites often made unscientific", "of distorting data when it classified second-hand smoke as harmful. In 1995, The Washington Times published an editorial titled \"How not to spend science dollars\" condemning a grant to the National Cancer Institute to study how political contributions from tobacco companies shape policy-making and the voting behavior of politicians. Birther conspiracy theories and Muslim smears In 2008, The Washington Times published a column by Frank Gaffney that promoted the false conspiracy theories that President Barack Obama was born in Kenya and was courting the \"jihadist vote.\" Gaffney also published pieces in 2009 and 2010 promoting the false claim that Obama", "massive advertisements asserting the benefits of vaping for giving up smoking, several studies concluded that the use of e-cigarettes did not result in completely abstaining from smoking. Assertions of effectiveness for giving up smoking are not supported by the available scientific evidence, according to a 2014 review. Many e-cigarette businesses market their products as a smoking cessation aid without evidence of effectiveness. E-cigarette marketing has been found to make unsubstantiated health statements (e.g., that they help one quit smoking) including statements about improving psychiatric symptoms, which may be particularly appealing to smokers with mental illness. E-cigarettes are being advertised by", "some of their profits to a variety of organisations that help people in need. Non-addictiveness and healthiness Reference to the addictiveness of nicotine is avoided in marketing. Indeed, the addictiveness of nicotine was explicitly denied into the nineties; in 1994, seven tobacco executives stated that nicotine was not addictive while on oath before the US Congress. Industry feared that, if continuing to smoke was not seen as a \"free choice\", they would be exposed to legal and social liabilities.\nThe nicotine industry frequently markets its products as healthy, safe, and harmless; it has even marketed them as beneficial to health. These", "or \"corrupt\" passive smoking \"threatens the central democratic values of autonomy, respect and diversity\".\nIn 2006, the IPA predicted that banning smoking in public places would increase the risk of passive smoking as smokers moved to private areas indoors, that illegal garage bars may be set up and that without cigarette smoke nightclubs would have to \"deodorise sweat and flatulence\" with scented smoke.\nIn 2010, the IPA argued against the Gillard Government's plans to introduce plain tobacco packaging, criticising it on the grounds that plain packaging may not affect the consumption of those products and that plain packaging may infringe intellectual property", "their funding. He wished for the basic assumption that every author were \"fair minded and trustworthy, and deserves being heard out\" and for less attention to research funding when evaluating the results of a study. Marlow suggests that studies funded by tobacco companies are viewed and dismissed as \"deceitful\", i.e. as being driven by (conscious) bad intention. Incentives for voluntarily smoke-free establishments During the debates over the Washington, DC, smoke-free law, city council member Carol Schwartz proposed legislation that would have enacted either a substantial tax credit for businesses that chose to voluntarily restrict smoking or a quadrupling of the", "as \"light\", \"mild\", \"low tar\" or \"pure\" on cigarette packs.\nFrom December 2016, warning photos such as rotten teeth and black lungs will be mandatory on all cigarette packs.\nDiscussion is under way at the National Assembly to pass a law that will raise the prices every year pegged to inflation. The government will pass a law in 2015 to completely ban any form of advertising of cigarettes in convenience stores and make it illegal for tobacco companies to sponsor cultural or sport events. Financial and medical help for quitting People who have successfully quit smoking will receive 50,000 to 150,000 KRW", "articles, and the negative effects of its passive vapor have been shown in numerous studies. E-cigarette packages and advertisements require health warnings under US law, stating \"WARNING: This product contains nicotine. Nicotine is an addictive chemical.\" E-cigarettes are marketing, among other things, as a tool to get around smoke-free policies by allowing users to \"smoke anywhere.\" Assertions of effectiveness for giving up smoking are not supported by the available scientific evidence, according to a 2014 review. E-cigarettes are marketed to young non-smokers. Cost has been used as a marketing tactic on social media.\nCelebrity endorsements are used to encourage e-cigarette use.", "these are the themes missing from pro-tobacco marketing. Regulation and evasion techniques Because it harms public health, nicotine marketing is increasingly regulated.\nAdvertising restrictions typically shift marketing spending to unrestricted media. Banned on television, ads move to print; banned in all conventional media, ads shift to sponsorships; banned as in-store advertising and packaging, advertising shifts to shill (undisclosed) marketing reps, sponsored online content, viral marketing, and other stealth marketing techniques. Unlike conventional advertising, stealth marketing is not openly attributed to the organization behind it. This neutralizes mistrust of tobacco companies, which is widespread among children and the teenagers who provide the", "(566 F.3d 1095, 2009).\nDuring the $280 billion U.S. federal lawsuit against big tobacco, Covington & Burling partner John Rupp, a former lawyer with the industry-funded Tobacco Institute, testified that \"the industry sought out scientists and paid them to make an 'objective appraisal' of whether secondhand smoke was harmful to non-smokers, a move they hoped would dispel the 'extreme views' of some anti-smoking activists.\" He \"said the scientists, who came from prestigious institutions such as Georgetown University and the University of Massachusetts Amherst, did not consider themselves to be working 'on behalf' of cigarette makers even though they were being paid", "advertisement of tobacco products on radio and on television was prohibited. Four years later, the advertisement of tobacco products was only allowed in certain publications that were intended for tobacco merchants and producers, and packaging of tobacco products was required to adhere to certain images and to contain at least two warnings against the dangers of smoking tobacco. By 2005, it was entirely prohibited to smoke in schools and smoking in hospitals, restaurants, correctional facilities, workplaces, casinos, hotels, and other public spaces was prohibited unless within a designated smoking area. As of 2010, it is illegal to sell any smokeless", "Action on Smoking and Health (ASH) called for the removal of tobacco from sale by 2017. Tobacco displays in shops were banned in 2012. Winston Peters, himself a smoker, has long been lobbying for the rights of smokers. In the 2016 New Zealand budget, ACT New Zealand also came out lobbying on behalf of smokers, arguing that despite tax on tobacco having doubled in the last five years, with smoking rates having dropped by 1.3 percentage points only." ]
Why is the camera on the Mars rover so low quality?
[ "We can, just not yet. These cameras are the initial landing cameras to make sure it survived the landing. Later this week, the fancy dancey cameras will spring up and give us lovely, awesome (like, literally awe-inspiring) imagery.\n\nAlthough it's pretty awesome already in my opinion :)", "I can't even get youtube to load correctly and you want picture from MARS!!!!", "Just curious, how long does it take for the photos to get sent to Earth? How are they able to get sent to Earth? It took Curiosity 8 months to get there so I imagine photos and video will take a fair while to get back to Earth." ]
[ "Nikon 1 AW1 Reviews and criticism DPReview.com tested the camera extensively both on land and in the sea and noted that the camera had much better image quality than other \"rugged cameras\" tested. They also noted, however, that \"one must be extremely careful, as just a few grains of sand can end the AW1's life ... and repairing or replacing it won't be cheap.\"", "a 7.2 out of 10, noting the simplicity of the camera, the waterproof feature, and mobile application as its good points, and shutter lag, mediocre video and photo quality, non-removable battery, and slippery body as its bad points. Brad Molen of Engadget gave the camera a 75 out of 100, saying that the advantages of the device was that it was \"fun to use\", small and lightweight, comfortable while used with one hand, waterproof, and can be used standalone from a smartphone, while the disadvantages were that the camera quality was not better than most flagship smartphones, slightly high price,", "improving image brightness and color saturation. Modern improvements Today, the small size of fully automatic camcorders with large view screens and long-life rechargeable batteries has reduced the housing size and made underwater videography an easy, fun activity for the diver. Low-cost wide-angle lens add-ons are available for many cameras and some can even be fitted outside the camera housing for versatile use. This lets the photographer get closer and make the subject clearer and also with fewer focusing and depth of field problems. Today cameras are more sensitive to low light conditions and make automatic color balancing adjustments. Nevertheless, deeper", "lack of HDR, flashlight and other features, subpar iOS app, average battery life, and odd-looking wide angle shots. PhoneArena gave the camera a 7 out of 10, noting that the camera was quick to capture photos, and the grip was comfortable, but also noted that the image quality in low light was sub-par, the video recording lacked sharpness, shutter speeds were too slow and lacked manual adjustment, low battery life, mediocre audio recording quality, lack of optical image stabilization, and steep pricing. Les Shu of Digital Trends gave the camera a 3.5 out of 5, listing its design, wide-angle lens,", "Fujifilm Finepix S9200 Reviews Initial reviews on the S9200 have been favourable, with users citing the 50x zoom lens as one of the camera's key benefits.\nThis view was also echoed by a wildlife and PhotographyBlog who tried the camera out in the field.", "very positive - with some noticeable negatives identified with the camera. The camera's high ISO performance is often cited as a strength, while reviews initially called out poor auto focus performance in low light and battery life as two of the main weaknesses. Since its release, several firmware upgrades have been released that have significantly improved autofocus speed. Firmware updates Fuji has adopted a \"Kaizen\" approach, meaning continual updates and innovation in releasing firmware updates to the X-Pro1. Since the launch of the camera, there have been 8 firmware updates to fix bugs, improve the camera's performance and add new", "of video and to document animal behavior.\nThe battery life of some of these cameras is another important factor in which cameras are used; large batteries offer a longer running time for the camera but can be cumbersome in set up or when lugging the equipment to the field site . Extra features Weather proof and waterproof housing for camera traps protect the equipment from damage and disguise the equipment from animals.\nNoise-reduction housing limits the possibility of disturbing and scaring away animals. Sound recording is another feature that can be added to the camera to record animal calls and times when", "a deeper base plate to accommodate the extra circuit making the camera taller than the R4/5/6 and necessitating a special taller grip for the winder and motor drive.", "Fujifilm FinePix HS30EXR Reviews Initial reviews on the HS30EXR have been favourable, with users citing the 30x zoom lens as one of the camera's key benefits. This view was also echoed by a wildlife and safari photographer who tried the camera out in the field", "at small sizes due to aggressive noise-reduction and inadequate software processing. In addition, the device's rear camera lacked optical image stabilization (OIS) which had been found in the proceeding M7. However, Engadget praised HTC's focus on \"selfies\" with its 5-megapixel front-facing camera, and The Verge quipped that even its \"ultimate selfie machine\" took better photos than the rear-facing camera in many situations. The Duo Camera functionality received similarly mixed reaction; while critics felt that the effects could be considered fun and useful by end-users, the effects themselves (particularly the refocus effect) were panned for not having any positive effect on", "backup camera, both because of its ruggedness and because it is capable of full mechanical operation with all features except the light meter, even without a battery.", "on Mars (2013). Total filming time for the film lasted approximately 70 days.\nA special Mars rover model was built for the filming; the movie cast and team presented the rover model to Jordan in return for the hospitality they had received. The rover is now exhibited in Jordan's Royal Automobile Museum.\nWeir avoided writing Watney as lonely and depressed in his novel. While Watney's humor is preserved in the film, Scott also depicted the character's isolation in the vast, dusty Martian landscape. Todd McCarthy of The Hollywood Reporter wrote: \"The scenes back on Earth provide a hectic, densely populated counterweight to", "Siemens C65 Reviews GSM Arena praised it as good value but criticised the poor camera. CNet agreed that it provided good value.", "battery with in-camera charging. G3WP The first camera in GE's waterproof series was the G3WP, a compact camera with capability for up to 3 meters (10 feet) underwater, 12.2 megapixel CCD sensor, \"All-Glass\" 4X optical zoom f/3.5-5.15 lens, and VGA Video. G5WP Underwater capability 5 meters (16 feet), 12.2 megapixel CCD sensor, \"All-Glass\" 4X optical zoom f/3.5-5.15 lens. X1 GE X1 is the first camera from General Imaging for the more serious photographer. It has a 12X optical zoom, a 2.5-inch LCD screen, 8 megapixels, and a handgrip. Paired with the camera’s 12X optical zoom is a 4.5X digital zoom.", "the capabilities of film. \"This camera has brought us to a point where digital is simply better\", says Deakins. Deakins used the camera to shoot In Time, the James Bond film Skyfall, Prisoners, Unbroken, Sicario, the Academy Award for Best Cinematography winner Blade Runner 2049, The Goldfinch and the upcoming 1917.\nThe Alexa is the dominant camera in the professional film industry, and was used as the primary system on over 70% of the top 100 grossing films since 2016. It is also used on many network television shows.\nSince its introduction, six movies shot on Alexa (Argo, Birdman, Spotlight, Moonlight, The", "look at it as a toy, it's another fun tool to help get emotion and character and create an experience.\" Bay was reluctant to film with 3-D cameras since in test he found them to be too cumbersome for his filming style, but he did not want to implement the technology in post-production either since he was not pleased with the results. In addition to using the 3-D Fusion camera rigs developed by Cameron's team, Bay and the team spent nine months developing a more portable 3-D camera that could be brought into location.\nIn a hidden extra for the Blu-ray", "overexposure due to its translucent mirror, along with its lack of a GPS, as cons. Moritz Wanke of Chip gave it a rating of 93.8 percent, concluding it to be an improvement of its predecessor and the best camera containing an APS-C image sensor in the market. Writing for Zoom.nl, Cees de Jonge gave it a 7.9 out of 10, being surprised at its SLT designation, which he considered \"passé\".", "as a stand-alone GPS navigator. Camera The main (back) camera has an autofocus feature, dual LED flash, is optimized for 16:9 and 4:3 aspect ratios, and has a 4× digital zoom for both video and camera. The sensor size of the back camera is 8.7 megapixels (3552 × 2448 px); the effective resolution for the 16:9 aspect ratio is 3552 × 2000 px (7.1 megapixels), and 3248 × 2448 px (8 megapixels) for the 4:3 aspect ratio. Typically, a 16:9 picture format on a digital camera is achieved by cropping the top and bottom of a 4:3 image, since the", "said that it did however possess decent frame rates to play games and navigate through the phone smoothly without many issues. The front-facing camera is highly applauded by Williams, as it was able to capture detailed and accurate selfies. However the rear camera did not receive the same positive feedback, as he mentioned that it was heavily dependent on the lighting of the scenery, but was capable of capturing detail-rich images occasionally. The reviewer also states that the battery life of the phone was not an issue, however it did not last long enough to become one of its strengths.", "of Veronica Mars were shot on 16 mm and aired in HD. This Is Spinal Tap, and Christopher Guest's subsequent mockumentary films, are shot in Super 16 mm.\nThe first three seasons of Stargate SG-1 (bar the season 3 finale and the effects shots) were shot in 16 mm, before switching to 35 mm for later seasons.\nThe 2009 Academy Award winner for Best Picture, The Hurt Locker, was shot using Aaton Super 16 mm cameras and Fujifilm 16 mm film stocks. The cost savings over 35 mm allowed the production to utilize multiple cameras for many shots, exposing over 1,000,000 feet of film.\nBritish Napoleonic era drama Sharpe (TV", "depth-of-field photography\".\nCamera Labs evaluated the lens as delivering \"very good results\" when \"viewed in isolation\", and giving a sharper image in the corners than a Nikkor 85mm f1.4G, but losing to it in the centre.", "ARRIFLEX 435, which is amazing.\" There was a considerable amount of handheld camera work on the second section and usage of the ALEXA M allowed filming through windows and tight spaces, particularly for the car scenes.\nSela was recording ARRIRAW and used the whole sensor area of ALEXA's 4:3 for the anamorphic scenes, which allowed for the maximisation of the image quality for a 4K cinema release. The extra sensor area provided valuable data for later image processing.\nThe choice of using only a single camera led to the development of the film's long take fight scenes, as they could not afford", "commercial vehicles, school buses, and police cars to prevent accidents and limit liability. These devices continue to be manufactured by Pro-Vision. In recent years, their trademarked \"Bodycam\" has become one of their notable products. These devices can be clipped on to an officer's uniform (generally in the shoulder or chest area) where it can capture and record video of any incident with the public. The cameras have a 150-degree field of vision, are IP68 waterproof, and have night vision technology. The cameras shoot in 1296p HD at 30 frames per second.", "and costs at least twice as much.\"\n\nIn reviewing the lens, British photographer and blogger Keith Cooper concluded that\n\"At appreciably less cost than the EF-S 10-22, the 10-18mm surprised me with its build quality and optical performance. The image stabilisation adds to its general purpose usefulness and partly makes up for its relatively restricted aperture.... Distortions are well under control, and when suitable correction profiles arrive, the lens will be more than adequate for serious use if you were looking to photograph property for example...\"\nThe lens does suffer from poorer performance in lower light conditions when handheld, even with the assistance", "a digital camera back.\nIn practice a 30-second exposure on a Sinar 75 evolution with a built-in fan-assisted Peltier-cooled CCD represents the state of the art for practical purposes.\nThe resolution of digital camera backs (in 2017, up to 101 megapixels, IQ3 100) is higher than any fixed sensor digital camera (in 2017, up to 51 megapixels, Hasselblad X1D). and captures more detail per pixel due to the omission of an anti-aliasing filter. Each pixel is also able to capture more dynamic range due to higher quality electronics and larger pixel pitch. The use of active cooling systems such as internal fans", "the film after its completion. Film technique The documentary was filmed with a Canon EOS 5D Mark II in its entirety. This presented Dennis some challenges, he especially noted the sound, the image stabilization, the focus and the fact that the camera overheated in about 15 minutes due to the high temperatures in Afghanistan. He built a custom camera stabilizer rig with advanced sound equipment and attached it to his body armor when he was not filming. In addition, he focused the camera manually. Simply switching off the camera helped protect it against overheating. For his filming with Harris and", "overall image quality, and for having inconsistent quality themselves. Ars Technica specifically considered the Duo Camera to be \"poorly executed gimmicks\", noting that the effect could be replicated in software and that HTC should have instead focused on improving the hardware of the rear camera. Anand Lal Shimpi of AnandTech praised the look and feel of the device, Sense 6.0, and the better power efficiency with the Snapdragon 801. Anand also praised the camera app and UI, as well as the effects processing such as the zoom and blur features, stating that the device was \"an extremely versatile shooter,\" but", "to obviate this issue.\nBased on discussions with a source that wished to remain anonymous, but is tasked with maintaining \"wet film\" Gatso cameras, it was revealed that due to the cost when first put into use, and later due to the ageing of the hardware and lack of replacements, in many areas these cameras operate on a \"rolling live basis\". The internal camera and speed detection systems are removed and placed in a different chassis elsewhere at random intervals and depending on the availability of parts, some may have the radar and flash systems left active despite no camera being", "Canon EOS 10D Reception Reviews at the time of release were mostly positive.\nBryan Carnathan of The Digital Picture described the affordable price of the 10D as \"unheard-of-at-the-time\", and the sensor \"makes this camera perfect for nature photography\", although while the auto-focus was improved from previous models it sometimes did not work properly.\nLori Grunin from CNet gave it a score of 7.2, praising the value, features and performance while also saying that it was tricky to get sharp auto-focusing.\nPhil Askey from DPReview rated this camera as \"Highly Recommended\", concluding that \"I have no concerns in stating that as things stand (at", "The Verge remarked that despite LG having \"practically stole[n]\" Samsung's camera design and modes, the G2's camera interface were among the better implementations of Android camera software due to its available options. However, its low-light photos and some of its other modes were panned for not being as good as those of other devices such as the Nokia Lumia 920 and HTC One. In a photography-focused review by Digital Photography Review, the optical image stabilization system was praised for helping maintain good levels of exposure, and well-lit photos were found to have a decent level of detail, noting that its" ]
Expiration dates for painkillers (details inside)
[ "You are looking at date Filled vs date expired. Not date manufactured vs date expired. These drugs are created in large quantities but that doesnt mean they all get distributed at the same time. So the ones you got in 2013 and the ones you got in 2015 could have all been made in 2013. Drugs do expire.", "Also, expiration dates on medications are a date until which they are guaranteed to be 100% as effective as when manufactured. One of the pills, taken a year later, will still be safe but may only be say 90% as potent as when manufactured.", "Doctors have done studies (most recently by the DHS) to gauge the efficacy of medications past their due dates. Most antibiotics were indistinguishable from new even at 10, 20 or even 40 years past their due date. \n\nThe due date is just so you buy more pills (in most cases). Some notable exceptions include epi pens, insulin.", "[This page](_URL_0_), section 5, has a good breakdown on medications that you should NOT use past expiration. Most other medications in pill or tablet form retain good potency for many years." ]
[ "no indication Horton was taking painkillers as previously thought.", "adults). Not uncommonly, opiate/opioid narcotic analgesics (ex. morphine, fentanyl), muscle relaxerss (ex. diazepam, tizanidine, orphenadrine), and broad-spectrum antibiotics are administered. A few days' supply of weaker analgesics and muscle relaxers may be prescribed for the patient to control pain after he or she returns home as the pain resolves completely within one to three days. Patients also receive a prescription for an intensive antibiotic therapy, which much be taken until the supplies are depleted, giving the drug enough time to fully treat any opportunistic infections resulting from the bite wounds or other transmission methods which the victim's weakened immune system", "year. In 2010, 16,652 deaths were related to opiate overdose, in 2015 this number increased to 33,091. In September 2013, new FDA labeling guidelines for long-acting and extended-release opioids required manufacturers to remove moderate pain as use indication, reserving the drug for \"pain severe enough to require daily, around-the-clock, long-term opioid treatment\" however it did not restrict physicians from prescribing opioids for moderate, \"as needed\" usage.\nIn January 2013, the Centers for Disease Control and Prevention (CDC) reported an illness associated with intravenous (IV) abuse of oral Opana ER (oxymorphone) in Tennessee. The syndrome resembled that of thrombotic thrombocytopenic purpura (TTP).", "Drug expiration Drug expiration is the date after which a drug might not be suitable for use as manufactured. Consumers can determine the shelf life for a drug by checking its pharmaceutical packaging for an expiration date.\nDrugs which are past their shelf life can decompose and either be ineffective or even harmful. Standard advice from drug manufacturers and some health organizations is to dispose of drugs after the expiration date printed on the packaging. However, the published expiration date is not an absolute indication that a drug has spoiled. Consumers and organizations sometimes use expired drugs for medical treatment either", "events could not be excluded with an overall incidence rate estimated to range between 0.005% and 0.04%. Additional safety precautions and stricter prescribing rules were suggested based on the data. It is a bile salt export pump inhibitor.\nAfter long-term use of dopamine agonists, a withdrawal syndrome may occur during dose reduction or discontinuation with the following possible side effects: anxiety, panic attacks, dysphoria, depression, agitation, irritability, suicidal ideation, fatigue, orthostatic hypotension, nausea, vomiting, diaphoresis, generalized pain, and drug cravings. For some individuals, these withdrawal symptoms are short-lived and they make a full recovery, for others a protracted withdrawal", "myalgia. Slowly reducing the intake of opioids over days and weeks can reduce or eliminate the withdrawal symptoms. The speed and severity of withdrawal depends on the half-life of the opioid; heroin and morphine withdrawal occur more quickly than methadone withdrawal. The acute withdrawal phase is often followed by a protracted phase of depression and insomnia that can last for months. The symptoms of opioid withdrawal can be treated with other medications, such as clonidine. Physical dependence does not predict drug misuse or true addiction, and is closely related to the same mechanism as tolerance. While there is anecdotal claims", "severe back pain that were evaluated in a randomized, placebo controlled study. Patients were treated across 13 sites in the US and Australia. The results showed that 69% of patients given a 6 million dose of MPCs and 62% given an 18 million dose experienced a more than 50% reduction in low back pain at 12 months. This compares to around 35% for the controls. Patients underwent the outpatient injection for a single painful degenerated lumbar level and are being evaluated for safety and efficacy over a total of 36 months to evaluate long-term treatment effects. ", "of action, one would not expect naproxen to be useful in treating non-inflammatory causes of pain (e.g., diabetic nerve pain).\nNaproxen sodium is used as a \"bridge therapy\" in medication-overuse headache to slowly take patients off of other medications. Available formulations Naproxen sodium is available as both an immediate release and as an extended release tablet. The extended release formulations (sometimes called \"sustained release,\" or \"enteric coated\") take longer to take effect than the immediate release formulations, and therefore are less useful when immediate pain relief is desired. Extended release formulations are more useful for the treatment of chronic, or long-lasting,", "Pain assessment Regulation Pain assessment and re-assessment after administration of analgesics or pain management is regulated in healthcare facilities by accreditation bodies, like the Joint Commission. The Joint Commission began setting standards for pain assessment in 2001 stating that the route of analgesic administration dictates the times for pain reassessment, as different routes require different amounts of time for the medication to have a therapeutic effect.\nOral: 45–69 minutes.\nIntramuscular: 30 minutes.\nIntravascular: 15 minutes. Types of assessment Most pain assessments are done in the form of a scale. The scale is explained to the patient, who then chooses a score. A rating", "time the FDA had taken steps to \"remove a currently marketed opioid pain medication from sale due to public health consequences of abuse.\" By July 6, 2017, Endo International voluntarily complied with the FDA removal request.", "Benzodiazepines with a half-life of less than 24 hours include alprazolam, bromazepam, brotizolam, flunitrazepam, loprazolam, lorazepam, lormetazepam, midazolam, nitrazepam, oxazepam, and temazepam. The resultant equivalent dose is then gradually reduced. The reduction rate used in the Heather Ashton protocol calls for eliminating 10% of the remaining dose every two to four weeks, depending on the severity and response to reductions with the final dose at 0.5 mg dose of diazepam or 2.5 mg dose of chlordiazepoxide. Duration After the last dose has been taken, the acute phase of the withdrawal generally lasts for about two months although withdrawal symptoms, even from low-dose", "and can be purchased without a prescription and without pharmacist supervision. Adverse effects Commonly reported side effects of cetirizine include headache (16%), dry mouth (5.7%), drowsiness (5–20%), and fatigue (5.6%), while more serious but rare side effects include cardiac failure, tachycardia, and edema.\nDiscontinuing cetirizine after prolonged use (typically, use beyond six months) may result in generalized itching. Pharmacodynamics Cetirizine acts as a highly selective antagonist of the histamine H₁ receptor. The Kᵢ values for the H₁ receptor are approximately 6 nM for cetirizine, 3 nM for levocetirizine, and 100 nM for dextrocetirizine, indicating that the levorotatory enantiomer is the main active form. Cetirizine", "the painkiller story, Campion tracks down the men who dumped Caroline's body. They run a restaurant which provides accommodation for various criminal activities – they are not saying who killed Caroline and they have destroyed all the evidence.\nAmanda gives a party to celebrate breaking off her engagement to Campion – she is calm about it, but he seems upset. Campion tells everybody what he has found out – that Portland-Smith was blackmailed by Caroline and an accomplice until he killed himself, that Ramillies was given an unknown drug which killed him, and that Caroline was murdered when she tried to", "Sufentanil Medical uses The main use of this medication is in operating suites and critical care where pain relief is required for a short period of time. It also offers properties of sedation and this makes it a good analgesic component of anesthetic regimen during an operation.\nBecause of its extremely high potency, it is often used in surgery and post-operative pain management for patients that are heavily opioid dependent/opioid tolerant because of long term opiate use for chronic pain or illicit opiate use. Currently sufentanil is the most potent opioid painkiller available for use in humans. Although more", "hand, has been found to both improve sleep quality as well as general mental health. Dependence and withdrawal management Nonbenzodiazepines should not be discontinued abruptly if taken for more than a few weeks due to the risk of rebound withdrawal effects and acute withdrawal reactions, which may resemble those seen during benzodiazepine withdrawal. Treatment usually entails gradually reducing the dosage over a period of weeks or several months depending on the individual, dosage, and length of time the drug has been taken. If this approach fails, a crossover to a benzodiazepine equivalent dose of a long-acting benzodiazepine (such as chlordiazepoxide", "in the meanwhile. Claiming that she is allergic to the offered medication, Susan requests a prescription for the addictive pain-killer Demerol. Frank provides the prescription, but only for five tablets. However, Susan changes the dosage from five tablets to fifty when she collects the medication from her pharmacist.\nSusan arrives for her appointment twelve hours late, having mistaken the time. She seduces Frank, talking him into getting drunk and having sex with her. During the night, Susan steals all of Frank's narcotics. The next day, there is a DEA (Drug Enforcement Administration) agent at Frank's office demanding to see the dentist's", "withdraw from benzodiazepines typically receive little advice or support, and such withdrawal should be by small increments over a period of months.\nBenzodiazepines are usually prescribed only short-term, as there is little justification for their prescribing long-term. Some doctors however, disagree and believe long-term use beyond 4 weeks is sometimes justified, although there is little data to support this viewpoint. Such viewpoints are a minority in the medical literature.\nThere is no evidence that \"drug holidays\" or periods of abstinence reduced the risk of dependence; there is evidence from animal studies that such an approach does not prevent dependence from happening. Use", "Nuss procedure Recovery Recovery time is generally four to five days as an in-patient, depending on the patient age, activity level, co-morbidities and post-operative complications (if any), followed by time at home to overcome the pain and to let the bar settle into place. Sleep will be hampered because of the pain, discomfort and inability to sleep on either side of the body. Breathing can be difficult because of the stiffness of the bar and post-operative pain, but this generally improves within a few weeks to a month. Patients younger than fifteen often require only two to four weeks at", "indicated for the management of chronic pain and only for people already on a regular schedule of strong opioids for a prolonged period. Immediate-release oxymorphone tablets are recommended for breakthrough pain for people on the extended-release version. Compared to other opioids, oxymorphone has similar pain relieving efficacy.\nIn the United States it is a Schedule II controlled substance with an ACSCN of 9652. Brands and forms Oxymorphone is marketed by a single brand name manufacturer, Endo Pharmaceuticals, under the brand name(s) Opana and Opana ER. Opana ER was withdrawn by the manufacturer in 2017, making it no longer available. However both", "term used in Swedish and some other languages.\nModified-release dosage and its variants are mechanisms used in tablets (pills) and capsules to dissolve a drug over time in order to be released slower and steadier into the bloodstream while having the advantage of being taken at less frequent intervals than immediate-release (IR) formulations of the same drug. For example, extended-release morphine enables people with chronic pain to only take one or two tablets per day.\nMost commonly it refers to time dependent release in oral dose formulations. Timed release has several distinct variants such as\nsustained release where prolonged release is intended, pulse", "or spoilage before the expiration date.\nThe expiration date of pharmaceuticals specifies the date the manufacturer guarantees the full potency and safety of a drug. Most medications continue to be effective and safe for a time after the expiration date. A rare exception is a case of renal tubular acidosis purportedly caused by expired tetracycline. A study conducted by the U.S. Food and Drug Administration covered over 100 drugs, prescription and over-the-counter. The study showed that about 90% of them were safe and effective as long as 15 years past their expiration dates. Joel Davis, a former FDA expiration-date compliance chief,", "of this painkiller is the administration of N-acetyl-L-cysteine (either via oral or IV administration)), which is processed by cells to L-cysteine and used in the de novo synthesis of GSH.", "4-Acetoxy-DET Dosage 4-Acetoxy-DET is orally active, and dosages of 10–25 mg are common. Effects last 4–6 hours. The free base is also active when smoked in a dose range of 5–20 mg. Smoking 4-acetoxy-DET greatly speeds up the onset; peak effects are experienced within 10 minutes, and are usually over within 1 hour. Sweden Sveriges riksdags health ministry Statens folkhälsoinstitut classified 4-AcO-DET as \"health hazard\" under the act Lagen om förbud mot vissa hälsofarliga varor (translated Act on the Prohibition of Certain Goods Dangerous to Health) as of Nov 1, 2005, in their regulation SFS 2005:733 listed as 4-acetoxi-N,N-dietyltryptamin (4-AcO-DET), making", "times throughout the trial: when it began, and after four, eight and 26 weeks with either one of three dosages of NicVAX or a placebo. At the conclusion of the study, it was concluded that NicVAX was \"safe and well-tolerated\", with side effects including headaches, colds, and upper respiratory tract infections. While most of the test subjects continued to smoke, six people from the high dosage group, one person from the medium dosage group, no one from the low dosage group, and two people from the placebo group quit smoking. They did not start again for at least thirty days.\nIn", "after up to 8 weeks post cessation of alprazolam. Dopamine agonist protracted withdrawal After long-term use of dopamine agonists, a withdrawal syndrome may occur during dose reduction or discontinuation with the following possible side effects: anxiety, panic attacks, dysphoria, depression, agitation, irritability, suicidal ideation, fatigue, orthostatic hypotension, nausea, vomiting, diaphoresis, generalized pain, and drug cravings. For some individuals, these withdrawal symptoms are short-lived and make a full recovery, for others a protracted withdrawal syndrome may occur with withdrawal symptoms persisting for months or years. Cause The syndrome may be in part due to persisting physiological adaptations in the central", "months. A spokeswoman for Reckitt Benckiser argued that, \"[This] specific-pain range\" was intended \"to help consumers navigate their pain relief options, particularly within the grocery environment where there is no healthcare professional to assist decision making\". The ACCC said that the products were found to be \"no more effective at treating the type of pain described on its packaging than any of the other Nurofen specific pain products\", and sold for almost twice the price. Specific pain range painkillers include Nurofen Back Pain, Nurofen Period Pain, Nurofen Migraine Pain and Nurofen Tension; and all contain the \"same", "Oxycodone Medical uses Oxycodone is used for managing moderate to severe acute or chronic pain when other treatments are not sufficient. It may improve quality of life in certain types of pain. It is unclear if use in chronic pain results in improved quality of life or ongoing pain relief.\nOxycodone is available as controlled-release tablet, intended to be taken every 12 hours. A July 1996 study independent of Purdue Pharma, the drug's originator, found the controlled-release formulation had a variable duration of action ranging from 10–12 hours. A 2006 review found that controlled-release oxycodone is comparable to immediate-release oxycodone, morphine,", "drugs are effective for years after their expiration dates. However, it is difficult for anyone including researchers and physicians to find information to verify how much any given drug will degrade in efficacy or become unsafe over time. Drug manufacturers never support the use of drugs after the expiration date because that could make them liable if something went wrong.\nThe expiration date printed on drug packaging will differ from the true expiration date of the drug. Before the true expiration of a drug, its active ingredient will retain its potency. Also before expiration, no components of the drug will degrade", "may be delayed by up to four hours; however, if the dose is fatal, symptoms are usually present within 17 minutes of ingestion. Paresthesia of the lips and tongue is followed by developing paresthesia in the extremities, hypersalivation, sweating, headache, weakness, lethargy, incoordination, tremor, paralysis, cyanosis, aphonia, dysphagia, and seizures. The gastrointestinal symptoms are often severe and include nausea, vomiting, diarrhea, and abdominal pain; death is usually secondary to respiratory failure. There is increasing respiratory distress, speech is affected, and the victim usually exhibits dyspnea, cyanosis, mydriasis, and hypotension. Paralysis increases, and convulsions, mental impairment, and cardiac arrhythmia may occur.", "and doctors offices, where doctors examine patients extremely quickly with a purpose of prescribing painkillers. These clinics often charge an office fee of $200 to $400 and can see up to 60 patients a day, which is very profitable for the clinic. Pill mills are also large suppliers of the illegal painkiller black markets on the streets. Dealers may hire people to go to pill mills to get painkiller prescriptions.\nThere have been attempts to shut down pill mills. 250 pill mills in Florida were shut down in 2015. Florida clinics also are no longer allowed to dispense painkillers directly from" ]
How do pearls form?
[ "Here's a hint- It's the same material as their shell.\n\nThe sand is an irritant to the soft gooey creature, it can't reach to dislodge a grain of sand that is stuck, so it covers it in a layer of the same stuff the shell is made of. They get the minerals from their diet. Layer after layer it gets incrementally larger, just like the shell." ]
[ "Cultured pearl Development of a pearl A pearl is formed when the mantle tissue is injured by a parasite, an attack of a fish or another event that damages the external fragile rim of the shell of a mollusk shell bivalve or gastropod. In response, the mantle tissue of the mollusk secretes nacre into the pearl sac, a cyst that forms during the healing process. Chemically speaking, this is calcium carbonate and a fibrous protein called conchiolin. As the nacre builds up in layers of minute aragonite tablets, it fills the growing pearl sac and eventually forms a pearl.\nNatural pearls", "and wood. For most of human history pearls were the ultimate precious beads of natural origin because of their rarity; the modern pearl-culturing process has made them far more common. Amber and jet are also of natural organic origin although both are the result of partial fossilization.\nThe natural inorganics include various types of stones, ranging from gemstones to common minerals, and metals. Of the latter, only a few precious metals occur in pure forms, but other purified base metals may as well be placed in this category along with certain naturally occurring alloys such as electrum. There are also paper", "its original relative position the mantle tissue while the shell itself grows. After a couple of years, a pearl forms and the shell may be found by a lucky pearl fisher. Cultured pearls Cultured pearls are the response of the shell to a tissue implant. A tiny piece of mantle tissue (called a graft) from a donor shell is transplanted into a recipient shell, causing a pearl sac to form into which the tissue precipitates calcium carbonate. There are a number of methods for producing cultured pearls: using freshwater or seawater shells, transplanting the graft into the mantle or into", "Majorica pearl Production Majorica pearls are not formed in mollusks, but are man-made on solid glass balls coated with layers of pigmented and protective lacquers. They begin from high density dull glass with a specific weight, similar to that of real pearls. These nuclei are then dipped into a special pearly liquid, hemage, an adhesive paste made of oil and ground up fish scales or mother-of-pearl for their iridescence.\nThe coated nuclei are then dried and polished by hand to remove imperfections such as bumps and blemishes. This coating process is repeated (around 30 times) until a multitude of fine layers", "cultured pearl can then be harvested in as few as twelve to eighteen months.\nWhen a cultured pearl with a bead nucleus is X-rayed, it reveals a different structure to that of a natural pearl (see diagram). A beaded cultured pearl shows a solid center with no concentric growth rings, whereas a natural pearl shows a series of concentric growth rings. A beadless cultured pearl (whether of freshwater or saltwater origin) may show growth rings, but also a complex central cavity, witness of the first precipitation of the young pearl sac. Imitation pearls Some imitation pearls (also called shell pearls) are", "Pearl Definition All shelled mollusks can, by natural processes, produce some kind of \"pearl\" when an irritating microscopic object becomes trapped within its mantle folds, but the great majority of these \"pearls\" are not valued as gemstones. Nacreous pearls, the best-known and most commercially significant, are primarily produced by two groups of molluskan bivalves or clams. A nacreous pearl is made from layers of nacre, by the same living process as is used in the secretion of the mother of pearl which lines the shell.\nNatural (or wild) pearls, formed without human intervention, are very rare. Many hundreds of pearl oysters", "intruder, forms a pearl sac of external mantle tissue cells and secretes the calcium carbonate and conchiolin to cover the irritant. This secretion process is repeated many times, thus producing a pearl. Natural pearls come in many shapes, with perfectly round ones being comparatively rare.\nTypically, the build-up of a natural pearl consists of a brown central zone formed by columnar calcium carbonate (usually calcite, sometimes columnar aragonite) and a yellowish to white outer zone consisting of nacre (tabular aragonite). In a pearl cross-section such as the diagram, these two different materials can be seen. The presence of columnar calcium carbonate", "likely a cultured freshwater. Cultured freshwater pearls can often be confused for natural pearls which present as homogeneous pictures which continuously darken toward the surface of the pearl. Natural pearls will often show larger cavities where organic matter has dried out and decomposed. Lengths of pearl necklaces There is a special vocabulary used to describe the length of pearl necklaces. While most other necklaces are simply referred to by their physical measurement, pearl necklaces are named by how low they hang when worn around the neck. A collar, measuring 10 to 13 inches or 25 to 33 cm in length, sits directly", "by marine pearl oysters, Pinctada margaritifera and Pinctada mertensi, which live in the tropical and subtropical waters of the Pacific Ocean. Natural pearls form when a small foreign object gets stuck between the mantle and shell.\nThe two methods of culturing pearls insert either \"seeds\" or beads into oysters. The \"seed\" method uses grains of ground shell from freshwater mussels, and overharvesting for this purpose has endangered several freshwater mussel species in the southeastern United States. The pearl industry is so important in some areas, significant sums of money are spent on monitoring the health of farmed molluscs.\nOther luxury and high-status", "simply made of mother-of-pearl, coral or conch shell, while others are made from glass and are coated with a solution containing fish scales called essence d'Orient. Although imitation pearls look the part, they do not have the same weight or smoothness as real pearls, and their luster will also dim greatly. Gemological identification A well-equipped gem testing laboratory can distinguish natural pearls from cultured pearls by using gemological X-ray equipment to examine the center of a pearl. With X-rays it is possible to see the growth rings of the pearl, where the layers of calcium carbonate are separated by thin", "or even damage that displaces mantle tissue to another part of the mollusk's body. These small particles or organisms gain entry when the shell valves are open for feeding or respiration. In cultured pearls, the irritant is typically an introduced piece of the mantle epithelium, with or without a spherical bead (beaded or beadless cultured pearls). Natural pearls Natural pearls are nearly 100% calcium carbonate and conchiolin. It is thought that natural pearls form under a set of accidental conditions when a microscopic intruder or parasite enters a bivalve mollusk and settles inside the shell. The mollusk, irritated by the", "the name pearling. There is an alternative form of this implant, where short curved \"ribs\" are inserted, rather than pearls. History and culture The precise origin of pearling is unknown, but early documentation in China indicates that it had been imported from Southeast Asia no later than the early 1400s. Historical documents refer to the inserts as mianling, literally translating to Burmese bells. In the Philippines, researchers have established that these were present in various forms from the Visayas to southern Luzon. In the Visayas, pins made of gold, ivory, or brass were inserted in young boys through their penis", "the strings of cowries in the traditional dress of the Kikuyu people of Kenya, and the formal dress of the Pearly Kings and Queens of London.\nMost molluscs with shells can produce pearls, but only the pearls of bivalves and some gastropods, whose shells are lined with nacre, are valuable. The best natural pearls are produced by marine pearl oysters, Pinctada margaritifera and Pinctada mertensi, which live in the tropical and subtropical waters of the Pacific Ocean. Natural pearls form when a small foreign object gets stuck between the mantle and shell.\nPearls for use as jewellery are cultured by inserting either", "most are not very valuable. Pearls can form in both saltwater and freshwater environments.\nPearl oysters are not closely related to true oysters, being members of a distinct family, the feathered oysters (Pteriidae). Both cultured pearls and natural pearls can be extracted from pearl oysters, though other molluscs, such as the freshwater mussels, also yield pearls of commercial value.\nThe largest pearl-bearing oyster is the marine Pinctada maxima, which is roughly the size of a dinner plate. Not all individual oysters produce pearls naturally. In fact, in a harvest of two and a half tons of oysters, only three to four oysters", "the family Pteriidae. Freshwater pearls grow within certain (but by no means all) species of freshwater mussels in the order Unionida, the families Unionidae and Margaritiferidae. Physical properties The unique luster of pearls depends upon the reflection, refraction, and diffraction of light from the translucent layers. The thinner and more numerous the layers in the pearl, the finer the luster. The iridescence that pearls display is caused by the overlapping of successive layers, which breaks up light falling on the surface. In addition, pearls (especially cultured freshwater pearls) can be dyed yellow, green, blue, brown, pink, purple, or black. The", "Trade Commission rules, various mollusc pearls may be referred to as \"pearls\" without qualification.\nAlthough not nacreous, the surfaces of fine conch pearls have a unique and attractive appearance of their own. The microstructure of conch pearls comprises partly aligned bundles of microcrystalline fibres that create a shimmering, slightly iridescent effect known as \"flame structure\". The effect is a form of chatoyancy, caused by the interaction of light rays with the microcrystals in the pearl's surface, and it somewhat resembles moiré silk. Ancient Peru The Moche people of ancient Peru worshipped the sea and often depicted conch shells in their art.", "The shell's spire is completely enclosed by the body whorl, which is inflated and quite large, and has a rounded shoulder with no spines. The apex is of smooth type. Pearls This volute is known to produce pearls; however the Melo melo pearl has no nacre, unlike the pearl of a pearl oyster. The GIA and CIBJO now simply use the term 'pearl' (or, where appropriate, the more descriptive term 'non-nacreous pearl') when referring to such items, rather than the previously-used term 'calcareous concretion' and, under Federal Trade Commission rules, various mollusc pearls may be referred to as 'pearls'", "the center are exhausted, the center dies, thereby forming a living ring, from which the fairy ring arises.\nThere are two theories regarding the process involved in creating fairy rings. One states that the fairy ring is begun by a spore from the sporocarpus. The underground presence of the fungus can also cause withering or varying colour or growth of the grass above. The second theory, which is presented in the investigations of Japanese scientists on the Tricholoma matsutake species, shows that fairy rings could be established by connecting neighbouring oval genets of these mushrooms. If they make an arc or", "been made. The production of cultured pearls requires the grafting of a pearl nucleus, together with a portion of mantle tissue from a donor into a recipient oyster. The culture of round pearls in Pacific wing-oysters is technically hard; the oysters are small and the shells are thin, the shape of the shell makes the seeding operation difficult and the pearl sack is wide at the base which means that the graft may shift around. With experience, technicians gain expertise in seeding and yields can be high, with pearls reaching a maximum of 13 mm (0.5 in) in diameter.", "as 'flame structure'.\nSomewhat similar gastropod pearls, this time more orange in hue, are (again very rarely) found in the horse conch Triplofusus papillosus.\nThe second largest pearl known was found in the Philippines in 1934 and is known as the Pearl of Lao Tzu. It is a naturally occurring, non-nacreous, calcareous concretion (pearl) from a giant clam. Because it did not grow in a pearl oyster it is not pearly; instead the surface is glossy like porcelain. Other pearls from giant clams are known to exist, but this is a particularly large one weighing 14 lb (6.4 kg).\nThe largest known pearl (also from", "is equal to P. maxima. They can also be found in China, Korea, and Vietnam. Commercially Pearls are only occasionally found. They are yellow and small. The nacre is thin and the shells are small, making them of little commercial value. However, before the introduction of the Mississippi shell, their ideal shape for buttons made “Shark Bay” shells critical to the Mother of Pearl Industry in the 19th century. Today, the species is used for culturing blister pearls (Mabe pearls).", "the fibers grow from a clear substrate or fibrous if they occupy the entire crystal. Their colors range from yellow to green or gray, sometimes with cloud-like white to gray impurities. Their most common shape is cuboidal, but they can also form octahedra, dodecahedra, macles or combined shapes. The structure is the result of numerous impurities with sizes between 1 and 5 microns. These diamonds probably formed in kimberlite magma and sampled the volatiles.\nDiamonds can also form polycrystalline aggregates. There have been attempts to classify them into groups with names such as boart, ballas, stewartite and framesite, but there is", "Diamond willow Diamond formation and shape The tree grows diamond-shaped cankers in response to the fungus. The cankers seem to result from the tree growing away from the site of attack. This usually happens at the crotch of a branch on a larger branch or main stem. If the branch is relatively small it seems to die very quickly. If the branch is larger, it may continue to grow and the diamond is formed on the branch and the stem. By growing away from the fungus, new layers of growth occur further and further away from the site of the", "Pearlscale Description The characteristic feature of the Pearlscale is its thick, domed scales with pearl-like appearance. Its body is round and similar to a golf ball. The finnage may be long or short. Pearlscales can reach up to 8 inches long and grow up as large as an orange. Pearlscale goldfish are susceptible to swimbladder disorders which affect the ability to maintain normal position in the water. This is attributed to the selective breeding process of fancy goldfish to achieve particular body forms, such as that of the Pearlscale's roundness, which results in the alteration of the appearance of the shape", "happens later in life, after the coral colony is established. A colony will produce both eggs and sperm, which meet in the water to create larvae that use currents to disperse and settle in new areas. The larval stage of the coral, called a planula, will drift along until it finds a surface on which it can grow. Once it settles, it metamorphoses into its polyp form and creates skeletal material that attaches it to the seafloor. The coral will then begin to bud, which will create new polyps, which will eventually form a colony. In some black corals that", "escargot snails, and so on. The GIA and CIBJO now simply use the term 'pearl' (or, where appropriate, the more descriptive term 'non-nacreous pearl') when referring to such items and, under Federal Trade Commission rules, various mollusk pearls may be referred to as 'pearls', without qualification.\nA few species produce pearls that can be of interest as gemstones. These species include the bailer shell Melo, the giant clam Tridacna, various scallop species, Pen shells Pinna, and the Haliotis iris species of abalone. Pearls of abalone, or paua, are mabe pearls, or blister pearls, unique to New Zealand waters and are", "diamonds. These formations are usually inclusions in diamonds that have twisted together during the time of diamond formation. Thus, various inclusions such as pinpoints, needles or feathers may form together, creating a white strip inside the diamond. Surface graining may also be seen in some cases. Such intergrowths are more commonly seen in fancy cut diamonds and are extremely rare in ideal cut diamonds. Cleavage These are cracks in a diamond that occur in a straight line and are parallel to one of the diamond's crystallographic planes. Cleavages are usually caused by deep internal strain in a diamond and could", "those minerals didn't form deep within the Earth's crust as normal diamonds, but were instead brought with meteorites several billion years ago.", "Extraterrestrial diamonds Although diamonds on Earth are rare, extraterrestrial diamonds (diamonds formed outside of Earth) are very common. Diamonds not much larger than molecules are abundant in meteorites and some of them formed in stars before the Solar System existed. High pressure experiments suggest large amounts of diamonds are formed from methane on the ice giant planets Uranus and Neptune, while some planets in other solar systems may be almost pure diamond. Diamonds are also found in stars and may have been the first mineral ever to have formed. Meteorites In 1987, a team of scientists examined some meteorites and", "of pearls. On high magnification, there are from the centre of the strand on cup or pear-shaped links visible, which thickenings are slightly darker on the blunted end, but the stipes are sallow. The link becomes gradually developed near the edge. The strand is first twice as thick as the normal dark-coloured one, then constrictions appear on them. Then, the constrictions become apparent on them, which arrange it into light stipes and knots, become little by little slimmer and take the shape of a cup. Alternatively, the strand is lighter coloured from the beginning on and the knots rapidly develop" ]
What happens when you charge a battery
[ "Batteries make electricity when chemicals inside of the battery undergo a chemical reaction. Chemical A combines with chemical B to make chemical C + electricity. When chemical A and chemical B run out, the reaction has to stop. \n\nIn chemistry, every reaction is reversible. If A + B make C + electricity, then C + electricity make A + B. When you charge a battery, you're giving chemical C electricity so that it can make A + B again. Once chemical A + B are back, the original reaction can happen again: you've recharged the battery by restoring the original chemicals so that the reaction can happen again." ]
[ "a charge cycle means using all the battery's capacity, but not necessarily by discharging it from 100% to 0%: \"You complete one charge cycle when you’ve used (discharged) an amount that equals 100% of your battery’s capacity — but not necessarily all from one charge. For instance, you might use 75% of your battery’s capacity one day, then recharge it fully overnight. If you use 25% the next day, you will have discharged a total of 100%, and the two days will add up to one charge cycle.\"", "not identical, cells. Each cell has its own charge capacity. As the battery as a whole is being deeply discharged, the cell with the smallest capacity may reach zero charge and will \"reverse charge\" as the other cells continue to force current through it. The resulting loss of capacity is often ascribed to the memory effect.\nBattery users may attempt to avoid the memory effect proper by fully discharging their battery packs. This practice is likely to cause more damage as one of the cells will be deep discharged. The damage is focused on the weakest cell, so that each", "Battery charger A battery charger, or recharger, is a device used to put energy into a secondary cell or rechargeable battery by forcing an electric current through it.\nThe charging protocol (how much voltage or current for how long, and what to do when charging is complete, for instance) depends on the size and type of the battery being charged. Some battery types have high tolerance for overcharging (i.e., continued charging after the battery has been fully charged) and can be recharged by connection to a constant voltage source or a constant current source, depending on battery type. Simple chargers of", "current flow. As the charging process continues, such a battery will reach the charger's preset cut-off more rapidly, long before it has had time to accept a complete charge. In this case the battery charger indicates the charge cycle is complete, but the battery actually holds very little energy. To the user, it appears that the battery is dying. Regeneration The lead sulfate layer can be dissolved back into solution by applying much higher voltages. Normally, running high voltage into a battery will cause it to rapidly heat and potentially causing thermal runaway which may cause it to explode. Some", "the battery voltage might rise to a value near that of the charger voltage; this causes the charging current to decrease significantly. After a few hours this interface charge will spread to the volume of the electrode and electrolyte; this leads to an interface charge so low that it may be insufficient to start the car. As long as the charging voltage stays below the gassing voltage (about 14.4 volts in a normal lead–acid battery), battery damage is unlikely, and in time the battery should return to a nominally charged state. Valve regulated (VRLA) In a valve", "Charge cycle A charge cycle is the process of charging a rechargeable battery and discharging it as required into a load. The term is typically used to specify a battery's expected life, as the number of charge cycles affects life more than the mere passage of time. Discharging the battery fully before recharging may be called \"deep discharge\"; partially discharging then recharging may be called \"shallow discharge\".\nIn general, number of cycles for a rechargeable battery indicates how many times it can undergo the process of complete charging and discharging until failure or it starting to lose capacity.\nApple Inc. clarifies that", "throughout the circuit, giving energy to any components in the way, then when out of charge and towards the end of the circuit, they get re-charged by the battery/cell.", "battery. However, if Li-ION cells are discharged below a certain voltage a chemical reaction occurs that make them dangerous if recharged, which is why many such batteries in consumer goods now have an \"electronic fuse\" that permanently disables them if the voltage falls below a set level. The electronic fuse circuitry draws a small amount of current from the battery, which means that if a laptop battery is left for a long time without charging it, and with a very low initial state of charge, the battery may be permanently destroyed.\nMotor vehicles, such as boats, RVs, ATVs, motorcycles, cars, trucks,", "its full charge, which seems similar to memory effect. This is a common problem with high-load devices such as digital cameras and cell phones.\nVoltage depression is caused by repeated over-charging of a battery, which causes the formation of small crystals of electrolyte on the plates. These can clog the plates, increasing resistance and lowering the voltage of some individual cells in the battery. This causes the battery as a whole to seem to discharge rapidly as those individual cells discharge quickly and the voltage of the battery as a whole suddenly falls. This effect is very common, as consumer trickle", "charging will make the electrolyte continuously produce hydrogen-oxygen gas. Under the action of internal high pressure, the oxygen penetrates to the negative electrode and interacts with the cadmium plate to generate CdO, resulting in the decrease of effective capacity of the electrode plate. As the acceptable current capacity of the battery decreases gradually with the progress of the charging process, it will lead to the overcharging of the battery in the later charging period. Constant current in the late charge is mostly used for electrolysis of water to produce gas, making the battery internal pressure rise, do not control easy", "typically require the charger to carefully monitor battery parameters such as terminal voltage and temperature to prevent overcharging and so damage to the cells. Such high charging rates are possible only with some battery types. Others will be damaged or possibly overheat or catch fire. Some batteries may even explode. For example, an automobile SLI (starting, lighting, ignition) lead-acid battery carries several risks of explosion. Simple charger A simple charger works by supplying a constant DC or pulsed DC power source to a battery being charged. A simple charger typically does not alter its output based on charging time or", "battery is frequently charged; fully discharging the cells will degrade their capacity relatively quickly, but most such batteries are used in equipment which can sense the approach of fill discharge and discontinue equipment use. When stored after charging, lithium battery cells degrade more while fully charged than if they are only 40-50% charged. As with all battery types, degradation also occurs faster at higher temperatures. Degradation in lithium-ion batteries is caused by an increased internal battery resistance often due to cell oxidation. This decreases the efficiency of the battery, resulting in less net current available to be drawn from the", "cycle approach, where a pulse of a higher current is used whenever the battery's voltage drops below 1.3 V. This can extend battery life and use less energy. ΔV charging method In order to prevent cell damage, fast chargers must terminate their charge cycle before overcharging occurs. One method is to monitor the change of voltage with time. When the battery is fully charged, the voltage across its terminals drops slightly. The charger can detect this and stop charging. This method is often used with nickel–cadmium cells, which display a large voltage drop at full charge. However, the voltage drop", "State of charge State of charge (SoC) is the level of charge of an electric battery relative to its capacity. The units of SoC are percentage points (0% = empty; 100% = full). An alternate form of the same measure is the depth of discharge (DoD), the inverse of SoC (100% = empty; 0% = full). SoC is normally used when discussing the current state of a battery in use, while DoD is most often seen when discussing the lifetime of the battery after repeated use.\nIn a battery electric vehicle (BEV), hybrid vehicle (HV), or plug-in hybrid electric vehicle (PHEV),", "In-cell charge control In-Cell Charge Control or I-C3 is a method for very rapid charging of a Nickel-metal hydride battery, patented by Rayovac. Batteries using this technology are commonly sold as \"15-minute rechargeables\".\nThe charge control consists of a pressure switch built into the cell, which disconnects the charging current when the internal cell pressure rises above a certain limit (usually 200 to 300 psi or 1.4 to 2.1 MPa). This prevents overcharging and damage to the cell.", "the battery produces, of the same polarity), forcing a charging current to flow within the battery from the positive to the negative electrode, i.e. in the reverse direction of a discharge current under normal conditions. The lithium ions then migrate from the positive to the negative electrode, where they become embedded in the porous electrode material in a process known as intercalation.\nEnergy losses arising from electrical contact resistance at interfaces between electrode layers and at contacts with current-collectors can be as high as 20% of the entire energy flow of batteries under typical operating conditions. Extreme temperatures Charging temperature", "interface between the electrodes and the electrolyte. With time, the charge stored in the chemicals at the interface, often called \"interface charge\", spreads by diffusion of these chemicals throughout the volume of the active material.\nIf a battery has been completely discharged (e.g. the car lights were left on overnight) and next is given a fast charge for only a few minutes, then during the short charging time it develops only a charge near the interface. The battery voltage may rise to be close to the charger voltage so that the charging current decreases significantly. After a few hours", "periods (weeks) without significantly reducing the lifetime of the battery. During this phase, the charge current decreases gradually to a small residual value that compensates for any self-discharge of the battery. Special cases A bad battery will have short I-phase and Uo-phase, but there is a risk of gassing, further damaging the battery.\nIf a battery is connected to a significant load during charging, the end of the Uo-phase may never be reached and the battery will gas and be damaged, depending on the charge current relative to the battery capacity.", "Battery pack Calculating state of charge SOC, or state of charge, is the equivalent of a fuel gauge for a battery. SOC cannot be determined by a simple voltage measurement, because the terminal voltage of a battery may stay substantially constant until it is completely discharged. In some types of battery, electrolyte specific gravity may be related to state of charge but this is not measurable on typical battery pack cells, and is not related to state of charge on most battery types. Most SOC methods take into account voltage and current as well as temperature and", "battery's life cycle and efficiency has also improved in comparison to the traditional charging method.\nHowever, oxygen will be produced during charging, and in a closed environment, the oxygen produced by positive electrons will pass through its casing. The oxygen will then be absorbed by the negative electrons, so the chemical reaction forms a cyclic reaction. Since the battery is closed, the internal pressure is contained. Therefore, if the charging voltage is too high, the negative electron will no longer be absorbed at the same rate as the production of oxygen, which will lead to damage of the battery after an", "Charge-depleting Charge-depleting or EV mode refers to a mode of vehicle operation that is dependent on the \nenergy from the battery pack. Battery electric vehicles operate solely in this mode. Most plug-in hybrids operate in charge-depleting mode at startup, and switch to charge-sustaining mode after the battery has reached its minimum state of charge (SOC) threshold, exhausting the vehicle's all-electric range (AER). Although there is no technically mandated minimum all-electric range, future state and/or federal legislation may address this for policy purposes.\nAnother charge-depleting strategy is called blended mode, in which the engine supplements the battery during medium to heavy", "at the interface between the electrodes and the electrolyte, are initially affected. With time, the charge stored in the chemicals at the interface, often called \"interface charge\" or \"surface charge\", spreads by diffusion of these chemicals throughout the volume of the active material.\nConsider a battery that has been completely discharged (such as occurs when leaving the car lights on overnight, a current draw of about 6 amps). If it then is given a fast charge for only a few minutes, the battery plates charge only near the interface between the plates and the electrolyte. In this case", "hundreds of times. The apparent symptom is that the battery \"remembers\" the point in its charge cycle where recharging began and during subsequent use suffers a sudden drop in voltage at that point, as if the battery had been discharged. The capacity of the battery is not actually reduced substantially. Some electronics designed to be powered by Ni–Cd batteries are able to withstand this reduced voltage long enough for the voltage to return to normal. However, if the device is unable to operate through this period of decreased voltage, it will be unable to get enough energy out of the", "manual, or may include controls for time and charging voltage. Battery chargers that apply high voltage (for example, more than 14.4 volts on a 12 volt nominal system) will result in emission of hydrogen gas from the battery, which may damage it or create an explosion risk. A battery may be recharged without removal from the vehicle, although in a typical roadside situation no convenient source of power may be nearby. Battery booster and jump starter Some AC battery chargers have a boost, engine start, or engine assist feature. Despite being able to assist in jump starting a dead", "are flooded with an electrolyte of 30% aqueous solution of potassium hydroxide (KOH). The specific gravity of the electrolyte does not indicate if the battery is discharged or fully charged but changes mainly with evaporation of water. The top of the cell contains a space for excess electrolyte and a pressure release vent. Large nickel-plated copper studs and thick interconnecting links assure minimum equivalent series resistance for the battery.\nThe venting of gases means that the battery is either being discharged at a high rate or recharged at a higher than nominal rate. This also means the electrolyte lost during venting", "chargers typically overcharge. Repair The effect can be overcome by subjecting each cell of the battery to one or more deep charge/discharge cycles. This must be done to the individual cells, not a multi-cell battery; in a battery, some cells may discharge before others, resulting in those cells being subjected to a reverse charging current by the remaining cells, potentially leading to irreversible damage. High temperatures High temperatures can also reduce the charged voltage and the charge accepted by the cells. Deep discharge Some rechargeable batteries can be damaged by repeated deep discharge. Batteries are composed of multiple similar, but", "the battery plates, forming a spongy film. If the battery is immediately recharged, the film will dissolve back into the acid.\nIf the battery is stored or repeatedly operated in this partially charged state for an extended period, the film will slowly crystallize into a solid. This process of \"sulfation\" takes time, so it only has a chance to build to significant levels if the battery is repeatedly discharged below this critical level. There are numerous other conditions that can lead to the same problem developing.\nBatteries also have a small amount of internal resistance that will discharge the battery even when", "In all lead-acid battery designs, charging current must be adjusted to match the ability of the battery to absorb the energy. If the charging current is too great, electrolysis will occur, decomposing water into hydrogen and oxygen, in addition to the intended conversion of lead sulfate and water into lead dioxide, lead, and sulfuric acid (the reverse of the discharge process). If these gases are allowed to escape, as in a conventional flooded cell, the battery will need to have water (or electrolyte) added from time to time. In contrast, VRLA batteries retain generated gases within the battery as", "can be misleading. To avoid this confusion, researchers sometimes use cumulative discharge defined as which total amount of charge (Ah) delivered by the battery during its entire life or equivalent full cycles, which represents the summation of the partial cycles as a fractions of a full charge-discharge cycle. Battery degradation during the storage is affected by temperature and battery state of charge (SOC) and a combination of full charge (100% SOC) and high temperature (usually > 50 °C) can result in sharp capacity drop and gas generation.\nMultiplying the battery cumulative discharge (in Ah) by the rated nominal Voltage gives the total", "Business Department in Gainesville, Florida, and later retracted by them, but the damage was done. It is unlikely to be a real phenomenon, but has taken on a life of its own as an urban myth.\nThe battery survives thousands of charges/discharges cycles. Also it is possible to lower the memory effect by discharging the battery completely about once a month. This way apparently the battery does not \"remember\" the point in its charge cycle.\nAn effect with similar symptoms to the memory effect is the so-called voltage depression or lazy battery effect. This results from repeated overcharging; the symptom is that" ]
why are there only ever 2 or 3 NFL games available on tv each Sunday, instead of 5-10 like for college games?
[ "> many games available on standard cable packages like college?\n\nBecause they make more money the way it is currently setup. It's pretty simple at that. They have limited games on broadcast TV which they charge crazy rates for, which in turn is a limited amount of games people can watch which means everyone is watching them and the networks can charge crazy rates for ads.\n\nThe NFL then sells exclusive access to Sunday Ticket to DirecTV for a giant rate (DirecTV paid way too much) to make even more money.\n\nThe NFL is unarguably the best league in the world of sports at crafting and learning how to extract maximum value from their TV rights. Other leagues like the English Premier League, UEFA, NBA and such are all learning from the NFL's examples on how to craft TV deals, the NFL is just the best at it.", "Fox and CBS have locked down the NFL game market, meaning you are only going to get 1 game on each per timeslot. \n\nThey LIKE having it that way (both NFL and networks) as if people want more they have to buy the pricey subscriptions from the NFL. \n\nFor college ESPN jumped in int he 90's and is basically king. Meaning that they can put a game on their 5 different channels. Then you do have Fox with a few of the conferences on their 2 channels, NBC has their Notre Dame deal, and the SEC with CBS. \n\nTL'DR, ESPN saw the value in saturating the market with CFB due to so many games and jumped in. While the NFL likes keeping it exclusive to also drive subscribers for out of market games.", "The big reason is that the NFL wants you to watch and go to the games of your home team, even if you don't really have a home team. They will not show a competing game if your home team is on due to blackout rules and they won't even show the game if it didn't sell enough tickets." ]
[ "three prime time games each week. The Thursday night game is broadcast by the NFL Network (with, since 2018, ten of those Thursday games also being simulcast by Fox). The Sunday night game is broadcast by NBC, while the Monday night game is broadcast by ESPN.\nThe NFL uses a strict scheduling algorithm to determine which teams play each other from year to year, based on the current division alignments and the final division standings from the previous season. The current formula has been in place since 2002, the last year that the NFL expanded its membership. Generally,", "\"A\" games are usually the primary game for each network (1:00 ET for Eastern and Central time zone or 4:05 ET for Mountain and Pacific time zone games in a single-game week), and if the network has a doubleheader, is typically the 4:25 ET game (the NFL typically will move primary games from 1:00 ET to 4:25 ET). \"B\" games are typically the primary 1:00 ET game when the network has a doubleheader, or the secondary game if the network has a single game. \"C\" games are only shown in the playing teams markets and in some cases, markets if", "game, and the other an interconference game. This setup provides one game each for Fox and CBS. From 2006 to 2011, a third game (no fixed teams) was established on the NFL Network. Starting in 2012, the third game is an NBC game. In the future, the NFL may use flexible scheduling to allow the Lions or Cowboys to host a prime-time game, provided an Eastern time zone team is given the early (12:30 p.m.) slot.\nThe NFL's anti-siphoning regulations affect both Monday Night Football on ESPN and NFL Network games. In the markets of the participating teams, the respective cable channel", "any regular season games on Saturday.\nIn 2014, the NFL returned to Saturdays with a Week 16 doubleheader, with the Saturday afternoon game airing on the NFL Network and a Saturday night game airing on CBS. CBS Sports produced coverage for both games. In 2015, this schedule was modified again to one Saturday night game during both Week 15 and Week 16, these games were cable-only and produced by CBS. In 2016, Christmas fell on a Sunday, so the regional slate of week 16 games will air on Saturday afternoon, with a national game also airing that night, along with a", "possible, although the games broadcast during the main afternoon windows are determined by the viewer's region, and viewers must purchase the out-of-market sports package NFL Sunday Ticket (which is carried exclusively by DirecTV) in order to view games that are not shown in their region. Certain flagship games are also broadcast nationally on network television, including NBC's weekly Sunday Night Football, as well as the three annual Thanksgiving Day games, and the entirety of the post-season.\nESPN's Monday Night Football, as well as selected Thursday Night Football games on NFL Network, are only televised nationally on pay television. In these cases,", "Doubleheader (television) National Football League National Football League (NFL) games played in the usually start around 1:00 p.m. or 4:00 pm Eastern Time, creating a 1:00/4:00 p.m. doubleheader in the Eastern Time Zone and a 10:00 a.m./1:00 p.m. doubleheader in the Pacific Time Zone.\nThe two networks that hold the rights to broadcast NFL games on Sunday afternoons – Fox and CBS – both typically air doubleheaders during the regular season (with the other network only being permitted to broadcast one game in a specific market; each network is given eight doubleheaders to broadcast during the season, and both networks are", "basically state that teams televised in two markets must play their games at different times in the day or week, or one of the teams must be on the road, or the teams' games must be on different networks. (For example, an NFL schedule for a given week in markets with two team franchises might look like this: Oakland at Kansas City, 1:00 p.m.; New York Giants at Philadelphia, 1:00 p.m.; San Diego at San Francisco, 4:15 p.m.; and New England at New York Jets, 8:00 p.m.)\nDuring the October 13, 1974, New Orleans Saints–Denver Broncos game, the broadcasting duo of play-by-play announcer Don Criqui", "allows to carry long-form highlights (running up to three minutes, twice as long as the usual allowance). Because of Game 2 of the 2006 World Series, and the preference that no NFL game competes against the Major League Baseball championship series, a one-hour edition aired from 7:00 to 8:00 p.m. on October 22. Additionally, as the NFL spurned Christmas Eve contests (a policy that was revoked in 2007), another one-hour show aired on December 24.\nNBC chooses one game per week to focus on as well. For this game, usually the marquee late matchup on either Fox or CBS, NBC will send", "League-owned NFL Network, on cable television, also broadcasts a selected number of games nationally. In 2017, the NFL games attracted the top three rates for a 30-second advertisement: $699,602 for NBC Sunday Night Football, $550,709 for Thursday Night Football (NBC), and $549,791 for Thursday Night Football (CBS).\nUnder the current contracts, regionally shown games on Sunday afternoons are televised on CBS and Fox, which primarily carry games of AFC and NFC teams respectively (the conference of the away team generally determines the broadcaster of an inter-conference game). Nationally televised regular season games on Sunday and Monday nights are aired on NBC", "its doubleheaders or 4:05 single-games. This is because 60 Minutes is one of its signature shows, and CBS makes every effort to start it as close to 7:00 or 7:30—its traditional airtime—as possible. Local syndication of cable games To maximize TV ratings, as well as to protect the NFL's ability to sell TV rights collectively, games televised on ESPN or the NFL Network are blacked out in each of the primary markets of both teams (the Green Bay Packers have two primary markets, Green Bay and Milwaukee, a remnant of when they played some home games in Milwaukee each season,", "match between the Lions and the Baltimore Colts.\nStarting in 2012, all three broadcast networks with NFL rights will carry one game apiece. The first two games are split between CBS and Fox. These games are rotated annually, with CBS getting the 12:30 p.m. (EST) \"early\" game, and Fox getting the 4:25 p.m. \"late\" game in even-numbered years, while Fox likewise gets the \"early\" game and CBS the \"late\" game in odd-numbered years. The third game, with a prime time 8:30 p.m. start, is carried by NBC. The NFL may involve the Flexible Scheduling rule in the future to reassign games if the", "NFL GameDay 98 Gameplay NFL GameDay 98 is a football game featuring polygon players and a 3D engine. Development Jerome Bettis and Tim Brown served as the motion capture actors for the game. Reception Next Generation reviewed the PlayStation version of the game, rating it five stars out of five, and stated that \"In the end there is no denying that GameDay is the best football game series around, more impressive still when you consider that it continues to evolve, season after season. Sony has simply done it right.\"", "afternoon regional games to be watched. The only exception is that Sunday Ticket is subject to the same blackout rules as broadcast networks. This package is exclusive to DirecTV in the US. In Canada, NFL Sunday Ticket is available on a per-provider distribution deal on both cable and satellite, because Canadian law generally prevents one provider from offering a package on an exclusive basis. Television policies The NFL imposes several television and blackout policies to maximize ratings and optimize stadium attendances. Mid-game switches During the afternoon games, CBS and Fox may switch a market's game to a more competitive one", "at least one game broadcast in every market, so some exceptions are granted to this rule, typically when one of the two Sunday game networks has a 1:00 p.m. or 4:30 p.m. live non-NFL event, such as golf, tennis, or baseball.\nSince 2014, this rule has not applied in Week 17 when both CBS and Fox have the doubleheader, so all markets receive four games that week. In 2019, this rule was loosened as a one-year test, allowing each market to air three games in some weeks regardless if the local team is playing at home.\nPrior to the 2000 season, doubleheader rules were", "at least two Saturday afternoon national broadcasts in December, with ESPN also airing one Saturday game in primetime from 1998 to 2005.\nIn 2006, the schedule was cut to three Saturday games, which aired in primetime and were televised on the NFL Network in December. In 2008, this was changed to only one Saturday game, still aired in primetime on the NFL Network, which was the policy through 2011. For the 2012 season, ESPN aired the lone Saturday game in primetime. No Saturday game was scheduled in 2013, the first time since the 1970 merger that the NFL did not play", "in week 10 instead. However, the other two types of flexible scheduling changes—moving a game from early to late, or changing networks—is still possible during such weeks. The NFL went around the flexible scheduling procedure prohibition in the 2016 NFL season where Christmas falls on a Sunday by scheduling two Sunday games at 4:30 p.m. and 8:30 p.m. ET, respectively.\nDuring the last week of the season, the league could reschedule games as late as six days before the contests so that as many of the television networks as possible will be able to broadcast a game that has major playoff", "late-season Friday and Saturday night games, the Pro Football Hall of Fame Game, mid-season NFL International Series games (since 2009), the season-opening NFL Kickoff Game, all playoff games, the Super Bowl, and the Pro Bowl. These games are distributed throughout the United States and (through TSN Radio) Canada. History of NFL games on Westwood One's predecessors While major networks such as Westwood One, CBS, NBC, and Mutual held exclusive rights to most national broadcasts of the NFL throughout the league's history, Dial Global's predecessor, Jones Radio Networks, had carried several years' worth of Sunday afternoon games nationwide. Beginning in 2002,", "much more restrictive. Pre-2000, only one game from each network could be aired in a market where a home game was played, even if the home game was on the doubleheader network. Therefore, markets with two teams (such as New York) rarely got more than two games, since odds were that one of the two teams would be at home on any given Sunday. National games National broadcasts of marquee matches occur on Thursday, Sunday and Monday nights. NBC has broadcast rights to Sunday night games. These are televised under a special \"flexible schedule\" that allows Sunday afternoon", "them the second. When the Saturday night action became infrequent, Westwood One opted to not have a specific team to cover those matchups. Former Sunday doubleheader coverage Prior to 2018, The NFL on Westwood One featured two games each week from the Sunday afternoon lineup, with one beginning at 1:00 pm and one at 4:25 pm. Westwood One marketed these games as \"tripleheaders\" when also including the Sunday Night Football broadcasts.\nDuring the 2013 season, due to the rescheduling of the San Diego Chargers–Oakland Raiders Week 5 game to 8:25 pm PDT, the network had obtained the rights to broadcast that", "were in the Western United States, it was not possible to have regional coverage in both time slots on either day.\nThe NFL continued to avoid Christmas even after it started to increase the regular season and the playoffs. The league expanded to a 16-game regular season and a 10-team playoff tournament in 1978, but it was not until 1982 that the regular season ended after Christmas, due to the players' strike. In 1989, the NFL tried another Christmas Day game, with the Cincinnati Bengals hosted by the Minnesota Vikings, but it was a 9:00 p.m. ET Monday Night Football contest, thereby", "the Pro Bowl are nationally televised on either Saturday or Sunday in January and early February, and either in the afternoon or in primetime.\nScheduling during the NFL preseason is more lenient in that most games usually start based on the local time. Thus, games on the West Coast are usually played after 7:00 p.m. Pacific Time (10:00 p.m. Eastern Time). However, the handful of primetime, nationally televised preseason games are still played at approximately 8:30 p.m. Eastern Time. Current broadcasting contracts The television rights to the NFL are the most expensive rights of not only any American sport, but any American entertainment property.", "team plays the early game of a doubleheader, that game holds importance over any late game. If the local team's early game runs beyond 4:25 p.m., the primary and secondary markets stay on until completion, and the late game is joined in-progress. Chargers and Rams The Los Angeles Chargers and Los Angeles Rams gained shared-marked status, after the Rams' returned to Los Angeles (from St. Louis) in 2016, followed by the Chargers (from San Diego) in 2017. The same West Coast television policies that apply to the 49ers and Raiders (see above) are expected to apply to both the Chargers and", "the NFL expanded its weekly games into Thursday nights on a regular basis, a package of Saturday night games was added as part of it and the entire broadcast package was titled Run to the Playoffs. As Westwood One had already had rights to the late season Saturday afternoon tripleheaders through 2005, the network retained its rights when the Saturday action was reduced to one game.\nFor the first two seasons, where three Saturday Night Football games were broadcast, Westwood One carried a separate broadcast team for those games. Joel Meyers called the games the first year while Don Criqui called", "over-the-air stations in the Boston TV market). This however, did not lead to the NFL offering this package to other channels; the games remain on the NFL Network as of 2019, although cable coverage of NFL Network has increased in the intervening period.\nSince 2012, a Thursday night game went into effect during every week of the season with the exception of Week 17. Each game is aired on the NFL Network, with the exceptions of the Week 1 NFL Kickoff and Thanksgiving Day games, which are aired on NBC. The season-kickoff game for the 2012 season was moved up a", "before 5:30 p.m. local time, or 12:30 p.m. ET). For the 2022 FIFA World Cup, Fox will not have a Week 16 early game because of the World Cup Final being scheduled to start during the NFL early game slot. However, conference regulations such as those used in the past no longer apply as the NFL will apply cross-flexing rules to allow CBS a choice of games regardless of conference in the early slot doubleheader. Restrictions on number of games aired The NFL rules have traditionally prohibited other NFL games from being shown on local television stations while a local team", "GameDay 98 is the third video game in the NFL GameDay series. It was released July 31, 1997 on the PlayStation by Sony Interactive Studios America. On the cover is Jerome Bettis. It was the first football video game to feature 3D polygonal graphics; it took longer for football games to adopt fully polygonal graphics than other genres because their large number of players and requisite fast pace made it difficult to do so at a reasonable frame rate. NFL GameDay 99 NFL GameDay 99 is the fourth game in the NFL GameDay series. It was released July 31, 1998", "the Bengals and the Cleveland Browns instead of CBS affiliate WKRC-TV). A Saturday doubleheader was also added on Week 16: NFL Network aired the early game, while CBS aired the second, prime time game.\nThe NFL considered CBS's bid to be the most attractive, owing to the network's overall ratings stature (CBS had been the highest-rated broadcast network in the U.S. since the 2005-06 television season), a commitment to aggressively promote the Thursday games across its properties, and its plans to utilize CBS Sports' top NFL talent and production staff across all of the games in the package to ensure a", "the NFL GameDay series. It was released September 13, 2003 on the PlayStation and PlayStation 2, both by 989 Sports. On the cover is LaDainian Tomlinson. NFL GameDay 2005 NFL GameDay 2005 is the tenth and final game in the NFL GameDay series, and unlike the last few GameDay video games, it is only available on the PlayStation console, and not on the PlayStation 2. It was released on August 1, 2004. On the cover is Derrick Brooks. It was the last first-party (Sony) game published for the Playstation though there were sporadic official releases in 2005 and 2006 by", "\"doubleheader\" week game (either CBS or Fox) will be able to switch one game per week into the 4:15 PM (US\nET) time slot, except in the final week, when NBC will select one game for the 8:15 PM slot, and both CBS and Fox will have doubleheader games on December 30.\nThe first flex game was the New England Patriots visiting the Buffalo Bills on November 18. The next flexing came when it was announced that the December 23 Washington Redskins–Minnesota Vikings game was moved to 8:15 PM on NBC, replacing the Tampa Bay Buccaneers–San Francisco 49ers contest, which was moved to 4:05 PM to", "Coast) pre-empting the Sunday editions of the CBS Evening News and affiliates' local newscasts.\nStarting in the 2012–2013 season, in order to accompany a new NFL rule that the second game of an NFL doubleheader start at 4:25 p.m., CBS officially changed the start time of 60 Minutes to 7:30 p.m. Eastern time on Sundays in Eastern and Central Time Zone markets when there is an NFL doubleheader scheduled to air (there are nine doubleheaders during the NFL season – eight during the first 16 weeks of the season, and the final week) to protect against overruns. The start time remains at" ]
How come old people sound "old". I'm not sure how else to explain it but they just sound different and harder to understand?
[ "The cartilages in the vocal tract calcify and stiffen and the muscles get weaker. It makes their voice breathier and makes it more difficult to keep the pitch and loudness steady.", "In addition to /u/Holyrush's comment, it could be due to accent differences amongst generations." ]
[ "many people as they get older, typically affecting those over the age of 65. This type of hearing loss can lead to feelings of embarrassment and isolation due to the fact that those affected may no longer be able to hear family, friends, or simple everyday sounds. Those with hearing loss are less likely to want to engage in social activities due to frustration over not being able to hear. A study conducted by the National Council of Aging (NCOA) showed that a large portion of elders with hearing loss who were studied, reported symptoms of lasting depression. Higher rates", "University Press in 1994, where Hazan defined and summarized his findings from his various field researches. He tries to find out if we can understand old age, or if old age has a uniqueness we cannot know. In his opinion, the attempt to understand old age is prone to failure, and there is no correspondence between the language in which old people speak in their behavioral world to the language used by the academy or society – in cultural representation, imagery, myths and stereotypes – to speak of \"the elderly\". The problems with representation of time, space and meaning, caused", "A Language Older Than Words A Language Older Than Words is a non-fiction book by Derrick Jensen, first published in 2000. The author uses his own personal experience of abuse as a springboard for looking at civilization as a culture of abuse, exploring the connections between various atrocities. Jensen also urges his readers to reconnect with the land.", "that as their hearing became less acute with age, people would require additional effort to make out what was said and that this effort made it harder to remember it.", "language is used instinctively by the Old One when speaking to members of the Light or the Dark. Will Stanton begins to do this without even realizing it. When an Old One speaks the Old Speech in front of a normal human, it will sound like gibberish.\nSome agents of the Dark, such as the Rider, can also speak Old Speech, but with a distinctive accent which gives them away to the Old Ones. Rhymes Small rhyming prophecies serve to guide the protagonists throughout the series. Science Fiction author and filker Julia Ecklar has set these rhyming prophecies to music,", "Old person smell Old person smell is the characteristic odor of elderly humans. Much like many animal species, human odor undergoes distinct stages based on chemical changes initiated through the aging process. Research suggests that this enables humans to determine the suitability of potential partners based on age, in addition to other factors.\nOne study suggested that old person smell may be the result of 2-nonenal, an unsaturated aldehyde which is associated with human body odor alterations during aging; however, there are other hypotheses. Another study failed to detect 2-nonenal at all, but found significantly increased concentrations of benzothiazole, dimethylsulphone, and", "Hearing loss has multiple causes, including ageing, genetics, perinatal problems and acquired causes like noise and disease. For some kinds of hearing loss the cause may be classified as of unknown cause. Age There is a progressive loss of ability to hear high frequencies with aging known as presbycusis. For men, this can start as early as 25 and women at 30. Although genetically variable it is a normal concomitant of ageing and is distinct from hearing losses caused by noise exposure, toxins or disease agents. Common conditions that can increase the risk of hearing loss in elderly people", "significant effects on the elderly and young people. These effects might be seen within different levels: person, selected company, whole economy. The stereotypes and infantilization of older and younger people by patronizing language affects older and younger people's self-esteem and behaviors. After repeatedly hearing a stereotype that older or younger people are useless, older and younger people may begin to feel like dependent, non-contributing members of society. They may start to perceive themselves in terms of the looking-glass self—that is, in the same ways that others in society see them. Studies have also specifically shown that when older and younger", "about talk, situational perceptions, interactional goals, and various language devices between the young and the elderly are all taken into account as empirical questions in their own right when using communication accommodation theory to explore intergenerational communication problems and improve effectiveness. Previous researchers have also developed models such as the communication predicament model of ageing, and the communication enhancement model of ageing, to point out numerous consequences brought by both negative and positive attitudes towards aging. Young-to-elderly language strategies Even though young people are more likely to perceive the old by multiple stereotypes, the elderly are negatively evaluated in most", "of the most pervasive of young-to-elderly language strategies. The \"simple perception of an addressee's social category membership being old – and, independently of a particular handicap (if any), considerations of dependency and in-group symbolization are sufficient to invoke negative physical, social, and psychological inferences for many younger people\". Communication between old and young people in various relationships Giles has studied the interaction of young and elderly persons in business settings using communication accommodation as a theoretical framework. Findings demonstrated that elderly persons tend to be less accommodating than their younger counterparts. Findings also demonstrated that, for example, in business", "by the gap between the two, are used as keys for the existing discourse between old people, without presuming to break into the uniqueness of the experience of aging. From First Principles: An Experiment in Ageing This book, published in 1996, is the product of the ethnographic field research Hazan conducted with 500 elderly people in Cambridge, England, who were part of the University of the Third Age. In this organization, elderly people volunteer to teach themselves and share their knowledge with others in their age group. They established a research committee for matters of old age, where they examined", "as adults age. \nWhen an older individual is completing a task, such as having a conversation or doing work, they are using their working memory to help them complete this task. As they age, their ability to multi-task seems to decline; thus after an interruption it is often more difficult for an aging individual to successfully finish the task at hand. Additionally, working memory plays a role in the comprehension and production of speech. There is often a decline in sentence comprehension and sentence production as individuals age. Rather than linking this decline directly to deficits in linguistic ability, it", "younger speakers. Examples pulled from a research survey include 気張いやんせ kibai-yanse \"please do your best\", おやっとさあ oyattosaa \"thank you for your work\", あにょ anyo \"older brother\", げんね genne \"shy\", and がっつい gattsui \"exactly\", among numerous others. The same research also revealed through interviews that, while people generally felt a positive vibe to hearing the traditional dialect spoken, those under the age of 40 expressed some difficulty understanding. One woman in her sixties was quoted saying: \"There are now very few people who can use the true dialect\".\nEfforts to document the dialects or promote them through cultural means are few, though", "most instances, or even [ˈzɛʁfɐ] among elderly speakers, at least.", "adults on categorical or general knowledge about an event to recognize particular elements from the event. Older adults are also less likely to correctly remember contextual features of events, such as their color or location. This may be because older adults remember (or rely on) fewer source identifying characteristics than the young. Consequently, older adults must more often guess or base a response on less specific information, such as familiarity. As a result, if they can't remember something, they are more likely to fill in the missing gaps with things that are familiar to them. Getting the 'gist' Older adults", "adults could also be impacted by age. Older adults were significantly slower to respond to lower frequency words but were faster to process higher frequency words. Spoken words In several studies, participants read a list of high or low frequency words along with nonwords (or pseudowords). They were tasked with pronouncing the words or nonwords as fast as possible. High frequency words were read aloud faster than low frequency words. Participants read the nonwords the slowest. More errors were made when pronouncing the low frequency words than the high frequency words. Driving Quick recognition of a word", "old age. The elderly are the product of physiological-biological deterioration, while functions and old age are derivatives of society and culture. There is no \"natural\" affinity between the former and the latter, it is only the human environment in which the elderly live that forces that affinity on them and on itself as though it were an inevitability. The differentiation which distinguishes between the two is similar to the differentiation between sex and gender, presenting the world of old age as one that is constructed of two circles, only partially congruent: the culture circle, defining old age in terms of", "nonanal on older subjects.\nIn 2012 the Monell Chemical Senses Center published a press release claiming that the human ability to identify information such as age, illness, and genetic suitability from odor is responsible for the distinctive \"old man smell\". Sensory neuroscientist Johan Lundström stated, \"Elderly people have a discernible underarm odor that younger people consider to be fairly neutral and not very unpleasant.\"\nOld person smell is known as kareishū (加齢臭) in Japan, where it is of particular concern due to the high value placed on personal hygiene.", "in the elderly, necessitating medication adjustment.\nThe presentation of disease in elderly persons may be vague and non-specific, or it may include delirium or falls. (Pneumonia, for example, may present with low-grade fever and confusion, rather than the high fever and cough seen in younger people.) Some elderly people may find it hard to describe their symptoms in words, especially if the disease is causing confusion, or if they have cognitive impairment. Delirium in the elderly may be caused by a minor problem such as constipation or by something as serious and life-threatening as a heart attack. Many of these problems", "to older adults as if they are less competent, older adults find fewer opportunities to communicate effectively and may experiences declines in self-esteem, depression, assumption of dependent behaviour consistent with their stereotypes of elderly individuals. They can even become less interested in social interaction. This cycle of communication is often referred to as the “communication predicament of aging”. Adults receiving elderspeak are often judged by the speaker as being not only less competent, but also being in a worse disposition. The same study showed that when using elderspeak, the speaker was judged as having a worse disposition as well.\nElderspeak can", "they acquired the knowledge to the knowledge itself. Age-related Elderly individuals have been shown to exhibit source amnesia. Compared to younger individuals, in experiments where the individuals are presented with obscure or even made up trivia facts, older people remember less information overall in both recall and recognition tasks and they often misattribute the source of their knowledge, at time periods of both long and short delays.\nThis effect is potentially due to the neuronal loss associated with aging occurring mainly in the frontal lobes. It has been previously noticed that frontal lobe damage can cause source amnesia, so the loss", "thoughts frankly. Influence As the word 'kkondae' came along, people began to refrain from acting on themselves and their thoughts to force others to agree. Also, people with older or more life experiences tend to try to understand young cultures, and a combination of older generations and current generations of cultures is emerging. This phenomenon appears in various areas. For example, there are music, TV programs, and fashion. Music The combination of the atmosphere of old songs and the current trendy songs is producing the area of new music. In addition, the old singer and the current singer work together", "and other eating disorders.\nOld talk refers to negative statements about wrinkles, skin tone, yellowing teeth, and other physical aspects of the natural aging process. Women who engage in old talk are more likely to be dissatisfied with their bodies, engage in self-objectification, suffer from depression and anxiety, and it may even decrease their quality of life and actual lifespan. Both fat and old talk result in higher self-objectification, as women measure themselves against and attempt to reach an unrealistic standard. In different generations One period of time in a woman's life where self-objectification happens excessively is during pregnancy. Magazines offer", "on society’s ability to support the needs of this growing crowd including their dental needs.\nOlder people have become a major focus for the oral health industry. Due to the increasing number and proportion of elderly people, age related dental problems have become more common. This is largely due to success in dental treatment and prevention of gum disease and caries at a young age, thereby leading to people retaining more of their own natural teeth. As they get older, the retained teeth are at risk of developing and accumulating oral diseases that are more extensive and severe. Geriatrics as a", "who maintain the language are elderly, which adds to the likelihood that language extinction is near.\nEthnologue categorizes it as a moribund language (EGIDS 8a). The only fluent speakers that are left are older than the child-bearing age, which ultimately makes integration of the language into subsequent generations highly improbable. Mechanisms of transmission would have to be created from outside the community in order to preserve it.", "the representation of elderly people on television, for instance, but refused to deal with topics related to death, or what they called \"The Fourth Age\", meaning, sick, feeble elderly people. In his research, Hazan found that the elderly tend to develop a language of communication which separates the relationships between themselves and their relationships with the non-elderly world. They dismantled the categories of their lives, such as gender and family, in preparation for death, which could suddenly occur. They were not very sick, but healthy and active, and yet they were preparing for death by decomposing their world. They created", "assume that older adult workers are less productive than their younger counterparts even when regular contact with older adult workers proves these assumptions inaccurate. Unconscious operation of age stereotypes Age stereotypes have been shown to operate unconsciously. For instance, a 1990 study by Purdue and Gurtman demonstrated that the associations made by their college-aged participants between certain negative traits and old age had an \"automatic\" component, such that, when their participants were subliminally primed (i.e., presented with stimuli at speeds sufficient for perception, but not recognition) with the word \"old\", they made associations with negative traits significantly faster than when", "being used more by the older generation. There is a possibility of the language dying out, but it is still in a good standing (Ethnologue).", "older than us, people who are 70 or 80 and they've got attitudes that don't have the deep peaks and valleys as someone who in adolescence who is faced with some things and they go, \"Fuck this, this sucks, how can we have any hope?\" These are people who been through the invention of the horseless carriage to the car to the TV set and are dealing with the internet. How do they view it? It's almost with disdain. This is the wisdom they can't give away, that is what I'm talking about and that youth doesn't have that timeline", "\"second childhood,\" and elders sometimes miss the ageist undertones.\nIn a classic study, researchers analyzed the effects of ageism among the elderly. They performed memory tests on three selected groups: residents of China, deaf North Americans, and hearing North Americans. In the three groups, the Chinese residents were presumably the least exposed to ageism, with lifelong experience in a culture that traditionally venerates older generations. Lifelong deaf North Americans also faced less exposure to ageism in contrast to those with typical hearing, who presumably had heard ageist comments their whole life. The results of the memory tests showed that ageism has" ]
Why do Humans (and most mammals) have individual teeth instead of a beak or solid bony structure?
[ "Only reason I can think of is, if one of em breaks, we can still chew", "We can really only speculate since evolution has decided this is the best thing for us. Individual teeth have some advantages though with the main one being specialization. We have teeth both for tearing foods and grinding while birds and such don't.", "They came from scales on a fish's lip in the Devonian Period. Apparently having [spiky lips](_URL_0_) was better for grasping food than regular fish lips." ]
[ "humans, and some other mammals. In bony fish, amphibians, and reptiles, both maxilla and premaxilla are relatively plate-like bones, forming only the sides of the upper jaw, and part of the face, with the premaxilla also forming the lower boundary of the nostrils. However, in mammals, the bones have curved inward, creating the palatine process and thereby also forming part of the roof of the mouth.\nBirds do not have a maxilla in the strict sense; the corresponding part of their beaks (mainly consisting of the premaxilla) is called \"upper mandible\".\nCartilaginous fish, such as sharks, also lack a true maxilla. Their", "at the back of the lower jaw) and the quadrate (a small bone at the back of the upper jaw). All non-mammalian tetrapods use this system including amphibians, turtles, lizards, snakes, crocodilians, dinosaurs (including the birds), ichthyosaurs, pterosaurs and therapsids. But mammals have a different jaw joint, composed only of the dentary (the lower jaw bone, which carries the teeth) and the squamosal (another small skull bone). In the Jurassic, their quadrate and articular bones evolved into the incus and malleus bones in the middle ear. Mammals also have a double occipital condyle; they have two knobs at the base", "the chewing surfaces of the teeth are so constructed that the upper and lower teeth are able to fit precisely together, cutting, crushing, grinding or tearing the food caught between.\"\nAll mammals except the monotremes, the xenarthrans, the pangolins, and the cetaceans have up to four distinct types of teeth, with a maximum number for each. These are the incisor (cutting), the canine, the premolar, and the molar (grinding). The incisors occupy the front of the tooth row in both upper and lower jaws. They are normally flat, chisel-shaped teeth that meet in an edge-to-edge bite. Their function is cutting, slicing,", "\"beak\"; visible sutures divide the beaks into \"teeth\". This is alluded to in their name, derived from the Greek words tetra meaning \"four\" and odous meaning \"tooth\" and the Latin forma meaning \"shape\". Counting these teeth-like bones is a way of distinguishing similar families, for example, the Tetraodontidae (\"four-toothed\"), Triodontidae (\"three-toothed\"), and Diodontidae (\"two-toothed\").\nTheir jaws are aided by powerful muscles, and many species also have pharyngeal teeth to further process prey items, because the Tetraodontiformes prey mostly on hard-shelled invertebrates, such as crustaceans and shellfish.\nThe Molidae are conspicuous even within this oddball order; they lack swim bladders and spines,", "Mammal tooth Teeth are common to most vertebrates, but mammalian teeth are distinctive in having a variety of shapes and functions. This feature first arose among the Therapsida (mammal-like reptiles) during the Permian, and has continued to the present day. All Therapsid groups with the exception of the mammals are now extinct, but each of these groups possessed different tooth patterns, which aids with the classification of fossils. Diversity The extant mammalian infraclasses each have a set dental formula; the Eutheria (placental mammals) commonly have three pairs of molars and four premolars per jaw, whereas the Metatheria (marsupials) generally have", "vice versa. Despite this debate, it is accepted that vertebrate teeth are homologous to the dermal denticles found on the skin of basal Gnathostomes (i.e. Chondrichtyans). Since the origin of teeth some 450mya, the vertebrate dentition has diversified within the reptiles, amphibians, and fish: however most of these groups continue to possess a long row of pointed or sharp-sided , undifferentiated teeth (homodont) that are completely replaceable. The mammalian pattern is significantly different. The teeth in the upper and lower jaws in mammals have evolved a close-fitting relationship such that they operate together as a unit. \"They 'occlude'\", that is,", "can be seen in some therapsids, in which both points of articulation are present. Aside from the dentary, only few other bones of the primitive lower jaw remain in mammals; the former articular and quadrate bones survive as the malleus and the incus of the middle ear.\nFinally, the cartilaginous fish, such as sharks, do not have any of the bones found in the lower jaw of other vertebrates. Instead, their lower jaw is composed of a cartilagenous structure homologous with the Meckel's cartilage of other groups. This also remains a significant element of the jaw in some primitive bony fish,", "series of triangular cusps or ridges, enabling the ruminants' sideways jaw motions to break down tough vegetable matter. Cheek teeth are sometimes separated from the incisors by a gap called a diastema.\nCheek teeth in reptiles are much simpler as compared to mammals. Roles & Significance Apart from helping grind the food to properly reduce the size of substrates for stomach enzymes, their minor role is in giving shape and definition to the animals' jaws. The shape of cheek teeth are directly related to their function, and morphological differences between species can be attributed to their dietary variations. Additionally, the", "in human teeth can link them to different populations. Teeth exhibit variables with a strong hereditary component that are useful in assessing population relationships and evolutionary dynamics. One example is shovel-shaped incisors, in which individuals have ridges on the inside margins of their front teeth. This trait is most common in East Asian and Native American populations and occurs less frequently elsewhere. Teeth have an important role in chewing food, and different dental pathologies and patterns of tooth wear can indicate kinds of food eaten and other dietary behaviors of certain populations. The measurement and examination of teeth can also", "different from modern herbivorous mammals, as their only teeth were a pair of fangs in the upper jaw and it is generally agreed that they had beaks like those of birds or ceratopsians. Theriodonts The theriodonts (\"beast teeth\") and their descendants had jaw joints in which the lower jaw's articular bone tightly gripped the skull's very small quadrate bone. This allowed a much wider gape, and one group, the carnivorous gorgonopsians (\"gorgon faces\"), took advantage of this to develop \"sabre teeth\". But the theriodont's jaw hinge had a longer term significance — the much reduced size of the quadrate bone", "hollow.\nA bird's beak is primarily made of bone as projections of the mandibles which are covered in keratin.\nA deer's antlers are composed of bone which is an unusual example of bone being outside the skin of the animal once the velvet is shed.\nThe extinct predatory fish Dunkleosteus had sharp edges of hard exposed bone along its jaws.\nMany animals possess an exoskeleton that is not made of bone. These include insects and crustaceans.\nThe proportion of cortical bone that is 80% in the human skeleton may be much lower in other animals, especially in marine mammals and marine turtles, or in various", "larger teeth is because of the requirements for eating raw meat instead of cooked meat like H. sapiens.\nSome have insisted that Ernst Mayr's biological species definition cannot be used to test the above hypotheses—that is, that the two species might be considered the same. Alternatively, the amount of variation of cranial morphology between known specimens of H. erectus and H. ergaster can be compared to the same variation within an appropriate population of living primates (that is, one of similar geographical distribution or close evolutionary relationship), such that: if the amount of variation between H. erectus and H. ergaster is", "premaxillary bones. In many species, they have teeth, supplementing those in the jaw proper; in some labyrinthodonts the teeth on the vomers were actually larger than the primary set. In amphibians and reptiles, the vomers become narrower, due to the presence of the enlarged choanae (the inner part of the nostrils) on either side, and they may extend further back in the jaw. They are typically small in birds, where they form the upper hind part of the beak, again being located between the choanae.\nIn mammals, the vomers have become narrower still, and are fused into a single, vertically oriented", "skull, on the other hand, was similar to some early oviraptorosaurs, having the structure of a beak designed for crushing and tearing with some teeth at the tip of the upper jaw. Thus, the species may have been an opportunistic omnivore (as the name suggests), utilizing a wide range of food sources, unlike other early birds which were active predators of smaller animals.", "crushing. The specialised teeth—incisors, canines, premolars, and molars—are found in the same order in every mammal.\nIn many mammals the infants have a set of teeth that fall out and are replaced by adult teeth. These are called deciduous teeth, primary teeth, baby teeth or milk teeth. Animals that have two sets of teeth, one followed by the other, are said to be diphyodont. Normally the dental formula for milk teeth is the same as for adult teeth except that the molars are missing. Tooth naming discrepancies Teeth are numbered starting at 1 in each group. Thus the human teeth are", "Cheek teeth Cheek teeth or post-canines comprise the molar and premolar teeth in mammals. Cheek teeth are multicuspidate (having many folds or tubercles). Mammals have multicuspidate molars (three in placentals, four in marsupials, in each jaw quadrant) and premolars situated between canines and molars whose shape and number varies considerably among particular groups. For example, many modern Carnivora possess carnassials, or secodont teeth. This scissorlike pairing of the last upper premolar and first lower molar is adapted for shearing meat. In contrast, the cheek teeth of deer and cattle are selenodont. Viewed from the side, these teeth have a", "absent or wholly or partly replaced by cartilage. In mammals and birds, in particular, modifications of the skull occurred to allow for the expansion of the brain. The fusion between the various bones is especially notable in birds, in which the individual structures may be difficult to identify. Bones The jugal is a skull bone found in most reptiles, amphibians, and birds. In mammals, the jugal is often called the zygomatic bone or malar bone.\nThe prefrontal bone is a bone separating the lacrimal and frontal bones in many tetrapod skulls. Bones of human skull Except for the mandible, all of", "all living mammals (including monotremes), but is not present in any of the early Triassic therapsids (\"mammal-like reptiles\"): mammals use two bones for hearing that all other amniotes use for eating. The earliest amniotes had a jaw joint composed of the articular (a small bone at the back of the lower jaw) and the quadrate (a small bone at the back of the upper jaw). All non-mammalian amniotes use this system including lizards, crocodilians, dinosaurs (and their descendants the birds) and therapsids; so the only ossicle in their middle ears is the stapes. But mammals have a different jaw joint,", "many small hinged pedicellate teeth, the bases of which are attached to the jaws while the crowns break off at intervals and are replaced. Most amphibians have one or two rows of teeth in both jaws but some frogs lack teeth in the lower jaw. In many amphibians there are also vomerine teeth attached to the bone in the roof of the mouth.\nThe mouths of reptiles are largely similar to those of mammals. The crocodilians are the only reptiles to have teeth anchored in sockets in their jaws. They are able to replace each of their approximately 80 teeth up", "mouth, but it could be the other way around, as the teleost bony fish Denticeps clupeoides has most of its head covered by dermal teeth (as does, probably, Atherion elymus, another bony fish). This is most likely a secondary evolved characteristic, which means there is not necessarily a connection between the teeth and the original dermal scales.\nThe old placoderms did not have teeth at all, but had sharp bony plates in their mouth. Thus, it is unknown whether the dermal or oral teeth evolved first. It has even been suggested that the original bony plates of all vertebrates are now", "ornithischians, which usually had beaks restricted to the jaw tips. Other researchers have interpreted these ridges as modified versions of similar structures in other ornithischians which might have supported fleshy cheeks, rather than beaks. Stegosaurian teeth were small, triangular, and flat; wear facets show that they did grind their food.\nDespite the animal's overall size, the braincase of Stegosaurus was small, being no larger than that of a dog. A well-preserved Stegosaurus braincase allowed Othniel Charles Marsh to obtain, in the 1880s, a cast of the brain cavity or endocast of the animal, which gave an indication of the brain size.", "the jaw is composed of four bony elements and referred to as a Quadro-articular jaw because the joint is between the articular and quadrate bones. In therapsids (advanced synapsids including mammal ancestors) the jaw is simplified into an articulation between the dentary and the squamous part of the temporal bone, and hence referred to as a dentary-squamosal jaw. In therapsids, the other two bones have moved into the ear to become the malleus and incus.", "Beak The beak, bill, and/or rostrum is an external anatomical structure of birds that is used for eating and for preening, manipulating objects, killing prey, fighting, probing for food, courtship and feeding young. The terms beak and rostrum are also used to refer to a similar mouth part in some ornithischians, pterosaurs, turtles, cetaceans, dicynodonts, anuran tadpoles, monotremes (i.e. echidnas and platypuses, which have a beak-like structure), sirens, pufferfish, billfishes and cephalopods.\nAlthough beaks vary significantly in size, shape, color and texture, they share a similar underlying structure. Two bony projections—the upper and lower mandibles—are covered with a thin keratinized layer", "complex series of shape changes not matched by the teeth, leading to incongruity between dental and mandibular form. These changes in human skulls may have been \"driven by the decreasing bite forces required to chew the processed foods eaten once humans switched to growing different types of cereals, milking and herding animals about 10,000 years ago.\" Treatment Crowding of the teeth is treated with orthodontics, often with tooth extraction, clear aligners, or dental braces, followed by growth modification in children or jaw surgery (orthognathic surgery) in adults. Surgery may be required on rare occasions. This may include surgical reshaping to", "a common feature of beaked theropods (ornithomimosaurs, oviraptorosaurs, therizinosaurs and birds), but unusual among theropods in general. The jaws of Gallimimus were edentulous (toothless), and the front part would have been covered in a keratinous rhamphotheca (horny beak) in life. The beak may have covered a smaller area than in North American relatives, based on the lack of nourishing foramina on the maxilla. The inner side of the beak had small, tightly packed and evenly spaced columnar structures (their exact nature is debated), which were longest at the front and shortening towards the back. Postcranial skeleton Gallimimus had 64–66 vertebrae", "of the species. Canine teeth are believed to be small in the earliest hominins and the reduction of size continues during the early period. In Modern humans, the first molar teeth are the largest among the molars and the overall tooth size is reduced. In the earliest hominins and archaic hominins, second molars were generally the largest of the molars teeth and the third molars were closer to the size of the second molars. The evolution of human tooth size and the masticatory system are not only related to diet and food processing techniques, they are also related to brain", "number, development timeline, and types of teeth. However, some mammals' teeth do develop differently than humans'.\nIn mice, WNT signals are required for the initiation of tooth development. Rodents' teeth continually grow, forcing them to wear down their teeth by gnawing on various materials. If rodents are prevented from gnawing, their teeth eventually puncture the roofs of their mouths. In addition, rodent incisors consist of two halves, known as the crown and root analogues. The labial half is made of enamel and resembles a crown, while the lingual half is made of dentin and resembles a root. The mineral distribution in", "Beak (bivalve) The beak is part of the shell of a bivalve mollusk, i.e. part of the shell of a saltwater or freshwater clam. The beak is the basal projection of the oldest part of the valve of the adult animal. The beak usually, but not always, coincides with the umbo, the highest and most prominent point on the valve. Because by definition, all bivalves have two valves, the shell of a bivalve has two umbones, and two beaks.\nIn many species of bivalves the beaks point towards one another. However, in some species of bivalves the beaks point posteriorly, in", "may be modified to carry sensitive barbels. In birds and turtles, the lips are hard and keratinous, forming a solid beak. Clevosaurids like Clevosaurus are notable for the presence of bone \"lips\"; in these species the tooth-like jaw projections common to all sphenodontians form a beak-like edge around the jaws, protecting the teeth within.", "The types of teeth organisms use to bite varies throughout the animal kingdom. Different types of teeth are seen in herbivores, carnivores, and omnivores as they are adapted over many years to better fit their diets. Carnivores possess canine, carnassial, and molar teeth, while herbivores are equipped with incisor teeth and wide-back molars. In general, tooth shape has traditionally been used to predict dieting habits. Carnivores have long, extremely sharp teeth for both gripping prey and cutting meat into chunks. They lack flat chewing teeth because they swallow food in chunks. An example of this is shown by the broad," ]
Why do people look away from the point of focus to think?
[ "If you look away there's no stimuli trying to get your attention. You can look at a blank wall and not have anything stimulating you while you search your head for the answer." ]
[ "brain concentrate on divergence instead of focusing is to hold the picture in front of the face, with the nose touching the picture. With the picture so close to their eyes, most people cannot focus on the picture. The brain may give up trying to move eye muscles in order to get a clear picture. If one slowly pulls back the picture away from the face, while refraining from focusing or rotating eyes, at some point the brain will lock onto a pair of patterns when the distance between them matches the current convergence degree of the two eyeballs.\nAnother way", "presentation of what they are thinking, even to the point of changing the focus of their eyes. Someone thinking in terms of hearing might turn their eyes as much as possible to one of their ears. A person thinking in terms of what they feel could look downwards, as if looking toward their emotion coming from their body.\nWhether or not someone intends to send a particular meaning, or someone else perceives meaning correctly, the exchange of communication happens and can initiate emotion. It is important to understand these dynamics, because we often establish relationships (on small and grand scales) with", "you can't focus, but your eye can move up and down, left and right. The notion that external muscles affect focusing is totally wrong.\" Science author John Grant writes that many animals, such as fishes, accommodate by elongation of the eyeball, \"it's just that humans aren't one of those animals.\"\nLaboratory tests have shown that the human eyeball is far too rigid to spontaneously change shape to a degree that would be necessary to accomplish what Bates described. Exceedingly small changes in axial length of the eyeball (18.6–19.2 μm) are caused by the action of the ciliary muscle during accommodation. However,", "order to make a difference in the world, it doesn’t take a lot, but simply looking to oneself, “It [takes] looking in the mirror and saying, ‘What can I do?’”.", "focusing their attention on their own neck and the thought that somebody might be staring at it, observing that a person concentrating their attention on their own knee or foot will make that part of the body feel more sensitive. He conducted laboratory experiments with people who claimed to be able to sense the stares of others and those who claimed to be capable of \"making people turn round\", finding in both cases that the results were \"invariably\" negative. Later studies A 1913 study by John E. Coover asked ten subjects to state whether or not they could sense an", "minds, especially college students, should examine unjust and uncommon situations. Picciolini continued that there is a fine line between seeing something and taking action on what they have seen. Picciolini asserted that it is essential to take everything into perspective before drawing a conclusion.", "attention on the inner feeling of 'I' and to hold that feeling as long as possible. They would be told that if their attention was distracted by other thoughts they should revert to awareness of the 'I'-thought whenever they became aware that their attention had wandered. He suggested various aids to assist this process – one could ask oneself 'Who am I?’ or 'Where does this I come from?’ — but the ultimate aim was to be continuously aware of the 'I' which assumes that it is responsible for all the activities of the body and the mind.\nSelf-enquiry can be", "of the mind rarely came into focus in literature until the introspective realism movement in the 19th century. Physical basis The biological foundation of the mind's eye is not fully understood. Studies using fMRI have shown that the lateral geniculate nucleus and the V1 area of the visual cortex are activated during mental imagery tasks. Ratey writes:\nThe visual pathway is not a one-way street. Higher areas of the brain can also send visual input back to neurons in lower areas of the visual cortex. [...] As humans, we have the ability to see with the mind's eye—to have a", "her eyes were moving rapidly. When she brought her eye movements under control while thinking, the thoughts were less distressing.\nIn 2002, Shapiro and Maxfield published a theory of why this might work, called adaptive information processing. This theory proposes that eye movement can be used to facilitate emotional processing of memories, changing the person's memory to attend to more adaptive information. The therapist initiates voluntary rapid eye movements while the person focuses on memories, feelings or thoughts about a particular trauma. The therapists uses hand movements to get the person to move their eyes backward and forward, but hand-tapping or", "an individual is currently looking. With this method the impact of emotional words, when presented parafoveally (Calvo & Castillo, 2009) and the left hemisphere advantage for peripherally presented words (Jordan et al., 2009).\nCritics:\n-Eye fixation show where people are looking, but not what they are thinking. A clear interpretation is hardly doable as a fixation e.g. can occur to an elimination or to another consideration of other alternatives, or it can be learning or eliminating.\n-There are only a few JDM theories that specify a decision process at the level of fixations on individual alternatives or even smaller units such as individual", "the zonula pulling outwards on the lens. This is consistent with the fact that our eyes seem to be in the 'relaxed' state when focusing at infinity, and also explains why no amount of effort seems to enable a myopic person to see farther away.\nThe ability to focus on near objects declines throughout life, from an accommodation of about 20 dioptres (ability to focus at 50 mm away) in a child, to 10 dioptres at age 25 (100 mm), and levels off at 0.5 to 1 dioptre at age 60 (ability to focus down to 1–2 meters only). The expected, maximum, and", "perspective-taking by training animals on specific tasks or by measuring the consistency of animals to follow the eye gaze of humans. Researchers highlight that being able to successful follow another's eye gaze could indicate that the animal is aware that the human is seeing and paying attention to something that is different from what they see.\nOne study that assessed the perspective-taking abilities in spider monkeys and capuchin monkeys found that these primates successfully performed eye gazing tasks which led researchers to conclude that the monkeys demonstrated some ability to consider another person's viewpoint. However, another study that utilized an eye", "we can change these mental habits and have new 'nonanxiety-related' habits become automatic.\" Attention bias \"People differ in how they focus their attention. What you pay attention to plays an important role in how safe or unsafe you feel. If you tend to focus your attention on negative aspects of a situation or cues that might signal danger, you will be more likely to become excessively anxious. Also, the more you look for something, the more likely it is that you will find it; so, if you are always looking for signs of danger, you will be more likely to", "stimuli, attention allows the brain to better focus on what it perceives to be the most important or relevant of these stimuli. Individuals tend to focus their energies on stimuli that are particularly stimulating or engaging. Indicating that the more attention a stimulus garners, the more frequent one's energy and focus will be directed towards that stimulus. This idea suggests an individual will focus their attention on new or unfamiliar stimuli in an effort to better understand or make sense of the unknown over the more familiar or repetitive stimuli. Creating the idea that curiosity demands attention. Striatum The striatum", "be coming from, but can actually manipulate how one reacts to an experience as well, given that it is vision that is taking charge.\nA study by Remington, Johnston, & Yantis (1992) found that attention is involuntarily drawn away from a given task when a visual stimulus interferes. In this study, participants were presented with four boxes; they were told that an image would precede a letter that they were to memorize. The conditions were either to attend to the same box, a different one, all four, or to focus on the center. However, even though they were told to not", "and choosing whether to continue looking at it, or to look elsewhere. Where more than one person is involved, looking may lead to eye contact between those doing the looking, which raises further implications for the relationship established through that act. Looking versus seeing \"Looking\" and \"seeing\" are traditionally contrasted in a number of ways, although their usage often overlaps. Looking can be characterized as \"the action precedent to seeing\". Any kind of looking or viewing actually implies \"seeing\" certain things within the range of view, while not \"seeing\" others, because they are unimportant at the moment. Thus, things that", "abstractions, or incomplete. Because human beings are assumed to have an inherent need for order and to make sense of experience, the model predicts that human beings will attempt to compensate symbolically for these anomalies.\nIn the model, human beings communicatively promote or impede \"attention switches\" to compensate for anomalies so as to maintain meaning and order in their lives. Attention switching involves a symbolic recategorizing of experience or a renaming of the expectancies associated with a symbolic category. Attention switching occurs when human beings rhetorically shift what they attend to in experience. For example, instead of foregrounding education as the", "Conversely, giving the right thing focus can significantly enhance the user experience.", "Cell phones tend to take the driver's attention away from the road and onto itself. With drunk driving, drivers often experience the \"looking but not seeing\" phenomena. While their eyes do indeed view objects on the road, their brains do not comprehend the meaning behind the image. All levels of distraction while driving are dangerous, and potential drivers are cautioned to keep awareness of their surroundings. In the classroom Many psychological studies show that switching between tasks, use of technology, and overstimulation has increased levels of distraction in the school setting. At school, distraction is often viewed as a source", "\"seeing\" it, while another might suggest that a person might be \"seeing\" something, but not truly \"look at\" it. Both arrangements suggest that the person is directing their vision towards the thing, but failing to give sufficient attention to notice specific characteristics or implications of what is in the visual field. Looking in intense, pronounced, or prolonged ways A number of troponyms exist to illustrate kinds of looking that are either intentionally or unconsciously done in intense, pronounced, or prolonged ways.\n\"Staring\" is an intense form of looking in which the eyes of the person looking remain fixed on the subject", "how its properties affect its ability to think. This part attempts to overcome the symbol manipulation component that is a feature of the traditionalist model. Depth perception for instance can be better explained under the embodied approach due to the sheer complexity of the action. Depth perception requires that the brain detect the disparate retinal images obtained by the distance of the two eyes. In addition, body and head cues complicate this further. When the head is turned in a given direction, objects in the foreground will appear to move against objects in the background. From this, it is said", "is to stare at an object behind the picture in an attempt to establish proper divergence, while keeping part of the eyesight fixed on the picture to convince the brain to focus on the picture. A modified method has the viewer focus on their reflection on a reflective surface of the picture, which the brain perceives as being located twice as far away as the picture itself. This may help persuade the brain to adopt the required divergence while focusing on the nearby picture.\nFor crossed-eyed autostereograms, a different approach needs to be taken. The viewer may hold one finger between", "Focusing information such as presented on a screen leads to a change in the depth of focus. This causes blurring of information presented at other layers, which especially degrades the perception of high spatial frequency information such as text. Eye-Movements Are actually done at a specific angle of 10°. To focus an object out of this angle, head movements are used automatically for support. However, when wearing an HMD with eye-movements that exceed this angle, since head movements do not have any effect on the interface, a drop in comfort might occur due to tired eye muscle. Field-Of-View Describes the", "state of self-focused attention was an aversive state. That is, when people are drawn to focus on themselves like an external evaluator would, they are more likely to develop a negative mood state. An early experiment following the original writing showed that the relationship between self-focus and mood is more complex than originally thought. The study showed that the intensity of negative mood experienced related to how participants perceived the discrepancy between their current behavior and the social standard; for participants that thought the discrepancy between behavior and standard was unchangeable, they were much more likely to experience negative affect.\nOther", "and seeking to provide information for gaze cuing when information is not provided in a verbal manner. However, people do not seek gaze cues when they are not provided or when spoken instructions contain all of the relevant information.\nPeople can gain valuable information from another person's social cues, such as their intentions and future actions. This can help in terms of our own decision making and help alert us to potential dangers or an advantageous event. The ability for people to shift through these social cues in response to others is crucial for effective social interaction and for fruitful communication", "or that distract attention away from other lines of thought. They are often sayings that have been embedded in a culture's folk wisdom and are tempting to say because they sound true or good or like the right thing to say. Some examples are: \"Stop thinking so much\", \"here we go again\", and \"what effect do my actions have?\"\nThe term was popularized by psychiatrist Robert Jay Lifton in his 1961 book, Thought Reform and the Psychology of Totalism: A Study of \"Brainwashing\" in China. Lifton wrote, \"The language of the totalist environment is characterized by the thought-terminating cliché. The most", "processing visual information, due to a stroke. As a result of his stroke, he experienced vertigo when he tried to track a moving object with his eyes. The vertigo was caused by his brain interpreting the world as moving. In normal people, the world is not perceived as in moving when tracking an object despite the fact that the image of the world is moved across the retina as the eye moves. The reason for this is that the brain predicts the movement of the world across the retina as a consequence of moving the eyes. R.W., however, was unable", "defines our view of the world. The emotions are often involved. Adults have a tendency to reject any ideas that do not correspond to their particular values, associations and concepts.\nOur frames of reference are composed of two dimensions: habits of mind and points of view. Habits of mind, such as ethnocentrism, are harder to change than points of view. Habits of mind influence our point of view and the resulting thoughts or feelings associated with them, but points of view may change over time as a result of influences such as reflection, appropriation and feedback. Transformative learning takes place", "eye movements are used to change the direction of gaze without changing the depth of gaze. This can be used to either follow a moving object, or change focus entirely. When following a moving object, conjugate eye movements allow individuals to stabilize their perception of the moving object, and focus on the object rather than the rest of the visual world. When changing focus, conjugate eye movements allow for the perception of a stabilized world relative to an individual, rather than the perception of the world “jumping” as the individual’s gaze shifts. Without conjugate eye movements, there would be", "Looking Looking is the act of intentionally focusing visual perception on someone or something, for the purpose of obtaining information, and possibly to convey interest or another sentiment. A large number of troponyms exist to describe variations of looking at things, with prominent examples including the verbs \"stare, gaze, gape, gawp, gawk, goggle, glare, glimpse, glance, peek, peep, peer, squint, leer, gloat, and ogle\". Additional terms with nuanced meanings include viewing, watching, eyeing, observing, beholding, and scanning. Looking is both a physical act of directing the focus of the eyes, and a psychological act of interpreting what is seen" ]
I've heard that no matter where you are in the universe, you're still equidistant from the universe's "edges" as it expands. How is this so? Or am I getting this wrong?
[ "The \"edges\" of the universe are just as far as we can see, not physical edges, because the light at the edges is from the beginning of the universe and there can't be any light from before the universe.\n\nIt's like two ships on the ocean, which both see the horizon equidistant from themselves no matter where they are.", "The most likely is no edge to the Universe. \n\nThere is an edge to the so-called \"visible universe\" which means the part of the Universe from which the light has had time enough to reach us. This visible Universe is roughly a sphere centered on whoever is observing, just the part of the ocean you would see on a boat would roughly describe a circle on the map, centered around the observer.", "The current leading cosmological theories about the universe are a universe that is unbounded and infinite. There is no edge to approach, in any direction, and you would not return to where you started, but be forever further from that location.", "Don't think of the universe as a \"flat\" object that has edges. Instead, imagine yourself as a microscopic being living on an inflated balloon that is slowly expanding. No matter where you are on the balloon, you aren't any closer to an edge because there is no edge." ]
[ "curved spaces frequently considered as cosmological models (see shape of the universe).\nAn observation stemming from this theorem is that seeing objects recede from us on Earth is not an indication that Earth is near to a center from which the expansion is occurring, but rather that every observer in an expanding universe will see objects receding from them. Olbers' paradox The expansion of space summarized by the Big Bang interpretation of Hubble's law is relevant to the old conundrum known as Olbers' paradox: If the universe were infinite in size, static, and filled with a uniform distribution of stars, then", "edge or strange connectedness.\nRegardless of the overall shape of the universe, the question of what the universe is expanding into is one which does not require an answer according to the theories which describe the expansion; the way we define space in our universe in no way requires additional exterior space into which it can expand since an expansion of an infinite expanse can happen without changing the infinite extent of the expanse. All that is certain is that the manifold of space in which we live simply has the property that the distances between objects are getting larger as", "nevertheless curved.\nSpatial geometry of this model is an unbounded hyperbolic space.\nThe entire universe is contained within a light cone, namely the future cone of the Big Bang. For any given moment t > 0 of coordinate time (assuming the Big Bang has t = 0), the entire universe is bounded by a sphere of radius exactly c t.\nThe apparent paradox of an infinite universe contained within a sphere is explained with length contraction: the galaxies farther away, which are travelling away from the observer the fastest, will appear thinner.\nThis model is essentially a degenerate FLRW for Ω = 0. It is", "Cusa in his Learned Ignorance asked whether there was any reason to assert that the Sun (or any other point) was the center of the universe. In parallel to a mystical definition of God, Cusa wrote that \"Thus the fabric of the world (machina mundi) will quasi have its center everywhere and circumference nowhere,\" recalling Hermes Trismegistus.\nIn India, Nilakantha Somayaji (1444–1544), in his Aryabhatiyabhasya, a commentary on Aryabhata's Aryabhatiya, developed a computational system for a geo-heliocentric planetary model, in which the planets orbit the Sun, which in turn orbits the Earth, similar to the system later proposed by Tycho", "History of the center of the Universe The center of the Universe is a concept that lacks a coherent definition in modern astronomy; according to standard cosmological theories on the shape of the universe, it has no center.\nHistorically, different people have suggested various locations as the center of the Universe. Many mythological cosmologies included an axis mundi, the central axis of a flat Earth that connects the Earth, heavens, and other realms together. In the 4th century BCE Greece, philosophers developed the geocentric model, based on astronomical observation; this model proposed that the center of the Universe lies at the", "in the Friedmann–Lemaître–Robertson–Walker (FLRW) model the universe is considered to be without boundaries, in which case \"compact universe\" could describe a universe that is a closed manifold. Milne model (\"spherical\" expanding) If one applies Minkowski space-based special relativity to expansion of the universe, without resorting to the concept of a curved spacetime, then one obtains the Milne model. Any spatial section of the universe of a constant age (the proper time elapsed from the Big Bang) will have a negative curvature; this is merely a pseudo-Euclidean geometric fact analogous to one that concentric spheres in the flat Euclidean space are", "Bang. Some new modern theories assume the universe may have a significant amount of dark energy, whose repulsive force may be sufficient to cause the expansion of the universe to continue forever—even if . Open universe If , the geometry of space is open, i.e., negatively curved like the surface of a saddle. The angles of a triangle sum to less than 180 degrees, and lines that do not meet are never equidistant; they have a point of least distance and otherwise grow apart. The geometry of such a universe is hyperbolic.\nEven without dark energy, a negatively curved universe expands", "universe is either flat or very close to flat. Closed universe If , then the geometry of space is closed like the surface of a sphere. The sum of the angles of a triangle exceeds 180 degrees and there are no parallel lines; all lines eventually meet. The geometry of the universe is, at least on a very large scale, elliptic.\nIn a closed universe, gravity eventually stops the expansion of the universe, after which it starts to contract until all matter in the universe collapses to a point, a final singularity termed the \"Big Crunch\", the opposite of the Big", "distance from the center of the universe. The center of the universe in this case refers to the center of the Earth. Inertia John Philoponus had rejected the Aristotelian view of motion, and argued that an object acquires an inclination to move when it has a motive power impressed on it. In the eleventh century Ibn Sina had roughly adopted this idea, believing that a moving object has force which is dissipated by external agents like air resistance.\nIbn Sina made distinction between 'force' and 'inclination' (called \"mayl\"), he claimed that an object gained mayl when the object is in opposition", "location in the universe, not simply any human observer at any location on Earth: as Andrew Liddle puts it, \"the cosmological principle [means that] the universe looks the same whoever and wherever you are.\"\nThe qualification is that variation in physical structures can be overlooked, provided this does not imperil the uniformity of conclusions drawn from observation: the Sun is different from the Earth, our galaxy is different from a black hole, some galaxies advance toward rather than recede from us, and the universe has a \"foamy\" texture of galaxy clusters and voids, but none of these different structures appears to", "universe is an entity, always existing in varying forms with no beginning or end. Jain texts describe the shape of the universe as similar to a man standing with legs apart and arms resting on his waist. Thus, the universe is narrow at top, widens above the middle, narrows towards the middle, and once again becomes broad at the bottom. Wheel of time According to Jainism, time is beginningless and eternal. The cosmic wheel of time rotates ceaselessly. This cyclic nature eliminates the need for a creator, destroyer or external deity to maintain the universe.\nThe wheel of time is divided", "in space; they see distant worlds like their own, and the surveyor tries to find the distance between their world and these distant worlds, using trigonometry and radar. From his calculations, he and the hexagon determine that the universe is expanding; again they try to reveal this theory to the outside world, but again it is not accepted. Therefore, like his grandfather in the previous novel, the hexagon writes a book that is not to be opened until the theory of the expanding universe is discovered and accepted by others. Then they live an inferior existence without any more contact", "of the Hubble radius, often called simply the horizon, as it is closely related to the particle horizon. The Hubble radius, which is related to the Hubble parameter as , where is the speed of light, defines, roughly speaking, the volume of the nearby universe that has recently (in the last expansion time) been in causal contact with an observer. Since the universe is continually expanding, its energy density is continually decreasing (in the absence of truly exotic matter such as phantom energy). The Friedmann equation relates the energy density of the universe to the Hubble parameter and", "reveals to his assistant, the tale's narrator, that he has discovered that the visible universe at the largest scales corresponds to the microscopic universe at the smallest observed scales, the relations between universe's planets suns, and star cluster being identical to the relations of electrons, atomic nuclei, and molecules. Rather than explore the universe at their own scale, the professor intends to explore the worlds endlessly nested within matter itself, which he argues by induction, must go on to ever smaller levels, and claims to have invented a substance, that once-applied will cause an individual to perpetually shrink. His assistant", "(an-nafs al-kullīyyah). The multiplicity of the whole universe has originated from it. When Ibn Arabi says that everything is God, he thereby means the Universal Soul. This Universal Soul, or the Self-unfolding Being (al-wujūd-al-munbasiṭ), subsists by itself. This existence pervades the whole universe, both the substance and the accident, and accepts the form of everything. It is both immanent and transcendental. Beyond this existence (al-wujūd al-munbasiṭ : Universal Soul) towards the original existence (God) none has access to. In other words, man's progress ends with the Universal Soul or the Self-unfolding Being. He cannot move a step further. The Universal Soul", "of the universe, it can theoretically be closed (positive curvature, or space-time folding in itself as though on a four-dimensional sphere's surface), open (negative curvature, with space-time folding outward), or flat (zero curvature, like the surface of a \"flat\" four-dimensional piece of paper).\nThe first real difficulty came with regards to expansion, for in 1905, as previously, the universe was assumed to be static, neither expanding nor contracting. All of Einstein's solutions to his equations in general relativity, however, predicted a dynamic universe. Therefore, in order to make his equations consistent with the apparently static universe, he added a cosmological constant,", "theorize the universe will continue expanding but at a slower and slower rate, never stopping completely. He explains that foundation models of the universe are not three-dimensional, but have a fourth spacetime continuum. Ferris says cosmologist Andrei Linde estimates the radius of the universe to be an \"astronomical\" number of one followed by a trillion zeros centimeters.\nThe book is an overview which examines mapping of large scale structures, weird quantum effects and cosmic evolution. Ferris talks of black holes and what would happen if an astronaut jumped into one. He goes on to explain that a \"boltzmon\" is", "universe looks the same in all directions – is one of the core assumptions that enters into the FRW equations. In 2008 however, scientists working on Wilkinson Microwave Anisotropy Probe data claimed to have detected a 600–1000 km/s flow of clusters toward a 20-degree patch of sky between the constellations of Centaurus and Vela. They suggested that the motion may be a remnant of the influence of no-longer-visible regions of the universe prior to inflation. The detection is controversial, and other scientists have found that the universe is isotropic to a great degree. Exotic dark matter and dark energy In Lambda-CDM,", "models such as Gödel's universe even permit bizarre worldlines which intersect with themselves, ultimately the question as to whether we are in something like a \"Pac-Man universe\" where if traveling far enough in one direction would allow one to simply end up back in the same place like going all the way around the surface of a balloon (or a planet like the Earth) is an observational question which is constrained as measurable or non-measurable by the universe's global geometry. At present, observations are consistent with the universe being infinite in extent and simply connected, though we are limited in", "is the centre of his universe.\"", "logically separate from the question of having boundaries. The two-dimensional surface of the Earth, for example, is finite, yet has no edge. By travelling in a straight line with respect to the Earth's curvature one will eventually return to the exact spot one started from. The universe, at least in principle, might have a similar topology. If so, one might eventually return to one's starting point after travelling in a straight line through the universe for long enough.\nThe curvature of the universe can be measured through multipole moments in the spectrum of the cosmic background radiation. As to date, analysis", "or universe, is divided into two parts: the elementary and the ethereal. The elementary consists of four parts: the earth, about which is water, then air, then fire, reaching up to the moon. Above this is the ethereal which is immutable and called the 'fifth essence' by the philosophers. All are mobile except heavy earth which is the center of the world. The universe as a machine Sacrobosco spoke of the universe as the machina mundi, the machine of the world, suggesting that the reported eclipse of the Sun at the crucifixion of Jesus was a disturbance of the order", "there may be many universes, not just one. While some may shun away from what appears to be difficult scientific material, journalist Charles Krauthammer encourages non-technical people to read the book because it is as intuitive an account of its essential idea – the curvature of space – as I have ever read.\nFerris uses most of his book searching for the cosmic mass density value of Ω. He points out that if Ω is a number under 1, the\nuniverse will expand forever. Contrary to this he shows that if Ω is a number greater than 1 then the universe will eventually collapse", "the centre of the earth. This is the common account (τά γραφόμενα) as you have heard from astronomers. But Aristarchus has brought out a book consisting of certain hypotheses, wherein it appears, as a consequence of the assumptions made, that the universe is many times greater than the \"universe\" just mentioned. His hypotheses are that the fixed stars and the sun remain unmoved, that the earth revolves about the sun on the circumference of a circle, the sun lying in the middle of the orbit, and that the sphere of the fixed stars, situated about the same centre as the", "can break itself into many pieces and invests itself in every form of life. Consequently, every being is a projection of a part of the universal soul. They believe that the universe uses the perspective of individual sentient beings in the process of self-examination and a search for meaning (similar to the real-life belief of pantheism or pandeism), this could also be a reference to the quote \"We are a way for the universe to know itself\" from astronomer Carl Sagan.\nValen is a central figure in Minbari religion. However, Valen is not considered a deity. He was a \"Minbari not", "Way there is a minimum intersection with the world-lines of 100 universes. However, there are significant segments of the Way wherein there are a near-infinity of Universes containing alternate Earths.\nThe reason for the Geometry Stacks, as they are called, is described by the author as being a direct consequence of the origin of the Way within the Thistledown, and its development through extension of the inertial dampening field of the Sixth Chamber. Essentially, the Way is anchored to the space-time of the Thistledown—Juno, within the Solar System of Earth. If it were possible to construct a universe like the Way", "not really a boundary, or it must be blocked by something and prevented from continuing its path, but, if that happens, then the object blocking it must be outside the confines of the universe. As a result of this belief that the universe and the number of atoms in it are infinite, Epicurus and the Epicureans believed that there must also be infinitely many worlds within the universe.\nEpicurus taught that the motion of atoms is constant, eternal, and without beginning or end. He held that there are two kinds of motion: the motion of atoms and the motion of visible", "being surrounded by \"Havona,\" an eternal universe containing a billion perfect worlds, around which seven incomplete and evolutionary \"superuniverses\" circle.\nThe word \"universe\" in the book is used to denote a number of different scales of organization. A \"superuniverse\" is roughly the size of a galaxy or group of galaxies, and the seven superuniverses along with Paradise-Havona are together designated as the \"grand universe.\" A \"local universe\" is a portion of a superuniverse, with 100,000 local universes being in each superuniverse. Beyond the seven superuniverses, uninhabited \"outer space levels\" are described. The term \"master universe\" refers to what", "position. However, the assumption is adopted. There must be no favoured location in the Universe, no centre, no boundary; all must see the Universe alike. And, in order to ensure this situation, the cosmologist, postulates spatial isotropy and spatial homogeneity, which is his way of stating that the Universe must be pretty much alike everywhere and in all directions.\"\nThe redshift observations of Hubble, in which galaxies appear to be moving away from us at a rate proportional to their distance from us, are now understood to be a result of the metric expansion of space. This is the increase of", "on a mass to which the observer is connected, and the lack of an obvious frame of reference which would allow individuals to easily see that they are moving. The smaller scales of these motions are too small to be detected conventionally with human senses. Universe Spacetime (the fabric of the universe) is expanding meaning everything in the universe is stretching like a rubber band. This motion is the most obscure as it is not physical motion as such, but rather a change in the very nature of the universe. The primary source of verification of this expansion was provided" ]
Why are there ashtrays on planes?
[ "The average lifespan of a commercial jet is 30 years. Smoking was banned on planes in the US in 1988, 24 years ago.", "Because if someone were to light up a cigarette they still need a safe place to put it out. There is way too much paper waste in the trash cans that could potentially start a fire in flight were a butt to be just tossed in. \nIts an FAA requirement, along with all the No Smoking placards. \n\nEdit: im talking about the ashtrays around the lavatory doors. If you saw one on your arm rest that's just an older design. Some airlines are putting caps over them and some don't bother.", "I remember smoking on flights inside the US and it doesn't seem all that long ago to me. I expect that many of those planes are still in service. Smoking on planes isn't banned world wide as far as I know. Though they are moving in that direction.", "A few years ago, I was on an old plane with ashtrays and the seats still had an old, musty smoke smell. After all those years, and the leftovers from poorly ventilated cigarette smoke still lingered." ]
[ "Flypaper Flypaper (also known as a fly ribbon, fly strip, fly capture tape, or fly catcher) is a fly-killing device made of paper coated with a sweetly fragrant, but extremely sticky and sometimes poisonous substance that traps flies and other flying insects when they land upon it. Fly paper is considered a pest control device, and is subject to regulation in many countries. In the United States of America, it is subject to the Federal Insecticide, Fungicide, and Rodenticide Act. Toxicity The poisons used in some older types of flypaper could potentially be toxic to humans and other animals.", "takeoff and landing and during low level flying. Volcanic ash If a jet plane is flying through air contaminated with volcanic ash, there is risk that ingested ash will cause erosion damage to the compressor blades, blockage of fuel nozzle air holes and blockage of the turbine cooling passages. Some of these effects may cause the engine to surge or flame-out during the flight. Re-lights are usually successful after flame-outs but with considerable loss of altitude. It was the case of British Airways Flight 9 which flew through volcanic dust at 37,000 ft. All 4 engines flamed out and re-light attempts", "to Heathrow Airport to make an emergency landing after smoke was seen coming from its engines.\nPlane Finder data has also been used to create original imagery for the media, such as the Washington Post, which used Plane Finder as a source to show flight patterns immediately after the Brussels Attacks in March 2016.", "possible cause of the fire was that the lavatory waste bin contents caught fire after a lit cigarette was thrown into it, the FAA issued AD 74-08-09 requiring \"installation of placards prohibiting smoking in the lavatory and disposal of cigarettes in the lavatory waste receptacles; establishment of a procedure to announce to airplane occupants that smoking is prohibited in the lavatories; installation of ashtrays at certain locations; and repetitive inspections to ensure that lavatory waste receptacle doors operate correctly\".", "Historically, metallic arsenic (a well-known toxin to humans) was used in flypaper. Arsenic extracted by soaking flypaper in water has been used by several convicted murderers, among them Frederick Seddon and Florence Maybrick. \nMost modern brands of flypaper contain no poison, but only a non-toxic adhesive such as rosin. Effectiveness Flypaper is as effective as many other methods involving insecticides or bug zappers. However, a twisted strip of flypaper hanging from the ceiling is considered by many to be aesthetically less acceptable than some other methods, and so flypaper is not as commonly used as it once was. Some formulas", "is toxic, as is its exhaust. This was of little concern in flight, but a major concern for ground crews servicing the aircraft. The fuels burn to create solids that are both sticky and corrosive, while boron carbide solids are abrasive. This caused serious problems for turbine blades in jet engines, where the exhaust built up on the blades and reduced their effectiveness and sometimes caused catastrophic failure of the engine. Finally, the exhaust plume is filled with particulates, like coal smoke, allowing an aircraft to be spotted visually at long range.\nIn the end, the problem of burning HEF throughout", "that triggered safety concerns. Consequences Following a fire in an airline bathroom waste bin that caused a crash and killed 124 people, in 1973 the US Federal Aviation Administration banned smoking in aircraft lavatories. Following a fire that originated in a lavatory (not necessarily from smoking) on Air Canada Flight 797 in June 1983, resulting in the death of 23 passengers, new requirements to install smoke detectors in lavatories were brought in.\nNormally, passengers found to be smoking on non-smoking flights will at least face a fine and at worst be arrested and detained upon landing. Due to stringent security measures,", "unsafe and was consequently closed.\nThe April eruption of Eyjafjallajökull caused enough economic difficulties that aircraft manufacturers were forced to define specific limits on how much ash is considered acceptable for a jet engine to ingest without damage. On 21 April, the CAA in conjunction with engine manufacturers, set new guidelines which allowed aircraft to fly when there are levels of volcanic ash between 200 and 2000 microgrammes of ash per cubic metre. These levels were declared by governments, aircraft manufacturers, and airlines not to have safety implications if appropriate maintenance and ash inspection procedures were followed.\nFrom noon 18 May, the", "intentionally ignited using the plane's afterburner. A spectacular flame combined with high speed makes this a popular display for airshows, or as a finale to fireworks. Fuel dumping is primarily used to reduce the mass of an aircraft to avoid a heavy / high speed landing; thus other than for safety or emergency reasons, the dump and burn procedure does not have a practical use.", "propellers, engines and cockpit windows. In 1982, British Airways Flight 9 flew through an ash cloud and temporarily lost power from all four engines. The plane was badly damaged, with all the leading edges being scratched. The front windscreens had been so badly \"sand\" blasted by the ash that they could not be used to land the aircraft.\nPrior to 2010 the general approach taken by airspace regulators was that if the ash concentration rose above zero, then the airspace was considered unsafe and was consequently closed.Volcanic Ash Advisory Centers enable liaison between meteorologists, volcanologists, and the aviation industry. Terrorism Aircrew", "Flight 63 from Paris to Miami, wearing his special shoes packed with plastic explosives in their hollowed-out bottoms. Bombing attempt on American Airlines Flight 63 On 22 December 2001, a passenger on Flight 63 from Paris to Miami complained of a smoke smell in the cabin shortly after a meal service. One flight attendant, Hermis Moutardier, thinking she smelled a burnt match, walked along the aisles of the plane, trying to assess the source. A passenger pointed to Reid, who was sitting alone near a window and attempting to light a match. Moutardier warned him that smoking was not allowed", "the plane started trailing smoke and was forced down in Algeria.\nBy 1944 the planes found themselves sitting on the ground more and more due to a lack of fuel and maintenance. By 1945 there were only nine left, and they were rotated out of service for repairs in Spain. They continued to be atrophied due to accidents and cannibalization over the next few years, eventually returning to the mainland and being assigned to training units (where they rarely flew). The last airworthy example appears on the books in 1952, along with another that could not fly. The next year there", "were the ingestion of ash stopping the engines, the sandblasting of the cockpit windows rendering them largely opaque and the contamination of fuel through the ingestion of ash through pressurisation ducts. The damage to engines is a particular problem since temperatures inside a gas turbine are sufficiently high that volcanic ash is melted in the combustion chamber, and forms a glass coating on components further downstream of it, for example on turbine blades.\nIn the case of British Airways Flight 9, the aircraft lost power on all four engines, and in the other, nineteen days later, three of the four engines", "the aviation industry decided to set up Volcanic Ash Advisory Centers (VAACs) for liaison between meteorologists, volcanologists, and the aviation industry. Prior to 2010, aircraft engine manufacturers had not defined specific particle levels above which they considered engines at risk. Airspace regulators took the general approach that if ash concentration rose above zero, they considered airspace unsafe, and consequently closed it.\nThe costs of air travel disruption in Europe after a volcanic eruption in 2010 forced aircraft manufacturers to specify limits on how much ash they considered acceptable for a jet engine to ingest without damage. In April, the UK CAA,", "dangerous as the aircraft, like most airliners of its era, was not equipped with a Ground Proximity Warning System (GPWS).\nBased on Air Traffic Control recordings, the Basel Air Controller stated that Flight 435 was not homing to the selected beacon during its last approach, while the crew of the flight stated that they were on the beacon. This could indicate a faulty signal or faulty navigational equipment. If the fault was in the navigation system, this could explain why the plane went astray from its selected path. However, Swiss accident investigators considered it was more likely that the flight crew", "Volcanic ash and aviation safety Plumes of volcanic ash near active volcanoes are a flight safety hazard, especially for night flights. Volcanic ash is hard and abrasive, and can quickly cause significant wear to propellers and turbocompressor blades, and scratch cockpit windows, impairing visibility. The ash contaminates fuel and water systems, can jam gears, and make engines flameout. Its particles have low melting point, so they melt in the engines' combustion chamber then the ceramic mass sticks to turbine blades, fuel nozzles, and combustors—which can lead to total engine failure. Ash can also contaminate the cabin and damage avionics.\nIn 1991,", "are zip-lock bags or other small bags filled with ABC dry chemical powder. Chimney bombs are used by fire service personnel to help extinguish chimney fires. Creosote, which is the by-product of the incomplete burning of wood (typically due to chronic combustion-air insufficiency), is extinguished by the chain reaction caused by the chimney bombs. Chimney bombs work by first being dropped directly down a chimney, where upon contact with the flue bottom and heat of the fire, they explode, thereby releasing the powder. Then, the natural chimney draft will carry the dry chemical powder up the shaft of the chimney,", "Sciences found that nicotine residue which coats smokers as well as interior car or room surfaces can react with nitrous acid present in the air to create tobacco-specific nitrosamines, carcinogens found in tobacco products. This was demonstrated by spraying what was termed a \"high but reasonable\" level of nitrous acid (about 4–12 times the levels typically found in homes) onto cellulose substrates used to wipe the interior of a vehicle that had been heavily smoked in over time. Similar results were found when cellulose substrates were kept (without wiping) in the same vehicle for three days when smoking", "longer possible.\nAt both ends of the runway there were parking spaces for jets, which could be identified by the heaped-up exhaust jet deflectors. This should protect the nearby forest from fires, the z. B. could have been caused by the ignition of a jet engine. After the fall of the Berlin Wall, the aircraft parking lots were converted into parking lots, and these were also dismantled, so that in 2005 only the filled exhaust gas deflectors could be seen.", "However, the crew restarted all but one of the engines and landed safely. Subsequently, there was an addition to the operations manuals, describing how to deal with volcanic ash.\nIceland's authorities had been warning the airlines for several years, asking them to determine the density of ash that is safe for their jet engines.\nBut before the volcanic events of April 2010, aircraft engine manufacturers still had not defined specific particle levels above which engines were considered to be at risk. The general approach taken by airspace regulators was that if the ash concentration rose above zero, then the airspace was considered", "It focuses primarily on aviation safety because jet aircraft can quickly enter areas of volcanic ash. The program notifies all impacted agencies that have to deal with volcanic events. Aircraft are rerouted away from hazardous ash and people on the ground are notified of potential ash fall.", "crew, such holds are not equipped with smoke detectors. However, the NTSB quickly determined that just before takeoff, over 100 expired chemical oxygen generators, each slightly larger than the size of a tennis ball can, had been placed in the cargo compartment in five boxes marked COMAT (company material) by ValuJet's maintenance contractor, SabreTech, in violation of FAA regulations forbidding the transport of hazardous materials in passenger aircraft cargo holds. Failure to cover the generators' firing pins with the prescribed plastic caps made an accidental activation much more likely. The investigation revealed that rather than covering them, the cords attached", "belt or Archimedes' screw, whereupon they fall onto the fire near the center of the structure.\nTeepee or beehive burners are used to dispose of waste wood in logging yards and sawdust from sawmills by incineration. As a result, they produce a large quantity of smoke and ash, which is vented directly into the atmosphere without any sort of filtering or cleaning, contributing to poor air conditions wherever they are used. The burners are considered to be a major source of air pollution and have been phased out in most areas. There are a few beehive burners still in use in", "test flights and pressure grew to re-evaluate the criteria for safe levels of ash to fly through.\nOn 16 April a 30-minute break at Manchester allowed two flights to land, and one aircraft to be moved to Florida, empty (as there was no time for passengers to board). At Glasgow, an Air Transat flight to Toronto took off while a British Airways flight from New York, and a Thomas Cook flight from Orlando and Icelandair flights from Keflavik landed.\nOn 17 April 2010, the president of German airline Air Berlin, in an interview with the newspaper Bild am Sonntag, stated that the", "continues, even as the plane drops its bombs, with the fielders chasing a ball to the boundary. The caption, playing on the German misunderstanding of cricket, shows the German airman's report as saying \"We dropped bombs on a British formation, causing the troops to disperse and run about in a panic stricken manner\".\nThe fear of poison gas attacks spreading to England saw the British Government warn citizens to take their gas masks everywhere in 1916, just in case. Essex cricketer and journalist Edward Sewell was photographed in full cricket gear wearing his mask. Grenades and bowling techniques British", "have limitations, as both species have the potential to be masked by other types of aerosol, such as water or ice; this contributes to great variability in the data.\nTherefore, as there is no consistent overlap between SO₂ and the ash, SO₂ is not a reliable indicator for ash clouds. Accidents and incidents In 1982, British Airways Flight 9 flew through an ash cloud, lost power from all four engines, and descended from 37,000 feet (11,000 m) to only 13,500 feet (4,100 m) before the flight crew managed to restart the engines. A similar incident occurred in 1989 to KLM Flight 867.\nAnother incident", "UTA Boeing 747-3B3 (registration F-GDUA) was destroyed on the ground at Paris CDG when a fire was accidentally started while cleaning of the aircraft's cabin was in progress. (According to contemporary press reports, the fire was allegedly started by a cleaner who carelessly dropped a burning cigarette in one of the toilets.) The fire rapidly spread, engulfing the entire cabin in flames. This resulted in the aircraft's total destruction, which was subsequently written off. There were no injuries as a result of this incident.\nOn 19 September 1989, UTA flight 772, a McDonnell Douglas DC-10-30 (registration N54629) operating the Brazzaville —", "risk of fire upon landing. This also served to lighten the plane, reducing potential stress on the landing gear and dramatically lowering landing speed as well. The Airbus A320 does not have the mechanical facility to dump fuel, despite various news agencies reporting that the aircraft was doing so over the ocean.\nBecause JetBlue planes are equipped with DirecTV satellite television, passengers on Flight 292 were able to watch live news coverage of their flight while the plane circled over the Pacific for hours. The in-flight video system was turned off \"well before landing.\" Actress Taryn Manning was on the flight", "The investigation lasted five months, during which the chairman of the investigation commission was replaced before the full report was completed. The official conclusion was that a fire in the rear luggage compartment spread in across the compartment sections before the crew could begin to extinguish it. The attempts to extinguish the fire were unsuccessful, and the smoke and fumes from the fire spread into the cabin, the aircraft was forced to choose an emergency landing. However, due to low visibility, the distance from the airport, and the increasing amount of fumes in the cockpit, the aircraft", "fuel dumping to decrease the landing weight. Meanwhile, the flight attendants reported smoke in the rear section of the cabin. With Berlin-Schönefeld Airport already in sight and a few kilometres south of it, the flight issued a mayday at 16:59:25 indicating that there were problems controlling the aircraft's altitude. At this point in time, the flight crew was likely unaware that the fire had been consuming portions of the rear of the aircraft. A few seconds later the tail section, weakened by the fire, separated from the aircraft, which then caused it to then enter an uncontrolled descent. Due to" ]
How come humans generally get into cold water slowly and uncomfortably, but animals jump in with no hesitation?
[ "If you think animals are not afraid of water you have never tried to bath a horse or take one through a puddle. lol. \n\nHumans know there is a choice, that water can be warm or cold.. or even too hot. Animals know the temperature of the lakes/streams as being what they are.. they don't see any reason to be silly and enter it slowly if they need to cross, but sometimes you will see them entering water slowly when they are not in a hurry. Maybe you need to be around nature more." ]
[ "Cold shock response Cold shock response is the physiological response of organisms to sudden cold, especially cold water.\nIn animals, cold shock response is perhaps the most common cause of death from immersion in very cold water, such as by falling through thin ice. The immediate shock of the cold causes involuntary inhalation, which if underwater can result in drowning. The cold water can also cause heart attack due to vasoconstriction; the heart has to work harder to pump the same volume of blood throughout the body. For people with existing cardiovascular disease, the additional workload can result in cardiac", "the initial minute after falling into cold water can survive for at least thirty minutes provided they do not drown. The ability to stay afloat declines substantially after about ten minutes as the chilled muscles lose strength and co-ordination.\nThe diving reflex is a response to immersion that overrides the basic homeostatic reflexes. It optimises respiration by preferentially distributing oxygen stores to the heart and brain, which allows extended periods underwater. It is exhibited strongly in aquatic mammals (seals, otters, dolphins and muskrats), and also exists in other mammals, including humans. Diving birds, such as penguins, have a similar diving reflex.", "false positives. If the shock the animals are receiving is too low, then animals might ignore the shock and continue to get food or water which can skew results. Drugs that increase thirst or appetite can give inconsistent results.\nAnimal training can take time. If doing the VCT using food, animals must be trained to be able to pull the lever for the food dispenser and accept the pellet. If using water, animals must be trained to be able to push the button and drink water. Because of this, etiological tests which observe spontaneous fears are usually preferred by researchers. Lab", "cold water, triggers a response called the diving reflex. This firstly has the result of shutting down the airways against the influx of water. The metabolic rate slows right down. This is coupled with intense vasoconstriction of the arteries to the limbs and abdominal viscera. This reserves the oxygen that is in blood and lungs at the beginning of the dive almost exclusively for the heart and the brain. The diving reflex is an often-used response in animals that routinely need to dive, such as penguins, seals and whales. It is also more effective in very young infants and", "were 360 to 400 experiments and 280 to 300 subjects, indicating some had more than one experiment performed on them. Various methods of rewarming were attempted, \"One assistant later testified that some victims were thrown into boiling water for rewarming\". Other animals Many animals other than humans often induce hypothermia during hibernation or torpor.\nWater bears (Tardigrade), microscopic multicellular organisms, can survive freezing at low temperatures by replacing most of their internal water with the sugar trehalose, preventing the crystallization that otherwise damages cell membranes.", "especially hot days, individuals will rest in a watering hole for hours with only their heads above water.\nIt generally leads a solitary life, though feeding groups are not uncommon and individuals, especially those of different ages (young with their mothers, juveniles with adults) are often observed together. The animals communicate with one another through shrill whistles and squeaks.\nAdults can be potentially dangerous to humans and should not be approached if spotted in the wild. The animal is most likely to follow or chase a human for a bit, though they have been known to charge and gore humans on rare", "arrest. Inhalation of water (and thus drowning) may result from hyperventilation. Some people are much better able to survive swimming in very cold water due to body or mental conditioning.\nHypothermia from exposure to cold water is not as sudden as is often believed. A person who survives the initial minute of trauma (after falling into icy water), can survive for at least thirty minutes provided they don't drown. However, the ability to perform useful work (for example to save oneself) declines substantially after ten minutes (as the body protectively cuts off blood flow to \"non-essential\" muscles). Cold shock response", "Exposure Cold shock response is the physiological response of organisms to sudden cold, especially cold water, and is a common cause of death from immersion in very cold water, such as by falling through thin ice. The immediate shock of the cold causes involuntary inhalation, which if underwater can result in drowning. The cold water can also cause heart attack due to vasoconstriction; the heart has to work harder to pump the same volume of blood throughout the body, and for people with heart disease, this additional workload can cause the heart to go into arrest. A person who survives", "to remain underwater for thirty seconds or more, whilst their basal metabolic rate is approximately one-third slower than typical terrestrial passerines of similar mass. One small population wintering at a hot spring in Suntar-Khayata Mountains of Siberia feeds underwater when air temperatures drop below −55 °C (−67 °F). Food Dippers forage for small animal prey in and along the margins of fast-flowing freshwater streams and rivers. They perch on rocks and feed at the edge of the water, but they often also grip the rocks firmly and walk down them beneath the water until partly or wholly submerged. They then", "and can be extremely effective. When not subject to overheating (i.e. on cold days), speeds on land of 19–26 km/h (12–16 mph) have been recorded for short distances. Satellite tracking data have resulted in conservative estimates of swimming speeds of 66 km/day and 12.7 km/h. While swimming, crabeaters have been known to engage in porpoising (leaping entirely out of the water) and spyhopping (raising the body vertically out of the water for visual inspection) behaviors.\nThe most gregarious of the Antarctic seals, crabeaters have been observed on the ice in aggregations of up to 1,000 hauled out animals and in swimming groups of several", "into arrest. A person who survives the initial minute of trauma after falling into icy water can survive for at least thirty minutes provided they don't drown. However, the ability to perform useful work like staying afloat declines substantially after ten minutes as the body protectively cuts off blood flow to \"non-essential\" muscles.\nThe diving reflex is a response to immersion that overrides the basic homeostatic reflexes, and which is found in all air-breathing vertebrates. It optimizes respiration by preferentially distributing oxygen stores to the heart and brain which allows staying underwater for extended periods of time. It is exhibited strongly", "not pant. Therefore, in warm weather, they change their patterns of activity, becoming crepuscular or nocturnal. Body temperatures above 34 °C (93 °F) are believed to be fatal, and in addition to avoiding heat, the animal adjusts its circulation to maintain a sustainable temperature by moving blood to and from the skin to increase or lower heat loss. In areas where water is present, they can also swim to keep their body temperatures low. The \"thermoneutral zone\" for the environment is around 25 °C (77 °F), at which point the metabolism needed to maintain body temperature is minimized. The echidna is endothermic, and can", "death and injury to livestock and wildlife. Exposure to cold mandates greater caloric intake for all animals, including humans, and if a cold wave is accompanied by heavy and persistent snow, grazing animals may be unable to reach necessary food and water, and die of hypothermia or starvation. Cold waves often necessitate the purchase of fodder for livestock at considerable cost to farmers. Human populations can be inflicted with frostbites when exposed for extended periods of time to cold and may result in the loss of limbs or damage to internal organs.\nExtreme winter cold often causes poorly insulated water pipes", "intensity exercise while immersed or submersed. Exposure Cold shock response is the physiological response of organisms to sudden cold, especially cold water, and is a common cause of death from immersion in very cold water, such as by falling through thin ice. The immediate shock of the cold causes involuntary inhalation, which if underwater can result in drowning. The cold water can also cause heart attack due to vasoconstriction; the heart has to work harder to pump the same volume of blood throughout the body, and for people with heart disease, this additional workload can cause the heart to go", "showed \"active avoidance behavior with visible panic\" when boats appeared. Logging, hunting, and pup seizure may have led groups to be far more wary of human activity.\nLocal people sometimes take pups for the exotic pet trade or as pets for themselves, but the animal rapidly grows to become unmanageable. Duplaix relates the story of an Arawak Indian who took two pups from their parents. While revealing of the affection held for the animals, the seizure was a profound blow to the breeding pair, which went on to lose their territory to competitors.\nThe species has also appeared in the folklore of", "They learned to respond by walking to a safe area in which the shock was not delivered. However, this only occurred if the crayfish were facing the area to which they could retreat to avoid the shock. If they were facing away from the safe area the animal did not walk but responded to the shock by a tail-flick escape response. Despite repeated pairings of light and shock the animals did not learn to avoid the shock by tail-flicking in response to light. Curiously, when the animals that had experienced shocks whilst facing away from the safe area were subsequently", "consequently cardiac arrest. The cold shock response and cardiac arrest are the most common causes of death related to cold water immersion.\nWinter swimming isn't dangerous for healthy persons, but should be avoided by individuals with heart or respiratory diseases, obesity, high blood pressure and arrhythmia, as well as children and the elderly. Through conditioning, experienced winter swimmers have a greater resistance to effects of the cold shock response.\nHypothermia poses a smaller risk. According to Tucker and Dugas, it takes more than approximately 30 minutes even in 0 °C water until the body temperature drops low enough for hypothermia to occur. Many", "plunge on New Year's Day as well as regular swims in the Atlantic Ocean every Sunday from November to April. Health risks Winter swimming can be dangerous to people who are not used to swimming in very cold water. After submersion in cold water the cold shock response will occur, causing an uncontrollable gasp for air. This is followed by hyperventilation, a longer period of more rapid breathing. The gasp for air can cause a person to ingest water, which leads to drowning. As blood in the limbs is cooled and returns to the heart, this can cause fibrillation and", "in aquatic mammals (seals, otters, dolphins, muskrats), but exists in other mammals, including humans. Diving birds, such as penguins, have a similar diving reflex. The diving reflex is triggered specifically by chilling the face and breath-hold. The most noticeable effects are on the cardiovascular system, which displays peripheral vasoconstriction, slowed pulse rate, redirection of blood to the vital organs to conserve oxygen, release of red blood cells stored in the spleen, and, in humans, heart rhythm irregularities. Aquatic mammals have evolved physiological adaptations to conserve oxygen during submersion, but the apnea, bradycardia, and vasoconstriction are shared with terrestrial mammals as", "sensation of cold, rising from below, can make the kayaker feel as if the boat is filling with water. The lone hunter may also feel overcome by an intense fear of drowning, although it has been reported that this particular effect may be diminished upon seeing another hunter or by returning to land. Avoidance behaviours (i.e. becoming reluctant to go on future hunting expeditions) are likely to manifest on subsequent hunting expeditions before such behaviour transitions into a total incapability of hunting in the long-term. It has also been hypothesised that sufferers may be predisposed to other conditions, such as", "lungs), concentrating flow in a heart–brain circuit and allowing the animal to conserve oxygen.\nIn humans, the diving reflex is not induced when limbs are introduced to cold water. Mild bradycardia is caused by subjects holding their breath without submerging the face in water. When breathing with the face submerged, the diving response increases proportionally to decreasing water temperature. However, the greatest bradycardia effect is induced when the subject is holding his breath with his face wetted. Apnea with nostril and facial cooling are triggers of this reflex.\nThe diving response in animals, such as the dolphin, varies considerably depending on", "make the animal slippery and more able to escape from predators. The skin is shed every few weeks. It usually splits down the middle of the back and across the belly, and the frog pulls its arms and legs free. The sloughed skin is then worked towards the head where it is quickly eaten.\nBeing cold-blooded, frogs have to adopt suitable behaviour patterns to regulate their temperature. To warm up, they can move into the sun or onto a warm surface; if they overheat, they can move into the shade or adopt a stance that exposes the minimum area of skin", "holds air and the skin does not get wet when it swims. When it emerges from the water it enters one of its many burrows and any moisture adhering to the fur is absorbed by the earth walls. It mostly feeds on aquatic organisms which are caught while it is swimming. It can remain underwater for twenty seconds before it has to surface to breathe. Larger prey items can be subdued by the toxic secretions from its submaxillary glands. They feed on crayfish, water snails, small fish, aquatic larvae, insects, spiders, amphibians, especially newts and small rodents are also eaten.", "and when pursuing prey below the thermocline region. It has been hypothesized that tunas can rapidly alter their whole-body thermal conductivity by at least two orders of magnitude. This is done by disengaging the heat exchangers to allow rapid warming as the tuna ascend from cold water into warmer surface waters, and are then reactivated to conserve heat when they return into the depths. Through this unique ability, tunas can reach out into otherwise hazardously cold water in order to hunt for food or escape from predators. Variations in their muscle temperatures are not necessarily influenced by water temperatures or", "or not this is a new behaviour; before polar ice shrinkage, they opined that there was probably neither the need nor opportunity to swim such long distances.\nThe polar bear may swim underwater for up to three minutes to approach seals on shore or on ice floes. Indigenous people Polar bears have long provided important raw materials for Arctic peoples, including the Inuit, Yupik, Chukchi, Nenets, Russian Pomors and others. Hunters commonly used teams of dogs to distract the bear, allowing the hunter to spear the bear or shoot it with arrows at closer range. Almost all parts of captured animals", "and penguins.\nThe diving reflex is triggered specifically by chilling and wetting the nostrils and face while breath-holding, and is sustained via neural processing originating in the carotid chemoreceptors. The most noticeable effects are on the cardiovascular system, which displays peripheral vasoconstriction, slowed heart rate, redirection of blood to the vital organs to conserve oxygen, release of red blood cells stored in the spleen, and, in humans, heart rhythm irregularities. Although aquatic animals have evolved profound physiological adaptations to conserve oxygen during submersion, the apnea and its duration, bradycardia, vasoconstriction, and redistribution of cardiac output occur also in terrestrial animals as", "for fish and is considered inhumane because it can take the fish over an hour to die. One Dutch study found that it took 55–250 minutes for various species of fish to become insensible during asphyxiation. Fish that evolved for low-oxygen environments take longer to die. At higher temperatures, fish lose consciousness more quickly.\nMeat quality and shelf-life are also diminished when this method is used. Ice bath Also called live chilling, this method involves putting fish in baths of ice water, where they chill and eventually die of anoxia. Because chilling slows metabolic rate and oxygen needs, it may prolong", "clam bed they might revisit in another five years.\nThe two animals then take similar paths. They have to travel because shorter winters mean ice that freezes later and melts sooner, making it harder to survive and eat as the water of Arctic Ocean expands. Male polar bears pose a threat to both of the main creatures, as the cubs have to navigate around him and the walruses try to get away from being prey. After Nanu's brother dies, Nanu has to leave her mother earlier than is customary because of the changing climate conditions, but she still has trouble finding", "at speeds of 15–20 km/h (9–12 mph), they all come up to breathe at the same time, then dive and swim up to 1–2 km (0.62–1.24 mi) before surfacing again. They migrate in large pods consisting of a hundred or more seals, to within 1–8 km (0.62–4.97 mi) of the shoreline, which they then follow, feeding on crustaceans and fish.\nWalruses, which do not migrate far off land in the winter. They merely follow the \"fast ice\", or ice that is solidly attached to land, and stay ahead of it as the ice hardens further and further out to sea. As winter progresses, they will always remain", "as \"cryoprotectants\" to limit the amount of ice that forms and to reduce osmotic shrinkage of cells. Frogs can survive many freeze/thaw events during winter if no more than about 65% of the total body water freezes. Research exploring the phenomenon of \"freezing frogs\" has been performed primarily by the Canadian researcher, Dr. Kenneth B. Storey.\nFreeze tolerance, in which organisms survive the winter by freezing solid and ceasing life functions, is known in a few vertebrates: five species of frogs (Rana sylvatica, Pseudacris triseriata, Hyla crucifer, Hyla versicolor, Hyla chrysoscelis), one of salamanders (Hynobius keyserlingi), one of snakes (Thamnophis sirtalis)" ]
What's the difference between tornadoes, hurricanes, cyclones, typhoons etc?
[ "All are spinning masses of air. Tornadoes are much smaller than the others being only a matter of yards across. A cyclone is air spinning around a low pressure system and can be used regardless of the size. Cyclone is also used for a violent tropical storm, especially one originating in the southwestern Pacific Ocean or Indian Ocean. Hurricanes and typhoons are the same thing. If it's in the Atlantic it's called a hurricane and if it's in the Pacific around south East Asia china and Japan it's called a typhoon. \nHurricane can also be used for any wind with a speed over 73mph.", "They are regional titles (except for tornadoes).\nWestern Hemisphere hurricanes tend to be the strongest I believe, particular those that reach the gulf stream.\nThese storms occur in warm, tropical regions and rely on warm water to sustain themselves.\nTornados are moving columns of air often formed in places where cold and warm fronts converge.", "It's whether the person getting blown is Oklahoman, Jamaican, Indian or Taiwanese." ]
[ "tropical depression, or simply as a cyclone. Generally speaking, a tropical cyclone is referred to as a hurricane (from the name of the ancient Central American deity of wind, Huracan) in the Atlantic and eastern Pacific oceans, a typhoon across the northwest Pacific ocean, and a cyclone across in the southern hemisphere and Indian ocean.\nTropical cyclones can produce extremely powerful winds and torrential rain, as well as high waves and damaging storm surge. They develop over large bodies of warm water, and lose their strength if they move over land. This is the reason coastal regions can receive significant damage", "tropical cyclone is a rapidly rotating storm system characterized by a low-pressure center, a closed low-level atmospheric circulation, strong winds, and a spiral arrangement of thunderstorms that produce heavy rain or squalls. A tropical cyclone feeds on heat released when moist air rises, resulting in condensation of water vapor contained in the moist air. Tropical cyclones may produce torrential rain, high waves, and damaging storm surge. Heavy rains produce significant inland flooding. Storm surges may produce extensive coastal flooding up to 40 kilometres (25 mi) from the coastline.\nAlthough cyclones take an enormous toll in lives and personal property, they", "narrow aggressively rotating mixtures of air that come from the base of a thunderstorm, being the most violent of storms. Tornadoes are usually hard to see unless they form a condensations funnel made from:- dust, water droplets and debris. Tornadoes take place in several parts of the world, such as Australia, Europe, Africa but mostly occur in the United States, Argentina, and Bangladesh. Hurricanes Hurricanes, cyclones, tropical storms and typhoons can be referred to as the same. They combine low pressure and strong winds that rotate counter clockwise in the northern hemisphere and clockwise in the southern hemisphere. Tropical cyclones", "hurricane season in the Gulf Coast states and Southeastern states. Because these areas are prone to hurricanes, they may be struck with tornadoes that are spawned from hurricanes. Tornadoes are most likely to form in the right-front quadrant of the hurricane, but can also form in rain bands associated with the storm. This is caused by the large amount of vertical wind shear to the right of the storm. Tornadoes are also spawned from U.S. hurricanes due to the moistness of the air at the landfall of the storm, which makes conditions favorable for a supercell storm to develop within", "Atlantic hurricane Steering factors Tropical cyclones are steered by the surrounding flow throughout the depth of the troposphere (the atmosphere from the surface to about eight miles (12 km) high). Neil Frank, former director of the United States National Hurricane Center, used the analogies such as \"a leaf carried along in a stream\" or a \"brick moving through a river of air\" to describe the way atmospheric flow affects the path of a hurricane across the ocean. Specifically, air flow around high pressure systems and toward low pressure areas influences hurricane tracks.\nIn the tropical latitudes, tropical storms and hurricanes generally move", "which term is used is based on where they originate. In the Atlantic and Northeast Pacific, the term \"hurricane\" is used; in the Northwest Pacific it is referred to as a \"typhoon\" and \"cyclones\" occur in the South Pacific and Indian Ocean.\nThe deadliest hurricane ever was the 1970 Bhola cyclone; the deadliest Atlantic hurricane was the Great Hurricane of 1780 which devastated Martinique, St. Eustatius and Barbados. Another notable hurricane is Hurricane Katrina, which devastated the Gulf Coast of the United States in 2005. Blizzards Blizzards are severe winter storms characterized by heavy snow and strong winds. When high winds", "Ocean, such tropical-derived cyclones of higher latitudes can be violent and may occasionally remain at hurricane or typhoon-force wind speeds when they reach the west coast of North America. These phenomena can also affect Europe, where they are known as European windstorms; Hurricane Iris's extratropical remnants are an example of such a windstorm from 1995. A cyclone can also merge with another area of low pressure, becoming a larger area of low pressure. This can strengthen the resultant system, although it may no longer be a tropical cyclone. Studies in the 2000s have given rise to the hypothesis that large", "United States tropical cyclone rainfall climatology The United States tropical cyclone rainfall climatology concerns the amount of precipitation, primarily in the form of rain, which occurs during tropical cyclones and their extratropical cyclone remnants across the United States. Typically, five tropical cyclones and their remnants impact the country each year, contributing between a tenth and a quarter of the annual rainfall across the southern tier of the country. The highest rainfall amounts appear close to the coast, with lesser amounts falling farther inland. Obstructions to the precipitation pattern, such as the Appalachian mountains, focus higher amounts from", "rainfall amounts farther from the cyclone's center. This is generally due to the longer time frame rainfall falls at any one spot in a larger system, when compared to a smaller system. Some of the difference seen concerning rainfall between larger and small storms could be the increased sampling of rainfall within a larger tropical cyclone when compared to that of a compact cyclone; in other words, the difference could be the result of a statistical problem. Slow/looping motion on rainfall magnitude Storms which have moved slowly, or loop, over a succession of days lead to the highest", "the United States can occur at any time, they are most common in spring and least common in winter. Because spring is a transitional period for the climate, there are more chances of cooler air meeting with warmer air, resulting in more thunderstorms. Tornadoes can also be spawned by landfalling tropical cyclones, which usually occur in late summer and autumn. In the United States, thunderstorms capable of producing tornadoes usually form when the temperature is at its highest, typically from 4:00 p.m. to 7:00 p.m.\nAlthough the period in which most tornadoes strike (\"tornado season\") is March through June, tornadoes – including violent", "Larger tropical cyclones have larger rain shields, which can lead to higher rainfall amounts farther from the cyclone's center. Storms which have moved slowly, or loop, lead to the highest rainfall amounts. Riehl calculated that 33.97 inches (863 mm) of rainfall per day can be expected within one-half degree, or 35 miles (56 km), of the center of a mature tropical cyclone. Many tropical cyclones progress at a forward motion of 10 knots, which would limit the duration of this excessive rainfall to around one-quarter of a day, which would yield about 8.50 inches (216 mm) of rainfall. This would", "higher. Tornadoes can occur one at a time, or can occur in large tornado outbreaks associated with supercells or in other large areas of thunderstorm development. Waterspouts are tornadoes occurring over tropical waters in light rain conditions. Climate change Climate change can increase or decrease weather hazards, and also directly endanger property due to sea level rise and biological organisms due to habitat destruction. Geomagnetic storm Geomagnetic storms can disrupt or damage technological infrastructure, and disorient species with magnetoception. Flood A flood results from an overflow of water beyond its normal confines of a body of water such as a", "cyclones from the Atlantic basin have the most sway along the Gulf coast and Eastern Seaboard. The impact of tropical cyclones and their remnants originally from the eastern Pacific stretches as far east as Michigan and Indiana. Rainfall related to the low pressure area once associated with a tropical cyclone, or its remnants aloft, are included in this sample. No additional rainfall from pre-existing upper lows as seen before cyclones such as Hurricane Fran of 1996 or from upper cyclones that closed off behind former tropical cyclones such as Hurricane Juan of 1985 was included.\nThe state of", "bring significant localized snowfall. Tropical cyclones Rainbands exist in the periphery of tropical cyclones, which point towards the cyclone's center of low pressure. Rainbands within tropical cyclones require ample moisture and a low level pool of cooler air. Bands located 80 kilometres (50 mi) to 150 kilometres (93 mi) from a cyclone's center migrate outward. They are capable of producing heavy rains and squalls of wind, as well as tornadoes, particularly in the storm's right-front quadrant.\nSome rainbands move closer to the center, forming a secondary, or outer, eyewall within intense hurricanes. Spiral rainbands are such a basic structure to a", "the seasons when stronger winds, wind shear, and atmospheric instability are present. Tornadoes are focused in the right front quadrant of landfalling tropical cyclones, which tend to occur in the late summer and autumn. Tornadoes can also be spawned as a result of eyewall mesovortices, which persist until landfall.\nTornado occurrence is highly dependent on the time of day, because of solar heating. Worldwide, most tornadoes occur in the late afternoon, between 3 pm and 7 pm local time, with a peak near 5 pm. Destructive tornadoes can occur at any time of day. The Gainesville Tornado of 1936, one of the deadliest tornadoes", "Extratropical cyclone Terminology The term \"cyclone\" applies to numerous types of low pressure areas, one of which is the extratropical cyclone. The descriptor extratropical signifies that this type of cyclone generally occurs outside the tropics and in the middle latitudes of Earth between 30° and 60° latitude. They are termed mid-latitude cyclones if they form within those latitudes, or post-tropical cyclones if a tropical cyclone has intruded into the mid latitudes. Weather forecasters and the general public often describe them simply as \"depressions\" or \"lows\". Terms like frontal cyclone, frontal depression, frontal low, extratropical low, non-tropical low and hybrid low", "tropical cyclones originates from Sahara desert dust, when the drifting sand and mineral particles laden air moves over the Atlantic Ocean. The particles reflect and absorb sunlight, less sun rays reach Earth surface layers, thus resulting in cooler water and land surface temperatures, and also less cloud formation, subsequently dampening the development of hurricanes.", "Tropical cyclone rainfall forecasting Rainfall distribution around a tropical cyclone A larger proportion of rainfall falls in advance of the center (or eye) than after the center's passage, with the highest percentage falling in the right-front quadrant. A tropical cyclone's highest rainfall rates can lie in the right rear quadrant within a training (non-moving) inflow band. Rainfall is found to be strongest in their inner core, within a degree of latitude of the center, with lesser amounts farther away from the center. Most of the rainfall in hurricanes is concentrated within its radius of gale-force winds. ", "tropical cyclones that develop in the basin, which can result in a tropical cyclone having two names. As part of its duty as a Regional Specialized Meteorological Center (RSMC), the JMA's Typhoon Center in Tokyo assigns international names to tropical cyclones on behalf of the World Meteorological Organization's Typhoon Committee, should they be judged to have 10-minute sustained winds of 65 km/h (40 mph). The PAGASA assigns names to all tropical cyclones that move into or form as a tropical depression in their area of responsibility, located between 135°E and 115°E and between 5°N-25°N, even if the cyclone has had an international", "such as tornadoes, can occur near the center of cold-core lows. Cold lows can help spawn cyclones with significant weather impacts, such as polar lows, and Kármán vortices. Cold lows can lead directly to the development of tropical cyclones, owing to their associated cold pool of air aloft or by acting as additional outflow channels to aid in further development. Characteristics Cold cyclones are stronger aloft than at the Earth's surface, or stronger in areas of the troposphere with lower pressures, per the thermal wind relationship and the hypsometric equation. The hypsometric equation dictates that colder atmospheres have less room", "Tropical cyclone windspeed climatology Winds in tropical cyclones The winds in a tropical cyclone are the result of evaporation and condensation of moisture which results in updrafts. The updrafts in turn increase the height of the storm which causes more condensation. Location of the winds The strongest winds in a northern hemisphere tropical cyclone is located in the eyewall and the right front quadrant of the tropical cyclone. Severe damage is usually the result when the eyewall of a hurricane, typhoon or cyclone passes over land. The right front quadrant is also an area of a tropical cyclone were the", "are useful in predicting the maximum potential of a tropical cyclone. However, since the intensity of a storm undergoes large daily fluctuations, the maximum possible intensity of a cyclone is usually not reached. Hurricane Structure Most hurricanes exhibit a definitive eyewall and spiral rainbands outside of the eye. These spiral rainbands were known to be complex structures that possess deep convective cores enmeshed in low altitude precipitative clouds.\nThe eye or core of a tropical cyclone is characterized by low pressure which causes warm air to spiral upward and rise into the atmosphere. A tropical cyclone usually develops a distinct eye", "either one or both of the cyclones. The precise results of such interactions depend on factors such as the size of the two cyclones, their strength, their distance from each other, and the prevailing atmospheric conditions around them. General Extratropical cyclones can bring mild weather with a little rain and surface winds of 15–30 km/h (9.3–18.6 mph), or they can be cold and dangerous with torrential rain and winds exceeding 119 km/h (74 mph), (sometimes referred to as windstorms in Europe). The band of precipitation that is associated with the warm front is often extensive. In mature extratropical cyclones, an area known as the", "or the increase in sea level due to the cyclone, is typically the worst effect from landfalling tropical cyclones, historically resulting in 90% of tropical cyclone deaths.\nThe broad rotation of a landfalling tropical cyclone, and vertical wind shear at its periphery, spawns tornadoes. Tornadoes can also be spawned as a result of eyewall mesovortices, which persist until landfall.\nOver the past two centuries, tropical cyclones have been responsible for the deaths of about 1.9 million people worldwide. Large areas of standing water caused by flooding lead to infection, as well as contributing to mosquito-borne illnesses. Crowded evacuees in shelters increase the risk", "The Outer Banks are susceptible to reoccurring hurricanes that pummel their fragile coastline. Hurricanes are intense tropical cyclones that develop in the Atlantic Basin. A tropical cyclone is a non-frontal low-pressure system that forms over tropical or sub-tropical waters with organized thunderstorm activity and established surface wind circulation. A tropical cyclone begins as a tropical wave that commonly forms of the west coast of Africa. Tropical waves are areas of unsettled weather consisting of vertical air movement. Water vapor is drawn upward from warm surface waters and large amounts of heat energy are released when water vapor rises and condenses.", "tropical cyclone dynamics. Hurricanes are fueled by the high ocean temperature. Sea surface temperatures immediately underneath a tropical cyclone can be several degrees cooler than those at the periphery of a storm, and therefore cyclones are dependent upon receiving the energy from the ocean from the inward spiraling winds. When an outer eyewall is formed, the moisture and angular momentum necessary for the maintenance of the inner eyewall is now being used to sustain the outer eyewall, causing the inner eye to weaken and dissipate, leaving the tropical cyclone with one eye that is larger in diameter than the previous", "appear in the sky, one can expect a sudden increase in the wind in less than 15 minutes. Tropical cyclones Tropical cyclones normally have squalls coincident with spiral bands of greater curvature than many mid-latitude systems due to their smaller size. These squalls can harbor waterspouts and tornadoes due to the significant vertical wind shear which exists in the vicinity of a tropical cyclone's outer bands. Winter weather Snow squalls can be spawned by an intrusion of cold air aloft over a relatively warm surface layer. Lake effect snows can be in the form of a snow squall.", "tropical cyclones that develop in the Western Pacific, which can result in a tropical cyclone having two names. The Japan Meteorological Agency's RSMC Tokyo — Typhoon Center assigns international names to tropical cyclones on behalf of the World Meteorological Organization's Typhoon Committee, should they be judged to have 10-minute sustained windspeeds of 65 km/h, (40 mph). While the Philippine Atmospheric, Geophysical and Astronomical Services Administration assigns names to tropical cyclones which move into or form as a tropical depression in their area of responsibility located between 135°E and 115°E and between 5°N-25°N even if the cyclone has had an international name assigned to", "cyclones. If systems occur outside the defined hurricane season, special Tropical Weather Outlooks will be issued. While a tropical cyclone is active, six hourly advisories will be issued, which become more frequent once a tropical cyclone watch or warning are issued. Tropical cyclone watches and warnings are coordinated within the countries and dependencies involved, with the National Hurricane Center coordinating with National Weather Service Forecast Offices concerning storms threatening the United States and its dependencies. Routine coordination occurs at 1700 UTC each day between the Weather Prediction Center and National Hurricane Center to identify systems for", "Weather is normally unsettled in the vicinity of a cyclone, with increased cloudiness, increased winds, increased temperatures, and upward motion in the atmosphere, which leads to an increased chance of precipitation. Polar lows can form over relatively mild ocean waters when cold air sweeps in from the ice cap. The relatively warmer water leads to upward convection, causing a low to form, and precipitation usually in the form of snow. Tropical cyclones and winter storms are intense varieties of low pressure. Over land, thermal lows are indicative of hot weather during the summer. High pressure High-pressure systems, also known as" ]
How does "The lion Whisperer" on youtube interact with lions and hyenas? Can't they just turn things around him any minute?
[ "With any animal it comes down to training and experience. Same thing can happen with dog trainers and happens all the time. \n\nLots of dog trainers for the police department have been bit by there trainees it is a hazard of the job. \n\nRoy of Siegfried & Roy career ended after being ”attacked” by one of there own lions." ]
[ "is waiting to maul Sylvester for his earlier remarks (not to mention Sylvester clobbering him with a mallet). From this point forward, the lion serves as both an antagonist for Sylvester and a protector of Tweety.\nSylvester tries beating what he thinks is a fire hose to free Tweety, unknowing that the \"hose\" is an elephant's trunk. The elephant grabs Sylvester with his trunk and—after crushing his chest—throws the battered puss into the lion's cage, where the lion finishes the job.\nOther run-ins with the lion, elephant and other animals, all ending with Sylvester getting the worst of things, involve him exploiting", "audiences the monologue The Lion and Albert. The monologue was written by Marriott Edgar, who based the story on a news item about a boy who was eaten by a lion in the zoo. In the monologue, Mr. and Mrs. Ramsbottom react in a measured way when their son Albert is swallowed. Neither Edgar nor Holloway was convinced that the piece would succeed, but needing material for an appearance at a Northern Rugby League dinner Holloway decided to perform it. It was well received, and Holloway introduced it into his stage act. Subsequently, Edgar wrote 16 monologues for him.", "head.\" And the confused guest would proceed to do so.\nOn radio and the early TV shows, Froggy's voice was frequently supplied by Arch (\"Archie\") Presby, who was also the program's announcer.\nHe appeared on screen a puff of smoke with the catchphrase, \"Hiya, kids! Hiya hiya hiya hiya!\" The human host had another catchphrase, directed to Froggy, \"Plunk your magic twanger, Froggy!\"", "Lions Competition, a television advertising contest, was an Oxfam commercial based on Oobi. Titled \"Let Your Hands Do the Talking,\" it featured spoofs of celebrities portrayed as hand puppets and given \"Oo\"-themed names in the vein of Oobi and Uma.\nThe show is mentioned in a variety of books published by television producers, puppeteers, and parents of young children. Satirist Neal Pollack mentions the show in his autobiography Alternadad, in which he notes that Oobi \"offered the standard share-and-be-creative message ... it also featured a hilarious character called Grampu.\" It is briefly referenced in Laura Lynn's Ariel's Office, in which the", "his loud voice kept scaring them off. At least until a tiger (Martin P. Robinson) came along, roaring and scaring away Guy's guide (Richard Hunt), but the tiger took the camera and took Guy's picture with the other animals. His pith helmet was provided by Zimbabwe After Six. \nSmiley shows up as a non-speaking background extra (wearing an odd, unusually stern expression) along with many other Muppets in the musical skit \"Some/None.\" International Sesame Street is localized for international markets, where Smiley is often renamed. In Portugal, for example, he's \"Carlos Luz\", a play on words with the name of", "to animals, before correcting himself and stating that he can take commands from them (a possible reference to David Berkowitz, who claimed that \"talking dogs\" had instructed him to commit his multiple homicides).\nIn \"Apollo, Apollo\" it was shown that Kenneth sees everyone as Muppets, and in \"Dealbreakers Talk Show #0001\", he appeared as a Muppet himself when walking past an HD camera. In \"Ludachristmas\", Kenneth states that he had \"a 'coke' problem, during [his] 'Wall Street' days.\" However, a flashback reveals that he actually had developed an addiction to the soft drink Coca-Cola, when he was employed at Blockbuster Video,", "holding hands as a lion walks off in the distance, leaving behind broken glasses and a trail of blood, presumably of their parents. The video is dedicated to Bradbury, who died weeks before the video was published. The video's art style, which makes heavy use of dark silhouettes and puppet-like animation, bears a strong resemblance to the independent video game Limbo.", "the voice in the mid-2000s. He has appeared as both a puppet and a mascot, the latter of which has been played by various dancers on staff. Wags the Dog Introduced in 1995, Wags is a tall, brown, furry dog with floppy ears and a happy face. He is also Captain Feathersword's best friend and pet. He \"loves to sing and dance and kids bring 'bones' that the Wiggly dancers collect from the audience\". The last of the four characters to be introduced, Wags was originally played by Field. Fatt provided the original barking noises for Wags before Paul", "boys harass the zoo animals, feeding cigars to a hippopotamus. While the staff are dealing with this, Chris steals Branch's keys and opens all of the cages, setting the animals loose to wander the city. This results in a series of comedic situations including an ostrich swallowing a portable radio, a bear riding a bicycle through the streets, a zebra getting into a family's kitchen, an Asian elephant drinking a man's bathwater, and several primates invading a toy store. Public panic ensues, and the zoo staff scramble to round up the animals before the police start killing them. Councilman Pew", "the Talking Dog\" for which he tried to say things like \"I love you\" and \"ice cream\" but did not succeed in talking, and another featuring a Village People parody as The Village Little People where they sang a cover of \"YMCA\", taking the \"Young Man\" literally. Orange County comedy punk band The Radioactive Chicken Heads (then called Joe & the Chicken Heads) made their national television debut on Extreme Gong, though they were gonged midway through their performance. Near the end of the show's run, an hour-long \"Tournament of Talent\" special was aired in August 1999, with twelve acts", "A Lion Walks Among Us Plot The District Attorney's wife, Sally, picks up hitchhiker Luke Freeman on the way to Sunrise Colorado. He makes a play for her but she kicks him out of the car. \nLuke then robs a grocery store, killing the grocer, Mr Jordan, by throwing him against a table then shooting him dead. After doing this, Luke sings a song to himself, \"I Couldn't Hear Nobody Pray\".\nLuke goes on to visit a tavern, Jeft's Road House, where he starts a brawl after flirting with a young girl, Linda, and singing a song. He pulls a switchblade", "beloved then-pet chimp Bubbles makes a cameo appearance as Jackson is seen picking him up and riding with him in his roller coaster car. His pet snake, Muscles, is also present. The press are portrayed with dog heads to insinuate that they are like animals. The segment ends with Jackson destroying the park, and looking off into space. \"Smooth Criminal\" The segment begins with three homeless children (Sean, Katie, and Zeke) sneaking through a big city to see their friend Michael moving out of his apartment. As Michael stands in front of the door, he notices a falling star before", "Lion King (1994) and multiple sequels and spin-offs as Pumbaa. He also has worked with Nathan Lane, who had voiced Timon, in Guys and Dolls, Mouse Hunt, The Producers (in a deleted scene) and A Funny Thing Happened on the Way to the Forum. In the latter production, Sabella portrayed Marcus Lycus while Lane played Pseudolus. Sabella also joined Lane for his Saturday Night Live monologue, where they sang \"Hakuna Matata\".\nOn television, Sabella portrayed apartment manager Lou Donatelli in the Jason Bateman comedy It's Your Move (1984–85). He appeared in an episode of Cheers titled \"Love Thy Neighbor\" (Season Four", "Listen to the Lion (film) Plot A Sydney derelict lies drunk in an alley and is beaten up by thugs. A friend helps him find refuge in a night shelter. As he lies dying he has a vision of himself flying about the room. The man dies and after the cremation of his corpse, his spirit returns to the footpath. Production The film was written by Robert Hill, a former journalist who spent months researching the life of homeless people in Sydney. A substantial portion of the budget was provided by the General Production Fund of the Australian Film Commission.", "Cult) and Toni Aleman. Guest appearances include Sin Quirin (Ministry), Mitch Perry (Edgar Winter, Cher), Roy Z (Halford, Judas Priest, Iron Maiden) and others.\nLion appears in Attack of Life: The Bang Tango Movie, a 2016 documentary film about 80's hard rock band Bang Tango; directed by Drew Fortier. Personal life As noted by some of the videos he has posted on his official YouTube channel, Lion is an ardent canine lover and supporter. He has spoken out multiple times against animal cruelty and on people blaming most dog attacks on fighting breeds, which is statistically untrue. Lion also has a", "The Lionhearts Plot The Lionhearts focuses on the behind the scenes life of MGM's mascot, Leo Lionheart, and his family. The series shows The Lionhearts living in a normal house and living a normal life just like non-celebrity families. Most of the members of the family are named after famous MGM movie stars. The characters first appeared on a series of Sing-Along children's videos released by MGM in 1997. The original character designs (especially those of Spencer and Kate) were greatly modified for the TV series. Ashley Tisdale provided the voice of Kate in the Sing-Along videos .", "voice. As part of the settlement, the disclaimer \"Snagglepuss voice by Daws Butler\" was required to appear on each commercial, making him the only voice actor ever to receive one in an animated TV commercial. Butler redesigned these voices, making them his own inventions. Huckleberry Hound was inspired many years earlier, in 1945, by a North Carolina neighbor of Daws' wife's family, and he had in fact been using that voice for a long time, for Avery's laid-back wolf and Lantz' Smedley (and thus only by coincidence resembled the voice of Andy Griffith, whose typical vocal accent also", "this dance routine is similar to the choreography of Michael Jackson's music video \"Thriller\".\nNoodle is then shown joyfully skipping along, almost as if she is completely unaware of her surroundings, and in her playful skipping, she delivers a hard kick to one of the zombie gorillas in the face. Immediately afterwards, Del is then sucked back into Russel's head as the gorillas all disintegrate, and the band members are left standing in the cemetery, now bright with sunlight. The video then concludes with a split screen showing each of the four band members and their names. The video has a", "the catwalks, and sitting briefly at an unused keyboard and drum kit. These sequences are intercut with shots from the dog's black-and-white perspective, including a brief dream in which it sits at a formal table loaded with food.\nAt two different times, the dog relieves itself onstage, first by defecating near backing singer Arnold McCuller - only discovered when he steps in the resulting mess - then later by urinating on bassist Leland Sklar's leg. The latter occurs near the end of the song, and the video ends after Collins smiles and wipes Sklar's shoe with a towel.", "of the first frogs to talk to humans. He is shown in the film encountering a 12-year-old Jim Henson (played by Christian Kriebel) for the first time.\nAccording to The Muppet Movie, Kermit returned to the swamp, where a passing agent (Dom DeLuise) noted he had talent and, thus inspired, he headed to Hollywood, encountering the rest of the Muppets along the way. Together, they were given a standard \"rich and famous\" contract by Lew Lord (Orson Welles) of Wide World Studios and began their showbiz careers. In Before You Leap, Kermit again references encountering Jim Henson sometime after the events", "team. Career At the suggestion of a friend, Segers auditioned for voice ads at a New Zealand radio station. His natural bass tone earned him a lot of attention, and caught the attention of an agent that led Segers to be cast as Mufasa in the Australian production of The Lion King. He went on to star in the American and Chinese productions as well.\nIn 2010, Segers gained a main role on Pair of Kings as Mason Makoola.\nIn 2018, Segers recurred on the TV series Knight Squad as the main villain Ryker. He also reprised this role in a crossover", "Lion (2015 film) Plot The film opens in a hospital at Mumbai, where Bose (Nandamuri Balakrishna) has come out of a coma after eighteen months. As soon as he recovers, Bose is identified as Godse by everyone around him. He is surprised when an elderly couple (Bhoopathi (Chandra Mohan) and Malathi Devi (Jaya Sudha)) claim to be his parents. Bose tries to convince everyone that he is not Godse and that has his own story. Soon, he comes to Hyderabad in search of his true identity, and bumps into Mahalakshmi (Trisha), who he believes is his lover. When she tells", "Kokomo Jr. Kokomo Jr. was the name given to at least two male common chimpanzees used as animal actors, one born c. 1955 and one born c. 1967. Kokomo Jr. replaced J. Fred Muggs as the animal mascot of the Today Show in 1957, and was known for his ability to \"talk\", being able to pronounce the word mama on demand. Kokomo Jr. was retired in 1983. Early life Kokomo Jr.'s handler, Nick Carrado was a stage magician who discovered him while touring at an animal farm in Cape Cod circa 1956. The name was created by combining the names", "up, the deer throws rabbits at the window and introduces himself as Elliot. He tells him to be \"free\" from his garage captivity and introduces Boog to a world of sweet temptations he has never known. When Boog becomes sick from eating too many candy bars, events quickly spiral out of control, as the two raid the town's grocery store. Elliot escapes before Boog is caught by a friend of Beth's police officer Gordy. At the nature show, Elliot being chased by Shaw, sees Boog, which \"attacks\" him. This causes the whole audience to panic. \nShaw attempts to shoot Boog", "that can transform into any object; and two troublesome spider monkeys named the Bobo Brothers (voiced by Jose Zelaya), who can be stopped by shouting \"Freeze, Bobos!\" and Diego often encourages viewers to help him stop them by shouting it. While they might be compared to Swiper from Dora, they don't cause trouble for Diego on purpose and apologize after doing so.\nThere are a few recurring animal friends that are normally rescued by Diego in their first appearance but appear later to return the favor and help Diego out. The most common of these is Linda the Llama (voiced by", "students alongside Bob's Big Boy (voiced by Joel Michaely) and Haribo Boy (voiced by Matt Winston) are on a tour at a zoo led by a flamboyant Mr. Clean (voiced by Michaely); hating the tour, Big Boy and Haribo Boy hop off the tour train and soon begin to harass the MGM lion by mooning and throwing a bottle of Coca-Cola at it, prompting the zoo's owner, the Jolly Green Giant (voiced by Michaely), to scold them. \nAs Michelin Man police officers Mitch and Mike (voiced by Bob Stephenson and Sherman Augustus) order lunch at KFC, a call comes in", "chimp turned around, she said, as if to say, \"'Mom, what did you do?'\" The animal grew angrier. Herold then called 9-1-1 and pleaded for help. Travis' screams can be heard in the background of the tape as Sandra pleaded for police, who initially believed the call to be a hoax, until she started screaming, \"He's eating her!\" Emergency medical services waited for police before approaching the house. Travis walked up to the police car when it arrived, tried to open a locked passenger door, and smashed a side-view mirror. Then he went calmly around to the driver's-side door and", "Hannah Zapruder, who is one of the cheerleaders. It is later revealed that T'Boo is afraid of frogs ever since an incident in his biology class when he was attacked by a frog that came back from the dead.\nMeanwhile, Scout's grandfather has several broken bones (including his jaw) due to Scout accidentally (and unknowingly) knocking him off a ladder. When Mrs. Marlowe, the principal, becomes aware that a safety patrol member is involved in the thefts, Kent, Mrs. Day, and Mr. Miller look for a scapegoat to put the blame on, and so they employ Scout as a member of", "notices a commercial painter inside the lion enclosure. He enters the pen to interrogate the mysterious man, but he is attacked by the lions and barely escapes.\nWhen the deranged woman, Jane Crenna, is transferred from the precinct to a mental health facility, a Jesuit priest, Mendoza, arrives at the family's request. He asks the officers several pointed questions about Jane's behavior at the zoo. When another domestic disturbance call comes in, Sarchie notices the complaint makes reference to doors and decides that he and Butler will respond. At the house, the family of three have been staying in the living", "The Lion King 1½ Plot As Timon and Pumbaa watch the original film in a theater, Timon decides to fast-forward to their scenes. Pumbaa's protest over this eventually prompts Timon to share his backstory, going back to before the beginning of the movie.\nTimon is a social outcast in his meerkat colony on the outskirts of the Pride Lands due to frequently messing things up by accident. Though he is unconditionally supported by his mother, Timon dreams for more in life than his colony's bleak existence hiding from predators. One day, he is assigned as a sentry, but his daydreaming nearly" ]
Why do I have the sudden urge to cough while using Q-Tips?
[ "Ok, so basically, you have two cranial nerves that supply sensation to your throat, oral cavity, larynx, trachea, and external ear canal. When you insert a Q-tip, it stimulates these nerves, causing a discharge of signals to your brain. These nerves aren't completely separated, so your brain senses an irritation in your throat, which triggers the cough reflex. This same association of nerve impulses causes many people to feel they have a sore throat/earache when in fact their ears are free of infection. Hope this helps!", "I'm thinking it has something to do with the nervous system, and I would like an answer as well. I can make myself sneeze by rubbing my right eyeball." ]
[ "She puts a pill in her mouth but quickly spits it back out, then tosses the open bottle out the third-story window.\nAll throughout the day, Gwen experiences withdrawal symptoms. She shuns the meetings and any activities, all the while desperately trying to push through her physical discomfort on her own. Later that evening, in a moment of weakness, she attempts to climb out her window and retrieve the discarded meds. She falls, severely spraining her ankle, and is rescued by Eddie (Viggo Mortensen), a pro baseball player and fellow addict, who is just arriving as a new patient.\nThe next morning,", "rated how consistent the tips were with current cognitive-behavioral cessation techniques. It was found that many of the tips were very consistent with modern cognitive-behavioral smoking cessation treatment programs. The cognitive behavioral tips included setting dates, making commitments, planning things to keep one's mind off smoking, having something to fidget with, having something to put in one's mouth, rewarding oneself when goals have been met, remembering that discomfort associated with withdrawal will subside within two weeks. One tip was found to be spiritual, \"Pray instead of puff\". Since 1999 many of the NicA pamphlets have been updated and current versions", "urination urge only\", while 4 people responded that they experienced \"both a defecation and a urination urge\".\nThe defecation urge that is experienced has been explained to have characteristics such as \"a kind of heaving sensation in the rectal passage\", \"a dull convulsive pain in the gut\", \"a filling-up sensation in the lower abdominal area\", and \"a focusing of all nervous energy on the anal area\", and the intensity of the sensation has been variously described with expressions such as \"enough to make one scared about going to a bookstore again\", \"hellish\", and \"Armageddon-class\". Even in cases where the subject", "for breath. Eventually, Esther describes the ECT as beneficial in that it has a sort of antidepressant effect; it lifts the metaphorical bell jar in which she has felt trapped and stifled. While there, she also becomes reacquainted with Joan Gilling, who also used to date Buddy. \nEsther tells Dr. Nolan how she envies the freedom that men have and how she, as a woman, worries about getting pregnant. Dr. Nolan refers her to a doctor who fits her for a diaphragm. Esther now feels free from her fears about the consequences of sex; free from previous pressures to get", "Nicotine poisoning Signs and symptoms Nicotine poisoning tends to produce symptoms that follow a biphasic pattern. The initial symptoms are mainly due to stimulatory effects and include nausea and vomiting, excessive salivation, abdominal pain, pallor, sweating, hypertension, tachycardia, ataxia, tremor, headache, dizziness, muscle fasciculations, and seizures. After the initial stimulatory phase, a later period of depressor effects can occur and may include symptoms of hypotension and bradycardia, central nervous system depression, coma, muscular weakness and/or paralysis, with difficulty breathing or respiratory failure.\nFrom September 1, 2010 to December 31, 2014, there were at least 21,106 traditional cigarette calls to US", "tense and got up as quickly as possible; hospital staff wrote that her mother seemed entirely oblivious to Genie's emotions and actions. Genie's behavior was typically highly antisocial and proved extremely difficult for others to control. Regardless of where she was she constantly salivated and spat, and continually sniffed and blew her nose on anything that happened to be nearby. She had no sense of personal property, frequently pointing to or taking something she wanted from someone else, or situational awareness. Doctors wrote that she acted on impulse irrespective of the setting, especially noting that she frequently engaged in open", "decker\" or \"top lip dip\". The dip rests on the inside lining of the mouth for a period depending upon the user's preference—often 20–40 minutes. Nicotine and other alkaloids found in tobacco are absorbed in saliva sublabially by the inferior or superior labial arteries. Buccal and sublingual absorption may also occur.\nAlso unlike snus, dip often causes the user to produce excess saliva during the act of dipping. This is typically spit onto the ground or in a container, because swallowing the saliva-tobacco mixture can cause irritation to the esophagus and induce nausea and vomiting. A spittoon can be used, but", "stare\".\nThere are also known to be cases of not simply a defecation urge but also symptoms such as abdominal pain or diarrhea. There are also said to be cases where what presents is not an urge to defecate but an urge to urinate, or need to urinate frequently. Results from a survey of 30 people reported that, of 18 people who responded that they \"have an experience of [being in a bookstore and] going to the bathroom and using the toilet\", 7 people responded that they \"experienced a defecation urge only\" and another 7 that they \"experienced a", "Paruresis Paruresis (/ˌpɑːrəˈriːsɪs/ PAR-ə-REE-sis) is a type of phobia in which the sufferer is unable to urinate in the real or imaginary presence of others, such as in a public restroom. The analogous condition that affects bowel movement is called parcopresis or shy bowel. Physiology It appears that paruresis involves a tightening of the sphincter and/or bladder neck due to a sympathetic nervous system response. The adrenaline rush that produces the involuntary nervous system response probably has peripheral and central nervous system involvement. The internal urethral sphincter (smooth muscle tissue) or the external urethral sphincter (striated muscle), levator ani (especially", "aloin increases peristaltic contractions in the colon, which induces bowel movements. Aloin also prevents the colon from re-absorbing water from the gastrointestinal tract, which leads to softer stools. This effect is caused by aloin's opening of chloride channels of the colonic membrane. In higher doses, these effects may lead to electrolyte imbalance, diarrhea, and abdominal pain, which are common side-effects of the drug. Because aloin can potentially cause uterine contractions, pregnant women should avoid ingesting aloe products containing aloin in more than trace amounts.\nIn a study on consumption of aloe in rats and tilapia (with no separation of gel", "to broadcast their lifestyle, the Pranksters publicise their acid experiences and the term Acid Test comes to life. The Acid Tests are parties where everyone takes LSD (which was often put into the Kool-Aid they served) and abandon the realities of the mundane world in search of a state of \"intersubjectivity.\" Just as the Acid Tests are catching on, Kesey is arrested for possession of marijuana. In an effort to avoid jail, he flees to Mexico and is joined by the Pranksters. The Pranksters struggle in Mexico and are unable to obtain the same results from their acid trips.\nKesey and", "in a human hand, stating \"This is your brain\", alongside a frying pan that the other hand is pointing to, stating \"This is drugs\", and the egg is cracked and gets fried onto the pan, stating \"This is your brain on drugs. Any questions?\". This follows it with scenes of teens, with various ones saying \"Um, yeah, I have questions\", \"Prescription drugs aren't as bad as street drugs, right?\", \"Weed's legal, isn't it?\", \"Drinking is worse than smoking weed. Isn't it?\", \"Why is heroin so addictive?\", \"Molly just makes you feel happy\", \"I have questions\", \"Mom, Dad, did you ever", "cravings allow the user to slowly taper off the drug in a controlled manner, decreasing the likelihood of relapse. It is not accessible to all addicts. It is a regulated substance, and requires that each dose be picked up from a methadone clinic daily. This can be inconvenient as some patients are unable to travel to a clinic, or wish to avoid the stigma associated with drug addiction. Buprenorphine Buprenorphine is used similarly to methadone, with some doctors recommending it as the best solution for medication-assisted treatment to help people reduce or quit their use of heroin or other opiates.", "Post-nasal drip Signs and symptoms PND may present itself through the constant presence of discomfort within an individual's upper airways as a result of the transportation of mucus from nasal membranes down the back of the throat consequently triggering a cough which becomes more pronounced in some cases due to heightened response to various infections.\nGERD is often associated with a high prevalence of upper respiratory symptoms similar to PNDS such as coughing, throat clearing, hoarseness and change in voice. Reflux causes throat irritation, leading to a sensation of increased mucus in the throat which is believed to aggravate and in", "had never perceived before that moment, i.e. that he was an addict. Second, his son John lent him a medical handbook which explained that the physical withdrawal from nicotine is just like an \"empty, insecure feeling\". He claims that these two realisations crystallised in his mind just how easy it was to stop and so then enabled him to follow an overwhelming desire to explain his method to as many smokers as possible. Easyway Carr left his accountancy job in 1983 and set up his first Easyway clinic to charge other addicts for advice. He wrote ten books which appeared", "the nose.\" It worked quickly because, \"almost immediately they believe they see the room turn upside-down and men walking with their heads downwards.\" The administering witch-doctor took the drug along with his patients, intoxicating \"them so that they do not know what they do and...speak of many things incoherently,\" believing that they are in communication with spirits. Bufotenin The beans have been found to contain up to 7.4% bufotenin. At up to 7.4% (74 mg per gram) bufotenin, an effective 40 mg dose of insufflated bufotenin requires little more than 0.5 grams of beans.\nThe intraperitoneal LD₅₀ of bufotenin is between 200–300 mg/kg (in rodents)", "doing anything to get yourself back in touch with something real. Abstinence from anything is cool, because the normalcy of life is deceptive: It's enjoyable for a while, and there are good moments, but sometimes that's not enough. You start questioning what's the point. By not opening my mouth I was able to get into that state. Jack called me at the end of it; he couldn't understand what I was saying. It took a minute to get my speech back. Reception Without being released as a single, \"In Hiding\" peaked at number 14 on the Billboard Mainstream Rock Tracks", "when administered to mice. At sufficiently high doses, it is associated with nicotine poisoning, which, while common in children, rarely results in significant morbidity or death.\nThe initial symptoms of a nicotine overdose typically include nausea, vomiting, diarrhea, hypersalivation, abdominal pain, tachycardia (rapid heart rate), hypertension (high blood pressure), tachypnea (rapid breathing), headache, dizziness, pallor (pale skin), auditory or visual disturbances, and perspiration, followed shortly after by marked bradycardia (slow heart rate), bradypnea (slow breathing), and hypotension (low blood pressure). Respiratory stimulation (i.e., tachypnea) is one of the primary signs of nicotine poisoning. At sufficiently high doses, somnolence (sleepiness or drowsiness),", "Atropine/diphenoxylate Side effects The drug combination is generally safe in short-term use and with recommended dosage. In doses used for the treatment of diarrhea, whether acute or chronic, diphenoxylate has not produced addiction.\nIt may cause several side-effects, such as dry mouth, headache, constipation and blurred vision. Since it may also cause drowsiness or dizziness, it should not be used by motorists, operators of hazardous machinery, etc. It is not recommended for children under two years of age. Toxicity It may cause serious health problems when overdosed. Signs and symptoms of adverse effects may include any or several of the following:", "or neck; urinating less than usual or not at all; extreme thirst with headache, nausea, vomiting, and weakness; or feeling light-headed or fainting.\nDry mouth, if severe to the point of causing difficulty speaking or swallowing, may be managed by dosage reduction or temporary discontinuation of the drug. Patients may also chew sugarless gum or suck on sugarless candy in order to increase the flow of saliva. Some artificial saliva products may give temporary relief. \nMen with prostate enlargement who take protriptyline may be especially likely to have problems with urinary retention. Symptoms include having difficulty starting a urine flow and", "regarding the delicate topic of her own defecation urge. Mariko Aoki herself has been interviewed multiple times by the Book Magazine editorial department since 1985, and has remarked that she is not particularly bothered by her name being used. The phenomenon has continued to be referred to sporadically in various media since 1985 and has given birth to a large amount of conjecture and speculation. In the 1990s (television programs that sought to verify the phenomenon) While there has at times been a tendency to view the connection between bookstores and the defecation urge as a preposterous urban legend, specialists", "acid be controlled in order to reduce the risk of nephropathy, nephrolithiasis, and gouty arthritis. The drug allopurinol is utilized to stop the conversion of oxypurines into uric acid, and prevent the development of subsequent arthritic tophi (produced after having chronic gout), kidney stones, and nephropathy, the resulting kidney disease. Allopurinol is taken orally, at a typical dose of 3–20 mg/kg per day. The dose is then adjusted to bring the uric acid level down into the normal range (<3 mg/dL). Most affected individuals can be treated with allopurinol all through life.\nNo medication is effective in controlling the extrapyramidal motor features of", "defecation urge when one is in a bookstore for a long period of time?\" Of the 20 contestants, 10 correctly answered, \"The Mariko Aoki phenomenon\". Quiz scholar and designer Hiroshi Nishino has observed that even when phrases—such as the \"Mariko Aoki phenomenon\" or the \"Dylan effect\" (a Japanese phrase referring to how a song or part of it can get stuck in one's head on an endless loop)—have not received academic consensus, \"when they have an appealing sound to them they are increasingly being asked as quiz questions.\"\nAccording to Book Magazine's publisher Shigeru Hamamoto, the magazine was still occasionally receiving", "taking other intoxicants at the same time. Other effects users in internet forums have noted include changes in body temperature, increased heart rate, breathing difficulties, loss of appetite, increased sweating, discolouration of extremities, anxiety, paranoia and depression. When snorted, it can also cause nose bleeds and nose burns. A survey conducted by the UK National Addiction Centre found 67% of mephedrone users experienced sweating, 51% suffered from headaches, 43% from heart palpitations, 27% from nausea and 15% from cold or blue fingers, indicative of vasoconstriction occurring. Doctors at Guy's Hospital in London reported that of 15 patients they treated", "can be triggered by dryness from mouth breathing or recurrent aspiration of food into the windpipe in people with swallowing difficulties. Angiotensin-converting enzyme inhibitor Angiotensin-converting enzyme (ACE) inhibitors are drugs used in diabetics, heart disease, and high blood pressure. In 5-35% of the people who take it, it can cause them to have a cough as a side effect. Cessation of ACE Inhibitor use is the only way to stop the cough. Such medicines for hypertension are very common in use such as ramipril and quinapril. There are cases of \"cough of unknown origin\" who had resolution with stopping the", "into the topic had concluded.\nCertain types of psychiatric disorders such as delusion can be transmitted between people who are intimately close such as mothers and daughters or romantic couples by way of a kind of \"false belief\". In his book \"Why Do People Feel the Need to Go When They're In a Bookstore?\" (2012, Arimine Shoten), the gastroenterological surgeon Masayoshi Ido touches on the Mariko Aoki phenomenon by stating that the \"past experience and future expectation of having experienced a defecation urge\", the \"supporting of this by knowledge that many others have had the same experience\", and a \"false", "treatment, and inducing vomiting does not help, and can make it worse. According to poison specialist Brad Dahl, \"even two mouthfuls wouldn't be that dangerous as long as it goes down to your stomach and stays there or keeps going.\" The US CDC's Agency for Toxic Substances and Disease Registry says not to induce vomiting, lavage, or administer activated charcoal. Inhalation for intoxication Inhaled (huffed) gasoline vapor is a common intoxicant. Users concentrate and inhale gasoline vapour in a manner not intended by the manufacturer to produce euphoria and intoxication. Gasoline inhalation has become epidemic in some poorer communities and", "decreased subjects' cravings for cigarettes. Mechanism Nicotine is a small molecule that, after inhalation into the lungs, quickly passes into the bloodstream, subsequently crossing the blood–brain barrier. Once in the brain, it binds to specific nicotine receptors, resulting in the release of neurotransmitters, such as dopamine and norepinephrine.\nNicVAX is a relapse prevention therapy designed to stimulate the immune system to produce antibodies that bind to nicotine in the bloodstream and prevent and/or slow it from crossing the blood–brain barrier and entering the brain. With a reduced amount of nicotine reaching the brain, neurotransmitter release is greatly", "benefit in several recent studies.)\nLow dose morphine may help chronic cough but its use is limited by side effects. Diarrhea and constipation In cases of diarrhea-predominate irritable bowel syndrome, opioids may be used to suppress diarrhea. Loperamide is a peripherally selective opioid available without a prescription used to suppress diarrhea.\nThe ability to suppress diarrhea also produces constipation when opioids are used beyond several weeks. Naloxegol, a peripherally-selective opioid antagonist is now available to treat opioid induced constipation. Shortness of breath Opioids may help with shortness of breath particularly in advanced diseases such as cancer and COPD among others. Physical dependence", "Esophageal spasm Signs and symptoms The symptoms may include trouble swallowing, regurgitation, chest pain, heartburn, globus pharyngis (which is a feeling that something is stuck in the throat) or a dry cough. Causes It is not clear what causes esophageal spasms. Sometimes esophageal spasms start when someone eats hot or cold foods or drinks. However, they can also occur with eating or drinking. The increased release of acetylcholine may also be a factor, but the triggering event is not known. Spasms may also be the result of a food intolerance. Diagnosis The diagnosis is generally confirmed by esophageal manometry. DES" ]
Why are pregnant women restricted from roller coasters, hot tubs, flights, etc?
[ "Something tells me that subjecting a fragile developing fetus to large gravitational forces isn't a great idea.\n\n\nNor is the general large increase in blood pressure.", "Women are only restricted from flying when they are close to their delivery date. This is mainly to prevent the situation of the woman going in labour while on the plane. If any medical assistance is needed during the birth, a plane won't be equipped for giving that, which can put the life of both the mother and child at risk.", "Roller coasters: the sudden motion of roller coasters can affect the child and potentially cause miscarriage. Preventing pregnant women from riding prevents any liability on the operator's side. Additionally, the restraint system may cause harm.\n\nHot Tubs: sitting in a hot tub raises body temperature. That can affect the child as above.\n\nFlights: aeroplanes are really not designed for routinely handling childbirth or any complications that develop during the (possibly several hour long) flight.", "There are multiple reasons why pregnant woman might be restricted and not all women are restricted and not all the time through the pregnancy.\n\nOne of the reasons that pregnant woman are advised to avoid hot tubs is that there's no guarantee how well the hot tubs are treated. So if the tub is poorly maintained, there's a risk that bacteria could enter the vagina and move into the cervix and even into the uterus. If an infection develops it could impact the fetus or it could cause a miscarriage.\n\nFlying is more about the 3rd trimester and the fact that a woman going into labor on a plane at 30,000 feet could be dangerous for the mother and the baby. You don't really want to give birth in a small steel tube full of 400 other people who could be carrying disease and germs. You don't want to expose a newborn who hasn't fully developed an immune system to that kind of beginning. And if anything goes wrong or the baby or mother needs medical intervention, there's no way to get it to them on a flight in progress. (It's also an economic decision: If someone goes into labor mid\\-flight, the plane has to land immediately and that will result in increased costs and pissed off passengers if their flight is detoured or ended because someone was having a baby.) \n\nRoller coasters involve gravitational forces that could bring on premature labor ... and that could impact the health of the baby.\n\nBut \"boiling the fetus in the uterus\" is the most ridiculous, ignorant bullshit ever." ]
[ "related safety issues. Many more countries, including Canada, the United States, Italy, Japan, and the United Kingdom also grant parking privileges to pregnant women, for safety or access reasons.\nSex segregation rooted in safety considerations can furthermore extend beyond the physical to the psychological and emotional as well. A refuge for battered mothers or wives may refuse to admit men, even those who are themselves the victims of domestic violence, both to exclude those who might commit or threaten violence to women and because women who have been subjected to abuse by a male might feel threatened by the presence of", "the Netherlands, Germany, some Australian states, and several counties in the US state of Nevada. Strip club employment issues In both Canada and the UK, dancers in strip clubs are independent contractors who face significant problems that they are unable to rectify because of their inability to challenge employers through organized action. Entry fees In the UK, a study was conducted which inquired about dancers’ experiences to get a better understanding to determine whether or not it could be costly for women to work some nights. It stated that often when the club offered promotions with gimmicks, dancers would be", "with more people during the day than they used to. They go to more meetings, take more business trips and, presumably, participate more in flirtatious water-cooler chatter.\"\nAccording to Debra Laino in an article for Shave, some of the reasons women cheat at the workplace are because \"women are disproportionately exposed to men in the workplace, and, as a direct consequence, many have more options and chances to cheat.\" Alternative views (swinging and polyamory) Swinging is a form of extradyadic sex where married couples exchange partners with each other. Swinging was originally called \"wife-swapping\", but due to the sexist connotations", "men. They are also more likely to be hyper-vigilant and have high levels of stress. Women seeking refuge from domestic violence are not always able to find rooms in shelters. Some women have been turned away from homeless shelters because shelter staff believe that turning women away will stop people from having sex inside the shelter.\nHomeless women who are of childbearing age also face unique hygiene issues because of menstruation. Homeless shelters have noted that both tampons and sanitary pads “top the list of needs at shelters” because of their high cost and because they are not donated often. Housing", "they were not taught or required to as a child. Males obtain jobs such as bill collector, taxi driver, and construction worker because many of those jobs do not rely heavily on emotional labor. Hochschild showed that male flight attendants showed more power and tolerated less abuse from passengers than female flight attendants. Since people generally associate males with being tough and associate females with being sweet, feeling rules makes them feel appalled when a women behaves in a tough manner, but when a male behaves in the same way, it is seen as acceptable. Exploitation A large portion of", "Rosa Parks.\nSome have defended the policy, with the New South Wales Commissioner for Children and Young People, Gillian Calvert, stating that there were more male sex offenders than female, and thus \"in the absence of any other test, it's one way in which the airline can reduce the risk of children travelling alone\". She believes that the likelihood of an attack was rare, but not impossible, claiming \"it's only a few men who do this sort of stuff, but when they do it they diminish all men\". Air New Zealand spokesman David Jamieson said the company had no intention of", "as members. Women guests were \"limited to certain floors, dining rooms and entrances\" but they \"can now use the main elevator and lobby\" at the Jonathan Club, a member told the Times in 1976, adding that \"We no longer have a women's elevator.\" Brentwood Country Club The city sued the Brentwood Country Club in August 1987 to force it to stop barring women from its \"Men's Grill\" and golf course during part of the day. It dropped the suit when the club agreed \"to admit women to the restaurant at all hours and make the rules less restrictive to", "brothels.\n \nThe motels that once rented to independent sex workers now turn them away in order to avoid problems with the city. In response, some of the women have organized casitas, where a group of women rent a house and set aside a part of the earnings from each client session to cover the rent. Basically, women who were previously working in brothels are still working in brothels, and women who were previously independent are still independent. Georgina Orellano, secretary general of AMMAR as of 2017, says of the new legal regime that \"It took all the activity to a", "have an answer or they'll tell you 'No'.\" Falle stated that she believes that sex workers \"become sucked into the sex trade and become very conditioned\" within a short period of time. Falle expressed her opinion that women enter the sex industry because of \"unresolved personal issues,\" such as abuse or trauma, and that the \"vast majority\" of women in the sex industry are not participants by choice. At the Supreme Court of Canada On Friday, December 20, 2013, the Supreme Court of Canada struck down Canada's remaining prostitution laws, finding that bans on street soliciting, brothels and people living", "to misuse of the wasted financial funds allocated for the building/remodeling of such toilets.\nSupporters of single-sex toilets point to the specific needs of women, such as menstrual hygiene, and argue that these require sex-segregation in public toilets, for reasons of personal comfort and privacy, and this is especially true for teenage girls.\nSome women's groups (including some feminist and lesbian groups), have opposed making unisex toilets the norm as well, based on safety concerns for most women and a need for safe spaces. In the UK, groups like WomansPlaceUK have led a charge to secure \"safe\" spaces for women, arguing that", "women enter sex work through job advertisements in newspaper, magazines, or the internet. Advertisements look like legitimate jobs, but women are required to engage in sex service once they are hired. Some women voluntarily enter for survival. Regardless of how they enter sex work, brothels abuse them economically, physically, and mentally. Procurers use debt bondage and lure women in with advance payments. They write employment contracts so that it is virtually impossible to pay back the debt. Contracts involve heavy penalties for failing to generate daily profits for owners. They eventually become stuck in increasing debt, and cannot get away", "airlines had a policy such that only unmarried women could be flight attendants, as well as a mandatory retirement age of 32 for stewardesses because of the belief women would be less appealing and attractive after this age. In 1968, the EEOC declared age restrictions on flight attendants’ employment to be illegal sex discrimination under Title VII of the Civil Rights Act of 1964.\nFlight attendant Roz Hanby became a minor celebrity when she became the face of British Airways in their \"Fly the Flag\" advertising campaign over a 7-year period in the 1980s. Singapore Airlines is currently one of the", "Regulation Act, prohibiting any form of sexual contact between employees and customers. Normal hostess clubs also need a permit to allow dancing. Clubs are inspected often by the Public Safety Commission. Any club found violating its permitted activities can have its business license terminated or be suspended, until corrections are made.\nHostessing is a popular employment option among young foreign women in Japan, as demand is high. However, work visas can be difficult to obtain, so many choose to work illegally. The clubs sometimes take advantage of the precarious legal situation of the women. The industry and its dangers were", "laws often mandate sex segregation in public toilets, changing rooms, showers, and similar spaces, based on a common perceived need for privacy. This type of segregation policy can protect against sexual harassment and sexual abuse. To combat groping, street harassment, and eve teasing of women in crowded public places, some countries have also designated women only spaces. For example, sex-segregated buses, women-only passenger cars, and compartments on trains have been introduced in Mexico, Japan, the Philippines, the UAE and other countries to reduce sexual harassment. \n Some places in Germany, Korea, and China all have women's parking spaces, often for", "in question would never have been allowed to work in such establishments because desperate situations led these women to prostitution and referred to Pickton's victims as \"easy access\". Falle then further claimed that sex workers in such circumstances will continue to exist even if the laws change.\nWhen asked by the host of the program if all of the problems of Canadian sex workers would be resolved following the legislation change, Thomas replied:\nAbsolutely not. That was not something that I would ever suggest. Because if the person engaging in sex work is not doing so from a position of personal choice,", "women. California law requires at least two separate toilet facilities when both men and women are working together in agricultural operations. Alsace vineyard manager, Jeff Roberts of Farm West LLC, acknowledged that he was unhappy when women showed up in the crew, as he had a policy to hire only men in the vineyards he manages. Workers stated that their foreman told them that Roberts demanded that either the men or the women leave. When the women refused to leave and again complained about the restrooms, they were fired. The farm labor contractor, DJRAS Corp., doing business as Prime Harvest", "gay bathhouses be closed. As a result, heterosexual sex clubs such as Plato's Retreat had to shut down as well because the city had just passed a gay rights ordinance, and allowing the heterosexual clubs to remain open while closing the gay establishments would have been a violation of that ordinance.\nLos Angeles, Chicago, Philadelphia, Atlanta, Louisville, Seattle, Berkeley, San Jose, Cleveland, Portland, Reno, Las Vegas, Detroit, Indianapolis, Dallas, Houston, Denver, Miami and Fort Lauderdale are some American cities that have bathhouses in operation.\nOn October 8, 2010 ten patrons and one employee were arrested during a police raid at Club Dallas", "Dipper (brand) History According to studies carried out by the Transport Corporation of India (TCI), out of the two million truck drivers in India who visit sex workers, only about 11 percent of them use protection. It also found that AIDS awareness among the drivers was very low, with about 16 percent of them suffering from some venereal disease.\nIn April 2016, Tata Motors, one of India's largest truck manufacturers, launched a campaign called \"Use Dipper at Night\" which was intended to resonate amongst truck drivers who are clueless about unsafe sex and its consequences. In association with creative agency Rediffusion", "materials and places of employment in some countries don't provide resources for women or even have \"proper toilets.\" Women in Bangladesh who work in factories have reported that due to the cost of sanitary products for menstruation which they could not afford, they have resorted to using \"factory-floor rags in place of pads and tampons, leading to dangerous infections and missed work.\"\nMenstruation can be a barrier to education for many girls, as a lack of effective sanitary products restricts girls' involvement in educational and social activities. Often they do not attend school due to fear of leaking, shame or embarrassment,", "legally on entertainment visas. \"Entertainers\" are not covered by the Labor Standards Law and have no minimum wage protections. Brokers in the countries of origin recruited women and \"sold\" them to intermediaries, who in turn subjected them to debt bondage and coercion. Agents, brokers, and employers involved in trafficking for sexual exploitation often had ties to organized crime.\nWomen trafficked to the country generally were employed as prostitutes under coercive conditions in businesses licensed to provide commercial sex services. Sex entertainment businesses are classified as \"store form\" businesses such as strip clubs, sex shops, hostess bars, and private video rooms, and", "that they had been physically abused by either a pimp, a client, or another woman in the sex industry. Falle believed these statistics to be representative of women in prostitution in Canada because the women she counselled did not come to her by choice; they were required to undergo the counselling by court order. In 2010, Falle said that hundreds of the women she had met were controlled by pimps, either as sexual partners or as traffickers. She also said that women in prostitution tend to be moved around a lot because they tend to fetch higher prices when they", "various sex work. The company suspended its adult listings following accusations by a United States Senate subcommittee of being directly involved with sex-trafficking and the sexual exploitation of minors. However, many escorts and erotic masseuses admit to moving their ads to the \"massage\" and \"women seeking men\" listings. Prostitution is illegal throughout the United States, except for some counties in Nevada.\nKristen DiAngelo, executive director of the Sex Workers Outreach Project of Sacramento, criticized the shutdown, questioning how many sex workers across the United States no longer had a way to support themselves. Backpage allowed for sex workers using the site", "cockpit and women serving beverages and blankets have become ingrained, forcing women who want to fly to struggle with the attitudes of both co-workers and society.\nA survey conducted by Mitchell, Krstivics & Vermeulen in 2005 found that many women pilots were either unaware of sexism directed towards them or had not experienced any sexism directly. However, many women believe that more women are experiencing prejudice than are admitting it.", "35 depending on the airline, were fired if they exceeded weight regulations, and were required to be single upon hiring and fired if they got married.) In 1968, the EEOC declared age restrictions on flight attendants’ employment to be illegal sex discrimination under Title VII of the Civil Rights Act of 1964. Also in 1968, the EEOC ruled that sex was not a bona fide occupational requirement to be a flight attendant. The restriction of hiring only women was lifted at all airlines in 1971 due to the decisive court case of Diaz vs. Pan Am. The no-marriage rule was", "practice safe sex on the premises, and venues frequently provide free condoms, latex gloves, and lubrication (and/or have them available for purchase). In New Zealand and Australia, the New Zealand AIDS Foundation and constituent members of the Australian Federation of AIDS Organisations provide safe sex information for sex on site venue users.\nSome anti-bathhouse activists argue that these measures are not enough, especially given that it is virtually impossible to monitor sexual activity in a bathhouse; however, while they acknowledge that closing gay bathhouses may force some men into unsafe or illegal situations in public parks and lavatories, they point out", "limitations that are put upon on women that makes them feel restraint. \nGlass Ceiling (2008)- Video. A woman is seen going up some stairs but it is stopped another man. This piece discusses the trials women have to face in the workplace whenever they try to advance in a career field because of a patriarchal society.", "in 1999 in compliance with the Tennessee Equitable Restrooms Act, providing 288 fixtures for men and 580 for women. The Tennessean reported fifteen-minute waits at some men's rooms, compared to none at women's rooms. The Act was amended in 2000 to empower the state architect to authorize extra men's rooms at stadiums, horse shows and auto racing venues.\nIn 2011 the U.S. House of Representatives got its first women’s bathroom near the chamber (Room H-211 of the U.S. Capitol). It is only open to women lawmakers, not the public. Regulations Current laws in the United Kingdom require a 1:1 female–male", "before they attain puberty. They are, thus, not aware of the trap they are falling into. Once in the trade, there is no escape till the brothel keeper has earned well enough through them. Here they are subjected to physical and mental torture if they refuse to abide by the wishes of the keeper. As most women have no formal education, they have no knowledge of how much they earn. When they are allowed to leave the set-up, they are most probably a victim of life-threatening diseases like AIDS, without any place to go. In all probability, they will continue", "into the brothel undercover to provide condoms, but the sexual workers are not allowed to use them unless the customer allows it. Young girls are widely looked for by customers. They will pay extra to sleep with a virgin. Some people believe that sleeping with a virgin will clean them of any STDs they may have and infect the worker. They found that many prostitutes become so entangled in the industry that even when they are able to leave the brothel they tend to come back because they internalize that the brothel is where they belong. Some women are financially", "and Mongolia in emergency but it remains utterly unacceptable for females in India even when circumstances make this a highly desirable option.\nWomen generally need to urinate more frequently than men due to having smaller bladders. Resisting the urge to urinate because of lack of facilities can promote urinary tract infections which can lead to more serious infections and, in rare situations, can cause renal damage in women. Female urination devices are available to help women to urinate discreetly, as well to help them urinate while standing. Males In Western culture, the standing position is regarded by some as more" ]
EILI5: The whole Viva Revolution with Che Guevara?
[ "Che Guevara was one of the leaders of the Cuban Revolution of the 1950s with Fidel Castro. He now enjoys immense popularity as a t-shirt." ]
[ "name.\nIn October 1958, Borrego joined a column of the 26th of July Movement's rebel army in the Escambray Mountains, which was under the command of Che Guevara. By the revolution's triumph in January 1959, Borrego had achieved the rank of First Lieutenant.\nImmediately after the revolutionary army's entrance in Havana Borrego worked alongside Guevara at La Cabaña fortress. He was appointed Head of the Military Economic Board and served as a prosecutor at the trials of several members of the Batista regime. In October 1959, Che was named head of the Department of Industrialisation, which was set up within the National", "Guaidó's actions as legitimate. One in three considered the event a coup d'état. 49% judged the release of Leopoldo López as positive, while about 16% judged it as negative. 50% considered the López's support to Guaidó as positive, while 16% viewed it negatively.", "Ernesto Che Guevara, political activist and leader of the Revolution. He is buried here, where he waged the final battle of the revolution that toppled the Fulgencio Batista government in 1958.\nMarta Abreu is notable for the numerous projects which she and her family promoted through their philanthropy, intended to enhance the life of all citizens of Santa Clara. Marta Abreu and her husband Luis Estévez, who became the first Vice President of the young republic in 1902, were well-known sympathizers and contributors to the Cuban rebels cause during the War of Cuban Independence against Spain (known in the United States", "revolution throughout the world. As a result, Guevara spent the next six months living clandestinely at the Cuban embassy in Dar es Salaam and later at a safehouse in Prague. While in Europe, Guevara made a secret visit to former Argentine president Juan Perón who lived in exile in Francoist Spain. There, Perón warned Guevara that his plans for implementing a communist revolution throughout Latin America, starting with Bolivia, would be suicidal and futile. Later, Perón remarked that Guevara was \"an immature utopian... but one of us. I am happy for it to be so because he is giving the", "Hasta Siempre, Comandante \"Hasta Siempre, Comandante,\" (\"Until Forever, Commander\" in English) or simply \"Hasta Siempre,\" is a 1965 song by Cuban composer Carlos Puebla. The song's lyrics are a reply to revolutionary Che Guevara's farewell letter when he left Cuba, in order to foster revolution in the Congo and later Bolivia, where he was captured and killed.\nThe lyrics recount key moments of the Cuban Revolution, describing Che Guevara and his role as a revolutionary commander. The song became iconic after Guevara's death, and many left-leaning artists did their own cover versions of the song afterwards. The title is a part", "late 1923 he took part in homage feasts celebrating Primo as savior of the fatherland; explicitly exalting \"golpe de estado\" he offered his services to the military directorio. During a 1924 rally of Juventud de Acción Tradicionalista he hailed the coup as doing away with the old regime and as a deed spirited by traditionalist principles.\nExact scale of Iglesias' engagement in the primoderiverista regime is not clear. He later claimed that during personal meetings with the dictator he had tried to impose upon Primo his own social concerns and that he had repeatedly suggested that the regime should lower the", "full-blown lecture of Octavista claim; re-issued in 1951, it won only those convinced already. After a few years of endless petitioning, in 1952 Franco formally received Don Carlos during their only personal meeting; on part of the dictator the move was probably intended to counter Don Javier, who just a month earlier had terminated the Carlist regency and launched his personal claim to the throne. There is no record of their one-hour-conversation, though afterwards Carlos Pio remained ecstatic; feelings were running high also when later that year Franco accepted a Carlos-VIII-created Orden de San Carlos Borromeo.\nAny official, semi-official or unofficial", "World War. Carrillo's father, Wenceslao, a member of the PSOE, was among those who led the coup and was a member of Casado's Junta. Some weeks before, Carrillo's mother had died. Carrillo then wrote an open letter to his father describing the coup as counter-revolutionary and as a betrayal, reproaching him for his anti-communism, and renouncing any further communication with him. In his memoirs, Carrillo states that the letter was written on 7 March. However, journalist and historian Carlos Fernández published the letter in 1983, as it had been published in Correspondance International; it was dated 15 May.\nAfter the military", "revolutionary and economy minister, Che Guevara - an attempt by Frondizi to mediate the US-Cuba conflict that, once discovered, helped result in his own overthrow in 1962. The site of frequent asados and other social gatherings, a concert organized by President Juan Carlos Onganía in 1969 led to a fire that caused the historic residence extensive damage, though it retained most of its original structure.\nThe quinta was the site of Juan Perón's death on July 1, 1974. Perón, who had returned from exile following elections in 1973, took office with his politically neophyte wife, Isabel, as vice president; during her", "camarilla de Monje' para ingresar a la guerrilla.\n— Diario de campaña por Inti Peredo.\nEnglish translation:\nMoisés Guevara was an honest man. A combative leader of mine workers who was highly esteemed by his followers, he loved the revolution. He joined the pro-Chinese communist party believing that Zamora and its other leaders truly would join the armed struggle with a numerous contingent of workers. He soon realized that Zamora was as opportunistic and deceitful as the other self-described 'members of the vanguard'. However, within the party he fought for the fulfillment of the promises that had been made to the people: i.e., to", "René Barrientos' presidential candidacy in 1966, and the Authentic Revolutionary Party served as part of the governing coalition of parties until 1969. Even after Barrientos' death, Guevara Arze continued as Bolivia's ambassador to the United Nations under Presidents Luis Adolfo Siles Salinas and Alfredo Ovando Candía, until 1970.\nThe Authentic Revolutionary Party was in less sympathy with the Hugo Banzer Suárez government and opposed that regime's continuance after 1974, when Guevara Arze was sent into exile after he criticized the Government.\nIn the 1978 and 1979 presidential elections the Authentic Revolutionary Party supported Víctor Paz Estenssoro's candidacy for the presidency, with Guevara", "and he took Almirón and Morales with him. A few months later a military coup d'état overthrew Perón and installed the junta that ruled until 1983.\nIn Spain, Almirón became chief of personal security for Manuel Fraga Iribarne, former francoist minister, minister of the Interior in 1975–1976 and later leader of People's Alliance and founder of People's Party of Spain.\nAlmirón was present at the Montejurra 1976 massacre in Spain of two left-wing Carlists, in which the Italian neofascist Stefano Delle Chiaie participated. According to Spanish lawyer José Angel Pérez Nievas, it is \"probable that Almirón participated — along with Stefano Delle", "is a battle to the death.\"\nMarch 1957. Guevara deals with debilitating bouts of asthma as his group of revolutionaries meet up with Castro's. Together, they attack an army barracks in the Sierra Maestra on 28 May 1957. After that, they begin to win over the rural peasant population of Cuba and receive increasing support, while battling both the government and traitors in their midst. Gradually, however, the government loses control of most of the rural areas. Soon afterward, the 26 July Movement forges alliances with other revolutionary movements in Cuba, and begin to assault towns and villages. Most fall to", "Perdomo was arrested by revolutionaries and imprisoned at the Isla de los Pinos prison, where he was held in harsh conditions for three years. He was then transferred to captivity at the La Cabana fortress overlooking Habana Bay. He spent the next 12 years in prison at La Cabana and four other facilities as an enemy of the revolution of Fidel Castro. Silvio was finally allowed to emigrate to the United States in 1974.\nNick Senior was also targeted by revolutionaries. He later recalled \"The political views of my family and I were very anti-communist, and President Fulgencio Batista used to", "Alvarado who came into power through a military coup in Peru in 1968. During the 1970s he was one of the leaders of the Montoneros guerrilla group ERP-22 in Argentina and was forced into exile after the military coup which removed Isabel Perón from office on March 1976. He then went to Spain where he became a spokesman of Peronism during his exile in Madrid. From then on he became one of the main voices of Peronism in Argentina and an influential voice among some groups of military officers throughout South America. During this time he also publicly defended those", "Francisco Mariño y Soler Neogranadinan Revolution As an intellectual and fervent defender of the human rights, he absorbs much of the eighteenth and nineteenth century literature. At the outbreak of revolution in New Granada, he is placed at the service of the Republic and is appointed Colonel of the Liberation Army.\nHe moves on to carry out some undercover reconnaissance using his social position and then proceeds to financially support the independence from Spain, affording Simon Bolivar's militia with lodging and victuals in addition to providing Bolívar's revolutionary armies with hefty stipends and numerous choice saddled horses on several occasions,", "its \"true path\", from which the Nationalist Revolutionary Movement (Movimiento Nacionalista Revolucionario, MNR) had deviated during its twelve-year rule. His government continued many of the policies of the second Víctor Paz Estenssoro administration, including the International Monetary Fund (IMF) stabilization plan and the Triangular Plan. The emphasis on reducing social costs remained in effect. In May 1965, the army forced Barrientos to accept Ovando as his co-president as a reward for suppressing an uprising by miners and factory workers.\nThe economy improved during the Barrientos regime at a growth rate averaging 6.5% per year. The rise of tin prices resulted in", "working together on an international tourist route that will trace the life of Che Guevara. Although Guevara is already the focus of tourist sites in his home country of Argentina, where visitors can visit his birthplace and his family's mate plantation, this trail entitled the \"Caminos de Che\", aims to allow tourists to venture to the three countries that most influenced the young Guevara's life. Diego Conca, coordinator for the Che trail in Argentina, remarked that \"people all over the world ask us for more information, each month there's more interest, and now with Bolivia, we think there will be", "hailed by conservative press as “triumph of the Right”.\nIt is not clear whether Abánades was involved or aware of the forthcoming coup of July 1936; none of the sources consulted provides also any information about his whereabouts during the Civil War and the very first years of Francoism. A single author claims he joined those Carlists who estranged the intransigent regent-claimant Don Javier and aligned themselves with the partido unico amalgamation line; indeed in 1943 he is noted as paying homage to founders of Falange and involved in the Francoist propaganda, especially El Alcazar. On the other hand, at the", "founder of the Alianza Popular Revolucionaria Americana (American Popular Revolutionary Alliance, APRA). Later, he would participate in debates and conferences at universities throughout the United States.\nSantucho was one of the driving forces behind the Junta Coordinadora Revolucionaria (Revolutionary Coordinating Junta), a regional organization composed of Argentina's PRT, Bolivia's Ñancahuazú Guerrilla organization, Chile's Revolutionary Left Movement, and Uruguay's Tupamaros group.\nComrades often referred to Santucho by his nickname \"Roby,\" although he was known to use other noms de guerre: Miguel, Comandante Carlos Ramírez, and Enrique Orozco, among others. Founding of PRT and ERP Santucho was instrumental in early efforts to unite the", "¿¡Revolución!? Production In April 2005, director Charles Gervais heard of the news that Hugo Chávez decided to distribute one million free copies of major 17th century Spanish novel Don Quixote de la Mancha to Venezuelan citizens. This gave him the inspiration to fly to Venezuela and examine from within this \"revolution\" in the making. Also, after filming the medium-length documentary Quand la vie est un rêve on the Haitian youth, Gervais wished to focus on something more positive. Synopsis The movie features pro-Chávez and anti-Chávez militants, politicians and citizens, within and without the barrios (the poor districts of Venezuelan cities", "to the old woman, containing \"a promise to fight for a better world, for a better life for all the poor and exploited\".\nDuring this time he renewed his friendship with Ñico López and the other Cuban exiles whom he had met in Guatemala. In June 1955, López introduced him to Raúl Castro, who subsequently introduced him to his older brother, Fidel Castro, the revolutionary leader who had formed the 26th of July Movement and was now plotting to overthrow the dictatorship of Fulgencio Batista. During a long conversation with Fidel on the night of their first meeting, Guevara concluded that", "and started by resigning his command and position within the comandancia general. Once he had broken this link, nothing was in the way of his going over to the other side.\nHe went to Madrid, where Negri gave him instructions, and where the Carlist party was formally organizing. The first meetings of the revolutionary committees took place there. King Ferdinand VII was already gravely ill and near death. Maroto then proposed to Don Carlos that they proclaim him regent during his brother's illness, but the Infante opposed the idea, \"and those who suggested it were not considered loyal servants, because they", "the regime, in internal documents lambasting it as \"intruso e usurpador\". In 1943 he co-signed another manifesto, known as Reclamación de poder; handed to general Vigon and delivered to though not acknowledged by Franco, it re-emphasized earlier Traditionalist demands. In 1944 together with few other Carlist leaders Sáenz-Diez took part in a meeting with Juanistas, intended to discuss a would-be coup against Franco, but voiced against taking any bold action; in 1945 he was present during Carlist riots in Pamplona, later detained in his Madrid house and brought to the Navarrese capital for investigation; it is not clear what administrative", "Eutímio Guerra Execution In his diaries, Guevara described the execution of Eutimio Guerra, a peasant army guide who admitted treason when it was discovered he accepted the promise of ten thousand pesos for repeatedly giving away the rebel's position for attack by the Cuban air force. Such information also allowed Batista's army to burn the homes of rebel-friendly peasants. Upon Guerra's request that they \"end his life quickly\", Che stepped forward and shot him in the head, writing \"The situation was uncomfortable for the people and for Eutimio so I ended the problem giving him a shot with a .32", "the policies of Barrientos. Ovando hoped to gain civilian and military support with a program of \"revolutionary nationalism\", which he had outlined in the \"Revolutionary Mandate of the Armed Forces\".\nRevolutionary nationalism reflected the heritage and rhetoric of the military reformist regimes of the past, as well as the spirit of the 1952 Revolution. It also showed the influence of the Peruvian government of General Juan Velasco Alvarado. Many Bolivian officers believed that the military had to intervene in politics to lead the country toward reform because civilian governments had failed in that undertaking. They were convinced that it was in", "covering us, mere shadows of our old aristocratic egos.\"\n\nAccording to his daughter Aleida Guevara in a 2004 article, throughout the book we can see how Guevara became aware that what poor people needed was not his scientific knowledge as a doctor, but his strength and persistence to bring social change.\nGuevara's experience of the South American continent also helped to shape his revolutionary sensibilities. When discussing the plight of the downtrodden Indians of Peru, Granado discussed the formation of an Indian political party to begin a Túpac Amaru Indian Revolution. Guevara allegedly replied \"Revolution without firing a shot? You're crazy?'. The", "among those who refused to commit \"political suicide of the Francoist Cortes\" and cast a \"no\" ballot during the plenary session; indeed he was already speaking openly about a suicidal governmental policy.\nIn gear-up to the elections in late 1976 UNE joined the Alianza Popular coalition and Zamanillo signed its founding manifesto. In parallel, apparently somewhat skeptical about the UNE format and definitely disillusioned about Juan Carlos, in February 1977 he co-founded a strictly Carlist organization, Comunión Tradicionalista, and entered its executive; dynastic leader of the party turned out to be Sixto, Traditionalist younger brother of Carlos Hugo. In the June", "José Dirceu Early life Dirceu moved to São Paulo in 1961 and in 1966 joined the Ala Marighella, later called the ALN, a revolutionary armed group linked to the Brazilian Communist Party. In 1968 Dirceu, known as \"Daniel\", was the leader of the State Union of Students (UEE). As a consequence, Dirceu was arrested on October 12, 1968, during the 30th Congress of the National Student Union (UNE), in Ibiúna.\nIn 1969 Marxist revolutionary groups MR8 and ALN abducted the US ambassador to Brazil, Charles Burke Elbrick. The revolutionaries demanded the liberation of fifteen prisoners, including José Dirceu. This incident is", "and resistance aid. Director Wild considers it \"a post-Glasnost revolutionary Woodstock, without the Acid\". Three thousand people attended El Encuentro, among them Spanish anarchists, Italian communists, Latin American revolutionaries, Chiapanec Indians, and Superbarrio [Super Neighbourhood], the caped professional wrestler and social activist. The Encuentro demonstrates the importance of civilian support to the Zapatista national liberation movement, whose goals the civilians of the world understand. The Encuentro featured a dance wherein Zapatistas and guests dance \"on the edge of romantic ideals and harsh politics, between those who can leave Mexico and those who cannot\"; many Zapatista supporters could not reach the" ]
Why do they bother to try and "hide" cell phone towers?
[ "Because it simply looks more aesthetically pleasing. Cell phone towers are an eyesore", "Same reason LA hides their oil rigs in the city, they're ugly and nobody wants to look at them. Doesn't matter if we rely on them, we still don't want to see them", "They're only obvious when you look right at them. When going about your day-to-day the disguised ones blend into the background while bare ugly ones will still catch your eye.", "The biggest reason is that cell towers fall under FCC jurisdiction and subsequently are considered an *undertaking*, which is basically, anything that is paid for or requiring a permit from the feds.\n\nThis kicks in various federal environmental protection regulations like NEPA and NHPA, and potentially state/local laws. If a cell tower is going to *adversely effect* a *resource* listed on the National Register, steps have to be taken to mitigate this impact. This generally involves an architectural historian, working for a cell company, negotiating with the regulatory agency overseeing the project. \n\nThose weird looking tree-tower things are a compromise solution. They're supposed to look relatively normal from the perspective of whatever resource that is being protected, even if they look ridiculous from other locations. \n\n > We don't try to hide electric poles, phone lines, etc.\n\nDepending on when they were built, who is paying for them, and what exactly they're being used for, they may or may not fall under the same regulations.\n\ntldr; Cell towers are camouflaged as a way of mitigating their impact on places listed on or eligible for the National Register." ]
[ "Dirtbox (cell phone) A dirtbox (or DRT box) is a cell site simulator, a phone device mimicking a cell phone tower, that creates a signal strong enough to cause nearby dormant mobile phones to switch to it. Mounted on aircraft, it is used by the United States Marshals Service to locate and collect information from cell phones believed to be connected with criminal activity. It can also be used to jam phones. The device's name comes from the company that developed it, Digital Receiver Technology, Inc. (DRT), owned by the Boeing company. Boeing describes the device as a hybrid of", "as those belonging to prison personnel or commercial users in the area, are returned to their local network.\" It can also selectively interrupt or prevent calls on certain phones, and has been used to block unauthorized phone use by prison inmates. It can also retrieve data from phones. According to Boeing, its technology is \"unobtrusive to legitimate wireless communications\", and bypasses phone companies in its operations. Law enforcement As of November 2014, the U.S. Marshals Service Technical Operations Group has used the device, fixed on manned airplanes, to track fugitives, and has said it can deploy it on \"targets requested", "a new encryption algorithm which the same research team also cryptanalysed successfully. Thus satellite phones are not recommended for high-security applications. One-way services Some satellite phone networks provide a one-way paging channel to alert users in poor coverage areas (such as indoors) of the incoming call. When the alert is received on the satellite phone it must be taken to an area with better coverage before the call can be accepted.\nGlobalstar provides a one-way data uplink service, typically used for asset tracking.\nIridium operates a one-way pager service as well as the call alert feature. Cost of a satellite phone While", "towers. This can be useful in locations with poor cell coverage where some other form of internet access is available, especially at the home or office. The system offers seamless handoff, so the user can move from cell to WiFi and back again with the same invisibility that the cell network offers when moving from tower to tower.\nSince the GAN system works over the internet, a UMA-capable handset can connect to their service provider from any location with internet access. This is particularly useful for travellers, who can connect to their provider's GANC and make calls into their home service", "as a rule, since these buildings are mostly not higher than 20 metres. Active watch towers are not as a rule accessible to the public, since they usually serve for the monitoring of sensitive ranges. However watch towers can be quite ordered for forest fire monitoring a platform accessible for the public or be used during times without forest fire risk as observation towers. Shut down watch towers can however be easily converted to observation towers. Radio towers Also some radio towers were so built that they can be used apart from their function as transmitting tower also as observation", "problem because typically the hidden nodes are the clients (e.g. laptops, mobile devices), not the access point itself, and the clients will still not be able to hear each other. Increasing transmission power on the access point is actually likely to make the problem worse, because it will put new clients in range of the access point and thus add new nodes to the network that are hidden from other clients. Omnidirectional antennas Since nodes using directional antennas are nearly invisible to nodes that are not positioned in the direction the antenna is aimed at, directional antennas should be", "still not the predominant mode for current cell phone communications. Secure cell phone devices and smartphone apps exist, but may require specialized hardware, and typically require that both ends of the connection employ the same encryption mechanism. Such apps usually communicate over secure Internet pathways (e.g. ZRTP) instead of through phone voice data networks. Later related debates Following the Snowden disclosures from 2013, Apple and Google announced that they would lock down all data stored on their smartphones with encryption, in such a way that Apple and Google themselves could not break the encryption even if ordered to do so", "Some phones are approved for use by essential workers (such as health, security, and public service workers) on the sabbath, even though the use of any electrical device is generally prohibited during this time. Infrastructure Mobile phones communicate with cell towers that are placed to give coverage across a telephone service area which is divided up into 'cells'. Each cell uses a different set of frequencies from neighboring cells, and will typically be covered by 3 towers placed at different locations. The cell towers are usually interconnected to each other and the phone network and the internet by wired connections.", "personnel to either break the code themselves or to get the code from the phone's owner. Because the Snowden leaks demonstrated that American agencies can access phones anywhere in the world, privacy concerns in countries with growing markets for smart phones have intensified, providing a strong incentive for companies like Apple to address those concerns in order to secure their position in the global market.\nAlthough the CALEA requires telecommunication companies to build into their systems the ability to carry out a lawful wiretap, the law has not been updated to address the issue of smart phones and requests for access", "data and cell tower data to shorten the time to first fix, reduce the need to download a satellite almanac periodically and to help resolve a location when satellite signals are disturbed by the proximity of large buildings. When out of range of a cell tower the location performance of a phone using A-GPS may be reduced. Phones with an A-GPS based hybrid positioning system can maintain a location fix when GPS signals are inadequate by cell tower triangulation and WiFi hotspot locations. Most smartphones download a satellite almanac when online to accelerate a GPS fix when out of cell", "to install malware and disclose personal information. On Torrent sites, threats include malware hiding in video, music, and software downloads. Even when using a smartphone, threats include geolocation, meaning that one's phone can detect where they are and post it online for all to see. Users can protect themselves by updating virus protection, using security settings, downloading patches, installing a firewall, screening email, shutting down spyware, controlling cookies, using encryption, fending off browser hijackers, and blocking pop-ups.\nHowever most people have little idea how to go about doing many of these things. How can the average user with no training be", "camera. Because of the requirement for wireless service providers in United States to supply more precise location information for 911 calls by September 11, 2012, more and more cell phones have built-in GPS chips. Most smart phones already use a GPS chip along with built-in cameras to allow users to automatically geotag photos. Others may have the GPS chip and camera but do not have internal software needed to embed the GPS information within the picture. A few digital cameras also have built-on or built-in GPS that allow for automatic geotagging.\nDevices use GPS, A-GPS or both. A-GPS can be", "offer no barrier. Wireless 802.1X authentications do help with some protection but are still vulnerable to hacking. The idea behind this type of attack may not be to break into a VPN or other security measures. Most likely the criminal is just trying to take over the client at the Layer 2 level. Ad hoc networks Ad hoc networks can pose a security threat. Ad hoc networks are defined as [peer to peer] networks between wireless computers that do not have an access point in between them. While these types of networks usually have little protection, encryption methods can be", "Bluetooth beacons as checkpoints the user's location can be recalculated to reduce error. In this way a few Bluetooth beacons can be used to cover a large area like a mall. Healthcare Using the device tracking capabilities of Bluetooth beacons, in-home patient monitoring is possible. Using bluetooth beacons a person's movements and activities can be tracked in their home. Bluetooth beacons are a good alternative to in house cameras due to their increased level of privacy. Additionally bluetooth beacons can be used in hospitals or other workplaces to ensure workers meet certain standards. For example, a beacon may be placed", "neither ownership nor possession of the third-party's business records he sought to suppress\". Background Cellular telephones make optimal use of limited radio spectrum and their short transmission range, due to low power, by always connecting to a radio antenna at a nearby facility, known as a cell site. These facilities are typically on a tower or tall building and the cellular service provider places many such cell sites in an urban area to cover the needs of its customers. As a cell phone caller moves, their connection is automatically handed-off to another cell site that is close by, as needed.", "of getting as close as 100 feet (30 metres) were higher in areas with more towers. But if a call was made from a large building, even that would not be enough to precisely locate the caller. New federal rules, which service providers helped with, require location information for 40 percent of calls by 2017 and 80 percent by 2021.\nAs of 2018, 80 percent of 9-1-1 calls in the United States were made on cell phones, but the ability to do so by text messaging was not required. Text-to-911 was first used in Iowa in 2009. According to the FCC,", "an adjacent tower as appropriate. By comparing the relative signal strength from multiple antenna towers, a general location of a phone can be roughly determined. Other means make use of the antenna pattern, which supports angular determination and phase discrimination.\nNewer phones may also allow the tracking of the phone even when turned on and not active in a telephone call. This results from the roaming procedures that perform hand-over of the phone from one base station to another. Privacy Locating or positioning touches upon delicate privacy issues, since it enables someone to check where a person is without the person's", "computer system centralizes the phone and is able to find it.\nCell phones are programmed to constantly search for the strongest signal emitted from cell phone towers in the area. Over the course of the day, most cell phones connect and reconnect to multiple towers in an attempt to connect to the strongest, fastest, or closest signal. Because of the way they are designed, the signals that the Stingray emits are far stronger than those coming from surrounding towers. For this reason, all cell phones in the vicinity connect to the Stingray regardless of the cell phone owner’s knowledge. From there,", "of cell phone users from virtually anywhere in the world with a success rate of approximately 70%. In addition, eavesdropping is possible by using the protocol to forward calls and also facilitate decryption by requesting that each caller's carrier release a temporary encryption key to unlock the communication after it has been recorded. The software tool SnoopSnitch can warn when certain SS7 attacks occur against a phone, and detect IMSI-catchers that allow call interception and other activities.\nIn February 2016, 30% of the network of the largest mobile operator in Norway, Telenor, became unstable due to \"Unusual SS7 signaling from", "are not turned on. Call detail records and cell site (tower) dumps can show the phone owner's location, and whether they were stationary or moving (i.e., whether the phone's signal bounced off the same side of a single tower, or different sides of multiple towers along a particular path of travel). Carrier data and device data together can be used to corroborate information from other sources, for instance, video surveillance footage or eyewitness accounts; or to determine the general location where a non-geotagged image or video was taken.\nThe European Union requires its member countries to retain certain telecommunications data for", "Due to bandwidth limitations each cell will have a maximum number of cell phones it can handle at once. The cells are therefore sized depending on the expected usage density, and may be much smaller in cities. In that case much lower transmitter powers are used to avoid broadcasting beyond the cell.\nIn order to handle the high traffic, multiple towers can be setup in the same area(using different frequencies). This can be done permanently or temporarily such as at special events like at the Super Bowl, Taste of Chicago, State Fair, NYC New Year's Eve, hurricane hit cities, etc. where", "Wireless security Background Anyone within the geographical network range of an open, unencrypted wireless network can \"sniff\", or capture and record, the traffic, gain unauthorized access to internal network resources as well as to the internet, and then use the information and resources to perform disruptive or illegal acts. Such security breaches have become important concerns for both enterprise and home networks.\nIf router security is not activated or if the owner deactivates it for convenience, it creates a free hotspot. Since most 21st-century laptop PCs have wireless networking built in (see Intel \"Centrino\" technology), they don't need a third-party", "the identification key, it will be possible to attack not only the phone but also the entire network it is connected to.\nMany smartphones for wireless LANs remember they are already connected, and this mechanism prevents the user from having to re-identify with each connection. However, an attacker could create a WIFI access point twin with the same parameters and characteristics as the real network. Using the fact that some smartphones remember the networks, they could confuse the two networks and connect to the network of the attacker who can intercept data if it does not transmit its data in encrypted", "the network to the person that is trying to locate the telephone. Such systems include Google Maps, as well as, LTE's OTDOA and E-CellID.\nThere are also hybrid positioning systems which combine several different location approaches to position mobile devices by Wi-Fi, WiMAX, GSM, LTE, IP addresses, and network environment data. Operational purpose In order to route calls to a phone, the cell towers listen for a signal sent from the phone and negotiate which tower is best able to communicate with the phone. As the phone changes location, the antenna towers monitor the signal, and the phone is \"roamed\" to", "a PoP (Point of Presence) to several towers, reducing the need to pay for fiber circuits to the tower. For fixed wireless connections, a small dish or antenna is mounted to the roof of the customer's building and aligned to the WISP's nearest antenna site. When operating over the tightly limited range of the heavily populated 2.4 GHz band, as nearly all 802.11-based WiFi providers do, it is not uncommon to also see access points mounted on light posts and customer buildings.\nSince it is difficult for a single service provider to build an infrastructure that offers global access to its", "systems. Many camera phones are also equipped to use the methods of mobile phone tracking.\nLocations may be added later using a user's computer or a geotagging photo sharing web site. It has even been proposed that in future, it may be possible to deduce the locations of photos purely by comparison with large numbers of geotagged photos. These geotagging techniques rely on post-processing of media, recorded tracks and/or MAC addresses, and cannot be used for real-time geotagging.\nWith the rapid rise of mobile smartphones which integrate GPS receivers and cameras, and relative market stagnation of separate devices, these phones are", "made to it by the service provider during the man-in-the-middle attack.\nA rogue base station can force unencrypted links, if supported by the handset software. The rogue base station can send a 'Cipher Mode Settings' element (see GSM 04.08 Chapter 10.5.2.9) to the phone, with this element clearing the one bit that marks if encryption should be used. In such cases the phone display could indicate the use of an unsafe link - but the user interface software in most phones does not interrogate the handset's radio subsystem for use of this insecure mode nor display any warning indication. Passive", "AOL, Skype, Apple and Paltalk, and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year. It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies to leave \"backdoors\" into their systems), so that the majority of encryption is inadvertently vulnerable to different forms of attack.\nDomestically, the NSA has been proven to collect and store metadata records of phone calls, including over 120 million US Verizon subscribers, as well as intercept vast amounts of communications via the internet (Upstream). The", "cell phones. In addition to location finding, this provides navigation information, and allows for the tracking of the position of friends, and geotagging.\nIn December 2004, a class of 100 undergraduates worked to map the city of Seattle, Washington over several weeks. They found 5,225 access points; 44% were secured with WEP encryption, 52% were open, and 3% were pay-for-access. They noticed trends in the frequency and security of the networks depending on location. Many of the open networks were clearly intended to be used by the general public, with network names like \"Open to share, no porn please\" or \"Free", "Los Angeles Times interview, author Ray Bradbury, who was distrustful of modern technology, said \"We have too many cellphones. We've got too many Internets.\"" ]
Full Faith and Credit in the US
[ "US states can't deny the validity of legal documents in other states. So if I own some property in Texas, and I bring that up as evidence in an Oklahoma court case, the court can't decide it doesn't count because it's from the wrong state." ]
[ "Article Four of the United States Constitution Section 1: Full faith and credit Full Faith and Credit shall be given in each State to the public Acts, Records, and judicial Proceedings of every other State. And the Congress may by general Laws prescribe the Manner in which such Acts, Records and Proceedings shall be proved, and the Effect thereof.\nThe first section requires states to extend \"full faith and credit\" to the public acts, records and court proceedings of other states. Congress may regulate the manner in which proof of such acts, records or proceedings may be admitted.\nIn Mills v. Duryee,", "Full Faith and Credit Act, 28 U.S.C. § 1738.", "the Full Faith and Credit Clause nor the Fourteenth Amendment was implicated when a couple who had bought an insurance policy in Illinois and then moved to Louisiana sued the issuer of the policy under a provision in the Louisiana law that permitted such suits. A decade later, in Clay v. Sun Insurance Office, Ltd., 377 U.S. 179 (1964), the court explicitly stated that insurance travels with the insured, and that policy holders who move from one state to another can expect to have the laws of their new domicile apply to the interpretation of the insurer's liabilities on the", "Uniform Reciprocal Enforcement of Support Act Full faith and credit applicability Child support is established in proceedings in which the court has personal jurisdiction over both parties, i.e. the mother and father. For post-divorce obligations, this may be the inter parte divorce proceeding itself, where the issues become res judicata and entitled to full faith and credit. Under the United States Constitution Article Four, full faith and credit shall be given in each state to the public acts, records and judicial proceedings of every other state. Courts therefore may use the full-faith-and-credit article to enforce final", "lenders do take into account credit history from other countries, but this practice is not common. Among credit card companies, American Express can transfer credit cards from one country to another and in this way help start a credit history. Adverse credit Adverse credit history, also called sub-prime credit history, non-status credit history, impaired credit history, poor credit history, and bad credit history, is a negative credit rating.\nA negative credit rating is often considered undesirable to lenders and other extenders of credit for the purposes of loaning money or capital.\nIn the U.S., a consumer's credit history is compiled into a", "of Dual Credit Courses (high school/college credit classes) are offered for a public high school. The Dual Credit Courses offered credit from the University of Texas at Arlington, McLennan Community College, Rochester Institute of Technology and Texas State Technical College. History The school was named after Professor A.J. Moore, the first principal and first African-American principal of an all (later segregated) black school that existed in Waco in the years following the American Civil War. A.J. Moore Academy was on a campus built for the school that was known as Jefferson-Moore High School (500 North University Parks Drive, Waco, Texas", "credits The reform considered an increase on the college credits investment through the Columbian Institute of Credit (Instituto Colombiano de Crédito) and ICETEX. Credits which would be returned when students end their studies and get a job, all with the possibility of a debt forgiveness if excellent grades would be achieved. \nSince only private universities accept credit students, college community criticized that point because, in its opinion, it would harm the public education.", "American Opportunity Tax Credit History Originally proposed by President Barack Obama to help students and families pay for post-secondary education, the proposal called for a $4000 credit in exchange for 100 hours of community service. The stated goal of the credit was to, \"cover two-thirds the cost of tuition at the average public college or university and make community college tuition completely free for most students.\" H.R. 4853: Tax Relief, Unemployment Insurance Reauthorization, and Job Creation Act of 2010 The Tax Relief, Unemployment Insurance Reauthorization, and Job Creation Act of 2010 (Pub.L. 111–312, 124 Stat. 3296, H.R. 4853), was passed", "American Association of Christian Colleges and Seminaries The American Association of Christian Colleges and Seminaries, Inc. (AACCS) is an organization of Bible colleges and Christian universities and seminaries in the continental United States and Puerto Rico. According to AACCS, all of its member institutions are \"clearly identified with the historic Christian fundamentalist tradition.\" \nThe AACCS was originally established in 1985 as an informal division of the American Association of Christian Schools, with which it maintains a continuing relationship. In 1990 the group adopted the name American Association of Christian Colleges and Seminaries, and the AACCS was officially incorporated as an", "for juniors and seniors to gain college credit as part of their high school graduation requirements. In 2014 ACA was ranked in the top 50 Christian high schools in the United States.", "History, AP Music Theory, AP Psychology, AP Statistics, AP Studio Art, AP United States Government and Politics and AP United States History. College credit can be earned through articulation agreements with New Jersey Institute of Technology, Rutgers University, Saint Peter's University and Seton Hall University. History The school was created in 1936, when the Sweeney Senior High School (officially Daniel P. Sweeney High School) and the Pulaski Vocational / Technical School were established. The technical school occupied what is now the vocational wing of BHS. The two schools were officially amalgamated in 1953. In 1973, the school was reorganized into", "credit. Also, in modern America, credit refers to a rating which indicates the likelihood a borrower will pay back his or her loan. In earlier times, credit also referred to reputation or trustworthiness. Creditor's power during insolvency In the UK, once an IVA has been applied for, and is in place through the courts, creditors are prevented from making direct contact under the terms of the IVA. All ongoing correspondence of an IVA must first go through the Insolvency Practitioner. The Insolvency Practitioner will contact you. The creditors will begin to deal with the Insolvency Practitioner and readily accept annual", "Universal Credit after hearing fellow MP, Frank Field, describe how he had talked a man out of suicide. The Department for Work and Pensions later stated that \"the two examples that [Field] gave were not claimants on Universal Credit.\" In the same month Allen voted along with fellow Conservative Dominic Grieve and nine other Tory MPs against the government, and in favour of guaranteeing Parliament a \"meaningful vote\" on any Brexit deal Theresa May might agree with Brussels.\nIn June 2018, during a debate on changing the abortion laws in Northern Ireland following a referendum in the Republic of Ireland which", "deposits at 5,785 not-for-profit cooperative US credit unions. For comparison, the FDIC insured more than $13 trillion in deposits at 5,980 banks and thrift institutions. The NCUA and the FDIC are both independent federal agencies backed by the full faith and credit of the US government. Membership restrictions In the United States, as elsewhere, credit unions were historically formed around a single church, place of work, labor union, or town. Membership was limited to those who were in the field of membership. The Federal Credit Union Act of 1934 limited membership to \"groups having a common bond of occupation or", "because credit unions, by their nature and mission of \"people helping people,\" already meet the financial needs of a broad spectrum of people that fall within their fields of membership, and play an active role in community development and growth. Credit unions, with the support of Republicans have successfully lobbied to exempt themselves from the (U.S. federal) Community Reinvestment Act, the law that forces banks to provide services in low-income areas.\nIn 2006, U.S. credit unions approved 69% of mortgage applications they received from low- and moderate-income individuals, while other U.S. mortgage lenders approved only 47%, according to data collected", "televangelists who appeal for repeated gifts from people in financial distress or personal crises, and he criticized the very loose requirements for entities to obtain tax exempt status as churches under U.S. tax law. Oliver said that he would ultimately donate any money collected by the church to Doctors Without Borders.\nIn July 2018, Antonio Spadaro and Marcelo Figueroa, in the Jesuit journal La Civiltà Cattolica, examined the origins of the prosperity gospel in the United States and described it as a reductive version of the American Dream which had offered opportunities of success and prosperity unreachable in the Old World.", "to organizations that are considering whether to offer credit to individuals or companies. It is also available to other entities with a \"permissible purpose\", as defined by the Fair Credit Reporting Act. The consequence of a negative credit rating is typically a reduction in the likelihood that a lender will approve an application for credit under favorable terms, if at all. Interest rates on loans are significantly affected by credit history; the higher the credit rating, the lower the interest, while the lower the credit rating, the higher the interest. The increased interest is used to offset the higher rate", "the United States, credit unions incorporated and operating under a state credit union law are tax-exempt under Section 501(c)(14)(A). Federal credit unions organized and operated in accordance with the Federal Credit Union Act are tax-exempt under Section 501(c)(1). Global presence According to the World Council of Credit Unions (WOCCU), at the end of 2014 there were 57,480 credit unions in 105 countries. Collectively they served 217.4 million members and oversaw US$1.79 trillion in assets. WOCCU does not include data from cooperative banks, so, for example, some countries generally seen as the pioneers of credit unionism, such as Germany, France, the", "in compliance with Home Mortgage Disclosure Act. The same data shows that U.S. credit unions approved 62% of minority members' mortgage applications, versus a 51% for other U.S. mortgage lenders. That data also shows that 25.2% of all U.S. credit union mortgage originations were for low- or moderate-income borrowers, versus 20.6% at other U.S. mortgage lenders. However, the NCUA has long discouraged U.S. credit unions from giving members loans that they may not be able to repay, and has forbidden other types of predatory lending and abusive credit practices. Federal credit unions are also forbidden from charging", "Council for Christian Colleges and Universities The Council for Christian Colleges & Universities (CCCU) is a higher education association of more than 180 Christian institutions, primarily in the United States and Canada. Founded in the 1970s to advance the interests of church-related colleges through government lobbying and public relations, the council also provides professional development for employees of member schools and runs the Best Semester off-campus study programs for students at nine locations around the world. History In 1976, presidents of colleges in the Christian College Consortium called a meeting in Washington, D.C. to organize a Coalition for Christian Colleges", "throughout the United States; the government has been created to enforce the opinion of the people, so the opinion of the people should be informed and knowledgeable. Credit and government borrowing Washington provides strong support for a balanced federal budget, arguing that the nation's credit is an important source of strength and security. He urges the American people to preserve the national credit by avoiding war, avoiding unnecessary borrowing, and paying off any national debt accumulated in times of war as quickly as possible in times of peace so that future generations do not have to take on the financial", "quarter-point reduction in the interest rate if payments were to be deducted automatically from an America First checking account, and a quarter-point reduction for mortgages of less than half the residence's appraised value.\nBeginning in 1998, a series of legal and legislative restrictions were placed on America First Credit Union's field of membership and its ability to make business loans. In 2003, America First became federally chartered to protect its membership and serve its business members. In 2004, it opened its first branch in Summit County, Utah, since the federal charter allows it to serve that county as well.\nIn 2005, it", "college population) although not all of them were receiving financial aid. A longitudinal study from the National Center for Education Statistics found that only 33% of students admitted under ATB in 2003 had earned a college credential by 2009. Evidence also suggested that they were more likely to default on student loans.\nThe US Government Accountability Office expressed concern, in 2009, that some for-profit colleges were helping students to cheat on the ATB examination or were falsifying the results in order for their students to receive Federal financial aid. Students who had received a Federal direct loan or a Federal Family", "credit information with Equifax in the United States. If a person has been living in Canada for many years and then moves to USA, when they apply for credit in the U.S., they may not be approved because of a lack of U.S. credit history, even if they had an excellent credit rating in their home country.\nAn immigrant may end up establishing a credit history from scratch in the new country. Therefore, it is usually difficult for immigrants to obtain credit cards and mortgages until after they have worked in the new country with a stable income for several years.\nSome", "to qualifying scholarship trusts that are recognized and registered with the Secretary of the Treasury. \nHe also wrote the legislation for the American Opportunity Tax Credit (AOTC). The tax credit assists any full-time college or university student or their families that claim the credit. Since 2011, it has assisted 4.5million students and their families. AOTC provides up to $2500 tax credit for families to assist them with the cost of college. The credit is unique in that families under a set income without a tax liability are eligible for a tax rebate. President Obama has called for making the", "for through the website. A resource for credit related information, Credit Card Insider does not recommend credit cards that are not believed to beneficial for consumers. Scholarship In 2015, Credit Card Insider established a scholarship program called the Insider Scholarship to recognize the importance of higher education. The scholarship is for graduating high school seniors and college students. A separate application of 500-1,000-word essay or five-minute video submission about how the student plans to use the award money wisely in order to pursue their higher education is required. Five students are selected for the scholarship money, each receives $1,000.", "H.R. 3584 (113th Congress) Background A credit union is a member-owned financial cooperative, democratically controlled by its members, and operated for the purpose of promoting thrift, providing credit at competitive rates, and providing other financial services to its members. Many credit unions also provide services intended to support community development or sustainable international development on a local level. Provisions of the bill The bill would amend the Federal Home Loan Bank Act to treat certain privately insured credit unions as insured depository institutions for purposes of determining eligibility for membership in a federal home loan bank.\nThe bill would permit a", "falls to 12 cents a barrel, while many other nations have called in loans and debts owed them by the United States.\nThe Catholic and Episcopal churches reunite, and assisted suicide in the face of painful terminal illness is accepted and sanctioned by religious leaders including the Holy See. Wicca, \"alternative\" medicine, and organic medicine become common. Many Americans become Destructuralists, anarchists, and luddites, rejecting civic authority and returning to a primitive lifestyle. Damaged communication systems mean that the American people remain isolated, and many believe that the USSR had won the war.\nForeign companies move into the unaffected regions of", "of independent study, since 2002 various universities within the USA, UK and Australia have offered academic credit in accordance with an ISV Program Syllabus which has been approved by the accrediting institutions. The educational focus is in the area of Natural Resource Management and Sustainable Development, capitalising on the program's opportunities for experiential education in an international volunteer setting.\nHowever, it is an educational program for all participants regardless of whether or not they are earning credit. The program incorporates group discussions, daily journaling, guest speakers and more, to facilitate and encourage participants to gain as much as possible from their", "of dual credit classes. Dual credit classes are courses that give students a credit for both high school and college. The dual credit classes that will be offered in Fall 2008 are Anatomy 201, Biology 100, Math 165, Physics 110, English 103, History 150. In the Spring 2009, the classes will include Physics 112 and English 104.The college credits are for Ball State University, and the credits can be transferred to most other colleges in Indiana, with the exception of the University of Notre Dame and Wabash College. A typical college class is one semester long, but three of" ]
Why do computers/programs freeze/crash?
[ "It means theyre working. when you get to the theoretical side of computer science, it's actually impossible to tell when something is in an infinite loop, or just taking a very long time. Generally, the computer has just come across a large amount of data it must go through, or may perhaps be waiting on a callback from some other program it dispatched. You see this a lot if you've ever downloaded a small application from someone instead of a big budget program. sometimes when you feed a simple program lots of data (I have an image downloader some dude made in a day for instance) it will \"not respond\" for hours on end because it's working really hard sorting through all the data you just gave it, and not responding to the operating system's requests for activity because it can't. Generally speaking, unless you have a logic flaw, the program will finish sometime, but you have (literally a mathematically proven fact) no way of knowing when this will occur if you don't know how the program works or how much data was given to it", "They are given an instruction that they can't complete.\n\nOne time my family lined up, and each of us called for my youngest sibling (a toddler) to come to us. He waddled up until he got about 10 feet away. Not knowing who to go to, he sat on the ground and cried. That's the computer crash" ]
[ "of inactivity, or restart/shutdown at a scheduled time in an attempt to ensure that no such installations are retained (as rebooting the system returns the system to its original, unmodified state).\nDeep Freeze cannot protect the operating system and hard drive upon which it is installed if the computer is booted from another medium (such as another bootable partition or internal hard drive, an external hard drive, a USB device, optical media, or network server). In such cases, a user would have real access to the contents of the (supposedly) frozen system. On a Windows-based computer, this scenario may be prevented", "problem was that of the single input queue: a non-responsive application could block the processing of user-interface messages, thus freezing the graphical interface. This problem has been solved in Windows NT, where such an application would just become a dead rectangle on the screen; in later versions it became possible to move or hide it. In OS/2 it was solved in a FixPack, using a timer to determine when an application was not responding to events.", "being written to the drive, leaving the original data intact. This redirected information is no longer referenced once the computer is restarted, thus restoring the system to its original state at the disk sector level. To the computer user, the computing experience is unaffected when Deep Freeze is active.\nFor Deep Freeze to protect a computer's configuration, a computer must have its BIOS password-protected and have its hard disk as the first boot device. Anti-Executable Originally released in 2005 as FreezeX, Anti-Executable is an application whitelisting software that, when first installed, creates a \"whitelist\" of executable files which exists on a", "always be temporarily loaded into the CPU's cache during out-of-order execution —from which the data can be recovered. This can occur even if the original read instruction fails due to privilege checking, and/or if it never produces a readable result.\nSince many operating systems map physical memory, kernel processes, and other running user space processes into the address space of every process, Meltdown effectively makes it possible for a rogue process to read any physical, kernel or other processes' mapped memory—regardless of whether it should be able to do so. Defenses against Meltdown would require avoiding the use of memory mapping", "program to run off of corrupted memory with unpredictable results. If the operating system's memory is corrupted, the entire computer system may crash and need to be rebooted. At times programs intentionally alter the memory used by other programs. This is done by viruses and malware to take over computers. It may also be used benignly by desirable programs which are intended to modify other programs; in the modern age, this is generally considered bad programming practice for application programs, but it may be used by system development tools such as debuggers, for example to insert breakpoints or hooks.\nProtected memory", "cold restart is triggered by pressing Ctrl+Break. If a filing system is installed, ⇧ Shift+Break will cause the computer to search for and load or run a file called !Boot on the filing system's default device (e.g. floppy disk 0, network user BOOT). The latter two behaviours were inherited by the successor to Acorn MOS, RISC OS. These behaviours could be changed or exchanged in software, and were often used in rudimentary anti-piracy techniques.\nBecause of the BBC Micro's near universal usage in British schools, later versions of the machine incorporated a physical lock on the Break key to stop children", "Freeze (software engineering) Implementations In development environments using version control, the use of branching can alleviate delays in development caused by freezes. For example, a project may have a \"stable\" branch from which new versions of the software are released, and a separate \"development\" branch in which the developers add new code. The effect of a freeze is then to prevent promotion of some or all changes from the development branch to the stable branch. In other words, the freeze applies only to the stable branch, and developers can continue their work on the development branch.", "by a Mac OS solution in 2005. \nDeep Freeze uses patented technology (US patent 7539828, US patent 7917717, US patent 9152824, US patent 9785370) and redirects information being written to the hard drive or partition to an allocation table, leaving the original data intact. The redirected information on the allocation table is no longer referenced once the computer is restarted, therefore restoring the computer back to its original state at the disk sector level down to the last byte.\nExtending the functionalities of the reboot to restore technology, the software has the provision of ThawSpaces or Thawed Partitions for permanently saving", "a second switch, with a higher triggering temperature, usually turns off even the cache and forces the computer to reboot). This mitigates the impact of programs resembling power viruses on the processor's longevity, while still accommodating their possible legitimate uses; it can also make overclocking possible with less risk. Manual reset Some thermal switches must be reset manually after they have been tripped. This design is used when an automatic and unattended restart would create a hazardous condition, such as sudden startup of a powerful motor without warning. These types of thermal cutouts are usually reset by pressing a push-button", "even weeks by cooling them with freeze spray. Furthermore, as the bits disappear in memory over time, they can be reconstructed, as they fade away in a predictable manner. Consequently, an attacker can perform a memory dump of its contents by executing a cold boot attack. The ability to execute the cold boot attack successfully varies considerably across different systems, types of memory, memory manufacturers and motherboard properties, and may be more difficult to carry out than software-based methods or a DMA attack. While the focus of current research is on disk encryption, any sensitive data held in memory is", "other models. Several users created videos on YouTube which showed the freezes. Soon after this, Apple released the 10.11.5 update, which contained stability improvements. Apple later acknowledged these problems, recommending their users to update to the last point release.\nAfter the December 13, 2016 release of Security Update 2016-003, users reported problems with the WindowServer process becoming unresponsive, causing the GUI to freeze and sometimes necessitating a hard reboot to fix. In response, on January 17, 2017, Apple released Security Update 2016-003 Supplemental (10.11.6) to fix \"a kernel issue that may cause your Mac to occasionally become unresponsive\" and at the", "program fails, it may cause memory used by one or more other programs to be affected or overwritten. Malicious programs or viruses may purposefully alter another program's memory, or may affect the operation of the operating system itself. With cooperative memory management, it takes only one misbehaved program to crash the system.\nMemory protection enables the kernel to limit a process' access to the computer's memory. Various methods of memory protection exist, including memory segmentation and paging. All methods require some level of hardware support (such as the 80286 MMU), which doesn't exist in all computers.\nIn both segmentation and paging, certain", "a serious error (a Blue Screen of Death) or a stop error could cause problems for servers that needed to be constantly running and so provided a system setting that would allow the server to automatically reboot when a stop error occurred. Also included is an option to dump any of the first 64 KB of memory to disk (the smallest amount of memory that is useful for debugging purposes, also known as a minidump), a dump of only the kernel's memory, or a dump of the entire contents of memory to disk, as well as write that this event", "exponentially, although this is offset to some degree by programs and files themselves becoming larger. In some cases, a computer with virtual memory support where the majority of the loaded data resides on the hard disk may run out of physical memory but not virtual memory, thus causing excessive paging. This condition, known as thrashing, usually renders the computer unusable until some programs are closed or the machine is rebooted. Due to these reasons, an out of memory message is rarely encountered by applications with modern computers.\nIt is, however, still possible to encounter an OOM condition with a modern computer.", "a query-able format. However, it would also make it more difficult to retrieve if the computer crashed, and logging would not be available unless the database was available. A plain text format minimises dependencies on other system processes, and assists logging at all phases of computer operation, including start-up and shut-down, where such processes might be unavailable.", "used by some programmer devices. Freezer, Reset, and Utility cartridges Probably the most well-known hacker and development tools for the Commodore 64 included \"Reset\" and \"Freezer\" cartridges. As the C64 had no built-in soft reset switch, reset cartridges were popular for entering game \"POKEs\" (codes which changed parts of a game's code in order to cheat) from popular Commodore computer magazines. Freezer cartridges had the capability to not only manually reset the machine, but also to dump the contents of the computer's memory and send the output to disk or tape. In addition, these cartridges had tools for editing game", "and reboots the computer, but does not invoke the Power On Start Up Test (POST) or clear memory. Hardware reset buttons on PCs work by causing a momentary power interruption to the CPU, which resets it and causes the computer to reboot. Unlike Ctrl+Alt+Del, pressing the reset button causes the BIOS to perform the POST check. By the early 2000s, reset buttons had largely disappeared from PCs although the connector for them is still present on motherboards.\nReset buttons or keypresses on any computer cannot erase the contents of system RAM, which can only be done by powering the computer off", "to responsible disclosure guidelines. Other CPUs The MOS Technology 6502 has 12 invalid instructions which will freeze the CPU.\nOn the Zilog Z80, executing DI (disable interrupts) followed by HALT (wait for an interrupt) results in the CPU staying frozen indefinitely, waiting for an interrupt that cannot happen. The similar processor found in the Game Boy, the LR35902, contained a partial fix allowing it to recover from one HALT, but it would become frozen with three consecutive HALTs with interrupts disabled. The LR35902 itself contains no less than 11 opcodes that fully lock the CPU when executed.\nIt should also be", "Deep Freeze (software) Limitations and security Deep Freeze only protects workstations in a \"fresh-booted\" state. That is, Deep Freeze prevents permanent tampering with protected hard drives/partitions across reboots, but user activity between restarts is not limited by the program. For example, Deep Freeze does not prevent application installation; a user can install a modified version of a Web browser (but seemingly harmless to the unknowing user) designed to secretly send users' passwords to a server connected to the Internet. As a workaround, Deep Freeze can be configured to restart after user logout, shutdown after a chosen period", "to other programs for use. In programming languages without a garbage collector (e.g. C and C++) it's up to the programmer to call the necessary memory releasing functions and to account for all the unused data within the program. However this doesn't always happen. Due to software bugs the program might consume more and more memory eventually causing the system to run out of memory. In low memory conditions, the system usually functions slower due to the performance bottleneck caused by intense swapping (thrashing), applications become unresponsive and those that request large amounts of memory unexpectedly may crash. In case", "in a manner vulnerable to such exploits (i.e. a software-based solution) or avoidance of the underlying race condition (i.e. a modification to the CPUs' microcode and/or execution path).\nThe vulnerability is viable on any operating system in which privileged data is mapped into virtual memory for unprivileged processes—which includes many present-day operating systems. Meltdown could potentially impact a wider range of computers than presently identified, as there is little to no variation in the microprocessor families used by these computers.\nA Meltdown attack cannot be detected if it is carried out. Mechanism Meltdown relies on a CPU race condition that can arise", "program. The results of an error like this are unpredictable. In some cases, the incorrect data might overwrite memory used by the operating system. Computer crackers can take advantage of this to create viruses and malware. Virtual memory Virtual memory is a system where all physical memory is controlled by the operating system. When a program needs memory, it requests it from the operating system. The operating system then decides in what physical location to place the program's code and data.\nThis offers several advantages. Computer programmers no longer need to worry about where their data is physically stored or whether", "Cold boot attack In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random access memory by performing a hard reset of the target machine. Typically, cold boot attacks are used to retrieve encryption keys from a running operating system for malicious or criminal investigative reasons. The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents that remain readable in the seconds to minutes", "software package for users. As part of the sequencing process, it will detect when an installer requires a reboot, interrupt the triggered reboot, and instead simulate the required reboot by restarting services and loading/unloading libraries. Windows deviations and labeling criticism Windows 8 & 10 enable (by default) a hibernation-like \"Fast Startup\" (a.k.a. \"Fast Boot\") which can cause problems (including confusion) for users accustomed to turning off computers to (cold) reboot them.", "two versions for Windows (Standard for standalone computers and Enterprise for networked computers) and a version for Mac OS X (a version for SUSE Linux Enterprise Desktop (SLED) by Novell was discontinued in 2010). Deep Freeze for Windows can be managed remotely via its Enterprise Console or via Faronics Core. Deep Freeze Mac can be centrally-managed in multiple computer settings via Apple Remote Desktop. The principle of operation Deep Freeze is a kernel-level driver that runs at a low system level to protect drive integrity. Running at this low system level allows the driver to redirect information which is", "information on the operating system hard disk, the machine should be completely shut down when not in use to reduce the likelihood of a successful cold boot attack. However, data may remain readable from tens of seconds to several minutes depending upon the physical RAM device in the machine, potentially allowing some data to be retrieved from memory by an attacker. Configuring an operating system to shut down or hibernate when unused, instead of using sleep mode, can help mitigate the risk of a successful cold boot attack. Smartphones The cold boot attack can be adapted and carried out in", "NOT work (due to certain optimizations in the implementation). Instead there was a button on the console called Modify which when pressed together with the Check Reset button, when the computer was in Manual mode, would set the computer in a mode that would clear all of memory in a tenth of one second regardless of how much memory you had; when you pressed Start. It also stopped automatically when memory was cleared, instead of requiring the operator to stop it.\nOther than typing machine code at the console, a program could be loaded via either the paper tape reader, the", "are subject to a problem called metastability, which can happen when two inputs, such as data and clock or clock and reset, are changing at about the same time. When the order is not clear, within appropriate timing constraints, the result is that the output may behave unpredictably, taking many times longer than normal to settle to one state or the other, or even oscillating several times before settling. Theoretically, the time to settle down is not bounded. In a computer system, this metastability can cause corruption of data or a program crash if the state is not stable", "to BASIC. Software that loads at $0801 cannot normally be used in conjunction with another BASIC program. Commodore did not include a reset button on any of their computers until the CBM-II line, but there were third-party cartridges with a reset button on them. It is possible to trigger a soft reset by jumping to the CPU reset routine at $FCE2 (64738). A few programs use this as an \"exit\" feature, although it does not clear memory.\nThe KERNAL ROM went through three separate revisions, mostly designed to fix bugs. The initial version is only found on 326298", "crash the computer instead of giving an error message, and many statements were required to do even simple tasks. Such a thing was death in the tiny RAM and slow interpreted BASIC paradigm of the day.\nProgrammers could mitigate these problems by using machine code, to an extent, but this in itself was a tedious process with a rather steep learning curve. So to address these shortcomings Commodore created the Super Expander cartridge. It provided extra BASIC commands to facilitate using graphics and sound on the VIC-20. It also had commands to read the joystick and lightpen, and unlocked the use" ]
How much of the music does a songwriter actually write?
[ "It is sort of complicated. Generally, the person credited as the \"writer\" comes up with the main composition, or chord structure and melody for the song. \n\nFor instance- Sting is listed as the sole composer for \"Every Breath You Take\", because he came up with the chord structure- but when you think about that song, it is Andy Summers' guitar riff that probably comes to mind. However- Sting pulls in a reported $2k per day in royalties, while Summers gets squat.\n\nThe thought being that the other musicians (bass, drums, horns, etc) are merely playing along to the already \"composed\" structure of the song. Yes- they are still \"writing\" their parts- but the structure already existed.", "It depends on the band, and the musicians. As a general rule of thumb most musical acts are directed by a producer though. Even classic musicians like The Beatles or The Doors were heavily produced. If you want to see the full credits for a song find it on [Discogs](_URL_0_) and be sure to check out both the credits which are for a specific song, and the album credits which apply to all the songs on an album. Occasionally things are left out on the website, but it's generally very good and comprehensive." ]
[ "... My songs reflect on and talk about my life and how I've lived it. But I'm not one of those lyricists who explains everything. My stories aren't obvious. There are some singer-songwriters who say too much\". His repertoire included new songs, which he hoped to record.", "the original music as the co-writer is integrated into their traditional role as a Record Producer, such as Rodney Jerkins, Dr. Dre, Timbaland or Pharrell Williams, opposed to a rock producer that may rarely contribute as a co-writer of a song. Singer-songwriters Many singers also write songs for themselves, and as such, they are usually referred to as singer-songwriters. Top-liners A top-liner is a songwriter who writes a song over a pre-made beat. Top-lining differs from songwriting in that the writer is not creating a song from scratch, but rather creating lyrics and melodies over an existing music genre, tonality,", "Songwriter A songwriter is a professional that writes lyrics and composes musical compositions for songs. A songwriter can also be called a composer, although the latter term tends to be used mainly for individuals from the classical music genre and film scoring, but is also associated writing and composing the original musical composition or musical bed. A songwriter that writes the lyrics/words are referred to as lyricist. The pressure from the music industry to produce popular hits means that songwriting is often an activity for which the tasks are distributed between a number of people. For example, a songwriter", "offer songwriting diplomas and degrees with music business modules. Since songwriting and publishing royalties can be substantial sources of income, particularly if a song becomes a hit record; legally, in the US, songs written after 1934 may be copied only by the authors. The legal power to grant these permissions may be bought, sold or transferred. This is governed by international copyright law.\nSongwriters can be employed to write either the lyrics or the music directly for or alongside a performing artist, or they present songs to A&R, publishers, agents and managers for consideration. Song pitching can be done on a", "Also recognizes that when writing a song, \"I don't write lyrics, I just write the music, I start with a riff or a simple melodic structure and build from that,\" changing his system according to the musical style he is working on. About the \"Cachorro López sound\", he stated that he works on every album as something individual, trying not to repeat the formula on different artist, in order to avoid being boring and repetitive.", "said \"Most songwriters have a couple of songs that they’ve written for other artists that they’ve always felt they would have loved to have a go at themselves. As a solo artist I have always been expected to do ballads and story songs. Deep down where I live, it’s all rock n roll.\" The album is described as \"a powerful, rollicking, rock n roll album that will transport listeners back to the live show sounds of Brian Cadd with his famous Bootleg Family Band.\"\nIn 2016, Cadd also celebrated his 50th year in the music business and 70th birthday. Reception Jeff", "has given him a steady income over the past 20 years. Being a lyricist is just a part-time for Lau because this career is not steady and for each song, a lyricist can only receive from HKD$1500–5000. This is only for those who have taken the advance payment, meaning that taking $5000 before receiving the rest of royalties. He tried not to receive “advance” for two years but realized cannot sustain his life by writing a song for a few hundred dollars. Unlike famous singers, lyricists cannot count on the royalties of several classics while they have to produce a", "songs and musical concepts for other artists to sing, some songwriter-musicians create songs to perform themselves. Songwriters need to create a number of elements for a song, including an introduction, various verses and a chorus. At minimum, a songwriter must prepare a lead sheet for a song, which consists of one or more pieces of sheet music with the melody notes and chord progression indicated on it.\nThe songwriter may expand upon the melody and chord progression by adding an instrumental melody (which may occur before or after the vocal melody, or alongside the vocal melody) and creating a more complex", "song structure (e.g., verse, chorus, bridge, instrumental solo section, verse, etc.). Producer / songwriters With recent technological improvements, a songwriter can now create commercially viable music almost entirely on their laptop. This technological advancement has made the producer/songwriter role a much more popular occurrence. Perhaps because the role of producer isn't generally understood by the public, the average listener doesn't know when an artist also takes on the role of producer. \nBrian Wilson of The Beach Boys is one of the earliest and most widely known examples of a songwriter turned music producer. Within two years of the band's commercial", "writing songs in the studio for Who We Are, and recorded most of the songs the day they were written at Coles' Ironworks Studios in Los Angeles. Wade explained the process of recording the songs, and said, \"There was something amazing in just diving right into capturing the moment without even creating a demo first.\" He further noted how he appreciated recording songs with many takes to capture the initial thought of a song. The track was released via digital download on May 7, 2007, by Geffen Records. It was then solicited to mainstream radio on May 15, 2007. Chart performance \"First", "the songs that I can write.\"", "song? Do you know anything about writing? If you're going to write for records, it goes like this: A, B, C, B, C, C. I don't know what you're doing. You're doing A, D, F, G, B, D, C. You don't know how to write a song.... Have you ever listened to pop music? Have you ever heard any rock-and-roll music.... You should go downstairs when you leave here...and buy some rock-and-roll records.\nMeat Loaf asserts \"Jim, at the time, knew every record ever made. [He] is a walking rock encyclopedia.\" Although Steinman laughed off the insults, the singer screamed \"Fuck", "to starting a stable and ongoing career to earn his living, while being able to develop himself both personally and musically. The circumstances had also changed his approach to songwriting. In 1994 he considered music as having first priority and words coming in second, as he is a composer and not an author or a poet, but by 2003 he put equal emphasis on lyrics and music, where his songwriting borrows from his own experiences, thoughts and feelings, making the lyrics more direct. With his approach being comparable to writing a diary, the title of his first solo album Secrets", "who excels at writing lyrics might be paired with a songwriter with the task of creating original melodies. Pop songs may be written by group members from the band or by staff writers – songwriters directly employed by music publishers. Some songwriters serve as their own music publishers, while others have outside publishers.\nThe old-style apprenticeship approach to learning how to write songs is being supplemented by university degrees and college diplomas and \"rock schools\". Knowledge of modern music technology (sequencers, synthesizers, computer sound editing), songwriting elements and business skills are now often necessary requirements for a songwriter. Several music colleges", "Chou told him that he should know how to write his own songs, so that people would want to listen to his music, influenced by this Alan began writing his own songs. Secondly, he wrote hundreds of songs just to make the world hear his voice. For this purpose, Alan Kuo's music director requires him to edit and edit his songs, every year, every month, every week, and every day. He kept on working on his songs for perfection. Finally, he edited his songs and made new songs in the six years of preparation, just for the best 12 songs", "I have done six songs in ten days, but that is rather beyond my average rate. I probably write from twelve to fifteen songs a year, but I do not work constantly. Sometimes for a month I will not touch pen to paper, and then I will make up for lost time by working almost continuously for the next month. It is hard to say just how I write. I will read a little poem, perhaps, and then the melody comes, and, do you know, that particular melody is always thereafter connected with that poem. I might put the poem", "final recording, at the time of The Key: \nIt takes me very little time to write the song. Ten, fifteen minutes at the most. But to arrange the song, I need to take all day. The song is written with whatever rhythm I've come up with, and I put the arrangement on top of that. I can keep it a little more to what I think it should be than if I allowed somebody else to do it. I sit at home with my little Portastudio, and I work up the bass part, record it; work up the guitar part,", "New York City.) In a 1986 interview, David Foster said of Cetera, \"'He's the best writing partner I've ever had.'\"\nAbout the process of writing songs, Cetera has said, \"'I'm like the very bad student who only studies the day before a test! I only tend to write songs when I have a purpose – I need to know that I'm going to do a new album, and then I would start writing. There are not a lot of Peter Cetera songs lying around, because I don't really write a lot of things when I'm not expected to do an", "Universal Music Publishing as a starter deal. His success under the arrangement eventually allowed him to found his own publishing company, so that he could \"...keep as much [publishing income] as possible and say how it's going to be done.\" As musicians Songwriters are also often skilled musicians. In part, this is because the process of \"working out\" a song or arrangement requires a songwriter to play an instrument, typically the guitar or the piano, to hear how the chord progression sounds and to hear how well a given set of chords supports a melody. In addition to selling their", "and play.\" Songwriting is done by the band as a whole after one of the four members finds the concept for a song. Danny stated that a lot of their songs are first written in a \"folk set up\" before evolving into something else.\nGreta Van Fleet are often compared to Led Zeppelin. Jake related that he \"... went through a year of really intensely studying what [Jimmy] Page did to the point I knew how he thought,\" but he has studied other classic rock guitarists in a similar manner, specifically mentioning Pete Townshend. Likewise, on his voice being compared to", "a writer's voice in language to music and deemed its significance as the key factor in capturing an audience. In addressing the complexities of voice in writing, Murray noted the following elements as important to developing a writer's voice: revealing specifics, the word, the phrase, the beat, and the point of view.\nHe encourages writers to write with their readers as new stories are composed. To demonstrate this, he provides examples of his own writing and along with that, writes what the reader might think or say in response. He then discusses, briefly, researching certain topics to strengthen the ethos of", "a pop or traditional songwriter may not use written notation at all, and instead compose the song in their mind and then play, sing and/or record it from memory. In jazz and popular music, notable sound recordings by influential performers are given the weight that written or printed scores play in classical music.\nAlthough a musical composition often uses musical notation and has a single author, this is not always the case. A work of music can have multiple composers, which often occurs in popular music when all members of a band collaborate to write a song, or in musical theatre,", "Thomas), was present during the sessions, and stated that a writing camp typically involves the label hiring ten recording studios for two weeks at the cost of $25,000 per day. Daniels revealed that it is where songwriters have lyrics but no music, and where producers have music but no lyrics.\nSinger-songwriters and producers Taio Cruz, Alex da Kid, Sean Garrett, Ne-Yo, Rico Love, Timbaland, Shontelle, David Guetta, and Drake contributed to the album. \"DJ Got Us Fallin' in Love\" was written for Rihanna, but the song was rejected and was subsequently sent to Usher. With regard to \"What's My Name?\", Rihanna", "on a piece of paper and I went home that Sunday night and wrote the whole song in about three hours. Her lyrics were more in prose or poetic form, so I rewrote a few bits of it. I had a bit of a melody in my head anyway, so I reconstructed it, then moulded the lyrics to fit that melody. I did a demo on x Revox reel-to-reel tape. She really liked it and she recorded it on an album for Capitol Records. I never thought of it as being one of my better songs. It had commercial potential", "song\", in the way that working musicians might discuss \"the A-minor in the second measure of the chorus\".\nStevie Chick, a writer who teaches music journalism at City University London, said, \"I think more than any other journalism, music journalism has got a really powerful creative writing quotient to it.\"\nTris McCall of the Newark Star-Ledger discussed his approach to music criticism in a 2010 interview, stating, \"Most of us [critics] begin writing about music because we love it so much. We can't wait to tell our friends and neighbors about what we're hearing.\" According to McCall, even over the course of", "Some artists take years. I don't. I write music every day.\" In another interview, she declared the album \"the anthem of [this] generation,\" as she continued, \"It includes the greatest music I've ever written. I've already written the first single for the new album and I promise you, that this album is the greatest of my career.\"\nBesides sessions on tour buses, recording sessions and mixing for the album took place at Abbey Road Studios in London, England, Studios 301 in Sydney, Australia, Sing Sing Studios in Melbourne, Australia, Gang Studios in Paris, France, Livingroom Studios in Oslo, Norway, Allerton Hill", "of the different processes for writing. With some we started from one of my older alternative rock songs. In others I would lay down a very minimal piano with a vocal and let the producer create music around the idea. I only started from a producer’s instrumental on one track, which was “The Offering” with Sied van Riel. The real fun was in sending off a rough version of something I had written, and seeing how it came back to me after a few weeks with the producer. These guys are incredible at what they do, and working with them", "write songs inspired by his own experiences and emotions, which allowed him to explore other musical genres. He explained that when he wrote songs for the album, he began by creating a chord progression using his guitar, which evolved into the tune's basic melody, after which he would determine its theme. Other songs were conceived by Rumble humming a tune during everyday activities, then recording it onto his iPhone so as to not forget it. The tune would later be refined to a full-fledged song. According to Rumble, writing music was the hardest component of the album's making. \"Always Be", "speculated that the band would release it in a song-by-song format as opposed to a full-length album format, elaborating with \"It's hard, to be honest with you, to spend six [or] nine months to write eleven songs—all those lyrics ... everything ... the vocals, the guitars, the bass, the sonics, the mixing, the mastering, the artwork. ... You put it out and nothing [happens], because now people cherry-pick songs. So we go, 'Why don't we write songs and find vehicles to get one, two or four songs to ten million people rather than eleven songs to a hundred thousand people.\"", "songwriters looking to gain a foothold in the industry. Songwriter, publisher and \"respected music industry veteran\" Eric Beall said that \"If I were going to spend money on anything when I started out as a songwriter, other than the actual demos, I would put it into tip sheets.\"\nEstablished music tip sheets include \"RowFax\", the MusicRow publication, and SongQuarters." ]
Dress sizes? What do they mean?
[ "Men's sizes are based on measurements. [Women's sizes are based on lies.](_URL_0_)", "Basically you can either: \n\n1. find the dress that fits the widest/biggest part of you and hope that it's not terrible in all the other places. \n\n2. find the dress that fits the widest/biggest part of you and have the rest tailored. \n\nMost people go with option 1 (off the rack) but for things like formal dresses or wedding dresses they'll do option 2. \n\nI sew so I go for option 2.", "I had the same problem! When I was living in the US I shopped online a lot, so I did the following:\n\n1. Buy tape measure from dollar store and measure your 3 sizes.\n2. Go on a page like this: [SAMPLE DRESS PAGE](_URL_1_). Click on the \"size chart\" - usually they will have different size chart for every brand (because, like /u/nwoozie said, sizing is not consistent among brands). Find your closest match. \n\nIf you shop in actual stores, just try on a few. You can also browse online first for a particular brand's sizing. I know a few brands now use this online platform that sizes you (by asking a bunch of questions).", "I just bought a dress from the 60's/70's that says it's a size 11/12 but I'm usually only a size 5/6. Clothing sizes are just numbers that can help you pick up the right item off the shelf. It varies depending on area of the world, brand, and year." ]
[ "EN 13402 EN 13402 Size designation of clothes is a European standard for labelling clothes sizes. It is based on body dimensions, measured in centimetres. It replaces many older national dress-size systems in popular use before the year 2007. Acceptance of this form of standardisation varies from country to country. For example, the Spanish Ministry of Health and Consumer Affairs has commissioned a study to categorise female body types with a view to harmonising Spanish clothing sizes with EN-13402. Few other countries are known to have followed suit. For children's clothing it is the de facto standard in", "Plus-size clothing Plus size clothing is clothing proportioned specifically for people whose bodies are larger than the average person's. The application of the term varies from country to country, and according to which industry the person is involved in.\nAccording to PLUS Model magazine; \"In the fashion industry, plus size is identified as sizes 18 and over, super size as sizes 1X-6X and extended size as 7X and up\". The article continues \"Susan Barone [...] shared, 'Plus sizes are sizes 14W - 24W. Super sizes and extended sizes are used interchangeably for sizes 26W and above. Sometimes the size 26W is", "length in millimeters (e.g., average natural human field of view is a lens with 50 mm focal length for 35 mm film). Clothing Clothing is measured in inches, not centimeters. American shoes sizes are measured on different scales for children, men, and women but all sizes are derived from inches. Major multi-national apparel brands including Nike, Adidas, Hanes, and Levi's often sell the same inventory worldwide, with tags containing both SI and customary units in addition to laundry care symbols and instructions in many languages. Bedding Mattress sizes use non-numeric labels, such as king, queen, full, or twin. These sizes are defined", "states that while a voluntary consensus of sizes exists, there is much confusion to the 'true' size of clothing. As a result, bra measurement can be considered an art and a science. Online shopping and in-person bra shopping experiences may differ because online recommendations are based on averages and in-person shopping can be completely personalized so the shopper may easily try on band sizes above and below her between measured band size. For the woman with a large cup size and a between band size, they may find their cup size is not available in local stores so may have", "is to appear in advertising and runway shows for plus-size labels. Plus-size models are also engaged in work that is not strictly related to selling large-sized clothing, e.g., stock photography and advertising photography for cosmetics, household and pharmaceutical products and sunglasses, footwear and watches. Therefore, plus-size models do not exclusively wear garments marketed as plus-size clothing. This is especially true when participating in fashion editorials for mainstream fashion magazines. Some plus-size models have appeared in runway shows and campaigns for mainstream retailers and designers such as Gucci, Guess, Jean-Paul Gaultier, Levi's and Versace Jeans. Normal-size Also known as the \"in-between\"", "Vanity sizing Vanity sizing, or size inflation, is the phenomenon of ready-to-wear clothing of the same nominal size becoming bigger in physical size over time. This has been documented primarily in the United States and the United Kingdom. US standard clothing sizes are no longer used by manufacturers as the official guidelines for clothing sizes was abandoned in 1983. In the United States, although clothing size standards exist (i.e., ASTM), most companies do not use them any longer.\nSize inconsistency has existed since at least 1937. In Sears's 1937 catalog, a size 14 dress had a bust size of 32", "Plus-size model A plus-size model is an individual of average to larger stature (sometimes but not exclusively overweight or obese) who is engaged primarily in modeling plus-size clothing. Plus-size models also engage in work that is not strictly related to selling large-sized clothing, e.g., stock photography and advertising photography for cosmetics, household and pharmaceutical products and sunglasses, footwear and watches. Therefore, plus-size models do not exclusively wear garments marketed as plus-size clothing. This is especially true when participating in fashion editorials for mainstream fashion magazines.\nSynonymous and interchangeable with plus-size model is \"full-figured model\", \"extended-sizes model\", and \"outsize", "section, but clothes everyone can wear just in different sizes.", "on height. These charts give an indication of size only and are by no means exact as they vary from manufacturer to manufacturer, sometimes by a full inch up and down.", "model\". Previously, the term \"large size model\" was also frequently used. Plus-size industry Fashion designers are starting to look more closely at the earning potential from plus-size clothing, and have used plus-size models for their advertising campaigns and catwalks. Jean-Paul Gaultier and John Galliano both used plus-size models in their Spring 2006 showings in Paris. Gaultier also used plus-size models Marquita Pring and Crystal Renn in his Spring 2011 Ready-to-Wear show. Italian plus-size fashion house Elena Mirò now regularly stages biannual prêt-à-porter shows during Milan Fashion Week. Mark Fast and William Tempest each used plus-size models during", "was Cabiria, featured in the Fashion Law Institute fashion show in the tents at Lincoln Center on September 6, 2013.\nNowadays, the plus-size section doesn't suffer from any restrictions, becoming more welcoming to various types and styles of garments. Moreover, there has been the increasingly positive trend to offer premium flattering fit to the customers. There are companies specializing in larger sizes which offer great fit along with varied ranges of clothing including sweaters, dresses, non-iron work wear shirts, cardigans, bottoms and skirts. Consumer Reports Plus size clothing patterns have traditionally been graded up from a smaller construction pattern, however", "that measurement and the band measurement. The waist is measured at the midpoint between the lower margin of the last palpable rib and the top of the iliac crest. The hips are measured at the largest circumference of the hips and buttocks.\nThe waist is typically smaller than the bust and hips, unless there is a high proportion of body fat distributed around it. How much the bust or hips inflect inward, towards the waist, determines a woman's structural shape. The hourglass shape is present in only about 8% of women. Dimensions A woman's dimensions are often expressed by the circumference", "of the conversation because fashion companies and brands opt to employ the extremes of the spectrum.\nModel Camille Kostek who was on a solo cover of Sports Illustrated Swimsuit Issue in 2019 has stated that she was told by a well-known international modeling agency \"...that it was too bad that I wasn’t a size 10. That plus size is a big market right now and it’s too bad I wasn’t measuring bigger. My size (4/6) is considered an \"in-between size,\" meaning I’m not a straight model nor plus model, I'm right in the middle. Black models The arrival of African American", "Bra size The bra size (also known as brassiere measurement or bust size) is the measure which indicates the size characteristics of a bra. Bra sizes are usually expressed as scales, with a number of systems being in use around the world. The scales take into account the band length and the cup size. From the wearer's point of view, the main measures that are taken into account in determining the best bra fit for the wearer are the measures of the wearer around the torso below the breasts and over the breasts, which defines the band length. For convenience,", "Made-to-measure Made-to-measure (MTM) typically refers to custom clothing that is cut and sewn using a standard-sized base pattern. Suits and sport coats are the most common garments made-to-measure. The fit of a made-to-measure garment is expected to be superior to that of a ready-to-wear garment because made-to-measure garments are constructed to fit each customer individually based on a few body measurements to customize the pre-existing pattern. \nMade-to-measure garments always involve some form of standardization in the pattern and manufacturing, whereas bespoke tailoring is entirely made from scratch based on a customer's specifications with far more attention to minute", "Cathie Jung Cathie Jung (born 1937) is an American Victorian dress and corset enthusiast residing in Manteo, NC, United States. She holds the Guinness World Record for the smallest waist on a living person. Jung, who is 1.72 metres (5.6 ft) tall, has a waist that measures 38.1 centimetres (15.0 in).\nJung appears uncredited, by her own choice, due to the undesirable contents, in the Matthew Barney film Cremaster 2 in the role of Baby Fay La Foe.", "Hired Hands in London, Body Parts Models in Los Angeles, Carmen Hand Model Management in New York and Parts Models in New York. Parts Models is the largest parts agency, representing over 300 parts models. Petite Models Petite models are models that are under the typical height requirements that are expected of fashion models. Petite models typically work more often in commercial, and print modeling (rather than runway modeling)\nThe height of models is typically above 5 feet 9 inches (1.75 m) for women, and above 6 feet 2 inches (1.88 m) for men. Models who are of heights such as 5 feet 5 inches (1.65 m) fall under the", "crotch to the hem of the pant). While the nominal inseam is fairly accurate, the nominal waist may be quite a bit smaller than the actual waist, in US sizes. In 2010, Abram Sauer of Esquire measured several pairs of dress pants with a nominal waist size of 36 at different US retailers and found that actual measurements ranged from 37 to 41 inches. The phenomenon has also been noticed in the United Kingdom, where a 2011 study found misleading labels on more than half of checked items of clothing. In that study, worst offenders understated waist circumferences by 1.5", "designed by Mezco. Their size is 5 inches in scale. They all come with display base and accessories.", "Men's standard sizes were probably developed first during the American Revolutionary War, and they were in regular use by the American army during the War of 1812 for ready-made uniforms (Felsenthal 2012). These were based on the chest measurement, with other measurements being assumed to be either proportional (the circumference of the neck, waist, hips, and thighs) or easily altered (length of the inseam) (Felsenthal 2012).\nAs this was largely successful in men, the same approach was attempted in the early 20th century for women using the bust as the sole measurement (Felsenthal 2012). However, this proved unsuccessful because women's bodies", "models fit the clothing.\nPlus-size models engage in unhealthy habits such as eating salty foods to retain water weight and fluctuating size to please clients. Agents have suggested plastic surgery to some models.\nGerman fashion designer Karl Lagerfeld and other fashion designers have deferred on the use of plus-size models through a lack of interest in the consumers associated with the term plus-size. Lagerfeld in particular has been vocal on the matter of his preferred clientele: \"What I designed was fashion for slender and slim people\" and received criticism for demanding that mass retailer H&M not produce their collaboration designs to size", "brands for plus-size clothing include Plus Size Clothing Co, Maggie T, Autograph (formerly 1626), Free People and City Chic (formerly Big City Chic). There is also a boom in Australian designer independent plus size labels such as Camilla Jayne, Curvy Chic Sports, Hope & Harvest, 17 Sundays, Sonsee, Lowanna Australia, and Harlow. United States Notable women's specialty plus-size clothing retail market include Lane Bryant (ascena Retail Group) and Avenue (Avenue Stores, LLC). ASHLEY STEWART \nWalmart also offers a limited but inexpensive plus-size apparel line. The department stores J. C. Penney, Kohl's and Macy's also offer plus-size apparel. Torrid (Hot Topic)", "was a piece of fine linen cloth around 4 feet wide by 13 or 14 feet long. This was mostly worn pleated as well.\nUntil the mid-Eighteenth Dynasty women wore a tight-fitting sheath dress, a simple garment that falls from just below the breasts to just above the ankles, being held up by two shoulder straps. On statues the straps cover the breasts, but in painting and relief the single breast depicted in profile is exposed. The dress hugs the body with no slack. Also when women are shown in movement, sitting or kneeling, the dress still clings to the outline", "in (180 cm) to 6 ft 2 in (188 cm), a waist of 29–32 in (73.66–81.28 cm) and a chest measurement of 39–40 in (99.06–101.60 cm). Male runway models are notably skinny and well toned.\nMale and female models must also possess clear skin, healthy hair, and attractive facial features. Stringent weight and body proportion guidelines form the selection criteria by which established, and would‑be, models are judged for their placement suitability, on an ongoing basis. There can be some variation regionally, and by market tier, subject to current prevailing trends at any point, in any era, by agents, agencies and end-clients.\nFormerly, the required measurements for models were", "No Size Fits All No Size Fits All: From Mass Marketing to Mass Handselling (ISBN 1591842670) is a 2009 book by Tom Hayes and Michael S. Malone.", "earlier sources, body) indicates the upper part of a dress that was constructed in two parts (i.e., with separate skirt and bodice, such as a ballet tutu), but of matching or coordinating fabric with the intention of wearing the two parts as a unit. In dressmaking, the term waist (sometimes given as \"dress waist\" to distinguish it from a shirtwaist) was also used. During wear, the parts might be connected by hooks and eyes. This construction was standard for fashionable garments from the 18th century until the late 19th century, and had the advantages of allowing a voluminous skirt to", "include plus-size options for their customers. Other brands include, Victoria Beckham who plans to release a range of high-street clothing with sizes up to XXXL in the upcoming months, and Nike who expanded their plus size collection to cater for sizes 1X to 3X. In regards to the criticisms surrounding the term plus-size causing unnecessary labeling, Kmart therefore replaced its numerical sizing with positive tags such as, \"lovely\" and \"fabulous\" instead.\nProtesting against photo retouching is another important aspect towards body positivity, with the most famous example being Aerie's ArieReal campaign. Since 2014, the movement promised to display \"campaign spreads and", "sizes which can meet the needs of customers all over the world.", "model rather than as a \"plus size\" model.\" Fashion design Lawley's swimwear line, designed by Lawley in collaboration with Bond-Eye Swimwear, launched in August 2013. The swimwear was produced in sizes 8 (US) to 18 (US), with plans to extend the size range in the future. Photography Lawley photographed Tara Lynn for Galore Magazine Issue 4. Lawley's photographs of Leah Kelley in her swimwear line went viral on social media and were covered by notable fashion websites. Cooking The success of Lawley's food blog, \"Robyn Lawley Eats\" led to her receiving a contract with Random House to publish a cookbook", "102 cm (40 in) and women have a waist circumference greater than 88 cm (35 in).\nThe waist is usually measured at the smallest circumference of the natural waist, usually just above the belly button. Where the waist is convex rather than concave, as in pregnancy and obesity, the waist may be measured at a vertical level 1 inch above the navel.\nStrictly, the waist circumference is measured at a level midway between the lowest palpable rib and the iliac crest, respectively typically 60% and 64% of total height. It can be predicted as 72% of the neck height; an alternative approximation, very relevant in anthropometry," ]
Why do we use implants for breast enlargement instead of something biological like stomache fat?
[ "Fat is a living tissue. Transplants of living tissue are more expensive and have higher risk of complications. Implants are biologically inert and relatively easy to implant.", "This actually is a thing, but you have to use large amounts of fat as not all of it \"takes\" and has arguably more complication potential than implants (though it also produces ~~better~~ more natural looking results than implants). The Wikipedia page for \"Breast Augmentation\" (won't link because I'm not going to go there on this work computer...) has a rather large section devoted to the method you should check out.", "This is a thing, relicating the fat and 'sculpting' the area youre taking fat from with liposuction, they then sterilize the fat, and reinject it but into the breasts this time. The only issue is that a lot of the time the fat will be reabsorbed and the procedure has to be re-done. No gangreen or completely disgusting affects unless its done improperly/with insterile equipment.", "Might also have to do with the structure of the breast and how the added fat is stored, stomach/thigh fat is used in Brazilian butt lifts (makes bum bigger) so obviously fat transplants can work" ]
[ "created a breast of natural form and appearance; greater verisimilitude than is achieved solely with breast implants. The fat-corrected, breast-implant deformities, were inadequate soft-tissue coverage of the implant(s) and capsular contracture, achieved with subcutaneous fat-grafts that hid the implant-device edges and wrinkles, and decreased the palpability of the underlying breast implant. Furthermore, grafting autologous fat around the breast implant can result in softening the breast capsule. External tissue expansion The successful outcome of fat-graft breast augmentation is enhanced by achieving a pre-expanded recipient site to create the breast-tissue matrix that will receive grafts of autologous adipocyte fat. The recipient site", "additional benefit derived from the liposuction harvesting of the adipocyte tissue injected to the breasts. (see abdominoplasty) Technical limitations When the patient's body has insufficient adipocyte tissue to harvest as injectable breast filler, a combination of fat grafting and breast implants might provide the desired outcome. Although non-surgical breast augmentation with fat graft injections is not associated with implant-related medical complications (filler leakage, deflation, visibility, palpability, capsular contracture), the achievable breast volumes are physically limited; the large-volume, global bust augmentations realised with breast implants are not possible with the method of structural fat grafting. Global breast augmentation contrasts with the", "controlled breast augmentation of fat-graft injection, in the degree of control that the plastic surgeon has in achieving the desired breast contour and volume. The controlled augmentation is realised by infiltrating and diffusing the fat grafts throughout the breast; and it is feather-layered into the adjacent pectoral areas until achieving the desired outcome of breast volume and contour. Nonetheless, the physical fullness-of-breast achieved with injected fat-grafts does not visually translate into the type of buxom fullness achieved with breast implants; hence, patients who had plentiful fat-tissue to harvest attained a maximum breast augmentation of one brassiėre cup-size in one session", "improvement of soft-tissue coverage of breast implants; and for the aesthetic enhancement of the bust. The careful harvesting and centrifugal refinement of the mature adipocyte tissue (injected in small aliquots) allows the transplanted fat tissue to remain viable in the breast, where it provides the anatomical structure and the hemispheric contour that cannot be achieved solely with breast implants or with corrective plastic surgery.\nIn fat-graft breast augmentation procedures, there is the risk that the adipocyte tissue grafted to the breast(s) can undergo necrosis, metastatic calcification, develop cysts, and agglomerate into palpable lumps. Although the cause of metastatic calcification is unknown,", "gluteal implant, which is emplaced under each gluteus maximus muscle; the insertion of the buttock prosthesis is through a midline incision (5–8-cm-wide) over the tailbone (coccyx). Augmentation with a gluteal implant is the method most effective for enlarging the buttocks of the man or of the woman whose body possesses few stores of excess adipose fat in the lower portion of the trunk, the buttocks and thighs, the anatomic regions where the human body usually stores excess body fat. Post-operatively, because of the cutting (incising) into the flesh of the tailbone muscles, the full healing of the augmented tissues can", "reduce the size of the larger breast, or both.\nBreast augmentation surgery generally does not interfere with future ability to breastfeed. Breast reduction surgery more frequently leads to decreased sensation in the nipple-areola complex, and to low milk supply in women who choose to breastfeed. Implants can interfere with mammography (breast x-rays images). General In Christian iconography, some works of art depict women with their breasts in their hands or on a platter, signifying that they died as a martyr by having their breasts severed; one example of this is Saint Agatha of Sicily.\nFemen is a feminist activist group which uses", "Breast enlargement supplement Breast enlargement supplements are frequently portrayed as being a natural means to increase breast size, and with the suggestion that they are free from risk. The popularity of breast enlargement supplements stems from their heavy promotion toward women. Though there has been historical folklore about using herbs for breast enlargement, there is no scientific evidence to support the effectiveness of any breast enlargement supplement. At times, testimonials by companies have been faked. In the United States, both the Federal Trade Commission and the Food and Drug Administration have taken action against the manufacturers of these products", "proportionally smaller. Thus, when a transgender woman opts to have breast augmentation, the implants used tend to be larger than those used by cisgender women.\nIn clinical trials, cisgender women have used stem cells from fat to regrow their breasts after mastectomies. This could someday eliminate the need for implants for transgender women.\nIn transgender women on HRT, as in cisgender women during puberty, breast ducts and Cooper's ligaments develop under the influence of estrogen. Progesterone causes the milk sacs (mammary alveoli) to develop, and with the right stimuli, a transgender woman may lactate. Additionally, HRT often makes the nipples more sensitive", "technique for emplacing an empty breast implant device through a smaller surgical incision. In surgical praxis, after having emplaced the empty breast implants to the implant pockets, the plastic surgeon then filled each device with saline solution, and, because the required insertion-incisions are short and small, the resultant incision-scars will be smaller and shorter than the surgical scars usual to the long incisions required for inserting pre-filled, silicone-gel implants.\nWhen compared to the results achieved with a silicone-gel breast implant, the saline implant can yield acceptable results, of increased breast-size, smoother hemisphere-contour, and realistic texture; yet, it is likelier to cause", "they also contribute to augmenting their busts by gaining weight. Medical complications In every surgical and nonsurgical procedure, the risk of medical complications exists before, during, and after a procedure, and, given the sensitive biological nature of breast tissues (adipocyte, glandular), this is especially true in the case of fat graft breast augmentation. Despite its relative technical simplicity, the injection (grafting) technique for breast augmentation is accompanied by post-procedure complications – fat necrosis, calcification, and sclerotic nodules – which directly influence the technical efficacy of the procedure, and of achieving a successful outcome. The Chinese study Breast Augmentation by Autologous Fat-injection Grafting:", "to reducing cancerous recurrence and to the maximal conservation of breast tissue; yet, radiotherapy of an implant-augmented breast much increases the incidence of medical complications – capsular contracture, infection, extrusion, and poor cosmetic outcome.\nPost-cancer breast reconstruction\nAfter mastectomy, surgical breast reconstruction with autogenous skin flaps and with breast implants can produce subtle deformities and deficiencies resultant from such global breast augmentation, thus the breast reconstruction is incomplete. In which case, fat graft injection can provide the missing coverage and fullness, and might relax the breast capsule. The fat can be injected as either large grafts or as small grafts, as required to", "with feminizing cosmetic surgeries or procedures that modify bone or cartilage structures, typically in the jaw, brow, forehead, nose and cheek areas. These are known as facial feminization surgery or FFS. Breast augmentation Breast augmentation is the enlargement of the breasts. Some trans women choose to undergo this procedure if hormone therapy does not yield satisfactory results. Usually, typical growth for trans women is one to two cup sizes below closely related females such as the mother or sisters. Estrogen is responsible for fat distribution to the breasts, hips and buttocks, while progesterone is responsible for developing the actual milk", "the breast implant. Non-surgical treatments for collagen-fiber capsules include massage, external ultrasonic therapy, leukotriene pathway inhibitors such as zafirlukast (Accolate) or montelukast (Singulair), and pulsed electromagnetic field therapy (PEMFT). Repair and revision surgeries When the woman is unsatisfied with the outcome of the augmentation mammoplasty; or when technical or medical complications occur; or because of the breast implants' limited product life (Class III medical device, in the U.S.), it is likely she might require replacing the breast implants. The common revision surgery indications include major and minor medical complications, capsular contracture, shell rupture, and device deflation. Revision incidence rates were", "capsules, but now is a discouraged technique, because it can rupture the breast implant. Non-surgical treatments for collagen-fiber capsules include massage, external ultrasonic therapy, leukotriene pathway inhibitors such as zafirlukast (Accolate) or montelukast (Singulair), and pulsed electromagnetic field therapy (PEMFT). Repair and revision surgeries When the patient is unsatisfied with the outcome of the augmentation mammoplasty; or when technical or medical complications occur; or because of the breast implants’ limited product life, it is likely she might require replacing the breast implants. Common revision surgery indications include major and minor medical complications, capsular contracture, shell rupture, and device deflation. Revision", "or loss of bone adjacent the implant. The ultimate location of implants is based on both biologic (bone type, vital structures, health) and mechanical factors. Implants placed in thicker, stronger bone like that found in the front part of the bottom jaw have lower failure rates than implants placed in lower density bone, such as the back part of the upper jaw. People who grind their teeth also increase the force on implants and increase the likelihood of failures.\nThe design of implants has to account for a lifetime of real-world use in a person's mouth. Regulators and the dental implant", "and the woman opts not to undergo mastopexy, implants are typically placed above the muscle, to fill out the breast skin and tissue. Submuscular placement can result in deformity. In these cases, the implant appears to be high on the chest, while the natural breast tissue hangs down over the implant.", "first 100 cm³ volume, and approximately 45 minutes for injecting each additional 100 cm³ volume of breast-filler fat. The technique for injecting fat grafts for breast augmentation allows the plastic surgeon great control in sculpting the breasts to the required contour, especially in the correction of tuberous breast deformity. In which case, no fat-graft is emplaced beneath the nipple-areola complex (NAC), and the skin envelope of the breast is selectively expanded (contoured) with subcutaneously emplaced body-fat, immediately beneath the skin. Such controlled contouring selectively increased the proportional volume of the breast in relation to the size of the nipple-areola complex, and thus", "non-implant alternative to further surgery after a breast cancer surgery, be it a lumpectomy or a breast removal – simple (total) mastectomy, radical mastectomy, modified radical mastectomy, skin-sparing mastectomy, and subcutaneous (nipple sparing) mastectomy. The breast is reconstructed by first applying external tissue expansion to the recipient-site tissues (adipose, glandular) to create a breast-tissue matrix that can be injected with autologous fat grafts (adipocyte tissue); the reconstructed breast has a natural form, look, and feel, and is generally sensate throughout and in the nipple-areola complex (NAC). The reconstruction of breasts with fat grafts requires a three-month treatment period – begun after 3–5", "Trans-umbilical breast augmentation History In 1964, the American plastic surgeons T.D. Cronin and F.J. Gerow reported the first breast augmentation procedure using silicone gel-filled implants. In that implantation procedure, the breast implant devices were inserted through an incision to the inframammary fold (IMF), where the breast meets the chest of the woman.\nIn 1972, J. Jenny described a periareolar-incision emplacement technique for inserting the breast implants via an incision under the nipple-areola complex (NAC).\nIn 1973, Koeller described a transaxillary breast implant emplacement technique effected by means of an incision to the axilla.\nIn 1991 the trans-umbilical breast augmentation was invented and first", "the recommended surgical approach, saline breast implants can produce an aesthetic result much like that afforded by silicone breast implants, albeit with greater implant palpability. Silicone gel implants As a medical device technology, there are five generations of silicone breast implant, each defined by common model-manufacturing techniques.\nThe modern prosthetic breast was invented in 1961 by the American plastic surgeons Thomas Cronin and Frank Gerow, and manufactured by the Dow Corning Corporation; in due course, the first augmentation mammoplasty was performed in 1962. First generation The Cronin–Gerow Implant, prosthesis model 1963, was a silicone rubber envelope-sac, shaped like a teardrop, which", "elsewhere in the woman's body. These implants are commonly referred to as \"gummy bear breast implants\" for their firm, pliant consistency, which is similar to gummy candies. The studies Experience with Anatomical Soft Cohesive Silicone gel Prosthesis in Cosmetic and Reconstructive Breast Implant Surgery (2004) and Cohesive Silicone gel Breast Implants in Aesthetic and Reconstructive Breast Surgery (2005) reported low incidence-rates of capsular contracture and of device-shell rupture; and greater rates of improved medical-safety and technical-efficacy than that of early generation breast implant devices. Structured implants Structured implants were approved by the FDA and Health Canada in 2014 as a", "Therefore, before agreeing to any surgery, the plastic surgeon evaluates and considers the woman's mental health to determine if breast implants can positively affect her self-esteem and sexual functioning. Complications The plastic surgical emplacement of breast implant devices, either for breast reconstruction or for aesthetic purpose, presents the same health risks common to surgery, such as adverse reaction to anesthesia, hematoma (post-operative bleeding), late hematoma (post-operative bleeding after 6 months or more), seroma (fluid accumulation), incision-site breakdown (wound infection). Complications specific to breast augmentation include breast pain, altered sensation, impeded breast-feeding function, visible wrinkling, asymmetry, thinning of the breast", "half of the twentieth century, physicians used other substances as breast implant fillers—ivory, glass balls, ground rubber, ox cartilage, Terylene wool, gutta-percha, Dicora, polyethylene chips, Ivalon (polyvinyl alcohol—formaldehyde polymer sponge), a polyethylene sac with Ivalon, polyether foam sponge (Etheron), polyethylene tape (Polystan) strips wound into a ball, polyester (polyurethane foam sponge) Silastic rubber, and teflon-silicone prostheses.\nIn the mid-twentieth century, Morton I. Berson, in 1945, and Jacques Maliniac, in 1950, each performed flap-based breast augmentations by rotating the patient's chest wall tissue into the breast to increase its volume. Furthermore, throughout the 1950s and the 1960s, plastic surgeons used synthetic fillers—including", "weeks of external vacuum expansion of the recipient-site tissues. The autologous breast-filler fat is harvested by liposuction from the patient's body (buttocks, thighs, abdomen), is refined and then is injected (grafted) to the breast-tissue matrices (recipient sites), where the fat will thrive.\nOne method of non-implant breast reconstruction is initiated at the concluding steps of the breast cancer surgery, wherein the oncological surgeon is joined by the reconstructive plastic surgeon, who immediately begins harvesting, refining, and seeding (injecting) fat grafts to the post-mastectomy recipient site. After that initial post-mastectomy fat-graft seeding in the operating room, the patient leaves hospital with a", "synthetic / Chinese).\nSince their introduction in 1989 when an implant made from hydroxyapatite received Food and Drug Administration approval, spherical hydroxyapatite implants have gained widespread popularity as an enucleation implant and was at one point was the most commonly used orbital implant in the United States. The porous nature of this material allows fibrovascular ingrowth throughout the implant and permits insertion of a coupling device (PEG) with reduced risk of inflammation or infection associated with earlier types of exposed integrated implants.\nHydroxyapatite is limited to preformed (stock) spheres (for enucleation) or granules (for building up defects).\nOne main disadvantage of HA is", "with breast implants. The long-term study of 25,000 women, Mortality among Canadian Women with Cosmetic Breast Implants (2006), reported that the \"findings suggest that breast implants do not directly increase mortality in women.\"\nThe study Silicone gel Breast Implant Rupture, Extracapsular Silicone, and Health Status in a Population of Women (2001), reported increased incidences of fibromyalgia among women who suffered extracapsular silicone-gel leakage than among women whose breast implants neither ruptured nor leaked. The study later was criticized as significantly methodologically flawed, and a number of large subsequent follow-up studies have not shown any evidence of a causal device–disease association. After", "submuscular emplacement, the use of breast implants with a textured surface (polyurethane-coated); limited pre-operative handling of the implants, limited contact with the chest skin of the implant pocket before the emplacement of the breast implant, and irrigation of the recipient site with triple-antibiotic solutions.\nThe correction of capsular contracture might require an open capsulotomy (surgical release) of the collagen-fiber capsule, or the removal, and possible replacement, of the breast implant. Furthermore, in treating capsular contracture, the closed capsulotomy (disruption via external manipulation) once was a common maneuver for treating hard capsules, but now is a discouraged technique, because it can rupture", "anatomic models (natural breast) and shaped models (round, tapered) that realistically corresponded with the breast- and body- types of women. The tapered models of breast implant have a uniformly textured surface, which reduces the rotation of the prosthesis within the implant pocket; the round models of breast implant are available in smooth-surface- and textured-surface- types. Fifth generation Since the mid-1990s, the fifth generation of silicone-gel breast implant is made of a high-strength, highly cohesive silicone gel that mostly eliminates the occurrences of filler leakage (“silicone gel bleed”) and of the migration of the silicone filler from the implant pocket to", "multi-perforation cannula used to infiltrate the anaesthetic solution to the breast tissues. A blunt-tip, 4-mm cannula, connected either to a medical-grade vacuum pump or to a syringe, is used to aspirate the adipose fat. The cannula is maneuvered laterally (in fanning movements), beginning in the deep plane of the breast and concluding in the superficial plane of the breast; the adipose fat sucked from the breast is a yellow, fatty, bloodless fluid; the liposuction concludes upon drawing the required volume of fat, or when the fat becomes bloody.\nAfter the liposuction, the superficial layer of adipose fat is undermined with a", "intact and the implant only partially deflates, allowing for ease of explant and replacement. Implants and mammography The presence of radiologically opaque breast implants (either saline or silicone) might interfere with the radiographic sensitivity of the mammograph, that is, the image might not show any tumor(s) present. In this case, an Eklund view mammogram is required to ascertain either the presence or the absence of a cancerous tumor, wherein the breast implant is manually displaced against the chest wall and the breast is pulled forward, so that the mammograph can visualize a greater volume of the internal tissues; nonetheless," ]
Why does the svartifoss waterfall cliff have squares
[ "It looks like [basalt pillars](_URL_0_) erroded from the bottom. Basalt, due to the crystalline structure or something like that, naturally forms these shapes.", "According to the paragraph under the picture, they are hexagons, but I agree they look square. Anyway, if you use Ameoba's idea of the natural basalt crystals, plus that paragraph, which talks about repeated heat and cooling, it's a pretty good explanation." ]
[ "cliffs are merely surficial features due to exfoliation. The dark streaks indicate the paths followed by the ribbon cascades which descend from the upland in the spring, when the snow is melting, and from which the cliffs take their name. There are two wide, relatively short yet quite deep arches at the bottom of the cliff. The Quarter Domes The Quarter Domes are granodiorite domes rising between Half Dome and Clouds Rest. They comprise two domes, West Quarter Dome and East Quarter Dome. The higher of the two is East Quarter Dome, at 8,318 feet (2,535 m); West Quarter Dome stands", "when the Whin Sill was molten 295 million years ago. The wearing away of rock means that the waterfall is slowly moving upstream, leaving a narrow, deep gorge in front of it. The length of the gorge is currently about 700 metres. The bedload (rocks that the river is carrying) is mainly composed of large boulders, which are rolled along the river bed. Upstream of the waterfall, the river is narrow; downstream, it widens and meanders. Relative height Despite popular belief that it is the highest waterfall in England, at 71 feet (22 m), others have a longer fall: Cautley Spout,", "has a total drop of 350 feet (110 m). While impressive in its height, it is seasonal and often appears as only a water stain on the cliff. The falls faces to the south-southwest and has a crest that is one foot (300 mm) wide.\nThe bedrock exposed in the gorge is Devonian in age, mostly shales, with some layers of limestone and sandstone. The rock was laid down in an ancient inland sea, and it holds many marine fossils. The landform of the section of the Genesee River valley represented by the park is geologically very young, caused by a diversion", "of chalk and are steep, with grassland and a footpath above. The footpath runs close to the cliff edge and is steeply undulating. Despite the steepness, it is popular for walks and the scenery is spectacular.\nBetween Swyre Head and the natural rock arch of Durdle Door is a small dry valley known as Scratchy Bottom.", "20 metres. The upper falls are the longest and the most difficult of the sections and the protruding outcrop can be passed on either side. The final 20 metre section is a less steep part of the Force at its very highest point, which leads on to Buttermere Moss.\nThe falls are along the way of the \"Wainwright Memorial Walk,\" a 102-mile walk devised by famed British fellwalker and writer Alfred Wainwright in his Pictorial Guide to the Lakeland Fells, and are included in numerous British walking tours and guides.", "Horizontal Falls The Horizontal Falls or Horizontal Waterfalls (nicknamed the \"Horries\") is the name given to a natural phenomenon on the coast of the Kimberley region in Western Australia.\nThe Horizontal Falls have been described by naturalist David Attenborough as \"one of the greatest wonders of the natural world\". They are formed from a break in-between the McLarty Ranges, reaching up to 25m in width. The natural phenomenon is created as seawater builds up faster on one side of the gaps than the other, creating a waterfall up to 5m high on a spring tide. Within each change of the tide,", "Curry She Mountain. Among the gorge's more notable landmarks is an area known as \"The Sinks.\" The Sinks is where the river flows over a ten-foot (three meters) waterfall into a large pool, and then seems to disappear for a small distance. (Unlike streams in a limestone area, which may actually \"sink\" for a considerable distance, this is more a question of appearance than of the stream truly \"sinking\", which is not feasible in this area of ancient Precambrian metamorphic rock.) Below the Sinks, Little River is navigable in high water with a canoe or kayak.\nContinuing to", "Slight Side Topography When viewed from the valley of Eskdale the fell is seen as a distinct peak but in reality it is just the terminal point on Scafell’s southern ridge before it descends steeply to Eskdale. It only has 14 metres of topographic prominence between itself and Scafell (the col is at 748 metres) and therefore narrowly fails to qualify as a Nuttall hill or a Hewitt and it is left to Alfred Wainwright to give Slight Side the status of a separate fell in his Pictorial Guide to the Lakeland Fells.\nSlight Side is steep and craggy on", "small basins occur where the flow is fast, but the water shallower, such as near the edge of a waterfall. The stone substrate is made of fossiliferous limestone in these photographs.", "past, accumulating piles of glacial drift caused Buttermilk Creek to alter its course and flow over a series of cliffs as a waterfall. The total height of the cliffs is 155 feet (47 m) and they consist of sandstone of the Catskill Formation. The falls, which are known as Buttermilk Falls, are a series of low waterfalls that are an \"excellent example of the type\" and \"the most outstanding example of this kind of waterfall system in Pennsylvania\". Each individual waterfall ranges in height from 10 to 35 feet (3.0 to 10.7 m). The falls are located 0.3 miles (0.48 km) upstream of", "to the receding ice front, producing waterfalls when they dropped over north-south ridges.\"\nThe 180 feet (55 m) relief of the fossil waterfall at Clark Reservation is somewhat larger than that of Niagara Falls (174 feet (53 m)). As at Niagara Falls, the well defined falls occurred because of the presence of a capstone layer of limestone that was resistant to erosion by the flowing river.\nRoseberry writes that this \"limestone is deeply waterworn and fissured, mutely telling the force of the deluge which hurled itself over the brink.\" The limestone shelf leading to the precipice at Clark Reservation is an example of a", "water levels are low enough, erratics are visible in the stream . Steep cliff faces and flat valley floor seen from Mother Walker Falls are characteristic of glacial erosion. However, responsibility for gorge formation is debated; “they may have formed while the ice sheet retreated north of the region and contributed a large quantity of meltwater, or more likely, they formed while the ice sheet covered the area and the subglacial water was under very high pressure” . Whether a particular landform was created by local glacier or continental ice sheet is also still debated. Many pegmatite vein intrusions are", "views of the surrounding region. The cliff has an overhang, but has been climbed many times. Sometimes a circular rainbow (the Brocken spectre phenomenon) can be seen from this point. It can be seen only when there is a bit of mist in the valley, and the sun is right behind the person facing the valley. One phenomenon that can be observed at this place is the vertical cloud burst, in which the clouds nearing the cliff get sucked into the pit fall area below and are thrown vertically into the sky reaching more than 50 feet (15 m), creating the", "actual base of the waterfall being out of reach. Nordby said, \"I eventually lowered down a shot—a ton of reference of the area because I knew we'd have to do some digi-matte work to recreate the basin that the whirlpool ends up in.\" They soon realized that there was an insufficient amount of churning and foam to read as real as the location. The CG Supervisor, Pete Dionne, presented a different idea. \"He grabbed chunks of that river and tialing it so that it had a nice stretch of birds' eye point of view of the water that existed on", "Great Mell Fell Topography Great Mell Fell is an isolated hill which rises abruptly from a wide expanse of marshy lowland to a height of 537 m. The fell has smooth, rounded outlines with no crags. Rock is represented only by a number of large erratic boulders, mainly on the north slopes, but also by the Cloven Stone near a barn to the south of the fell.\nThe hill is triangular in plan (indeed, it is almost the shape of a broad arrow-head) with the apex pointing west, down the steep \"nose\" of the fell, and with the gentler, broader eastern slopes", "Hill figure A hill figure is a large visual representation created by cutting into a steep hillside and revealing the underlying geology. It is a type of geoglyph usually designed to be seen from afar rather than above. In some cases trenches are dug and rubble made from material brighter than the natural bedrock is placed into them. The new material is often chalk, a soft and white form of limestone, leading to the alternative name of chalk figure for this form of art.\nHill figures cut in grass are a phenomenon especially seen in England, where examples include the Cerne", "of fortification, the term \"profile\" means the form of a defensive structure when viewed as a cross section in the vertical plane. The Twydall Profile consists of a simple earthen rampart, built as low as possible; between 10 and 15 feet (3 and 4.5 metres) and not greater than 20 feet (6 metres) was recommended. From the crest of the rampart continuous gentle slope, ideally of a gradient of 1 in 10, falling to 15 or 20 feet (4.5 or 6 metres) below the original surface of the ground. At the foot of the slope is an unclimbable palisade made", "Downland Formation Downland is formed when chalk formations are raised above the surrounding rocks. The chalk slowly erodes to form characteristic rolling hills and valleys. As the Cretaceous chalk layer in southern England is typically tilted, chalk downland formations often have a marked scarp slope on one side, which is very steep, and a dip slope on the other, which is much shallower. Where the downs meet the sea, characteristic white chalk cliffs form, such as the White Cliffs of Dover and Beachy Head. Hydrology Chalk deposits are very porous, so the height of the water table in chalk", "slope levels out at 1,500 ft to accommodate Buttermere Moss, in Wainwright’s words “ a wide marshy depression from which water cannot escape except by being carried away in the boots of pedestrians.” At the head of the lower slope is the subsidiary top of High Snockrigg (1,725 ft), a fine viewpoint for the Buttermere valley. On the south western rim of the Moss is Goat Crag, overlooking Buttermere lake.\nTo the south of Robinson are Gatesgarthdale Beck and the road up Honister Pass. This side of the fell presents a long and mainly featureless slope, although near the summit are the Hackney", "Trolltunga Geology of Trolltunga The cliff is part of the Precambrian bedrock and was formed during the Ice Age, approximately 10,000 years ago, when the edges of the glacier reached the cliff. The water from the glacier froze in the crevices of the mountain and eventually broke off large, angular blocks, which were later carried away with the glacier. Along the cliff itself, a gneiss, there continues to be deep cracks. The trail to Trolltunga also passes through the bedrock and washed slippery hillsides in the background also containing gneiss. Getting to Trolltunga Trolltunga is located 17 kilometres from city", "Pistyll Rhaeadr Description Pistyll Rhaeadr is formed by the Afon Disgynfa falling, in three stages, over a 240-foot (73 m) Silurian cliff-face, below which the river is known as the Afon Rhaeadr. The tallest stage is estimated at about 40 metres. It is counted as one of the Seven Wonders of Wales and is a Site of Special Scientific Interest. The 19th century author George Borrow, in his book Wild Wales, remarked of the waterfall: \"What shall I liken it to? I scarcely know, unless it is to an immense skein of silk agitated and disturbed by tempestuous blasts, or to", "of the fell, in excess of a mile square, is soft, peaty and drab. The exception is the ridge itself, which is considerably wetter. A fence runs along the ridge, a useful guide in mist and occasionally necessary for bog bouncing. The summit is set on a small rock platform with an Ordnance Survey column. A rocky knoll (called Man) stands on the other side of the fence. The views are extensive due to the central location and a lack of higher neighbours. The Helvellyn range is seen end to end, together with a panorama of high fells on the", "cliff and partly lined with blocks of sandstone. It dates from the early 19th century or before. Its base measures around 6m square and it is 4m high. On the floor are stone flags and the ceiling slopes to a central ridge. To its right is a shallow partly natural cave. The structure is a Grade II listed building. It has been described variously as a \"stone parlour\", a grotto, or King James' Parlour.", "Register Cliff Geology Register Cliff is a soft, chalky, limestone wall rising more than 100 feet (30 m) above the North Platte River. It consists of The horizontal layers of sedimentary rocks eroded by the river. Level grass plains run from the cliff to the river. Primary erosion was by water and the continuing effects of wind and rain have little changed its features.", "Scree Scree is a collection of broken rock fragments at the base of crags, mountain cliffs, volcanoes or valley shoulders that has accumulated through periodic rockfall from adjacent cliff faces. Landforms associated with these materials are often called talus deposits. Talus deposits typically have a concave upwards form, while the maximum inclination corresponds to the angle of repose of the mean debris size.\nThe term scree comes from the Old Norse term for landslide, skriða, while the term talus is a French word meaning a slope or embankment.", "A rocky prominence near the center of the Falls divides its waters into a distinctive formation, rendering its images instantly recognizable. In winter, the Falls often ice over completely. A broad trail descends about 320 feet (98 m) from the Falls parking lot to a wooden walkway and overlook, while a much steeper trail extends beyond to the basin below the Falls. On the opposite (east) side of the river, a longer trail (\"Gentle Trail\") also accesses the Falls from a higher vantage point. Other park trails and falls A nature trail (wheelchair-accessible) near the park lodge leads to the more", "is more than three-fourths revealed by the tide and lies perpendicular to the coast. What is most remarkable about this landmark is its proportions. While the cliff is only a little more than one metre thick, its height is about 25 m and its length about 20. Thus, the form of the cliff is described as resembling the outline of a quadrangular sail.\nAn opening of unclear origin is located in the sail, approximatively 2.5 metres above the ground. Many guides state that the formation was a defence against mountain artillery during the Caucasian War. However, this version of the origin of the", "Steilhang A Steilhang (pl: Steilhänge) is a geoscientific term for a steep mountainside or hillside (or a part thereof), the average slope of which is greater than 1:2 or 30°. Leser defines a steilhang as a mountainside with an incline of between 16° and 60°, slopes of between 30° and 60° being described as \"very steep\" (übersteil) and anything over 60° being a rock face (wand).\nThe term is German for \"steep slope/mountainside/hillside\", \"escarpment\" or \"steep face\". The word hang in this compound is derived from hängen, \"to hang\". Also compare the British English word hanger (from Old English hangra) for", "of a slice of the hillside that has been separated from the main slope. This has created a narrow chasm up to 10 metres (33 ft) high and about 100 metres (330 ft) in length through which visitors can walk. It has commonly been explained as result of glacial plucking, but more recent research indicates that a translational landslide was the cause. During an ice age, a glacier slowly undermined the crag, opening up cracks in the rock and causing this chasm to form.\nThe etymology of the Whangie's name is obscure but it might derive from the old Scots for slice (as", "The long graceful curve of the top is set above a wall of crag half a mile long, the whole face being neatly symmetrical. A series of vertical gullies slice through the crags, which together with the intervening ridges provide sport for scramblers and climbers. The crags peter out at about 550 m (1,800 ft), to be replaced by a steep scree slope falling to the valley floor, a further 250 m (800 ft) below. Fine views of this face can be had from Helvellyn and Birkhouse Moor across the valley.\nTo the south-east of the fell is the valley of Deepdale, separating St Sunday" ]
How to catch up/develop a well informed opinion on world news and politics?
[ "Personally, I like Christian Science Monitor (even though I'm an atheist. They do good reporting) and The Economist. The BBC is also good for factual stories on world events.", "Not sure this is exactly the right subreddit to ask this question, but I would advise the most important thing is to read from a *variety* of sources. There are a number of places I personally get my news from, but you should also be aware of their political bent. \n\nThe New York Times for an example, is great and all for US politics. It's very liberal, but a lot of world events gets plopped into \"World Briefing\" and don't get full articles. \n\nThe Wall Street Journal has a conversative bent. They're similarly awesome and reputable to the NYT. \n\nThe Economist is a great weekly British magazine. You can get a lot of non-US world news exposure there. Their articles are more obviously opinionated (they tend to be center-rightish and have this intense hate for Cristina Kirchner), but they're very well-written. \n\nSlate and The Nation are both really leftist. Everything's an opinion piece.", "Seconding what's already been said. Variety is key. \n\n- Christian Science Monitor has good international reporting, mainly because they still have bureaus where most other US newspapers have downsized (or so I've heard). \n- I try to read both The Guardian and The Times of London to get a varied British perspective (Guardian on the left and Times on the right). BBC is good for getting quick headlines, but doesn't quite match up depth-wise. \n- Al-Jazeera catches flak from the Middle East for being anti-Arab and from the U.S. for being anti-American, but their coverage of the Arab Spring was better than anywhere else, so I read it pretty regularly.\n- Finally, if you're interested in military/defense and politics, [Small Wars Journal's daily Roundup] (_URL_0_) is a great source for quick headlines from a variety of sources.", "[The Atlantic](_URL_1_) is (in my opinion) very sophisticated yet unbiased. Especially the regular columnists." ]
[ "from research centres, universities and think tanks – material that is intended to give readers access to news and opinion that they will not find in their local newspapers but which they might wish to read “as citizens who care about a world free from the pernicious effects of today’s globalisation”.\nOther News also distributes daily analysis on international issues, particularly the themes of global governance and multilateralism, to several thousand policy-makers and leaders of civil society, in both English and Spanish. Communication initiatives An internationally renowned expert in communications issues, Roberto Savio has helped launched numerous communication and information projects,", "sent to papers of all manner of politics, and the editors say they are able to make their own comments upon the facts which are sent to them. I therefore confine myself to what I consider legitimate news. I do not act as a politician belonging to any school, but try to be truthful and impartial. My dispatches are merely dry matter of fact and detail.\nBut into the first decade of the twentieth century, it was uncommon for to see a sharp divide between facts and values. However, during World War I, scholar Stuart Allan (1997) suggests", "status, it must be supported by at least some of key decision makers as they act as guardians of the formal agenda. They also asserted that certain personages in the media can act as opinion leaders and bring media coverage to a particular issue. Government-affiliated news sources have higher success rates in becoming media agenda and have been found by a number of scholars to be the most frequently appearing of sources at the local, state, and national levels.\nNews sources can also provide definitions of issues, thus determining the terms of future discussion and framing problems in particular ways.", "simplifies the transmission of news items about them. Usually they have the effect of increasing the perceived unity of all parties involved, which include the broadcasters and audience. Today, international events such as a national declaration of independence, can be scripted in advance with the major news agencies, with staff specially deployed to key locations worldwide in advance of the life news broadcast. Public relations companies can participate in these events as well.\nThe perception that an ongoing crisis is taking place further increases the significance of live news. People rely on the news and constantly seek more of it, to", "to collaborators, which generates greater contact between journalists and their audience. Audiences are able to access information via more than one platforms as well as comprehending news information in detail. In addition, multiple discussion forums provided by journalism, such as the online comment area under each news report, enabling direct communication between readers and journalists.\nToday's information culture embedded in the computer-mediated news production also leads transformation in the news habit of individuals. Firstly, the ways of how people understanding the news event and perceiving the world are shaped by images and video, no longer depending on texts. Evidently, As Stephens", "common scholarly frame for understanding news production is to examine the role of information gatekeepers: to ask why and how certain narratives make their way from news producers to news consumers. Obvious gatekeepers include journalists, news agency staff, and wire editors of newspapers. Ideology, personal preferences, source of news, and length of a story are among the many considerations which influence gatekeepers. Although social media have changed the structure of news dissemination, gatekeeper effects may continue due to the role of a few central nodes in the social network.\nNew factors have emerged in internet-era newsrooms. One issue is \"click-thinking\", the", "everyday situations. Influence The content and style of news delivery certainly have effects on the general public, with the magnitude and precise nature of these effects being tough to determine experimentally. In Western societies, television viewing has been so ubiquitous that its total effect on psychology and culture leave few alternatives for comparison.\nNews is the leading source of knowledge about global affairs for people around the world. According to agenda-setting theory, the general public will identify as its priorities those issues which are highlighted on the news. The agenda-setting model has been well-supported by research, which indicate that the public's", "it is and we need to do that more than ever now.\nIn January 2019, at Bournemouth University, she warned postgraduate journalism students that confirming information and verifying news sources were critical in this climate of fake news. She stressed the importance of personally verifying news sources. \"Getting your person there is an absolutely standard lesson ... news is not news without verification. ...If you only have the station cat to send, send them!\" In popular culture Adie's role as a BBC television journalist covering the 1980 Iranian Embassy siege in Princes Gate, central London, is included in 6 Days. The", "academic materials from others through social media. Massive amounts of data from social platforms allows scientists and machine learning researchers to extract insights and build product features. Using social media can help to shape patterns of deception in resumes. As a news source In the United States, 81% of look online for news of the weather, first and foremost, with the percentage seeking national news at 73%, 52% for sports news, and 41% for entertainment or celebrity news. According to CNN, in 2010 75% of people got their news forwarded through e-mail or social media posts, whereas 37% of people", "the heart of each interview is a focus on individuals and ideas that make a difference. Conceived in 1982 by Kreisler as a way to capture and preserve through conversation and technology the intellectual ferment of our times, Conversations with History includes over 590 interviews. The interviews are organized by name of guest, topic, Conversations with History or year of conversation.\nA collection of his interviews, Political Awakenings: Conversations with History, was published by the New Press in 2011. Conversations with History was a pioneer in using the internet to make an important contribution to public education on issues as", "frequently learn about science and more specifically issues such as climate change from the mass media. \nThere is perceived to be a trend within much of the world’s media that a traditional commitment to report the full facts is and has given way to a more obvious, less reliable tendency to concentrate coverage on interpretations of the facts. This so-called ‘spin’ is reported by the world’s press under a combination of commercial and political pressure. This can be dangerous as it ‘fills’ the knowledge deficit and the unsuspecting public with sometimes unreliable, agenda promoting information. The subjects of anthropogenic global", "who blog about news issues ranges from 1–5%. Greater percentages use social media to comment on news, with participation ranging from 8% in Germany to 38% in Brazil. But online news users are most likely to just talk about online news with friends offline or use social media to share stories without creating content.\nThe rapid propagation of information on social media, spread by word of mouth, can impact the perception of political figures quickly with information that may or may not be true. When political information is propagated in this manner on purpose, the spread of information on social media", "informing U.S. policymakers and the public of developments in these countries.\nTIMEP seeks to focus on emerging democracies and areas of conflict in the Middle East and North Africa with the aim of understanding society, political life, and the economy from a nuanced, comprehensive perspective. The world has celebrated the rising stars of the \"Arab Spring\" revolutions and appreciated their contributions to bringing about change, but many others remain unrecognized, their grievances marginalized or ignored. The analyses provided by TIMEP will particularly aim to connect those outside the region with local knowledge and perspectives and contribute significantly to the national dialogue", "Global news flow Global news flow (also referred to as international news flow) is a field of study that deals with the news coverage of events in foreign countries. It describes and explains the flow of news from one country to another.\nStudies on global news flow typically attempt to understand why certain countries are more newsworthy than others.. Along the years it has been found that the economic power of countries plays a particularly crucial role in their news prominence as well as the presence of international news agencies. Thus, the US has been found to be very prominent in", "ongoing media coverage on a particular conflict, international incident, or diplomatic initiative, the news cycle effectively demands political attention, as governing politicians attempt to demonstrate that they are \"on top of\" current issues. The effect has been, according to Margaret Belknap, that \"[t]he advent of real time news coverage has led to immediate public awareness and scrutiny of strategic decisions and military operations as they unfold\". Deeper penetration and wider broadcast of statements and actions by public figures may increase transparency, but it can also complicate sensitive diplomatic relationships between states or force an official reaction from governments that would", "International Reporting Project History of the Project The International Reporting Project (IRP) provides opportunities to journalists to go overseas to do international reporting on critical issues that are under covered in the U.S. news media. The program was created in 1998 by John Schidlovsky, a veteran journalist and former foreign correspondent for The Baltimore Sun in China and India. The program's early founding made it a pioneer in the “non-profit journalism” movement that seeks to fill the gap left by much of the mainstream media’s reduction of international news. The IRP has provided opportunities to more than 600 journalists to", "nation's political reality; they provide the political information that will be regarded as fact and indicate to viewers how much importance to attach to each topic according to how much air time they dedicate to a given issue and the emphasis they place on it. For example, television news is able to offer cues on topic salience by deciding what the opening story on the newscast will be or by altering the length of time devoted a story. When these cues are repeated broadcast after broadcast, day after day, they may be able to effectively communicate the amount of importance", "are experts in academia, have leading roles in business or are involved in politics. Topics The key goal of this event is for all parties to actively seek debate on relevant, contemporary and pressing issues. Consequently, these discussions should enhance students' contextual appreciation of current events as well as share speakers' accumulated knowledge. Greater understanding of the present is the link, which leads to creative farsighted and visionary thinking for our future. It is the responsibility of the world leaders to guide and contribute their insight to the new generation.", "half-hour documentaries providing background information and analyses and debate on issues of concern to US foreign policy-makers. The show was narrated by Walter Cronkite. Former guests include Secretary-General of the United Nations Ban Ki-moon, Desmond Tutu, Jimmy Carter, and Madeleine Albright. Foreignpolicyblogs.com Launched in 2007 as part of the \"Great Decision\" Program, the \"Foreign Policy Blogs\" network is a network of global affairs commentary \"blogs\" comprising nearly 50 blogs on a wide variety of global issues ranging from US foreign policy to global feature films/movies. With the \"Foreign Policy Blogs\" network, the Foreign Policy Association brings to the public, discussion", "News Department: with a network of the 63 bureaus in cities and provinces nationwide, the department updates daily current events covering politics, diplomacy, socio-culture, science-technology and the environment, particularly the Party and State's guidelines and policies. It is also responsible for correcting wrongful information in the public domain.\n•Domestic news (continuously updated on the web portal news.vnanet.vn)\n•Internal reference report (breaking domestic events and issues of concern)\nWorld News Department: together with a system of the 30 news bureaus in the five continents around the world, it uploads daily world and regional news in line with the Party and State's official stance on", "Although deciding what story to tell (gate-keeping) is the first step in all news reporting, the press takes a second step when determining how much attention to give to the story (agenda-setting), and a third step when they determine how to tell the story (agenda-extension). Press Bias and Politics In his 2002 book Press Bias and Politics: How the Media Frame Controversial Issues Kuypers comparatively analyzed the speeches of five public figures, ranging from ministers to presidents from 1995 to 2000. He examined approximately 700 press reports on controversial issues that were published in 116 different newspapers. He reports finding", "Ina offers magazines on \"the news seen through a historical eye\".\nFrance Info thus becomes a global public-service news offering that brings together radio and television and makes use of the experience of the public service as a whole in terms of information.\nThis is the first major collaboration between public radio and television since 1975; at that time time France Inter supplied the footage in the bulletins of the 3ᵉ chaîne couleur de l'ORTF (now France 3).", "very nature conversations, having grown out of coffee houses and taverns,\" he said. So the way conversations get created in a digital society will be used to convert news into trades, as well, Passarella said.\n\"There is a real interest in moving the process of interpreting news from the humans to the machines\" says Kirsti Suutari, global business manager of algorithmic trading at Reuters. \"More of our customers are finding ways to use news content to make money.\"\nAn example of the importance of news reporting speed to algorithmic traders was an advertising campaign by Dow Jones (appearances included page W15 of", "FactCheck.org. Factcheck.org monitors the factual accuracy of what is said by major U.S. political players in the form of TV ads, debates, speeches, interviews and news releases.\nThe Annenberg School for Communication at the University of Pennsylvania: The Annenberg School for Communication at the University of Pennsylvania offers students a firm grounding in various approaches to the study of communication and its methods, drawn from both the humanities and the social sciences.\nThe Annenberg School for Communication and Journalism of the University of Southern California: The Annenberg School for Communication & Journalism fosters dynamic synergies and multidisciplinary approaches to the study of", "to nutritional labels that consortium partners can use to \"provide clarity on who and what is behind a news story so that people can easily assess whether it comes from a credible source.\" In the Knight Commission's 2019 report \"Crisis in Democracy: Renewing Trust in America\", the authors not that \"[w]hile many news organizations have experimented with transparency initiatives, there are no standard best practices recognized across the industry.\" They recommended that U.S. news media leaders and an ongoing working group of experts from across the industry could identify and adopt common standards and best practices that promote transparency\" by", "that members of the public seek out science information that is entertaining, but also helping citizens to critically participate in risk regulation and S&T governance. Therefore it is important to bear this aspect in mind when communicating scientific information to the public (for example, through events combining science communication and comedy, such as Festival of the Spoken Nerd, or during scientific controversies). The advantages of this approach are that it is more personal and allows scientists to interact with the public, allowing for two-way dialogue. Scientists are also better able to control content using this method. Disadvantages of this method", "The Real News History Influenced by events such as the 2000 US presidential election, 9/11, the invasion of Iraq, and Hurricane Katrina, Jay felt that there needed to be a news network capable of making complicated concepts accessible to the average person. Jay and crew officially opened shop in Toronto in September 2007. The Real News does not accept funding from advertising, governments, or corporations. During TRNN's development stage, Jay reported turning down $50,000 in funding from the Canadian government. Though the organization initially intended to sustain itself exclusively on viewer donations after its first three years of broadcast, it", "World News Connection World News Connection was a compilation of current international news translated into the English language. The United States Department of Commerce National Technical Information Service compiled and distributed it from non-U.S. media sources, usually within 24–72 hours from the time of the original publication or broadcast.\nIt provided the full text of newspaper articles, television and radio broadcasts, online sources, conference proceedings, periodicals, and non-classified technical reports. This information was collected and translated to aid decision makers at the highest levels of the executive and legislative branches of the U.S. Government who needed to know what was happening", "resource. Anytime we can talk about issues, whether we're doing an interview on the radio, filming a documentary or using radio to make a presentation to policy makers, I think that we tell the story in a much more compelling way and I think many more people will hear it. I think that most of my goals will focus on media work.\"", "information that is high quality (well written or presented), as it will have been produced by professional journalists. Traditional journalism is often also responsible for setting agendas and having an impact on government policy. The traditional journalistic method of communication is one-way, so there can be no dialogue with the public, and science stories can often be reduced in scope so that there is a limited focus for a mainstream audience, who may not be able to comprehend the bigger picture from a scientific perspective. However, there is new research now available on the role of newspapers and television channels" ]
The political structure of Bosnia and Herzegovina
[ "Bosnia and Herzegovina consists of two \"entities\", Republika Srpska and the Federation of Bosnia and Herzegovina.\n\nThe borders between these two are more or less defined by the territory the opposing forces of the Bosnian war held.\n\nThe two entities are mostly autonomous, but they are both represented internationally by the government of Bosnia and Herzegovina (this is distinct from the *Federation* of Bosnia and Herzegovina). There is one citizenship, and people are free to travel between the two entities.\n\nThere is also the Brčko District which is an area which is shared by the two entities.\n\nThe Federation of Bosnia and Herzegovina is further split up into cantons which govern themselves to some degree.", "Well, BiH has 3 presidents, one for each ethnic group. The Dayton Accords really aims at equal, power sharing among Bosnian Serbs, Croats, and Muslims, but the framework created at Dayton has proven to be pretty divisive. Also, interestingly, the highest political power in the Bosnia is called the High Representative, also stipulated by the Dayton framework. The High Representative's job is to implement the peace plan, apparently. But the High Representative isn't actually representative of the Bosnian people as the job has only gone to diplomats and politicians from other countries, namely EU countries, and they don't have to answer to any elected official within Bosnia, itself." ]
[ "displaced. Post-war Bosnia and Herzegovina (1995–present) Since its 1992 independence and the 1995 Constitutional framework of the Dayton Agreement, Bosnia and Herzegovina has followed a path of state-building, while remaining under final international supervision through the figure of the High Representative for Bosnia and Herzegovina. Bosnia and Herzegovina is a federation of two Entities - the Federation of Bosnia and Herzegovina and the Republika Srpska, as well as the district of Brčko. Each of the Entities has its own Constitution and extensive legislative powers.\nBosnia and Herzegovina is a potential candidate country for accession into the EU; the EU-BiH Stabilization and", "Political divisions of Bosnia and Herzegovina Overview The Federation and the RS governments are charged with overseeing internal functions. Each has its own government, flag and coat of arms, president, parliament (FBiH) and assembly (RS), police force, customs, and postal system. The police sectors are overseen by the state-level ministry of safety affairs. Since 2005, Bosnia and Herzegovina has one set of Armed forces.\nInter-entity borders are not determined on natural geographical features of the region. Its borders were postulated as part of the political agreement that was based on ethnic division and are used to determine the extents of political", "regional balance in and around the former Yugoslavia (Article V, annex 1-B), thus in a regional perspective.\nThe present political divisions of Bosnia and Herzegovina and its structure of government were agreed upon, as part the constitution that makes up Annex 4 of the General Framework Agreement concluded at Dayton. A key component of this was the delineation of the Inter-Entity Boundary Line to which many of the tasks listed in the Annexes referred.\nThe State of Bosnia Herzegovina was set as of the Federation of Bosnia-Herzegovina and of the Republika Srpska. Bosnia and Herzegovina is a complete state, as opposed to", "the following: \nArticle V.4 of the Constitution of Bosnia and Herzegovina defines the Council of Ministers of Bosnia and Herzegovina, which is composed of the Chair of the Council of Ministers and a certain number of ministers as may be appropriate, who are responsible for the implementation of the policy and the decisions of Bosnia and Herzegovina from within the competencies of the institutions of Bosnia and Herzegovina; the Presidency of Bosnia and Herzegovina appoints the Chair of the Council of Ministers of Bosnia and Herzegovina, who assumes the office upon the approval by the House of Representatives of the", "parts of Bosnia and Herzegovina. State level Croats of Bosnia and Herzegovina, as well as other two constitutive nations, have their representative in the Presidency of Bosnia and Herzegovina. Presidency has three members, one Bosniak, one Croat and one Serb. Bosniak and Croat are elected in the Federation of Bosnia and Herzegovina, while Serb is elected in the Republika Srpska.\nCurrent Croat member of the Presidency is Željko Komšić of the DF.\nThe Parliamentary Assembly of Bosnia and Herzegovina has two chambers, House of Representatives and House of Peoples. House of Peoples has 15 members, five Bosniaks, five Croats and five Serbs.", "and Herzegovina until 1908, when Austria-Hungary provoked the Bosnian crisis formally annexing it. Regional identity Within Bosnia and Herzegovina, the region of Bosnia has a traditional regional identity, distinctive from the regional identity of the neighboring Herzegovina. Bosnian regional identity was attested as early as the 10th century, when Constantin VII Porphyrogenetos referred to Bosnia as a particular region. Development of Bosnia's regional identity continued throughout the Middle Ages, and it was also acknowledged in the 15th century by the Ottoman conquerors, who created the Sanjak of Bosnia in 1463, giving it a regional name, which was not always the", "the Republic of Bosnia and Herzegovina were the armed forces of the Republic of Bosnia and Herzegovina during the war in Bosnia and Herzegovina. ARBiH was established on 15 April 1992, and most of the structure is transferred from the former Territorial Defense of Bosnia and Herzegovina. The Army after the Dayton Agreement was defined as the Bosniak component of the Army of the Federation of Bosnia and Herzegovina, and after defense, reforms transformed into the Bosnian rangers, one of the three brigades of the Armed Forces of Bosnia and Herzegovina. Currency Following the introduction of the Bosnian dinars and", "Geography of Bosnia and Herzegovina Regions The country's name comes from the two regions Bosnia and Herzegovina, which have a very vaguely defined border between them. Bosnia occupies the northern areas which are roughly four fifths of the entire country, while Herzegovina occupies the rest in the southern part of the country.\nThe major cities are the capital Sarajevo, Banja Luka in the northwest region known as Bosanska Krajina, Tuzla in the northeast, Zenica in the central part of Bosnia and Mostar is the capital of Herzegovina.\nThe south part of Bosnia has Mediterranean climate and a great deal of agriculture. Central", "Women in Bosnia and Herzegovina Background Bosnia and Herzegovina declared sovereignty in 1991 and independence from the former SFR Yugoslavia in 1992. The Bosnian War (1992-1995) was responsible for extreme acts of violence (ethnic cleansing in the Bosnian War) and an economic collapse. Today Bosnia and Herzegovina is a multi-ethnic and multi-religious society - the population consists of: Bosniaks 48.4%, Serbs 32.7%, Croats 14.6%, and others 4.3%; while the religious makeup is: Muslim 40%, Orthodox 31%, Roman Catholic 15%, and other 14% (as of 2013). Most of the population is rural: only 39.8% of total population is urban. The", "and Herzegovina, now two entities, with the majority Bosniak and Croat-inhabited Federation of Bosnia and Herzegovina, and the majority Serb-inhabited Republika Srpska. Assessment in scholarship Bosnia and Herzegovina was never mentioned explicitly in the text. In the opinions of historians Noel Malcolm and Ivo Banac from the Bosnian Institute, no plan for the transformation of Bosnia and Herzegovina into an Islamic state was included in the essay, and certainly not in the political program of Izetbegović's SDA (which he founded in 1990). John V. A. Fine noted that the SDA leadership was at that time secular, and the small number", "Constitutional Court of Bosnia and Herzegovina The Constitutional Court of Bosnia and Herzegovina (Serbo-Croatian: Ustavni sud Bosne i Hercegovine, Уставни суд Босне и Херцеговине) is a special court sui generis, whose main role is to be the interpreter and guardian of the Constitution of Bosnia and Herzegovina, as stated in Article VI, paragraph 3 of the Dayton Peace Accords entitled \"the Constitution\" (\"The Constitutional Court shall uphold this Constitution\"). It is considered to be the second-highest judicial authority, since it has the appellate jurisdiction over issues under the Constitution arising out of a judgment of any other court in Bosnia", "of Serbs, Bosnia and Littoral\" (\"Stefan, kralj Srbljem, Bosni i Primorju\"). By having done so, he became a ruler of the newly proclaimed Kingdom of Bosnia, a state that followed the Banate of Bosnia. At its peak the Kingdom became one of the most influential and powerful states in the Balkan peninsula prior to Ottoman conquest.\nThroughout the Middle Ages, Herzegovina was made up of several smaller polities: Zahumlje (Hum), centered around the town of Blagaj, and Travunia, centered on the town of Trebinje. These statelets were in periods ruled by semi-independent princes, mostly under suzerainty of the Serbian medieval monarchy.", "provision of an Entity's constitution or a law of an Entity is compatible with the Constitution of Bosnia and Herzegovina.\nAlthough, the Constitution of Bosnia and Herzegovina explicitly focuses only on 'provisions of an Entity's law', this also implies a review of constitutionality of laws of Bosnia and Herzegovina in accordance with the general task of the Court to uphold the Constitution of Bosnia and Herzegovina. \nIn special cases, the Court also has jurisdiction to examine whether an Entity's decision to establish a special parallel relationship with a neighboring state is consistent with the Constitution including provisions concerning the sovereignty and", "Bosnia and Herzegovina was established on 24 October 1991, dominated by the Serbian Democratic Party (SDS). On 9 January 1992, that Assembly adopted a declaration on the proclamation of the Serbian Republic of Bosnia and Herzegovina. The geographical area comprising the ARK thus became part of the proclaimed Serbian Republic of Bosnia and Herzegovina.\nUnlike the other SAOs in Bosnia which were formed over summer and fall, the SAO Bosanska Krajina was officially formed on April 25, 1991, but under the name ARK (Autonomous Region of Krajina — referring to Bosanska Krajina). There were attempts during the summer of 1991 to", "Army of the Republic of Bosnia and Herzegovina Creation and composition The Army of Republic of Bosnia and Herzegovina was formed on 15 April 1992 during the early days of the Bosnian War. Before the ARBiH was officially created, a number of paramilitary and civil defense groups were established. The Patriotic League (PL) and the local Territorial Defence Force of the Republic of Bosnia and Hercegovina (TORBIH) were the official army while paramilitaries such as the Zelene Beretke (Green Berets) and Crni Labudovi (Black Swans) units were also active. Other irregular groups included Bosnian mafia groups, as well as collections", "the Constitution of Bosnia and Herzegovina and Constitutions of the Entities. Moreover, it is of a particular importance the fact that the identity of the constituent peoples, education, religion, language, fostering culture, tradition and cultural heritage are defined in the Constitution of the Federation of BiH and Constitution of the Republika Srpska, as the vital national interests of the constituent peoples.\nThe formal name of the item is U-4/04, but it is widely known as \"Decision on the insignia of entities\" (Bosnian: Odluka o obilježjima entiteta), since its merritum was about the symbols of entities. The Court has ordered the Parliament", "located primarily in Central Bosnia. Almost all Muslim congregations in Bosnia and Herzegovina refer to the Islamic Community of Bosnia and Herzegovina as their religious organisation.\nThe Constitution of Bosnia and Herzegovina guarantees freedom of religion, which is generally upheld throughout the country. The Ottoman era Islam was first introduced to the Balkans on a large scale by the Ottomans in the mid-to-late 15th century who gained control of most of Bosnia in 1463, and seized Herzegovina in the 1480s. Over the next century, the Bosnians – composed of dualists and Slavic tribes living in the Bosnian kingdom under the name", "exceptions, the ethnicity and history of the dominated in communist and monarchy Yugoslavia has been prescribed by the dominators and by the general demographics of a region.\nLike national identity in Bosnia and Herzegovina in general, Bosniak national identity is chiefly based on religion and communal feeling, as opposed to linguistic and/or physical differences from their neighbors. In that sense, the earliest foundation of modern Bosniak national development can be found as early as the beginning of the 18th century, as native Bosnian Muslims found themselves often fighting against the empire's enemies by their own (i.e. the Battle of Banja Luka,", "Handball Federation of Bosnia and Herzegovina History The Handball Federation was founded in 1948, and was part of Yugoslav Handball Federation. When Bosnia-Herzegovina gained independence in 1992, it became the national handball governing body, and later a member of European Handball Federation (1995) and International Handball Federation (1996).\nHandball is the most popular sport in Bosnia-Herzegovina after football and Basketball. There is a big number of clubs all over the country. Many Bosnian clubs were members of a very strong Yugoslav league, and RK Borac Banja Luka even won the EHF Champions League in 1975/1976 season.\n Another team from B&H was", "People's Assembly of Bosnia and Herzegovina The People's Assembly of Bosnia and Herzegovina was an assembly formed on 26 April 1945 in Bosnia and Herzegovina.", "plains and valleys, gradually coalescing into early principalities. As these expanded, they came to include other surrounding territories, and later evolved into more centralized states. \nDuring the twelfth century, the Banate of Bosnia was created, centered in the valley of the river Bosna. There are several theories among linguists and other scholars regarding the origins of both terms, for the region and the river, and also regarding the relation between those two terms. It is speculated that the name Bosnia could be drawn from an older regional term, itself originally derived from the name of the Bosna river, which flows", "Bosnia's statehood, as it is the first written document that refers to Bosnia's borders (between the rivers of Drina, Sava and Una) and the elements of the Bosnian state - the ruler, throne and political organization. It is written in Bosnian Cyrillic and it also referred to the people of Bosnia - Bosnianins. The Charter was a trade agreement between Bosnia and the Republic of Dubrovnik.\nThe most important item in the National Museum in Sarajevo is the Sarajevo Haggadah, a Jewish illuminated codex originally from 12th century Spain. Other important items include Hrvojev’s mass (Hrvojev misal) and Hval’s codex (Hvalov", "The First League of the Federation of Bosnia and Herzegovina is one of the second football leagues in Bosnia and Herzegovina, gathering the football clubs from the Federation of Bosnia and Herzegovina, one of the two political entities of Bosnia and Herzegovina. The other second league is the First League of the Republika Srpska, the football league gathering the football clubs from Republika Srpska, the other political entity. Both leagues were formed in 2000. On the same principle the third leagues were also formed, namely the Second League of the Federation of Bosnia and Herzegovina and the Second League of", "all three constituent peoples and other citizens of Bosnia and Herzegovina enjoy the rights and fulfil obligations in the same manner as provided for in the Constitution of Bosnia and Herzegovina and Constitutions of the Entities. Moreover, it is of a particular importance the fact that the identity of the constituent peoples, education, religion, language, fostering culture, tradition and cultural heritage are defined in the Constitution of the Federation of BiH and Constitution of the Republika Srpska, as the vital national interests of the constituent peoples.\nThe formal name of the item is U-4/04, but it is widely known as \"Decision", "Music of Bosnia and Herzegovina Like the surrounding Balkan countries, Bosnia and Herzegovina has had a turbulent past marked by frequent foreign invasions and occupation. As a result, Bosnian music is now a mixture of the national Slavic folklore with some Turkish influences along with influences from other parts of the world. History During its period as a part of Yugoslavia, Bosnia and Herzegovina was covered in state-supported amateur musical ensembles called Cultural-Artistic Societies (Kulturno-Umjetnička Društva, KUDs) which played Bosnian root music and released a few recordings on local labels. Original Bosnian music Rural folk traditions in Bosnia and", "Bosnian police Organisation In the Federation of Bosnia and Herzegovina, there are ten Cantonal police forces, each under a Cantonal Ministry of the Interior. The District of Brčko, in Northeast Bosnia, also has its own police force.\nAt the level of the central state, Bosnia and Herzegovina also has a police agency focused on Counter Terrorism, Organised Crime and crime crossing international borders, the State Investigation and Protection Agency (SIPA), and a State Border Service. Although agreement was reached on unifying the police forces, much like the armies were unified, it has yet to be realised.", "National minorities in Bosnia and Herzegovina The legislation of Bosnia and Herzegovina recognises three constituent peoples and 17 national minorities (nacionalne manjine). These latter include 2.73% of the total population of the country, i.e. 96,539 persons. The biggest community is the Romani people in Bosnia and Herzegovina, which are estimated at around 58,000 persons. Legislative framework The state-level Law on the Protection of National Minorities in Bosnia and Herzegovina was adopted in 2003, followed by the Law on the Protection of National Minorities of the Republika Srpska in 2005, and the Law on the Protection of National Minorities in", "government forces and Bosnian Croat forces of the Federation of Bosnia and Herzegovina defeated forces of the Autonomous Province of Western Bosnia, and this territory was added to the federation. Post-war By the Dayton Agreement of 1995 that ended the four-year war, the Federation of Bosnia and Herzegovina was defined as one of the two entities of Bosnia and Herzegovina and comprised 51% of country's area. The Republika Srpska comprised the other 49%. Cantons and federal structure were built rather slowly after the war. Croatian institutions of Herzeg-Bosnia existed and functioned parallel to Federation ones up until 1996–97, when they", "Bosnia (region) Geography Bosnia lies mainly in the Dinaric Alps, ranging to the southern borders of the Pannonian plain, with the rivers Sava and Drina marking its northern and eastern borders.\nThe area of Bosnia comprises approximately 41,000 km², and makes up about 80% of the territory of the present-day state of Bosnia and Herzegovina. There are no true borders between the region of Bosnia and the region of Herzegovina. Unofficially, Herzegovina is south of the mountain Ivan planina. According to another unofficial definition, Herzegovina encompasses watersheds Neretva and Trebišnjica rivers. History The historical records of the region are scarce until its", "Government of Bosnia and Herzegovina." ]
The ItWorks! business model.
[ "[This article](_URL_0_) suggests that, as you might expect, it's very hard to get anywhere near the income advertised." ]
[ "Innovation, Development and Employment Alliance The Innovation, Development and Employment Alliance is a business coalition launched in May 2009, aimed at securing intellectual property rights in a number of areas, including environmentally sound technology, healthcare and renewable energy. It is supported by the United States Chamber of Commerce; members include General Electric, Microsoft and Sunrise Solar. It was created in response to developments at the United Nations post–Kyoto Protocol negotiations on greenhouse gas emissions, where developing countries such as Brazil, India and China want the ability to compulsory licence green technology, as they are currently able to do with key", "a project, to common problems that occur during software development.\nIn July 2016, Netguru published the London Startup Guide, a guide on tech business events, meetups, business incubators and communities of London, and its role in the technology industry. In the publication, consultants encourage to run a startup based in London and present rules of doing business in the United Kingdom, based on inspiration from successful London startups and influencers. State of Stack In March 2016, Netguru, in collaboration with the survey-building service Typeform, released State of Stack, a report of the latest trends in web development, based on the data", "135 emerging economies through its Global Online Innovation Community, including online programming and mentorship; in-country training programs, the GIST Startup Boot Camps, GIST Ideation Boot Camps and GIST Villages; and the annual GIST Tech-I Global Pitch Competition. Global Online Innovation Community GISTNetwork is a government program led by the Department of State that provides a user-driven online resource to help young science and technology entrepreneurs in emerging economies build viable startups. GISTNetwork connects entrepreneurs to peers, mentors, experts, and financing both globally and within their communities.\nGISTNetwork’s online community provides: Mentors from top U.S. universities, Silicon Valley startups and local", "company-stakeholders in order to create a completely self-contained autonomous block. The result is a layered city. The Master Plan for the Campus WU (Vienna University of Economics and Business) in Vienna, Austria (2007-2015) is by nature as complex as it is evolutionary. It embodies a multivalent negotiation of scales, conceptual principles, architectural territories and operative methodologies. In this sense, the Master Plan operates as an interactive device and abstract machine, a living body that is, in the end, a subject of its own material evolution. The Master Plan as mediator promotes multi-scalar negotiations. Awards At the XV International Biennial of", "Advanced Technology Development Center The Advanced Technology Development Center (ATDC) is a science and business incubator in Georgia, United States. It is part of the Enterprise Innovation Institute (EI2) at the Georgia Institute of Technology, and is headquartered in Technology Square, Atlanta. History ATDC was formed in 1980 to stimulate growth in Georgia's technology business base, and admitted its first member company in 1981. It now has locations in Atlanta and Savannah. In 2011, ATDC expanded its mission by merging with Georgia Tech’s VentureLab and with the Georgia SBIR Assistance Program. ATDC has opened its membership to all technology entrepreneurs", "and service businesses 1C:Enterprise platform The 1C:Enterprise platform is a rapid business application development tools. 1C:Enteprise uses a Domain Driven Design approach to provide the specific tools needed to develop business software. All code-based development is done using a high-level domain-specific language, the source code is genuinely open. 1C:Enterprise platform allows create applications for different operation systems (Windows, Linux, MacOS) and use its as a Cloud services or On-premise. Considered as an alternative development tools instead of the С language family and other integrated development environments (IDE). Business software 1С:Enterprise business software suite is used for management and business accounting", "neighborhood enterprises.\" TechTown is a non-profit organization that wants to help entrepreneurs grow and make a difference in Detroit in order to strengthen the local economy. Their mission is to “help startup and established businesses develop, launch and grow, while strengthening and diversifying the local economy.” They provide a basic foundation for new and growing companies in need of support. TechTown gave Kiyani a work site, financial support, business expertise and marketing support. Wayne State University also contributed to Identilock's early success.", "Business builder History The business builder model was pioneered by The Sandpit, headquartered in London, United Kingdom. The model was devised by Simon Campbell, a British serial entrepreneur, who founded The Sandpit in 2010. The Sandpit focuses on tech startups in the B2B digital marketing vertical.", "the enterprise and the organization/business lifecycle of the enterprise itself. It deals with software development as seen from the customer's point of view.\nIn 2013 work began to evolve EUP to be based on Disciplined Agile Delivery instead of the Unified Process.", "IT companies such as IBM, is creating a distributed software platform that will drastically undercut the monopolistic rents enjoyed by companies such as Microsoft and Oracle, while Skype and VoIP will drastically redistribute the telecom infrastructure. It also points to a new business model that is 'beyond' products, focusing instead on services associated with the nominally free FS/OS software model. Industries are gradually transforming themselves to incorporate user-generated innovation, and a new intermediation may occur around user-generated media. Many knowledge workers are choosing non-corporate paths and becoming mini-entrepreneurs, relying on an increasingly sophisticated participatory infrastructure, a kind of digital corporate", "available to technology companies and businesses. The Enterprise campus will also try to bridge the Engineering and Business colleges with the addition of the Entrepreneurship and Innovation Center (EIC).\nIn 2010, Louisiana Tech finished the renovations of the old Visual Arts Building by transforming that building into the new Entrepreneurship and Innovation (E&I) Center. The E&I Center will serve as the central hub for the Center for Entrepreneurship and Information Technology's (CEnIT) programs and is located between the College of Business building and Bogard Hall (COES).\nLouisiana Tech broke ground on Tech Pointe, the first building on the Enterprise Campus, in 2010.", "the business model to be dynamic.\nDynamic Business Modeling recognises that businesses dynamically evolve, re-inventing their (business) models to achieve strategic advantage. DBM posits that the role of enterprise software (CRM, billing, ERP) is to dynamically automate and advance the business processes and services that lie behind these Business models. History The term was first used to describe the architecture of MetraNet, a charging, billing, settlement and customer care from MetraTech Corp.", "Virtual business model Virtual business model (not to be confused with Virtual business), is a way to organize an innovative startup company and facilitates increased flexibility in the use of both financial and human resources and can promote development of new ideas and inventions.\nIn the virtual company, the utilization of the financial resources can be optimized with cost-effective product development as a result. This business model is defined using several criteria; the company has a limited number of employees; the management has competence for product and business development; the company has financial resources to perform or has the ambition to", "what a traditional business plan takes 50 pages to explain. Development in the U.S. The OGSM has been employed by multinational corporations around the globe, including but not limited to: Coca-Cola, Procter & Gamble, KPN, Reckitt Benckiser, Honda, Mars, MetLife, Triumph International.\nProcter & Gamble (P&G) provides an example of how these ideas translate into organizational practice. CEO A.G. Lafley wanted to provide a framework for organizing the discussion about goals and strategic direction so he used the OGSM tool, as illustrated here: How to develop an OGSM A clear, concise objective drives the rest of the OGSM model. The objective", "procurement and construction (EPC) contracts.\nIn 2011, the US Securities & Exchange Commission (SEC) filed a lawsuit in the federal Southern District of New York alleging insider trading. Organization Technip was certified as one of the first five companies in the world as a Global Top Employer 2015 which recognizes first-class employee offerings globally and equally. This independent certification delivered by the Top Employers Institute demonstrates the quality and consistency of the company’s human resources policies and practices all around the globe.\nTechnip has also been certified as a top employer in 24 countries (Australia, Brazil, China, Colombia, France, Germany, India, Indonesia,", "MIT Enterprise Forum The MIT Enterprise Forum (MITEF) is a non-profit organization affiliated with the Massachusetts Institute of Technology (MIT) through MIT Technology Review. The organization has headquarters in Cambridge, Massachusetts. MITEF has chapters in major cities in the U.S. and worldwide.\nMITEF runs a range of events and programs targeted to help early-stage entrepreneurs, promote innovative technology to the general public. History The MIT Enterprise Forum was founded in 1978 in Cambridge, Massachusetts. Originally several entrepreneurs with MIT background decided informally help each other with their business plans. These gatherings showed value and the group named themself \"the MIT Enterprise", "Enterprise Architect (software) Overview Systems modeling using UML provides a basis for modeling all aspects of organizational architecture, along with the ability to provide a foundation for designing and implementing new systems or changing existing systems. The aspects that can be covered by this type of modeling range from laying out organizational or systems architectures, business process reengineering, business analysis, and service-oriented architectures and web modeling, through to application and database design and re-engineering, and development of embedded systems.\nAlong with system modeling, Enterprise Architect covers the core aspects of the application development life-cycle, from requirements management through to design, construction,", "builds software applications including web sites.\nAcando is a reseller and integrator of NetSuite’s ERP/Customer Relationship Management (CRM) Software-as-a-Service applications. Acando is a Microsoft .NET solution provider and Oracle partner.\nAcando provides consultancy in project leadership, analysis, design and development for software projects of any size. In addition to web design and software development, Explore also offers Business Intelligence (BI), Data Warehousing design and development and mobile systems design and development. Awards and Industry Recognition In 2007, Acando was named to the Inc. 5000, ranking 3,520 nationally, with a three-year average annual sales growth of 83.8%. Also in 2007,", "Workshare History In 1999, UK technology entrepreneur Barrie Hadfield co-founded Workshare, a provider of client-server document comparison software. Workshare’s applications are used by legal and professional services organizations to track changes in contracts and documents. In 2012, Workshare merged with Skydox, also founded by Barrie Hadfield, a provider of cloud-enabled document collaboration software for the enterprise sector. Scottish Equity Partners and Business Growth Fund invested £20m in the deal.\nWorkshare also acquired IdeaPlane, an enterprise social network, in 2012.", "and in 1966 the Intermediate Technology Development Group (ITDG) was born.\nFrom its origins as a technical enquiry service, ITDG began to take a greater direct involvement in local projects. Following initial successes in farming, it developed working groups on energy, building materials and rural health, and soon grew to become an international organisation. The group now has seven regional offices, working on over 100 projects around the world, with a head office in the UK.\nIn July 2005, ITDG changed its working name to Practical Action, and since 2008 this has been its legal name.", "in collaboration with leaders, stakeholders, planners, and implementers. It is intended as a full planning and implementation lifecycle for use at all levels of scope defined in the Common Approach to Federal Enterprise Architecture: International, National, Federal, Sector, Agency, Segment, System, and Application.", "System Architect Overview Enterprise architecture (EA) is a mechanism for understanding all aspects of the organization, and planning for change. Those aspects include business transformation, business process rationalization, business or capability-driven solution development, application rationalization, transformation of IT to the cloud, server consolidation, service management and deployment, building systems of systems architectures, and so forth. Most simply, users use EA and System Architect to build diagrammatic and textual models of any and all aspects of their organization, including the who, what, where, when, why, and how things are done so they can understand the current situation, and plan for the", "Tech:NYC History Founded in May 2016 by venture capitalist Fred Wilson, Oath CEO Tim Armstrong, and former Engine executive director Julie Samuels, Tech:NYC is a non-profit organization. The founding companies were AOL, Bloomberg L.P., Facebook, Google and Union Square Ventures. As of 2018, Tech:NYC had grown to more than 600 member companies. Samuels serves as executive director of Tech:NYC. Advocacy Tech:NYC's mission is to advocate for a tech-friendly regulatory environment at both the city and state levels. U.S. Immigration Policy Tech:NYC has advocated for a continuation of previous immigration policies at a time when government leaders favor more restrictions on", "Virtual Organization for Innovative Conceptual Engineering Design Virtual Organization for Innovative Conceptual Engineering Design (VOICED) is a virtual organization that promotes innovation in engineering design. This project is the collaborative work of researchers at five universities across the United States, and is funded by the National Science Foundation. The goal of this virtual organization is to facilitate the sharing of design information between often geographically dispersed engineers and designers through the use of a robust and sophisticated design repository. Additionally, functional data can be mapped to historical failure data and possible components to create a conceptual design.\nThe end goal is", "500 companies. Architecture Development Method The Architecture Development Method (ADM) is applied to develop an enterprise architecture which will meet the business and information technology needs of an organization. It may be tailored to the organization's needs and is then employed to manage the execution of architecture planning activities.\nThe process is iterative and cyclic. Each step checks with Requirements. Phase C involves some combination of both Data Architecture and Applications Architecture. Additional clarity can be added between steps B and C in order to provide a complete information architecture.\nPerformance engineering working practices are applied to the Requirements phase, and to", "Startups.co.uk History Startups.co.uk was founded in 2000 to provide advice for nascent entrepreneurs wanting to start a business and to help aspiring entrepreneurs to 'avoid the mistakes he made'.\nIn 2017, City AM recorded that the small business website had been bought for nearly £1m by MVF, a customer generation and online acquisition specialist that in 2013 had topped the Sunday Times Tech Track. Campaigns As an online business resource, the company has been noted for publishing an annual report of ‘best business’ ideas since at least 2014. TRT World featured its editorial director speaking on start-up trends in a roundtable", "the other's committees and working groups to bring specific expertise to key initiatives. () \nIn 2016, MESA releases the first formal definition of Smart Manufacturing in its paper “Smart Manufacturing – The Landscape Explained” which explains the relations and scope of initiatives including Industrial Internet of Things, and Industrie 4.0.()\nIn 2017, MESA signed an MOU with The Industrial Internet Consortium (IIC). Under the agreement, the two organizations will work together to align efforts to maximize interoperability, portability, security and privacy for the industrial Internet. Joint activities will include: identifying and sharing Industrial Internet of Things (IIoT) best practices; realizing interoperability", "\nThe framework provides ontology of fundamental enterprise concepts that are defined from the intersection of six interrogative categories: What, How, Where, Who, When, Why, and six perspectives: Executive, Business Management, Architect, Engineer, Technician, and Enterprise. Typically, business architects are interested in the concepts associated with the top two perspectives: Executive and Business Management. The Executive perspective is concerned with the scope and context of the business. The Business Management perspective is concerned with business definition models. The Object Management Group Modeling standards of the Object Management Group (OMG), including the Unified Modeling Language (UML), Model Driven Architecture (MDA),", "Innovation, and other tools for new product development, elaborated in the recent decade in the industry and academia.\nInitially the AIDA has been conceptualised as systemic approach including analysis, optimizations and further development of the innovation process and promoting the innovation climate in industrial companies. The innovation process with self-configuration, self-optimization, self-diagnostics and intelligent information processing and communication, is understood as a holistic system comprising following typical phases with feedback loops and simultaneous auxiliary or follow-up processes: uncovering of solution-neutral customer needs, technology and market trends, identification of the needs and problems with high market potential and formulation of the innovation", "innovation center applies various support methods and models, such as nurturing a field that the relevant large business has the advantage as a specialized local industry by matching one local government and one large business.\nIn addition, the creative economy innovation center, with an online creative economy town (www.creativekorea.or.kr) completed in September 2013, serves as a core off-line platform for the realization of the creative economy and outcome creation. It allows various economic subjects—individuals or businesses—to collaborate and share ideas online, to support each other on mutual topics of interest (such as technology or commercialization strategies), and to have access to" ]
Tomatoes and peppers are native to the Americas. Why are they identified with traditional Italian/Indian/Chinese/etc food?
[ "A handful of centuries is an extremely long time. I wouldn't be surprised if the foods you mention almost completely supplanted traditional foods in Asia and Europe. Many New World crops offered vastly superior yields and nutritional value -- the introduction of potatoes to northern Europe caused an increase in available food which was followed by an increase in population which in turn necessitated the growing of more and more potatoes to feed the area's population. If I recall correctly the yam or possibly the sweet potato had the same effect in China. Regarding your original question, though; try Google or Wikipedia." ]
[ "was in cultivation by Native American tribes throughout the present-day United States. By the early 19th century, at least three varieties are known to have been commercially introduced in North America from seeds obtained from Native Americans. Secondary centers of diversity include India, Bangladesh, Myanmar, and possibly the southern Appalachians. The large red-orange squashes often seen at Halloween in the United States are C. maxima, but not to be confused with the orange type used for jack-o-lanterns, which are C. pepo.", "staples\" throughout the Eurasian landmass as they created more varied and abundant food production.\nTomatoes, which came to Europe from the New World via Spain, were initially prized in Italy mainly for their ornamental value (see below). From the 19th century tomato sauces became typical of Neapolitan cuisine and, ultimately, Italian cuisine in general. Coffee (introduced in the Americas circa 1720) from Africa and the Middle East and sugarcane (introduced from the Indian subcontinent) from the Spanish West Indies became the main export commodity crops of extensive Latin American plantations. Introduced to India by the Portuguese, chili and potatoes from South", "kebabs and other dishes, made into sauces, and so on. North America The earliest reference to tomatoes being grown in British North America is from 1710, when herbalist William Salmon reported seeing them in what is today South Carolina. They may have been introduced from the Caribbean. By the mid-18th century, they were cultivated on some Carolina plantations, and probably in other parts of the Southeast as well. Possibly, some people continued to think tomatoes were poisonous at this time; and in general, they were grown more as ornamental plants than as food. Thomas Jefferson, who ate tomatoes in Paris,", "particular culinary significance, being featured in distinct national foods such as traditional root beer, filé powder, and Louisiana Creole cuisine. Sassafras albidum was an important plant to many Native Americans of the southeastern United States and was used for many purposes, including culinary and medicinal purposes, before the European colonization of North America. Its significance for Native Americans is also magnified, as the European quest for sassafras as a commodity for export brought Europeans into closer contact with Native Americans during the early years of European settlement in the 16th and 17th centuries, in Florida, Virginia, and parts of the", "Spain, Portugal, Greece, and Brazil, as across the Middle East (where it is part of Sham El Nessim holiday meals).\nThe Andean American variety of this bean, Lupinus mutabilis, was domesticated by pre-Incan inhabitants of present-day Peru. Rock imprints of seeds and leaves, dated around 6th and 7th century BCE, are exhibited in the National Museum of Lima. It was a food widespread during the Incan Empire. Lupins were also used by Native Americans in North America, e.g. the Yavapai people. Varieties Some varieties are referred to as \"sweet lupins\" because they contain much smaller amounts of toxic alkaloids than the", "used in the United States), Chili peppers, Guava, Tobacco, and Cotton.\nSome of the vegetables listed, such as corn and sweet potatoes, continue to be staples of Antiguan cuisine. Colonists took them to Europe, and from there, they spread around the world. For example, a popular Antiguan dish, dukuna (/ˈduːkuːnɑː/), is a sweet, steamed dumpling made from grated sweet potatoes, flour and spices. Another staple, fungi (/ˈfuːndʒi/), is a cooked paste made of cornmeal and water.\nMost of the Arawak left Antigua about A.D. 1100. Those who remained were raided by the Carib coming from Venezuela. According to The Catholic Encyclopedia, the", "being cultivated in southern Mexico and probably other areas. The Pueblo people are thought to have believed that those who witnessed the ingestion of tomato seeds were blessed with powers of divination. The large, lumpy variety of tomato, a mutation from a smoother, smaller fruit, originated in Mesoamerica, and may be the direct ancestor of some modern cultivated tomatoes. Spanish distribution Spanish conquistador Hernán Cortés may have been the first to transfer the small yellow tomato to Europe after he captured the Aztec city of Tenochtitlan, now Mexico City, in 1521, although Christopher Columbus may have taken them back as", "Manila Galleons. Citrus fruits, which are not indigenous to the Americas, are also native to the Philippines. Kinilaw has numerous variations in the Philippines and has been attested from archaeological records from the 10th to the 13th century AD. It was also introduced to Guam (resulting in kelaguen), which was also situated along the route of the Manila Galleons.\nThe invention of the dish is also attributed to places ranging from Central America to the Polynesian islands in the South Pacific. Ceviche is not native to Mexico, despite the fact that the dish has been a part of traditional Mexican coastal", "finds its way into the local cuisine, like cakes and marmalade. Pine nuts are a particular regional specialty and feature often in fine dining and cookies; indeed in Nevada the Native American tribes that live there are by treaty given rights to exclusive harvest. From Native Americans, Westerners learned the practice of eating cactus fruit from the myriad species of opuntia that occupy the Chihuahuan, Sonoran, and Mojave desert lands. In California, Spanish missionaries brought with them the mission fig: today this fruit is a delicacy.\nCuisine in this region tends to have certain key ingredients: tomatoes, onions, black beans, pinto", "were cultivated in South America, where they are known as ajíes (singular ají), from the Quechua term for Capsicum.\nThe fruit (technically berries in the strict botanical sense) of Capsicum plants have a variety of names depending on place and type. The more piquant varieties are commonly called chili peppers, or simply chilis. The large, mild form is called bell pepper, or by color or both (green pepper, green bell pepper, red bell pepper, etc.) in North America, sweet pepper or simply pepper in the United Kingdom, Ireland and Malaysia but typically called capsicum in New Zealand, Australia, South Africa,", "and many non-native ornamentals languish in the trade for years before suddenly naturalizing and becoming invasive.\nPeaches, for example, originated in China, and have been carried to much of the populated world. Tomatoes are native to the Andes. Squash (pumpkins), maize (corn), and tobacco are native to the Americas, but were introduced to the Old World. Many introduced species require continued human intervention to survive in the new environment. Others may become feral, but do not seriously compete with natives, but simply increase the biodiversity of the area.\nDandelions are also introduced species to North America.\nA very troublesome marine species in southern", "in Central–East Mexico.\nC. chinense peppers have been cultivated for thousands of years in their native regions, but have only been available in areas of Asia and Africa for about 400–500 years following the Columbian Exchange. Selection in the new environments have led to the rise of new varieties that are bred and farmed in Asia and Africa.\nC. chinense are also popular with many gardeners for their bright colors (ornamental value) and for their fruit. Culinary use C. chinense and its varieties have been used for millennia in Yucatan and Caribbean-style cooking to add a significant amount of heat to their", "(seaweed), and ko (sugarcane) which was used as both a sweet and a medicine. In addition to the foods they brought, the settlers also acquired ʻuala (sweet potato), The sweet potato is native to South America. Recently, an analysis of the DNA of 1,245 sweet potato varieties from Asia and the Americas was done. Researchers have found a genetic link that proves the root made it to Polynesia from the Andes around 1100 CE. The findings, published in the Proceedings of the National Academy of Sciences, offer more evidence that ancient Polynesians may have interacted with people in South", "ingredients, and many techniques have been added to traditional foods as well. Native American cuisine is prepared by indigenous populations across the continent, and its influences can be seen on multi-ethnic Latin American cuisine. Many staple foods eaten across the continent, such as Corn, Beans, and Potatoes have native origins. The regional cuisines are North American cuisine, Mexican cuisine, Central American cuisine, South American cuisine, and Caribbean cuisine.", "limes, grapefruits, tangerines, and more. The largest citrus is the pummelo. The scented flower buds of cloves come from a tropical evergreen tree native to Zanzibar, Madagascar, and Indonesia. Coconuts are originally native to the Indo-Pacific area and are around every tropical area except rainforests. They can be used for oil, fruit, and fibers. Coffee, probably native to North East Africa, is grown throughout the tropics.\nIn addition, grown throughout the tropics is mango, native to India (valuable in many parts) and from Southeast Asia (includes root tubers used as spice and perfumes). Mung bean is also native to India, is", "Africans in the 16th century. Bananas were still only consumed in minimal amounts during the 1880s. The U.S. didn't see major rises in banana consumption until banana plantations in the Caribbean grew. The History of modern banana plantations in the Americas details the spread of this crop within the Americas. Tomatoes It took three centuries after their introduction in Europe for tomatoes to become widely accepted. Tobacco, potatoes, chili peppers, tomatillos, and tomatoes are all members of the nightshade family. All of these plants bear some resemblance to the European nightshade that even an amateur could deduce just by", "to name a few.\nEuropean contributions include pork, chicken, beef, cheese, herbs and spices, as well as some fruits.\nTropical fruits, many of which are indigenous to Mexico and the Americas, such as guava, prickly pear, sapote, mangoes, bananas, pineapple and cherimoya (custard apple) are popular, especially in the center and south of the country. Corn Despite the introduction of wheat and rice to Mexico, the basic starch remains corn in almost all areas of the country and is the base of many recipes (e.g. corn tortillas, atole, pozol, menudo, tamal). While it is eaten fresh, most corn is dried, nixtamalized and", "of the original elements. Eastern Native American cuisine The essential staple foods of the Indigenous peoples of the Eastern Woodlands have traditionally been corn (also known as maize), beans, and squash, known as \"The Three Sisters\" because they were planted interdependently: the beans grew up the tall stalks of the corn, while the squash spread out at the base of the three plants and provided protection and support for the root systems. A number of other domesticated crops have also been popular during various eras in the Eastern Woodlands, including a local version of quinoa, a variety of amaranth, sumpweed", "century. Today around 32,000 acres (13,000 ha) of tomatoes are cultivated in Italy, although there are still areas where relatively few tomatoes are grown and consumed. Livestock Initially at least, the Columbian exchange of animals largely went in one direction, from Europe to the New World, as the Eurasian regions had domesticated many more animals. Horses, donkeys, mules, pigs, cattle, sheep, goats, chickens, large dogs, cats and bees were rapidly adopted by native peoples for transport, food, and other uses. One of the first European exports to the Americas, the horse, changed the lives of many Native American tribes. The mountain", "beans and squash, supplemented by a variety of tropical fruits, along with chili peppers, tomatoes and avocados. Popular tropical fruits today are papaya, mamey sapote and sapote, often found in milkshakes called licuados and ice cream. The Spanish introduced parsley, thyme, marjoram, bay laurel, cilantro, saffron, cloves, cinnamon, black pepper, rice, almonds, olives, olive oil, garlic and capers, as well as pineapples and sugar cane from the Caribbean. Spanish Mediterranean influence is best seen in the use of olives, olive oil and capers. The Afro-Cuban influence is due to the importation of slaves into Mexico from Africa and the", "Dishes such as the very traditional tamale and many others made of corn are the most representative of its indigenous inhabitants, and similar to other neighboring Mesoamerican countries. Spaniards brought many new ingredients to the country from other lands, especially spices and domestic animals. And later in the 19th century, the African flavor lent its presence with influence from other Caribbean mixed flavors. This is how Costa Rican cuisine today is very varied, with every new ethnic group who had recently become part of the country's population influencing the country's cuisine. Sports Costa Rica entered the Summer Olympics for the", "world. California is the number one U.S. producer of many common fruits and vegetables, including broccoli, spinach, tomatoes and avocados, amongst others. A health-conscious culture also contributes to the popularity of fresh produce. Fruit festivals, such as the National Orange Show Festival in San Bernardino County, are common throughout the state.\nAvocados play a special role in California cuisine. Many popular California dishes integrate avocados and/or guacamole. Avocados were unfamiliar to most Americans until the mid-20th century, when growers of the subtropical fruit successfully convinced many Americans to try it. In California, avocado is commonly used in sandwiches, hamburgers, salads and", "Americas. In the early 17th century, the Spanish found that there were numerous valuable spices like cinnamon, clove, nutmeg, and pepper that could be cultivated in the Philippines similarly to what the Portuguese could in the Moluccas. In the Americas however, the Spanish found spices of different varieties who's properties differed from those of the varieties found in the East. Some of these properties were for the better, for example a type of pepper found in the Caribbean was described by Nicolas Mondares as more flavorful and spicy than black pepper. But there were also varieties of spices found in", "of its lineup. Recently, some American distilleries have begun using 'New World' varieties of juniper such as Juniperus occidentalis.\nA few North American juniper species produce a seed cone with a sweeter, less resinous flavor than those typically used as a spice. For example, one field guide describes the flesh of the berries of Juniperus californica as \"dry, mealy, and fibrous but sweet and without resin cells\". Such species have been used not just as a seasoning but as a nutritive food by some Native Americans. In addition to medical and culinary purposes, Native Americans have also used the seeds", "which likely came from Haiti. Onions and bell peppers were long part of cooking in both the Spanish and African traditions. Tomatoes were introduced to the region shortly thereafter. Origin Scholars agree that gumbo originated in Louisiana in the early 18th century, but its uncertain etymology makes it difficult to pinpoint the origins of the food. Although no conclusive evidence exists, cultural markers indicate several plausible scenarios.\nAs aforementioned, while its exact origins are unknown, gumbo is often believed to be a dish of mixed origins of French, Spanish, African, Native American Caribbean and German influence. African-American slaves often exchanged or", "his adopted country.\nThe tomato is native to western South America, and was formally cultivated by the Aztecs and other peoples in Mesoamerica.", "beans, rice, bell peppers, chile peppers, and cheese, in particular Monterey Jack, invented in Southern California in the 19th century and itself often further altered into pepper Jack where spicy jalapeño peppers are incorporated into the cheese to create a smoky taste. Chili peppers play an important role in the cuisine, with a few native to the region (such as the New Mexico chile pepper, knows as Hatch, New Mexico and Anaheim); these still grown by Hispanos of New Mexico and Pueblo. In New Mexico, chile is eaten on a variety of foods, such as the green chile cheeseburger, made", "New Mexicans in their traditional foods. Selective breeding began with 14 lineages of 'Pasilla', 'Colorado', and 'Negro' cultivars, from throughout New Mexico and Southern Colorado. These first commercially viable peppers were created to have a \"larger smoother, fleshier, more tapering and shoulderless pod for canning purposes.\" \nInternationally renowned expert on chile genetics, breeding, and germplasm evaluation, Paul Bosland, founded the Chile Pepper Institute at New Mexico State University to study New Mexico's iconic state vegetable and peppers from around the world. Cultivation Fruits of New Mexico chile plants are grown from seeds – and each of the individual strains is", "red. The Spanish first introduced tomatoes to Europe, where they became used in Spanish and Italian food. The French and northern Europeans erroneously thought them to be poisonous because they are a member of the deadly nightshade family. This was exacerbated by the interaction of the tomato's acidic juice with pewter plates. The leaves and immature fruit contains tomatine, which in large quantities would be toxic. However, the ripe fruit contains no tomatine. Mesoamerica Aztecs and other peoples in Mesoamerica used the fruit in their cooking. The exact date of domestication is unknown; by 500 BC, it was already", "River valley, Europeans noted that Native Americans managed groves of nut- and fruit-trees not far from villages and towns and their gardens and agricultural fields. They would have used prescribed burning further away, in forest and prairie areas.\nMany crops first domesticated by indigenous Americans are now produced and used globally, most notably maize or \"corn\", arguably the most important crop in the world. Other significant crops include cassava; chia; squash (pumpkins, zucchini, marrow, acorn squash, butternut squash); the pinto bean, Phaseolus beans including most common beans, tepary beans and lima beans; tomatoes; potatoes; avocados; peanuts; cocoa beans (used to make" ]
Why are nike shoes $150 or more and how do they enhance performance in sports?
[ "It's a fashion statement mostly.\n\nDon't get me wrong - there's some technology and research there, but not nearly enough to really affect, well, anything that much. You may jump a few millimeters higher through some new bouncy sole and lighter material. And there is some stability enhancements that will slightly reduce the risk of a rolled ankle. And some fabric may allow the foot to \"breathe\" a hair better.\n\nBut in the end, it's clever marketing.", "It's all just marketing. They can charge whatever the market will bear. As for performance; the best thing you can do is find pair of shoes that's comfortable at a price you can afford." ]
[ "have many of the sport's biggest stars under their name, with Cristiano Ronaldo, Zlatan Ibrahimović, Neymar, Harry Kane, Eden Hazard and Kylian Mbappé among others.\nIn 2012, Nike carried a commercial partnership with the Asian Football Confederation. \nIn August 2014, Nike announced that they will not renew their kit supply deal with Manchester United after the 2014–15 season, citing rising costs. Since the start of the 2015–16 season, Adidas has manufactured Manchester United's kit as part of a world-record 10-year deal worth a minimum of £750 million. Nike still has many of the top teams playing in their uniforms, including:", " The shoe line was expected to earn $3 million for Nike in about three to four years. As it turned out, the Air Jordan sneaker earned Nike $130 million in 1985 alone, making their $500,000 contract with Jordan one of the great bargains of all time, a precursor to Jordan's more lucrative deals with Nike, including a 1997 deal for $30 million. Jordan's relationship with Nike is often considered the most successful sports endorsement relationship in history. Marketing Michael Jordan Falk soon proved himself to be a capable agent with many innovative marketing ideas. He allowed Nike", "FC Barcelona, Manchester City, Paris Saint Germain and the national teams of Brazil, France, England, Portugal and the Netherlands among many other.\nNike has been the sponsor for many top ranked tennis players. Brand's commercial success in the sport went hand in hand with the endorsement deals signed with the biggest and the world's most charismatic stars and number one ranked players of the subsequent eras, including John McEnroe in the 1980s, Andre Agassi and Pete Sampras in the 1990s and Roger Federer, Rafael Nadal, Serena Williams and Maria Sharapova with the start of the XXI century.\nNike has sponsored Tiger Woods", "and even pink. Big name companies such as Nike, Adidas, Puma and the like have made an impact on the market with record sales. Nike's flagship shoes are the Hypervenoms, Magistas, Tiempos and The Nike Mercurial worn by Cristiano Ronaldo and others. German company Adidas are responsible for the Predator range worn by David Beckham, Gary Neville, and Steven Gerrard, as well as the long-surviving Copa Mundial. The entire German national side wore Adidas boots during the 2006 FIFA World Cup. Another German firm Puma flagship shoes are the Kings, Evospeed, Evopower and Evotouch worn by Sergio Agüero, Marco Reus,", "being Michael Jordan, Kobe Bryant and LeBron James. In 2014, having been sponsored by Nike for ten years, Rodriguez stated: \"it feels like I've also grown with them. I’ve become intertwined with Nike. Our stories are together — at least with Nike SB. The process of making a shoe, at this point, is like a well-oiled machine.\" Target sponsorship On August 13, 2010, the Target corporation announced in a press release that Rodriguez had joined its sponsorship ranks. He became the second professional skateboarder to have a sponsorship deal with Target, the first being Shaun White, though White is better", "thing was Adidas wasn't going to offer him a lot of money. It was the first time that the athlete was going to share in the royalties of the shoe. That was the gamble.\"\nThe deal was all the more significant because it was considered difficult to market African-American players in 1984, especially in a team sport like basketball. In fact, Nike insisted on several \"outs\" in its initial contract with Jordan: the shoe line could be dropped if certain sales figures were not met, or if Jordan failed to make the NBA All-Star Game in his first three years.", "James, Kevin Durant and Paul George, among others.\nA news report originating from CNN reported that Nike spent $11.5 billion, nearly a third of its sales, on marketing and endorsement contracts in the year 2018. Nike and its Jordan brand sponsored 85 men's and women's basketball teams in the NCAA tournament. Ties with the University of Oregon The company maintains strong ties, both directly and indirectly (through partnership with Phil Knight), with the University of Oregon. Nike designs the University of Oregon football program's team attire. New unique combinations are issued before every game day. Tinker Hatfield, who also redesigned the", "endorsement deal with LA Gear, later became the face of Spalding's athletic shoe line and endorsed The Dream, a sneaker that retailed in various outlets (such as Payless ShoeSource) for $34.99. This made him one of the very few well-known players in any professional sport to endorse a sneaker not from Nike, Reebok, Adidas, or other high-visibility retail brands. As Olajuwon declared: \"How can a poor working mother with three boys buy Nikes or Reeboks that cost $120? ... She can't. So kids steal these shoes from stores and from other kids. Sometimes they kill for them.\" Higher education Attending", "excitement due in part to the timing of its release. The new millennium energized consumers with hopes for new technologies, which contributed heavily to Nike Shox' early success. \nDuring the 2000 Summer Olympics, the brand saw a tremendous boost in popularity when Team USA's Vince Carter dunked over a 7'2\" center from Team France in a pair of Shox. Carter's dunk would become a major influence on Shox' advertisement strategy. 2004 The release of two popular Shox basketball shoes, the Nike Shox Explosive and the Nike Shox Elevate. The Shox VC IV, Shox signature shoe for Vince Carter, is also", "Nike Mercurial Vapor The Mercurial Vapor is a football boot manufactured by Nike. The boot is known for being lightweight. Because of this, the boot is endorsed by many players for whom speed is part of their game, notably wingers or strikers, such as Cristiano Ronaldo, Neymar, Zlatan Ibrahimović, Didier Drogba, Luka Modrić, Arturo Vidal, Douglas Costa, Xherdan Shaqiri, Raheem Sterling, Stephan El Shaarawy, Eden Hazard, Alexis Sánchez, Kylian Mbappé, Philippe Coutinho and many more.\nIn 1998, Nike launched the first Mercurial football boot — the R9 – a shoe inspired by and designed for Brazilian star Ronaldo, which he debuted", "States.\nW+K's strategy for Nike had consistently been to eschew targeting specific target markets, favouring advertisements and sponsorships of athletes with wide general appeal. The approach was successful; by 2001, Nike's U.S. sales were three times that of their nearest competitor, Reebok. However, Reebok had just launched an aggressive new campaign for their new RBK line of shoes, backed by celebrities such as Allen Iverson, Jadakiss, R. Kelly, and Missy Elliott. They also had just signed a 10-year deal to provide equipment and uniforms to the NBA, a contract previously held by Nike. Other companies, such as Adidas and New Balance", "to Ball.\nOn May 4, 2017, Big Baller Brand announced its first shoes, the ZO2, which had a retail price of $495 and would be shipped later on, by as late as November 24. Shaquille O'Neal criticized Ball for overpricing the shoes, while Dick Vitale took aim at the price by citing Lonzo's performance against Kentucky at the NCAA Tournament. On Twitter, many NFL players like Golden Tate were critical of the shoe price, while Arian Foster and others showed their support. Ball answered by posting on Twitter, \"If you can't afford the ZO2'S, you're NOT a BIG BALLER!\" The Washington", "Nike sponsors top athletes in many sports to use their products and promote and advertise their technology and design. Nike's first professional athlete endorser was Romanian tennis player Ilie Năstase. The first track endorser was distance runner Steve Prefontaine. Prefontaine was the prized pupil of the company's co-founder, Bill Bowerman, while he coached at the University of Oregon. Today, the Steve Prefontaine Building is named in his honor at Nike's corporate headquarters. Nike has only made one statue of its sponsored athletes and it is of Steve Prefontaine.\nNike has also sponsored many other successful track and field athletes over the", "Nike Hypervenom The Nike Hypervenom is a football boot that is manufactured by Nike. This type of boot is said to be for traction, power, and agility, designed for deceptive players. Therefore, it is endorsed/worn by players, notably forwards, such as Robert Lewandowski, Kylian Mbappé, Harry Kane, Edinson Cavani, Gonzalo Higuaín, Marcus Rashford, Mauro Icardi, Riyad Mahrez, Aubameyang and Thiago.\nIn May 2013, the Nike Hypervenom Phantom was launched. It was launched and designed for Brazilian forward Neymar. The boot is currently in its third version. There is one high-end model for the first version, the Hypervenom Phantom; whereas, there are", "Adidas Superstar History When the shoe was introduced, it was the first low-top basketball shoe to feature an all-leather upper and the now famous rubber shelltoe. With its rubber toe protection and non-marking sole, the shoe caught the attention of some of the best players from the NCAA and NBA, most notably Kareem Abdul-Jabbar. Within the first few years of its introduction, the Superstar was being worn by over 75% of all NBA players; proof of its revolutionary technology which remains today. Over the course of the next few years, it would advance from the court to the streets", "Nike became known for several major ambush marketing schemes at the Olympics and association football tournaments.\nAt the 1996 Summer Olympics, Nike engaged in a marketing campaign to compete with official sponsor Reebok, including magazine ads and billboards. Consistent with its aggressively-toned marketing of the time, its campaign featured slogans parodying those of the Olympics and attacking its values, including \"Faster, Higher, Stronger, Badder\", \"You don't win Silver, you lose Gold\", and \"If you're not here to win, you're a tourist.\" Nike set up a prominent pop-up store near the athletes' village, and was also attempting to have fans to display", "with a \"top-end NFL player\" worth millions per year plus royalties. In response, some people set fire to their own Nike-branded clothes and shoes or cut the Nike swoosh logo out of their clothes, and the Fraternal Order of Police called the advertisement an \"insult\"; others, such as LeBron James, Serena Williams, and the National Black Police Association, praised Nike for its campaign. The College of the Ozarks removed Nike from all their athletic uniforms in response.\nDuring the following week, Nike's stock price fell 2.2%, even as online orders of Nike products rose 27% compared with the previous year. In", "Nike sweatshops Since the 1970s, Nike, Inc. has been accused of using sweatshops to produce footwear and apparel . Nike has denied the claims in the past, suggesting the company has little control over sub-contracted factories. Beginning in 2002, Nike began auditing its factories for occupational health and safety issues. Allegations Nike has been accused of using sweatshops since the early 1970s, when it produced goods in South Korea, China, and Taiwan. As these countries' economies developed, workers became more productive, wages rose, and many moved on to higher paying jobs.\nThroughout the 1990s, Nike was criticized for selling goods produced", "more money than Durant from his contract with Under Armour. Meanwhile, Puma pays sprinter Usain Bolt $10 million per year.\nMany athletes maintain contracts with a variety of companies; some of them are related to sports and others that are not. Roger Federer holds agreements with Nike, Wilson, Rolex, Mercedes-Benz, and Gillette, worth a sum close to $60 million each year. LeBron James’ contracts with Nike, Beats by Dre, Coca-Cola, Kia, McDonald's, and Samsung accrue the NBA player more than $40 million per year. Peyton Manning meanwhile holds sponsorship agreements with companies including Buick, DirecTV, Gatorade, Nationwide and Papa John's worth", "Cesc Fàbregas and Antoine Griezmann.\nThe Puma King soccer cleat have been worn by legendary players such as Pelé, Eusébio, Johan Cruyff and Diego Maradona.\nIn recent times, the most successful companies are Nike and Adidas, and their products enjoy great popularity among professional footballers; among Nike's endorsers are two-time FIFA World Player of the Year Ronaldinho, aforementioned duo Wayne Rooney and Cristiano Ronaldo, striker Ronaldo, Wesley Sneijder, Zlatan Ibrahimović, and other popular players. Adidas, which has been providing football boots with screw-in studs to the German national side since the 1954 FIFA World Cup, have made their impact on the modern", "its position in basketball in 2015 when it was announced that the company would sign an 8-year deal with the NBA, taking over from the league's previous uniform sponsor, Adidas. The deal required all franchise team members to wear jerseys and shorts with the Swoosh logo, beginning with the 2017/18 season. After the success of partnership with Jordan, which resulted in the creation of the unique Air Jordan brand, Nike has continued to build partnership with the biggest names in basketball. Some have had signature shoes designed for them, including Kobe Bryant, Jason Kidd, Vince Carter and more recently LeBron", "years of designing and experimenting, Bowerman finalized his image of the Nike Cortez in 1968; and in 1972 the shoe was released. Impact on Nike It is widely thought that the Nike Cortez was key to the success of Nike, Inc. The shoe was introduced to the general public at the peak of the 1972 Summer Olympics. The demand for the shoe grew exponentially nearly immediately after the public noticed that the Nike Cortez was being used by the 1972 U.S. Olympic athletes. Sales reached $800,000 during the first year the shoe was released, which was a 100% sales increase", "Adidas. Players like Latrell Sprewell, Kevin Garnett and Jamal Crawford brought AND1 into the national spotlight and helped them secure shelf space in major footwear retailers, such as Foot Locker and FootAction. By the 2001 season, AND1 was second only to Nike in market share among NBA endorsees, a big part of them soon becoming the second largest basketball brand in the United States, only eight years after their inception.\nAND1 is famous for the shoe known as the Tai Chi, famously worn by Vince Carter during the 2000 Slam Dunk Contest, where he put on one of the greatest NBA", "line\". Originally signed to Nike, Curry joined with Under Armour in the 2013 offseason. As Curry became a two-time NBA Most Valuable Player Award winner and one of the most popular athletes in the world, sales of his shoes have become a major factor for the Under Armour brand, with stock prices rising and falling based on the success of the Curry shoe line.\nUnder Armour is also well known for its partnership with PGA golfer Jordan Spieth, who has won three majors so far (the 2015 Masters, the 2015 U.S. Open and the 2017 Open Championship) and has recently launched", "gain power with each deal that was made. \nSonny Vaccaro explains how he began to use college athletes for advertisement by setting up deals with coaches in return for their players wearing NIKE apparel. He then explains that at the end of the day, after all of this money was changing hands, the students never got any of the money.\nThe first academic support center for athletes was founded at the University of Iowa State and this was a major problem because top athletes were ill-prepared for college. Academic fraud began to come into the picture after the realization that a", "iron, creating a prototype rubber sole. University of Oregon distance runner Steve Prefontaine became the first major track athlete to wear Nike shoes and converted many of his peers to the Nike brand.\nNike has maintained a close relationship with UO ever since, manufacturing all university logo clothing and uniforms for athletic teams, including research prototypes for high-tech \"smart clothes\", such as jerseys with cooling systems. Numerous University of Oregon graduates have also gone on to become executives, designers, and business partners of Nike such as Tinker Hatfield and Dan Wieden.\nPhil Knight has personally donated significant amounts to the University for", "defensive instincts and effort Ball has been criticized for being injury prone, missing already 40% of the games in his young NBA career. Endorsements Ball began his pro career using sports apparel from his father LaVar's Big Baller Brand instead of signing with any of the major apparel companies. His father had insisted that he not sign with a company unless they agreed to license merchandise from Big Baller Brand. In May 2017, Big Baller Brand announced the release of Ball's first shoe, the ZO2. The $495 price tag on the shoe sparked wide criticism from celebrities and on social", "as opposed to Nike's previous deal with Federer which was roughly $10 million per year. However, Federer doesn't have a shoe deal and still chooses to wear Nike trainers. Endorsements Federer is one of the highest-earning athletes in the world. As of June 2019, he is listed at #5 on the Forbes \"World's Highest Paid Athletes\" list. He is endorsed by Japanese clothing company Uniqlo and Swiss companies Nationale Suisse, Credit Suisse, Rolex, Lindt, Sunrise, and Jura Elektroapparate. In 2010, his endorsement by Mercedes-Benz China was extended into a global partnership deal. His other sponsors include Gillette, Wilson, Barilla, and Moët", "more than $1 billion.\nMost of Jordan's endorsement deals, including his first deal with Nike, were engineered by his agent, David Falk. Jordan has described Falk as \"the best at what he does\" and that \"marketing-wise, he's great. He's the one who came up with the concept of 'Air Jordan.'\" Business ventures In June 2010, Jordan was ranked by Forbes magazine as the 20th-most powerful celebrity in the world with $55 million earned between June 2009 and June 2010. According to the Forbes article, Jordan Brand generates $1 billion in sales for Nike. In June 2014, Jordan was named the first NBA player to", "Kobe Bryant in basketball, Cristiano Ronaldo in football, Tiger Woods in golf, and Roger Federer and Rafael Nadal in tennis are among the 15 biggest athlete endorsement deals in sports history. Nike's heritage Nike is the winged goddess of victory in Greek mythology, who sat at the side of Zeus in Olympus. Nike is said to have presided over history's earliest battlefields as she flew around rewarding the victors with glory and fame, symbolized by a wreath of leaves. She was often found next to the goddess of wisdom, Athena, who is said to never put up with defeat. \nIn" ]
How all these big websites lately have been getting their data hacked.
[ "Properly securing websites is one of those things where if you're doing your job right, no one notices. If you're doing it wrong, no one notices until you get compromised. This is why it often doesn't get enough attention.\n\nIn addition, because various sites are architected in many different ways in terms of software and topology, there's no one \"right way\" to secure things. Whereas there exist best practices for Wordpress blogs for example, time must be spent to determine where more complex systems are vulnerable. That doesn't excuse basic mistakes like not salting passwords or leaving database ports open, however.\n\nSome of the recent attacks are not technological, but rather are social engineering. If users are giving away their credentials, there's no foolproof solution." ]
[ "of data breaches and exposures since 2014 indicates that breaches has become more frequent and bigger scale than ever. With much more data generated and stored on cloud, malicious actors are interested to exploit systems that are wrongly configured. Hackers gain access to data by exploiting vendor's security loopholes. One challenge in measuring vendor's cyber risk is that the conventional way of measuring a vendor via questionnaire is dated and not comprehensive enough.", "it can be collected from passive sensors around embassies, or even stolen from an individual computer network in a hacking attack.\nNot all SIGADs involve upstream collection, for instance, data could be taken directly from a service provider, either by agreement (as is the case with PRISM), by means of hacking, or other ways.\nAccording to the Washington Post, the much less known MUSCULAR program, which directly taps the unencrypted data inside the Google and Yahoo private clouds, collects more than twice as many data points compared to PRISM. Because the Google and Yahoo clouds span the globe, and because the tap", "Google's data centres. Target and Home Depot breaches In 2013 and 2014, a Russian/Ukrainian hacking ring known as \"Rescator\" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. \"The malware utilized is absolutely unsophisticated and uninteresting,\" says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily", "stole information associated with at least 500 million user accounts in late 2014. According to the BBC, this was the largest technical breach reported to date. Specific details of material taken include names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, dates of birth, and encrypted passwords. The breach used manufactured web cookies to falsify login credentials, allowing hackers to gain access to any account without a password. On December 14, 2016 a separate data breach, occurring earlier around August 2013 was reported. This breach affected over 1 billion user accounts and is again considered the largest", "at 115 of their retail stores in the United States. At 113 stores, the malware may have allowed access to this data for purchases made from August 10, 2014 through September 16, 2014. At two stores, the malware may have allowed access to data from purchases made from July 20, 2014 through September 16, 2014. Overall, the company believed that approximately 1.16 million payment cards may have been affected.\nOn July 14, 2015, Numerous news outlets started to report a suspected data breach at retailers served by online photo software from PNI – Staples' recent acquisition. The first reported victim was", "its peak times every day. Chinese University stated that the amount of information is equivalent to 17,000 five megapixel photographs. In 2013, Edward Snowden said that the National Security Agency gained access to the backbone and took data from it. Chinese University said that it did not find evidence of hacking.\nIn February 2017, it was announced that 3 more sites were launched in data centres located in Fo Tan and Tseung Kwan O. Background The concept of an \"Internet Exchange\" is very important after the NSFNet Backbone faded away because IAPs had to be interconnected to maintain full connectivity to", "variants of Regin Prax.A and Prax.B. The Microsoft entries do not have any technical information. Both Kaspersky and Symantec have published white papers with information they learned about the malware. Known attacks and originator of malware German news magazine Der Spiegel reported in June 2013 that the US intelligence National Security Agency (NSA) had conducted online surveillance on both European Union (EU) citizens and EU institutions. The information derives from secret documents obtained by former NSA worker Edward Snowden. Both Der Spiegel and The Intercept quote a secret 2010 NSA document stating that it made cyberattacks that year, without specifying", "Israel, Britain, Saudi Arabia, Syria, Iraq and Afghanistan.\nThe victims who are not identified in the document due to security reasons, are senior U.S. military and diplomatic personnel, congresspeople, journalists, lobbyists, think tankers and defense contractors, including a four-star admiral.\nThe firm couldn’t determine what data the hackers may have stolen.\nAccording to the iSIGHT Partners report, hackers used 14 \"elaborated fake\" personas claiming to work in journalism, government, and defense contracting and were active in Facebook, Twitter, LinkedIn, Google+, YouTube and Blogger. To establish trust and credibility, the users fabricated a fictitious journalism website, NewsOnAir.org, using content from the media like Associated", "to $200,000 as late as October 2016; Komarov found that the data continues to be available at a much lower price since the passwords have been forced changed, but the data can still be valuable for phishing attacks and gaining access to other accounts. Attribution and motivation According to Yahoo!, the 2014 breach was carried out by a \"state-sponsored actor\" and the organization claims that such \"intrusions and thefts by state-sponsored actors have become increasingly common across the technology industry\". While Yahoo! did not name any country, some suspect China or Russia to be behind the hack, while others doubt", "is taking place in a secure environment. In more sinister scenarios, the emails from hackers may be embedded with malware that infects victims’ computers without their knowledge and secretly transfers private data directly to hackers. From October 2013 to December 2016, the FBI investigated just over 22,000 of these incidents involving American businesses. In total, they saw losses approaching $1.6 billion.\nA successful example of spear phishing was highly publicized in the news media in January 2014, when Target, a U.S.-based retailer, experienced a security breach that allowed hackers to steal customers’ credit card and personal data information. Later, it was", "the United States. Data targeted in the breach included personally identifiable information such as Social Security Numbers, names, dates and places of birth, addresses, and fingerprints of current and former government employees as well as anyone who had undergone a government background check. It is believed the hack was perpetrated by Chinese hackers. Ashley Madison breach In July 2015, a hacker group known as \"The Impact Team\" successfully breached the extramarital relationship website Ashley Madison, created by Avid Life Media. The group claimed that they had taken not only company data but user data as well. After the breach, The", "4 billion data records were stolen by hackers. However, when people sign up for accounts with Google, Amazon, Facebook, Microsoft etc. they have no idea of what their personal data (trillions of records) are going to be used for. People often don't even know how to protect their own data or their own privacy, other than not to use their computer. Corporations can legally \"scrape\" gigantic amounts of personal information, and do with it what they like - people will probably never know what happened, and they cannot find out what happened, even if they tried. Organizational instability The management", "been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. Office of Personnel Management data breach In April 2015, the Office of Personnel Management discovered it had been hacked more than a year earlier in a data breach, resulting in the theft of approximately 21.5 million personnel records handled by the office. The Office of Personnel Management hack has been described by federal officials as among the largest breaches of government data in the history of", "Department of Justice. It sent information in an infected machine to a server with a Chinese IP address. The malware which is considered particularly sophisticated in nature was introduced by phishing emails that were designed to look like they were coming from an authentic sources. The information sent is believed to be relating to the South China Sea legal case. Russia When Russia was still a part of the Soviet Union in 1982, a portion of its Trans-Siberia pipeline within its territory exploded, allegedly due to computer malware implanted in the pirated Canadian software by the Central Intelligence Agency. The", "stole the banking data of 96,000 people from the server. The counter-terrorism bureau of the country launched an investigation and were preparing to file criminal complaints against those involved.\nOn 25 July, first posted confidential information that they claimed came from the Italian Centro Nazionale Anticrimine Informatico per la Protezione delle Infrastrutture Critiche, translated as the National Anti-Crime Computer Center for Critical Infrastructure Protection, an agency tasked with protecting vital computer systems for the country. The Twitter account @anonesc posted less than 100 megabytes of data, but they claimed to have taken over eight gigabytes. The data related to oil, nuclear,", "August 2013, following the Snowden leaks, new details about the NSA's data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at \"selected communications links\" and automatically analyzed for keywords or other \"selectors\". Emails that do not match are deleted.\nThe utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA \"had no discernible impact on preventing acts", "Office of Personnel Management data breach In June 2015, the United States Office of Personnel Management (OPM) announced that it had been the target of a data breach targeting the records of as many as four million people. The final estimate of the number of stolen records is approximately 21.5 million. This includes records of people who had undergone background checks, but who were not necessarily current or former government employees. It has been described by federal officials as among the largest breaches of government data in the history of the United States. Information targeted in the breach included personally", "not \"hacktivists\" but criminals. A second, larger, data dump occurred on 20 August 2015, the largest file of which comprised 12.7 gigabytes of corporate emails, including those of Noel Biderman, the CEO of Avid Life Media.\nIn July 2017, Avid Life Media (renamed Ruby Corporation) agreed to settle two dozen lawsuits stemming from the breach for $11.2 million. Impact and ethics None of the accounts on the website need email verification for the profile to be created, meaning that people often create profiles with fake email addresses, and sometimes people who have similar names accidentally confuse their email address, setting up", "and kudos trolling. It is closely linked to fake news, as internet trolls are now largely interpreted as perpetrators of false information, information that can often be passed along unwittingly by reporters and the public alike.\nWhen interacting with each other, trolls often share misleading information that contributes to the fake news circulated on sites like Twitter and Facebook. In the 2016 American election, Russia paid over 1,000 internet trolls to circulate fake news and disinformation about Hillary Clinton; they also created social media accounts that resembled voters in important swing states, spreading influential political standpoints. In February 2019,", "The stolen data is then sent to the cyber criminal or sold in the black market.", "by people who may have been impacted. It's a bit of an unfair game at the moment – attackers and others wishing to use data breaches for malicious purposes can very quickly obtain and analyse the data but your average consumer has no feasible way of pulling gigabytes of gzipped accounts from a torrent and discovering whether they've been compromised or not.\n— Troy Hunt Data breaches Since its launch, the primary development focus of HIBP has been to add new data breaches as quickly as possible after they are leaked to the public.\nIn July 2015, online dating service Ashley Madison, known", "security questions and answers to make them encrypted in the future. In February 2017, Yahoo! notified some users that data from the breach and forged cookies could have been used to access these accounts. This breach is now considered the largest known breach of its kind on the Internet. In October 2017, Yahoo! updated its assessment of the hack, and stated that it believes all of its 3 billion accounts at the time of the August 2013 breach were affected.\nAccording to Yahoo! this new breach was discovered while it was reviewing data given to them from law enforcement from", "than 300 million Americans. The international surveillance tool XKeyscore allows government analysts to search through vast databases containing emails, online chats and the browsing histories of millions of individuals. Britain's global surveillance program Tempora intercepts the fibre-optic cables that form the backbone of the Internet. Under the NSA's PRISM surveillance program, data that has already reached its final destination would be directly harvested from the servers of the following U.S. service providers: Microsoft, Yahoo!, Google, Facebook, Paltalk, AOL, Skype, YouTube, and Apple Inc. Data transfer Federal agencies in the United States: Data gathered by these surveillance programs is routinely", "WikiLeaks servers, including information on the US government's 'no-fly list' and inside information from 20 right-wing organisations, and according to a WikiLeaks statement, 5 gigabytes of data relating to Bank of America, the internal communications of 20 neo-Nazi organisations and US intercept information for \"over a hundred Internet companies\". In Domscheit-Berg's book he wrote: \"To this day, we are waiting for Julian to restore security, so that we can return the material to him, which was on the submission platform.\" In August 2011, Domscheit-Berg claimed he permanently deleted the files \"in order to ensure that the sources are not compromised.\"\nHerbert Snorrason,", "to the internet which was hacked, such as personal emails and passwords. In total Google collected about 600 gigabytes of information from 30 different countries.\nThe Joffe v. Google court case was filed on in November 2010, when Ben Joffe called out Street View for breaching the Wiretap Legislation Act. Joffe, representing the voice of the complainants, configured that Google ruptured the Act, which regulates the collection of actual content of wire and electronic communications and prohibits the intentional interception, use, or disclosure of wire and electronic communications unless a statutory exception applies. The extensive procedure that involved an appeal by", "may have been parts of other data hacks at that time; while some of the sample accounts were still active, they lacked necessary information to fully login properly, reflecting their age. Experts believe that Peace is only a broker of the information that hackers obtain and sell through him. Yahoo! stated they were aware of the data and were evaluating it, cautioning users about the situation but did not reset account passwords at that time. Late 2014 breach The first reported data breach in 2016 had taken place sometime in late 2014, according to Yahoo! The hackers had obtained data", "800,000 files of personal information. Names, Social Security Numbers, and basic contact information was contained in these files, but banking numbers were not. On November 21, 2006, the system administrators noticed unauthorized activity and blocked further access to the database. While it was not conclusive whether the hacker used these records to commit identity theft or fraud, it was determined that very few records were actually accessed and even fewer specifics were obtained.\nIn March 2006 the Regents voted in favor of divestment, becoming the largest university system yet to do so.\nThe UCLA Taser incident occurred on November 14, 2006, when", "year earlier in a data breach, resulting in the theft of approximately 4 million personnel records handled by the office. The Washington Post has reported that the attack originated in China, citing unnamed government officials. By July 9, 2015 the estimate of stolen records had increased to 21.5 million, including those of current government personnel and people who had undergone background checks.\nNew updates regarding this security breach came to light on September 24, 2015. The agency then indicated that additional evidence showed that 5.6 million people's fingerprints were stolen as part of the hacks, more than five times", "as opposed to the information being submitted to the website that the user thought they were on, it is actually sent directly to the hacker. Phishing attacks commonly obtain bank and financial data as well as social networking website information.\nThere are tools that can help users protect their information from phishing attacks and these include the Web browser extensions, which are capable of flagging suspicious websites and links. Development and Controversy Digital privacy is a trending social concern. For example, the TED talk by Eric Berlow and Sean Gourley subsequent to the 2013 mass surveillance disclosures cast a shadow over", "2011. The data did not incorporate visit statistics for the Yahoo!-owned Tumblr website or mobile phone usage.\nOn February 11, 2014, Yahoo! has acquired a social diary company named Wander.\nOn February 13, 2014, Yahoo! acquired Distill, a technical recruiting company.\nOn September 22, 2016, Yahoo disclosed a data breach in which hackers stole information associated with at least 500 million user accounts in late 2014. According to the BBC, this was the largest technical breach reported to date. Specific details of material taken include names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, dates of birth, and encrypted passwords." ]
why is depression so common in our species when the ultimate goal is to pass genes on? Isn't that counterproductive?
[ "Humans, because of the society we have made for ourselves, don't necessarily need to respond to environmental pressures genetically when it comes to passing on our genes.\n\nA person with clinical depression in our society can be treated and still have sex. It's not preventing genes from being passed on, and that's the question you always have to answer when you're thinking about why x wasn't \"fixed\" by evolution. If it doesn't prevent sex, you're not going to see any genetic fixes." ]
[ "candidate gene on depression, either alone or in combination with life stress. Research focusing on specific candidate genes has been criticized for its tendency to generate false positive findings. There are also other efforts to examine interactions between life stress and polygenic risk for depression. Other health problems Depression may also come secondary to a chronic or terminal medical condition, such as HIV/AIDS or asthma, and may be labeled \"secondary depression.\" It is unknown whether the underlying diseases induce depression through effect on quality of life, of through shared etiologies (such as degeneration of the basal ganglia in Parkinson's disease", "situations in which effort to pursue a major goal will likely result in danger, loss, bodily damage, or wasted effort.\" Being apathetic can have a fitness advantage for the organism. Depression has also been studied as a behavioral strategy used by vertebrates to increase their personal or inclusive fitness in the threat of parasites and pathogens.\nThe lack of neurogenesis has been linked to depression. Animals with stress (isolated, cortisol levels) show a decrease in neurogenesis and antidepressants have been discovered to promote neurogenesis. Rene Hen and his colleagues at Columbia University ran a study on rats in which they", "depression have been difficult to identify. Historically, candidate gene studies have been a major focus of study. However, as the number of genes reduces the likelihood of choosing a correct candidate gene, Type I errors (false positives) are highly likely. Candidate genes studies frequently possess a number of flaws, including frequent genotyping errors and being statistically underpowered. These effects are compounded by the usual assessment of genes without regard for gene-gene interactions. These limitations are reflected in the fact that no candidate gene has reached genome-wide significance.\nA 2003 study study proposed that a gene-environment interaction (GxE)", "Depression has a biological explanation to why people lose hope in life. It is caused by the brain because of the hippocampus decreasing in size and the lowering levels of serotonin that circulates through the brain. Another negative symptom that is associated to social comparison bias is suicide ideation. \"Suicide ideation can be defined as the constant thoughts about suicide and suicide attempts. Suicide is the taking of one's own life.\" Suicide ideation can occur due to social comparison bias because people that compare themselves to people that are seen better than themselves get mentally", "looking at environmental causes of depression and neuroscientists looking the brain contribute to different aspects of our knowledge of depression. Workman and Reader also deny the accusation of genetic determinism, asserting that genes usually do not cause behaviors absolutely but predispose to certain behaviors that are affected by factors such as culture and an individual's life history. Adaptive explanations vs. environmental, cultural, social, and dialectical explanations A common critique is that evolutionary psychology does not address the complexity of individual development and experience and fails to explain the influence of genes on behavior in individual cases.\nCritics assert that evolutionary psychology", "allelic differences. This is why turning on or off genes is unlikely to have large effects. Continuity is Genetic and Change is Environmental School performance is influenced by the same genes across life span and dramatic fluctuations in performance are likely to be caused by environment, not biology. Even though it’s likely that emerging biotechnology will make it possible to have predictive genetic information relevant to learning, the predictions can never reach full accuracy because of environmental factors. Genes are Generalists and Environments are Specialists Genes that influence one cognitive ability are likely to influence others as well; for example", "person's fitness through various processes, but too much may reduce fitness by, for example, recurring depressions. Thus, evolution will select for an optimal amount and most people will have neuroticism near this amount. However, genetic variation continually occurs, and some people will have high neuroticism which increases the risk of depressions. Rank theory Rank theory is the hypothesis that, if an individual is involved in a lengthy fight for dominance in a social group and is clearly losing, then depression causes the individual to back down and accept the submissive role. In doing so, the individual is protected from", "due to the greater costs of failing to respond to an actual threat. Therefore, the benefits of depression in terms of reduced mortality are expected to outweigh the costs of depression throughout our evolutionary history both in terms false alarms and the costs of depression in general.\nAlthough serving as an explanation for the association between depression and increased inflammation levels, the host-defense hypothesis cannot currently explain many of the symptoms outside of reduced activity or social withdrawal. For example, both depression’s connection to suicidality and the fact that depression symptoms often persist outside of illness or after a pathogen has", "it inhibits confident and competitive behaviours that are likely to put the individual at further risk of conflict or exclusion (as indicated by symptoms such as low self-esteem and social withdrawal); and it results in signalling behaviours directed toward significant others to elicit more of their support (e.g., the so-called \"cry for help\"). According to this view, the severe cases of depression captured by clinical diagnoses reflect the maladaptive, dysregulation of this mechanism, which may partly be due to the uncertainty and competitiveness of the modern, globalised world. Honest signaling theory Another reason depression is thought to be a pathology", "its genes, there can be true conflict.\nAn example of such a conflict might be a person using birth control to prevent fertilisation, thereby inhibiting the replication of his or her genes. But this action might not be a conflict of the 'self-interest' of the organism with his or her genes, since a person using birth control might also be enhancing the survival chances of their genes by limiting family size to conform with available resources, thus avoiding extinction as predicted under the Malthusian model of population growth. Publication The Selfish Gene was first published by Oxford University Press in 1976", "often fatal, and so may prevent reproduction. Therefore, changes to the genome which prevent cancer (for example, by causing damaged cells to act co-operatively by destroying themselves) are favoured. Multi-level selection theory contends that similar effects can occur, for example, to cause individuals to co-operate to avoid behaviours which favour themselves short-term, but destroy the community (and their descendants) long term. Market effect One theory suggesting a mechanism that could lead to the evolution of co-operation is the \"market effect\" as suggested by Noe and Hammerstein. The mechanism relies on the fact that in many situations there exists a trade-off", "effect. Due to their reduced phenotypic expression and their consequent reduced selection, recessive genes are, more often than not, detrimental phenotypes by causing the organism to be less fit to its natural environment.\nAnother mechanism responsible for inbreeding depression is the fitness advantage of heterozygosity, which is known as overdominance. This can lead to reduced fitness of a population with many homozygous genotypes, even if they are not deleterious or recessive. Here, even the dominant alleles result in reduced fitness if present homozygously (see also hybrid vigour).\nCurrently, it is not known which of the two mechanisms is more prevalent in nature.", "of current society; but it does suggest that many approaches to depression treat symptoms rather than causes, and underlying social problems need to be addressed.\nA related phenomenon to the behavioral shutdown model is learned helplessness. In animal subjects, a loss of control or predictability in the subject's experiences results in a condition similar to clinical depression in humans. That is to say, if uncontrollable and unstoppable stressors are repeated for long enough, a rat subject will adopt a learned helplessness, which shares a number of behavioral and psychological features with human depression. The subject will not attempt to cope with", "in neurotransmitter production or receptors may also play a role in one’s risk of experiencing inflammation-based depression if certain combinations result in increased risk of inflammation, similarly putting them at risk of maladaptive changes in brain chemistry.\nHowever, findings that depression and pro-inflammatory responses do not require the presence of the other for one to develop have led others to argue that the two conditions are often distinct, something which has been suggested to reduce the explanation’s appeal to psychiatrists. Pathogen Host Defense Hypothesis One explanation that sees the connection between depression and inflammation as the result of adaptations is the", "Evolutionary approaches to depression Evolutionary approaches to depression are attempts by evolutionary psychologists to use the theory of evolution to shed light on the problem of mood disorders. Depression is generally thought of as dysfunction, but it is much more common than schizophrenia or autism, and its prevalence does not increase with age the way dementia and other organic dysfunction commonly does. Some researchers have surmised that the disorder may have evolutionary roots, in the same way that others suggest evolutionary contributions to schizophrenia, sickle cell anemia and other disorders. Psychology and psychiatry have not generally embraced evolutionary explanations for", "evidence suggesting that inflammation is not sufficient for the development of major depression, evidence for a lack of complete overlap also comes from findings that depression often occurs without existing immune challenges, with social adversity appearing to cause depression without the requirement of underlying inflammation. Similarly, the existence of variation in the degree to which depressed individuals experience inflammation has also been seen to suggest that it is possible that some instances of depression may occur without inflammation. However, it is possible that all instances of depression involve increased inflammation, something which is consistent with the idea that depression", "unnecessary harm. In this way, depression helps maintain a social hierarchy. This theory is a special case of a more general theory derived from the psychic pain hypothesis: that the cognitive response that produces modern-day depression evolved as a mechanism that allows people to assess whether they are in pursuit of an unreachable goal, and if they are, to motivate them to desist. Social risk hypothesis This hypothesis is similar to the social rank hypothesis but focuses more on the importance of avoiding exclusion from social groups, rather than direct dominance contests. The fitness benefits of forming cooperative bonds", "major depression serve as costly and therefore honest signals of need, they also compel reluctant social partners to respond to that need in order to prevent their own fitness from being reduced. Social navigation or niche change theory The social navigation or niche change hypothesis proposes that depression is a social navigation adaptation of last resort, designed especially to help individuals overcome costly, complex contractual constraints on their social niche. The hypothesis combines the analytical rumination and bargaining hypotheses and suggests that depression, operationally defined as a combination of prolonged anhedonia and psychomotor retardation or agitation, provides a focused sober", "of efficient regulation is the reduction of uncertainty. Humans naturally do not like feeling as if surprise is inevitable. Because of this, we constantly strive to reduce the uncertainty of future outcomes, and allostasis helps us do this by anticipating needs and planning how to satisfy them ahead of time. But it takes a considerable amount of the brain's energy to do this, and if it fails to resolve the uncertainty, the situation may become chronic and result in the accumulation of allostatic load.\nThe concept of allostatic load provides that \"the neuroendocrine, cardiovascular, neuroenergetic, and emotional responses become persistently", "itself may be involved in causing depression. In animal models, the prolonged overreaction of the immune system, in response to the strain of chronic disease, results in an increased production of cytokines (a diverse group of hormonal regulators and signaling molecules). Cytokines interact with neurotransmitter systems—mainly norepinephrine, dopamine, and serotonin, and induce depressive characteristics. The onset of depression may help an individual recover from their illness by allowing them a more reserved, safe and energetically efficient lifestyle. The overproduction of these cytokines, beyond optimal levels due to the repeated demands of dealing with a chronic disease, may result in clinical", "Pathogen Host Defense Hypothesis (PATHOS-D), which proposes that depression is directly tied to immune responses. From this perspective, depression-like symptoms are thought to reduce energy consumption and reallocate resources so that one can mount a stronger immune defense, thereby reducing the organism's risk of death. In addition to this, both the reduction in activity and social withdrawal that often accompanies depression are also suggested to provide benefits by decrease one’s risk of encountering new pathogens or exposing kin or cooperative partners to one’s illness, although they are likely of secondary importance.\nBeyond serving as an explanation for the connection between depression", "allow for additional adaptations that add cognitive symptoms unique to melancholic depression to those stemming from normal sickness behavior.\nAlthough likely consistent with any explanation of the evolution as major depression as the result of psychological adaptations, Andrews and Durisko present the co-option hypothesis as mainly consistent with the analytical rumination hypothesis. From this perspective, major depression is thought to often result in improved problem solving due to the redistribution of energy away from physical activity for increased rumination. As this is thought to be energetically costly, it therefore functions very similarly to sickness behavior with it both being adaptive for", "to postulate that depression could be the result of changes in levels of neurogenesis in the adult brain, specifically in the dentate gyrus. Studies indicate that stress affects neurogenesis by increasing Glucocorticoids and decreasing neurotransmitters such as serotonin. These effects were further verified by inducing stress in lab animals, which resulted in decreased levels of neurogenesis. Additionally, modern therapies that treat depression also promote neurogenesis. Ongoing research is looking to further verify this connection and define the mechanism by which it occurs. This could potentially lead to a better understanding of the development of depression as well as future methods", "for example, that Abraham Lincoln's lifelong depression was a source of insight and strength. Some even suggest that \"we aren't designed to have happiness as our natural default\" and so a state of depression is the evolutionary norm.\nThe following hypotheses attempt to identify a benefit of depression that outweighs its obvious costs.\nSuch hypotheses are not necessarily incompatible with one another and may explain different aspects, causes, and symptoms of depression. Psychic pain hypothesis One reason depression is thought to be a pathology is that it causes so much psychic pain and distress. However, physical pain is also very distressful, yet", "systems including the cardiovascular, renal, immune, and gastrointestinal systems. Current research focuses on the neurotransmitter's relationship with mood-regulation.\nUnder experimentation, mice deficient in the p11 protein display depression-like behaviors. Knockout experiments in which the gene coding for protein p11 was deleted from the mouse genome caused them to show signs of depression. This is also observed in humans. On the other hand, those with sufficient amount of p11 protein behave normally. When mice that showed depressive symptoms were administered anti-depressant drugs, their levels of p11 were found to increase at the same rate, as antidepressants affected their behavioral changes. In addition,", "they become vulnerable to the development of depression. Alternatively, individuals with dominant goal personality value person achievement and success. These individuals become vulnerable to depression when they realize that they cannot or have not reached their goals. More generally, depression has been linked to differences in attributional styles and affect. Negative affect, the tendency to react negatively and to be overly sensitive to negative stimuli, predisposes individuals to depression. Conversely, positive affect, the tendency to react positively and to maintain high energy levels and high amounts of positive emotion, may serve as a buffer against depression. Additionally, the tendency to", "more each) failed to identify any significant association with depression, despite using samples orders of magnitude larger than those from the original publications. In addition to statistical issues (e.g. underpowered studies), population stratification has often been blamed for this inconsistency; therefore caution must also be taken in regards to what criteria define a certain phenotype, as well as other variations in design study.\nAdditionally, because these studies incorporate a priori knowledge, some critics argue that our knowledge is not sufficient to make predictions from. Therefore, results gained from these 'hypothesis-driven' approaches are dependent on the ability to select plausible candidates from", "Therefore, genes are not perfect predictors of future health; individuals with both the high risk form of the gene and those without are all candidates to get the disease. Multiple factors in the environment, particular smoking, diet and exercise, infection, and pollution; play important roles and can be more important than genetic make-up. This makes the results and risks determined by predictive medicine more difficult to quantify. Furthermore, the potential false positives or false negatives that may arise from a predictive genetic screen can cause substantial unnecessary strain on the individual.\nTargeting medication to people who are genetically", "to minimize the chance of creating false positive or negative results. Because this balance can often be difficult, there are several criticisms of the candidate gene approach that are important to understand before beginning such a study. For instance, the candidate-gene approach has been shown to produce a high rate of false positives, which requires that the findings of single genetic associations be treated with great caution. \nOne critique is that findings of association within candidate-gene studies have not been easily replicated in follow up studies.For instance, a recent investigation on 18 well-studied candidate genes for depression (10 publications or", "no specific genes or loci which would indicate risk for depression have emerged. Recent studies estimate that even after successive treatments with multiple antidepressants, almost 35% of patients did not achieve remission, suggesting that there could be an epigenetic component to depression that is not being addressed by current pharmacological treatments. Environmental stressors, namely traumatic stress in childhood such as maternal deprivation and early childhood abuse have been studied for their connection to a high risk of depression in adulthood. In animal models, these types of trauma have been shown to have significant effects on histone acetylation, particularly at gene" ]
The "Economic gap" between the "1%" and the "99%"
[ "This is obviously a very complicated question, ~~Nobel Prize winning~~ economist Thomas Piketty set out to explore it in his book Capital. What it comes down to is this:\n\nIf you make enough money (and only enough) to keep you alive, you will never get any richer. Every day you will earn $5 and at the end of the day you will have $0 left, and so the cycle repeats until you die.\n\nBut if you earn $6, you can put away some of that money. You can save $1 a day and put it in a bank account. You can set the money to work, *to make you more money*. For the super-rich, this is even more extreme. The more money you make, the more you can invest, and the more you make off of those investments that you can then re-invest. It's a positive feedback loop.", "The top \"1%\" has a very America-centric vibe to it. It often means the 1% in countries that are wealthy, not the 1% for the world. If you earn more than $70,000/year... congratulations you're a 1%er.\n\nOne of the problems with the 0.1% is that they accumulate money but don't spend it. In economics with your surplus income you should invest it so that you can earn more. But a lot of these guys just sit on a giant pile of cash. Other 1%ers have similar behaviors, although not as extreme. I invest 15% of my income every year but 20-25% of it is just sitting in a rainy day savings account.\n\nWhy this way of working is particularly bad for the economy is that it means less investment, less opportunities, less jobs, and less consumerism (because if people have less money they buy less stuff).", "One guy with a billion dollars doesn't spend money the same way as a million guys with a thousand dollars.\n\nThe rich tend to keep each other richer. Not always on purpose, but just how the system is in regards to what money ends up where." ]
[ "higher P/E, taking into account the same level of financial performance; therefore, it essentially means a low P/E is the preferred option.\nAn instance in which the price to earnings ratio has a lesser significance is when companies in different industries are compared. For example, although it is reasonable for a telecommunications stock to show a P/E in the low teens, in the case of hi-tech stock, a P/E in the 40s range is not unusual. When making comparisons, the P/E ratio can give you a refined view of a particular stock valuation.\nFor investors paying for each dollar of a company's", "newspaper The Tech (newspaper). Economic context \"We are the 99%\" is a political slogan and an implicit economic claim of \"Occupy\" protesters. It refers to the increased concentration of income and wealth since the 1970s among the top 1% of income earners in the United States.\nIt also reflects an opinion that the \"99%\" are paying the price for the mistakes of a tiny minority within the upper class.\nStudies by the Congressional Budget Office (CBO),the US Department of Commerce, and Internal Revenue Service show that income inequality has grown significantly since the late 1970s, after several decades of stability. Between 1979", "dividends here because dividend policies vary and may be influenced by many factors including tax treatment). Imputed growth acceleration ratio Subsequently, one can divide this imputed growth estimate by recent historical growth rates. If the resulting ratio is greater than one, it implies that the stock would need to experience accelerated growth relative to its prior recent historical growth to justify its current P/E (higher values suggest potential overvaluation). If the resulting ratio is less than one, it implies that either the market expects growth to slow for this stock or that the stock could sustain its current P/E with", "change (fall or rise) in the financial markets.\nThe constant growth dividend discount model for the valuation of the common stock of a corporation is another example. This model assumes that the market price per share is equal to the discounted stream of all future dividends, which is assumed to be perpetual. If the discount rate for stocks (shares) with this level of systematic risk is 12.50%, then a constant perpetuity of dividend income per dollar is eight dollars. However, if the future dividends represent a perpetuity increasing at 5.00% per year, then the dividend discount model, in effect, subtracts", "following day to $60, then the value of the inverse ETF position will increase by 20% (because the asset decreased by 20% from 100 to 80) and then increase by 25% (because the asset decreased by 25% from 80 to 60). So the ETF's value will be $100*1.20*1.25=$150. The gain of an equivalent short position will however be $100–$60=$40, and so we see that the capital gain of the ETF outweighs the volatility loss relative to the short position. However, if the market swings back to $100 again, then the net profit of the short position is zero. However, since", "of 90 indicates a 10-percent decrease in prices. \nTo calculate the percent change in prices between some previous period and a more current period using a PPI, use the following formula\nCurrent period index level - Previous period index level = Index point change\n\nIndex point change ÷ Previous period index level = Proportion of change\n\nProportion of change × 100 = Percent change\nFor example, in the first quarter of 2016, the PPI for final demand increased 0.5 percent because the index levels were 109.7 in March 2016 and 109.1 in December 2015. The percent change is calculated as\n109.7 - 109.1 = 0.6\n\n0.6", "earnings, the P/E ratio is a significant indicator, but the price-to-book ratio (P/B) is also a reliable indication of how much investors are willing to spend on each dollar of company assets. In the process of the P/B ratio, the share price of a stock is divided by its net assets; any intangibles, such as goodwill, are not taken into account. It is a crucial factor of the price-to-book ratio, due to it indicating the actual payment for tangible assets and not the more difficult valuation of intangibles. Accordingly, the P/B could be considered a comparatively conservative metric. Intermediaries and", "Percentage in point In finance, specifically in foreign exchange markets, a percentage in point or price interest point (pip) is a unit of change in an exchange rate of a currency pair.\nThe major currencies (except the Japanese yen) are traditionally priced to four decimal places, and a pip is one unit of the fourth decimal point: for dollar currencies this is to 1/100th of a cent. For the yen, a pip is one unit of the second decimal point, because the yen is much closer in value to one hundredth of other major currencies.\nA pip is sometimes confused with the", "Price–earnings ratio Interpretation As the ratio of a stock (share price) to a flow (earnings per share), the P/E ratio has the units of time. It can be interpreted as the amount of time over which the company would need to sustain its current earnings in order to make enough money to pay back the current share price. While the P/E ratio can in principle be given in terms of any time unit, in practice it is essentially always implicitly reported in years, with the unit of \"years\" rarely indicated explicitly. (This is the convention followed in this article.)\nThe price/earnings", "Market share analysis Detail A market share analysis needs to take into account the following:\nTotal Market Size refers to the annual business volume in currency or in number of transactions;\nMarket Growth Rate refers to the Compounded Annualized Growth Rate (CAGR) taken over a period of 3 to 5 years;\nMarket Share is the breakup of market size in percentage terms, to help identify the top players, the middle and the \"minnows\" of the marketplace, based on the volume of business conducted;\nMarket Segmentation Some of the factors that determine the market are price, quality, speed of service, ease of maintenance, and points", "Price–sales ratio Price–sales ratio, P/S ratio, or PSR, is a valuation metric for stocks. It is calculated by dividing the company's market capitalization by the revenue in the most recent year; or, equivalently, divide the per-share stock price by the per-share revenue. Also, justified p/s is calculated as (profit margin × payout × (1 + g)/(r − g)).\nUnless otherwise stated, P/S is \"trailing twelve months\" (TTM), the reported sales for the four previous quarters, although of course longer time periods can be examined.\nThe smaller this ratio (i.e. less than 1.0) is usually thought to be a better investment since the", "more precisely, with the index commonly quoted by medias, such as the S&P 500 or the Dow Jones Industrial Average. To address this, the V2 ratio divides the excess return of an investment by the quadratic mean of the relative drawdowns. The relative drawdown compares the loss in value of the investment since its previous peak with the loss in value in the benchmark. For instance, if an asset is down 30% since its peak while the market at large is down by 25%, then the relative drawdown is only 5%. The perception of the poor performance of the asset", "to Sales This ratio measures the total company value as compared to its annual sales. A high ratio means that the company's value is much more than its sales. To compute it, divide the EV by the net sales for the last four quarters. This ratio is especially useful when valuing companies that do not have earnings, or that are going through unusually rough times. For example, if a company is facing restructuring and it is currently losing money, then the P/E ratio would be irrelevant. However, by applying an EV to Sales ratio, one could compute what that company", "to 1.1%), 3.5% in Q3 2018 (later revised to 2.9%), 4.1% in Q2 2018 (later revised to 3.5%) and 2.3% in Q1 2018 (later revised to 2.5%). The 4.1% level was the highest since the 4.9% level in Q3 2014. There were four quarters with 4.1% or higher growth during the Obama administration (Q4 2009, Q4 2011, Q2 2014 and Q3 2014).\nThe initial 4.1% figure was boosted by net exports, which contributed 1.1 percentage points to the total due to higher exports to avoid retaliatory tariffs. Critics doubted the sustainability of this export boost. This addition from net exports was", "inequality, was 0 , 49 in 2000, and 1.00 is the worst number and 0.00 is the best.", "earnings growth rates. To compute the PEG ratio, the Forward P/E is divided by the expected earnings growth rate (one can also use historical P/E and historical growth rate to see where it has traded in the past). This will yield a ratio that is usually expressed as a percentage. The theory goes that as the percentage rises over 100% the stock becomes more and more overvalued, and as the PEG ratio falls below 100% the stock becomes more and more undervalued. The theory is based on a belief that P/E ratios should approximate the long-term growth rate of a", "ratio (PER) is the most widely used method for determining whether shares are \"correctly\" valued in relation to one another. But the PER does not in itself indicate whether the share is a bargain. The PER depends on the market’s perception of the risk and future growth in earnings. A company with a low PER indicates that the market perceives it as higher risk or lower growth or both as compared to a company with a higher PER. The PER of a listed company’s share is the result of the collective perception of the market as to how risky the", "means that a £x dividend should result in a £x drop in the share price.\nA more accurate method of calculating this price is to look at the share price and dividend from the after-tax perspective of a share holder. The after-tax drop in the share price (or capital gain/loss) should be equivalent to the after-tax dividend. For example, if the tax of capital gains Tcg is 35%, and the tax on dividends Td is 15%, then a £1 dividend is equivalent to £0.85 of after-tax money. To get the same financial benefit from a capital loss, the after-tax capital loss", "consistent\" with zero interest-rates in the economy \"forever.\"", "ambiguous way to say that an interest rate rose from 10% per annum to 15% per annum, for example, is to say that the interest rate increased by 5%, which could theoretically mean that it increased from 10% per annum to 10.05% per annum. It is clearer to say that the interest rate increased by 5 percentage points (pp). The same confusion between the different concepts of percent(age) and percentage points can potentially cause a major misunderstanding when journalists report about election results, for example, expressing both new results and differences with earlier results as percentages. For example, if", "PEG ratio The 'PEG ratio' (price/earnings to growth ratio) is a valuation metric for determining the relative trade-off between the price of a stock, the earnings generated per share (EPS), and the company's expected growth.\nIn general, the P/E ratio is higher for a company with a higher growth rate. Thus, using just the P/E ratio would make high-growth companies appear overvalued relative to others. It is assumed that by dividing the P/E ratio by the earnings growth rate, the resulting ratio is better for comparing companies with different growth rates.\nThe PEG ratio is considered to be a convenient approximation. It", "to others it's worth only $0.70 (of before-tax income in both cases). A typical half-yearly dividend (in 2005) of 2% of the share price would mean an extra 0.85% in franking credits, an amount which might easily be swamped by brokerage and the general risks noted above. United States In the United States, dividends may qualify for a lower rate. However, among other things, the stock must be owned for more than 60 days out of a 121-day period around the ex-dividend date.", "Dividend future In finance, a dividend future is an exchange-traded derivative contract that allows investors to take positions on future dividend payments. Dividend futures can be on a single company, a basket of companies, or on an Equity index. They settle on the amount of dividend paid by the company, the basket of companies, or the index during the period of the contract.\nFor example, if company A pays a quarterly dividend of $0.25 in 2012. If an investor buys a 2012 dividend future, the settlement price of the future will be equal to 4 x $0.25 = $1 per", "Assuming that two stocks have the same earnings growth, the one with a lower P/E is a better value. The P/E method is perhaps the most commonly used valuation method in the stock brokerage industry. By using comparison firms, a target price/earnings (or P/E) ratio is selected for the company, and then the future earnings of the company are estimated. The valuation's fair price is simply estimated earnings times target P/E. This model is essentially the same model as Gordon's model, if k-g is estimated as the dividend payout ratio (D/E) divided by the target P/E ratio. Limited high-growth period", "1%, by the 1%, for the 1%\" in Vanity Fair, in which he was criticizing the economic inequality present in the United States. In the article Stiglitz spoke of the damaging impact of economic inequality involving 1% of the U.S. population owning a large portion of economic wealth in the country, while 99% of the population hold much less economic wealth than the richest 1%:\n[I]n our democracy, 1% of the people take nearly a quarter of the nation's income … In terms of wealth rather than income, the top 1% control 40% … [as a result] the top 1% have", "the future. Forward P/Es are computed by taking the current stock price divided by the sum of the EPS estimates for the next four quarters, or for the EPS estimate for next calendar or fiscal year or two.\nP/Es change constantly. If there is a large price change in a stock, or if the earnings (EPS) estimates change, the ratio is recomputed. Price earnings to growth (PEG) ratio This valuation technique has really become popular over the past decade or so. It is better than just looking at a P/E because it takes three factors into account; the price, earnings, and", "a party obtains 41% of the vote and this is said to be a 2.5% increase, does that mean the earlier result was 40% (since 41 = 40 × (1 + )) or 38.5% (since 41 = 38.5 + 2.5)?\nIn financial markets, it is common to refer to an increase of one percentage point (e.g. from 3% per annum to 4% per annum) as an increase of \"100 basis points\". Word and symbol In British English, percent is usually written as two words (per cent), although percentage and percentile are written as one word. In American English, percent is the", "caused by the tax.\nThe area represented by the triangle results from the fact that the intersection of the supply and the demand curves are cut short. The consumer surplus and the producer surplus are also cut short. The loss of such surplus that is never recouped and represents the deadweight loss.\nSome economists like James Tobin have argued that these triangles do not have a huge impact on the economy, but others like Martin Feldstein maintain that they can seriously affect long-term economic trends by pivoting the trend downwards and causing a magnification of losses in the long run. Hicks vs.", "Lp=(Pp-MC)/Pp. Ps is the price charged in Ms while Pp is the price charged in Mp.\nThis result confirms the validity of the market segmentation index, which is a comparative measure of the degree of monopoly power in two distinctive markets for products that have the same marginal costs. The result says that when the price in the primary market is strictly greater than the price in the secondary market then the Lerner's index is higher in the primary market and therefore the market segmentation index would also be higher for the primary market.", "in various financial markets, mainly in Europe, and Asia, and several Blue chip companies and Equity Indices are available with maturities going as long as 5 years for Equities and 10 years for Equity indices. History In 1999 Professor Michael J. Brennan of the University of California at Los Angeles proposed the creation of dividend strips for the S&P 500. He argued that these would \"enhance the ability of markets to aggregate and transmit information\" and that \"since the level of the market index must be consistent with the prices of the future dividend flows, the relation between these will" ]
What would happen if you were quiet for years?
[ "The vocal folds (also known as your vocal cords) are mucous membranes. Unlike muscles, which can atrophy and deteriorate from lack of use, using or not using the vocal cords doesn't really make a huge difference in their well-being. You might have some voice breaking or stammering when you try to speak again after a long time, but it's not like they would waste away from lack of use. \n\nI believe that the biggest impact from lack of speaking would be more psychological. If you're in a situation where you can manage to not speak for any reason, you probably will not have a lot of human contact, which can affect your mental health in various different ways.", "For a case study on this read up on [John Francis](_URL_0_ who didn't speak for [17 years](_URL_1_).", "The systems in your body that you use to produce speech are also used for breathing, swallowing food, clearing your throat, coughing, and all manner of other things. You use your lungs (which if you stopped using, you'd die!), your diaphragm, your lips, your tongue, and your muscles in your throat.\n\nWhat can happen is that you may forget /how/ to speak. People who've been in isolation for a long time often have trouble speaking out loud to people when they get back in contact with other people. Instead, because they're so used to internalising all their thoughts, they tend to avoid speaking, even though they're perfectly capable of speaking.", "Theres a guy who did that. I heard about him on TED radio hour. \n\n[Found it] (_URL_2_).\n\nHe can definitely talk. Even though he remained silent for 17 years. Whoa thats cool." ]
[ "out in pain. The barking of beagles slowly rises and rises, only to fall silent immediately when the prisoner looks up to see what he heard.\nThat night he stays awake by his fire, sickle in hand. After hours of silence he finally hears the song that played the night before. He decides to run out of the woods and escape the forest. He runs for hours until the sun comes up, never once finding a way out of the forest. As he grows tired and weary and subsequently more lost and confused, he comes upon a figure, a vagabond, in", "when I walked in everyone stopped talking. The place was so quiet you could hear a pin drop. It was just as quiet as a death chamber. I knew something must be wrong. ... Everyone acted as though I might pull out a machine gun and turn it on them at any minute. As soon as I stepped outside, the talking started again. ... \"\nShe told her husband about the ominous behavior of the crowd in the Tavern, and he told her to go to the other cabin and tell Clyde (they apparently still were not speaking). Clyde, despite his", "for example). During the moment of silence, participants may typically bow their heads, remove hats, and refrain from speaking or moving for the duration. Origins The first recorded instance of an official moment of silence dedicated to a person's death took place in Portugal on February 13, 1912. The Portuguese Senate dedicated 10 minutes of silence to José Maria da Silva Paranhos Júnior, baron of Rio Branco, Brazil, and Minister of the Exterior of the Brazilian government, who had died three days earlier on February 10. This moment of silence was registered in the Senate's records of that day. In", "time with others. Yoshida Kenkō, a famous Japanese recluse and author of Essays in Idleness was known to maintain very close ties with members of the Ashikaga shogunate, suspending his isolation from time to time in order to visit such members in the capital. Kamo no Chomei, in his essay An Account of My Hut, mentions spending time with a young child while living in isolation. While it was not necessarily the intent of these recluses to live their life entirely without human contact, it is important to note that the isolation of said individuals was not, in fact, complete.", "11 seconds, one second for every victim who lost their life. Sports Sports teams that observed a moment of silence for the shooting victims included the Pittsburgh Steelers at their home game against the Cleveland Browns, the New Orleans Saints at the Minnesota Vikings, the Pittsburgh Penguins at the Vancouver Canucks, the Winnipeg Jets at the Toronto Maple Leafs, the Philadelphia Eagles and the Jacksonville Jaguars playing in London, and the Pittsburgh Panthers hosting Duke at Heinz Field. A moment of silence was also observed before Game 4 of the World Series at Dodger Stadium on the night of October", "in Cape Town, South Africa, where there was a two-minute silence initiated by the daily firing of the noon day gun on Signal Hill for a full year from 14 May 1918 to 14 May 1919, known as the Two Minute Silent Pause of Remembrance.\nThis was instituted by the then Cape Town Mayor, Sir Harry Hands, at the suggestion of councillor Robert Rutherford Brydone, on 14 May 1918, after receiving the news of the death of his son Reginald Hands by gassing on 20 April, adopting into public observance a gesture that had been practised sporadically in city churches since", "Big Ben clock chiming 11 and the buglers sounding the Last Post at 11:02am. \nIn Israel, moments of silence are held in memory of the victims of the Holocaust on Yom HaShoah and in memory of fallen soldiers and of terrorist victims on the day before Israel's independence day.\nMoments of silence are often observed prior to sports matches, with reasons for silences ranging from national and international tragedies, to the death of individuals connected to the sport or specific clubs. Silent prayer Quakers have practised silent prayer, including moments of silence during other group activities, for more than 300 years.", "and would ring a bell signaling they were alive. When the bell stopped ringing the air tube was removed. Japan banned unburying in 1879, and assisted suicide—including religious suicide—is now illegal.\nMy affair will become a big one, not only get known by the Xianghe county, but by the whole China and eventually by the whole world.(我的事大着呢,不但让香河县知道,还要让全中国知道,最后让全世界都知道。)\n— Zhou Fengchen\nMy original life span should have been 81 years, but I leave my fortune and life of the last 20 years to all suffering lives. After I leave this world for Sukhavati, don't burn my body, or bury it. Leave my body quietly, it", "observed two-minutes of silence in his honour.", "great silence of 1973.' Crouch follows this by holding a 'silence far longer than is bearable'. Similarly, at one point in An Oak Tree, Crouch leaves the second actor alone on stage for an uncomfortable length of time. Unease is taken to extremes in The Author, where audience members are given the freedom to walk out. In 2005, Crouch told the Herald Scotland, 'Unease is not an emotion I get often in the theatre and I like it. I'd rather have that visceral response to something than just sit through a piece of theatre that's been made by people who", "The Long Loud Silence Synopsis Gary, an army corporal, wakes up in a hotel room in Illinois following a drunken binge. He discovers that the town is deserted except for a handful of corpses and comes to the realization that the country has been subjected to an attack. He discovers one other survivor, a girl of 19. They take a car and, after filling it with supplies, drive toward Chicago, which they find to be in flames. They drive west, only to discover that almost all bridges over the Mississippi have been disabled; the one remaining bridge is", "the hills. Xiaolian, how can you remain in bed and occupy yourself with grief when you can't afford the luxury of time for such behaviour like any other person?\"\n\nSun Quan's biography in the Sanguozhi recorded that Zhang Zhao told the young Sun Quan: \n\"Xiaolian, is this the time for crying? When the Duke of Zhou set the rules for a funeral, his son Bo Qin didn't follow them. It wasn't because he wanted to defy his father, but because it didn't suit the circumstances at the time. Now, when many treacherous figures are fighting for power and villains control the", "The Quiet Man (video game) Plot A young and deaf boy named Dane interrupts a quarrel between his friend, Taye, and a bully, Isaac, that results in Dane's mother Lorraine getting shot by Taye and Isaac struggling over a gun. Isaac takes credit for the killing and is arrested while Taye runs away. Dane's policeman father, Robert, blames Dane for his wife's death and becomes abusive toward him. Dane, traumatized by these events, makes up a character in his drawings named \"The Quiet Man\", who resembles a plague doctor.\nYears later, Dane serves as an enforcer for Taye, who runs a", "was intended to prevent coercion not merely to require a \"disclosure of legal facts\". The present decision \"allow[ed] a waiver of the right to occur after interrogation had commenced, through a response to that interrogation\". As a result, two subtly different meanings of \"right to remain silent\" could be construed, and a suspect who was (in the words of Miranda v. Arizona) \"vulnerable, unassertive, and in need of protection\"—precisely the kind of suspect Miranda aimed at protecting—would be left unaware:\nthat one must utter magic words to go from possessing only one of these rights (to remain silent while interrogation takes", "a moment of silence was observed before the Pirates game with the Arizona Diamondbacks at PNC Park that night. He was buried at Lakeview Memorial Gardens in Avon Park.", "he jokingly declared: \"The party shall not end until everyone gets dead drunk.\"\n\nZhang Zhao did not say anything, put on a stern face, walked out of the party, and sat inside his carriage alone. Sun Quan sent someone to ask him to come back, and then asked him: \"This is a time for all of us to make merry and be happy. Sir, why are you angry?\" Zhang Zhao replied: \n\"In the past, when King Zhou of the Shang dynasty spent much of his time feasting and drinking, everyone said that it was a time for enjoyment and no one", "The Moment of Silence Story The game is set in the year 2044 in downtown New York City, in a future with many Orwellian influences. The player plays an advertising agency worker named Peter Wright, who is depressed and drinking heavily after the death of his wife and child in a terrorist attack. One night, as he is drinking, he hears a commotion in the hall. Looking out through the peephole in his apartment door, he sees a SWAT team storm the apartment of his next door neighbor and carry out a middle-aged man, much to the pain and", "Sound of Silence (2017 film) Plot Set in a Himalayan valley, this film is about the journey of a mute boy who lost his mother at birth and is neglected by his father. When his father is sent to jail, the boy faces a lonely future. The boy's connection to a Buddhist monk helps him gain strength and transcend his suffering. With nowhere to go and facing unrequited love, he joins a Buddhist monastery.", "reliable and more subject to abuses than a system relying on independent investigation.\"\nAlthough giving \"sporadic\" comments during the interview, no answers had been given that touched upon the case. The Court had not previously considered \"whether a suspect can invoke the right to remain silent by remaining uncooperative and nearly silent for 2 hours and 45 minutes\" and the dissent considered that silence throughout a lengthy interrogation \"long past the point when he could be deciding whether to respond[,] cannot reasonably be understood other than as an invocation of the right to remain silent\". Butler also distinguished between a \"sufficient", "in the morning the prisoner came and said she wished to apologise for the noise they had made in the night; she said, \"You have given us notice and we have got to go\". I said, \"Yes, you have got to go tomorrow Tuesday, but he will stop another week\". The deceased had asked me if he might stop for another week, and I agreed to it. The prisoner said, \"Well, next week you will hear something very dreadful\". I said, \"What is it?\" and she said,'\"Well, Madam, don't you tell him if I tell you, because he bangs me", "comfort in that at least. Can't you? You'll never be lonely again. You'll never be without a police siren. I promise you\" (29–30). Rebecca says that while the sound of the siren is \"fading away,\" she \"knew it was becoming louder and louder for somebody else\" (29) and while its doing so made her \"feel insecure! Terribly insecure\" (31), she hates the siren's \"fading away; I hate it echoing away\" (31). (At the end of the play, an \"Echo\" of her words occurs.)\nRebecca tells Devlin that she had been writing a note, and that when she put the pen she", "in the long-running Web Series Homestar Runner, has taken a vow of silence, and has only had two speaking roles in the 19 years the series has been running.\n\"The Cartoon\", a season 9 episode of Seinfeld, featured Kramer taking a vow of silence.\nThe 2009 movie G.I. Joe: The Rise of Cobra featured Snake Eyes taking a vow of silence.\nThe 2011 movie The Hangover: Part II featured a Buddhist monk taking a vow of silence as part of the film's plot.\nThe 2017 television show The Good Place featured Jianyu, a Buddhist monk, taking a vow of silence.\nThe HBO TV series Curb", "Silence\"] in 1979.", "capital, or otherwise infamous crime ... nor shall be compelled in any criminal case to be a witness against himself ...\nAdditionally, under the Miranda ruling, a person also has the right to remain silent while in police custody so as to not reveal any incriminating information. In order to invoke this constitutional right to remain silent, a person must explicitly and unambiguously tell officers that they are exercising this right to remain silent. Therefore, staying silent without a prior exclamation that you are exercising this constitutional right does not invoke the right.\nIn Miranda v. Arizona (1966) the United States Supreme Court ruled", "of ways which included being swung up in a hammock, her hands and feet extended. As expected, the noises commenced, but stopped once Elizabeth was made to place her hands outside the bed. For two nights the ghost was silent. Elizabeth was told that if no more noises were heard by Sunday 21 February, she and her father would be committed to Newgate Prison. Her maids then saw her conceal on her person a small piece of wood about 6 by 4 inches (150 by 100 mm) and informed the investigators. More scratches were heard but the observers concluded", "diving Zero in her head and nothing can make the noise stop. The memory of her father's death begins to upset her studies and her relationships.", "A moment of silence was kept during all professional football matches as well as at the FIFA Club World Cup in Japan. SV Nieuw Sloten suspended all further activities for the remainder of the season following the incident. The players and the father were convicted of manslaughter, and the disciplinary committee of the Royal Dutch Football Association banned five players from football for life, and suspended one player who showed obvious remorse for a period of 60 months.\nIn February 2016, a referee had to be brought to safety after being attacked by players of Nieuw Sloten, after which the club", "the absence of time is one of the key aspects of their punishment. The proprietor then warns the guest not to anger him, as it would unleash his dark side (the Coffin Joe-esque figure scene at the start of the film). \nThe scene switches to daytime, and the wealthy man returns to the site of the hostel with the police. Rather than the hostel, there is a cemetery with a funeral in progress. Laughing off the incident as confusion, the man and police leave. The coffin is the same from which the hostel proprietor rises at the beginning of the", "to Hide and Cry\" was recorded on July 16, 1966, and \"If Loneliness Don't Kill Me\" was recorded on October 5.", "was amended several times during \"The Emergency\" (1975–1977), leading to human rights violations. It was subsequently repealed after Indira Gandhi lost the election in 1977, and the new government took over. Japan In Japan, pre-trial detention of a suspect can be for up to 23 days without charge. The length of detention, up to the maximum period, is at the discretion of the public prosecutor and subject to the approval of local courts. It can also be further extended. Malaysia In Malaysia the Internal Security Act 1960 (ISA) was a preventive detention law that was enacted after Malaysia gained independence" ]
SMPTE Timecode
[ "Timecode is used in multiple ways throughout the production process. The most recognizable of which is the [slate or \"clapper\"](_URL_0_) The clapper is used to sync the video and audio track by creating a known point on both tracks (When the sound is made on the audio track, and when the clapper closes on the video) During editing, TONS of notes are made, mostly using timecode as a reference point. And finally, when the show or ad is broadcasted, the timecode ensures that there are no black frames (We call them \"flash frames\") in between different spots or shows. \n\nTimecode is also important for determining which broadcast standard is used. In the US, we use 29.97 frames per second (NTSC), so we use a special frame count called dropframe. Dropframe skips 2 frames per minute except every 10th minute. Other regions/formats are more straightforward and have a whole number like 24, 25, or 30 fps.", "Timecode is a method to identify every frame on a videotape and then later, audio tape recorders and hard disk recorders. It uses HH MM SS FR. When video editing began to utilize computers, there needed to be a reliable method for the computer editor to manipulate or talk to the VTR. \n\nThe Society of Motion Picture and Television Engineers (SMPTE) researched and finalized the protocol. (_URL_1_) In the beginning, the time code was recorded as an analog signal on the cue track. The human editor could identify a scene as a source time code and either enter the number or grab it on the fly. The editor could trim the number back and forth to gain access to the beginning of the scene. He/she could then do the same to the record VTR. The editor could then preview the edit over and over, trimming the source and record VTRs to his/her liking. If everything was good to go, he/she could then record from the source VTR to the record VTR in a very precise manner and when the scene is recorded, the edit computer would create a new line in the EDL (edit decision list). \nBecause the EDL was stored, the editor could go back and change a scene without fear of destroying the rest of the recorded tape. The EDL could be stored on disk for later retrieval to continue a project or fix an earlier decision.\nTime code quickly evolved to audio recorders and eventually digital disk recorders. Since an audio tape does not have a series frames, it can still be encoded with time code. However, the audio tape will also have another track which has a frame pulse locked to the video which keeps the sound in sync with the video. The prevents time code drift which can be quite large in a short time. The edit computer will compare the VTRs and ADRs during a preroll and lock them in time for the record enabling command. If all goes well, and sometimes it didn't, the edit computer would do the edit and stop after it came out of record.\n\nAre you still there? It was and still is a very complicated process. It was much harder in the beginning because the VTRs were all analog machines which didn't much like to be told to be in sync within a 7 second preroll. Eventually, things got a lot easier." ]
[ "SMPTE timecode Discontinuous timecode, and flywheel processing Timecodes are generated as a continuous stream of sequential data values. In some applications wall-clock time is used, in others the time encoded is a notional time with more arbitrary reference. After making a series of recordings, or after crude editing, recorded timecodes may consist of discontinuous segments.\nIn general it is not possible to know the linear timecode (LTC) of the current frame until the frame has already gone by, by which time it is too late to make an edit. Practical systems watch the ascending sequence of the timecode, and infer the", "Burnt-in timecode Burnt-in timecode (often abbreviated to BITC by analogy to VITC) is a human-readable on-screen version of the timecode information for a piece of material superimposed on a video image. BITC is sometimes used in conjunction with \"real\" machine-readable timecode, but more often used in copies of original material on to a non-broadcast format such as VHS, so that the VHS copies can be traced back to their master tape and the original time codes easily located.\nMany professional VTRs can \"burn\" (overlay) the tape timecode onto one of their outputs. This output (which usually also displays the setup menu", "Erasure code In coding theory, an erasure code is a forward error correction (FEC) code under the assumption of bit erasures (rather than bit errors), which transforms a message of k symbols into a longer message (code word) with n symbols such that the original message can be recovered from a subset of the n symbols. The fraction r = k/n is called the code rate. The fraction k’/k, where k’ denotes the number of symbols required for recovery, is called reception efficiency. Optimal erasure codes Optimal erasure codes have the property that any k out of the n code word symbols", "IRIG H time code and the time code that WWVB transmits, except the individual fields of the code are rearranged and are transmitted with the least significant bit sent first. Like the IRIG timecode, the time transmitted is the time of the start of the minute. Also like the IRIG timecode, numeric data (minute, hour, day of year, and last two digits of year) are sent in binary-coded decimal (BCD) format rather than as simple binary integers: Each decimal digit is sent as two, three, or four bits (depending on its possible range of values). Establishment The earliest", "timecode has been used to synchronise tape machines. Modern SMPTE timecode controlled recorders provide a mechanism so that the second machine will automatically position the tape correctly and start and stop simultaneously with the master machine. However, in 1967, SMPTE timecode was not available and other techniques had to be used.\nOn 10 February 1967 during the recording of \"A Day in the Life\", Ken Townsend synchronised two machines so that extra tracks were available for recording the orchestra. Speaking in an interview with Australia's ABC, Geoff Emerick described the technique; EMI tape machines' speed could be controlled using an external", "Each timecode frame is one seventy-fifth of a second, and corresponds to a block of 98 channel-data frames—ultimately, a block of 588 pairs of left and right audio samples. Timecode contained in the subchannel data allows the reading device to locate the region of the disc that corresponds to the timecode in the TOC. The TOC on discs is analogous to the partition table on hard drives. Nonstandard or corrupted TOC records are abused as a form of CD/DVD copy protection, in e.g. the key2Audio scheme. Tracks The largest entity on a CD is called a track. A CD can", "time of the current frame from that.\nAs timecodes in analog systems are prone to bit-errors and drop-outs, most timecode processing devices check for internal consistency in the sequence of timecode values, and use simple error correction schemes to correct for short error bursts. Thus, a boundary between discontinuous timecode ranges cannot be determined exactly until several subsequent frames have passed. Color framing and timecode A color framing bit is often used to indicate field 1 of the color frame, so that editing equipment can make sure to edit only on appropriate field boundaries in order to prevent picture corruption. Studio", "to transmit digitally coded time information by reducing the amplitude of the carrier to 15% of normal (−16½ dB) for 0.1 or 0.2 seconds at the beginning of each second. A 0.1 second reduction (7750 cycles of the 77500 Hz carrier amplitude) denotes a binary 0; a 0.2 second reduction denotes a binary 1. As a special case, the last second of every minute is marked with no carrier power reduction.\nThere was also a Morse code station identification until 2006, sent during minutes 19, 39 and 59 of each hour, however this was discontinued as the station is easily identifiable by the", "of the time limit and the stopping and restarting of the A* algorithm to find an initial, possibly suboptimal solution, and then continues to search for improved solutions until meeting to a provably optimal solution. Pseudocode To avoid changes in implemented A* Algorithm, the pseudocode implements a sub-module class called as control manager class (ctr_manager), which takes care of the time limit and the stopping and restarting of the A* algorithm. \npublic class ctr_manager{\n bool is_First = true;\n Node new_Solution = null;\n public void run_A*( )\n {\n thread.sleep( sleep_Time );\n ", "Timecode (2000 film) Plot The film takes place in and around a film production company office, and involves several interweaving plot threads which include a young actress named Rose (Salma Hayek) who tries to score a screen test from her secret boyfriend Alex Green (Stellan Skarsgård), a noted but disillusioned director. Meanwhile, Rose's tryst with him is discovered by her girlfriend Lauren (Jeanne Tripplehorn), an insanely jealous businesswoman who plants a microphone in Rose's purse and spends most of the time in the back of her limousine parked outside the office building listening in on Rose's conversations. Elsewhere, Alex's wife", "of microcode storage.\nRead-only control storage for microcode employs \"balanced capacitor technology\" (BCROS) with cycle time of 500 nanoseconds, designed by Anthony Proudman in IBM's Hursley laboratory and implemented by Fernando \"Fred\" Neves. This technology uses two capacitors to represent each bit. Time-sharing (CALL/OS) IBM advertised time-sharing capability by featuring what originally was known as CALL/360 (note the 'SLASH' - which was retained in the name of its successor) and later was named CALL/OS. CALL/OS featured its own versions of BASIC as well as FORTRAN IV and PL/I, rather than the versions implemented by the MFT/MVT compilers known as", "time representations were published in 1992, but only for six-digit codes or less.\nSource code for seven and eight digit codes was written in C and Perl and posted anonymously in 2003.", "second is transmitted at full strength) are not used for essential time code information. Announcement bits The phase-modulated code contains additional announcement bits useful for converting the broadcast UTC to civil time.\nIn addition to the DST and leap second warning bits found in the amplitude-modulated code, an additional DST schedule field provides several months advance warning of daylight saving time rules.\nA final bit, the \"notice\" bit, indicates that there is an announcement of interest to WWVB users posted at nist.gov/pml/div688/grp40/wwvb.cfm.\nTwo reserved bits are not currently defined, but not guaranteed to be zero; note that one of them is transmitted as", "Time code ambiguity In telecommunication, time code ambiguity is the shortest interval between successive repetitions of the same time code value.\nFor example, in a time code in which year-of-century (the '72' in 10/04/72) is the most slowly changing field, the time code ambiguity would be 100 years; it is ambiguous whether this value refers to a date in 1872, 1972 or some other century. For a digital clock in which hours and minutes up to a maximum of 11:59 are displayed, the time code ambiguity would be 12 hours.\nThe Year 2000 problem is an example of the pitfalls of time", "used in operating systems and file formats. In Unix-like operating systems, date is a command which will print or set the current time; by default, it prints or sets the time in the system time zone, but with the -u flag, it prints or sets the time in UTC and, with the TZ environment variable set to refer to a particular time zone, prints or sets the time in that time zone. Definition Two layers of encoding make up Unix time. The first layer encodes a point in time as a scalar real number which represents the number of seconds", "CPUs and zero network latency. The operational requirement is that the transcoder delay should be less than 30 ms. The transcoder delay is defined as the time interval between the instant a speech frame of 160 samples has been received at the encoder input and the instant the corresponding 160 reconstructed speech samples have been out-put by the speech decoder at an 8 kHz sample rate. Implementations The free libgsm codec can encode and decode GSM Full Rate audio. \"libgsm\" was developed 1992–1994 by Jutta Degener and Carsten Bormann, then at Technische Universität Berlin. Since a GSM speech frame is", "displays a time with accuracy to either 0.01 or 0.001 seconds, depending on the version of the timer. Generation 3 and newer timers can resolve milliseconds (three decimal digits) while older timers only resolve to hundredths of a second (two decimal digits). \nThe StackMat timer is sometimes included with a mat that is made of neoprene, the same material commonly used in mouse pads. Some timers also glow in the dark. Others have a data port that allow it to be connected to an external display to allow for an audience to watch the timer in real time. \nIn competitions", "a specified time interval, the messages will be deleted from both the sender's and the receivers' devices. The time interval can be between five seconds and one week long, and the timer begins for each recipient once they have read their copy of the message. The developers have stressed that this is meant to be \"a collaborative feature for conversations where all participants want to automate minimalist data hygiene, not for situations where your contact is your adversary\".\nSignal excludes users' messages from non-encrypted cloud backups by default.\nSignal has support for read receipts and typing indicators, both of which can be", "below), directly encoding the Unix time number as described in the preceding section. Being 32 bits means that it covers a range of about 136 years in total. The minimum representable date is Friday 1901-12-13, and the maximum representable date is Tuesday 2038-01-19. One second after 03:14:07 UTC 2038-01-19 this representation will overflow. This milestone is anticipated with a mixture of amusement and dread—see year 2038 problem.\nIn some newer operating systems, time_t has been widened to 64 bits. This expands the times representable by approximately 293 billion years in both directions, which is over twenty times the present age of the", "read errors can cause a timecode to be unreadable even if a single bit is misread. A bit that has become unreadable due to a scratch can make an entire 40 bit long time code permanently unreadable. Dust can have a similar effect on the time code. The time code implements very little error checking, an attribute strong in a number of other vinyl control systems.", "to generate relatively long timing intervals by programming timer B to count timer A underflows. If both timers were loaded with the maximum interval value of 65,535, a timing interval of one hour, 11 minutes, 34 seconds would result. Time-of-Day (TOD) Clock A real-time clock is incorporated in the CIA, providing a timekeeping device more conducive to human needs than the microsecond precision of the interval timers. Time is kept in the American 12-hour AM/PM format. The TOD clock consists of four read/write registers: hours (with bit 7 acting as the AM/PM flag), minutes, seconds and tenths of a", "include an arrowhead symbol to denote a unit time delay, as time delays must be accounted for in a synchronous design. He points out that in one microsecond an electric pulse moves 300 meters so that until much higher clock speeds, e.g. 10⁸ cycles per second (100 MHz), wire length would not be an issue.\nThe need for error detection and correction is mentioned but not elaborated. Memory design A key design concept enunciated, and later named the Von Neumann architecture, is a uniform memory containing both numbers (data) and orders (instructions).\n\"The device requires a considerable memory. While it appeared that", "Elapsed real time Elapsed real time, real time, wall-clock time, or wall time is the actual time taken from the start of a computer program to the end. In other words, it is the difference between the time at which a task finishes and the time at which the task started.\nWall time is thus different from CPU time, which measures only the time during which the processor is actively working on a certain task. The difference between the two can arise from architecture and run-time dependent factors, e.g. programmed delays or waiting for system resources to become available. Consider the", "by CiA 603, CAN Frame time-stamping – Requirements for network time management) is supported with a resolution of 1 nano-second. Usage The following code snippet shows the initialisation of a microcontroller.\n#include \"cp_core.h\" // CANpie core functionsvoid MyCanInit(void){\n CpPort_ts tsCanPortT; // logical CAN port\n //---------------------------------------------------\n // setup the CAN controller / open a physical CAN\n // port\n //\n memset(&tsCanPortT, 0, sizeof(CpPort_ts));\n CpCoreDriverInit(eCP_CHANNEL_1, &tsCanPortT, 0);\n //---------------------------------------------------\n // setup 500 kBit/s\n //\n CpCoreBitrate(&tsCanPortT,\n ", "Word clock Comparison to timecode Word clock should not be confused with timecode; word clock is used entirely to keep a perfectly timed and constant bitrate to avoid data errors. Timecode is actual data (technically metadata) about the media being transmitted, and is optional, being sent in a higher layer. Time code can be used as an initial phase reference for jam sync using the word clock as the frequency reference. Over coax cable Professional digital audio equipment may have a word clock input or output to synchronize timing between multiple devices. Although the electrical characteristics of the word", "format do not vary with language or locale. WMI can also be queried using a variety of application programming interfaces, including VBScript or PowerShell. Uptime.exe Microsoft formerly provided a downloadable utility called Uptime.exe, which reports elapsed time in days, hours, minutes, and seconds.\nC:\\>Uptime\nSYSTEMNAME has been up for: 2 day(s), 4 hour(s), 24 minute(s), 47 second(s)\nThe time given by Uptime.exe is not reliable. It does not take into account time spent in sleep or hibernation. Thus, the boot time will drifts forward every time the computer sleeps or hibernates. FreeDOS The uptime command is also available for FreeDOS.", "Timestamping (computing) In computing timestamping refers to the use of an electronic timestamp to provide a temporal order among a set of events.\nTimestamping techniques are used in a variety of computing fields, from network management and computer security to concurrency control. For instance, a heartbeat network uses timestamping to monitor the nodes on a high availability computer cluster.\nTimestamping computer files (updating the timestamp in the per-file metadata every time a file is modified) makes it possible to use efficient build automation tools.", "a Vandermonde matrix. Near-optimal erasure codes Near-optimal erasure codes require (1 + ε)k symbols to recover the message (where ε>0). Reducing ε can be done at the cost of CPU time.\nNear-optimal erasure codes trade correction capabilities for computational complexity: practical algorithms can encode and decode with linear time complexity.\nFountain codes (also known as rateless erasure codes) are notable examples of near-optimal erasure codes. They can transform a k symbol message into a practically infinite encoded form, i.e., they can generate an arbitrary amount of redundancy symbols that can all be used for error correction. Receivers can start decoding after they have received", "such conversions may also deal with adjustments for timezones, daylight saving time (DST), leap seconds, and the user's locale settings. Library routines are also generally provided that convert calendar times into system times. Other time measurements Closely related to system time is process time, which is a count of the total CPU time consumed by an executing process. It may be split into user and system CPU time, representing the time spent executing user code and system kernel code, respectively. Process times are a tally of CPU instructions or clock cycles and generally have no direct correlation to wall time.\nFile", "Coded mark inversion In telecommunication, coded mark inversion (CMI) is a non-return-to-zero (NRZ) line code. It encodes zero bits as a half bit time of zero followed by a half bit time of one, and while one bits are encoded as a full bit time of a constant level. The level used for one bits alternates each time one is coded.\nThis is vaguely reminiscent of, but quite different from, Miller encoding, which also uses half-bit and full-bit pulses, but additionally uses the half-one/half-zero combination and arranges them so that the signal always spends at least a full bit time at" ]
Can imaginary numbers be represented visually?
[ "One very helpful concept that helped me understand complex numbers is [this](_URL_0_).\n\nIt makes a lot more sense when you think about it in the way described above. Real numbers lie on a real number line, going forward for positive numbers and going backward for negative numbers. \n\nBut imaginary numbers force you to deviate off the real number line by rotating about the origin and going off in that direction.", "Every time you start with a number and multiple it by sqrt(-1) four times, you end up back where you started, but first you pass through the opposite of where you started. Right? This behavior is a lot like the circular motion you see from, say, the minutes-hand on a clock... ever four quarters of an hour it is back where it started, but after two quarters of an hour it is on the opposite side of the clock. So imaginary numbers are useful for tracking circular motion." ]
[ "the purely imaginary numbers. The set of all skew-Hermitian matrices forms the Lie algebra, which corresponds to the Lie group U(n). The concept can be generalized to include linear transformations of any complex vector space with a sesquilinear norm.\nNote that the adjoint of an operator depends on the scalar product considered on the dimensional complex or real space . If denotes the scalar product on , then saying is skew-adjoint means that for all one has\n.\nImaginary numbers can be thought of as skew-adjoint (since they are like matrices), whereas real numbers correspond", "Polygonal number In mathematics, a polygonal number is a number represented as dots or pebbles arranged in the shape of a regular polygon. The dots are thought of as alphas (units). These are one type of 2-dimensional figurate numbers.", "Totally imaginary number field In algebraic number theory, a number field is called totally imaginary (or totally complex) if it cannot be embedded in the real numbers. Specific examples include imaginary quadratic fields, cyclotomic fields, and, more generally, CM fields.\nAny number field that is Galois over the rationals must be either totally real or totally imaginary.", "into using imaginary numbers practically, he goes into a detailed explanation of the properties of complex numbers. Right away, he makes it clear that the rules of arithmetic for imaginary numbers are not the same as for real numbers. This was a big accomplishment, as even numerous subsequent mathematicians were extremely confused on the topic.\nBombelli avoided confusion by giving a special name to square roots of negative numbers, instead of just trying to deal with them as regular radicals like other mathematicians did. This made it clear that these numbers were neither positive nor negative. This", "live in. It turns out that a mathematical model involving imaginary time predicts not only effects we have already observed but also effects we have not been able to measure yet nevertheless believe in for other reasons. So what is real and what is imaginary? Is the distinction just in our minds?\n— Stephen Hawking\nIn fact, the names \"real\" and \"imaginary\" for numbers are just a historical accident, much like the names \"rational\" and \"irrational\":\n...the words real and imaginary are picturesque relics of an age when the nature of complex numbers was not properly understood.\n— H.S.M. Coxeter In quantum statistical mechanics The equations", "claims concerning mathematical objects in question and specifically complex numbers are incorrect,\" specifically attacking their statement that complex numbers and irrational numbers \"have nothing to do with one another\". Plotnisky here defends Lacan's view \"of imaginary numbers as an extension of the idea of rational numbers—both in the general conceptual sense, extending to its ancient mathematical and philosophical origins ... and in the sense of modern algebra.\" The first of these two senses refers to the fact that the extension of real numbers to complex numbers mirrors the extension of rationals to reals, as Plotnitsky points out with a quote", "to be another quantity h which is an imaginary scalar, which he observes should have already occurred to anyone who had read the preceding articles with attention. Article 149 of Elements is about Geometrically Imaginary numbers and includes a footnote introducing the term biquaternion. The terms imaginary of ordinary algebra and scalar imaginary are sometimes used for these geometrically imaginary quantities.\nGeometrically Imaginary roots to an equation were interpreted in classical thinking as geometrically impossible situations. Article 214 of elements of quaternions explores the example of the equation of a line and a circle that do not intersect, as being indicated", "Quater-imaginary base Converting into quater-imaginary It is also possible to convert a decimal number to a number in the quater-imaginary system. Every complex number (every number of the form a+bi) has a quater-imaginary representation. Most numbers have a unique quater-imaginary representation, but just as 1 has the two representations 1 = 0.999... in decimal notation, so has the two quater-imaginary representations 1.(0300)…₂ᵢ = 0.(0003)…₂ᵢ.\nTo convert an arbitrary complex number to quater-imaginary, it is sufficient to split the number into its real and imaginary components, convert each of those separately, and then add the results by interleaving the digits. For", "by an idea. An idea that has an object, represents that object. But an idea that does not have an object represents nothing. (Don't get confused here by terminology: an objectless idea is an idea without a representation.)\nConsider, for further explanation, an example used by Bolzano. The idea [a round square], does not have an object, because the object that ought to be represented is self-contrary. A different example is the idea [nothing] which certainly does not have an object. However, the proposition [the idea of a round square has complexity] has as its subject-idea [the idea of a round", "instead of real colors outside your computer screen's gamut triangle, the nearest color which is inside the gamut triangle. See page Gamut for more information about the color range available on display devices. Imaginary colors One type of imaginary color (also referred to as non-physical or unrealizable color) is a point in a color space that corresponds to combinations of cone cell responses in one eye that cannot be produced by the eye in normal circumstances seeing any possible light spectrum. Thus no physical object can have an imaginary color. But such imaginary colors are useful as mathematical abstractions for", "December/Decimal, and the coincidence that both equal the same amount (). Imaginary numbers Some jokes are based on imaginary number i, treating it as if it is a real number. A telephone intercept message of \"you have dialed an imaginary number, please rotate your handset ninety degrees and try again\" is a typical example. Another popular example is \"What did i say to π? Be rational. What did π say to i? Get real.\" Stereotypes of mathematicians Some jokes are based on stereotypes of mathematicians tending to think in complicated, abstract terms, causing them to lose touch with the \"real", "Complex polygon Geometry In geometry, a complex polygon is a polygon in the complex Hilbert plane, which has two complex dimensions.\nA complex number may be represented in the form , where and are real numbers, and is the square root of . Multiples of such as are called imaginary numbers. A complex number lies in a complex plane having one real and one imaginary dimension, which may be represented as an Argand diagram. So a single complex dimension comprises two spatial dimensions, but of different kinds - one real and the other imaginary.\nThe unitary plane", "imaginary parts ±h are the square roots of the tangent of the angle between this tangent line and the horizontal axis. In the complex plane With one real and two complex roots, the three roots can be represented as points in the complex plane, as can the two roots of the cubic's derivative. There is an interesting geometrical relationship among all these roots.\nThe points in the complex plane representing the three roots serve as the vertices of an isosceles triangle. (The triangle is isosceles because one root is on the horizontal (real) axis and the other two roots, being complex", "view or position. Number Number exists only in the mind. The same thing is described by different numbers according to the mind's viewpoint. An object can have an extension of one, three, and thirty six, according to its measurement in yards, feet, and inches. Number is relative and does not exist separately from a mind. Sensed qualities are mental Unity is merely an abstract idea. Primary qualities, such as figure, extension, and motion, are relative, as are secondary qualities such as red, bitter, and soft. They all depend on the observer's frame of reference, position, or point of view. Berkeley's", "to prove that any natural number can be represented as a sum of an even square and two triangular numbers. He conjectured, and proved with B.-K. Oh, that each positive integer can be represented as a sum of a square, an odd square and a triangular number. In 2009, he conjectured that any natural number can be written as the sum of two squares and a pentagonal number, as the sum of a triangular number, an even square and a pentagonal number, and as the sum of a square, a pentagonal number and a hexagonal number.\nHe also raised many open", "methods have no such constraint and can have descriptive names; these are sometimes known as alternative constructors. As an example, when complex numbers are created from two real numbers the real numbers can be interpreted as Cartesian or polar coordinates, but using factory methods, the meaning is clear, as illustrated by the following example in C#.\n public class Complex\n {\n public double real;\n public double imaginary;\n\n public static Complex FromCartesian(double real, double imaginary)\n", "be drawn vertically to denote possible values of another real number, commonly called y. Together these lines form what is known as a Cartesian coordinate system, and any point in the plane represents the value of a pair of real numbers. Further, the Cartesian coordinate system can itself be extended by visualizing a third number line \"coming out of the screen (or page)\", measuring a third variable called z. Positive numbers are closer to the viewer's eyes than the screen is, while negative numbers are \"behind the screen\"; larger numbers are farther from the screen. Then any point in the", "a metaphor to illustrate an ability (or inability) to associate one idea with another, to find the \"big picture\", or salient feature, in a mass of data.\nReuven Feuerstein features the connection of dots as the first tool in his cognitive development program.\nThe travelling salesman problem asks what numbers to assign to a set of points to minimize the length of the drawing.", "numbers is Platonic realism, which grants them abstract, immaterial existence. Other forms of realism identify mathematics with the concrete physical universe.\nAnti-realist stances include formalism and fictionalism.\nSome approaches are selectively realistic about some mathematical objects but not others. Finitism rejects infinite quantities. Ultra-finitism accepts finite quantities up to a certain amount. Constructivism and intuitionism are realistic about objects that can be explicitly constructed, but reject the use of the principle of the excluded middle to prove existence by reductio ad absurdum.\nThe traditional debate has focused on whether an abstract (immaterial, intelligible) realm of numbers has existed in addition to the physical", "the rightmost digit of a natural number has a place value of 1, and every other digit has a place value ten times that of the place value of the digit to its right.\nIn set theory, which is capable of acting as an axiomatic foundation for modern mathematics, natural numbers can be represented by classes of equivalent sets. For instance, the number 3 can be represented as the class of all sets that have exactly three elements. Alternatively, in Peano Arithmetic, the number 3 is represented as sss0, where s is the \"successor\" function (i.e., 3 is the third successor of 0). Many different representations", "Imaginary time Origins Mathematically, imaginary time may be obtained from real time via a Wick rotation by in the complex plane: , where Is defined to be , and is known as the imaginary unit.\nStephen Hawking popularized the concept of imaginary time in his book The Universe in a Nutshell.\nOne might think this means that imaginary numbers are just a mathematical game having nothing to do with the real world. From the viewpoint of positivist philosophy, however, one cannot determine what is real. All one can do is find which mathematical models describe the universe we", "infimum is:\nAnd so since ,\nAnd one can play around with different numbers and discrete sets to convince oneself of this fact. Another, perhaps more geometric, way of imagining discrete sets is to imagine the plot of land with the red and blue pebbles again, but cut into a grid with some of the squares potentially missing, and we just ignore those squares (they are not negative infinity). A more rigorous symbolic proof is given in the next section. Symbolic Proof Define .", "In many systems only one of these normals is considered valid – the other side of the polygon is referred to as a backface, and can be made visible or invisible depending on the programmer’s desires.\nMany modeling programs do not strictly enforce geometric theory; for example, it is possible for two vertices to have two distinct edges connecting them, occupying exactly the same spatial location. It is also possible for two vertices to exist at the same spatial coordinates, or two faces to exist at the same location. Situations such as these are usually not desired and many", "Imaginary curve In algebraic geometry an imaginary curve is an algebraic curve which does not contain any real points.\nFor example, the set of pairs of complex numbers satisfying the equation forms an imaginary circle, containing points such as and but not containing any points both of whose coordinates are real.\nIn some cases, more generally, an algebraic curve with only finitely many real points is considered to be an imaginary curve. For instance, an imaginary line is a line (in a complex projective space) that contains only one real point.", "general statements such as a+b=b+a. The latter are statements true of numbers just as well as the former. Therefore, it is necessary to ask for a definition of the concept of number itself. \nFrege investigates the possibility that number is determined in external things. He demonstrates how numbers function in natural language just as adjectives. \"This desk has 5 drawers\" is similar in form to \"This desk has green drawers\". The drawers being green is an objective fact, grounded in the external world. But this is not the case with 5. Frege argues that each drawer is on its own", "other sources use the term figurate number as synonymous for the polygonal numbers, either just the usual kind or both those and the centered polygonal numbers. History The mathematical study of figurate numbers is said to have originated with Pythagoras, possibly based on Babylonian or Egyptian precursors. Generating whichever class of figurate numbers the Pythagoreans studied using gnomons is also attributed to Pythagoras. Unfortunately, there is no trustworthy source for these claims, because all surviving writings about the Pythagoreans are from centuries later. It seems to be certain that the fourth triangular number of ten objects, called tetractys in Greek,", "human, the Earth, the Solar System, a galaxy, and the visible Universe.\nLogarithmic scales are used in slide rules for multiplying or dividing numbers by adding or subtracting lengths on logarithmic scales. Combining number lines A line drawn through the origin at right angles to the real number line can be used to represent the imaginary numbers. This line, called imaginary line, extends the number line to a complex number plane, with points representing complex numbers.\nAlternatively, one real number line can be drawn horizontally to denote possible values of one real number, commonly called x, and another real number line can", "Centered polygonal number The centered polygonal numbers are a class of series of figurate numbers, each formed by a central dot, surrounded by polygonal layers with a constant number of sides. Each side of a polygonal layer contains one dot more than a side in the previous layer, so starting from the second polygonal layer each layer of a centered k-gonal number contains k more points than the previous layer.", "the mathematics in terms of conical projections, as it actually appears to the eye. Instead, he formulated the theory based on planar projections, or how the rays of light, passing from the viewer's eye to the landscape, would strike the picture plane (the painting). He was then able to calculate the apparent height of a distant object using two similar triangles. The mathematics behind similar triangles is relatively simple, having been long ago formulated by Euclid. In viewing a wall, for instance, the first triangle has a vertex at the user's eye, and vertices at the top and bottom of", "which are hard to work with or can't be represented without this, for example, integer numbers, rational numbers, and real numbers. Integers and rational numbers can be represented without setoids, but this representation isn't easy to work with. Cauchy real numbers can't be represented without this.\nHomotopy type theory works on resolving this problem. It allows one to define higher inductive types, which not only define first order constructors (values or points), but higher order constructors, i.e. equalities between elements (paths), equalities between equalities (homotopies), ad infinitum. Implementations of type theory Different forms of type theory have been implemented as the" ]
How is it possible for someone to be transgender; I don't believe in gender roles or stereotypes so when someone is "transgender" i don't really know what that means... How can gender be separate from sex if we are trying so hard to eliminate gender roles, and promote equality?
[ "[Recent studies] (_URL_0_) have shown that there may be differences in brain structure between men and women and that someone who is transgender has a brain structure more like that of their gender rather than sex. So even if we didn't have gender roles at all in our society (and trust me, we still do) there is still physical differences that are present." ]
[ "identities are not exclusively masculine or feminine, but may, for example, be bigender, pangender, genderfluid, or agender). Other definitions include third-gender people as transgender or conceptualize transgender people as a third gender, and infrequently the term is defined very broadly to include cross-dressers.\nSome transgender people seek sex reassignment therapy, and may not behave according to the gender role imposed by society. Some societies consider transgender behavior a crime worthy of capital punishment, including Saudi Arabia and many other nations. In some cases, gay or lesbian people were forced to undergo sex change treatments to \"fix\" their sex or gender: in", "Transgender inequality Common misconceptions A common misconception is that a transgender person is therefore gay. However, being transgender focuses on gender identity and not sexual orientation. A transgender person may identify with any sexual orientation. Another important misconception is that individuals who crossdress are transgender. However, many crossdressers are comfortable with their assigned sex. Even though individuals who participate in crossdressing are officially under the Transgender Umbrella, most do not identify as transgender.\nThe status of transgenderism as a mental disorder is widely disputed. Many transgender people experience gender dysphoria, which is a disconnect between one's assigned sex at birth and", "usually raised and enculturated as a cisgender heterosexual member of the assigned sex, which may or may not match their emergent gender identity throughout life or some remaining sex characteristics (for example, chromosomes, genes or internal sex organs). Transgender people Transgender people experience a mismatch between their gender identity and their assigned sex. Transgender is also an umbrella term because, in addition to including trans men and trans women whose binary gender identity is the opposite of their assigned sex (and who are sometimes specifically termed transsexual if they desire medical assistance to transition), it may include genderqueer people (whose", "to including people whose gender identity is the opposite of their assigned sex (trans men and trans women), it may include people who are not exclusively masculine or feminine (e.g. people who are genderqueer, non-binary, bigender, pangender, genderfluid, or agender). Other definitions of transgender also include people who belong to a third gender, or conceptualize transgender people as a third gender. Infrequently, the term transgender is defined very broadly to include cross-dressers. General Many feminists consider sex to only be a matter of biology and something that is not about social or cultural construction. For example, Lynda Birke, a feminist", "same sex, persons of the opposite sex, or persons of either sex\". In addition, \"not being romantically or sexually attracted to persons of either sex is also a sexual orientation\". Gender identity and expression Transgender persons are allowed to change their legal gender and to have their new gender recognised as a result of the Gender Recognition Act 2009 (c.11).", "use the term), while the term gender difference could be re-defined as due to differential socialization between the sexes of a monomorphic adaptation or byproduct. For example, greater male propensity toward physical aggression and risk taking would be termed a \"sex difference;\" the generally longer head hair length of females would be termed a \"gender difference.\" Transgender and genderqueer Transgender people experience a mismatch between their gender identity or gender expression, and their assigned sex. Transgender people are sometimes called transsexual if they desire medical assistance to transition from one sex to another.\nTransgender is also an umbrella term: in addition", "\"male\" and \"female\". Transgender people have a unique place in relation to the gender binary. In some cases, attempting to conform to societal expectations for their gender, transsexual individuals may opt for surgery, hormones, or both. Limitations and rejection Some feminist scholars have contested the existence of a clear gender binary. Judith Lorber explains the problem of failing to question dividing people into these two groups \"even though they often find more significant within-group differences than between-group differences.\" Lorber argues that this corroborates the fact that the gender binary is arbitrary and leads to false expectations of both men and", "one's gender identity have also been recognized in the workplace and are actively being asserted in public accommodations. In Iowa, for example, discrimination in public accommodations on the basis of sexual orientation and gender identity has been prohibited by law since 2007 through the Iowa Civil Rights Act.\nIn Cruzan v. Special School District #1, decided in 2002, a Minnesota federal appeals court ruled that it isn't the job of the transgender person to accommodate the concerns of cisgender people who express discomfort with sharing a facility with a transgender person. Employers need to offer an alternative to the complaining employee", "intersex people, queers of color, queer sex workers) are seen as an impediment to this class of homonormative individuals receiving their rights. For example, one empirical study found that in the Netherlands, transgender people and other gender non-conforming LGBT people are often looked down upon within their communities for not acting \"normal.\" Those who do assimilate often become invisible in society and experience constant fear and shame about the non-conformers within their communities. Stryker referenced theorist Jürgen Habermas and his view of the public sphere allowing for individuals to come together, as a group, to discuss diverse ideologies and by", "Transsexual persons are allowed to change their legal sex.\nIn 2010, France removed gender identity disorder as a diagnosis by decree, but according to French transgender rights organizations, beyond the impact of the announcement itself, nothing changed. Transsexualism is part of the ALD 31 (fr) and treatment is funded by Sécurité Sociale.\nDiscrimination on the basis of gender identity (sexual identity) has been banned since 2012. In 2016, the term \"sexual identity\" was replaced by \"gender identity\".\nOn 6 November 2015, a bill to allow transgender people to legally change their gender without the need for sex reassignment surgery and forced sterilisation was", "basis of their gender identity if they are trans, 53% believed being transgender was acceptable while 37% did not, 77% believed that transgender students should be allowed to attend public school, and 8% said they would refuse to work with a transgender co worker. A 2012 study found that the heterosexual cisgender individuals who believe there are natural binary genders and there are natural differences between men and women are more likely to have negative attitudes toward transgender individuals.\nEvents in the LGBT+ community such as Transgender Awareness Week and the International Transgender Day of Visibility are focused on educating and", "of Global Action for Trans Equality:\nPeople tend to identify a third sex with freedom from the gender binary, but that is not necessarily the case. If only trans and/or intersex people can access that third category, or if they are compulsively assigned to a third sex, then the gender binary gets stronger, not weaker.\nThe report concludes that two or three options are insufficient: \"A more inclusive approach would be to increase options for people to self-define their sex and gender identity.\" Intersex people Like all individuals, some intersex individuals may be raised as a particular sex (male or female) but", "women. Visibility, awareness, and public attitudes One of the largest factors that causes and perpetuates transgender inequality is a lack of understanding and awareness among cisgender people. A 2002 survey found that, of the American respondents polled, only 70% had heard of the term transgender, while 67% agreed that it is possible for a person to be born as one gender, but inside feel like another gender. In addition, the survey found that 61% of Americans believe that the country needs anti-discrimination laws to protect transgender individuals, 57% incorrectly believed that it was not legal to fire someone on the", "explicitly compare transgender women to rapists for forcing themselves into women's spaces.\nMany transgender people see gender identity as an innate part of a person. Some feminists also criticize this belief, arguing instead that gender roles are societal constructs, and are not related to any natural factor. Sex-positive feminists support the right of all individuals to determine their own gender and promote gender fluidity as one means for achieving gender equality. Patrick Califia has written extensively about issues surrounding feminism and transgender issues, especially in Sex Changes: Transgender Politics. Debates Like feminism itself, sex-positive feminism is difficult to define, and few", "some transgender people have non-binary gender identities, (genderqueer, agender, pangender, culturally-specific third gender identities, and more).\nDiscrimination rates are very high for the transgender community and especially for transgender people of color. Some frequent examples of discrimination and other forms of oppression faced by the transgender community are violence and hate crimes, homelessness, poverty, sexual assault, housing discrimination, employment discrimination, harassment, bullying, disproportionate rates of arrest and incarceration,\nprison and immigration violence and mistreatment, airport security humiliation, HIV/AIDS and health disparities, governmental/bureaucratic barriers to transitioning (documents and surgery requirements), economic and societal barriers to transitioning (the high costs of medical care and", "thus by definition \"transgressively gendered\"; and (5) neutered or unsexed/ungendered individuals such as eunuchs. Transgender people and third gender Gender may be recognized and organized differently in different cultures. In some non-Western cultures, gender may not be seen as binary, or people may be seen as being able to cross freely between male and female, or to exist in a state that is in-between, or neither. In some cultures being third gender may be associated with the gift of being able to mediate between the world of the spirits and world of humans. For cultures with these spiritual beliefs, it", "in numbers, are still human beings and therefore they have every right to enjoy their human rights\", concluding by declaring that:\n(1) Hijras, eunuchs, apart from binary gender, be treated as \"third gender\" for the purpose of safeguarding their\nrights under Part III of our constitution and the laws made by the parliament and the State Legislature.\n(2) Transgender persons' right to decide their self-identified gender is also upheld and the Centre and State Governments are directed to grant legal recognition of their gender identity such as male, female or as third gender. Relief to over 35,000 public servants In B.Prabhakara Rao vs.", "means \"denoting or relating to a person whose sense of personal identity and gender does not correspond with their birth sex.\" However, Heidi M Levitt describes transgender as \"different ways in which people transgress the gender boundaries that are constituted within a society.\" She then describes how one must understand the difference between sex and gender in order to fully understand transgender. She argues that sex is biological whereas \"gender is a social construct.\" Thus people who are transgender express themselves differently than their biological sex. In contrast, Levitt explains that \"transsexual people have a sexual identity that does not", "does not criminalize same-sex sexual acts, and transgender people are able change their gender through the Family Registry if certain conditions are met. However these conditions include requiring “gender confirmation surgery, being over 20 years old, being unmarried while applying to legally change one's gender, having no minor children, and being deprived of their reproductive organ or reproductive ability” according to Amnesty International. If a person has not legally registered to change their gender before being incarcerated, they will be sent a prison that matches their gender assignment at birth. Additionally Japanese prisons are not required to provide hormone therapy", "necessarily the case. If only trans and/or intersex people can access that third category, or if they are compulsively assigned a third sex, then the gender binary gets stronger, not weaker”\nThe Asia Pacific Forum of National Human Rights Institutions recognised the right of individuals to non-binary or third sex classifications, but stated that, \"creating a third, separate category for the registration of people born with an intersex trait ... would risk segregating and potentially stigmatising intersex people. It would also remove their right to determine their own sex or gender.\"\nIn March 2017, an Australian and Aotearoa/New Zealand community statement called", "assumed to be transgender or crossdressing, by association.\nThe use of the term \"passing\" regarding sexual orientation denotes \"hiding\" one's identity, where use among gender-variant people (as noted above) signals acceptance and concordance with one's internal sense of or desired gender identity. However, for this reason, and because transgender persons who come to live full-time in their desired gender/sex identity often recognize their previous attempts to conceal their identity and be accepted in socially-accepted and designated roles as the real artifice they constructed and protected, some have begun to instead call their previous gender-normative and concealing behaviour as \"passing\".", "from her job at the Georgia Legislative Assembly due to her transgender status. Relying on Price Waterhouse v. Hopkins and other Title VII precedent, the Court concluded that the plaintiff was discriminated against based on her sex because she was transitioning from male to female. The Court stated that a person is considered transgender \"precisely because of the perception that his or her behavior transgresses gender stereotypes.\" As a result, there is \"congruence\" between discriminating against transgender individuals and discrimination on the basis of \"gender-based behavioral norms.\" \"Because everyone is protected against discrimination based on sex stereotypes, such protections cannot", "for someone who has gone through genital reassignment surgery to change their legal gender in order to reflect their post-operative sex. Transgender people then have the right to marry in accordance with their post-operative sex. United Kingdom The Sex Discrimination Act 1975 made it illegal to discriminate on the ground of anatomical sex in employment, education, and the provision of housing, goods, facilities and services. The Equality Act 2006 introduced the Gender Equality Duty in Scotland, which made public bodies obliged to take seriously the threat of harassment or discrimination of transsexual people in various situations. In 2008, the Sex", "the plaintiff was discriminated against based on her sex because she was transitioning from male to female. The Court stated that a person is considered transgender \"precisely because of the perception that his or her behavior transgresses gender stereotypes.\" As a result, there is \"congruence\" between discriminating against transgender individuals and discrimination on the basis of \"gender-based behavioral norms.\" \"Because everyone is protected against discrimination based on sex stereotypes, such protections cannot be denied to transgender individuals\", the Court ruled. With this decision, discrimination in the workplace based on gender identity is now banned in Alabama. Hate crime law Since", "differs from the sex they were assigned at birth.\" Not all gender variant people identify as transgender, and not all transgender people identify as gender variant—many identify simply as men or women. Gender identity is one's internal sense of their own gender; while most people have a gender identity of a boy or a man, or a girl or a woman, gender identity for other people is more complex than two choices. Furthermore, gender expression is the external manifestation of one's gender identity, usually through \"masculine,\" \"feminine,\" or gender variant presentation or behavior.\nIn some countries, such as Australia, the term", "transgender people, according to Susan Stryker. She illustrates how there exists a lack of accountability to those aggressors who victimize the transgender community, and there is a lack of legal possibility to persecute aggressions against transgender people or to give adequate rights to transgender people. Transgender people, not fitting entirely into the binary of “male” or “female,” are not covered by Sex Discrimination laws. Stryker argues that this means that they are largely unprotected when they are attacked in one way or another for being transgender, and it further alienates them from our definition of humanity, making them an “other,”", "of how racial and gender identities are formed. The essentialism, or nature, views states that these identities are fixed and inherent from birth, while the social constructionism, or nurture, views sees them as flexible and dependent on one’s environment. Inequality in employment and socioeconomic status Some transgender people face disadvantages in the workplace, although black transgender people are among the most disadvantaged. 32% of black transgender individuals report losing their job due to bias, compared to 26% of Latino transgender people, 24% of white transgender people and 21% of Asian-Pacific American transgender people. In addition, the unemployment rate for transgender", "face discrimination in several aspects of their lives, however, the law is unclear on the legal status of discrimination based on gender identity. Currently, the Human Rights Act 1993 does not explicitly prohibit discrimination on the basis of gender. Whilst it is believed that gender identity is protected under the laws preventing discrimination on the basis of either sex or sexual orientation, it is not known how this applies to those who have not had, or will not have, sex reassignment surgery. Some overseas courts have determined that transgender people are covered by prohibitions on discrimination based on sex, but", "those identifying with culturally conventional gender roles. Some transgender individuals do not consistently identify as one gender and some consider the conventional sexual orientation labels inadequate. Developments in research suggests that transgender individuals are likely to classify their sexual orientation in non-binary ways, using their past and present sexual experiences and feelings to represent their sexual orientation, as opposed to using those which are based on traditional sex or gender descriptions. Cultural debate The exploration on sexual fluidity initiated by Lisa M. Diamond presented a cultural challenge to the LGBT community; this is because although researchers usually emphasize that changes", "\"transexuality\" and not their gender non-conformity. The case was appealed to the Sixth Circuit, which overturned that decision and clarified to courts that under Title VII, sex discrimination was to be considered broader than only the traditional assumptions of sex.\nTwelve states currently have legislation which bars discrimination based on gender identity. Despite these efforts, non-binary individuals are subject to higher rates of physical and sexual assault and police harassment than those who identify as men or women, likely due to their gender expression or presentation. Identity documents According to the Transgender Law Center, 70% of transgender people are not able" ]
How do news outlets get a hold of all those secret tapes and documents that they reveal exclusively?
[ "These usually come from whistleblowers or people who leak the info. Some news organizations (and I use this term loosely) pay for stuff, like TMZ or the National Enquirer. Most media companies don't pay (though there are exceptions). \n\nUsually sources give this stuff freely for a couple of reasons: \n- They want to expose corruption.\n- They have an ax to grind against a person or organization. \n- They want some fame or notoriety." ]
[ "the legitimacy of leaked documents is common journalism practice, as is protecting third parties who may be harmed incidentally by the leak being published. However, professional media outlets who receive documents or recordings from confidential sources do not, as a practice, share the unfiltered primary evidence with a federal agency for review or verification, as it is known that metadata and unique identifiers may be revealed that were not obvious to the journalist, and the source exposed.\nThe evidence chain led to the arrest of Winner, a young Air Force veteran who was working in Georgia for Pluribus International Corporation, an", "Source (journalism) Using confidential information Off-the-record material is often valuable and reporters may be eager to use it, so sources wishing to ensure the confidentiality of certain information are generally advised to discuss the \"terms of use\" before disclosing the information, if possible. Some journalists and news organizations have policies against accepting information \"off the record\", because they believe it interferes with their ability to report truthfully, or because they suspect it may be intended to mislead them or the public.\nEven if writers cannot report certain information directly, they can use \"off the record\" information to uncover related facts, or", "to his sources, confidential information sold to newspapers may have been obtained through blagging, burglaries, bribery, and blackmail, sometimes involving corrupt customs officers, VAT inspectors, bank employees and police officers.\nIn 2003, a raid by the Information Commissioner's Office (ICO) was made as part of Operation Motorman on the home of private investigator Steve Whittamore. This resulted in seizure of records including more than 13,000 requests for confidential information from newspapers and magazines.\nIn 2006, Information Commissioner Richard Thomas \"revealed that hundreds of journalists may have illegally bought private information. In 2006, the Metropolitan Police Service (Scotland Yard) seized records", "It seems most probable that the recordings originated from the recording room or were transferred with additional equipment from the press room of the government; till 2009, sessions were broadcast live there so that extracts of resolutions could be made by the authorised personnel.\nMarjan Miklavčič, an expert in intelligence services and a lecturer at the University of Maribor, compared the publication to WikiLeaks. He particularly stressed that it was not known which data had been stolen and whether they could be used for extortion. Iztok Prezelj, who lectures on intelligence at the University of Ljubljana, stated that the publication showed", "on what we now know, CBS News cannot prove that the documents are authentic, which is the only acceptable journalistic standard to justify using them in the report. We should not have used them. That was a mistake, which we deeply regret.\nDan Rather stated, \"if I knew then what I know now – I would not have gone ahead with the story as it was aired, and I certainly would not have used the documents in question.\"\nIn an interview with Rather, Burkett admitted that he misled CBS about the source of the documents, and then claimed that the documents came", "use of the documents was a mistake As a growing number of independent document examiners and competing news outlets reported their findings about the documents, CBS News stopped defending the documents and began to report on the problems with their story. On September 20 they reported that their source, Bill Burkett, \"admits that he deliberately misled the CBS News producer working on the report, giving her a false account of the documents' origins to protect a promise of confidentiality to the actual source.\" While the network did not state that the memos were forgeries, CBS News president Andrew Heyward said,\nBased", "Secrets Act 1911. In 2004, a memo containing details of a possible US bombing of broadcaster Al Jazeera was leaked to the press. Attorney General Peter Goldsmith has warned newspapers that they could be prosecuted under the Official Secrets Act if they publish the contents of the memo, saying \"You are reminded that to publish the contents of a document which is known to have been unlawfully disclosed by a crown servant is in itself a breach of section 5 of the Official Secrets Act 1989\".\nThe Terrorism Act 2000 makes it an offence to collect or possess information likely to", "Following Judge White's decision to uphold the subpoena, public controversy stirred concerning whether or not the two reporters should be forced to reveal their sources. While many contend that confidential sources have been utilized by the press since the beginning of its existence, others believe that by not revealing their confidential sources, Fainaru-Wada and Williams are, in effect, obstructing justice and should be punished accordingly.\nThose who believe that confidential sources are necessary in reporting often point to the work of Bob Woodward and Carl Bernstein of The Washington Post and their mysterious source, \"Deep Throat,\" to whom they refer several", "to find other sources that are willing to speak on the record. This is especially useful in investigative journalism. Information about a surprise event or breaking news, whether on or off the record, is known as a \"tip-off\". Information that leads to the uncovering of more interesting information is called a \"lead\". Anonymous sources The identity of anonymous sources is sometimes revealed to senior editors or a news organization's lawyers, who would be considered bound by the same confidentiality as the journalist. (Lawyers are generally protected from subpoena in these cases by attorney–client privilege.) Legal staff may need to give", "some media sources. No forensic document examiners or typography experts authenticated the documents, which may not be possible without original documents. The provider of the documents, Lt. Col. Bill Burkett, claimed to have burned the originals after faxing copies to CBS. The whole incident was turned into a feature-length film entitled Truth. \"The Internet Is Infected\" episode and the false hacker photo A segment aired on the March 29, 2009, edition of 60 Minutes, \"The Internet Is Infected\", featured an interview with Don Jackson, a data protection professional for SecureWorks. Jackson himself declares in the program that: \"A part of", "of Bush's service in the Guard during the 1970s. In the 60 Minutes segment, Rather stated that the documents \"were taken from Lieutenant Colonel Killian's personal files\", and he falsely asserted that they had been authenticated by experts retained by CBS.\nThe authenticity of the documents was challenged within hours on Internet forums and blogs, with questions initially focused on anachronisms in the typography, and the scandal quickly spread to the mass media. CBS and Rather defended the authenticity and usage of the documents for two-weeks, but other news organizations continued to scrutinize the evidence, and USA Today obtained an independent", "documents because \"the dates were wrong and the names were wrong.\" However, the relevant papers were not in CIA hands until eight months after Wilson made his trip. Wilson had to backtrack and said he may have \"misspoken\" on this. The Senate intelligence committee, which examined pre-Iraq war intelligence, reported that Wilson \"had never seen the CIA reports and had no knowledge of what names and dates were in the reports.\" Origin of forged documents No one has been convicted of forging the documents. Various theories have been reported on how they were produced, distributed, and where pressure", "1970s which could have produced the documents, such as the IBM Selectric typewriter, but no forensic examiners or typography experts have authenticated them and it may not be technically possible without the originals. Lt. Col. Bill Burkett provided the documents to CBS, but he claims to have burned the originals after faxing them copies.\nCBS News producer Mary Mapes obtained the copied documents from Burkett, a former officer in the Texas Army National Guard, while pursuing a story about the George W. Bush military service controversy. Burkett claimed that Bush's commander Lieutenant Colonel Jerry B. Killian wrote them, which included criticisms", "some legal bloggers question whether this meeting could be considered private. Steven Price is so confident of this that his blog openly publishes a link to a leaked copy of the recording. Police intervention John Key laid a complaint about the incident with the New Zealand Police. The Police said that making the recording may have been an offence under the Crimes Act. They began contacting 3 News, Radio New Zealand, TVNZ and The Herald on Sunday requesting unpublished information be handed over. Media outlets were informed that police would seek a search warrant.\nAmbrose applied for a High Court declaration", "after the story aired and the controversy began.\nCopies of the documents were first released to the public by the White House. Press Secretary Scott McClellan stated that the memos had been provided to them by CBS in the days prior to the report and that, \"We had every reason to believe that they were authentic at that time.\"\nThe Washington Post reported that at least one of the documents obtained by CBS had a fax header indicating it had been faxed from a Kinko's copy center in Abilene, Texas, leading some to trace the documents back to Burkett. CBS states that", "three charges related to publication concern documents which revealed the names of sources in dangerous places putting them \"at a grave and imminent risk\" of harm or detention. The New York Times commented that it and other news organisations obtained the same documents as Wikileaks also without government authorisation. It also said it is not clear how Wikileaks’s publications are legally different from other publications of classified information. \nMost cases brought under the Espionage Act have been against government employees who accessed sensitive information and leaked it to journalists and others. Prosecuting people for acts related to receiving and publishing", "to have the right to all information that is not considered to be damaging if released. Sometimes documents are released with information still considered confidential obscured (redacted), as in the adjacent example. Government classification The purpose of classification is to protect information. Higher classifications protect information that might endanger national security. Classification formalises what constitutes a \"state secret\" and accords different levels of protection based on the expected damage the information might cause in the wrong hands.\nHowever, classified information is frequently \"leaked\" to reporters by officials for political purposes. Several U.S. presidents have leaked sensitive information to get their point", "after the 2005 CBS/Viacom split), without disclosing the journalistic conflict-of-interest to viewers. Killian documents controversy The Killian documents controversy (also referred to as Memogate or Rathergate) involved six documents critical of President George W. Bush's service in the Texas Air National Guard in 1972–1973. Four of these documents were presented as authentic in a 60 Minutes Wednesday broadcast aired by CBS on September 8, 2004, less than two months before the 2004 Presidential Election, but it was later found that CBS had failed to authenticate the documents. Subsequently, several typewriter and typography experts concluded the documents are forgeries, as have", "records. According to the review panel, investigations by major news outlets at the time, including CBS, \"revealed inconsistencies... which led to questions regarding his credibility and whether his claims could be proven\".\nBurkett's claims about the origins of the documents have since changed several times. He admitted to lying to CBS about the origin of the memos when he said he got them from fellow guardsman George Conn, then claiming that he received the Killian documents from a woman calling herself \"Lucy Ramirez\" who has never been identified. The documents, purported to have been typed in the early 1970s, were likely", "counsel about whether it is advisable to publish certain information, or about court proceedings that may attempt to learn confidential information. Senior editors are in the loop to prevent reporters from fabricating non-existent anonymous sources and to provide a second opinion about how to use the information obtained, how to or how not to identify sources, and whether other options should be pursued.\nThe use of anonymous sources has always been controversial. Some news outlets insist that anonymous sources are the only way to obtain certain information, while others prohibit the use of unnamed sources at all times. News organizations may", "took precedence over journalists' rights to protect their sources.\nSpecifically, the court reasoned that since the leaked information in the posting made by O'Grady contained an exact copy of a detailed drawing of \"Asteroid\" created by Apple, and included technical specifications that were copied verbatim from the same source, and all of that information was taken from a confidential set of slides labeled 'Apple Need-to-Know Confidential\", that the information was \"stolen property, just as any physical item.\" The court discussed the notion that websites posting such stolen information were analogous to criminal fences. The court determined the claim of \"privilege\" was", "leading to prison terms. Journalists can also be legally compelled to reveal their sources. Publishing classified information is a criminal offense too, since the new 2008 Penal Code. \nThe 2008 reform of the Penal Code spurred by the Janez Janša's government cancelled the provision protecting journalists when divulgating classified information with the intent of bringing irregularities to light (whistleblowing). Several high-level cases of prosecutions against journalists have brought the issue to the fore. Journalists reporting on classified documents leaked to them by political opponents have been hit by legal actions by the targets of the leaks. Both journalists' associations have", "is not a crime.\" Aftergood notes, \"The universe of classified information includes not only genuine national security secrets, such as confidential intelligence sources or advanced military technologies, but an endless supply of mundane bureaucratic trivia, such as 50-year-old intelligence budget figures, as well as the occasional crime or cover-up.\nThe National Security Archive has collected a number of examples of overclassification and government censors blacking out documents that have already been released in full, or redacting entirely different parts of the same document at different times. \nIn The Pentagon Papers case, a classified study was published revealing that four administrations had", "undercover audio recordings and testified that the \"pen\" used as the recording device was his idea. However, the FBI agent improperly wiped his laptop sometime in early 2017, December 4, 2017 and then wiped it again December 7, 2017. The erasing of the files cast doubt on whether a true copy of all the files was ever provided to the defense or if the FBI had in fact requested Micah Neal conduct the recordings. Thirty nine audio recordings were provided to the defense in April, 2017. Gaps in the timeline of the recordings were discovered by the defense,", "article entitled \"Authenticity backed on Bush documents\". However, the Globe soon printed a retraction regarding the title. CBS noted that although General Hodges was now stating he thought the documents were inauthentic, \"we believed General Hodges the first time we spoke with him.\" CBS reiterated: \"we believe the documents to be genuine.\"\nBy September 13, CBS's position had shifted slightly, as Rather acknowledged \"some of these questions come from people who are not active political partisans\", and stated that CBS \"talked to handwriting and document analysts and other experts who strongly insist the documents could have been created in the", "Federation of American Scientists, said that inadvertent \"spillage\" of classified information into an unclassified realm is a common occurrence.\nReuters' August 2015 review of a set of released emails found \"at least 30 email threads from 2009, representing scores of individual emails,\" which include what the State Department identifies as \"foreign government information,\" defined by the U.S. government as \"any information, written or spoken, provided in confidence to U.S. officials by their foreign counterparts.\" Although unmarked, Reuters' examination appeared to suggest that these emails \"were classified from the start.\" J. William Leonard, a former director of the NARA Information Security Oversight", "has no conceivable right to know.\"\nThe US Attorney's office in Washington responded that federal investigators seek records from news outlets only after making \"every reasonable effort to obtain information through alternative means.\" Verizon neither challenged the subpoena nor did it try to alert the journalists whose records were being requested. Debra Lewis, Verizon Wireless spokeswoman, said the company \"complies with legal processes for requests for information by law enforcement.\" James Rosen On May 17, 2013, the Washington Post reported the Justice Department had monitored reporter Rosen's activities by tracking his visits to the State Department, through phone traces, timing", "small sample of the contents of Clinton's private account by the two Inspectors General, it was likely that the entire body of emails contained hundreds of instances of classified information. In their joint statement, the inspectors general said that classified information in the emails had originated from U.S. intelligence agencies, such as the CIA and the NSA, and that it is illegal anyone to receive a classified document, or briefing, and then summarize or otherwise transmit that information in an unclassified email.\nClinton and her campaign reiterated that the information transmitted was not classified \"at the time\", but the inspectors general,", "there are no 'tapes' of our conversations before he starts leaking to the press!\", which the media, political and legal analysts, as well as opposition politicians, interpreted as a threat to Comey. On June 8, when asked by the Senate Intelligence Committee about the existence of tapes, Comey replied \"Lordy, I hope there are tapes!\" He added that he would have no problem with the public release of any recordings.\nOn June 22, after the House Judiciary committee threatened the White House with a potential subpoena for the alleged tapes, Trump issued a tweet stating \"I have no idea [...] whether", "did not set a clear federal precedent regarding journalistic privileges from revealing confidential information, and thus has been interpreted and cited differently by courts over the years. The Third Circuit Court of Appeals, for instance, has gleaned a qualified First Amendment privilege from the Branzburg decision. In Riley v. City of Chester, the Court held that a reporter's right to protect his sources from disclosure could be overcome by a party who, by a preponderance of the evidence, demonstrated that he has made an effort to obtain the information elsewhere, that the only access to the information sought is through" ]
Serialization
[ "Serialized means taking data from a complex structured format, and saving it in a simple format. Some things like network connections and hard drives can only accept data in simple formats, which is why this is necessary.\n\nAnalogy: your bedroom is set up a certain way. That's the complex structured format. Now let's say you end up having to move to a new house. Perhaps what you do is you carefully write down where everything is in your room. Then you pack it up in boxes. Then you ship the boxes to the new house. Congratulations, you just serialized your room, by turning it from a complex structure format (the actual set up of your room), into a simple format (19 boxes and a list of instructions).\n\nAt the new house, you pull out the list of how everything is arranged, then unpack the boxes and place the contents in according to how the instructions say to. That's deserialization.", "The answer from watabit is in the context of computer programming. If you ask an electrical engineer this question, the answer is fairly different - because it refers to something else. We are interested in the physical way data is transferred, not what the data means. \n \nWhen different components in a computer communicate, or when different computers communicate, they do so by changing voltage levels on wires that connect them. (Ignoring things like optical links.) To make sure that the devices on both ends of the communication wire understand what data is being sent, there has to be an agreement beforehand, called a \"protocol\". For example, is a \"1\" sent by holding a wire at a high voltage, or is it sent by transitioning a wire from a low voltage to a high voltage? \n \nIn addition to the protocols, sending data can be done over a \"bus\". A bus is a collection of wires that follow a particular protocol, but can send many bits of information simultaneously. For example, you could have a set of 8 wires that will allow for the transmission of one 8-bit byte of data at a time. This is called a *parallel* bus. This used to be the most common way to move data around, and it is still used a lot.\n \nParallel busses have some drawbacks, though. In particular, when signal speeds get extremely high, the electromagnetic interference between the various bits on the bus can cause so much \"crosstalk\" that the speed at which the data can be transferred is limited. It turns out that using a bus that only sends one bit at a time can be more efficient at how much data/second gets transmitted, because you can send those single bits much, much faster. This kind of connection is called a *serial* connection, because the bits are sent one after the other, rather than in groups. (Although sometimes more than one serial channel may go over the same cable. SATA has two, for example.)\n \nThere are circuits that will take a serial input and change it to parallel, or vice versa. We call them SERDES, for SERializer/DESerializer." ]
[ "Serial (literature) In literature, a serial is a printing format by which a single larger work, often a work of narrative fiction, is published in smaller, sequential installments. The installments are also known as numbers, parts or fascicles, and may be released either as separate publications or within sequential issues of a periodical publication, such as a magazine or newspaper.\nSerialization can also begin with a single short story that is subsequently turned into a series. Historically, such series have been published in periodicals. Popular short stories series are often published together in book form as collections. Early history The", "Serial art Serial art is an art movement in which uniform elements or objects were assembled in accordance with strict modular principles. The composition of serial art is a systematic process. Overview An early example of serial art is Constantin Brâncuși's sculpture Endless Column.\nOne type of serial art is the production of multiple objects (paintings, sculptures, etc.) in sets or series, for example Josef Albers's well-known series of “square” paintings, where a single, repeating image creates a variation series. This technique later became associated with minimalism, the “multiple”, and “ABC art”. However, there is a different type, which may be", "Serial number arithmetic Many protocols and algorithms require the serialization or enumeration of related entities. For example, a communication protocol must know whether some packet comes \"before\" or \"after\" some other packet. The IETF (Internet Engineering Task Force) RFC 1982 attempts to define \"Serial Number Arithmetic\" for the purposes of manipulating and comparing these sequence numbers.\nThis task is rather more complex than it might first appear, because most algorithms use fixed size (binary) representations for sequence numbers. It is often important for the algorithm not to \"break down\" when the numbers become so large that they are incremented one last", "serial number. In banknote printing the unique serial number provides effective means for the monitoring and verification of the production volume.\nAnother method of protection is to create trap numbers within the serial number range. For example, the system may automatically invalidate numbers which are in a range of 200-300 (e.g. 210, 205 would be invalid). The system may even take single random numbers within a block (e.g. ending in 51, 37, 48 within a 200-300 range would be invalid). Anti-copying marks In the late twentieth century advances in computer and photocopy technology made it possible for people without sophisticated training", "is most specifically defined as the structural principle according to which a recurring series of ordered elements (normally a set—or row—of pitches or pitch classes) are used in order or manipulated in particular ways to give a piece unity. Serialism is often broadly applied to all music written in what Schoenberg called \"The Method of Composing with Twelve Notes related only to one another\" (Schoenberg 1975, 218; Anon. n.d.), or dodecaphony, and methods that evolved from his methods. It is sometimes used more specifically to apply only to music where at least one element other than pitch is treated as", "his contemporaries were also working to establish serialism as one example of post-tonal thinking. Twelve-tone technique orders the twelve notes of the chromatic scale, forming a row or series and providing a unifying basis for a composition's melody, harmony, structural progressions, and variations. Other types of serialism also work with sets, collections of objects, but not necessarily with fixed-order series, and extend the technique to other musical dimensions (often called \"parameters\"), such as duration, dynamics, and timbre. The idea of serialism is also applied in various ways in the visual arts, design, and architecture\n\"Integral serialism\" or \"total serialism\" is the", "The serial techniques described above are then applied. Later composers, such as Jean Barraqué and Pierre Boulez, sought to unify pitch and rhythm by organising the elements into sets of twelve, which resulted in what became known as Total Serialism. See also Formula composition which describes techniques used by Karlheinz Stockhausen.\nAside from Serialism, other forms of compositional technique arose such as those based on chords utilizing fourths rather than the more traditional thirds (see Quartal and quintal harmony and Synthetic chord), those based on other mathematical processes (see Schillinger System) and those based on specific scales (or \"modes\": see Hexatonic", "Serial comma In English language punctuation, a serial comma or series comma (also called an Oxford comma or a Harvard comma) is a comma placed immediately before the coordinating conjunction (usually and or or) in a series of three or more terms. For example, a list of three countries might be punctuated either as \"France, Italy, and Spain\" (with the serial comma), or as \"France, Italy and Spain\" (without the serial comma).\nOpinions among writers and editors differ on whether to use the serial comma, and usage also differs somewhat between regional varieties of English. British English allows constructions with or", "regarded as more essentially “serial” because it is “characterized by the nonhierarchical juxtaposition of equivalent representations, which only yield their complete meaning on the basis of their mutual relationship”. This produces sequential structures defined similarly to those of a twelve-tone row, found for example in Max Bill's series, Fünfzehn Variationen über ein Thema (1934–38), and in Richard Paul Lohse's 30 vertikale systematische Farbreihen in gelber Rautenform (1943–70) and Konkretion III (1947).\nSol LeWitt wrote that \"the serial artist does not attempt to produce a beautiful or mysterious object but functions merely as a clerk cataloguing the results of his premise.\"", "Schedule (computer science) Serial The transactions are executed non-interleaved (see example above)\ni.e., a serial schedule is one in which no transaction starts until a running transaction has ended. Commitment-ordered A schedule is said to be commitment-ordered (commit-ordered), or commitment-order-serializable, if it obeys the Commitment ordering (CO; also commit-ordering or commit-order-serializability) schedule property. This means that the order in time of transactions' commitment events is compatible with the precedence (partial) order of the respective transactions, as induced by their schedule's acyclic precedence graph (serializability graph, conflict graph). This implies that it is also conflict-serializable. The CO property is especially effective for", "serial number which can be used to indicate an approximate date. Series A were built in New York City from approximately 1965-1971; series B in Grand Street, New York City from 1972-1973; series C in Hinsdale, New Hampshire from 1973-1979; and series D in West Swanzey, New Hampshire in 1980-1981, post- the 1979 fire in the Hinsdale factory, until the close of the company. For each series the starting serial number was reset to 1100, thus A1100 - A1471 cover the period approximately 1965-1971; B1100 - B1540 cover the period approximately 1972-1973; C1100 - C4156 cover the period approximately 1973-1979;", "numbers. The serial numbers were used for inventory purposes and were assigned in ascending order. It is possible to approximately date the time of manufacture of a movement based on the serial number. The first \"F\" movements were made in 1898 and were made into the 1940s. However, it is not possible to automatically date a particular clock by the movement serial number. SWCC had a practice of exchanging clock movements rather than servicing a movement and then returning it to the same clock. This results in rarely finding a SWCC clock with its original movement. Identification tag numbers also", "Serialization Drawbacks Serialization breaks the opacity of an abstract data type by potentially exposing private implementation details. Trivial implementations which serialize all data members may violate encapsulation.\nTo discourage competitors from making compatible products, publishers of proprietary software often keep the details of their programs' serialization formats a trade secret. Some deliberately obfuscate or even encrypt the serialized data. Yet, interoperability requires that applications be able to understand each other's serialization formats. Therefore, remote method call architectures such as CORBA define their serialization formats in detail.\nMany institutions, such as archives and libraries, attempt to future proof their backup archives—in particular,", "affect serializability), which indicates which transaction is \"waiting for\" the release of one of more locks by which other transaction or transactions, and a cycle in this graph means a deadlock. Aborting one transaction per cycle is sufficient to break the cycle. Transactions aborted due to deadlock resolution are restarted and executed again immediately. Overview Distributed serializability is the serializability of a schedule of a transactional distributed system (e.g., a distributed database system). Such a system is characterized by distributed transactions (also called global transactions), i.e., transactions that span computer processes (a process abstraction in a general sense, depending on", "serial as just a \"quickie.\"", "Serial verb construction Uses The terms \"serial verbs\", \"serialization\", etc. are used by different authors to denote somewhat different sets of constructions. There are also differences in how the constructions are analyzed, in terms of both syntax and semantics.\nIn general, a structure described as a serial verb construction will consist either of two (or possibly more) consecutive verbs or of two or more consecutive verb phrases in which each verb may have its own object and possibly other modifiers. There will usually be no marking, by means of affixes or subordinating conjunctions, that one verb is dependent on the other,", "Living graph In terms of knowledge representation, a living graph (also referred to as a \"lifeline\", \"living timeline\" or \"fortune line\".) is a graph similar to a chronology timeline which places events along a vertical axis to reflect changes over time. The vertical axis can be used to represent many factors, such as relative importance, degrees of success/failure, danger/safety or happiness/sadness. In this sense they have been described as being \"timelines with attitude\".", "links lead to other characters who are nearby or who have some connection to the current character; in the print version, the links are partly replaced by a traditional index. The reader can proceed from one character to another using these devices or can read the novel in positional order, e.g. from one train car to the next, but there is no overall chronological order except in the final section. Interpretations Ryman states that the meaning of 253 is dramatically changed when read in digital form as opposed to print form. In reading 253 on the internet the links between", "Serial passage Serial passage refers to the process of growing bacteria or a virus in iterations. For instance, a virus may be grown in one environment, and then part of that virus can be removed and put into a new environment. This process is repeated with as many stages as desired, and then the final product is studied, often in comparison with the original virus.\nThis sort of facilitated transmission is often conducted in a laboratory setting, because it is interesting to observe how the virus or bacterium that is being passed evolves over the course of an experiment. In particular,", "and , for . Serial dependence Serial dependence is closely linked to the notion of autocorrelation, but represents a distinct concept (see Correlation and dependence). In particular, it is possible to have serial dependence but no (linear) correlation. In some fields however, the two terms are used as synonyms.\nA time series of a random variable has serial dependence if the value at some time in the series is statistically dependent on the value at another time . A series is serially independent if there is no dependence between any pair.\nIf a time series is stationary, then statistical", "for a serial.", "anything but orderly. From the parallel perspective the meaning of several words becomes available simultaneously: the problem is how are these competing signals resolved into a single correct meaning? \nSerial Order in reading\nTogether with colleagues (in particular Joël Pynte in Paris) Kennedy has recently addressed the problem of serial order in reading head on. Proponents of the view that reading is a kind of “surrogate listening” assume that the reader deals with each word in a strict serial order. You either process a word while looking directly at it, or, in", "actual serial number. The issuer does have to take care to prevent collisions between existing values so as not to wrongly issue two identical serial numbers.", "Part number The part design versus instantiations of it As a part number is an identifier of a part design (independent of its instantiations), a serial number is a unique identifier of a particular instantiation of that part design. In other words, a part number identifies any particular (physical) part as being made to that one unique design; a serial number, when used, identifies a particular (physical) part (one physical instance), as differentiated from the next unit that was stamped, machined, or extruded right after it. This distinction is not always clear, as natural language blurs it by typically referring", "correlation network involves two steps. The first step aims at finding the correlation between each pair of stock considering their corresponding time series. The second step applies a criterion to connect the stocks based on their correlation. The popular method for connecting two correlated stocks is the minimum spanning tree method. The other methods are, planar maximally filtered graph, and winner take all method. In all three methods, the procedure for finding correlation between stocks remains the same.\nStep 1: Select the desired time series data. The time series data can be daily closing prices, daily trading volumes, daily opening prices,", "the network can take physical form, such as atoms held together by atomic forces, or they may be dynamic states or conditions, such as positions on a chess board with moves by the players defining the edges.\nIn mathematical terms (graph theory), a graph is a set of nodes and a set of edges . Each edge provides a link between a pair of nodes and . A network is a graph in which values are assigned to the nodes and/or edges. Phase shifts Graphs and networks have two phases: disconnected (fragmented) and connected. In the connected", "Predictable serial number attack Example Suppose there is a phone card available for sale that offers telephone service by entering the serial number printed on the card. Alice legitimately purchases a phone card in order to call Bob, and her card has the serial number 0003. The attacker, Mallory, also purchases two phone cards, and notices that the serial numbers printed on her phone cards are 0001 and 0002. After consuming the value on cards 0001 and 0002, Mallory guesses the algorithm used for generating these serial numbers is a simple sequence and predicts that 0003 is a valid serial", "time-series can be represented as a sequence of discrete segments of finite length. For example, the trajectory of a stock market could be partitioned into regions that lie in between important world events, the input to a handwriting recognition application could be segmented into the various words or letters that it was believed to consist of, or the audio recording of a conference could be divided according to who was speaking when. In the latter two cases, one may take advantage of the fact that the label assignments of individual segments may repeat themselves (for example, if a person speaks", "Messiaen's Livre d'Orgue (Sabbe 1994, 64).\nIt is among the earliest examples of multiple or integral serialism, though it is something of a hybrid work. The outer movements relapse into older patterns and do not exhibit the technical purity and perfection of structural organisation found in the middle movements (Delaere 1994, 13; Delaere 1998). It was only with his Nummer 2 for 13 instruments that Goeyvaerts found a way of composing in which absolutely everything, from the overall form down to the tiniest detail, is governed by one and the same serial principle (Delaere 2001). The second movement in particular, with", "Calendar spread In finance, a calendar spread (also called a time spread or horizontal spread) is a spread trade involving the simultaneous purchase of futures or options expiring on a particular date and the sale of the same instrument expiring on another date. The legs of the spread vary only in expiration date; they are based on the same underlying market and strike price.\nThe usual case involves the purchase of futures or options expiring in a more distant month and the sale of futures or options in a more nearby month. Uses The calendar spread can be used to attempt" ]
The difference between race versus ethnicity.
[ "Simplistically and quite generally, race is what most people think of as one's physical form, and is based on outward appearance. Ethnicity is what most people think of as one's background, and is based on things like language, clothing, religious customs, etc. There are no hard lines between these designations, some overlap, and their definition is also very fluid, depending on the preconceptions and background of the observer themselves. \n\nGenerally, when thinking of race, an observer will describe someone as being Black, or Asian, or White. This same observer might describe that persons ethnicity as being Jamaican, Vietnamese, or Polish. \n\nThere are all sorts of problems with these kinds of artificial designations, the most important of which is that there really is no such thing as [\"race](_URL_0_)\" *per sé*.", "* race = biological, based on DNA\n* ethnicity = social, based on groups", "I think /u/verticaljeff has it right. Race is usually broken down into a few big categories based on our development over thousands of years: caucasian, negroid and mongoloid were the races in old-school anthropology, but you could also group races as African, European, Native American, Asian, etc.\n\nEthnicity would be a finer grouping based on culture and self-identification, like being Scottish instead of just being European. Scotland has a cultural history and identity, Europe doesn't (as a whole).\n\nThe lines really are blurry depending on the context. African-American and Black are largely interchangeable in the US, but the culture, history, and identity would really be better described with being African-American as Black could describe any number of cultures all over the world. The whole thing is really an artificial categorization so there's bound to be some wiggle room between the two.", "Race typically refers to the physical characteristics of a person, while ethnicity refers to the social/cultural group you identify with. They are not interchangeable, but sometimes seem that way because some race terms are also used as ethnic terms and vice-versa.\n\nSource: _URL_1_" ]
[ "of race as outlined for the US Census as not \"scientific or anthropological\" and takes into account \"social and cultural characteristics as well as ancestry\", using \"appropriate scientific methodologies\" that are not \"primarily biological or genetic in reference.\" The race categories include both racial and national-origin groups.\nRace and ethnicity are considered separate and distinct identities, with Hispanic or Latino origin asked as a separate question. Thus, in addition to their race or races, all respondents are categorized by membership in one of two ethnic categories, which are \"Hispanic or Latino\" and \"Not Hispanic or Latino\". However, the practice of separating", "operate much the same as do racial prejudice and discrimination in society. In fact, only recently have scholars begun to differentiate race and ethnicity; historically, the two were considered to be identical or closely related. With the scientific development of genetics and the human genome as fields of study, most scholars now recognize that race is socially defined on the basis of biologically determined characteristics that can be observed within a society while ethnicity is defined on the basis of culturally learned behavior. Ethnic identification can include shared cultural heritage such as language and dialect, symbolic systems, religion,", "Race and health in the United States Background The U.S. Census definition of race is often applied in biomedical research in the United States. According to the Census Bureau in 2018, race refers to one's self-identification with a certain racial group. The Bureau also specifies that its use of \"race\" is as a social concept, not a biological or anthropological one. The Census Bureau recognizes five races: Black or African American, White (European American), Asian, Native Hawaiian or other Pacific Islander, and American Indian or Alaska Native. Despite the fact that the United States continues to become more diverse, these", "member of a different race than they would otherwise be classified in, possibly avoiding legal or interpersonal discrimination.\nA given race is sometimes defined as a set of ethnicities from populations in neighboring geographic areas (such as a continent like Australia or a subcontinental region like South Asia) that are typically similar in appearance. In such cases, racial discrimination can occur because someone is of an ethnicity defined as outside that race, or ethnic discrimination (or ethnic hatred, ethnic conflict, and ethnic violence) can occur between groups who consider each other to be the same race. Discrimination based on caste is", "Race and ethnicity in the United States Census Designated Ethnicities: Hispanic or Latino origin The question on Hispanic or Latino origin is separate from the question on race. Hispanic and Latino Americans have ethnic origins in the countries of Latin America and the Iberian Peninsula. Latin American countries are, like the United States, racially diverse. Consequently, no separate racial category exists for Hispanic and Latino Americans, as they do not constitute a race, nor a national group. When responding to the race question on the census form, each person is asked to choose from among the same racial categories", "Race and ethnicity in the United States Census Race and ethnicity in the United States Census, defined by the federal Office of Management and Budget (OMB) and the United States Census Bureau, are self-identification data items in which residents choose the race or races with which they most closely identify, and indicate whether or not they are of Hispanic or Latino origin (the only categories for ethnicity).\nThe racial categories represent a social-political construct for the race or races that respondents consider themselves to be and, \"generally reflect a social definition of race recognized in this country.\" OMB defines the concept", "race based on one set of determinants (for example, phenotype, culture, ancestry) while society may ascribe the person otherwise based on external forces and discrete racial standards. Dominant racial conceptions influence how individuals label both themselves and others within society. Modern human populations are becoming more difficult to define within traditional racial boundaries due to racial admixture. Most scientific studies, applications, and government documents ask individuals to self-identify race from a limited assortment of common racial categories. The conflict between self-identification and societal ascription further complicates biomedical research and public health policies. However complex its sociological roots, race has real", "mythology and cuisine. As with race, ethnic categories of persons may be socially defined as minority categories whose members are under-represented in positions of social power. As such, ethnic categories of persons can be subject to the same types of majority policies. Whether ethnicity feeds into a stratification system as a direct, causal factor or as an intervening variable may depend on the level of ethnocentrism within each of the various ethnic populations in a society, the amount of conflict over scarce resources, and the relative social power held within each ethnic category. Global stratification The world and the", "Race (human categorization) Historical origins of racial classification Groups of humans have always identified themselves as distinct from neighboring groups, but such differences have not always been understood to be natural, immutable and global. These features are the distinguishing features of how the concept of race is used today. In this way the idea of race as we understand it today came about during the historical process of exploration and conquest which brought Europeans into contact with groups from different continents, and of the ideology of classification and typology found in the natural sciences. The term race was often", "similar; because caste is hereditary, people of the same caste are usually considered to be of the same race and ethnicity.\nA person's national origin (the country in which they were born or have citizenship) is sometimes used in determining a person's ethnicity or race, but discrimination based on national origin can also be independent of race (and is sometimes specifically addressed in anti-discrimination laws). Language and culture are sometimes markers of national origin, and can prompt instances of discrimination based on national origin. For example, someone of a South Asian ethnicity who grew up in London, speaks British English with", "understood as the \"genetic composition of individuals\" but instead must be \"based upon a combination of cultural, social, and somatic considerations\". In Latin America, a person's ancestry may not be decisive in racial classification. For example, full-blooded siblings can often be classified as belonging to different races (Harris 1964).\nFor these reasons the distinction between \"white\" and \"mixed\", and between \"mixed\" and \"black\" and \"indigenous\", is largely subjective and situational, meaning that any attempt to classify by discrete racial categories is fraught with problems. History People of European origin began to arrive in the Americas in the 15th century since the", "under \"Some other race\" (e.g. giving a national origin such as \"Mexican\" or a designation such as \"Mestizo\" as race), and much smaller numbers listed Black, Native American, or Asian race.\nIn U.S. censuses since 1990, self-identification has been the primary way to identify race. Presumption of race based on countries or regions given in the ancestry question is used only when a respondent has answered the ancestry question but not the race question. The U.S. Census currently defines \"White people\" very broadly as \"people having origins in any of the original peoples of Europe, the Middle East, or North Africa,", "to political opinions. Nationality and ethnicity refer both to a combination of race and customs. However, \"ethnic group\", especially in the United States, is linked more with people of common genetic origin, or race. Therefore, Asians, African Americans, and Native Americans (or American Indians) are typically associated with the ethnic groups because of their evident physical traits. \"National group\", instead, is linked more with the differences in language and customs. Therefore, it usually refers to Caucasians belonging to nation-states with specific cultures, such as Russians, Germans, Turks, and so on. “Hispanic” or “Latino” people are often placed in an intermediate", "Census categories have not changed for almost 20 years. The Census Bureau also recognizes differences in ethnicity among the population, and it defines ethnicity as whether a person is of Hispanic origin or not. For this reason, ethnicity is broken out in two categories in its data, Hispanic or Latino and Not Hispanic or Latino. Hispanics may report as any race. \nThe 2010 U.S. Census further specifies the number of Americans who identified with each racial and ethnic group; in 2010, 38.9 million identified as African American, 14.6 million as Asian American, 2.9 million as American Indian or Alaskan Native", "one could use the term race if one distinguished between \"race differences\" and \"the race concept\". The former refers to any distinction in gene frequencies between populations; the latter is \"a matter of judgment\". He further observed that even when there is clinal variation, \"Race differences are objectively ascertainable biological phenomena ... but it does not follow that racially distinct populations must be given racial (or subspecific) labels.\" In short, Livingstone and Dobzhansky agree that there are genetic differences among human beings; they also agree that the use of the race concept to classify people, and how the race concept is", "the example of those who identify themselves as Hispanic/Latino, typically a mix of Caucasian, Native American and African ancestry. Although some studies include this as a \"race\", many such as the U.S. Census do not, forcing members of this group to choose between identifying themselves as one of the listed racial categories, even if they do not personally identify with it. Additionally, individuals who identify as biracial or multiracial must choose one category to identify with, limiting the ability of many Americans to select a census category that they actually identify with. The inability of many individuals to fully identify", "\"race\" and \"ethnicity\" as different categories has been criticized both by the American Anthropological Association and members of US Commission on Civil Rights.\nIn 1997, OMB issued a Federal Register notice regarding revisions to the standards for the classification of federal data on race and ethnicity. OMB developed race and ethnic standards in order to provide \"consistent data on race and ethnicity throughout the Federal Government. The development of the data standards stem in large measure from new responsibilities to enforce civil rights laws.\" Among the changes, OMB issued the instruction to \"mark one or more races\" after noting evidence of", "its association with political ideologies of racism. Thus, The Race Question statement by the UNESCO, in the 1950s, proposed to substitute the term \"ethnic groups\" to the concept of \"race\".\nCategories such as Europid, Mongoloid, Negroid, Australoid remain in use in field such as forensic anthropology while colour terminology remains in use in some countries with multiracial populations for the purpose of their official census, as in the United States, where the official categories are \"Black\", \"White\", \"Asian\", \"Native American and Alaska Natives\" and \"Native Hawaiians and Other Pacific Islanders\" and in the United Kingdom (since 1991) with official categories ", "that race is a social construction based on folk ideologies that construct groups based on social disparities and superficial physical characteristics. Sternberg, Grigorenko & Kidd (2005) state, \"Race is a socially constructed concept, not a biological one. It derives from people's desire to classify.\" The concept of human \"races\" as natural and separate divisions within the human species has also been rejected by the American Anthropological Association. The official position of the AAA, adopted in 1998, is that advances in scientific knowledge have made it \"clear that human populations are not unambiguous, clearly demarcated, biologically distinct groups\" and that \"any", "of the racial categories at any particular time is a temporary consequence of conflicting “elite” and “street” variations of it” (citation). Omi and Winant describe “race as a master category\", and state that race, in scholarly articles, is often referred to as a social construction. If race is a social construction, then how is it constructed? Their article argues that race is a concept “that has profoundly shaped, and continues to shape, the history, polity, economic structure, and culture of the United States.\" They also stress the importance of viewing race from an intersectionality approach, saying that social stratification cannot", "does occur in the United States, and might be considered a form of racial discrimination if \"Hispanic\" or \"Latino\" are considered a new racial category derived from ethnicities which formed after the independence of the former colonies of the Americas. Many statistical reports apply both characteristics, for example comparing Non-Hispanic whites to other groups.\nWhen people of different races are treated differently, decisions about how to treat a particular person raise the question of which racial classification that person belongs to. For example, definitions of whiteness in the United States were used before the civil rights movement for purpose of immigration", "racial categories have tended to be more numerous and fluid, with people moving into or out of categories on the basis of a combination of socioeconomic status, social class, ancestry.\nEfforts to sort the increasingly mixed population of the United States into discrete racial categories generated many difficulties. Additionally, efforts to track mixing between census racial groups led to a proliferation of categories (such as mulatto and octoroon) and \"blood quantum\" distinctions that became increasingly untethered from self-reported ancestry. A person's racial identity can change over time. One study found differences between self-ascribed race and Veterans Affairs administrative data. Race and", "States\nRace in the United States is based on physical characteristics and skin color and has played an essential part in shaping American society even before the nation's conception. Until the civil rights movement of the 1960s, racial minorities in the United States faced discrimination and social as well as economic marginalization.\nToday the U.S. Department of Commerce's Bureau of the Census recognizes four races, Native American or American Indian, African American, Asian and White (European American). According to the U.S. government, Hispanic Americans do not constitute a race, but rather an ethnic group. During the 2000 U.S. Census Whites made up", "and 50.4 million as Hispanic or Latino.\nBecause race is a social construct and not a biological trait, measures of the relationship between race and medicine are imperfect and inconsistent. The 2000 U.S. Census definition is inconsistently applied across the range of studies that address race as a medical factor, making it more difficult to assess racial categorization in medicine. Additionally, the socially constructed nature of race makes it so that the different health outcomes experienced by different racial groups can be connected to social factors rather than inherent biological ones.\nThere are significant disparities in health outcomes between the five racial", "are races. In contrast to \"Latino\" or \"Hispanic\", \"Anglo\" refers to non-Hispanic White Americans or non-Hispanic European Americans, most of whom speak the English language but are not necessarily of English descent. Views across disciplines over time One result of debates over the meaning and validity of the concept of race is that the current literature across different disciplines regarding human variation lacks consensus, though within some fields, such as some branches of anthropology, there is strong consensus. Some studies use the word race in its early essentialist taxonomic sense. Many others still use the term race, but use it", "race is complex: it depends on a range of psychological, cultural and social factors, and is therefore \"not a robust proxy for genetic ancestry\". Furthermore, they explain that an individuals's self-identified race is made up of further, collectively arbitrary factors: personal opinions about what race is and the extent to which it should be taken into consideration in everyday life. Furthermore, individuals who share a genetic ancestry may differ in their racial self-identification across historical or socioeconomic contexts. From this, Lorusso and Bacchini conclude that the accuracy in the prediction of genetic ancestry on the basis of self-identification is low,", "with one census category indicates the necessity of cultural, historical, and socio-economic explanations of health disparities rather than a biological one.\nCensus groupings have also been criticized for their broadness. \"Race\" and \"ethnicity\" are used in many different ways in the United States, and the lack of subgroups in Census categories fails to account for the diversity of people identifying with each group. Every group on the Census includes people who identify with a number of unrepresented racial and ethnic sub-categories, but the Hispanic/Latino ethnicity group and Asian racial group have been particularly criticized for this lack of specificity.", "Black's Law Dictionary defines race as \"[a]n ethnical stock; a great division of mankind [sic] having in common certain distinguishing physical peculiarities constituting a comprehensive class appearance.\" Sociology Lester Frank Ward (1841-1913), considered to be one of the founders of American sociology, rejected notions that there were fundamental differences that distinguished one race from another, although he acknowledged that social conditions differed dramatically by race. At the turn of the 20th century, sociologists viewed the concept of race in ways that were shaped by the scientific racism of the 19th and early 20th centuries. Many sociologists focused on African Americans,", "if such categories were earlier understood as racial categories, today they have begun to represent ethno-linguistic categories (regardless of perceived race). Similarly, \"Anglo\" is now used among many Hispanics to refer to non-Hispanic White Americans or European Americans, most of whom speak the English language but are not of primarily English descent. Racial makeup of the U.S. population (For demographics by specific ethnic groups rather than general race, see \"Ancestry\" below.) White and European Americans White and European Americans are the majority of people living in the United States. White people are defined by the United States Census Bureau as", "to discuss race. These definitions are a direct result of biological and social views. Definitions have changed throughout history to yield a modern understanding of race that is complex and fluid. Moreover, there is no one definition that stands, as there are many competing and interlocking ways to look at race. Due to its ambiguity, terms such as race, genetic population, ethnicity, geographic population, and ancestry are used interchangeably in everyday discourse involving race. Some researchers critique this interchangeability noting that the conceptual differences between race and ethnicity are not widely agreed upon.\nBiological definitions of race encompass essentialist and" ]
Why do we get so much satisfaction out of popping things?
[ "It's actually pretty simple. When we get surprised or something happens suddenly, our brains send blood and endorphins through our body. Popping something provides us with a \"controlled\" surprise where we know we are going to be surprised and we also know that we wont be harmed. So we get the benefits of being surprised without the risk.", "I think it's a cleansing thing...we LOVE to pop pimples and blisters on our bodies. Everyone who enjoys /r/popping can back me up. Biologically it makes sense to expunge bacteria from our bodies, my guess is that feeling of relief appeals to our mirror neurons and somehow it also transfers to things like bubble wrap.", "Cherries are the most popular. Depends on what you're personally in to, though." ]
[ "Joint manipulation is characteristically associated with the production of an audible 'clicking' or 'popping' sound. This sound is believed to be the result of a phenomenon known as cavitation occurring within the synovial fluid of the joint. When a manipulation is performed, the applied force separates the articular surfaces of a fully encapsulated synovial joint. This deforms the joint capsule and intra-articular tissues, which in turn creates a reduction in pressure within the joint cavity. In this low pressure environment, some of the gases that are dissolved in the synovial fluid (which are naturally found in all bodily fluids) leave", "you don't go there because it's going to press all of your pleasure buttons, you go there because you get this hypnotic sensation from texture. It works at Berghain, but also at a church in London, or at the Jazz Cafe.\"\nAlong with the nine tracks that make up the album, thus far four other tracks from the sessions have also been released. \"Sky On The Floor\" and \"Soft Attack\" were released as b-sides, \"Laughing In The Face Of Block\" was released as a non-album single in October, and \"Balloon Takes A Holiday\" was contributed to Fabric's #savefabric compilation. Edited versions", "toys and other amusements. Marxist sociologists such as the Frankfurt School criticise mass-manufactured fun as too calculated and empty to be fully satisfying. Bill Griffith satirises this dysphoria when his cartoon character Zippy the Pinhead asks mechanically, \"Are we having fun yet?\" In the Beatles song \"She's Leaving Home\" fun is called \"the one thing that money can't buy.\"", "releases is not so much their innovation as the unrestrained energy and vitality - if they're getting into a groove they really do make it funky\".", "get fat. The bug laughs when the device is shaken. iMilk iMilk is a trick similar to iBeer, but appears as different varieties of milk, such as chocolate milk, strawberry milk, and \"martian milk.\" iMilk has a pay trick and a magic button to perform various tricks with money. iMunchies iMunchies is a trick that gives the illusion that the device is filling with many varieties of snacks such as candy, nuts, and popcorn. A person could then pretend to pull snacks out of the device by reaching beneath it and retrieving a previously-hidden snack using sleight of hand. The", "speculates many reasons as to this peculiar behavior, but settles on a rumination that we are our bodies, and are animals trapped in minds, and that the true moment of excitement we seek is the moment in our sexual partner's eyes when they become an animal again--present in the moment and grounded in flesh. This moment of animal desire, the narrator theorizes, is the true subject of Vecchio's paintings. He makes his models so uncomfortable because he is looking past their particular bodies to find desire absent from memory.", "is squeezed. When the toy is not being squeezed, it resumes its normal shape and re-inflates. Air returning into the toy through the squeaker may or may not make a sound, depending on the design of the squeaker and the speed at which air re-enters.\nThe high-pitched noise produced by squeaky toys quickly attracts the attention of infants and small children, while their soft, squeezable nature makes them safe for young children to handle. Squeaky toys are also popular with pets, and examples shaped like bones or small furry animals are commonly marketed for dogs. History The first", "just feels so satisfying. [It] is really what I love to do.\"", "Popping Terminology As stated earlier, popping has become an umbrella term for a group of closely related styles and techniques that have often been combined or danced together with popping, some of which are seldom seen outside of popping contexts. Characteristics Popping is centered around the technique of popping, which means to quickly contract and relax muscles to create a jerking effect (a pop or hit) in the body. Popping can be concentrated to specific body parts, creating variants such as arm pops, leg pops, chest pops and neck pops. Music Having its roots in the late 1970s funk era,", "solution creating a bubble or cavity, which rapidly collapses upon itself, resulting in a 'clicking' sound. The contents of this gas bubble are thought to be mainly carbon dioxide. The effects of this process will remain for a period of time termed the 'refractory period', which can range from a few minutes to more than an hour, while it is slowly reabsorbed back into the synovial fluid. There is some evidence that ligament laxity around the target joint is associated with an increased probability of cavitation. Safety issues As with all interventions, there are risks associated with joint manipulation, especially", "Pop Toob A pop toob is a noisemaker. It consists of tubes that are extendable, bendable, and connectable.", "and relaxing muscles to cause a jerk in a dancer's body, referred to as a pop or a hit. When performed correctly, each hit is synchronized to the rhythm and beats of the music. Popping is also used as an umbrella term to refer to a wide range of closely related illusionary dance styles such as strobing, liquid, animation, twisto-flex, and waving. Dancers often integrate these styles with standard popping to create a more varied performance. In all of these subgenres it appears to the spectator that the body is popping. The difference between each subgenre is how exaggerated the", "they fall prey to their own planning. The humor involved also has various double meanings, saucy comments which are enjoyable only according to the situation.\nThe treatment is simple yet the situation confuses the characters, who from within are somewhat unaware of what is actually in store for them, and are mentally prepared according to their smartly made small fun cum plan, the events that occur in the life of the protagonists, and that keeps them unaware of the reality. As they slowly come to know the reality, and how they fall prey to their own plan, they realize but laugh", "means that pleasant feelings are more likely to be accompanied by high arousal for extraverts. On the other hand, arousal and pleasantness are negatively correlated for introverts, resulting in introverts exhibiting low arousal when feeling pleasant. In other words, if everything is going well in an extravert's life, which is a source of pleasant feelings, extraverts see such a situation as an opportunity to engage in active behavior and goal pursuit, which brings about an active, aroused pleasant state. When everything is going well for introverts, they see it as an opportunity to let down their guard, resulting in them", "satisfy themselves\", summing it up as \"the main thing is that it's fun, all without, of course, prevention\".", "Buzzin' Around Plot Cornelius (Roscoe 'Fatty' Arbuckle) invents a liquid which makes objects unbreakable and resilient. Unfortunately he grabs the wrong jar when heading out to demonstrate his invention. One mishap follows another in this slapstick comedy.", "(99 cents for \"Laffy Taffy\") fit well. There was another hit with popping sound in the place of snare drum that has reached the number-three position on Billboard Hot 100 in 2006, which is Yung Joc's \"It's Goin' Down\". The Billboard magazine claimed that popping sounds of \"It's Going Down\", however, weren't fingersnapping. Crunk producer Lil Jon also increased exposure of the snap genre to the mainstream by releasing his single \"Snap Yo Fingers\", which peaked at number 7 on the Billboard Hot 100 charts.\nIn 2006, Vibe magazine has also mentioned the subgenre of snap, snap&B in connection to the", "explosive, uninhibited mixture of thrills and humor.\"", "It makes a nice show even if it is not stirring.\"", "this phrase means \"put\" or \"placed\", and she claimed she was saying that she \"placed the baby on the bed\". In American English, popped suggests violence. Her defense lawyers argued to the jury that the word popped does not have the same meaning as in American English. However, in addition to \"popping\" him on the bed, the police maintained that she also said that she dropped him on the floor at one point and that she had been \"a little rough\" with him. The police officer who interviewed her immediately after the incident adamantly insists that she never used the", "Eye popper An eye popper or rubber popper is a popular children's toy. Information An eye popper is a small, dome-shaped piece of rubber or similar material resembling a half of a rubber ball; the shape of a smile is often imprinted on the dome. When pressed, the toy inverts, but after a few seconds, it pops back into its original shape, making a loud popping sound. If resting on the ground when this happens, the toy will fly several feet into the air. The eye popper's behavior resembles the process by which a ball compresses upon hitting a hard", "often think that the props are doing the trick. I want people to know how hard this is to do. It's a really hard thing to handle. The speed that you do that; the clarity, the cleanness ... not only are you- obviously you're funny, but everybody knows that. And obviously you're likeable, everybody knows that. But what they may not know is just handling those props -- if you told somebody, 'Here are the props, here's how it's done, here are the secrets,' they would still stumble through it for months. And you just have a beautiful presentation.\n ", "the controversial subject of grinding, this act is sometimes, but not always, frowned upon in the gaming community. Reasons Several answers have been suggested for the question of why players grind. A major motivating factor is the players' desire to pursue what appears to be the game's ultimate goal, which for many games is to reach the highest level. Sometimes players might actually enjoy repetitive tasks as a way of relaxing, especially if performing the task has a persistent, positive result.\nOne reason that is less influenced by player choice is a lack of game content or to be", "reactions occur only on the two player (or player and CPU) modes. When a bubble is dropped, it can move to another place on the board if this causes more bubbles to pop. If this, in turn, causes more bubbles to drop, then the chain reaction can continue.", "teases, sweetens, and often throbs in popcraft. It also blasts in fits and starts of harsh edge, chops, infectious attitude, and, when it suits them, abandon.\" Sarah Zupko of PopMatters website felt it \"keeps the power in power pop\" and compared their sound with \"early Who, early Jam, Sloan and a touch of the Rolling Stones, but with horns.\"\nYou Am I recorded their first live album, ...Saturday Night, 'Round Ten, over a three-night series of gigs at Casa del Resaca, a warehouse in Richmond, in July 1999. It was released in September and includes Lane on guitar. McFarlane noticed that", "usage of such instruments as the Cajita, a small wooden box that opens and closes creating a distinctive sound, and the Quijada, the jawbone of a horse, donkey, or mule, that when hit creates a raspy buzz.", "Fidgeting Fidgeting is the act of moving about restlessly in a way that is not (socially recognized as) essential to ongoing tasks or events. Fidgeting may involve playing with one's fingers, hair, or personal objects (e.g. glasses, pens or items of clothing). Fidgeting is commonly used as a label for unexplained or subconscious activities and postural movements that people perform while seated. A common act of fidgeting is to bounce one's leg repeatedly. Rings are another common focus of fidgeting; variations include ring spinning, twirling or rolling along a table. Classrooms are sites of fidgeting, and traditionally teachers", "that I always said, 'No, Meyer, you shouldn’t fool around, all those vital juices will be spread about.' But no, instead we just did it all the time. I mean, we shot inside, and we’d forgo lunch and have sex–wonderful, riotous, noisy sex… laughing and scratching. Yeah, that was fun. That really worked out wonderfully.\"", "As a result, they develop a clear sense of \"where the click is\" and so can also play to hit the click as well, in a relaxed way.\nThe other thing they do is to listen out to hear how the sound of their playing merges with the metronome to create a new sound when playing precisely in the pocket with the metronome. By listening in this way (and through other exercises) it is possible to play precisely in the pocket with the metronome in a relaxed fashion. At the same time as they work on playing in the pocket, they", "diving away on their own. When making a ticking sound, the callers do not open their mouths, so it is hard to distinguish who is the maker of the sound. The parent who carries the chicks tend to make the ticking sound more often than those that do not, and both of male and female parents are equally likely to tick. Another vocalization noise is clucking, and this signals for food. When a parent clucks, the young respond to it by poking their head out of their parent back where they are on to receive food. Reproduction and survival The" ]
How do grown up (no longer in school) "bullies" work?
[ "Well, its probably not a good idea to think of \"bullies\" like they are a separate population with their own tactics and strategy. Most people that we would consider bullies are just regular people like you or me, and I can guarantee that we've all acted like bullies a time or two ourselves.\n\nHave you ever been rude to someone? Been forcefully angry with someone? Tried to force someone to do something? Teased or mocked someone? Made someone feel bad?\n\nWhat benefits did you receive from doing it? How did you pick your victims? How did you work? Answer those questions, and you'll understand." ]
[ "direct and indirect bullying behaviors. Bullies high in CU traits will probably be resistant to many of the interventions successful with bullies who are not. Although a defining characteristic of CU is a lack of empathy, which overlaps with bullies deficits in empathy as highlighted above, the other characteristics of the concept would make bullies high in CU less malleable than those who simply have lower EI. Victimization and emotional intelligence Being bullied can have a negative impact on the victim's life: Bullied children may go on to be maladjusted socially and emotionally, and worsen in behavior. Adults who are", "bullied in the workplace may have deteriorated self-esteem, suffer from isolation and become fearful and avoidant after being victimized. They may disengage and withdraw from their work community. Both child and adult victims are at greater risk of developing mental pathology. EI is found to be a significant predictor of variance in adolescent peer victimization in bullying and also has a negative correlation with adolescent bullying. Victim peer relations showed strong negative correlations with the emotional management and facilitation dimensions of EI conceptualized as Emotional Management and Control and Emotions Direct Cognitions respectively, both of which made significant semi-partial", "The Bully Police Squad The Bully Police Squad is an organization with a purpose of educating parents, teachers and children of all ages about bullying and its effects on the world. The organization was founded by Karen Wojcikowski after she learned about the myriad of cases of bullying that have been reported, many of which unfortunately ended in death of the victims. The Bully Police Squad's mission statement, according to their official website, is \"Educating our youth on the impact of bullying and empowering the victim and bystander to make informed and courageous decisions.\" Karen Wojcikowski Karen Wojcikowski, the founder", "bully to easily create public humiliation for their victim. Students who are bullied tend to develop behavioral problems, depression, less self-control and poorer social skills, and to do worse in school. Once humiliated, victims never want to be a victim again and try to regain their image by joining groups. Often, they are rejected by their peers and follow through by restoring justice in what they see as an unjust situation. Their plan for restoration many times results in violence as shown by the school shooters. 75% of school shooters had been bullied or left behind evidence of having been", "Act 17 of 2011 brings widespread relief for all victims of harassment, including children. The Child Justice Act 75 of 2008 aims to rehabilitate and to reconcile children under the age of 21. Depending on age, a bully can be held criminally liable for a myriad of criminal acts, including assault, intimidation, murder, culpable homicide, crimen injuria, theft, malicious injury to property and arson, depending on the facts of each case.\nAccording to the South African Education Ministry, South African pupils are the \"most bullied kids in the world\". In a 2015 survey from the Trends in International Mathematics and Science", "Youth offending team In England and Wales, a youth offending team (YOT) is a multi-agency team that is coordinated by a local authority and overseen by the Youth Justice Board. It deals with young offenders, sets up community services and reparation plans, and attempts to prevent youth recidivism and incarceration. YOTs were set up following the 1998 Crime and Disorder Act with the intention of reducing the risk of young people offending and re-offending, and to provide counsel and rehabilitation to those who do offend. Youth offending teams engage in a wide variety of work with young offenders (those under", "child molesters released from prison in 1994, 60 percent had been in prison for molesting a child 13 years old or younger. The median age of victims of those imprisoned for sexual assault was less than 13 years old; the median age of rape victims was about 22 years. Child molesters were, on average, five years older than violent offenders who committed their crimes against adults. Nearly 25 percent of child molesters were age 40 or older, but about 10 percent of inmates with adult victims were in that age group. Post-incarceration registries and restrictions A sex offender registry is", "union Unite of IT professionals showed 65% believed they had been bullied at work, and 22% had taken time off work because of stress caused by bullying.\nIn 2014 IDG Connect conducted research which showed that 75% of 650 IT professionals surveyed claimed to have been bullied at work, while 85% said they had seen others bullied. This report formed part of an extensive series of articles conducted by the editor.\nThe press release stated: “These results in no way prove that things are worse in IT than elsewhere and are weighted by the self-selecting nature of the study. However, via a", "with them, while almost always calling for their exclusion and termination from employment. Cause Janice Harper followed her Huffington Post essay with a series of essays in both The Huffington Post and in her column, Beyond Bullying: Peacebuilding at Work, School and Home in Psychology Today that argued that mobbing is a form of group aggression innate to primates, and that those who engage in mobbing are not necessarily \"evil\" or \"psychopathic,\" but responding in a predictable and patterned manner when someone in a position of leadership or influence communicates to the group that someone must go. For that reason,", "most generally, to encourage and enforce proper behavior as defined by society or family. Criminals are punished judicially, by fines, corporal punishment or custodial sentences such as prison; detainees risk further punishments for breaches of internal rules. Children, pupils and other trainees may be punished by their educators or instructors (mainly parents, guardians, or teachers, tutors and coaches) – see Child discipline.\nSlaves, domestic and other servants are subject to punishment by their masters. Employees can still be subject to a contractual form of fine or demotion. Most hierarchical organizations, such as military and police forces, or even churches, still apply", "anti-bullying laws and attends numerous bully trials. The Bully Police Squad raises awareness on bullying and social cruelty, advocating for each of our victims. We believe that every call is important, that is why no call ever goes unanswered. The Bully Police Squad strives to educate all parents, children, and teachers on the causes and effects of bullying. Hopefully through this effort, more and more children will be able to see school as a safe learning environment. Currently, she has many projects in the works, television, theatre and advising, just to name a few. The Bully Police Squad was featured", "up to three years. The SBH holds about 400 inmates aged 11 through 18 who have been sent there by the courts for committing offences such as theft, robbery or rioting, or because they have been deemed to be Beyond Parental Control.\nThe superintendents of reformatories are allowed to impose corporal punishment on both male and female residents for serious misconduct. They are required to maintain a record of the details and evidence of the offender's misconduct and their reasons for deciding to cane him/her.\nThe punishment is administered in private by the superintendent or an authorised officer of the same sex", "abuser: \"They are men or women with a lot of power who use it with vulnerable people to get what they want. Normally they lack empathy, which is what places us in someone else's pain and makes us not hurt or be selfish.\" The Department of Psychology of the University of Málaga added that the rapist does not usually assimilate that he is committing a crime, since his mind is usually narcissistic. People with media power usually present themselves with a \"charming\" personality, so victims are not believed. The personality of abusers in show business also has atypical behaviors such", "tolerating bullying, typically breaches that contractual term. Such a breach creates circumstances entitling an employee to terminate his or her contract of employment without notice, which can lead to a finding by an Employment Tribunal of unfair dismissal, colloquially called constructive dismissal. An employee bullied in response to asserting a statutory right can be compensated for the detriment under Part V of the Employment Rights Act 1996, and if dismissed, Part X of the same Act provides that the dismissal is automatically unfair. Where a person is bullied on grounds of sex, race or disability et al., it is outlawed", "are laws that \"expressly exempt faith-based actions that result in harm.\"\nTurley disagrees with the theory that dealing with bullies is just a part of growing up, claiming that they are \"no more a natural part of learning than is parental abuse a natural part of growing up\" and believes that \"litigation could succeed in forcing schools to take bullying more seriously\".\nHe has written extensively about the injustice of the death penalty, noting, \"Human error remains a principal cause of botched executions. ... eventually society will be forced to deal directly with a fundamental moral question: Has death itself become the", "Norwich sexual abuse ring In 2010, police received a report of a child sex abuse ring in Norwich, England. The recurring crimes spanned 10 years and all victims, two boys and three girls, were younger than 13. The perpetrators organized sex parties where adults played card games to decide who would abuse which child. Three ringleaders received significant prison sentences. Abuse The sexual abuse was committed for ten years in Norwich and London and ended in 2010 when an initial report was made to police and the children were \"safeguarded\". The children were abused so often that they thought it", "\"studs\", \"cockmongers\", or \"fuckers\"), who are chosen because of their large penises. They then kidnap nine young men and nine young women and take them to a palace near Marzabotto.\nCircle of Manias / Girone delle Manie \n\nAccompanying the libertines at the palace are four middle-aged prostitutes, also collaborators, whose job it is to orchestrate debauched interludes for the men, who sadistically exploit their victims. During the many days at the palace, the four men devise increasingly abhorrent tortures and humiliations for their own pleasure. During breakfast, the daughters enter the dining hall naked to serve food. One of the studs", "company, a typical practice at a black company is to hire a large number of young employees and then force them to work large amounts of overtime without overtime pay. Conditions are poor, and workers are subject to verbal abuse and \"power harassment\" (bullying) by their superiors. \nIn order to make the employees stay, superiors of black companies would often abuse the reputation of a young employee quitting. Noteworthy cases Mina Mori—26 years old, a worker at the restaurant chain Watami—committed suicide two months after joining the company in 2008. Her family lodged a complaint with the Yokosuka Labor Standards", "the magistrates to send vulnerable youngsters to industrial schools to learn to be industrious, and learn skills that would make then more employable.\nMore serious crimes, required an element of punishment in an environment away from older prisoners, who would have a further negative effect on the youngster, before the task of reforming their ways. The power to set up such an establishment was given in the 1854 Youthful Offenders Act (the Reformatory Schools Act). This provided financial assistance and support for reformatory schools for convicted young offenders as an alternative to prison. Industrial schools were regularised three years later by", "ones from veering off course.' Positions of responsibility The January 1, 1997 issue of The Watchtower stated, \"For the protection of our children, a man known to have been a child molester does not qualify for a responsible position in the congregation. Moreover, he cannot be a pioneer or serve in any other special, full-time service.\" Whether or not a child abuser is deemed a \"known molester\" is left to the discretion of the local branch. The October 1, 2012 letter to elders states, \"the branch office, not the local body of elders, determines whether one who has sexually abused", "acknowledged until the close of the 19th century. On western ranches today, the working cowboy is usually an adult. Responsibility for herding cattle or other livestock is no longer considered suitable for children or early adolescents. However, both boys and girls growing up in a ranch environment often learn to ride horses and perform basic ranch skills as soon as they are physically able, usually under adult supervision. Such youths, by their late teens, are often given responsibilities for \"cowboy\" work on the ranch. Other historic word uses \"Cowboy\" was used during the American Revolution to describe American fighters who", "a range of techniques to deliver its bullying prevention model and engage with young people. As well as the core BB Mentoring that took place in schools, the charity provided an online social networking and mentoring service through the www.beatbullying.org website where young people mentored other young people about bullying and issues surrounding bullying and had access to specialist counsellors online. Campaigns and policy work BeatBullying campaigned to shape attitudes and change behaviour relative both to on and offline bullying. It ran regular media campaigns including \"The Big March\", a digital demonstration where instead of streets, the public was invited", "Bullying UK Website Pupils can find help on dealing with violence and name calling, homophobia, racism, hi-tech bullying like happy slapping, text bullying by phone and abusive websites, self-harm, falling out with friends, bullying on the school bus and walk to school, body language, how to help someone being bullied and moving to a new school. There is also advice for pupils who are bullies.\nParents can find help on taking a complaint through the education system, from the classroom teacher, head teacher or principal, governors, local education authority (LEA) and DfES (Department for Education and Skills). There are sections for", "such as supervisor bullying and undermining in that it does not describe the intentions or objectives of the supervisor. Workplace deviance Workplace deviance is closely related to abusive supervision. Abusive supervision is defined as the \"subordinates' perceptions of the extent to which their supervisors engage in the sustained display of hostile verbal and nonverbal behaviors\". This could be when supervisors ridicule their employees, give them the silent treatment, remind them of past failures, fail to give proper credit, wrongfully assign blame or blow up in fits of temper. It may seem like employees who are abused by their supervisor will", "Bullying in medicine Bullying in the medical profession is common, particularly of student or trainee physicians. It is thought that this is at least in part an outcome of conservative traditional hierarchical structures and teaching methods in the medical profession which may result in a bullying cycle.\nAccording to Field, bullies are attracted to the caring professions, such as medicine, by the opportunities to exercise power over vulnerable clients, employees and students.\nWhile the stereotype of a victim as a weak person who somehow deserves to be bullied is salient, there is growing evidence that bullies, who are often driven by", "are attractive to the children and youth because they offer protection, recognition, and career options that those who join could not achieve on their own. Favelas are now often controlled by juveniles and young adults.\nThe concern here is of the strong ties that are between illegal business and politicians, police officers, the justice system, and the economy. Not all people are involved but all layers of society are affected because of corruption. Police are bribed to not disturb what these gangs are doing, as well as many of them are dealers themselves. Also, the young children are carrying guns", "keep the names of suspected child molesters on file, but do not share them with law enforcement or take other measures to end abuse, and sometimes try to discourage people from taking a case to the police.\nReports of abuse to religious authorities rarely result in punishment for the offender; as in the Catholic sex abuse cases—where child molesters were re-assigned to other dioceses—rabbis, teachers, and youth leaders found to be abusing children are usually re-assigned to another yeshiva, perhaps after seeing a board of rabbis.\nMany of the people accused and/or convicted of sexual abuse and related charges in Brooklyn's Haredi", "It is a deliberate attempt to force a person out of their workplace by humiliation, general harassment, emotional abuse and/or terror. Mobbing can be described as being \"ganged up on.\" Mobbing is executed by a leader (who can be a manager, a co-worker, or a subordinate). The leader then rallies others into a systematic and frequent \"mob-like\" behaviour toward the victim.\nMobbing as \"downward bullying\" by superiors is also known as \"bossing\", and \"upward bullying\" by colleagues as \"staffing\", in some European countries, for instance, in German-speaking regions. At school Following on from the work of Heinemann, Elliot identifies mobbing as", "tend to discourage heckling via signage and admissions policy, but tend to tolerate it as it creates customer loyalty. The etiquette of exactly how much heckling is tolerated differs immensely from venue to venue, however, but is generally more likely to be tolerated in blue-collar or working-class venues.\nComedians generally dislike heckling. Hecklers may rarely threaten or physically assault comedians. Even more rarely, comedians may receive death threats. Countering Comedians counter hecklers by controlling the flow of conversation. Some comedians ignore the heckling. Others devise a strategy for quashing such outbursts, usually by having a repertoire of comebacks for hecklers—known as", "up to age six are permitted to live with a parent in prison, but in practice children up to 12 years old do so. Prisoners have the right to complain about abuses, but they rarely dare to do so for fear of retaliation." ]
Why is the measurement of time (seconds, minutes, hours) based around the number 60? Why not a more common base, like 10 or 100?
[ "60 is divisible by 2, 3, 4, 5, 6, 10, 12, 15, 20, and 30. Lots of options for splitting time into neat segments. You can divide 60 into halves, thirds, quarters, fifths, sixths, tenths, twelfths, fifteenths, twentieths, and thirtieths.\n\n10 is only divisible by 2 and 5. So you can only divide it neatly into halves and fifths. It's just not as flexible.\n\nEdit: I'm a political junkie, so I comment on a lot of threads featuring hot-button issues. But according to my inbox, this is the most incendiary comment I've ever made.", "Everyone answered this well, but note that if you count finger bones (3 on each of 4 fingers) rather than fingertips, you could be counting in base 12 and counting/tracking up to 60 is simple 12 bones and 5 fingertips (which is what we believe the Sumerians did).", "_URL_0_\n\n\"There are two entirely different kinds of \"minute\" or \"second\", and \nyou have to be careful not to confuse them. In each case, they are \n1/60 of some larger unit. When we measure time, we divide each HOUR \ninto 60 equal parts called \"minutes\", and each minute into 60 equal \n\"seconds\". We also do the same thing when we measure angles, so that \neach DEGREE is divided into 60 minutes, and each minute OF ANGLE is \ndivided into 60 seconds. The units are different; an hour is not the \nsame as a degree in any sense, and their relationship has nothing to \ndo with the angle corresponding to a minute on a clock, or in the \nearth's rotation.\n\nHere's what happened. The ancient Babylonians liked the number 60, \nand in fact based their number system on it almost the way we base \nours on 10. So any unit would be divided naturally into 60 equal \nparts. That worked well for various reasons, so early astronomers \nused that scheme to measure angles, dividing a circle into 360 parts \n(6 times 60), and then dividing each of those parts into 60 minutes, \nand then into 60 seconds. The word \"minute\" just meant \"little \npart\", and \"second\" meant \"second division into little parts\"!\n\nAt some point people started wanting to divide time into smaller parts \ntoo; in ancient times it was hard enough to measure hours, but once \nmechanical clocks were invented it became possible to divide hours up. \nHow many units should there be in each hour? They might have used 12, \nas they had long before divided the day and the night each into 12 \nparts; but someone felt that 60 parts would be nice (probably an \nastronomer!). So they needed a name for 1/60 of an hour, and since \n\"minute\" already meant \"1/60 of something\", they called it a minute. \nThey probably never considered the confusion it would cause when \nsomeone looked at a clock and asked how far the hand had moved. If I \nsay it moved 30 minutes, do I mean 30/60 of an hour on the dial, or \n30/60 of a degree of angle? That's unfortunate; but if you remember \nthat the size of a degree has nothing to do with the length of an \nhour, and that the two kinds of minutes are just 1/60 of an hour or a \ndegree respectively, then you can see that they just aren't related.\n\nIf you have any further questions, feel free to write back.\n\n- Doctor Peterson, The Math Forum\n _URL_1_ \nAssociat\"", "The answers here are interesting, but they just provide arguments why 60 is a good choice, no historical reason as for why 60 was chosen.\n\nThe previous edition of this question really nailed it. I could go ahead and copy some comments verbatim but it's so young that users there can still receive karma: _URL_2_", "Lots of people mention the Sumerians, but they definitely didn't have hours, minutes, and seconds to measure time.\n\nRather, the answer lies with the Greeks. In Egypt. Because Egypt was Greek at one point. Specifically, the famous 4th century CE astronomer Ptolemy, whose wildly incorrect views of the universe were the basis of modern science until basically Galileo. In his time, we didn't have decimals. I mean, we didn't even have *digits* yet; those came from India a few centuries later. So we used fractions, and thanks in part to the astronomical traditions inherited from the Babylonians, the common method of approximating numbers was with fractions in base 60. You had some whole number of a quantity, then some number of minute divisions, and some number of *second* divisions, *third* divisions, etc., each of them 1/60 of the previous one. So degrees were divided into minutes (1/60th of a degree), seconds (1/60th of a minute), thirds (1/60th of a second), and so forth, and that's how Ptolemy did his astronomical calculations in the Almagest. Since his book was so influential, it's what people continued to use, in Arabia and then Europe, for centuries until Ptolemy's geocentric view was replaced by actual orbital mechanics around the Sun. Meanwhile, a system of describing time needed to be precise as well for these calculations. They didn't have *clocks*. They had divided the day and the night into 12 hours each, and these were standardized as being all the same length so there'd be 24 equal hours in a day (this was an Egyptian thing too), but there were no clocks so it's not like you could see what time it was. But the numbers were used in the calculations, so they were divided the same way degrees were, into minutes, seconds, thirds, etc. Note that even if you assume geocentricity, the Sun still goes around the Earth on a 24-hour cycle, so you could draw that circle of the Sun going around the Earth and use it as a reference point for the other celestial events being modeled.\n\nWell, eventually we got clocks, and since we were already using minutes and seconds as divisions of the hour, those became standard. Thirds were too small to use, so there was no point. That's why today we don't bother with thirds, just minutes and seconds, and we use decimals (because they've been invented) to get smaller bits of time.", "Some good answers already, just wanted to add that they could count to 60 by using the five fingers of one hand to point to the twelve knuckles of the other hand.", "/u/ezbot0 is the only correct person here so far. The ancient Sumerians used base 60 for all numerical values and invented the concept of the second that we use today. All of this stuff about divisibility is total nonsense", "Ten and 100 are common bases now, but we've been measuring time since before base ten was fashionable.", "first of all, we use 360 degrees to make circles and measure the angles of polygons. Next, we use 32 degrees as freezing, add 180 deg. F., and we get the boiling point of water, 212. It's definitely NOT decimal, only.\n\nNext, we use 24 hours to a day, 60 minutes to the hour, 60 seconds to the minute, and so forth. Same with degrees latitude and longitude, 1 degree equals 60 minutes, 1' equals 60\", and so forth.\n\nalso we use 12 to make a dozen as well. It's the same principle, as 24 hours in a day.\n\nThe reason is Babylonia's hexadecimal system which was base 60, essentially. \n\nIN ancient times, they did not have our fractions system. They used integral fractions, which the Egyptians invented and were the basis of fractional maths until about the 1400's AD or so. Each fraction was 1/n, so that everything fractional was expressed as a series of 1/n. 1/2 was easy, but could be expressed using 1/6 plus 1/3. It was a very efficient method of dealing with the details of measurements, the fractions. It was highly efficient as most methods from Khemet. Pen and ink we still use the last 5K years, right? Efficiency.\n\nFor the Egyptians, PI was 4(8/9 squared). It's about 3.16, and it's the easiest way of expressing PI, as well. using their integral fraction methods. Note how many ways we can cross out 2 3's, 4's, 6 & 8, and so forth. It's a very quick calculation method and finding.\n\nBut the key was as stated briefly below. 12 is divisible by 1, 2, 3, 4, 6, and 12. Which made divvying up objects a lot easier. Bakers use the dozen even today. This made partial amounts LOTS easier to manipulate.\n\n24 hours in a day?, perfect number, 1, 2, 3, 4, 6, 8, 12, 24. Again, easy to divvy up the days, is not? The numbers of companies in an Egyptian military division column? You guessed it. 12.\n\nAnd multiply by 5, and get 60. So, where using fractions was key, as in measuring, it provided a HUGEly simple, time saving method to do the calculations, right? & highly accurate, too. It WAS Efficient!! Nothing better for 4000 years!!! Least energy all the way. & that's why it was used and succeeded and still does.\n\nLeast Energy Rules. and THAT's why we still use it. Least Energy, 2nd law of thermodynamics. Processes strongly tend toward least energy paths. Even planets in orbits. Even suns orbiting the galaxy. Even the paths of every single, observable & known, photon. Least energy. Universally true, in the entire universe.\n\nFacts? Fusion is seen throughout the observable universe, and the combining of 4 protons to make a very stable He4 atom is least energy favored. 14 gigalight years into the future and up to the present and all spaces in between. & 14 GIGayears into the past, up to the present and ALL times in between. Enormous stability. Also least energy.\n\nSo, it's NOT just ease of calculating, but thermodynamics and AND physics, too.\n\nLeast energy Rules.\n\nThis Is how it works:\n\n_URL_5_\n\nSave energy and the system massively grows, in the long term, as above.\n\nThis is how it works in the brain/mind:\n\n_URL_4_\n\nAnd that's the \"Depths within Depths\" understanding underlying the 60's, 24, and 12 counts, too. Physics, universal. \n\nAnd our brain works using least energy, as Dr. Karl Friston (Univ. Coll. London, Dept. Neuroimaging), has repeatedly shown, too, in his work on brain and neuroscience. Dr. M. O'Keefe there got a Nobel Prize in Med./Physiology in 2014, to give some idea of the quality of work there.\n\nTo whit: a deep and rigorous sets of evidences,\n\n_URL_3_\n\nBut you asked..........", "A little more in-depth than a ELI-5 typical answer because understanding the historical context is key to the reason behind the 'standards' used to measure time.\n\n_URL_6_\n\n\nTLDR: The ability to measure time increased in precision as advances in technology progressed. Metric system debuted about the time it was possible to measure 'seconds' with reliable precision.\n\nFirst was day/night. It was either dark or it was light. Tracking the movement of the sun/stars made it possible to be somewhat more 'precise' in knowing when it was during day/night in general. \n\nTime-keeping devices made it easier to 'sub-divide' the day into smaller increments. Those increments used the 'common' measurements of the day, i.e. base 12, then base 10, and continuing to today's ability to measure to the zeptosecond.\n\nA zeptosecond is one trillionth of a billionth of a second. It was used to measure an electron escaping its atom for the first time in 2016.", "What's always bothered me is, why make a mile 5280 feet? Why not just a nice crisp, easily mathed number like 5000?", "The real question here is why don't we use a base 12 number system? :( then questions like this wouldn't exist", "Because it's historically how they did it. When humans tried to count time a long time ago, they separated the circle the sun dial went around in 360 degrees, (6x60), and then each degree in 60 arc minutes, and each arc minute in 60 arc seconds. 60 has lots of dividers (2x2x3x5) so its a convenient number. \n\nThis system dates back to ancient romans and Greeks, if not before, if I'm not mistaken. \n\nThen, in the French revolution, people did try to change it to decimal, when they invented the metric system. They made decimal clocks with hours 100 minutes long, and minutes 100 seconds long, decimal calendars with weeks of 10 days, etc. But they never managed to implement it fully before they got replaced with another government, and the old way to count time stuck even though the metric system stayed. \n\nHonestly I think they shouldn't have used base 10: they should've used base 12, just like inches and feet use, but make every unit of measurement use 12. It has more dividers than 10 (2x2x3) which makes for easier fractions and multiplication, and people were already used to it thanks to the feet and inches. Oh well.", "_URL_7_\n\nTake a look at the first 4:30min of the video. He talk about highly divisible numbers. Meaning which numbers have a lot of divisible numbers. That's why we use 60. \n\n10 is really not a good numbers for that. The only reason it seem more natural is because we count in base 10 and we count in base 10 because we have 10 fingers.\n\nThat's also why the imperial system is in base 12, 24 hours in a day, or that we use 360 degrees in a circle.", "I read somewhere once (don't remember the source) that it has to do with our Gregorian calendar. Sort of irrelevant , but that's why Stonehenge has around 56? pits dug into the middle area. Had to do with their different form of keeping track of time. But that doesn't really explain why they still go by normal (as listed above) hours , time, minutes, etc.", "The French tried to do this after the revolution in 1789. They restructured much of their daily lives, like renaming the months of the year and restarting the calendar. Some things lasted longer than others, but keeping time with 100 seconds per minute/100 minutes per hour/10 hours per day was not one of them.", "60 hours? I don't think so. 12 hours, as in 12 months (lunar cycles). I would think 12 would be the base, and then come the other (both greater and smaller).", "I always thought it was based on the average heart beat, about 60 bpm. Could still be partly true, but there's some great other answers here!", "It goes back to the ancient Babylonians, who used a base 60 number system. It made it much easier to do fractions: 60 is evenly divisible by every number between 1 through 12, except 7, 8, 9, and 11.\n\nIt was the Babylonians that divided the whole day into 12 hours. The Romans adopted the standard, but divided the day and the night into 12 hours, for a total of 24. We have retained this Roman standard.\n\nThe reason we call it a \"minute\" is because it is a small part, or a minute part, if you will---1/60th---of an hour. The reason why we call it a \"second\" is because it is a second division of 60: 1/60th of a minute.\n\nThere's no definite consensus as to why the circle was divided into 360 degrees. But it is noteworthy that 360 days is nearly equal to a year---which means that the earth orbits the sun at a rate of nearly 1 degree per day.", "Lots of reasons, historically speaking led to 60 second minute/hour, partly due to the babylonian base 6 system which was mathematically convenient for geometry. Egyptians also had an influence on dividing the day into 24 hours 10 daylight hours and 2 twilight hours morning and night. All of these systems came to be before we developed the system we all know today base 10 numbers. \nProbably why 2pi isn't just 0; because 0 wasn't a thing yet. Much like the babylonian system, pi/6 is 30 degrees 2pi/6 is 60 pi/2 is 90 and so on and so forth back around to pi=180* and 2pi=360* easily divisible by 6. \nFYI I'm not an expert just took a history of science and tech course last semester, loved it. History of math is so cool... Urgh just read that out loud. I'm such a nerd.", "The smallest unit of time that can in ancient times be universally defined no matter where you are on earth is a day/night. In ancient Babylon they did not use a decimal system, which is the numbers system we use today based on a base of 10, but they used a base of 60 or sometimes 12. So the Babylonians decided to divide the length of of time of a day by 12 hours, an hour by 60 minutes and a minute by 60 seconds. And since they were the first ones to do this (well), their use spread across the world until it became the norm.\n\nSo it's pretty arbitrary but based on the length of time of 1 day. It's like if we divided the length of time of 1 day by 10,000 and called that a second", "I don't know if this has been said already, but I heard that it was because of the Sumarians and their way of thinking. Forgive me for not being too specific about the details as I do not remember them, but a big reason why our sense of time is set mainly around the two numbers, 12 and 60 are because the Sumarians made many observations of the phases of the moon and the average day.", "THE DIVISION of the hour into 60minutes and of the minute into 60 seconds comes from the Babylonians who used a sexagesimal (counting in 60s) system for mathematics and astronomy. They derived their number system from the Sumerians who were using it as early as 3500 BC.", "The thing that annoys me with this topic, I'm a production fitter and turner and it seems every one writes angles with decimals instead of minutes so they would write 10.5 degrees Which is actually 10 degrees 30 minutes. Why do they do this ???", "Because of its divisibility by 12. \nYou have 3 sections on your fingers = 12 total. Each set of 12 could be represented by 1 finger on the right hand. \n5 sets of 12 = 60\n\nI think it goes back to the Babylonians.", "It's a throwback to the earliest recorded numbering system. The Sumerians used a base-60 math system, and it stuck. Similarly, our 12 month calendar comes from the Egyptians, who had 12 months of 30 days plus a 5 day annual festival.", "What I'm curious about is why a second is as long as it is. Is it just humans being arbitrary in order to be rational or something?", "Funny how this gets a \"repost\" tag but any time I post a question that hasn't been asked in months mine gets deleted.", "60 is a [superior highly composite number](_URL_9_).\n\nSee also: _URL_8_" ]
[ "13:30 would be regarded as odd.\nIn spoken language, most often time is expressed in the 12-hour clock. However, \"a.m.\" and \"p.m.\" are never used. Instead, an apposition is added, for instance 21:00 is said as \"9 uur 's avonds\" (9 o'clock in the evening). Half hours are relative to the next hour – for example, 5:30 is said as \"half 6\". Quarter hours are expressed relative to the nearest whole hour – for example, 6:15, \"kwart over 6\" (quarter past six) and 6:45, \"kwart voor zeven\" (quarter to seven). Minutes are usually rounded off to the nearest five minutes and", "into 24 hours of 60 minutes, with each minute composed of 60 seconds. Decimal and metric time In the 19th century, an idea circulated to make a decimal fraction (​¹⁄₁₀ ₀₀₀ or ​¹⁄₁₀₀ ₀₀₀) of an astronomical day the base unit of time. This was an afterglow of the short-lived movement toward a decimalisation of timekeeping and the calendar, which had been given up already due to its difficulty in transitioning from traditional, more familiar units. The most successful alternative is the centiday, equal to 14.4 minutes (864 seconds), being not only a shorter multiple of an hour (0.24 vs", "spanning 10⁻²⁴ to 10²⁴, 48 decimal orders of magnitude which may be used in conjunction with the metric base unit of second. Metric units of time larger than the second are most commonly seen only in a few scientific contexts such as observational astronomy and materials science although this depends on author; for everyday usage and most other scientific contexts the common units of minutes (60 s), hours (3600 s or 3.6 ks), days (86 400 s), weeks, months, and years (of which there are a number of variations) are commonly used. Weeks, months and years are significantly variable units", "where it is common to add times in an already complicated environment, time tracking is simplified by recording decimal fractions of hours. For instance, instead of adding 1:36 to 2:36, getting 3:72 and converting it to 4:12, one would add 1.6 to 2.6 and get 4.2 hours. Decimal multiples and fractions of the second The second is the International System of Units (SI) unit of time duration. It is also the standard single-unit time representation in many programming languages, most notably C, and part of UNIX/POSIX standards used by Linux, Mac OS X, etc.; to convert fractional days to fractional", "express longer periods of time like hours or days in seconds, because they are awkwardly large numbers. For the metric unit of second, there are decimal prefixes representing 10⁻²⁴ to 10²⁴ seconds.\nSome common units of time in seconds are: a minute is 60 seconds; an hour is 3,600 seconds; a day is 86,400 seconds; a week is 604,800 seconds; a year (other than leap years) is 31,536,000 seconds; and a (Gregorian) century averages 3,155,695,200 seconds; with all of the above excluding any possible leap seconds.\nSome common events in seconds are: a stone falls about 4.9 meters from rest in one", "have passed. However, we usually prefer to measure time in hours or minutes, and it is not difficult to change the units of time. For example, since 1 hour is 3 twenty-minute intervals, the population in one hour is . The hourly growth factor is 8, which means that for every 1 at the beginning of the hour, there are 8 by the end. Indeed, \n\nwhere is measured in hours, and the relative growth rate may be expressed as or approximately 69% per twenty minutes, and as or approximately 208% per hour. RGR of", "also sometimes used informally to denote minutes of time. History One of the earliest known uses of the minute (and the second) is found in John of Sacrobosco's Computus (ca. 1235), where he used them when discussing the length of the tropical year. No earlier records for the origin of the minute as ​¹⁄₆₀ of the hour and the second ​¹⁄₆₀ of the minute have ever been found. Another motivation that has been suggested for the emergence of these fine divisions of time was the construction of \"precision\" timepieces (mechanical and water clocks). \nHistorically, the word \"minute\" comes from", "Time in physics The unit of measurement of time: the second In the International System of Units (SI), the unit of time is the second (symbol: ). It is a SI base unit, and it has been defined since 1967 as \"the duration of 9, 192, 631, 770 [cycles] of the radiation corresponding to the transition between the two hyperfine levels of the ground state of the caesium 133 atom\". This definition is based on the operation of a caesium atomic clock. These clocks became practical for use as primary reference standards after about 1955 and have been in", "hour—for example, 8 o' clock is written as 8 diǎn (八点; 八點). \nFēn is also used for minutes. To avoid confusion, sometimes the word fēnzhōng (分钟; 分鐘, literally \"clock minute\") is used to clarify that one is talking about modern minutes. The time 09:45 can thus be written as \"9 shí, 45 fēn\" (九时四十五分; 九時四十五分) or \"9 diǎn, 45 fēn\" (九点四十五分; 九點四十五分).\nKè has been defined as ​¹⁄₉₆ of a day since 1628, so the modern kè equals 15 minutes and each double hour contains exactly 8 kè. Since then, kè has been used as shorthand to talk about time in", "devices, and units of time were measured in degrees of arc. Conceptual units of time smaller than realizable on sundials were also used.\nThere are references to 'second' as part of a lunar month in the writings of natural philosophers of the Middle Ages, which were mathematical subdivisions that could not be measured mechanically. Fraction of solar day The earliest mechanical clocks which appeared starting in the 14th century had displays that divided the hour into halves, thirds, quarters and sometimes even 12 parts, but never by 60. In fact, the hour was not commonly understood to be the duration", "zero is multiplied by 1. This notation leads to the modern signs for degrees, minutes, and seconds. The same minute and second nomenclature is also used for units of time, and the modern notation for time with hours, minutes, and seconds written in decimal and separated from each other by colons may be interpreted as a form of sexagesimal notation.\nIn some usage systems, each position past the sexagesimal point was numbered, using Latin or French roots: prime or primus, seconde or secundus, tierce, quatre, quinte, etc. To this day we call the second-order part of an hour", "needed standard units of time alongside the units of length and mass. He chose the second (rather than the minute or the hour) as his unit of time, thereby implicitly making the second a base unit of the metric system. The hour and minute have however been \"accepted for use within SI\".\nDuring the 20th century it became apparent that the Earth's rotation was slowing down. This results in days becoming 1.4 milliseconds longer each century. It was verified by comparing the calculated locations of eclipses of the Sun with those observed in antiquity going back to Chinese records of 763 BC", "century AD, uses base 60 to express the fractional parts of numbers. In particular, his table of chords, which was essentially the only extensive trigonometric table for more than a millennium, has fractional parts of a degree in base 60.\nMedieval astronomers also used sexagesimal numbers to note time. Al-Biruni first subdivided the hour sexagesimally into minutes, seconds, thirds and fourths in 1000 while discussing Jewish months. Around 1235 John of Sacrobosco continued this tradition, although Nothaft thought Sacrobosco was the first to do so. The Parisian version of the Alfonsine tables (ca. 1320) used the day as the basic unit", "length as 250 cm. Surveyor's trade American surveyors use a decimal-based system of measurement devised by Edmund Gunter in 1620. The base unit is Gunter's chain of 66 feet (20 m) which is subdivided into 4 rods, each of 16.5 ft or 100 links of 0.66 feet. A link is abbreviated \"lk,\" and links \"lks\" in old deeds and land surveys done for the government. Time Time is an abstract measurement of elemental changes over a non spatial continuum. It is denoted by numbers and/or named periods such as hours, days, weeks, months and years. It is an apparently irreversible series", "sundials, and astronomical clocks sometimes show the hour length and count using some of these older definitions and counting methods. Counting from dawn In ancient and medieval cultures, the counting of hours generally started with sunrise. Before the widespread use of artificial light, societies were more concerned with the division between night and day, and daily routines often began when light was sufficient.\n\"Babylonian hours\" divide the day and night into 24 equal hours, reckoned from the time of sunrise. They are so named from the false belief of ancient authors that the Babylonians divided the day into 24 parts,", "making it ​¹⁄₂₄ of the mean solar day. Since this unit was not constant due to long term variations in the Earth's rotation, the hour was finally separated from the Earth's rotation and defined in terms of the atomic or physical second.\nIn the modern metric system, hours are an accepted unit of time defined as 3,600 atomic seconds. However, on rare occasions an hour may incorporate a positive or negative leap second, making it last 3,599 or 3,601 seconds, in order to keep it within 0.9 seconds of UT1, which is based on measurements of the mean solar day. Name", "into 10 tenths (décime). This hour was only briefly in official use, being repealed by the same 1795 legislation that first established the metric system.\nThe metric system bases its measurements of time upon the second, defined since 1952 in terms of the Earth's rotation in AD 1900. Its hours are a secondary unit computed as precisely 3,600 seconds. However, an hour of Coordinated Universal Time (UTC), used as the basis of most civil time, has lasted 3,601 seconds 27 times since 1972 in order to keep it within 0.9 seconds of universal time, which is based on measurements of the mean", "seconds, multiply the number by 86400. Fractional seconds are represented as milliseconds (ms), microseconds (μs) or nanoseconds (ns). Absolute times are usually represented relative to 1 January 1970, at midnight. Other systems may use a different zero point (like Unix time).\nIn principle, time spans greater than one second are given in units such as kiloseconds (ks), myriasecond (mys), megaseconds (Ms), gigaseconds (Gs), and so on. (The myriasecond is based on the myria- prefix, which represented a multiple of 10000 but was made obsolete in the mid-20th century.) Occasionally, these units can be found in technical literature, but traditional units like", "Hellenistic astronomers.\nBase-60 number systems have also been used in some other cultures that are unrelated to the Sumerians, for example by the Ekari people of Western New Guinea. Modern usage Unlike most other numeral systems, sexagesimal is not used so much in modern times as a means for general computations, or in logic, but rather, it is used in measuring angles, geographic coordinates, electronic navigation, and time.\nOne hour of time is divided into 60 minutes, and one minute is divided into 60 seconds. Thus, a measurement of time such as 3:23:17 (3 hours, 23 minutes, and 17 seconds) can be", "because clock time \"wraps around\" every 12 hours. Because the hour number starts over after it reaches 12, this is arithmetic modulo 12. According to the definition below, 12 is congruent not only to 12 itself, but also to 0, so the time called \"12:00\" could also be called \"0:00\", since 12 is congruent to 0 modulo 12. Congruence classes Like any congruence relation, congruence modulo n is an equivalence relation, and the equivalence class of the integer a, denoted by aₙ, is the set {… , a − 2n, a − n, a, a + n, a + 2n,", "are expressed relative to the closest half-hour. For instance 05:35 is \"5 over half 6\" (literally \"5 past half to 6\") and 05:20 is \"tien voor half 6\" (literally \"10 to half to 6\").\nWhen the 24-hour clock is used in spoken language, usually the written form is pronounced with the hours as a number, the word \"uur\" (hour) and the minutes as a number. For example, 17:21 might be pronounced as \"zeventien uur eenentwintig\" (seventeen hours twenty-one). Hours over 12 are not usually combined with phrasings using \"half\", \"quarter\", \"to\", or \"past\".", "​¹⁄₈ of a double hour or ​¹⁄₄ of a single hour. Their usage is similar to using \"quarter hour\" for 15 minutes or \"half an hour\" for 30 minutes in English. For example, 6:45 can be written as \"6 diǎn, 3 kè\" (六点三刻; 六點三刻).\nMiǎo is now the standard term for a second. Like fēn, it is sometimes written as miǎozhōng (秒钟; 秒鐘, literally \"clock second\") to clarify that someone is talking about modern seconds.", "minutes and every other division of time is a different duration at different times of the year. The time of day measured with mean time versus apparent time may differ by as much as 15 minutes, but a single day will differ from the next by only a small amount; 15 minutes is a cumulative difference over a part of the year. The effect is due chiefly to the obliqueness of earth's axis with respect to its orbit around the sun.\nThe difference between apparent solar time and mean time was recognized by astronomers since antiquity, but prior to the invention", "sexagesimal orders of magnitude rather than decimal, i.e. a year is 12 months, and a minute is 60 seconds.\nThe smallest meaningful increment of time is the Planck time, the time light takes to traverse the Planck distance, many decimal orders of magnitude smaller than a second. The largest realized amount of time, given known scientific data, is the age of the universe, about 13.8 billion years - the time since the Big Bang as measured in the cosmic microwave background rest frame. Those amounts of time together span 60 decimal orders of magnitude. Metric prefixes are defined", "nights\". The modern concept of zero as a number was introduced by Indian scholars only in the fifth century AD, so that for example the Gregorian calendar never had a year \"AD 0\" and instead begins with the year AD 1 which is immediately preceded by 1 BC. Applied to the reckoning of days, in the absence of a day \"zero\", that is, using inclusive counting, many modern languages (e.g. Greek, Italian, Spanish, French, Portuguese, Welsh) continue referring to two weeks as \"fifteen days\", whereas in English, which does observe zero and thus uses exclusive counting, this space of time", "Minute The minute is a unit of time usually equal to ​¹⁄₆₀ (the first sexagesimal fraction) of an hour, or 60 seconds. In the UTC time standard, a minute on rare occasions has 61 seconds, a consequence of leap seconds (there is a provision to insert a negative leap second, which would result in a 59-second minute, but this has never happened in more than 40 years under this system). Although not an SI unit, the minute is accepted for use with SI units. The SI symbol for minute or minutes is min (without a dot). The prime symbol is", "of accurate mechanical clocks in the mid-17th century, sundials were the only reliable timepieces, and apparent solar time was the generally accepted standard. Events and units of time in seconds Fractions of a second are usually denoted in decimal notation, for example 2.01 seconds, or two and one hundredth seconds. Multiples of seconds are usually expressed as minutes and seconds, or hours, minutes and seconds of clock time, separated by colons, such as 11:23:24, or 45:23 (the latter notation can give rise to ambiguity, because the same notation is used to denote hours and minutes). It rarely makes sense to", "Time code ambiguity In telecommunication, time code ambiguity is the shortest interval between successive repetitions of the same time code value.\nFor example, in a time code in which year-of-century (the '72' in 10/04/72) is the most slowly changing field, the time code ambiguity would be 100 years; it is ambiguous whether this value refers to a date in 1872, 1972 or some other century. For a digital clock in which hours and minutes up to a maximum of 11:59 are displayed, the time code ambiguity would be 12 hours.\nThe Year 2000 problem is an example of the pitfalls of time", "12 o'clock was conventionally located at the top of the dial. French decimal time During the French Revolution in 1793, in connection with its Republican calendar, France attempted to introduce a decimal time system. This had 10 decimal hours in the day, 100 decimal minutes per hour, and 100 decimal seconds per minute. Therefore, the decimal hour was more than twice as long (144 min) as the present hour, the decimal minute was slightly longer than the present minute (86 seconds) and the decimal second was slightly shorter (0.86 sec) than the present second. Clocks were manufactured with", "of 60 minutes. It was not practical for timekeepers to consider minutes until the first mechanical clocks that displayed minutes appeared near the end of the 16th century. By that time, sexagesimal divisions of time were well established in Europe.\nThe earliest clocks to display seconds appeared during the last half of the 16th century. The second became accurately measurable with the development of mechanical clocks keeping mean time, as opposed to the apparent time displayed by sundials. The earliest spring-driven timepiece with a second hand which marked seconds is an unsigned clock depicting Orpheus in the Fremersdorf collection, dated between" ]
Why do we, and all other animals, breath and use oxygen when nitrogen is so much more available in the atmosphere?
[ "The nitrogen gas molecule (N2) is extremely stable and hard to crack apart. Most living organisms can't do it - most of the biological nitrogen in existence came from specialized bacteria.\n\nOn the other hand, the oxygen gas molecule (O2) is highly reactive, meaning its energy can be harnessed for useful chemical reactions, like those that support life.", "Nitrogen is pretty stable, it likes to bond to another nitrogen and stay like that\n\nOxygen is not. It likes to react, with whatever it can.\n\nCarbon? Great! Iron? Sure! Copper? Why not? Hydrogen? Hell yeah! \n\nOxygen's desire to react means that it can be used to create energy. When you split an O2 molecule it takes a bit of energy, when you let them get together with a C you get even more back. Plants make sugar out of water and CO2, everything splits the sugar, bonds it with O2 to get energy back out, and produces CO2 and water\n\nThere are some bacteria that live in legume roots that do have a nitrogen cycle, they take in nitrogen and bond it with hydrogen to make ammonia which then gets turned into nitrates. This is why legumes are important for soil health" ]
[ "of birds do not include the same set of gas-producing bacteria that mammals have to aid in digestion, gas rarely builds up in the gastrointestinal tracts of birds.", "about half of modern values. Per unit volume, there is much more oxygen in air than in water, and vertebrates are active animals with a high energy requirement compared to invertebrates of similar sizes. The Devonian saw increasing oxygen levels which opened up new ecological niches by allowing groups able to exploit the additional oxygen to develop into active, large-bodied animals. Particularly in tropical swampland habitats, atmospheric oxygen is much more stable, and may have prompted a reliance of lungs rather than gills for primary oxygen uptake. In the end, both buoyancy and breathing may have been important, and some", "cross-current gas exchanger. This arrangement allows for more oxygen to be extracted compared to mammalian concurrent gas exchange; as oxygen diffuses down its concentration gradient and the air gradually becomes more deoxygenated, the pulmonary arteries are still able to extract oxygen. Birds also have a high capacity for oxygen delivery to the tissues because they have larger hearts and cardiac stroke volume compared to mammals of similar body size. Additionally, they have increased vascularization in their flight muscle due to increased branching of the capillaries and small muscle fibres (which increases surface-area-to-volume ratio). These two features facilitate oxygen diffusion from", "may contribute to an inflammation of the lungs. Some oxygen bar companies offer safe water-based aromas for flavoring in order to maintain compliance and stay within FDA guidelines.\nOxygen may also cause serious side effects at excessive doses. Although the effects of oxygen toxicity at atmospheric pressure can cause lung damage,\nthe low fraction of oxygen (30–40%) and relatively brief exposures make pulmonary toxicity unlikely. Nevertheless, due caution should be exercised when consuming oxygen. In the UK, the Health and Safety Executive publishes guidance on equipment (including tubing) and on staff training, as well as warning on potential hazards, and makes several", "for taste and smell after extended periods under pressure. Adaptation in other animals Aquatic mammals such as seals and whales dive after full exhalation, which would reduce the amount of nitrogen available to saturate the tissues by 80 to 90%.\nAquatic mammals are also less sensitive to low alveolar oxygen concentrations and high carbon dioxide concentrations than purely terrestrial mammals.\nSeals, whales and porpoises have slower respiratory rates and larger tidal volume to total lung capacity ratio than land animals which gives them a large exchange of gas during each breath and compensates for low respiratory rate. This allows greater utilisation of", "some physostomes (though not all) can use their gas bladder as a lung, allowing them to live from atmospheric oxygen in conditions where aquatic oxygen levels have dropped to a point which would kill other fish.", "methane, nitrogen, argon, helium, butane and propane. Along with trace gases such as carbon dioxide and ozone, these compose 79% of Earth's atmosphere. Risk management The risk of breathing asphyxiant gases is frequently underestimated leading to fatalities, typically from breathing helium in domestic circumstances and nitrogen in industrial environments.\nThe term asphyxiation is often mistakenly associated with the strong desire to breathe that occurs if breathing is prevented. This desire is stimulated from increasing levels of carbon dioxide. However, asphyxiant gases may displace carbon dioxide along with oxygen, preventing the victim from feeling short of breath. In addition the gases may", "avoid them, making purely hypoxic techniques possibly inhumane for them. For this reason, the use of inert gas (hypoxic) atmospheres (without CO₂) for euthanasia is also species-specific. Accidental deaths and injury Accidental nitrogen asphyxiation is a possible hazard where large quantities of nitrogen are used. It causes several deaths per year in the United States, which is asserted to be more than from any other industrial gas. In one accident in 1981, shortly before the launch of the first Space Shuttle mission, five technicians lost consciousness and two of them died after they entered the Orbiter aft compartment. Nitrogen", " However, there is no evidence against multiple sites for oxygen sensing in organisms. Acute responses to hypoxia Many hypoxic environments never reach the level of anoxia and most fish are able to cope with this stress using different physiological and behavioural strategies. Fish that use air breathing organs (ABO) tend to live in environments with highly variable oxygen content and rely on aerial respiration during times when there is not enough oxygen to support water-breathing. Though all teleosts have some form of swim bladder, many of them are not capable of breathing air, and they rely on", "air-breath during the hypoxia.\nThere are two main types of air breathing fish—facultative and non-facultative. Under normoxic conditions facultative fish can survive without having to breathe air from the surface of the water. However, non-facultative fish must respire at the surface even in normal dissolved oxygen levels because their gills cannot extract enough oxygen from the water.\nMany air breathing freshwater teleosts use ABOs to effectively extract oxygen from air while maintaining functions of the gills. ABOs are modified gastrointestinal tracts, gas bladders, and labyrinth organs; they are highly vascularized and provide additional method of extracting oxygen from the air. Fish also", "discontinued after some babies were blinded by the oxygen content being too high.\nBreathing pure O\n₂ in space applications, such as in some modern space suits, or in early spacecraft such as Apollo, causes no damage due to the low total pressures used. In the case of spacesuits, the O\n₂ partial pressure in the breathing gas is, in general, about 30 kPa (1.4 times normal), and the resulting O\n₂ partial pressure in the astronaut's arterial blood is only marginally more than normal sea-level O\n₂ partial pressure.\nOxygen toxicity to the lungs and central nervous system can also occur in deep scuba diving and", "in low-oxygen environments that result from inert gas exposure; however, the experience is still less aversive than CO₂ exposure. Physiology A typical human breathes between 12 and 20 times per minute at a rate primarily influenced by carbon dioxide concentration, and thus pH, in the blood. With each breath, a volume of about 0.6 litres is exchanged from an active lung volume (tidal volume + functional residual capacity) of about 3 litres. Normal Earth's atmosphere is about 78% nitrogen, 21% oxygen, and 1% argon, carbon dioxide, and other gases. After just two or three breaths of nitrogen, the oxygen concentration", "these animals is highly vascularized and moist, with moisture maintained via secretion of mucus from specialised cells, and is involved in cutaneous respiration. While the lungs are of primary organs for gas exchange between the blood and the environmental air (when out of the water), the skin's unique properties aid rapid gas exchange when amphibians are submerged in oxygen-rich water.\nSome amphibians have gills, either in the early stages of their development (e.g. tadpoles of frogs), while others retain them into adulthood (e.g. some salamanders). Fish Oxygen is poorly soluble in water. Fully aerated fresh water therefore contains only 8–10 ml O₂/liter", "to planets. Many scientists think the early Earth had a reducing atmosphere, along with Mars, Venus and Titan. This would have proven to be a good environment for Cyanobacteria to evolve the first photosynthetic metabolic pathways which gradually increased the oxygen portion of the atmosphere, changing it to what is known as an oxidizing atmosphere. With increased levels of oxygen, the evolution of the more efficient aerobic respiration might have been enabled, allowing animal life to evolve and thrive.\nThough most scientists conceive of the early atmosphere as reducing, a 2011 article in Nature found that cerium oxidation in zircon—which comprises", "Furthermore, the human body is adapted to 21 percent oxygen, and the blood exiting the lungs already has about 97 percent of the oxygen that it could carry bound to hemoglobin. Having a higher oxygen fraction in the lungs serves no purpose, and may actually be detrimental.\nThe medical profession warns that individuals with respiratory diseases such as asthma and emphysema should not inhale too much oxygen.\nHigher than normal oxygen partial pressure can also indirectly cause carbon dioxide narcosis in patients with chronic obstructive pulmonary disease (COPD).\nThe FDA warns that in some situations, droplets of flavoring oil can be inhaled, which", "all nitrogen from the lungs, and pure oxygen is insufflated), apneic oxygenation could theoretically be sufficient to provide enough oxygen for survival of more than one hour's duration in a healthy adult. However, accumulation of carbon dioxide (described above) would remain the limiting factor.\nApneic oxygenation is more than a physiologic curiosity. It can be employed to provide a sufficient amount of oxygen in thoracic surgery when apnea cannot be avoided, and during manipulations of the airways such as bronchoscopy, intubation, and surgery of the upper airways. However, because of the limitations described above, apneic oxygenation is inferior to extracorporal circulation", "considering only nitrogen as narcotic, since it is more conservative.\nIn this analysis, it is assumed that the narcotic potentials of nitrogen and oxygen are similar.\nAlthough oxygen has greater lipid solubility than nitrogen and therefore should be more narcotic (Meyer-Overton correlation), it is likely that some of the oxygen is metabolised, thus reducing its effect to a level similar to that of nitrogen.", "in an estuary for dissolved oxygen is higher than 6 ppm. Insufficient oxygen (environmental hypoxia), often caused by the decomposition of organic matter and/or nutrient pollution, may occur in bodies of water such as ponds and rivers, tending to suppress the presence of aerobic organisms such as fish. Deoxygenation increases the relative population of anaerobic organisms such as plants and some bacteria, resulting in fish kills and other adverse events. The net effect is to alter the balance of nature by increasing the concentration of anaerobic over aerobic species.", "significant risk reduction by using nitrox (more so than the PADI tables suggest). Nitrogen narcosis Controlled tests have not shown breathing nitrox to reduce the effects of nitrogen narcosis, as oxygen seems to have similarly narcotic properties under pressure to nitrogen; thus one should not expect a reduction in narcotic effects due only to the use of nitrox. Nonetheless, there are people in the diving community who insist that they feel reduced narcotic effects at depths breathing nitrox. This may be due to a dissociation of the subjective and behavioural effects of narcosis. Although oxygen appears chemically more narcotic at", "the concentration of oxygen because of the lack of circulation causes a dramatic switch from aerobic to anaerobic metabolism", "the Earth's environment. Because oxygen was toxic to most life on Earth at the time, this led to the near-extinction of oxygen-intolerant organisms, a dramatic change which redirected the evolution of the major animal and plant species.\nThe tiny (0.6 µm) marine cyanobacterium Prochlorococcus, discovered in 1986, forms today an important part of the base of the ocean food chain and accounts for much of the photosynthesis of the open ocean and an estimated 20% of the oxygen in the Earth's atmosphere. It is possibly the most plentiful genus on Earth: a single millilitre of surface seawater may contain 100,000 cells", "due to increased oxygen levels is known as the Haldane effect, and is important in the transport of carbon dioxide from the tissues to the lungs. A rise in the partial pressure of CO₂ or a lower pH will cause offloading of oxygen from hemoglobin, which is known as the Bohr effect. Transport of hydrogen ions Some oxyhemoglobin loses oxygen and becomes deoxyhemoglobin. Deoxyhemoglobin binds most of the hydrogen ions as it has a much greater affinity for more hydrogen than does oxyhemoglobin. Lymphatic system In mammals, blood is in equilibrium with lymph, which is continuously formed in tissues from", "at a greater risk for water loss face the challenge of either a depleted oxygen supply or desiccation, leading to an adaptive increase in tracheal volume in order to receive more oxygen. Excretion Following feeding, most insects retain enough water to completely hydrate their bodies, excreting the remainder. However, the amount of water excreted differs between species, and depends on the relative humidity and dryness of the environment. For example, Tsetse flies maintained at a high relative humidity, and thus non-arid conditions, excrete fecal matter with approximately 75% water content, whereas Tsetse flies maintained at a low relative", "unnecessary as oxygen is absorbed by the lungs via breathing. Among the ingredients sometimes listed by makers are magnesium peroxide, or \"deionized water and sodium chloride [salt]\". It cannot contain simple liquid oxygen, which would boil at -297°F(-183°C) at normal pressure, but ostensibly contains oxygen in some other form, like hydrogen peroxide, that will be released after consumption. Vitamin O Vitamin O is a dietary supplement marketed and sold by Rose Creek Health Products and its sister company The Staff of Life (doing business as R-Garden) since 1998. Despite its name, the product is not recognized by nutritional science as", "pack food products depends on the product. A high oxygen content helps to retain the red colour of meat, while low oxygen reduces mould growth in bread and vegetables. Breathing gas mixtures for diving A breathing gas is a mixture of gaseous chemical elements and compounds used for respiration. The essential component for any breathing gas is a partial pressure of oxygen of between roughly 0.16 and 1.60 bar at the ambient pressure. The oxygen is usually the only metabolically active component unless the gas is an anaesthetic mixture. Some of the oxygen in the breathing gas is consumed by", "not expand and contract during the breathing cycle. Instead an extensive system of air sacs (Fig. 15) distributed throughout their bodies act as the bellows drawing environmental air into the sacs, and expelling the spent air after it has passed through the lungs (Fig. 18). Birds also do not have diaphragms or pleural cavities.\nBird lungs are smaller than those in mammals of comparable size, but the air sacs account for 15% of the total body volume, compared to the 7% devoted to the alveoli which act as the bellows in mammals.\nInhalation and exhalation are brought about by alternately increasing and decreasing the", "low oxygen and stimulate breathing during hypoxia. Also, if breathing is hypoxic, the bird can use CO2/pH-sensitive chemoreceptors to restrain breathing. Due to ventilatory responses, this process leads to secondary hypocapnia. Because birds are exposed to a wide variety of toxic gases and air borne particles in the environment, studies have used birds to measure air quality.\nNot only is a bird’s respiration adapted to handle high-altitude flight, but so too is the circulatory system. In general, birds have larger heart sizes and higher cardiac output. During flight, birds can sustain their heart rates, and their myosin flight muscles have better", "syrinx, in birds, results in sound. Because of this, gas movement is vital for communication purposes. Temperature control Panting in dogs, cats, birds and some other animals provides a means of reducing body temperature, by evaporating saliva in the mouth (instead of evaporating sweat on the skin). Horses Horses are obligate nasal breathers which means that they are different from many other mammals because they do not have the option of breathing through their mouths and must take in air through their noses. Elephants The elephant is the only mammal known to have no pleural space. Rather, the parietal and", "the lungs of vertebrates are homologous to the gas bladders of fish (but not to their gills).", "the main nitrogenous waste product; turtles, like mammals, excrete mainly urea. Unlike the kidneys of mammals and birds, reptile kidneys are unable to produce liquid urine more concentrated than their body fluid. This is because they lack a specialized structure called a loop of Henle, which is present in the nephrons of birds and mammals. Because of this, many reptiles use the colon to aid in the reabsorption of water. Some are also able to take up water stored in the bladder. Excess salts are also excreted by nasal and lingual salt glands in some reptiles.\nIn all reptiles the urinogenital" ]
What is it about potatoes that makes them go so well with so many different foods?
[ "Potatoes are have a relatively neutral flavor. This means they can take on the flavors of other foods without greatly disrupting the flavor profile. They're also cheap way to add bulk and calories to a meal. Recall that calories are only a bad thing in societies and ages of affluence. In times and places where food is scarce, the goal is to get as many calories as you can into a meal because you don't know whether you're going to eat well next time. Even though we may not have such problems in some places today, it's still why the potato became an integral part of various cuisines in the first place.", "Watch this short informational video about potatoes, it will clear everything right up. Potatoes are really amazing \n_URL_0_" ]
[ "modern times potatoes have grown in popularity due to their versatility and ability to be used for many different dishes of food.", "potatoes to form a bi-national dish known as bangers and mash.\nFamously, they are an essential component of a full English or Irish breakfast. Some are made to traditional regional recipes such as those from Cumberland or Lincolnshire, and increasingly to modern recipes which combine fruit such as apples or apricots with the meat, or are influenced by other European styles such as the Toulouse sausage or chorizo. Vegetarian sausages are also now very widely available, although traditional meatless recipes such as the Welsh Selsig Morgannwg also exist.\nA popular and widespread snack is the sausage roll made from sausage-meat rolled in", "Mashed potato Ingredients The use of \"floury\" types of potatoes is recommended, although \"waxy\" potatoes are sometimes used for a different texture. There are a multitude of \"floury\" types, but the most commonly known include russet, golden wonder, and red rascal potatoes. Butter, vegetable oil, milk and/or cream are usually added to improve flavour and texture, and the potatoes are seasoned with salt, pepper, and any other desired herbs and spices. Popular ingredients and seasonings include: garlic, cheese, bacon bits, sour cream, crisp onion or spring onion, caramelised onion, mayonnaise, mustard, horseradish, spices such as nutmeg, and chopped herbs", "geographic regions or cultures. The potato, for example, generally conforms to the demand function of an inferior good in the Andean region where the crop originated. People of higher incomes and/or those who have migrated to coastal areas are more likely to prefer other staples such as rice or wheat products as they can afford them. However, in several countries of Asia, such as Bangladesh, potatoes are not an inferior good, but rather a relatively expensive source of calories and a high-prestige food, especially when eaten in the form of French fries by urban elites. Giffen goods A", "egg, are usually thicker than the Italian flat pasta. Especially in the southwestern part of the country, the predominant variety of noodles are Spätzle, made with a large number of eggs, and Maultaschen, traditional stuffed noodles reminiscent of ravioli.\nBesides noodles, potatoes are common. Potatoes entered the German cuisine in the late 17th century, and were almost ubiquitous in the 19th century and since. They most often are boiled (in salt water, Salzkartoffeln), but mashed (Kartoffelpüree or Kartoffelbrei) and pan-roasted potatoes (Bratkartoffeln) also are traditional. French fries, called Pommes frites, Pommes (spoken as \"Pom fritz\" or, respectively, \"Pommes\", deviating from", "potatoes, were quickly adopted by Māori and helped end the threat of food shortages that had long plagued many Māori tribes. Potatoes were particularly popular as they were grown in a similar way to kūmara but produced a much higher yield with less effort. Other European foods such as wheat, pumpkin, mutton, sugar, and many types of fruit also became a common part of the Māori diet. American sailors brought new varieties of kumara to New Zealand, and these high-yield varieties quickly superseded the original varieties of kumara.\nAlcohol, initially rejected as 'wai piro' (stinking water), also became part of Māori", "as reliably as before. At times and places when and where most other crops failed, potatoes could still typically be relied upon to contribute adequately to food supplies during colder years.\nIn France, at the end of the 16th century, the potato had been introduced to the Franche-Comté, the Vosges of Lorraine and Alsace. By the end of the 18th century it was written in the 1785 edition of Bon Jardinier: \"There is no vegetable about which so much has been written and so much enthusiasm has been shown ... The poor should be quite content with this foodstuff.\" It had", "from 1567 show that the first place outside of Central and South America where potatoes were grown were the Canary Islands. As in other continents, despite its advantages as an anti-famine, high-elevation alternative to grain, potatoes were first resisted by local farmers who believed they were poisonous. As colonialists promoted them as a low-cost food, they were also a symbol of domination. In former European colonies of Africa, potatoes were initially consumed only occasionally, but increased production made them a staple in certain areas. Potatoes tended to become more popular in wartime due to their being able to be stored", "fiber and have the same starchy quality as potatoes. They contain favorable amounts of Vitamin B and C and mineral salts. Origin and History Tuberous-rooted chervil (Chaerophyllum bulbosum) is native to middle- and south-eastern-Europe. During the 1580s, tubers of tuberous-rooted chervil were found at the local market in Wien. In 1846, the tubers arrived in France. 16 years later, the tubers became even more prominent due to Phytophthora infestans, late blight of potatoes, and had been increasingly cultivated as a substitute for potatoes. At the end of the 20th century breeding programs focused on this alternative crop mainly due to", "Northern Pacific Railway's dining car superintendent in 1908. He talked to Yakima Valley farmers who complained that they were unable to sell their potato crops because their potatoes were simply too large. They fed them to hogs. Titus learned that a single potato could weigh from two to five pounds, but that smaller potatoes were preferred by the end buyers of the vegetable and that many considered them not to be edible because their thick, rough skin made them difficult to cook.\nTitus and his staff discovered the \"inedible\" potatoes were delicious after baking in a slow oven. ", "a thin sheet or flake\".\nIn 1962, Canadian scientist Edward A. Asselbergs was issued U.S. Patent 3,260,607, entitled \"Preparation of dehydrated cooked mashed potato\", for a particular industrial method of producing the product. Nutrition Instant mashed potatoes have substantially more sodium than fresh potatoes, and much less dietary fiber. In other respects they are similar to mashed fresh potatoes in their nutritional qualities, about two-thirds starch by dry weight, with smaller amounts of protein, dietary fiber, and vitamins. The largest difference is the loss of vitamin C, although some products may be enriched to compensate. One hundred grams", "giving the potatoes a fluffy, full texture. At this point, milk, butter, and other additives can easily be blended to maintain the starch structure, the result being consistent mashed potatoes. The process works since uniform texture is created due to the passing of potatoes through evenly sized holes, which ensures that the potatoes are smashed only once. With this method, the cell walls are much less likely to break open.\nPressing cooked vegetables and fruits through the small holes produces a puree comparable to using a drum sieve. Many foods can now be pureed more easily in a food", "of potatoes a week. Consequently, dishes that are considered as national dishes represent a fundamental unsophistication to cooking, such as the Irish stew, bacon and cabbage, boxty, a type of potato pancake, or colcannon, a dish of mashed potatoes and kale or cabbage.\nSince the last quarter of the 20th century, with a re-emergence of wealth in Ireland, a \"New Irish Cuisine\" based on traditional ingredients incorporating international influences has emerged. This cuisine is based on fresh vegetables, fish (especially salmon, trout, oysters, mussels and other shellfish), as well as traditional soda breads and the wide range of hand-made cheeses that", "Titus learned that a single potato could weigh from two to five pounds, but that smaller potatoes were preferred by the end buyers of the vegetable because many people considered large potatoes inedible due to their thick, rough skin.\nTitus and his staff discovered the \"inedible\" potatoes were delicious after baking in a slow oven. He contracted to purchase as many potatoes as the farmers could produce that were more than two pounds in weight. Soon after the first delivery of \"Netted Gem Bakers\", they were offered to diners on the North Coast Limited beginning in early 1909. Word", "potatoes were fried in oil first at a relatively low temperature to soften them and then at a higher temperature to crisp up the outside. Heston's recipe involves simmering the potatoes first in water for 20–30 minutes until they are almost falling apart and have developed lots of little cracks across the surface, at which point they are drained and as much moisture as possible is expelled by placing them in either a freezer or sous-vide machine. This additional stage is designed to achieve three objectives. First, cooking the potatoes gently in water helps ensure they acquire a properly soft", "potatoes added.", "Hasselback potatoes Hasselback potatoes or Potato à la Hasselbacken (Swedish: Hasselbackspotatis) are a type of baked potato, where the potatoes are about halfway cut through into thin slices; various toppings can be added on top of the potatoes.\nHasselback potatoes were created in 1953 by Leif Ellison from Värmland, who was trainee chef at restaurant Hasselbacken on Djurgården in Stockholm.", "of protein, especially among the lower classes. With the exception of peas, legumes were often viewed with some suspicion by the dietitians advising the upper class, partly because of their tendency to cause flatulence but also because they were associated with the coarse food of peasants. The importance of vegetables to the common people is illustrated by accounts from 16th-century Germany stating that many peasants ate sauerkraut from three to four times a day.\nFruit was popular and could be served fresh, dried, or preserved, and was a common ingredient in many cooked dishes. Since sugar and honey were both expensive,", "toxic compounds. Additionally, potatoes have been a main focus for edible vaccines, so much so that clinical trials using potatoes has already began. Vaccines in development Presently, there are edible vaccines for measles, cholera, foot and mouth disease, and hepatitis B, C, & E. However, even though there are edible vaccines, they are predominately tested in the animal testing and in development phases, with some human clinical trials being conducted. As mentioned above, the human trials have revolved around potatoes. In one cholera study, adults were given transgenic potatoes with various LT-B amounts in order to see how their IgA", "per pound). The cost is attributed to the fact that this type of potato is almost extinct because it must be harvested by hand. The potato fields also require fertilization by seaweed in a climate shaped by the nearby sea. The presence of algae and seaweed in the soil is responsible for the potato's earthy and salty flavor. Because the variety is delicate and its tuber remains attached to its stem, the potato must be picked and not torn.\n The potatoes are generally served in top class restaurants in France and the Netherlands in mid-May.\nThe commune is also known for", "potatoes are all steamed together in a large pot. John D. Rockefeller started the tradition in Ohio.", "Potato pancake In different cultures Potato pancakes are associated with the cuisines of many European traditions including German and Austrian (as Kartoffelpuffer, Reibekuchen, Reiberdatschi, Erdäpfelpuffer and Erdäpfellaibchen), Dutch (as aardappelpannekoek, reifkoeken, reifjes), Belarusian (as дранікі draniki), Bulgarian (as patatnik), Czech (as bramborák or cmunda), Hungarian (as tócsni and other names), Jewish (as latka, Yiddish: לאַטקע‎, Hebrew: לביבה‎ levivah, plural לביבות levivot), Latvian (as kartupeļu pankūkas), Lithuanian (as bulviniai blynai), Luxembourg (Gromperekichelcher), Polish (as placki ziemniaczane), Romanian (as tocini or tocinei), Russian (as драники draniki), Slovak (as zemiakové placky), Ukrainian (as деруни deruny) and any cuisine that has adopted similar dishes.\nIt", "well-cooked potatoes which have been puréed, cream-soaked bread, or pâte à choux.", "Russet potato A russet potato is a type of potato that is large, with dark brown skin and few eyes. The flesh is white, dry, and mealy, and it is suitable for baking, mashing, and french fries. Russet potatoes are also known as Idaho potatoes in the United States. Origin To improve the disease resistance of Irish potatoes, Luther Burbank selected the potato that became known as the Russet Burbank. It was not patented because plants such as potatoes propagated from tubers were not granted patents in the United States. Use Restaurants such as McDonald's use russet potatoes for their", "is estimated at 10 potatoes as of November 2013", "sharply. The potato was probably unknown here in 1703 since it did not feature on a schedule of crops subject to the tithe in that year. A legal case of 1745 involving a priest's claim to a tithe payment in nearby Poussay refers to potatatoes in a manner indicating that they were commonplace, so by 1545 potatoes had presumably been cultivated here for some years: that is consistent with population increase because potatoes have a far higher food value per acre than the grains and root crops on which populations in the region depended before", "Māori potatoes Māori potatoes or taewa are varieties of potato (Solanum tuberosum subsp. tuberosum and andigena) cultivated by Māori people, especially those grown before New Zealand was colonised by the British.\nMāori have grown potatoes for at least 200 years, and \"taewa\" refers collectively to some traditional varieties, including Karuparerā, Huakaroro, Raupī, Moemoe, and Tūtae-kurī. These are smaller, knobblier, and more colourful than modern potato varieties, which are referred to by the loanword pārete. Other collective names for traditional Māori potatoes are rīwai, parareka and mahetau.\nMāori potatoes are commonly used as a base ingredient in rewena bread. Origins and history There", "of potatoes. Pacific Northwest, United States In the Pacific Northwest, where over 50% of the U.S. potatoes are grown, it was estimated to cost 11 million U.S. dollars to control the psyllid in a year.", "Reader devotes many pages to the process of determining who had the potato first and where they were growing it and for what scale of consumption. This seems like a Western concern rooted in basic competition. However, tracing this particular time line illustrates commodity chains, economic development, culture change (including scientific theory and method), and biological change.\nIn Europe, the potato was not immediately well received. Reader discusses how it was accused of causing leprosy or other ailments and then how cultural groups’ perception of the potato flipped and it became something entirely healthful. The potato", "a special kind of potatoes, namely the patata quarantina bianca genovese, and the fagiolane, a rather large, white bean that is very appreciated and used gastronomically in the Province of Alessandria.\nIts population has been considered a genetic isolate." ]
How are police sketch artists able to draw people relatively accurately based on descriptions?
[ "It's something of an open question whether they are all that accurate. Often they are accurate only in the gross details (hair colour, large nose, etc) and aren't otherwise recognisable. \n\nIt's quite rare for a suspect to be identified purely on the basis of an accurate sketch, though." ]
[ "ability to quickly record impressions through sketching has found varied purposes in today's culture. Courtroom sketches record scenes and individuals in law courts. Sketches drawn to help authorities find or identify wanted people are called composite sketches. Street artists in popular tourist areas sketch portraits within minutes.", "of art students, who need to develop their ability to quickly record impressions through sketching, from a live model. The sketch is a rapidly executed freehand drawing that is not usually intended as a finished work. The sketch may serve a number of purposes: it might record something that the artist sees, it might record or develop an idea for later use or it might be used as a quick way of graphically demonstrating an image, idea or principle.\n A sketch usually implies a quick and loosely drawn work, while related terms such as study, and \"preparatory drawing\" usually refer", "most people with an appreciation for art respect an artist's use of this classic medium.\nI do not work with models. I prefer to sketch 'in the moment' as a scene unfolds, most often with charcoal. Many times, these sketches will become works of art in themselves, because they capture a different mood. Sometimes I work with candid photographs. I look for visual clues in a scene and then consider the overwhelming choices of color I can use to create my interpretation of an image. Observation is everything for me. Whether it is seen, heard or", "It may also apply to drawings executed in pen and ink, digital input such as a digital pen, ballpoint pen, marker pen, water colour and oil paint. The latter two are generally referred to as \"water colour sketches\" and \"oil sketches\". A sculptor might model three-dimensional sketches in clay, plasticine or wax. Applications of sketching Sketching is generally a prescribed part of the studies of art students. This generally includes making sketches (croquis) from a live model whose pose changes every few minutes. A \"sketch\" usually implies a quick and loosely drawn work, while related terms such", "by conducting an interview with an artist in his or her studio. Fig asks them a series of questions about their daily routines and the history of their practice, before photographing and recording their studio and its contents. He then creates a meticulous replicate of that artist's studio, in sculpture, painting, and/or drawing.\nThe artworks both champion the creative process and reveal the mundane tasks involved in making art. Each portrait documents how an artist has organized his or her space, as well as the tools and inspirations he or she keeps at hand. The works contain such details as spectacles", "Copic markers in both warm and cool gray tones to render covers in grayscale. Similar to his penciling, Hughes tends to ink different portions of the sketch at random, though when rendering an attractive female, he begins with the face, so that in the event that he fails to capture her good looks, an entire rendered illustration has not been wasted. He uses Sharpie markers to fill in larger areas, which he feels would be too tedious to render in pencil, such as the costumes of characters like Batman, which he believes should be rendered in black rather than blue.", "In the U.S. the FBI maintains that hand-drawing is its preferred method for constructing a facial composite. Many other police agencies, however, use software, since suitable artistic talent is often not available. Evolutionary systems Until quite recently, the facial composite systems used by international police forces were exclusively based on a construction methodology in which individual facial features (eyes, nose, mouth, eyebrows, etc.) are selected one at a time from a large database and then electronically 'overlaid' to make the composite image. Such systems are often referred to as feature-based since they essentially rely on the selection of individual features", "sketchbook proves that I try to capture things first-hand. Put .. [Tersteeg] ... himself, for example, in front of a sandpit in the Geest district where the dredgers are at work laying a water or gas pipe – I’d like to see the kind of face someone like that would pull and what kind of sketch he’d make. Struggling on wharves and in alleys and streets and inside houses, waiting rooms, even public houses, that's not a nice job, unless one is an artist. As such one would rather be in the filthiest neighbourhood, provided there's something to draw, than", "used for detail, shading and general sketching. Hitch believes the best results combine both the mechanical and the knife-sharpened traditional pencil.\nRegarding inking, Hitch says, \"Inking isn't about tracing, or taking someone else's pencil drawing and making it your own. It's about being aware of and respectful about the original artist's intentions. It's also about making your own artistic judgements based on your interpretation of the piece. The skill is then honing your technique to be able to actually deliver a strong, inked piece that is just how the artist wanted it to be.\" For feathering, Hitch uses a size 0", "Sketch (drawing) A sketch (ultimately from Greek σχέδιος – schedios, \"done extempore\") is a rapidly executed freehand drawing that is not usually intended as a finished work. A sketch may serve a number of purposes: it might record something that the artist sees, it might record or develop an idea for later use or it might be used as a quick way of graphically demonstrating an image, idea or principle.\nSketches can be made in any drawing medium. The term is most often applied to graphic work executed in a dry medium such as silverpoint, graphite, pencil, charcoal or pastel.", "preparation of a functional document distinguishes technical drawing from the expressive drawing of the visual arts. Artistic drawings are subjectively interpreted; their meanings are multiply determined. Technical drawings are understood to have one intended meaning.\nA drafter, draftsperson, or draughtsman is a person who makes a drawing (technical or expressive). A professional drafter who makes technical drawings is sometimes called a drafting technician. Sketching A sketch is a quickly executed, freehand drawing that is usually not intended as a finished work. In general, sketching is a quick way to record an idea for later use. Architect's sketches primarily serve as a", "rarely draws sketches before he starts to model. He finds it easier to work with plastic. Rolf Brem usually takes his inspiration from his everyday life. If he notices something, he tries to make a model from his mind. However, if he we wants to create a tall figure he needs a real model. Then he tries to shape the form out of clay, wax, cement or plasticine. It needs to be a flexible material so he can play with the volume.\nTo make a head, Rolf Brem starts by building a frame out of wood to avoid that the clay", "Ariane Laroux Ariane Laroux (born 12 April 1957) is a Franco-Swiss painter, draughtsman and printmaker. She is known for her black and white drawings, using void and empty spaces in her artworks. She has drawn portraits of renowned activists, while interviewing them, paying attention to having exactly the same number of women and men portraits in her books. She has exhibited several examples in the British Museum. Biography Laroux was born in Paris, France, and spent her childhood with her parents in Montmartre in the studio of the Red House of Artists, Rue Ordener, and with her grandparents at Square", "Photographer Duties and types of photographers As in other arts, the definitions of amateur and professional are not entirely categorical.\nAn amateur photographer takes snapshots for pleasure to remember events, places or friends with no intention of selling the images to others.\nA professional photographer is likely to take photographs for a session and image purchase fee, by salary or through the display, resale or use of those photographs.\nA professional photographer may be an employee, for example of a newspaper, or may contract to cover a particular planned event such as a wedding or graduation, or to illustrate an advertisement. Others,", "on Richards as a young man in the 2015 Fantastic Four film. Technique and materials Hitch does not consider himself an artist or comic artist, but a storyteller, explaining that illustration for him is simply a medium to tell a story.\nHitch is particular about his studio workspace, which does not contain a TV or sofa, stating that such things belong in the lounge for relaxation. In addition to a large drawing board and extra desk space for his computer equipment and lightbox, he keeps copious book shelves. Despite using a professional drawing board, he emphasises that any inexpensive board large", "she often executes as many as 20 preliminary sketches in pencil or pen. Which art medium she uses depends on what surface material she is using at the time. For example, on one of her artist's pages, it states: \"when working with paper, panels or walls, she will employ acrylics while she will paint with oil on canvas or linen. She also recently experimented working on Dibond, a lightweight aluminum panel where she will combine both oil and acrylic and sometimes will use a black fine-point pen when drawing on the surface\". In a review of Snow's work on SFGate,", "Figure study A figure study is a drawing or painting of the human body made in preparation for a more composed or finished work; or to learn drawing and painting techniques in general and the human figure in particular. By preference, figure studies are done from a live model, but may also include the use of other references and the imagination of the artist. The live model may be clothed, or nude, but is usually nude for student work in order to learn human anatomy.\nA related term in sculpture is a maquette, a small scale model or rough draft of", "correct application resolves most uncertainties about smaller details, and makes the final image look consistent.\nA more refined art of figure drawing relies upon the artist possessing a deep understanding of anatomy and the human proportions. A trained artist is familiar with the skeleton structure, joint location, muscle placement, tendon movement, and how the different parts work together during movement. This allows the artist to render more natural poses that do not appear artificially stiff. The artist is also familiar with how the proportions vary depending on the age of the subject, particularly when drawing a portrait. Perspective Linear perspective is", "The goal of the exhibition is to introduce the artist's process to the viewer because sketchbooks are used by artists a tool to document their artistic ideas. The exhibition is on view at Sugarlift Gallery in Long Island City. The exhibition included sketchbooks by David Morales, Diana Corvelle, Dilleen Marsh, Paul Heaston, Dina Brodsky, Evan Kitson, Guno Park, Joshua Henderson, Luis Colan, Marshall Jones, Nicolas V. Sanchez, Sarah Sager, Ted Schmidt, and Vi Luong. Private Collections Private collectors who own Brodsky paintings include HRH Prince of Wales, Kip Forbes, Brooke Shields, and Eileen Guggenheim.", "a convincing portrait.\nFor complex compositions, the artist may first do a complete pencil, ink, charcoal, or oil sketch which is particularly useful if the sitter's available time is limited. Otherwise, the general form then a rough likeness is sketched out on the canvas in pencil, charcoal, or thin oil. In many cases, the face is completed first, and the rest afterwards. In the studios of many of the great portrait artists, the master would do only the head and hands, while the clothing and background would be completed by the principal apprentices. There were even outside specialists who handled", "cardboard, and mount them on a pale (usually white) background. This was the work of specialist artists, often working out of booths at fairs or markets, whose trade competed with that of the more expensive miniaturists patronised by the wealthy. A traditional silhouette portrait artist would cut the likeness of a person, freehand, within a few minutes. Some modern silhouette artists also make silhouette portraits from photographs of people taken in profile. These profile images are often head and shoulder length (bust), but can also be full length.\nThe work of the physiognomist Johann Caspar Lavater, who used silhouettes to analyse", "drawing techniques and exercises have become standard, including gesture, contour, and mass drawings. For beginners first learning to draw, learning to correctly observe real objects is essential in order to learn three dimensional perspective and the effects of lighting. Live models are preferred but if not available, plaster casts of the figure may be used, never photographs. Open drawing groups Experienced artists continue to practice drawing the figure long after their formal education is completed by attending informal groups with no instruction that meet, often weekly, to share the cost of hiring a model. Known by various names, such as", "cutting away her clothing until she was naked. Several contemporary performance artists such as Marina Abramović, Vanessa Beecroft and Carolee Schneemann use their own nude bodies or other performers in their work. Drawing In art, a figure drawing is a study of the human form in its various shapes and body postures, with line, form, and composition as the primary objective, rather than the subject person. \nA life drawing is a work that has been drawn from an observation of a live model. Study of the human figure has traditionally been considered the best way to learning how to draw,", "to more finished drawings to be used for a final work.\nMost visual artists use, to a greater or lesser degree, the sketch as a method of recording or working out ideas. The sketchbooks of some individual artists have become very well known, including those of Leonardo da Vinci, Michelangelo and Edgar Degas which have become art objects in their own right, with many pages showing finished studies as well as sketches. Portraits and nudes Portraits and nudes without a pretense to allegorical or mythological meaning were a fairly common genre of art during all centuries. Some regard Goya's La Maja", "example of his semi-abstractionist style. The sketch of Fernand Legér (1936), shown at right, is an example of his drawing technique. The photo of street children in Mexico (1941), shown at right, is an example of his photography.\nAs a photographer, Bowden took many shots of New York painters who were his friends, including Willem de Kooning (1946, 1951), Ad Reinhardt (1959), Jackson Pollock, and Lee Krasner (1949). He also made photographic portraits of Edward Weston (1951), Imogene Cunningham (1955), and other men and women prominent in the arts. His photographs taken out-of-doors feature nudes in beach or desert scenes, as", "the perimeter and the best arrangement wins the prize. How Close Can You Get A 100-word detailed description of a black-and-white photograph is given to each team. Based on this description, the participants need to sketch the photograph. Judging is based on how similar their sketch turns out to be, compared to the original photograph, and also on their artistic skill. Graffiti Graffiti painting competition, where the topic will be given on the spot and all necessary materials will be provided. Judging is based on degree of adherence to the theme, creativity, style, usage of the space provided and artistic", "cropping them out or simply not including them in the photograph. This even touches on the philosophical question of what reality is. The human brain processes information based on previous experience, making us see what we want to see or what we were taught to see. Photography does the same, although the photographer interprets the scene for their viewer. Engineering drawings An engineering drawing is a type of drawing and is technical in nature, used to fully and clearly define requirements for engineered items. It is usually created in accordance with standardized conventions for layout, nomenclature, interpretation, appearance (such as", "Walk to Work Conneally transposes the 'walks to work' of individual workers to other places to form the basis of psychogeographic explorations. Walk to Work includes the INVIGILATOR series which has been performed in The New Forest (UK), Derby (UK), Tokyo (Japan), Nuneaton (UK) and Digbeth (UK)\nInvoluntary Painting is a Facebook page that he co created on April 1, 2013 with the artist Millree Hughes (who invented the term) where members can share photographs of events in the world such as splashed paint on walls, partly erased graffiti, mold, damaged street markings, rust,adhesive residue, snail tracks etc etc that came", "requirement, depicts her in snapshot photographs in which she poses with drag queens, punks, swing dancers, senior citizens, Latinos, hip-hop musicians and fans, skateboarders, lesbians, young urban professionals, and Korean schoolgirls. She immerses herself into each American subculture and created an identity that is an extension of herself. With a simple point-and-shoot camera, she asked the selected group or passerby to record her. Lee conceives of her work as less about creating beautiful pictures, and more about investigating notions of identity and the uses of vernacular photography. Lee would select a subculture, research it, and adopt the clothing, customs,", "brushes, wax color pencils, crayons, charcoals, pastels, and markers. Digital tools that simulate the effects of these are also used. The main techniques used in drawing are: line drawing, hatching, crosshatching, random hatching, scribbling, stippling, and blending. An artist who excels in drawing is referred to as a draftsman or draughtsman.\nDrawing goes back at least 16,000 years to Paleolithic cave representations of animals such as those at Lascaux in France and Altamira in Spain. In ancient Egypt, ink drawings on papyrus, often depicting people, were used as models for painting or sculpture. Drawings on Greek vases, initially geometric, later developed" ]
Why do most song lengths seem to fall between 2 and 4 minutes?
[ "Much of the answer has to do with the length limitations of vinyl 7\" 45 rpm singles, which for many years were the primary means of promoting a single song. You can only fit about 3 minutes of music onto a 45 rpm single. So historically, if you wanted to write a hit pop song, you had to keep it under that length.\n\nMore here:\n\n[Why Are Songs On The Radio About The Same Length?](_URL_0_)", "[Billy Joel explains it in The Entertainer](_URL_1_)\n\n > \"It was a beautiful song, / but it ran too long / If you're gonna have a hit, you gotta make it fit / So they cut it down to 3:05.\"", "Top 10 charts have a lot to do with it. If you have 10 songs at 3 minutes each, you can get them all into a 30 minute radio segment.", "It has to do with which kind of music you're talking about, and how it came to be.\n\nMost modern music is influenced by the radio station format, where it's convenient to have songs that span between 3 to 4 minutes tops. You'll even find \"radio edits\" of longer songs.\nThere is also the format: early vinyl records were 10 inches in diameter and held only 3 minutes. Jukeboxes play 45 rpm records, and they span (surprise!) 3 minutes. So artists/record companies made songs that fit that length.\n\nIf you look at classic music instead, you'll that symphonies are way longer than 3 minutes. Some of it was created for theater plays, or just orchestra. Since people would go to a venue and sit down to listen, lengthy pieces were expected.\n\n\nIn less popular modern music timings vary a lot too. Most of these artists are not concerned with radio play, so they just do whatever they want, or what the genre they play expects of them.\nSo you can find super short songs: _URL_3_\nOr really lengthy ones: _URL_2_\n\n\nIn short, length depends on the purpose of the music, the format, its audience, etc." ]
[ "this song exist, some with additional background vocals in the song's bridge, others in varying lengths, the longest version available being 3:17, with an extended finale running 33 seconds longer than the common single version.", "types: short songs about one second in length with few syllables, and long songs of about four seconds that have more syllables and are louder than the short variety. It has been observed that long songs are primarily used by males to attract females; long songs are only given spontaneously by unpaired males, and cease with the arrival of a female. Short songs, however, are primarily used in territorial encounters with rival males.\nDuring experimental observation, male great reed warblers showed reluctance to approach recordings of short songs, and when lured in by long songs, would retreat when playback was switched", "\"inherent rhythms and melodies\", against contemporary \"folk-rock/jazz-based forms\" in songs averaging under two minutes in length.", "to as long as fifteen minutes. Release and reception Despite its length, which would typically have been too long for most popular music radio formats, the song was released as a single in the U.K. and was a minor success, reaching number 30 on the UK Singles Chart. Because of its length, the song had to be divided between the two sides of a 7\" record: \"Marquee Moon\" (Part I) (3:13) b/w \"Marquee Moon\" (Part II) (6:45). The song was also released in the UK as a limited edition 12\" vinyl single. A mono recording of the song served as", "more intensity, accompanied by a dominant sub-bass (often passing portamento through an entire octave or more, as in the audio example). It is very common for the bass to drop at or very close to 55 seconds into the song, because 55 seconds is just over 32 measures at the common tempo of 140 bpm. However, this (or the existence of a bass drop in general) is by no means a completely rigid characteristic, rather a trope; a large portion of seminal tunes from producers like Kode9 and Horsepower Productions have more experimental song structures which do not rely on a drop for a", "throughout the piece. For instance, in time, count singing would normally be done with the longest-duration counting (\"one two three four\"), but subdividing whenever shorter notes are used. A measure with 2 eighth notes followed by 3 quarter notes might be count sung \"one and two three four\". However, longer notes are still subdivided to the longest allowed duration: a measure with a whole note would still be sung \"one two three four\" if singing quarter notes, \"one and two and three and four and\" if singing eighth notes, etc. (although the director may call for an exception if", "time, they were finding the repetition of guitar riffs tiring. He said, \"If we do a verse two or three times, we're already bored with it. So we weren't trying to make the songs shorter—that's just what we were into,\" which resulted in the album's short duration of 29 minutes. King had stated that while hour-long records seem to be the trend, \"[y]ou could lose this part; you could cut this song completely, and make a much more intense record, which is what we're all about.\" When the record was completed, the band met with Rubin, who asked: \"Do you", "song is 4:12). The full version only appears on the single and is 4:36 long. On some album prints, however, the full version is contained. The differences between the two versions are very slight, as the only significant difference is an extended bridge in the full version.", "How Many More Times Composition At eight and a half minutes, \"How Many More Times\" is the longest song on the album. It is one of three Led Zeppelin songs on which Page used bowed guitar.\nIn an interview he gave to Guitar World magazine in 1993, Page stated that the song \"was made up of little pieces I developed when I was with the Yardbirds, as were other numbers such as 'Dazed and Confused'. It was played live in the studio with cues and nods.\"\nThe \"Rosie\" and \"Hunter\" components of the song came spontaneously to the group on the night", "counting down to zero while they play these hidden tracks. Some rippers will often append these hidden tracks to the end of the previous song (for example, when ripping the CD).\nThe final track, \"Glorious Pop Song\", ends at 3:43 and is followed by two seconds of silence followed by a recorded conversation which is mostly laughter that lasts for around 30 seconds.", "was the physical capability of records. Vinyl record singles, which were heavily favored for radio play, only had room for about three minutes of music, physically limiting the possible length of popular songs. With the invention of CDs in 1982, and more recently with streaming, music can be as long or short as both writers and listeners wish. However, songs have gotten shorter again, partially due to the ubiquity of streaming. The average song length in 2018 was 3 minutes and 30 seconds, 20 seconds shorter than the average in 2014. The most probable cause of this is that artists", "interspersed with drums) but starts with the organ instead of guitar. This 16-bar long pattern repeats three times (48 bars), which of course equates to four choruses. The song is ended with two more repeats of the head. Total song length: 444 bars, at 180 bmp should be 9 mins 52 seconds long. Extra time due to audience and slight (only by 1 or 2 bpm) slowing of tempo. \"As One\" \"As One\" has a much freer structure. Larry Goldings is credited with its creation, though one suspects this is a largely spontaneous composition. The first two minutes", "a succession of call notes in a longer and slightly more varied sequence. Typically there are 11–14 notes per song, becoming louder and faster, with the final three notes slightly different from the preceding ones: zit-zit-zit-zit-zit-zit-zit-zit-zit-zit-zirt.zirt.zirt. The song usually lasts 0.5–2.5 seconds, shorter than the 3.5–4.0 seconds for the goldcrest, and may be repeated up to eight times a minute. In May and June, singing is most frequent after dawn, but continues less often throughout the day. Later in the breeding season, song becomes largely confined to the morning.\nThe song of the Mediterranean subspecies of common firecrest, R. i. balearicus, is very", "occasionally when episodes ran over the allotted time: the version used in a few episodes of season two cut half of the first stanza and the entire second, going directly to the first chorus following the verse, \"Sometimes you just get a feeling/Like you need some kind of change...\", reducing the length to 65 seconds, but the version used from season three onward used all but the second stanza, reducing the length to 48 seconds; the season four short version added a shorter harmonica portion near the end, which was absent in the season three short version. It has been", "minutes, album opener \"The Noisy Days are Over\" was the Commontime's longest track, far longer than the average song length of two minutes on Field Music albums like Tones of Town and Plumb. With elements of funk, jazz, and progressive pop, \"The Noisy Days are Over\" featured a fast-paced and energetic tempo, a circular and repetitive bassline, and a dance-floor groove that lasts for the song's duration. Jacob Nicholas of The Mancunion wrote that the song \"showcases the whole of Commontime in a single track: the tight, trebly groove, the orchestral flourishes, the two brothers harmonising, and a slightly off-kilter", "soon became prevalent in the work of Fairport Convention, the Incredible String Band and other folk artists.\nThe length of the verses falls short of an even eight bars through the omission of a final beat. Pollack recognises this detail as reflecting a sense of impatience, in keeping with the circumstances surrounding the song's creation. Following the third verse–chorus combination, the outro comprises four rounds of the chorus, with the lyrics to the final round consisting of the repeated \"Don't be long\" refrain. As a feature that Pollack terms \"compositionally impressive\", each of the four sections in this outro varies in", "a few years later however, this short gap was lost due to continuous play, throwing the time back a couple of seconds. Also, the times for \"4:37 am (Arabs With Knives and West German Skies)\" and \"4:47 am (The Remains of Our Love)\" on the first side are incorrect: the songs begin a couple of seconds earlier than indicated, as they start during the seconds of \"4:36 AM\" and \"4:46 AM\", respectively. Packaging Gerald Scarfe, who had created the album artwork and some animation for Pink Floyd's The Wall album, created all the graphics and animation for the Pros and Cons album.", "20 or even 30 minutes, while some unreleased tracks would last up to 45 minutes when performed live. This was one of many reasons that his music never reached a substantial degree of popularity outside Africa. His LP records frequently had one 30-minute track per side. Typically there is an \"Instrumental Introduction\" jam part of the song, perhaps 10–15 minutes long, before Fela starts singing the \"main\" part of the song, featuring his lyrics and singing, in which the song continues for another 10–15 minutes. Therefore, on some recordings, one may see his songs divided into two parts, Part 1", "the rest of the song and usually occurs after the second \"A\" section in the AABA song form. It is called a middle 8 because it happens in the middle of the song and the length is generally eight bars.", "minutes of content created, but \"there were like 64 bars I fucking hated that I ended up chopping off in the end,\" and the final track that appears on the LP is four minutes long. At one point, the huge size of the project file led to the track being impossible to play through Reason, meaning he had to save his progress after every small edit. Further contributing to his frustration making \"Göd Grid\" was the song's fast tempo, which meant \"the same amount of effort I'd normally put into writing a bar counted for significantly fewer seconds. Concept In", "stereotypy of song within individuals, both within and among seasons. The trill rate is locally very consistent, but varies greatly among populations, with inter-element interval ranging from 12 ms to 400 ms or more.\nSong measures:\n\nSongs in the study populations were typically c. 2–2.5 seconds in duration. The whistled theme notes are each c. 0.25–0.5 s in duration, and are 2–3 in number in typical songs (from a sample of 1764 individuals, mean # notes/song = 2.87: 1-note themes – 0.5%; 2-note – 27.6%; 3-note – 58%; 4-note – 13%; 5-note – 0.8%; 7-note – 0.1%).\nThese notes are either 1) level, 2) rising, 3)", "in each case, only one version was played each week alternately.\nDon McLean's 1971 hit American Pie, which was 8:33 long, was split into two segments for the single release. When the song aired on AT40, each part was played alternately, with the entire song played when it reached #1.\nIn early 2013, Justin Timberlake's single \"Mirrors\" had to be edited for time, as the song is over eight minutes long. Remixes and alternate versions of charted songs On several occasions, the show would play remixed versions of charted songs. Notable examples included Enya's \"Only Time\", LeAnn Rimes' \"Can't Fight the Moonlight\",", "are three versions of the song: album, single and extended.\nThe album version is 3 minutes 20 seconds long. Its first 6 seconds repeat the basic rhythm played with the drums (Ludwig), an acoustic guitar (Gibson), a bass guitar (Fender) and an electric guitar (Fender Telecaster). This rhythm continues through most of the song, stopping only for its first line. The first verse ends at 0:37 and is followed by a very similar second verse, which is however shorter by one line. A stacked guitar accompaniment (Red Special) appears at the end of the second verse (1:03), and between 1:15 and", "\"album\" if it either has more than four tracks or lasts more than 25 minutes. Sometimes shorter albums are referred to as \"mini-albums\" or EPs. Albums such as Tubular Bells, Amarok, Hergest Ridge by Mike Oldfield, and Yes's Close to the Edge, include fewer than four tracks, but still surpass the 25-minute mark. There are no formal rules against artists such as Pinhead Gunpowder referring to their own releases under thirty minutes as \"albums\".\nIf an album becomes too long to fit onto a single vinyl record or CD, it may be released as a double album where two vinyl LPs", "have done, er, a lot better in fact as a single than it did; unfortunately, um, seeing as it was longer than two-and-a-half minutes long and isn't exactly a bright tempo, a lot of my colleagues won't play it because they feel that, er, more than two-and-a-half minutes without some, er, feeble quip from them, er, is going to make the world a sadder place ...\n \nThe song was generally well received by music critics. Matthew Greenwald of Allmusic praised the narrative as \"brilliant\" and carried by \"an expansive melody and epic performance from the entire band\". The string arrangement", "March of the Pigs Composition \"March of the Pigs\" has an unusual meter, alternating three bars of 7/8 time with one bar of 8/8 time (in effect, a 29/8 time signature). According to the liner notes, the song has a BPM rate of 269. The song's high energy (analogous to a previous NIN track, \"Wish\"), segued by two piano breakdowns, has made it a staple of NIN's live concert performances. It is also one of the band's shortest hit songs, clocking in at just under three minutes. Music videos After abandoning a more elaborate version before filming could be completed,", "this version track number 5 ends early at 3:23 instead of 5:51 while incorrectly extending the length of track six from 3:04 to 5:32. This mistake has also carried over to online digital music distributors such as iTunes and Spotify. It has since been corrected.", "on numbers of sales, defines an EP as containing three to five songs or under 30 minutes. On the other hand, The Recording Academy's rules for Grammy Awards state that any release with five or more different songs and a running time of over 15 minutes is considered an album, with no mention of EPs.\nIn the United Kingdom, any record with more than four distinct tracks or with a playing time of more than 25 minutes is classified as an album for sales-chart purposes. If priced as a single, they will not qualify for the main album chart but can", "At 8:57 minutes long, it is the second-longest song on the album, the longest being the 10:14 \"Coma\". It is the third-longest song by Guns N' Roses, behind the 9:24 \"Estranged\" from Use Your Illusion II. \"We call it 'the Layla song',\" joked Slash.\nIts distinct symphonic overtone owes to a sweeping string arrangement, orchestrated by Rose. Most live performances during the Use Your Illusion tour lacked the orchestral backing of the song (the 1992 MTV Video Music Awards being the best-known exception).\nIt is the longest song ever to reach the top 10 of the Billboard Hot 100.\n\"November Rain\" was voted", "shortest songs to hit the Billboard Hot 100 in the past 40 years. However, the Atlantic Records reissue of the song was 2:23 in length." ]
Why is Kim Davis being held in contempt of court instead of just being fired for insubordination?
[ "tl;dr: Elected officials cannot be fired - they must resign or they must be removed from office through impeachment proceedings.\n\nKim Davis is an elected official. So she cannot be \"fired.\" There are two ways that she can be removed from office - by impeachment and by resignation. In the same way, President Obama cannot be \"fired.\" He can be impeached by the Senate or he can resign from office. \n\nAn interesting wrinkle is that the legislature in Kentucky (their version of Congress but at the state level) does not meet throughout the year (like Congress does). So the legislature would need to call a special session to remove her from office through impeachment proceedings (or she can just resign from office). \n\nKim Davis is being held in contempt because she has refused to comply with an order issued by a judge. She can comply by resigning, being impeached, or deciding to do her job in compliance with the Constitution (as interpreted by the Supreme Court).", "She's an elected official. Under the KY Constitution she can only be removed via impeachment.\n\nSource: [Sections 66-68 KY Constitution](_URL_0_), in particular Section 68 (\"Civil officers liable to impeachment -- Judgment -- Criminal liability.\")" ]
[ "any way in the firings, her resignation had nothing to do with the controversy, \"she did not recall ordering the addition or deletion of names to the list of prosecutors to be fired\", and she refuted the testimony of Kyle Sampson, Attorney General Alberto Gonzales' chief of staff, that she sought \"to avoid submitting a new prosecutor, Tim Griffin, through Senate confirmation.\" Contempt of Congress charges On July 11, 2007, as Sara Taylor testified, George Manning, the attorney to former White House Counsel Harriet Miers, announced that Miers intended to follow the request of the Bush Administration and not appear", "to the White House Monica Goodling, aide to the president Karl Rove and his senior aide Sara Taylor. In addition, legal counsel to the president Harriet Miers and deputy chief of staff to the president Joshua Bolten were both found in contempt of Congress.\nIn 2010, the Justice Department investigator concluded that though political considerations did play a part in as many as four of the attorney firings, the firings were \"inappropriately political\", but not criminal. According to the prosecutors, there was insufficient evidence to pursue prosecution for any criminal offense. Purge of the Central Intelligence Agency Following the resignation of", "the White House because it seriously undercuts his claim of executive privilege if he was not involved.\nHe also said \nIt's apparent that this White House is contemptuous of the Congress and feels it does not have to explain itself to anyone, not to the people's representatives in Congress nor to the American people.\nIn summary, Taylor told the Senate that she \n\"did not talk to or meet with President Bush about removing federal prosecutors before eight of them were fired\", she had no knowledge on whether Bush was involved in any way in the firings, her resignation had nothing to do", "weapons possession, forgery and eavesdropping on their first poll on the subject. The judge also took the unusual step of ordering Kimes not to speak to the media even after the jury had been sequestered as a result of her passing a note to New York Times reporter David Rhode in court. The judge threatened to have Kimes handcuffed during further court appearances if she persisted and restricted her telephone access to calls to her lawyers. The judge contended that Kimes was attempting to influence the jury as they may have seen or heard any such interviews, and that there", "Senate Judiciary Committee \"that Mike Elston, the deputy attorney general's top aide, threatened him with retaliation in a phone call last month if he went public.\"\nEmails show that Cummins passed on the warning to some of the other Attorneys who were fired. \nElston acknowledges he told Cummins that he said \"it's really a shame that all this has to come out in the newspaper,\" but claimed that this was not intended as a threat.\nOn March 23, 2007, The Washington Post reported that \"New documents also show that Justice and White House officials were preparing for President Bush's approval of the", "Lee Soon-ok Imprisonment Lee was a manager in a North Korean government office that distributed goods and materials to the country's people when she was falsely accused of dishonesty in her job. She believes she was one of the victims of a power struggle between the Workers' Party and the public security bureau police.\nFollowing her arrest, she was severely tortured and threatened for months but maintained her innocence. However, a promise made by an interrogator to not take any punitive action against her husband and son if she confessed—a promise that she would find out to have been false—finally convinced", "the tape. \"There are pretty significant legal issues that we hope don't develop into something that, that'll make it ugly for you.\" When questioned whether the President knew of the firing, Kelly replied: \"The [White House] staff, and everybody on the staff, works for me and not the president.\" Kelly's use of the Situation Room to isolate and fire the employee also led to controversy about a potential misuse of the high-security facility by Kelly, as well as the fact he was unknowingly recorded within it. Personal life Kelly has been married to Karen Hernest since 1976. They raised three", "2019, Westerhout called a leak of Trump's schedule a \"disgraceful breach of trust.\"\nOn August 29, 2019, she was fired after it was revealed that she had shared details about Trump's family and White House operations to reporters at an off-the-record dinner. Politico reported she was fired because she boasted of having a better relationship with Trump than his daughters did, and that she said Trump disliked being photographed with daughter Tiffany Trump because he considered her overweight.", "of the South Korean National Intelligence Service.\nOn June 12, the head of the South Korean National Intelligence Service Won Sei-hoon and the head of the Seoul Metropolitan Police Agency Kim Yong-pan were prosecuted for interfering in the election. In 2015 Supreme Court acquitted Kim of charges of abusing his power to manipulate the investigation.\nIn 2016, a prosecutors' investigation had turned up evidence that the NIS has been effectively orchestrating the activities of conservative groups since the administration of former president Lee Myung-bak (2008–2013). The evidence shows that the NIS has been involved not only in political advertisements that conservative groups", "way contradicts the department's prior statements\" about the lack of a candidate list.\" Goodling testimony Monica Goodling served in the Department of Justice and was the Justice Department's liaison to the White House.\nAs such, she had helped coordinate the dismissal of the attorneys with the White House.\nCongress had called Goodling to testify regarding her role in the dismissals, but after originally agreeing to appear, Goodling cancelled, citing the Fifth Amendment right against self-incrimination.\nOn April 6, 2007, Monica Goodling resigned from her position at the Department of Justice. Sara Taylor testimony On July 11, 2007, Sara Taylor, former top aide to", "to consider those claims at tomorrow's hearing.\nSánchez wrote\n\"It is disappointing that Ms. Miers has chosen to forego this opportunity to give her account of the potential politicization of the justice system.\", Sánchez added \"Our investigation has shown – through extensive interviews and review of documents – that Ms. Miers played a central role in the Bush Administration's decision to fire chief federal prosecutors. I am hopeful that Ms. Miers will reconsider the White House's questionable assertion of executive privilege and give her testimony on the firing of U.S. Attorneys.\"\nOn July 17, 2007 Sanchez and Conyers notified White House Counsel Fred Fielding that", "Office of Personnel Security, had improperly requested and received background reports from the FBI in 1993 and 1994, without asking permission of the subject individuals.\nEstimates ranged from 400 to 700 to 900 unauthorized file disclosures. The incident caused an intense burst of criticism because many of the files covered White House employees from previous Republican administrations, including top figures such as James Baker, Brent Scowcroft, and Marlin Fitzwater.\nInitial White House explanations for what had happened varied, but generally characterized it as a series of mistakes made without bad intent and offered apologies to those affected. President Clinton said that,", "membership of the DA was terminated by the DA Federal Executive. She then appealed the decision to the DA Federal Legal Commission, as a result of which her expulsion was suspended for a period of 5 years.\nThe controversy was alleged to harm the image of the DA, which has been trying to project itself as an anti-apartheid party, and also caused some serious internal tension, as some have viewed the original decisions as harsh. \nA media report in 2016 indicated that Kohler Barnard may not have complied with all of the various sanctions placed on her by the due date.", "regulations\" that a special counsel could be fired by only a senior Justice Department official, while having to provide reasons in writing.\nOn September 5, 2018, during the Senate Judiciary Committee's confirmation hearings for Brett Kavanaugh, nominated by Trump to replace retiring Associate Justice Anthony Kennedy on the Supreme Court, Booker questioned Kavanaugh on a series of E-mails marked \"committee confidential\", dating back to Kavanaugh's time in the office of the White House Counsel during the presidency of George W. Bush. The E-mails, which were released to the public by Booker's office the following day, show Kavanaugh and others in the", "Kim's trial proceeds with a different lawyer but Kim pleads No Contest in response to the trial judge's apparent prejudice and dishonesty. Now in prison, Kim files for appeal and hires Park on the advice of Jang, a journalist. To Park's amazement, Kim has extensively studied the law on his own and frequently argues over how to present the case. As the appeals hearings continue, Kim repeatedly confronts the judge and prosecutor over their signs of dishonesty, and cites relevant laws and passages of the constitution which they have violated. With Park and Jang's assistance, he also points out several", "on October 16, 2007; Washington and Sharpton, among others, testified. Walters was invited to testify but declined. Most Republican members of the committee declined to attend. Representative Sheila Jackson Lee (D-Texas) said to Washington and other Justice Department officials, \"Shame on you. ... As a parent, I'm on the verge of tears,\" and said, \"I want to know what you're going to do to get Mychal Bell out of jail!\" US Attorney Washington responded that the federal government had a limited role to play in the matter.\nRepresentative Lee and other members of the Congressional Black Caucus called upon outgoing Louisiana", "house and that the property was not under her name because she had not made the full payment yet.\nShortly after revealing the Mexican White House incident, Carmen Aristegui was controversially fired from her radio show at MVS Communications. As noted by The New York Times, Aristegui being fired was a perceived as a censorship towards news journalism and the liberty given by the freedom of speech. Aristegui took it to trial and by June 2018, three years after MVS fired her, the jury determined that it was indeed unconstitutional and against the law, to fire her and indeed was an", "labeled as having served dishonorably. I'm very concerned about the chilling effect ... on the process\". Since his resignation, Davis has frequently spoken out against the Commissions.\nIn 2008, Davis was called by the defense to testify in the military commission of Salim Ahmed Hamdan, Osama bin Laden's driver, where he repeated his accusations of political interference. He said Pentagon interest in the progress of trials of detainees greatly increased after September 2006, when high-value detainees were transferred from the CIA to Guantanamo.", "had admittedly \"condoned illegal activity\" while serving as an elected official. Altercations with other justices During a closed-door debate between the justices on February 10, 2010, Prosser called Chief Justice Shirley Abrahamson \"a total bitch\" and threatened to \"destroy her\". A review of emails by the Milwaukee Journal Sentinel indicated that \"justices on both sides described the court as dysfunctional, and Prosser and others suggested bringing in a third party for help\". The 2010 conflict on the court was also criticized as having a potential for lowering court productivity and distracting the focus of the justices. Prosser admitted he overreacted,", "Lock her up.\" Aaron Blake of The Washington Post described Hannity's comment as \"a pretty obvious bit of gaslighting\", noting Hannity's loyalty to Trump, whose campaign rallies have featured chants of \"Lock her up\", and also Hannity's comments that Trump was free to investigate Clinton. Criticism of FBI, DOJ, and special counsel During President Trump's administration, Hannity has repeatedly been highly critical of the FBI, DOJ, Special Counsel Robert Mueller, and others investigating Russian interference in the 2016 election. According to a review by Media Matters of all transcripts from the 254 episodes of Hannity's show from Mueller's appointment (May", "Dow Jones allege that special prosecutor Fitzgerald never needed to subpoena the media's records, including those of the New York Times and Washington Post, because he knew the source of the leak all along. Criticism Because the Justice Department is a part of the executive branch, some critics of the Bush Administration contend that the absence of rapid and effective action has been deliberate.\nGeneral Paul E. Vallely has criticized Special Counsel Patrick Fitzgerald on FOX News for not contacting a number of people who publicly stated they knew of Plame's job at the CIA.\nMany of us as private citizens really", "a controversy arose over the Justice Department's midterm dismissal of seven United States Attorneys. The White House maintained that the U.S. attorneys were fired for poor performance. Attorney General Alberto Gonzales later resigned over the issue, along with other senior members of the Justice Department. The House Judiciary Committee issued subpoenas for advisers Harriet Miers and Josh Bolten to testify regarding this matter, but Bush directed Miers and Bolten to not comply with those subpoenas, invoking his right of executive privilege. Bush maintained that all his advisers were protected under a broad executive privilege protection to receive candid advice. The", "27, 2007 to the committee, McNulty said that days after the February hearing, he learned that White House officials had not revealed to him White House influence and discussions on creating the list.\nMcNulty's testimony that the attorneys were fired for \"performance related issues\" caused the attorneys to come forward in protest. Senate Judiciary Committee - March 29, 2007 Sampson appeared before the Senate Judiciary Committee on March 29, 2007 to discuss the firings. At that hearing, Sampson stated that, contrary to Attorney General Alberto Gonzales's prior statements, the Attorney General had been involved in the final decision to dismiss", "she was called in the office by the Prada Japan CEO and fired for \"Bringing negative energy to the company by voicing sexual harassment\". Prada Japan's CEO and H.R. Manager sent her home, accused her of unexcused absence and firing was her imagination. Bovrisse got in touch with a lawyer, because she didn't know the law in Japan. Her lawyers recommended that she should go back to work and put a tape recorder on her leg under her skirt. She went back to work, but there was no computer on her desk. Prada H.R. Manager then, told her she was", "the Chief Justice, only one of the remaining six judges was available for the hearing.\nA day before the hearing, her official car had been shot at while driving through traffic, with her driver sustaining gunshot wounds. Arrest & Prosecution Over Corruption In August 2018, Justice Mwilu was dramatically arrested from her offices in the Supreme Court Building and escorted to the headquarters of the Directorate of Criminal Investigations and later in the evening to court where she was charged with several offences relating to property and loan transactions with the Imperial Bank with had collapsed by then. It was alleged", "just hours before the House Judiciary Committee planned to vote on whether to hold Barr in contempt. On May 8, 2019, after Trump invoked executive privilege, the House Judiciary Committee voted unanimously to reject White House's assertion of executive privilege and approve a motion put forward by Rep. Matt Gaetz (R-Fl) which states that a vote to hold Barr in contempt would not \"be construed as a directive for the Attorney General to violate Federal law or rules.\" In a 24-16 vote, the House Judiciary Committee voted to hold Barr in contempt. Release of redacted report On April 18, 2019,", "went back to grand jury to fix the problems and came back with eight charges and added another prosecutor on his team. After extensive interviews of witness including almost all of Chen's coworkers, search of the history of Chen's bank account statements over twenty years since she came to the US, personal and official email accounts, computer activities, the government decided to drop all the charges against Chen in March 2015 without explanation. Firing and MSPB Verdict Despite the dropping of all charges, the NWS fired her in March 2016 citing many of the same reasons that she was", "further explanation, other than \"We treat employee matters as private and will not comment further, other than to say that this was an internal decision.\" Wilcomes contended that he was fired for the interview, but refuses to comment further, pending legal advice.", "against all the plaintiffs, claiming that they had \"malicious, opportunistic and false and defamatory accusations of sexual misconduct against him.\" He also claims each defendant \"knowingly published false statements and accusations.\" Cosby asked the court to award him unspecified damages and to require that public retractions be made by the women.\nOn February 19, 2016, Cosby's wife Camille was deposed by plaintiffs after unsuccessfully attempting to stop the deposition. U.S. Magistrate Judge Mark G. Mastroianni ruled that she could refuse to answer questions about private conversations with her husband. A transcript of the \"extremely contentious\" deposition was released in May 2016;", "the White House public switchboard can be connected directly to the president.\nHannity stirred controversy in April 2018 when it was revealed that he shared a lawyer, Michael Cohen, with President Trump. In a breach of journalistic ethics, Hannity had failed to disclose that Cohen was his lawyer while at the same time taking to the Fox airwaves to defend Cohen and criticize those who investigated him.\nOn April 9, 2018, federal agents from the U.S. Attorney's office served a search warrant on the office and residence of Michael Cohen, Trump's personal attorney. On the air, Hannity defended Cohen and criticized the" ]
What is that falling feeling you get in your stomach when you go down a hill in a car or rollercoaster
[ "Did you ever jump into a cool swimming pool or river or something, and notice after five minutes or so that it's no longer cold? That's because your body 'gets used' to things after a bit. \n\nYour body is used to gravity (and in fact evolved to take advantage of gravity). So you don't even notice that your insides... and the content of your insides, are all under one gee of gravity, because it's always been that way. \n\nBut get on that roller coaster (or even a really fast elevator) and you're exposed to sometimes-more, sometimes-less gees of gravity that make your innards heavier or lighter, as well as anything in them. \n\nSo you have upward pressure in your belly region and throat and their content when you round the crest of a big hill at speed, and downward pressure when you hit that curve at the bottom. And the best your brain can translate that to is a falling feeling.", "Im no proffessional, but I do remmeber reading about this once (a while ago). So bare with me, that falling feeling in your stomach is actually the opposite of falling, its floating, your internal organs arent ecactly bolted into place. So when you fall quickly your organs actually float for a moment before you land again and they land too. Causing you too have a weightless feeling in your stomach.", "Does anyone know why exhaling a deep breath throughout the descent lessens this falling feeling?", "Going with what other people have said, it's a matter of the sudden intensity of the shift. Believe it or not, traditional sky-diving doesn't have any 'roller coaster' sensation, because your body is already in motion from the plane. You won't get any of the shift-shock until the chute opens.\n\nThat, and the sensation of 'butterflies in your stomach' is your adrenal glands firing off in the middle of your torso, so that helps." ]
[ "as rotation and these momenta continue as the person falls, causing a sensation of dysphoria. The faller doesn't fall straight down but spins, flips, etc. due to these residual momenta and also due to the asymmetric forces of air resistance on their asymmetric body. While velocity continues to increase, the downward acceleration due to gravity remains constant. Increasing drag force may even cause a feeling of ascent.\nThe vestibular apparatus also detects spatial orientation with respect to visual input. A similar sensation of falling can be induced when the eyes detect rapid apparent motion with respect to the environment. This", "person's normal weight incorporates this gravitational acceleration. When a person feels weightless at the top of a loop or while going down a hill, they are in free fall. However, if the top of a hill is curved more narrowly than a parabola, riders will experience negative Gs and be lifted out of their seats, experiencing the so-called \"butterfly\" sensation. Difference between wood and steel coasters A wooden coaster has a track consisting of thin laminates of wood stacked together, with a flat steel rail fixed to the top laminate. Steel coasters use tubular steel, I beam or box section", "sort of like I was dazed, you know, looking straight ahead, almost like mesmerized. And I don't know if anybody's ever experienced like driving a long period of time in a car and staring at the taillights in front of them, and you get almost like that hypnotic feeling staring straight ahead ... I was just staring straight ahead ... [it was] that hypnotized feeling, dazed, that's what I was [feeling].\nIt was interrupted when, he felt, \"something wasn't right with [the train].\" Linda Smith, of Newburgh, who had boarded the train at Beacon with her sister Donna to see", "just sounded a little bit odd.\" He recalled to investigators a day later that \"the next thing I know my car had kicked and I was thrown from the fourth seat or across the coach up to the ceiling ... I dropped down. I went back up again and I slammed into the ceiling and then I slammed down into the floor.\" In the front, Herbert was sitting in the passenger seat behind the cab when \"I looked up just to do what I was doing and a split second [later] I'm tumbling on the floor ... I think I", "careful synchronisation with the sensation of the swinging floor mechanism, the riders are fooled into feeling as if they themselves are being repeatedly turned upside down.", "the hill, he was thrown out of the vehicle (even though he was wearing a seatbelt), the impact of the crash was so severe that the seatbelt broke and the buckle detached itself and he hit into a tree and broke his back.\nAfter Polish hit the ground, he heard his friends calling for him, once he put his hands on the ground to push himself up he then heard a \"pop\": he only had his chest off the ground but the middle part of his body was turned around and he grabbed a part of his leg but couldn't feel", "Symptoms Coasterphobia, like most recognized and unrecognized phobias, is an anxiety condition. Therefore its main symptom is a panic attack, which can include shortness of breath, rapid breathing, irregular heartbeat, sweating, nausea, heart palpitations, and dizziness, and a sense of dread.\nFear of these rides is similar to a fear of flying in an airplane, in that while statistically, it is rare for someone to be injured or die from riding on a rollercoaster, it is an activity which carries some risk. Therefore they fall under phobias that are extreme over-reactions to normal self-preservation instincts. Treatment In 1999, Dr. Michael Otto,", "of the circle) and centripetal force points down, thus normal force will point down as well. From a logical standpoint, a person who is travelling in the plane will be upside down at the top of the circle. At that moment, the person's seat is actually pushing down on the person, which is the normal force.\nThe reason why the object does not fall down when subjected to only downward forces is a simple one. Think about what keeps an object up after it is thrown. Once an object is thrown into the air, there is only", "over the bench. They leave and return to a hotel.\nCharlie is despondent. He leaves the park and staggers, now apparently drunk, over a wide road, almost getting hit by a car. He arrives at the same hotel and after propositioning a girl outside, enters, falling over a man's gout-bound leg at the reception desk. He checks the register to see which room the couple are in, who are meanwhile getting drunk themselves. Rushing up the stairs he slips, and slides comically back to the foot on his stomach. He makes several more dangerously balanced comical attempts, hitting the gout-bound man", "the change in direction of the passenger's inertia from a downward vertical direction to one that is horizontal push the passenger into the seat, causing the passenger to once again feel very heavy. Most roller coasters require passengers to wear a safety harness, but the forces exerted by most loop-the-loop coasters would keep passengers from falling out. G-forces G-forces (gravitational forces) create the so-called \"butterfly\" sensation felt as a car goes down a gradient. An acceleration of 1 standard gravity (9.8 m/s²) is the usual force of Earth's gravitational pull exerted on a person while standing still. The measurement of a", "happy to sad, getting sadder by every accident. If he loses too much energy he wakes up (sometimes in fright).\nSkiing & Lasagna Factory\n \nGarfield hits the slopes on a pair of skis, while the player guides him past obstacles like trees, bushes, rocks, and stumps. The player is then joined by Odie who uses, unlike Garfield, a dustbin lid to slide down the hill. There are also spectators on the side of the route, holding food that Garfield and Odie could grab to gain back energy. As he jumps on the big ramp at the end of the hill, Garfield", "an exhibit.\nDuring the interview, Eiji opens up about how he has fallen into a professional slump. When Ibe asks Eiji about why he looks sad when he competes, he responds that it is because he feels nothing when he jumps. Upon viewing the photos Ibe has taken of Eiji's jump, both men observe that what Eiji is really feeling is a sense of weightlessness; Ibe remarks that the bliss on Eiji's face looks like a \"home run ball up in the sky.\" Ura Banana A comedic fourth wall-breaking story, where Ash and Eiji discuss fan mail the series has received", "Falling (sensation) A sensation of falling occurs when the labyrinth or vestibular apparatus, a system of fluid-filled passages in the inner ear, detects changes in acceleration. This sensation can occur when a person begins to fall, which in terms of mechanics amounts to a sudden acceleration increase from zero to roughly 9.8 m/s². If the body is in free fall (for example, during skydiving) with no other momenta (rotation, etc.) there is no falling sensation. This almost never occurs in real-life falling situations because when the faller leaves their support there are usually very significant quantities of residual momenta such", "the top of the stairs were currently under way. Incidents An incident occurred on 10 October 2010 when the ride failed to gain enough height to join the lift hill after the station. Passengers were on the ride at the time, however none were harmed. The ride was then closed for a safety inspection. Another one happened on the 1st July 2017 where a train got stuck upside-down on the lift hill for a few hours. No one was injured but passengers were treated just in case of any head problems. Feedback Generally, opinions of G-Force were mixed; some liked", "we bounced and it woke me up. Then the next flight I had the same pilot and the plane went down so smooth. So I asked the pilot why, and he said when you land a plane smooth, you get the plane elevated to the lowest position you can and then you smooth it in. Same with sliding ... If you dive when you're running straight up then you have a long distance to get to the ground. But the closer you get to the ground the less time it will take ... I was hitting the dirt so smooth,", "prove how macho I am, I'm gonna to really conquer my fear, I'm gonna get in the toughest place\", and he gets in front. When he finishes the ride, he must feel like, \"Gee, it wasn't so bad, after all.\" Whereas that poor milquetoast fellow who gets in the back, he's probably never going to ride again. So one of the things you might predict is that people who ride in the front of roller coasters are more likely to ride again. People who ride in the back for the first time are less likely to bother to go on", "an awful feeling. I sometimes feel that I’m being haunted. Like there are people around me sometimes that I don’t see. There is a God, I can tell you that.\" In media The crash was featured on an episode of the American television program Why Planes Crash, broadcast on The Weather Channel.", "the feeling of being a naked egg atop that throbbing steel. You feel vulnerable — but so alive.\" En route, Hutton crashed near Hoover Dam, on the border between the US states of Arizona and Nevada, going over 100 miles (160 km) per hour, and suffered multiple leg fractures, a fractured arm, broken ribs and sternum, and a punctured lung. Hopper later recalled from before the start of the ride: \"She had on a little helmet, sort of tied under her chin. It was cute. And Jeremy [Irons] came up to her and said, 'You got to be kidding.' He took", "along and the tram accelerates. The tram goes faster and faster and the man's head thrusts back as the wind blows against him. This results in him falling off of a chair that he apparently played like it was the tram. He falls backward off the chair and hits his head on the ground. He tries to get up, but fails. More time passes (as can be seen as the light from outside rises and falls) and he is still motionless on the ground as the movie ends. Themes There are many different themes seen throughout the short film. These", "Broken escalator phenomenon The broken escalator phenomenon, also known as the Walker effect, is the sensation of losing balance or dizziness reported by some people when stepping onto an escalator which is not working. It is said that there is a brief, odd sensation of imbalance, despite full awareness that the escalator is not going to move.\nIt has been shown that this effect causes people to step inappropriately fast onto a moving platform that is no longer moving, even when this is obvious to the participant.\nEven though subjects are fully aware that the platform or escalator is not moving now,", "of the petty jealousies felt at every level. From bottom to top, no one is content. It is in eight parts.\nPart I: At the bottom of the ladder is a tramp. Feeling hungry, he eyes \"the potential possibilities of a cottage standing back from the road.\" He exchanges a word with a farm labourer, but the labourer proceeds into the cottage, while the tramp is left to continue along the road. \"Lucky devil,\" the tramp mutters.\nPart II: Inside the cottage, the labourer is unhappy to find that his dinner is not ready and, while he waits for it, he", "(141 ft). Once at the top, the car slowly inches towards the record-breaking 121°, beyond-vertical drop. Once the car is released from the top of the hill, it hurtles back down towards the ground and enters a dive loop, an inline loop and finally the seventh inversion, an immelmann loop. The whole ride is over within 2 minutes.", "down on the boards with terrific force, knocking all the strength and wits out of me... They told me that after I had landed, Youssuf rolled me over with his foot, looked out over the audience, gave a contemptuous snort and walked off the stage. When I came to, I was a sadder, but wiser young man. Somehow or other I got into my clothes, hobbled out into the street and started to walk up Third Avenue towards my home. Youssuf had given my neck such a wrench that he almost tore it from my shoulders. It was several days", "Tosh whenever he’s feeling bad, admitting he's scared to close his eyes, fearing that he may become trapped in the darkness. After leaving Tosh, Owen is walking along a footpath when a piece of paper flutters out of the sky in front of him. Picking it up, Owen unfolds a photograph of a young couple and, looking up, sees the woman on the roof preparing to jump. This is what brought him there: not to jump himself, but to save her. Owen tells her that if she cannot see anything left for her, then she should jump; but if she", "either faints (which he normally does) or flees in a huff out of frustration and annoyance, or sometimes becoming injured. Despite the fact that Grover ruins his dining experiences, Mr. Johnson always goes back to Charlie's (he even says to himself, \"Why do I keep coming back to this place?\").\nOther sequences with Grover and Mr. Johnson encountering each other include sketches on an airplane, at the airport, in a telegram office, at a rent-a-car agency, at fast food or other types of restaurants, at the movies, at a portrait studio, at a baseball game, at a department store, at a", "and Track: The light and tactile steering, combined with supple suspension and a weird, physics-defying sense of zero weight transfer in corners, provides a sensation akin to flying just over the ground. I'm convinced there's a powerful pleasure center in the brain that remains untapped until you drive an Elan. It's almost a drug.\nMotor Sport: The tremendously responsive steering and handling requires similar qualities from the driver and the speeds achieved round corners and on the straight are deceptively fast. This, therefore, calls for a lot of concentration on the driver's part. Once mastered, however, the Elan is the nearest", "and I was happy and I feel myself jumpin' in the bed. Then I found out later that it wasn't just my body jumpin', it was my spirit too. For some reason or other, somethin' was happenin' there that day. It tol' me where to look at. And then my paintings started selling. I sold a painting to a guy for little or nothing. He sold it to someone an' he tried to find me. An one day I was handin' out flyers and he saw one and he called me. It's strange how my name got to his door.", "that his car jumped over because this over-the-top action certainly felt like a cry for help — and not just from his character.\"", "finally arrived, knocked and asked for the gentleman, \"It's me\" the gentleman said \"but I think that someone has played a practical joke on you, as you see I'm in perfect health. Come on, man! have a drink and relax after you have had to climb so many stairs.\" Entering the room, Rubio saw a portrait on the wall, and while the man served him a drink. Father Rubio said that the lady was the one who sent him. The man laughed and said that the lady was his mother who died some years ago. Then, the gentleman said; \"Look,", "crash, it was felt it would be appropriate to see events unfold through Charlton's eyes. Jack O'Connell stated that it had a dream-like quality. \"It has a lethargic feel. So it doesn't necessarily seem like reality. There's a hazy sense about it.\" Dougray Scott stated \"We filmed the scene [of the crash] on a military base up in Newcastle...There were some people sitting in seats without a scratch on them, dead, others without a scratch on them alive, some with terrible injuries and dead. It was an emotional part of the shoot.\"\nThe score, composed by Clint Mansell, was released on" ]
Why is the sea made out of salt water?
[ "Almost all natural water contains salts and other minerals including rivers and sweet water lakes just in different levels. Rivers flow constantly so the salt they pick up from the ground does not have time to build up to the point where it tastes salty. But oceans and lakes get all of this salt poured into them by the rivers where it builds up until even we can taste it.\n\nSome more info: _URL_0_", "According to most scientist, the earth is millions of years old. During those millions of years, the sea has been evaporated be the sun and has rained and the land many times over. But every time it rains on the land, it picks up tiny pieces of rock and gunk called minerals. These minerals then wash into the sea with the rain. But when the sea evaporates, the minerals are left behind, and only the water leaves, and then more and more minerals are washed in by the rain. Now over the millions and millions of years that this has happened over and over, most of these minerals have either just fallen out of the water onto the sea floor, or they've been used by sea plants and animals to grow. Most of what's left behind is salt, like the salt that you put on your food. This is why the sea tastes salty.", "Basically because rivers all have lower amounts of salt in them, which they bring to the sea. But when water in the sea evaporates (to become rain, etc) it leaves behind the salt, thereby slowly moving the salt (and other stuff) into the sea.", "Because every time a whale ejaculates he releases over [400 gallons](_URL_1_) of semen." ]
[ "areas, which is mainly due to ingress of seawater and its subsequent evaporation. Like the Dead Sea the lake is sufficiently buoyant that people can float easily.\nSalt is exported across the region by up to 3,000 collectors, men and women from all over Western Africa, who work 6–7 hours a day, and protect their skin with beurre de Karité (shea butter), an emollient produced from Shea nuts which helps avoid tissue damage. The salt is used by Senegalese fishermen to preserve fish, a component of many traditional recipes including the national dish, a fish and rice meal called thieboudienne.\nFish in", "the ocean, these salts concentrated as more salt arrived over time (see Hydrologic cycle). Halley noted that most lakes that don't have ocean outlets (such as the Dead Sea and the Caspian Sea, see endorheic basin), have high salt content. Halley termed this process \"continental weathering\".\nHalley's theory was partly correct. In addition, sodium leached out of the ocean floor when the ocean formed. The presence of salt's other dominant ion, chloride, results from outgassing of chloride (as hydrochloric acid) with other gases from Earth's interior via volcanos and hydrothermal vents. The sodium and chloride ions subsequently became the most abundant", "salt is made”. Salt is collected from seawater through evaporation, leaving the crystalline salt behind.\nThe Lingayen Gulf is also home to the 1200 megawatt Sual Power Station, the Philippines largest coal power plant.", "of the ocean and certain large, entirely landlocked, saltwater lakes, such as the Caspian Sea and the Dead Sea.\nThe most abundant solid dissolved in sea water is sodium chloride. The water also contains salts of magnesium, calcium, and potassium, amongst many other elements, some in minute concentrations. Salinity varies widely, being lower near the surface and the mouths of large rivers and higher in the depths of the ocean; however, the relative proportions of dissolved salts varies little across the oceans. Winds blowing over the surface of the sea produce waves, which break when they enter shallow water. Winds also", "Brine In nature Saline water with relatively high concentration of salt (usually sodium chloride) occurs naturally on Earth's surface (salt lakes), crust, and within brine pools on ocean bottom.\nNumerous processes exist which can produce brines in nature. Modification of seawater via evaporation results in the concentration of salts in the residual fluid, a characteristic geologic deposit called an evaporite is formed as different dissolved ions reach the saturation states of minerals, typically gypsum and halite. A similar process occurs at high latitudes as seawater freezes resulting in a fluid termed a cryogenic brine. At the time of formation, these cryogenic", "nations to go to war over it and use it to raise tax revenues. Salt is used in religious ceremonies and has other cultural and traditional significance.\nSalt is processed from salt mines, and by the evaporation of seawater (sea salt) and mineral-rich spring water in shallow pools. Its major industrial products are caustic soda and chlorine; salt is used in many industrial processes including the manufacture of polyvinyl chloride, plastics, paper pulp and many other products. Of the annual global production of around two hundred million tonnes of salt, about 6% is used for human consumption. Other uses include water", "Types of brines used for mineral extraction Commercial brines include both surface water (seawater and saline lakes) and groundwater (shallow brine beneath saline or dry lakes, and deep brines in sedimentary basins). Brine brought to the surface by geothermal energy wells often contains high concentrations of minerals, but is not currently used for commercial mineral extraction. Seawater Seawater has been used as a source of sea salt since prehistoric times, and more recently of magnesium and bromine. Potassium is sometimes recovered from the bittern left after salt precipitation. The oceans are often described as an inexhaustible resource. Saline lakes There", "are many saline lakes with salinity greater than seawater, making them attractive for mineral extraction. Examples are the Dead Sea and the Great Salt Lake. In addition, some saline lakes, such as Lake Natron in East Africa, have chemistry very different than seawater, making them potential sources of sodium carbonate. Shallow groundwater brines associated with saline or dry lakes The groundwater beneath saline or dry lakes often has brines with chemistry similar to that of the lakes or former lakes.\nThe chemistry of shallow brines used for mineral extraction is sometimes influenced by geothermal waters. This is true of a number", "evaporates from the lake, the salt remains. Eventually, the body of water will become brine.\nBecause of the density of brine, swimmers are more buoyant in brine than in fresh or ordinary salt water. Examples of such brine lakes are the Dead Sea and the Great Salt Lake.\nBodies of brine may also form on the ocean floor at cold seeps. These are sometimes called brine lakes, but are more frequently referred to as brine pools. It is possible to observe waves on the surface of these bodies.\nMan-made bodies of brine are created for edible salt production. These can", "will eventually disappear and leave a dry lake (also called playa or salt flat).\nBrine lakes consist of water that has reached salt saturation or near saturation (brine), and may also be heavily saturated with other materials. \nMost brine lakes develop as a result of high evaporation rates in an arid climate with a lack of an outlet to the ocean. The high salt content in these bodies of water may come from minerals deposited from the surrounding land. Another source for the salt may be that the body of water was formerly connected to the ocean. While the water", "Sea salt aerosols are mainly constituted of sodium chloride (NaCl), but other chemical ions which are common in sea water, such as K⁺, Mg²⁺, Ca²⁺, SO₄²⁻ and so on, can also be found. A recent study revealed that sea salt aerosols also contain a substantial amount of organic matter. Mostly, organic materials are internally mixed due to the drying of air bubbles at the organic-rich sea surface. The fraction of organic components increases with the decreasing particle size. The contained organic materials change the optical properties of sea salt as well as the hygroscopicity, especially when some insoluble organic matter", "food items in salt the Maya were able to dehydrate it so that it would not rot. Salt, for the most part, was produced near the oceans by drying out large flats of seawater. After the flats were dry, the salt could be collected and moved throughout the empire. The greatest producer of salt in all of Mesoamerica was Yucatán, in which the peoples specialized in salt collection and at one point monopolized the entire salt industry. Although there were several other salt wells further inland, the Yucatán people were able to monopolize the salt industry because sea salt", "the salt crust. Harvesting One method of gathering sea salt is to draw seawater into marsh basins or salt pans and allow the water to evaporate, leaving behind the salt that was dissolved in it. As the water evaporates, most of the salt precipitates out on the bottom of the marsh or pan (and is later collected as ordinary sea salt), but some salt crystals float on the surface of the water, forming a delicate crust of intricate pyramidal crystals. This is fleur de sel. The delicacy requires that it be harvested by hand, so this is", "environmental flows. There is no water allocation for the purpose of salt export to the sea. When rain water comes in contact with the soil, it picks up some salts in dissolved form from the soil. The total amount of dissolved salts contained in the river water has to reach sea without accumulating in the river basin. This process is called \"salt export\". If all the water is utilised without letting adequate water to the Sea, the water salinity / total dissolved salts (TDS) would be so high making it unfit for human, cattle and agriculture use. Higher Sodium in", "Salt lake Properties Salt lakes form when the water flowing into the lake, containing salt or minerals, cannot leave because the lake is endorheic (terminal). The water then evaporates, leaving behind any dissolved salts and thus increasing its salinity, making a salt lake an excellent place for salt production. High salinity will also lead to a unique halophilic flora and fauna in the lake in question; sometimes, in fact, the result may be an absence or near absence of life near the salt lake.\nIf the amount of water flowing into a lake is less than the amount evaporated, the lake", "United States (42 million), India (29 million), Germany (13 million), Canada (13 million) and Australia (12 million).\nThe manufacture of salt is one of the oldest chemical industries. A major source of salt is seawater, which has a salinity of approximately 3.5%. This means that there are about 35 grams (1.2 oz) of dissolved salts, predominantly sodium (Na⁺\n) and chloride (Cl⁻\n) ions, per kilogram (2.2 lbs) of water. The world's oceans are a virtually inexhaustible source of salt, and this abundance of supply means that reserves have not been calculated. The evaporation of seawater is the production method of choice in marine countries", "the volume of water flowing in, and a salt crust is formed. The basin has no outflow, and because the source of the water is continental rather than marine, the amount of salt deposited is limited. There are two bodies of water, the upper one pond-like, with a moderate degree of salinity and a biodiverse flora and fauna, and the lower one a sabkha or salt lake, with higher salinity, salt-encrusted margins and very little vegetation.\nThe bottom of the sabkha is usually dry and covered with a salty crust, mostly formed from halite. Periodically, heavy rains cause the Saoura to", "of salt that is in the water at that specific location. Another thing is that some ocean habitats aren't technically in the ocean and these are called estuaries, areas when oceans and rivers meet creating a mixture of salt water and freshwater making a different habitat for different types of fish and creatures to live in. The ocean is home to organisms as large as whales and as small as microscopic marine organisms such as phytoplankton. However, the vast majority of ocean life that humans are exposed to is simple saltwater fish. Saltwater fish can live in the", "examples of salt lakes are the Aral Sea and the Great Salt Lake. Lakes A lake (from Latin word lacus) is a terrain feature (or physical feature), a body of liquid on the surface of a world that is localized to the bottom of basin (another type of landform or terrain feature; that is, it is not global) and moves slowly if it moves at all. On Earth, a body of water is considered a lake when it is inland, not part of the ocean, is larger and deeper than a pond, and is fed by a river. The only", "onto the sea floor.\n\nBeginning in the 1960s, water inflow to the Dead Sea from the Jordan River was reduced as a result of large-scale irrigation and generally low rainfall. By 1975, the upper water layer was saltier than the lower layer. Nevertheless, the upper layer remained suspended above the lower layer because its waters were warmer and thus less dense. When the upper layer cooled so its density was greater than the lower layer, the waters mixed (1978–79). For the first time in centuries, the lake was a homogeneous body of water. Since then, stratification has begun to redevelop.\n\nThe mineral", "salty and uninhabitable. Water salinity is reduced by salt collecting around plant roots as most of the incoming water is transpired by plants. Peat fires might contribute to deposit salt into layers below the surface. The low salinity of the water also means that the floods do not greatly enrich the floodplain with nutrients. Salt islands The agglomeration of salt around plant roots leads to barren white patches in the centre of many of the thousands of islands, which have become too salty to support plants, aside from the odd salt-resistant palm tree. Trees and grasses grow in the sand", "no outlet to the sea, separated from the ocean by mountains or other natural geologic features that prevent the water draining away. The Caspian Sea is the largest one of these. Its main inflow is from the River Volga, there is no outflow and the evaporation of water makes it saline as dissolved minerals accumulate. The Aral Sea in Kazakhstan and Uzbekistan, and Pyramid Lake in the western United States are further examples of large, inland saline water-bodies without drainage. Some endorheic lakes are less salty, but all are sensitive to variations in the quality of the inflowing water. Acidification", "creep up the sides of the bucket. When the floor of the Dead Sea dropped further due to tectonic forces, the salt mounts of Lisan and Mount Sodom stayed in place as high cliffs (see salt dome). Chemistry With 34.2% salinity (in 2011), it is one of the world's saltiest bodies of water, though Lake Vanda in Antarctica (35%), Lake Assal in Djibouti (34.8%), Lagoon Garabogazköl in the Caspian Sea (up to 35%) and some hypersaline ponds and lakes of the McMurdo Dry Valleys in Antarctica (such as Don Juan Pond (44%)) have reported higher salinities.\nUntil the winter of 1978–79,", "Brine used to be made by allowing fresh water to run through abandoned rock salt mines. A Salt-on-Salt process strengthens brine by dissolving rock salt, and/ or, crystal salt in weak brine or sea water prior to evaporation. Solar Evaporation uses the sun to strengthen and evaporate sea water trapped on the sea-shore to make sea salt crystals, or to strengthen and evaporate brine sourced from natural springs where it is made into white salt crystals.\nThis led to three types of salt production all of which used a variation of the open-pan salt method: \nCoastal salt production. The process involved", "Seawater Salinity Although the vast majority of seawater has a salinity of between 31 g/kg and 38 g/kg, that is 3.1–3.8%, seawater is not uniformly saline throughout the world. Where mixing occurs with fresh water runoff from river mouths, near melting glaciers or vast amounts of precipitation (e.g. Monsoon), seawater can be substantially less saline. The most saline open sea is the Red Sea, where high rates of evaporation, low precipitation and low river run-off, and confined circulation result in unusually salty water. The salinity in isolated bodies of water can be considerably greater still - about ten times higher", "elevated salt concentration being kept by a subterranean duct system which connects it with the sea.\nThe water depth is 44 metres (144 feet) and consists of a mixture of brackish fresh and salt water. The average distance from the lake shore to the ocean is 2 kilometres (1.2 miles) with wildlife predominantly eels and water snakes and a bird breeding area. The lake is listed as a World Heritage Site.\nOn the easternmost point of the lake is the former World War 2 airbase Tigoa. Information from locals claims that there are nine aircraft at the bottom of the lake", "with sweetness, as the lake was freshwater as opposed to saltwater. These included Otsiketa (sugar or candy), Kandequio or Kandekio (possibly candy), Oiatinatchiketo (probably a form of Otsiketa), and Oiatinonchikebo. Similarly, the Iroquois called present-day Lake Huron, \"The Grand Lake of the Sweet Sea\" (fresh water as opposed to salt water.) This association was conveyed on French maps as Mer Douce (sweet sea) and Dutch maps as the Latin Mare Dulce.\nOn August 12, 1679, the French explorer René Robert Cavelier, Sieur de La Salle arrived with an expedition. He named the body of water Lac Sainte-Claire as the expedition sighted", "Fresh water Fresh water (or freshwater) is any naturally occurring water except seawater and brackish water. Fresh water includes water in ice sheets, ice caps, glaciers, icebergs, bogs, ponds, lakes, rivers, streams, and even underground water called groundwater. Fresh water is generally characterized by having low concentrations of dissolved salts and other total dissolved solids. Though the term specifically excludes seawater and brackish water, it does include mineral-rich waters such as chalybeate springs.\nFresh water is not the same as potable water (or drinking water). Much of the earth's fresh water (on the surface and groundwater) is unsuitable for drinking without", "salt ratio of the lake varying throughout the year. In winter and spring, the lake water is fresh with rain and the waters carried by drainage canals. In the summer time, lake is very salty due to the high evaporation and the water flow from sea to the lake. Also, salt ratio is high at the areas close to the sea connection, and low at the northern sections of the lake where the drainage waters and leakage is effective.\nTurkey's largest sand dunes are in the area between the lake and the sea. The dunes extend as wide as 3 kilometers", "Islands Bermudians were raking salt in the Caribbean since the 1630s, an essential ingredient for making cheese, butter, and preserving meat and fish. Rakers would channel sea water in salt pans for evaporation. Salt Cay and Grand Turk Island became salt colonies in the 1680s. According to Jarvis, \"these small, hot, dry, and barren islands\" were perfect for salt production since the limestone, absence of fresh water, and limited rain fall combined to make the soil unfertile. Yet, average temperatures in the eighties Fahrenheit and the eastern trade wind facilitated evaporation of sea water into a saturated brine for salt" ]
"Remastering" a movie?
[ "Movies are shot using film. \nThe original film is usually of very high quality. It's relies on physics and light to record high quality images. \nSay it's 1990 something and you want to release the movie on VHS tape. \nYou would use a machine to transfer the film to the VHS tape. This creates a master tape, which you then copy and sells to people. \nBut VHS is really lousy, it doesn't have anything near the resolution of the original film. \nBut hey, not like anyone can do any better, so you put the film back into storage and sell the tapes. \nFast forward a couple of decades, the movie has a huge fan base and they all have BluRay capable devices. \nSo you dig the old film out of the archive, and you break out a new machine, this one makes BluRays. \nYou make a new master BluRay disk, you have remastered the film. \nYou copy and sell it. \n \nOf course, there isn't really one BluRay disk to rule them all, usually they make something in a format that is easy to make other BluRay disk from, same with the VHS tape. But it still involves creating a new higher quality copy from the old film.", "Most movies in existence were shot on film and the \"master\" is still film in an archive. From there, over time, it gets transferred to various media for re-use, such as analogue video tape for TV, then digital for DVD etc. These days Netflix in particular is pushing 4K hard, and so there's a drive to get classic movies converted to 4K, which means rescanning them from film. \n\nHowever, this can expose problems with the film, such as damage or colour degradation due to age, and correcting those takes time and money. Sound can also take a lot of work. In some cases, movies were badly cut by studios against the director's wishes, so missing scenes are restored from other cuts to match the director's original vision if possible. So you could say that a movie \"remaster\" is the process of creating the best possible version of that movie in a modern digital format." ]
[ "Rewind the Film Release Rewind the Film was released in standard and deluxe versions. It was also released digitally and on vinyl.\nThe deluxe version of Rewind the Film includes a second disc, featuring demo versions of all twelve album tracks, plus live versions of \"There by the Grace of God\", \"Stay Beautiful\", \"Your Love Alone Is Not Enough\", \"The Love of Richard Nixon\" and \"Revol\". All live tracks were recorded at the Manics' \"A Night of National Treasures\" concert at The O2 Arena, London on 17 December 2011. Also released from the same concert were live versions of \"Let Robeson", "R5 (bootleg) R5, in the film business, is a DVD of a movie sold in Russia very soon after the first screening in cinema, at reduced wholesale prices. It is made with a telecine machine from an analog source and is typically of a lower quality than other retail releases.\nIn telecine (TK) is the digitization performed by the studio itself with very professional (and expensive) equipment and usually from the original source. The purpose of it is to create a high quality digital copy (usually for a later DVD release). But unlike a DVD, an R5 is released before the", "then someone tried to put it back. There are certainly mistakes and stupidities in reconstructing pictures.\" \nIn rare instances, such as Peter Weir's Picnic at Hanging Rock, John Cassavetes's The Killing of a Chinese Bookie, and Blake Edwards's Darling Lili, changes made to a director's cut result in a shorter, more compact cut. This generally happens when a distributor insists that a film be completed in order to meet a release date, but sometimes it is the result of removing scenes that the distributor insisted on inserting, as opposed to restoring scenes they insisted on cutting.\nAnother way that released director's", "from the public domain movie category due to the copyright.). In 2015, the British company Terracotta Distribution who has been released the movies in remastered addition (such as Shanghai 13, Hero of Shaolin and others) officially released the DVD with the trailer, with the region PAL it has been fully remastered with Digital stereo.", "Re-cut trailer A re-cut trailer, or retrailer is a mashup video that uses footage from a movie or its original trailers to create a completely new context or one different from the original source material. The mashups are parody trailers that derive humor from misrepresenting original films: for instance, a film with a murderous plot is made to look like a comedy, or vice versa. They became popular on the Internet in 2005. Creation The making of retrailers became possible with the availability of consumer-level digital video editing suites. The more sophisticated of these allow the editor to separate the", "or aesthetically significant\" by the United States Library of Congress, and selected for preservation in the National Film Registry. - thus setting the stage for its restoration. DVD release The film is in the public domain now, and can be purchased at many online outlets. A newly remastered version (with commentary and extras) was released on DVD by The Criterion Collection in 2006.", "be digitally restored and remastered by L’Immagine Ritrovata in Bologna, Italy as part of their ABS-CBN Film Restoration Project. The restoration of the film was supervised by Davide Pozzi. The restored version premiered at the 2016 Cinema One Originals film festival on November 15, 2016.", "January 20, 2009), would run approximately 14 minutes longer than the theatrical cut. Hackl also stated that a number of scenes in the film would be re-ordered and arranged differently than in the theatrical cut. However, only a few changes were made and the extra footage was never released, running only four minutes longer than the theatrical version. Unrated Collector's Edition An Unrated Collector's Edition is available with exclusive packaging. It features sound effects, a collector's booklet, and a spinning \"saw blade\". The features on the DVD itself are the same as the standard Unrated Director's Cut. Soundtrack The soundtrack", "film degradation is important, the preservationist's main goal is to preserve the image, as the film itself often decays rapidly and beyond repair (see: Film Preservation). Film preservation falls into several categories: conservation, which is the \"protection of the original film artifact\"; duplication, which is the \"making of a surrogate copy\"; and restoration, which is the attempt to \"reconstruct a specific version of a film\", which will include piecing together footage from all known sources. Film restoration will involve the use of duplicates, not the originals. Duplication of an original to a new and stable film stock (a continuing process,", "picture it was!'\".\nAccording to a 29 January 2010 government order, the remastered version was exempted from entertainment tax, although theatre owners charged full price because they and other film producers were uncertain of the order's validity. Despite Mayabazar's success, Mohan decided not to remaster the remaining 14 films; according to him, most producers who sold negative rights to TV channels lost control of them, and he cited legal and copyright issues.\nThe Film Heritage Foundation announced in March 2015 that they would be restoring Mayabazar, along with a few other Indian films from 1931 to 1965, as a part of their", "of the Moving Image in Astoria, Queens during a Henson-themed exhibit. During the talk, he announced that the film would be released as a new special edition with the original ending restored. Warner Bros. reconstructed and restored the ending in an alternate edit, with re-discovered color negatives of the sequence and the help of production notes from Oz and others on the film's creative team. It was released on DVD and Blu-ray on October 9, 2012 with features returning from the original DVD. It was initially subtitled as \"The Intended Cut\", but changed to \"The Director's Cut\" once Oz began", "Re:fragmented Tracey Re:fragmented is a project by the director and producers that made available all footage from the film shoot to download and remix into \"their own related projects, including music videos, new trailers or to re-edit the entire movie themselves\". The footage was released under a Creative Commons licence as four torrents, each approximately four gigabytes in size. A contest was held for the best use of the footage from August 2007 until January 2008, with the winning material being included on the DVD release, including a video by Ottawa-based punk band Sedatives. Adaptation The film was adapted into", "The Reconstruction The restored version, dubbed \"The Reconstruction,\" adds 47 minutes to the film's running time, bringing it much closer to the form Fuller imagined before the studio took it away from him. Film critic Richard Schickel — who praised the 1980 version in Time magazine when it was released — took the lead on the restoration, which relied on footage found in an old Warner Bros. vault in Kansas City. He was aided by editor Bryan McKenzie and Bogdanovich. Release The film was entered into the 1980 Cannes Film Festival. Critical reception The review aggregator website Rotten Tomatoes reported", "aggressive re-editing technique was always to try to help the films find a broader American audience than they might otherwise find.\n\"I'm not cutting for fun\", Harvey Weinstein said in an interview. \"I'm cutting for the shit to work. All my life I served one master: the film. I love movies.\".\nMiramax is also accused of ignoring their more artistic, less audience-friendly films, especially when directors refuse to re-cut them to make them less challenging. Dead Man, which director Jim Jarmusch refused to re-cut, got a very limited release and critics have accused the Weinsteins of burying the film.\nMiramax was parodied in", "a limited exhibition in theaters, but the main outcome of the project was the first-ever official remastered DVD version. A listing of the music on the film soundtrack was released earlier.", "restored, following Lewat Djam Malam (After the Curfew, 1954) in 2012. Restoration work, which included the reinsertion of lost scenes using extant copies of the film and the removal of dust and fungus, began in early 2015 and was completed on 8 October 2015. This restoration—converted to 4K digital—was screened Indonesia beginning on 11 August 2016, with a soundtrack album featuring covers by nine artists being launched on the same day. The Jakarta Post described the film as \"a hit with audience members\". A DVD and Blu-ray release is scheduled for 2017.\nSeveral films have been remade or influenced by Tiga", "new, digitally remastered version of the movie, its DVD counterpart is simply a reissued version of the previous DVD release, and has not been authorized by Friedkin, who himself disowned it, and advised to avoid purchasing it. Furthermore, the director announced that he would supervise the remastering process for its proper DVD re-release, which hit stores on August. The Blu-Ray had no extra features, but was accompanied by a booklet with production stills and an excerpt of Friedkin's memoir The Friedkin Connection, and was well-received upon release, with good reviews praising the quality of the transfer and reaching #1 in", "R5 refers to DVD Region 5. In an effort to compete with copyright infringement in these areas, the movie industry chose to create a new format for DVD releases that could be produced more quickly and less expensively than traditional DVD releases. R5 releases differ from normal releases in that they often lack both the image post-processing and special features that are common on DVD releases. This allows the film to be released for sale at the same time that DVD screeners are released. Since these screeners are the chief source of high-quality pre-DVD release unauthorized film copies (in comparison", "of the Living Dead and Reefer Madness. Commentary re-use Some film companies transfer the audio commentary of the laserdisc release of a film on to the DVD rather than creating a new one. For example, El Mariachi Special Edition, Total Recall Special Edition, Spaceballs and A Nightmare on Elm Street all contain the commentary from the laserdisc release. This may be for financial reasons, depending on whether the rights to the original commentary are cheaper to use than recording a new one (a company releasing a film on DVD today may not be the same company who released it on", "prints, German and British archivists restored the film during 1998 and 1999 including reinstating the original tinted image by using the Desmet method. Availability The film is screened fairly often on Turner Classic Movies. Before shuttering in November of 2018, the film was available to stream through the subscription-based FilmStruck. Filmstruck's follow up service, Criterion Channel, a service from the Criterion Collection, now streams it in Region 1. English-market DVDs are available, distributed by Milestone Films and available in NTSC R1 (from Image) and PAL R2 (from the BFI). Both versions of the DVD are identical. They feature both an", "actually a \"reconstruction\" containing only, in their words, \"a few frames\" from the original twenty-two rolls of film (each averaging four minutes in length), that Santilli had viewed in 1992. They explained that, by the time they had raised enough money to purchase the original, only a few frames were still intact, the rest having been degraded beyond the point of usability by heat and humidity.\nIn the documentary, Eamonn Holmes repeatedly refers to the film as a \"fake,\" while Santilli patiently insists it is a \"restoration,\" maintaining it is a \"reconstruction\" of an actual alien autopsy film he viewed in", "has not yet been determined. Thus, while digital techniques in film restoration are undoubtedly on the rise, they are still far from becoming standard.", "to release the new digital restoration in North American cinemas on 27 September 2013. This new version was also released on DVD on 13 October 2013. It is 91 minutes long, shorter than the director's cut but longer than the theatrical cut, and is known as The Wicker Man: The Final Cut.\nThe Final Cut (UK) Blu-ray (2013) features short documentaries \"Burnt Offering: The Cult of the Wicker Man\", \"Worshipping The Wicker Man\", \"The Music of The Wicker Man\", interviews with director Robin Hardy and actor Christopher Lee, a restoration comparison, and the theatrical trailer. The second disc features both the", "capture in full resolution.\nOf course, having an intermediate digital stage, followed by forming a new film master by lasering the digital results onto new film stock does represent an extra generation. So would an intermediate film master that was restored frame-by-frame by hand. The choice of film vs. digital restoration will be driven by the amount, if any, of restoration required, the taste and skill set of the restorer, and the economics of film restoration vs. digital restoration. Digital as archival medium Digital scanners as of 2014 can capture images as large as 65mm in full resolution. That is the", "\"New Nollywood\" became synonymous with delayed DVD release, generally taking up to three or four years before release. This is generally because filmmakers intend to maximize profit before releasing on DVD, which is no longer profitable at the moment. Some filmmakers also believed the good films are better restricted to the cinemas, as it's ridiculous to make such outstanding efforts only to make the films disappear into a \"mob of useless films\" which were still prevalent as of 2012, despite the New Cinema movement. This notion made screening at the cinemas to also become like a criterion for viewers to", "Film preservation Film preservation, or film restoration, describes a series of ongoing efforts among film historians, archivists, museums, cinematheques, and non-profit organizations to rescue decaying film stock and preserve the images which they contain. In the widest sense, preservation nowadays assures that a movie will continue to exist in as close to its original form as possible.\nFor many years the term \"preservation\" was synonymous with \"duplication\" of film. The goal of a preservationist was to create a durable copy without any significant loss of quality. In more modern terms, film preservation now includes the concepts of handling, duplication, storage, and", "before withdrawing the film in the spring of 1969. The studio then proceeded to substantially cut and re-market the film under a new title, Those Were the Happy Times. Wise, who did not believe cutting the film would work, declined to be involved in the editing, and asked that the credit \"A Robert Wise Film\" be removed. Following instructions from Zanuck, William H. Reynolds, the film's original editor, reluctantly but very competently removed scenes and whole sequences, including many of the musical numbers, paring the film's running time from 175 to 120 minutes, (which involved overlapping sound and adding a", "response, the producers re-cut the film and shortened it in favor of a more chronological storyline, against the director's wishes.\nAccording to Roger Ebert, a \"savagely butchered version was in circulation for a few years\" following Ophuls' death. The film critic Andrew Sarris and others eventually showed improved versions, closer to the original, at the New York Film Festival in 1963 and 1968. Restoration Certain elements remained missing and believed lost, but the recent discovery and restoration efforts by Technicolor artists of the lost footage allowed a new version to be edited according to Ophul's original intentions. The color version of", "digitally-remastered version of the film was released on DVD. The release was part of the \"James Cagney Collection\", in which a number of special bonus features were made available, including: audio commentary by film historian Dana Polan, an \"Angels with Dirty Faces: Whaddya Hear? Whaddya Say?\" featurette, a radio production, movie trailers, and a short film titled \"Warner Night at the Movies\" with film critic and historian Leonard Maltin. Adaptations in other media Angels with Dirty Faces has been adapted into two radio plays. The first was the May 22, 1939, broadcast of Lux Radio Theater, with Cagney and O'Brien", "editions of film DVDs) have also become fairly common. Sharing similarities with the concept of a director's cut (another long-suffering inflation-by-marketing term). These generally feature additional in-movie material. The material may be footage originally deleted from the final cut, or new digitally-created, interpolated content. Unlike true director's cuts, the directors may not have had part in such projects, such as in Superman II: The Richard Donner Cut, in which Richard Donner did not help create the new version, just supply the material. The Doctor Who television movie The Five Doctors was edited, recut, amongst various other changes, to make the" ]
What do investment bankers actually do? Goldman Sachs, etc.
[ "treedick is speaking about regular banks that give loans..not investment bank.\n\nLet's take Goldman Sachs' Investment Banking division\n\nBasically, they underwrite securities. Facebook is going public, they go to an investment bank to help them raise capital. Investment banks are financial intermediaries.", "The investment banking divisions of banks are essentially financial advisers. They provide advisory services to their clients, covering a variety of different types of financial transaction. Here are the following types of transactions investments banks usually advise on:\n\n**Mergers and Acquisitions**: Company A wants to merge with or buy Company B. This is a large and complex transaction and variety of parties, aside from the two companies can be involved (ex, minority shareholders). Anyone of the involved people will come to an investment bank to get help structuring the deal or making sure they're getting/paying a fair price.\n\n**Capital Raising**: For what ever reason, a company might need to raise a lot of money (more than they could ever get from a traditional bank). An investment will tell a company how that should raise this money (issuing debt or equity), and then help them find people willing to give the company money. You've probably heard of an IPO, which is an example of this type of transaction.\n\n**Restructuring**: In this case, the bank will advise a company that is going bankrupt (or financially distressed). Such a company will have a lot of debt outstanding, and the investment will help the company restructure this debt so the debtors can come out satisfied and the company can still exist (rather than going out of business). Investment banks will also help creditors (the people who lent money to the businesses going bankrupt).\n\n**Leveraged Finance**: This is similar to capital raising, except instead of any kind of debt or equity, this group specifically focusing on raising debt.\n\nUsually the way an investment banking division is structured is that it will have a group focusing on each of the above services. Investment banks will also have groups focusing on specific industries (such as healthcare or tech) instead of the above products. In this case, bankers working in an industry group will work on deals involving any one of the above products." ]
[ "restructuring, and spin-offs) and underwriting (capital raises, public offerings, and private placements of equity and debt instruments).\nGoldman Sachs is one of the leading M&A advisory firms, often topping the Thomson Financial league tables in sizes of transactions. The firm gained a reputation as a white knight in the mergers and acquisitions sector by advising clients on how to avoid unfriendly hostile takeovers. During the 1980s, Goldman Sachs was the only major investment bank with a strict policy against helping to initiate a hostile takeover, which increased the firm's reputation immensely among sitting management teams at the time. Investing and lending", "characterized Goldman Sachs as a \"great vampire squid\" sucking money instead of blood, allegedly engineering \"every major market manipulation since the Great Depression ... from tech stocks to high gas prices\"\nGoldman Sachs has denied wrongdoing. It has stated that its customers were aware of its bets against the mortgage-related security products it was selling to them, and that it only used those bets to hedge against losses, and was simply a market maker. The firm also promised a \"comprehensive examination of our business standards and practices\", more disclosure and better relationships with clients.\nGoldman has also been accused of an assortment", "Sachs top executives, such as Henry Paulson and Ed Liddy were in high-level positions in government and oversaw the controversial taxpayer-funded bank bailout. The TARP Oversight Report released by the Congressional Oversight Panel found that the bailout tended to encourage risky behavior and \"corrupt[ed] the fundamental tenets of a market economy\".\nUnder threat of a subpoena, Goldman Sachs revealed that it received $12.9 billion in taxpayer aid, $4.3 billion of which was then paid out to 32 entities, including many overseas banks, hedge funds and pensions. The same year it received $10 billion in aid from the government, it also", "Permanent Subcommittee on Investigations hearing with Goldman Sachs. This is an important victory for fairness for investors such as pension funds and for the integrity of the financial system. As the Goldman Sachs investigation showed, business as usual on Wall Street has for too long allowed banks to create instruments which are based on junky assets, then sell them to clients, and bet against their own clients by betting on their failure. The measure approved by the conferees ends that type of conflict which Wall Street has engaged in.\"\nHowever, conferees changed the proprietary trading ban to allow banks to invest", "Monetary Fund, World Bank, and the United Nations. If those institutions are given the power to enact change, and freed from mitigating influences, then they will be much more effective. Sachs does not find fault in the international organizations themselves. Instead, he blames the member nations who compose them. The powerful nations of the world must make a commitment to end poverty, then stick to it.\nSachs believes it is best to empower countries by utilizing their existing governments, rather than trying to circumnavigate them. He remarks that while the corruption argument is logically valid in that corruption harms the efficiency", "Goldman Sachs Foundation History The foundation was founded in 1999, the same year Goldman Sachs went public, with an initial $200 million asset base. It was unusual in its creations attributes. \nThe foundation became especially active after the global financial crisis of 2008. Between 2008 and 2013 it gave away some $1.6 billion. According to the New York Times, \" Goldman is a firm that prides itself on discretion, but it isn’t giving away its billions quietly. It has bestowed the Goldman Sachs logo — and hundreds of millions of dollars — on two splashy programs, one that", "of economic reform, international financial markets, macroeconomic policy, global economy competitiveness, climate change and the end of poverty. He has written or co-authored hundreds of scholarly articles and several books, including three bestsellers and a textbook on macroeconomics.\nIn 2011, Sachs called for the creation of a third American political party, the Alliance for the Radical Center. Advising in post-communist economies Sachs has worked as an economic adviser to governments in Latin America, Eastern Europe and the former Soviet Union. A practice trained macroeconomist, he advised a number of national governments in the transition from Marxism–Leninism or developmentalism to market economies.\nWhen", "During this time Goldman Sachs profited from its investment in Yue Yuen Industrial Holdings, a shoe manufacturer that became notorious for its harsh labor practices. The $55 million investment was made the year before Murphy took the Asia post and it is unclear to what extent Murphy was aware of the firm's operational characteristics. In 1998 Murphy told the Wall Street Journal that \"We [at Goldman Sachs] are elite in the sense the Marine Corps is elite\".\nIn 1999 Murphy secured a spot on the firm's Management Committee. There his colleagues included Hank Paulson and Gary Cohn, both of whom later", "Goldman Sachs a total of $589 billion against collateral such as corporate market instruments and mortgage-backed securities. The Term Securities Lending Facility (TSLF), which allows primary dealers to borrow liquid Treasury securities for one month in exchange for less liquid collateral, loaned Goldman Sachs a total of $193 billion. Goldman Sachs's borrowings totaled $782 billion in hundreds of revolving transactions over these months. The loans were fully repaid in accordance with the terms of the facilities. Reemergence: 2008–present According to a 2009 BrandAsset Valuator survey taken of 17,000 people nationwide, the firm's reputation suffered in 2008 and 2009, and rival", "Goldman Sachs controversies Goldman Sachs controversies are the controversies surrounding the American multinational investment bank Goldman Sachs. The bank and its activities have generated substantial controversy and legal issues around the world and is the subject of speculation about its involvement in global finance and politics. In a widely publicized story in Rolling Stone, Matt Taibbi characterized Goldman Sachs as a \"great vampire squid\" sucking money instead of blood, allegedly engineering \"every major market manipulation since the Great Depression.\" Role in the financial crisis of 2007–2008 Goldman has been harshly criticized, particularly in the aftermath of the financial crisis", "Sachs, Richard Ramsden, is \"unapologetic\" and sees \"banks as the dynamos that power the rest of the economy\". Ramsden believes \"risk-taking is vital\" and said in 2010:\nYou can construct a banking system in which no bank will ever fail, in which there's no leverage. But there would be a cost. There would be virtually no economic growth because there would be no credit creation.\n— Richard Ramsden of Goldman Sachs, 2010.\nOthers in the financial industry believe they've been unfairly castigated by the public and by politicians. For example, Anthony Scaramucci reportedly told President Barack Obama in 2010 that he felt like a", "In January 2016, Goldman Sachs agreed to pay $15 million after it was found that a team of Goldman employees, between 2008 and 2013, \"granted locates\" by arranging to borrow securities to settle short sales without adequate review. However, U.S. regulation for short selling requires brokerages to enter an agreement to borrow securities on behalf of customers or to have \"reasonable grounds\" for believing that it can borrow the security before entering contracts to complete the sale. Additionally, Goldman Sachs gave \"incomplete and unclear\" responses to information requests from SEC compliance examiners in 2013 about the firm's securities lending practices.", "raise up to $8 billion for a new fund focused on corporate buyouts, its first new fund since the financial crisis of 2007-2008. Philanthropy According to its website, Goldman Sachs has committed in excess of $1.6 billion to philanthropic initiatives since 2008. Goldman Sachs reports its environmental and social performance in an annual report on Corporate social responsibility that follows the Global Reporting Initiative protocol.\nThe company offers a donor advised fund (DAF) called Goldman Sachs Gives that donates to charitable organizations with an employee donation match of up to $20,000. A 2019 investigation of by Sludge of DAFs and hate", "bankers play a very important role in issuing new security offerings. Corporate finance Corporate finance is the aspect of investment banks, which involves helping customers raise funds in capital markets and giving advice on mergers and acquisitions (M&A); this may involve subscribing investors to a security issuance, coordinating with bidders, or negotiating with a merger target. A pitch book of financial information is generated to market the bank to a potential M&A client; if the pitch is successful, the bank arranges the deal for the client. The investment banking division (IBD) is generally divided into industry coverage and product", "in the world, with over $12 billion under management. It was started in 1995 with $10 million. In September 2013, Goldman Sachs Asset Management announced it had entered into an agreement with Deutsche Asset & Wealth Management to acquire its stable value business, with total assets under supervision of $21.6 billion as of June 30, 2013.\nIn April 2013, together with Deutsche Bank, Goldman led a $17 billion bond offering by Apple Inc., the largest corporate-bond deal in history and Apple's first since 1996. Goldman Sachs managed both of Apple's previous bond offerings in the 1990s. Goldman Sachs was the lead underwriter", "reported that Goldman Sachs was \"the company from which Obama raised the most money in 2008\" and that its \"CEO Lloyd Blankfein has visited the White House 10 times.\" Former New York Fed Chairman's ties to the firm Stephen Friedman, a former director of Goldman Sachs, was named Chairman of the Federal Reserve Bank of New York in January 2008. Although he had retired from Goldman in 1994, Friedman continued to own stock in the firm. Goldman's conversion from a securities firm to a bank holding company in September 2008 meant it was now regulated by the Fed and not", "2004 in Chicago.\nToday, the firm ranks among the best performing investment banking firms, advising financial firms on strategic and financial initiatives, including mergers and acquisitions and capital raising. It is one of the last privately held investment banks on Wall Street, after other firms went public, including Goldman Sachs in the early 2000s. In 2010, the firm sold a substantial minority to two private equity firms: the Carlyle Group and Kelso & Company. The firm is led by James J. Dunne III, who left Bear Stearns in 1988 to help found Sandler, and Jonathan Doyle, who joined the firm in", "Launch a Career, Goldman Sachs was ranked No. 4 out of 119 total companies on the list. It was ranked No. 62 on the list of best places to work by Fortune Magazine in 2017.\nCEO Blankfein received a $67.9 million bonus in 2007, his first year. He chose to receive \"some\" cash unlike his predecessor, Paulson, who chose to take his bonus entirely in company stock. In 2011, the bank had nearly 11,000 more staffers than it did in 2005, but performances of workers drastically declined. In 2011, Goldman's 33,300 employees generated $28.8 billion in revenue and $2.5 billion in", "employees have donated to both major American political parties, as well as candidates and super PACs belonging to both parties. According to the Center for Responsive Politics, Goldman Sachs and its employees collectively gave $4.7 million in the 2014 elections to various candidates, leadership PACs, political parties, 527 groups, and outside spending entities. In the 2016 election cycle, Goldman employees were reported (as of September 2016) to have donated $371,245 to the Republican National Committee and $301,119 to the Hillary Clinton presidential campaign. Goldman Sachs forbade its top level employees from donating to the Donald Trump presidential campaign.\nIn 2010, the Securities", "record profits and record executive bonuses, the firms would have to cut back on their excesses and close their CDO desks.\nThe studies show how the credit default swaps that allowed investors and banks themselves to place bets on either side of the performance of a security further intensified market risk. Finally, they show that the unscrupulous trading techniques at the banks led to \"dramatic losses in the case of Deutsche Bank and undisclosed conflicts of interest in the case of Goldman Sachs.\" The Report found that the investment banks were \"the driving force\"\nbehind the risk-laden CDO and RMBS market's expansion", "Sachs had an effective tax rate of only 3.8%, down from 34% the year before, and its tax liability decreased to $14 million in 2008, compared to $6 billion in 2007. Critics have argued that the reduction in Goldman Sachs's tax rate was achieved by shifting its earnings to subsidiaries in low or no-tax nations, such as the Cayman Islands. Involvement in the European sovereign debt crisis Goldman is being criticized for its involvement in the 2010 European sovereign debt crisis. Goldman Sachs is reported to have systematically helped the Greek government mask the true facts concerning its national debt between the", "Goldman Sachs may not have properly understood.\nIn December 2014, Goldman Sachs sold its aluminum warehousing business to Ruben Brothers. Oil futures speculation Investment banks, including Goldman, have also been accused of driving up the price of gasoline by speculating on the oil futures exchange. In August 2011, \"confidential documents\" were leaked \"detailing the positions\" in the oil futures market of several investment banks, including Goldman Sachs, Morgan Stanley, JPMorgan Chase, Deutsche Bank, and Barclays, just before the peak in gasoline prices in the summer of 2008. The presence of positions by investment banks on the market was significant for the", "former Goldman Sachs lobbyist Mark A. Patterson as chief of staff to Treasury Secretary Timothy Geithner, despite President Barack Obama's campaign promise that he would limit the influence of lobbyists in his administration. In February 2011, the Washington Examiner reported that Goldman Sachs was \"the company from which Obama raised the most money in 2008\", and that its \"CEO Lloyd Blankfein has visited the White House 10 times\". Insider trading cases In 1986, Goldman Sachs investment banker David Brown pleaded guilty to charges of passing inside information on a takeover deal that eventually was provided to Ivan Boesky. In 1989,", "Senior Advisor to United States Secretary of the Treasury Robert Rubin and Chairman of the Steering Committee of the President's Working Group on Financial Markets. President of the United States Bill Clinton nominated Sachs to be Assistant Secretary of the Treasury for Financial Markets in 1999, and Sachs subsequently held that office until 2001.\nUpon leaving government service, Sachs became Vice Chairman of Perseus, LLC, holding that position until 2003. He was then the Chief Executive Officer of Cornerstone Asset Management from 2003 to 2005. He then joined Mariner Investment Group as chairman of the firm's Investment Committee.\nSachs", "criticism over Goldman Sachs' large bonus payouts after repaying (with interest) $10 billion in TARP funds it received from the U.S. Treasury. According to the company, the small business initiative had been in development a year before the initial launch, and is modeled after its 10,000 Women Initiative, which has helped educate female entrepreneurs in 43 countries.\nAccording to a January 2013 report by Babson College, 63.7% of program participants in the United States reported an increase in revenue and 44.8% added new jobs following graduation. Program Overview Under the plan, Goldman will provide $200 million to pay for small-business owners", "senior management described clients as \"muppets\" and colleagues callously talked about \"ripping their clients off\". In reply, Goldman Sachs said that \"we will only be successful if our clients are successful\", claiming \"this fundamental truth lies at the heart of how we conduct ourselves\" and that \"we don't think [Smith's comments] reflect the way we run our business.\" Later that year, Smith published a book titled Why I left Goldman Sachs.\nAccording to the New York Times' own research after the op-ed was printed, almost all the claims made in Smith's incendiary Op-Ed–about Goldman Sachs turned out to be \"curiously short\"", "has consistently criticised the International Monetary Fund and its policies around the world and blamed international bankers for what he claims is a pattern of ineffective investment strategies.\nDuring the Greek government-debt crisis in July 2015, Sachs, with Heiner Flassbeck, Thomas Piketty, Dani Rodrik and Simon Wren-Lewis, published an open letter to the Chancellor of Germany Angela Merkel, regarding Greek debt.\nSachs is one of the founders of the Deep Decarbonization Pathways Project.\nIn April 2018, he supported President Donald Trump's view that the United States should come out of Syria \"very soon\", adding: \"It’s long past time for the United States to", "Bankers Investment Trust Bankers Investment Trust (LSE: BNKR) is a large British investment trust dedicated to investments in major international businesses, particularly FTSE 100 companies. Established in 1888, the company is a constituent of the FTSE 250 Index. The chairman is Susan Inglis as of February 2019.", "him in the business and changed the firm's name to M. Goldman and Sachs. Business boomed—soon the new firm was turning over $30 million worth of paper a year—and the firm's capital was now $100,000 (equivalent of $2.6 million in 2018), all of it the senior partners'.\nFor almost fifty years after its inception, all of Goldman Sachs's partners were members of intermarried families. In 1885, Goldman took his own son Henry and his son-in-law Ludwig Dreyfuss into the business as junior partners and the firm adopted its present name, Goldman Sachs & Co. In 1894, Henry Sachs entered the firm,", "provided by the bailout of AIG, the $10 billion in TARP money it received from the government (though the firm paid this back to the government), and a record $11.4 billion set aside for employee bonuses in the first half of 2009. While all the investment banks were scolded by congressional investigations, Goldman Sachs was subject to \"a solo hearing in front of the Senate Permanent Subcommitee on Investigations\" and a quite critical report. In a widely publicized story in Rolling Stone, Matt Taibbi characterized Goldman Sachs as a \"great vampire squid\" sucking money instead of blood, allegedly engineering \"every" ]
Why is it okay to say racist things about white people and sexist things about men but not the other way around?
[ "If you want the actual explanation for why some people say this, it is the following:\n\nPeople *claim* that it isn't actually racism because racism = prejudice + power. So if you are a historically disadvantaged group (therefore less power), nothing you do can be racist. It can be bigoted, intolerant, or ignorant - but not *racist*. \n\nDoes it make much sense? No, I don't think so. If you want equality, practice equality. Pretty simple. But that is how people try to justify it, anyway.\n\nYou also have a non-trivial amount of people who just hear \"blacks can't be racist\" (or whatever group you want to use) and go around using that to justify obviously racist/sexist actions without understanding the \"justification\" at all.", "I think what most privileged people don't realize, is how much implicit racism adds up. This doesn't necessarily only apply to racism either, but homophobia, class differences, etc. \n\nTo put my point in terms of your example, #BlackOutDay was an act of awareness, solidarity, and community amongst a minority, who has historically been oppressed. This makes it inappropriate to \"counter\" this with #WhiteOutDay, as the majority does not need to create awareness of their oppression as there is relatively none. \n\nIn that instance, it became analogous to someone who was kicked when they were down standing back up. While the person kicking them asks for a step-stool so they're still taller.\n\nIt's not forwardly (explicitly) being racist towards people, but implicitly, as it's still an attempt towards preventing equality.\n\nThese implicit acts happen every day to all people of minorities, and the sad part is the majority will not notice, they may not even mean to do it intentionally. That's why events like #BlackOutDay happen to begin with.\n\nSorry for rambling, I hope that helps answer some of your question.", "I hate doing this but I'm going to preface my post with this: ideally, no one makes generalizations about entire races, genders, sexualities, etc., because that's mean and rude. Saying \"all white people can't dance\" isn't nice, or true, or helpful. In an ideal world, race/gender/sexuality wouldn't matter for jobs or admissions or anything.\n\n**BUT** you have to remember **we don't live in an ideal world** - we live in a world where for hundreds (or even thousands) of years, certain races, genders or sexualities have held most of the power and deliberately denied power to the other races/genders/sexes. Acting like race/gender/sexuality aren't factors in peoples' lives is only going to perpetuate existing inequality.\n\nLet's take affirmative action for example, because I've often heard this called \"institutional racism\" against white/straight/male people. On the surface, it seems unfair that when two people have roughly comparable backgrounds, the one who happens to be a minority might be chosen for the position based on the fact that they're a minority, even if their resume is a little less strong. But the purpose is to combat 1) the historical disadvantages that minorities have had often **because** of the majority's efforts to keep them out of power and 2) the current discrimination that exists. Now, some people like to say that either 1 or 2 don't really matter. But consider that women have had the right to vote in American for roughly 100 years, and the American Civil Rights movement was only a generation ago. There was active, legal discrimination against people who are in the workforce now, and parents of people who are in the workforce now, which definitely hurts their chances of getting better jobs, getting into neighborhoods with good schools that can help their kids get better jobs, etc. Then, consider that similar (but even more drastic) discrimination has been going on for hundreds of years, and think about how that affects current job opportunities and power structures. And studies have shown that even nowadays, when faced with two IDENTICAL resumes, people are more likely to hire the candidate with the male name.\n\nSo, to clarify, when we're talking about racism, it's a very specific and almost academic term - it is discrimination from a place of historically institutional, pervasive, and dominant power, where someone from a group that has traditionally held power leverages that power or the effects of that power or the trappings of that power over someone who has been systematically excluded from power. Colloquially, people take racism to mean \"negative comments about a whole race,\" but that's not the actual definition, and that's where there's a conflict. Saying \"white people suck\" is rude, mean, prejudiced, and generally not nice, but it's not racism. Some might say it's quibbling over terminology, but I believe that that's because some people don't understand the nature of race/gender/sexuality power dynamics, and that's dangerous, especially because those that can **afford** to be ignorant and dismiss racism/sexism/homophobia as \"no big deal\" are the ones that aren't affected by it.\n\nA lot of people will also argue that when a person of color says something like \"white people suck\" it's often shorthand for \"wow today I'm really feeling the effects of systemic racism and I'm sick of it,\" and point out that when you experience racism/sexism/homophobia your whole life, you're gonna get mad at those perpetuating it at some point. Some people don't like this argument because it's basically saying minorities/women/etc. get a pass on being rude because their life is hard but like... come on. Everyone has hard days and is rude sometimes. I think expressing anger toward people who benefit from a power structure that disadvantages you is pretty natural. (But it's still not racism.)\n\nSo, basically, there is a difference between saying \"women can't drive\" and saying \"white men can't dance,\" because women were **and still are** denied the right to drive **by men**, who had/have the power to make those laws, whereas white men have never had any rights denied to them by a group that held more power than them, because they have all the power (in Western society, obvs). \n\nLet's take a more loaded statement, though: \"black people are lazy\" vs. \"white people are lazy.\" Assume the first is said by a white person and the second is said by a black person. The first is implicitly related to a history of black people being denied jobs based on their race and therefore being jobless, and of white people (especially politicians) seizing that joblessness and creating an insane loop of circular logic by saying, \"look, black people don't have jobs, therefore they are lazy; they are lazy, that's why the don't have jobs.\" This obscures the real situation - that black people have historically been and are still denied jobs based on their race, that very few black people had the same educational and career opportunities that white people did 50 years ago (and, obviously, the problem gets worse the farther back in history you go). \n\nThis shit compounds. Example: a white friend of mine has grandparents who went to the college he went to. His grandfather is a lawyer. So he's a legacy student - more likely to be accepted into this college - and his grandparents and parents are both college-educated, which means they can help him with his schoolwork as he gets older, and they know what it takes in terms of academics and extracurriculars to get into college. They also have good jobs, so they can afford to get him involved in a bunch of extracurriculars. And then his grandfather can get him a job through networking.\n\nNow imagine how few current African American kids have grandfathers that are lawyers/doctors/etc. vs. white kids who have the same. This is the kind of thing that affirmative action is trying to account for - it's trying to put minorities on equal footing with others, not give them a leg up over others.\n\nSince you're specifically asking about #BlackOutDay vs. #WhiteOutDay, I'll tackle a few issues related to that and Black History Month, International Women's Day, Gay Pride, etc.\n\nAlmost every person whose achievements you hear about in school are white, straight, and male. Often, it's assumed that unless otherwise noted, an inventor/politician/scientist is white, straight, and male. (This is called the \"unmarked category\" - people tend not to say things like 'male scientist,' which is because 'male scientists' are not exceptional - but 'female scientists' are. Generally, minority groups are a 'marked category,' and people mention or emphasize their minority-ness because it's strange/new/different/unexpected/not the default. People used to do this a lot with the word 'lady', calling people 'lady doctors' and 'lady scientists,' which implies that they're a separate kind of doctor/scientist, and not a real one.) Things like Black History Month, International Women's Day, and Pride Parades emphasize that people of color, women, and people who aren't straight/cis **do** exist and are doing great things in the world. They often also highlight that these groups have **overcome** difficulties (i.e. discrimination) that the unmarked groups did not. White/straight/male people don't get pride parades or months devoted to their achievements because the world already celebrates their achievements. Look how many portraits there are of stuffy old white dudes in every official building ever, how many buildings/schools/places/scientific things are named after white dudes. White dudes haven't had to overcome the challenges that minorities have.\n\nWhat challenges, you say? Lack of representation, to start with. All of those pictures of old white dudes, none of people of color, or women. What that says to a kid (or to an adult) is implicitly, \"people like you don't belong here, there isn't room for someone like you here, people like you don't get this position.\" Hillary Clinton, if she runs for president, will have to overcome the fact that she is a woman to win; no previous president has had to overcome the fact that he is a man. #BlackOutDay, Pride Parades, International Women's Day are all ways to say, \"hey, there are people like you out here, and they exist and they're happy and they're great despite the challenges they've faced that are directly related to their minority status.\" People make fun of #WhiteOutDay because it's an example of 1) white people not understanding how racism affects the lives of people of color and 2) white people getting offended at not being represented in something for the first time in their lives.\n\nSince it seems like you're interested in learning about these issues, I'm gonna go a step further and talk about privilige. I touched on it earlier, but the word 'privilige' tends to make people uncomfortable, because those it applies to often don't feel priviliged in any way. Saying someone has 'white privilige' means, basically, that they don't suffer from the negative effects of being a person of color - they don't have to worry that they won't get a job because their name sounds like the wrong ethnicity, they don't have to worry that a cop will assume they're older/more violent/doing more illegal things than they actually are because they're a person of color, they don't feel constantly ostracized as the only person of color in an otherwise white class/organization/work environment. Basically, they don't have to worry about their race at all times. Similarly, 'male privilige' means that men will not have to worry that their gender will negatively affect their career/life/etc.\n\nIf you have any more questions, feel free to ask. I'm not a perfect source on this, but I'm really willing to talk!\n\nI'm NOT willing to argue with people who adamantly don't believe institutionalized sexism/racism are a thing. If you're just going to tell me that women/minorities are making a big deal out of nothing, I'm not interested.", "This is just me thinking out loud, so this might not make complete sense...\n\nbut I feel like the anger and frustration seen by minority groups today is from the fact that historically, it is considered racist/ sexist to say or do things against the majority. Like, this is an extreme example- but if a black man does anything to a white man, he's going to get convicted, punished, and used as an example in narrow minded people's thoughts of how awful black people are, and whatnot.\n\nThe backlash and cries of racism against white people to me, is more a reaction to the way it's been for years. Finally, minorities have the power and voice to rise up and speak for their side and say, \"hey this isn't right.\" you know?\n\nAnd to be honest (please provide examples if i'm wrong!), I really don't see or hear much racism the other way around on a LARGE SCALE. No one really says in the media, \"white people are so lazy and stupid\", or \"white people are ugly and gross,\" or anything of that nature at all. Like, President Bush never had political cartoons in the paper published about him being white, and that having a negative connotation associated with it.\n\n\n...I don't know. I don't even think I answered the question. Back to studying! Hope you find an answer!", "White people and men are seen as privileged and dominant groups, that enjoy privileges not realistically accessible to most women and other races. As such, saying racist or sexist things against these groups isn't considered as bad because they also have a benefit that balances out the racist or sexist attitude.", "We live in a society where male and white are the norm and everything else is compared to that standard. If I say I saw a group of men walking down the street what color would you assume they are? Probably white. And this assumption is usually true for either race. This is what I've learned from reading a book called *Nurture Shock* in a chapter called \"Why white parents don't talk about race\" and basically the authors suggest that the best solution is to talk about race and make it known you think they are equal because your children already recognize the difference between people who look like them and people who don't. Along with the assumption with what is like me is good. Other groups become the out group. I'm rambling a bit, hope that helped.", "History. \n\nRacism has no real history toward white males as a group, they tend to be the perpetrators.", "This is what I wrote to help make sense for everyone about the two competing definitions of racism, please read:\n\nRacism was first used to describe Nazism in the 1930s and their ideology towards the Jews. From there, it became commonly used to essentially mean, bigotry, or racial prejudice on an individual level. The definition was seen by many in the social sciences to be inadequate, and the racism=prejudice+power was popularized in academia in 1993 by David Wellman to better represent a larger social phenomenon. Here's an example... An NYC police officer stops and frisks an african american, finds marijuana and the suspect is sentenced to prison. None of what happened is racist. It is simple to say therefore, that racism isn't an issue. However, from a sociologist's perspective, since 2003 over half the people stopped and frisked each year in NYC were african american, african americans make up 14% of drug users but represent 37% of those arrested for drug offenses, african americans also on average receive harsher sentencing for drug crimes than whites. All of that is ignored if we define racism as an individuals personal prejudices. So, Sociologists who study large amounts of data and social dynamics decided that racism at least academically, is better used the way capitalism (and other -ism's) is used, that is to say, to describe something systemic in a large group (like an economy). So, when a sociologist says \"minorities can't be racist\" what they mean is minorities do not benefit from institutional racism. They would instead say minorities like the majority white, can be prejudice, can be bigots etc. Today we live in a society where we have racism... without racists. That is to say, even the KKK has said they aren't racists, if we use the \"standard\" definition of racism, than racism isn't a problem in today's society, even though statistics clearly show otherwise.\n\n---------------------------------------------------\n\nHOWEVER, in essence, your question is easily answered, whether or not something is socially acceptable or not is dependent on whether the receiving party finds it offensive or not, and has a voice to express their feelings.\n\nFor instance, YOU might feel offended if you were sexualized by women, but MOST men wouldn't feel all that offended, if enough men did feel offended, it would cease to be socially acceptable.", "It's not ok, but it's not as bad, because it's not backed up by huge historical systemic power difference. When you think about this question, you should think about it in the context of, the terrible discrimination that has occurred throughout history and the fact that remnants of that are still present in our society today. E.g. In modern western societies, the leading cause of death and ill health in women between the ages of 18 and 40 is still domestic violence. This isn't the case for men. Hence joking about men getting bashed up by their wives isn't as distasteful as vice versa - it's a big problem for women, a rarely for men. Personally I don't think those sorts of jokes are that funny no matter who they're about, but you get the idea" ]
[ "that there is a general hesitation to call racial preference \"racist\", with many defending racial preference as saving time.\nIn that same study, researchers found that attitudes towards sexual racism were similar to attitudes about generic racism. That is, patterns of sexual racism seems to follow similar patterns of general racism. For example, they found that higher levels of education was associated with more positive attitudes about multiculturalism and less positive attitudes about racial sexism. They also found that experiences of exclusion online due to race was correlated with more accepting views of multiculturalism and less accepting attitudes about sexual", "racism, regardless of racial identity. These findings suggest that being more aware of racism in general, due to experience or education, and racism's impact had an effect on racial preference such that it was seen as less desirable. Fetishisation As well as race-based sexual rejection, sexual racism also manifests in the form of the hypersexualisation of specific ethnic groups. Freudians theorize that sexual fetishism, people of one race can form sexual fixations towards individuals of a separate generalised racial group. This collective stereotype is established through the perception that an individual's sexual appeal derives entirely from their race, and is", "that racial preference was not racism. They quoted Watts from the Huffington Post, who argued that sexual attraction and racism are not the same:\nJust because someone isn't sexually attracted to someone of Asian origin does not mean they wouldn't want to work, live next to, or socialize with him or her, or that they believe they are somehow naturally superior to them.\n— as cited in Callander, Newman, & Holts, 2015, p. 1992\nThis suggests that people find it possible to view larger systemic racial preference as problematic, while viewing racial preferences in romantic or sexual personal relationships as not problematic. Researchers noted", "University holds that, \"blackness is so associated with crime you're ready to pick out these crime objects.\" Such exposures influence our minds and they can cause subconscious racism in our behavior towards other people or even towards objects. Thus, racist thoughts and actions can arise from stereotypes and fears of which we are not aware. Humanities Language, linguistics, and discourse are active areas of study in the humanities, along with literature and the arts. Discourse analysis seeks to reveal the meaning of race and the actions of racists through careful study of the ways in which these factors of human", "racism and sexism is that racists and sexists deny any input from those of a different race or sex when it comes to questioning how they should be treated. Conversely, when it comes to how animals should be treated, Williams observed that it is only possible for humans to discuss that question. Williams observed that being a human being is often used as an argument against discrimination on the grounds of race or sex, whereas racism and sexism are seldom deployed to counter discrimination.\nWilliams also argued in favour of speciesism (which he termed 'humanism'), arguing that \"Why are fancy properties", "therefore subject to the prejudices that follow.\nRacial fetishism as a culture is often perceived, in this context, as an act or belief motivated by sexual racism. The objectification and reductionist perception of different races, for example, East Asian women, or African American men, relies greatly on their portrayal in forms of media that depict them as sexual objects. An example of such a medium includes pornography. An instance of this hypersexualisation is commented upon in Artist and Designer Donna Choi's illustrative series targeting the specific fetishisation of Asian women, named, Does Your Man Suffer From Yellow Fever? (2013).\nThe effects of", "races (racism being due to upbringing rather than any Biblical foundation), they do tend to have little regard for homosexuals.\nWhile this research appears more favorable than the research that showed a correlation between religious activity and prejudice, some researchers are convinced that these people are merely showing what they believe to be a more socially acceptable bias. Batson tested this hypothesis by having participants in a study (a study the participants were led to believe was about watching and evaluating a movie) choose whether to sit in a theater with a white confederate, or a black one. There were two", "wrong to use racial profiling for the reasons of discriminating against people, but it's not wrong to use race or other indicators for the sake of identifying people that are violating the law.\" As an example of profiling, King described an instance when a taxi driver would stop for him before he had to hail a cab, just because he was in a business suit.\nThe same day, on G. Gordon Liddy's radio program, King said that Obama's policies favored black people: \"The president has demonstrated that he has a default mechanism in him that breaks down the side of race—on", "running, McKay wrote: \nWhy this obscene maniacal outburst about the sex vitality of black men in a proletarian paper?\" Rape is rape; the colour of the skin doesn't make it different. Negroes are no more over-sexed than Caucasians; mulatto children in the West Indies and America were not the result of parthenogenesis. If Negro troops had syphilis, they contracted it from the white and yellow races. As for German women, in their economic plight they were selling themselves to anyone. I do not protest because I happen to be a Negro ... I write because I feel that the ultimate", "black refers to the racial profiling of African American drivers. The phrase implies that a motorist might be pulled over by a police officer, questioned, and searched, because of a racial bias. Racial profiling Racial profiling, or ethnic profiling, is the act of suspecting or targeting a person of a certain race on the basis of racially observed characteristics or behavior, rather than on individual suspicion. Racial profiling is commonly referred to regarding its use by law enforcement, and its leading to discrimination against minorities. Victim blaming Victim blaming occurs when the victim of a wrongful act is held at", "these studies. Discrimination Sex workers may be stereotyped as deviant, hypersexual, sexually risky, and substance abusive. Sex workers cope with this stigmatization, or othering, in ways such as hiding their occupation from non-sex workers, social withdrawal, and creating a false self to perform at work. Sex-work-related stigma perpetuates rape culture and leads to slut-shaming.\nGlobally, sex workers encounter barriers in accessing health care, legislation, legal resources, and labor rights. In a study of U.S sex workers, 43% of interview participants reported exposure to intimate-partner violence, physical violence, armed physical violence, and sexual violence in the forms of sexual coercion and rape.", "considering that quite often women have no reason to suspect discrimination until certain unfair patterns develop and they are made aware of them.", "abuse that made them feel unsafe. Women of colour, however, experienced the greatest level of hostility due to their race and gender. They experienced greater incidents of gendered and racialised harassment and were more attuned to noticing other forms of harassment such as homophobia. Forty percent of women of colour feel unsafe at work due to their gender or sex, and 28% due to their race. Women of colour are also more likely to skip educational and professional opportunities, such as meetings and conferences, in an attempt to minimise exposure to hostility and harassment.\nThe study received wide media coverage, as", "at the expense of the lower class, or vice versa. Lookism Lookism is stereotypes, prejudice, and discrimination on the basis of physical attractiveness, or more generally to people whose appearance matches cultural preferences. Many people make automatic judgments of others based on their physical appearance that influence how they respond to those people. Racism Racism consists of ideologies based on a desire to dominate or a belief in the inferiority of another race. It may also hold that members of different races should be treated differently. Sexism Sexism is discrimination based on a person's sex or gender. Sexism can affect", "Gendered racism Origin The term gendered racism was originally coined by sociologist Philomena Essed, and refers to the simultaneous experience of both racism and sexism. According to Essed, racism and sexism \"intertwine and combine under certain conditions into one hybrid phenomenon\". Gendered racism also encompasses what is known as \"double jeopardy\". Double jeopardy in this case can be defined as a disadvantage an individual faces due to aspects of their identity. \nGendered racism is seen through society's stereotypical portrayals of men and women of color. For example, African American men may be seen as criminals and absent fathers, Latino women", "or invincibly racist—are all equally wrong. The working class are simply people, who improvise their lives in certain situations, which may or may not be changed by their responses”", "say that \"whites are being hugely victimized by blacks and no one is paying attention.\" Referring to Roof's comments about rape, Beirich said, \"[Black men sexually assaulting white women] is probably the oldest racist trope we have in the U.S.\" According to Beirich, this trope related to a myth of Southern culture, as in fact African-American women had been much more frequently abused by white men. Lisa Lindquist-Dorr, associate professor at the University of Alabama, said that the myth of black rapists had dominated imaginations of white, Southern men, who considered \"Sexual access to women is a trophy of power,", "racial fetishism as a form of sexual racism are discussed in research conducted by Plummer. Plummer used qualitative interviews within given focus groups, and found that specific social locations came up as areas in which sexual racism commonly manifest. These mentioned social locations included pornographic media, gay clubs and bars, casual sex encounters as well as romantic relationships. This high prevalence was recorded within Plummer's research to be consequentially related to the recorded lower self-esteem, internalised sexual racism, and increased psychological distress in participants of colour. People subject to this form of racial discernment are targeted in a manner well", "discrimination can take the form of verbal abuse, disrespectful conduct, refusal of care, the withholding of health information,  inadequate treatment, and outright violence. In a study analyzing the quality of healthcare for South African men who have sex with men (MSM), researchers interviewed a cohort of individuals about their health experiences, finding that MSM who identified as homosexual felt their access to healthcare was limited due to an inability to find clinics employing healthcare workers who did not discriminate against their sexuality. They also reportedly faced \"homophobic verbal harassment from healthcare workers when presenting for STI treatment\". Further, MSM who", "of color exacerbated this risk.\" Women of color confront even more challenges because they face both gender and race discrimination. Bell finds that \"racism and sexism are forces that serve to heighten black women's psychological anxiety. Due to the contemporary socio-psychological forces and the historical legacy of slavery, it is extremely complicated for black women to separate the subtleties of sexism and racism.\" Women of color are thus confronted with the difficulties that their gender and races bring them and are often questioned of their abilities because of those attributes.\nConsequently, the intersectionality of the identities of women of color plays", "to her because through a racial lens she fits the African American woman category. Therefore, those same stereotypes will be applied to her as well. Racialization combined with gender can also be seen through the actions of the person that is racializing the other. Such as someone crossing the street so they do not have to walk past men who appear to be African American due to the stereotypes related to African American men. Racialization and incarceration Coming to fruition in the 1980s, the United States began to enact extensive legal reforms that worked to create a more punitive society.", "\"As a white person, there are so many misconceptions to what racism is, but the fact that you can turn a blind eye to issues of racial brutality is a symptom of being white\". Her literary inspirations are often cited to be Cormac McCarthy, Emily Brontë, Edna St. Vincent Millay and Edgar Allan Poe.", "society and by themselves; blackness in America is marked by shame that makes blacks view themselves as malignant. As a result, to escape that shame, black women are often politically involved. For example, in a literary way like Zora Neale Hurston or Ntozake Shange. In her opinion it is not only white people responsible for this; a lot of responsibility lies in the black community itself, through black liberation theology's silence on gender or the gender inequality in Christian churches in general; women's achievements in the civil rights movement have not been acknowledged enough or sometimes not at all. Most", "she came over as racist, following which she said: \"I genuinely believe 'racist' as a word has been used so much. I am sorry for the word racist in a way. I love language so much ... it's like a regular word now, it's lost all meaning to me\". When tweeting the clip she added, \"Call me racist. I don't care. I will stand up for white women being raped because you're scared to offend Muslims\". Hopkins tweeted shortly afterwards: \"Racial profiling is a good thing, call me racist. I don't care... it has lost all meaning\". She later briefly retweeted", "we love a racist?\" Most argues that even Emile is tainted by racism, as his lifestyle is dependent on the maintenance of a system whereby he benefits from underpaid native labor – Bloody Mary is able to attract workers to make grass skirts for sale to GIs because, as she puts it, \"French planters stingy bastards!\" Sex and gender roles Nellie Forbush, in her journey from Little Rock, Arkansas, to serving as a Navy nurse and on to the domesticity of the final scene of South Pacific, parallels the experience of many American women of the period. They entered the workforce", "One can be prejudiced against or have a preconceived notion about someone due to any characteristic they find to be unusual or undesirable. A few commonplace examples of prejudice are those based on someone's race, gender, nationality, social status, sexual orientation, or religious affiliation, and controversies may arise from any given topic. Sexism Sexism, also called gender discrimination, is prejudice or discrimination based on a person's sex or gender. Sexism can affect either gender, but it is particularly documented as affecting women and girls more often. The discussion of such sentiments, and actual gender differences and stereotypes continue to be", "of reports that contained an ethnicity of \"Not Stated.\"\nIn many countries, such as France, the state is legally banned from maintaining data based on race, which often makes the police issue wanted notices to the public that include labels like \"dark skin complexion\", etc.\nIn the United States, the practice of racial profiling has been ruled to be both unconstitutional and a violation of civil rights. There is active debate regarding the cause of a marked correlation between the recorded crimes, punishments meted out, and the country's populations. Many consider de facto racial profiling an example of institutional racism in law", "a white race that was biologically superior to other races had fallen out of favour, its place had been taken up by a belief that Western culture was superior to other cultures.\nThree main arguments as to why beliefs in intrinsic cultural differences should be considered racist have been put forward. One is that hostility on a cultural basis can result in the same discriminatory and harmful practices as belief in intrinsic biological differences, such as exploitation, oppression, or extermination. The second is that beliefs in biological and cultural difference are often interlinked and that biological racists use claims of cultural", "\"Feminism is [...] very threatening to the majority of Black people because it calls into question some of the most basic assumptions about our existence, i.e., that sex should be a determinant of power relationships. [...] The material conditions of most Black people would hardly lead them to upset both economic and sexual arrangements that seem to represent some stability in their lives. Many Black women have a good understanding of both sexism and racism in their lives, but because of the everyday constrictions on their lives cannot risk struggling against them both.\" Black Feminist Projects and Issues In this", "can be oppressed in a different aspect of their identity. Some people believe that racial discrimination is on its way to being eradicated from the United States when they look as people like Colin Powell, a very successful, African-American, middle-aged man. Although Powell obtains the characteristics of a person that may not face oppression (upper-class, middle-aged, male), he is still discriminated against because of his race. This shows one of the key components of the matrix of domination; the idea that one cannot look at the individual facets of someone's identity, but rather that they are all interconnected. Historical Background" ]
What is bad about universities like the University of Phoenix and DeVry?
[ "They admit anyone who has (or can borrow) the money to pay them, regardless of whether they are ready or able to do the coursework. \nThey provide subpar education at excessive cost. \nTheir graduates tend to find themselves not particularly employable, and in a lot of debt." ]
[ "were part of a lawsuit against the US Department of Education demanding student loan forgiveness. Online education and corporate training Students have access to class-specific online resources, which include an electronic library, textbooks, and other course materials. Some academics and former students argue the abbreviated courses and the use of learning teams result in an inferior education. The University of Phoenix has been criticized for lack of academic rigor. Henry M. Levin, a professor of higher education at Teachers College at Columbia University, called its business degree an \"MBA Lite\", saying \"I've looked at [its] course materials. It's a very", "at the end of their contracts. The main University of Arizona campus was generally hostile to the new upstart institution, intervening to 'manage' it on several occasions. Student numbers were not given a chance to build to sustainable levels before closure was announced. Because AIC was a public institution, there were constraints on increasing student fees to support rising costs.\nTal said \"It would, however, be a case of weeping crocodile tears were I to lament AIC's passing too loudly: at root, the college made promises to students and faculty that were impossible to fulfill. The bottom line is that one", "sole criterion for admission was eligibility for federally funded student loans.\nUniversity of Phoenix students owe more than $35 billion in student loan debt, the most of any US college. In 2014, the school was highlighted in a Time.com article titled \"The 5 Colleges That Leave the Most Students Crippled By Debt.\" According to the College Scorecard, approximately 28 percent are repaying their loans. Lawsuits and investigations The university has paid several government fines and settled whistle-blower lawsuits concerning its admissions practices and education programs. In 2000, the federal government fined the university $6 million for including study-group meetings as instructional", "Management to take over the schools. Vistria included two friends of former President Barack Obama: Tony Miller and Martin Nesbitt. In 2019, University of Phoenix's parent company, Apollo Education Group, was the third largest higher education lobby. Criticism and controversies Since 2009, the University of Phoenix has received $1.2 billion of federal money issued through the G.I. Bill. The university enrolled almost 50,000 such students in 2014, twice as many as any other institution. Some critics of for-profit higher education have alleged that Apollo Education Group and University of Phoenix \"prey upon veterans\". In 2013, the US Department of Defense", "and help obtaining financial aid,\" but \"disappointed with the poor quality of education....\"University of Phoenix has been the largest for-profit college in the US. Since 2010, for-profit colleges have received greater scrutiny from the US government, state Attorneys General, the media, and scholars. Notable business failures include Corinthian Colleges (2015), ITT Educational Services (2016), Education Management Corporation also known as EDMC (2017), and Education Corporation of America (2018). Sources and oversight of funds US Colleges and universities receive their funds from many sources, including federal Title IV funds, state funds, and endowments. The US Department of Education can delay or", "at the University of Arizona to complete their degrees.\nFormer AIC Professor Kali Tal notes that although the budget crisis in Arizona was real, AIC was an easy target for closure because none of the faculty had tenure and therefore could easily be dismissed (she does not mention the loss of students to UofA, however). Criticisms AIC suffered from its position vis a vis the established Arizona state university system. The faculty in particular felt unsecure, and it took protests at the end of the first year (organised by Kali Tal who was denied a contract renewal), for them to obtain", "low level of instruction.\" The university runs a program called \"corporate articulation agreements\" that allow people working at other companies to earn college credit for training they have completed at their jobs. To qualify for college credit, students can either create a professional training portfolio or write an \"experiential essay\". The portfolio is a collection of documents such as transcripts from other schools, certificates, licenses, workshops or seminars. Admissions and financial aid The University of Phoenix has an open admissions policy, which means it is accessible to anyone with a high school diploma, GED, or its equivalent. Prior to 2010,", "of students who fail to graduate, or who do graduate and fail to get appropriate jobs; many default on repayment of their federal loans as a result. There has been additional concern over for-profit colleges as they fundamentally changed the view of colleges as a public good. As of 2016, some for profit colleges have been sanctioned by federal agencies for preying on vulnerable populations who accrue massive student loan debt in the course of earning a degree that has less value than those obtained from public or private institutions of higher learning. Federal and state officials started cracking", "students' academic aspirations. Consequences In some more serious cases where students allow their grades to drop quite significantly, especially failing, universities may rescind offers of admission. Those who experience senioritis are often shocked when colleges and universities send them a letter the summer preceding their fall semester which informs them that they can no longer attend the college due to failure in the academic rigor that they promised in the interview or application process. Nonetheless, it is widely known that most colleges do not rescind, and even the most elite schools only revoke a very small number of students. However,", "few UC campuses as they want on one application, paying a fee for each campus. This significantly increased the number of applications to the Berkeley and Los Angeles campuses, since students could choose a campus to attend after they received acceptance letters, without fear of being redirected to a campus they did not want to attend.\nThe University of California accepts fully eligible students from among the top one-eighth (1/8) of California public high school graduates through regular statewide admission, or the top 9% of any given high school class through Eligibility in the Local Context (see below). Part of", "schools, diploma mills, visa mills, and predatory for-profit colleges. There have been some attempts to reform the system through federal policy such as gainful employment regulations, but they have been met by resistance.\nAccording to Pew Research Center and Gallup poll surveys, public opinion about colleges has been declining, especially among Republicans and the white working class. The higher education industry has been criticized for being unnecessarily expensive, providing a difficult-to-measure service which is seen as vital but in which providers are paid for inputs instead of outputs, which is beset with federal regulations that drive up costs, and payments coming", "student loan defaults.\nCritics of for-profit colleges have pointed to the heavy dependence on federal loans and grants to students, the low student completion rate, and the inability of the majority of graduates to pay their student loans because they failed to secure high-paying jobs.\nFor-profit colleges have aggressively recruited among military veterans, and in 2010 received 36% of all the tuition aid paid by the federal government. The University of Phoenix received 88% of its income from federal aid to students; the maximum allowed is 90%.\nThe National Center for Education Statistics reported a 52% rate of default on student loans at", "take liberal arts courses from the university (e.g., English literature, history, etc.) as well as enabling musically-gifted students from the main university campus to have access to conservatory-grade music lessons. As well, with the affiliation, the students from the music college may be able to use the facilities of the university, such as the gym, swimming pool, and health services. Finally, affiliation with a university may enable a music college to offer a broader range of degrees, such as the Master of Music degree (M.Mus.), which the university may be able to grant. However, because of the separation, students", "trying to avoid; the non-selective university has been the \"butt of jokes\" in American television shows for many years, as well as the 2015 film Ted 2. The inevitable result, according to Newsweek, was that the most elite institutions had created a situation in which purely meritocratic admissions had become impossible because they were already turning away too many overqualified candidates—former Harvard president Drew Gilpin Faust had once said, \"we could fill our class twice over with valedictorians.\" It was also recognized that any workable long-term solution would need to alleviate the underlying anxiety driving the crisis, either by restructuring", "University of Phoenix The University of Phoenix is a wholly owned subsidiary of the Apollo Education Group. The University of Phoenix is one of the largest higher education providers in North America. The university has approximately 40 campuses and confers degrees in over 100 degree programs at the associate, bachelor's, master's and doctoral levels. The University of Phoenix has an open enrollment admission policy only requiring a high-school diploma, GED, or an equivalent qualification. The school also provides associate or bachelor's degree applicants opportunity for advanced placement through its prior learning assessment, through which, aside from previous coursework, college credit", "far less likely to go to college than their affluent peers with similar qualifications.\" In an effort to lessen the stress of paying for college, the commission's report recommended shortening the FAFSA form to encourage more people to apply for financial aid. The report also calls for greater productivity and efficiency of the financial aid system. State funding for higher education has fallen to the lowest levels the nation has seen in two decades, and the report proposes that Universities be held accountable for their \"spending decisions... based on their own limited resources.\" Quality The report urges colleges and universities", "criticized for this phenomenon due to their extraordinarily low acceptance rates compared to other universities in the system. At a Board of Regents meeting in 2015, California Governor Jerry Brown reportedly said on the problem of the UC's relationship with Californian applicants, “And so you got your foreign students and you got your 4.0 folks, but just the kind of ordinary, normal students, you know, that got good grades but weren’t at the top of the heap there – they’re getting frozen out.” Admissions Each UC school handles admissions separately, but a student wishing to apply for an undergraduate or", "in theory. HOWEVER (and it's a big however), I am suspicious because all around me I see universities behaving like profit-making businesses and using management models that do not help academics provide the best education for students.\"\nLa Trobe University School of Business Professor of Economics, Harry Clarke, speculated the Melbourne Model \"will reduce numbers seeking to utilise its programs\" and \"programs will become more expensive in time and aggregate tuition charges\" accusing their scholarship program of being \"distributionally regressive\" aimed at mainly well-off private-school-trained students.\nSwinburne University Vice-chancellor, Professor Ian Young, argued that University of Melbourne students would have to study", "University, Long Beach, California State University, Northridge, California State University, Fullerton, City College of San Francisco, University of Southern California, The Claremont Colleges, and at UCLA.\nOutside of California, major programs include Dartmouth College, University of Washington, University of Illinois at Urbana–Champaign, University of Maryland, College Park, University of Colorado, Hunter College, Cornell University, Binghamton University, and Columbia University. Other rising programs include Arizona State University, New York University, Northwestern University, University of Pennsylvania and University of Minnesota. Currently, several universities, including University of North Carolina, University of Virginia, Syracuse University, and many others are in the process of developing Asian", "Arizona International College Background In the 1990s Arizona's public university system hosted two large public universities in Tucson and Phoenix (University of Arizona and Arizona State University), the smaller Northern Arizona University in Flagstaff, and a number of community colleges. There was no teaching-intensive, liberal arts college. In 1990, the Arizona Board of Regents (ABOR) began exploring the establishment of a liberal arts institution, in part due to anticipated growth in student numbers in the state. A formal proposal was made in 1994.\nAIC was established as \"Arizona International University\" in an old IBM plant in Eastern Tucson, where the", "the University of Florida joined the University of Virginia, Harvard University, the University of North Carolina at Chapel Hill, and Princeton University in announcing the discontinuation of early decision admissions to foster economic diversity in their student bodies. These universities assert early decision admissions forces students to accept an offer of admission before evaluating the financial aid offers from multiple universities. The university's single application deadline is November 1. Honors program The University of Florida has an honors program; after they are accepted to the university, students must apply separately to the Honors Program and show significant academic achievement to", "money at a job. A 2018 study showed the compound effect of being at a four-year university vs. a community college with 7.3% increase in dropout rates. Not only does this status make individuals less likely to finish their undergraduate degree, but it can also stop students from pursuing a graduate degree, especially in terms of funding.\nThe psychological effects of this status also becomes a barrier for DACA students in their college experience, largely because of the uncertainty that the status carries. Many reported high rates of extreme stress and anxiety as compared to their documented counterparts. Also, the internalizing", "University Professors released a report saying that the university \"had no acceptable financial or educational justification for either the layoffs or a related reorganization leading to the closure of four academic departments and 14 academic programs.\". The university's president, Nivine Megahed, said the university \" had been \"facing serious financial pressures\" and the cuts \" enabled the university to stabilize a multiyear decline. \". On June 15, 2013, the American Association of University Professors censured National Louis for violating the AAUP standards of academic freedom and tenure. Academics The university consists of four distinct colleges: The School", "reflected in the rankings. For this reason, some prestigious universities are unfairly placed in low positions. Third, there are no individual categories, such as private or public schools. As such, the universities' individual characteristics and strengths are not adequately considered. Furthermore, the total amount spent per student does not include labor costs, thereby improperly evaluating the Liberal Arts Colleges which spend significant amounts on labor (e.g. International Christian University).", "can actually be a sign of success, as many students find work before ending their courses, and so do not feel the need to formally graduate. Non-governmental institutions The advent of the non-governmental universities has prompted some controversy. They have been criticised for their motivations (financial and religious, rather than purely educational), and for luring teachers away from the state sector. Many teachers work part-time at the private institutions in addition to their government jobs, so it has been argued that the private universities do at least increase the amount of education which they are providing.", "students whose academic performance is superior to that of those who are favored by the quota system. Another factor that contributes to the phenomenon of student elimination is the lack of infrastructure and facilities, in spite of the expansion of infrastructure and establishment of an \"open\" university, Azad University. Being a semi-private university, Azad University favors its autonomy in governance, but its degrees and curriculum are overseen by the Ministry of Science, Research, and Technology.\nThe other drawback is the nature of the test itself. As in many other countries where only a long multiple-choice, mostly memory-based exam is used to", "being the United States and Japan.\nInstitutions of higher education that are not research universities (or do not aspire to that designation, such as liberal arts colleges) instead place more emphasis on student instruction or other aspects of tertiary education, and their faculties are under less pressure to publish or perish.\nIt is also possible for a research university to combine both functions, hosting in effect a liberal arts college for undergraduates while maintaining a heavy focus on research in its graduate degree programs, as is commonplace in the American Ivy League institutions. History The concept of the modern research university first", "While there was some concern that college admissions could be negatively affected, Fieldston's college office worked closely with admissions officers of schools across the country to explain the change, and to assure that its students would be evaluated on the quality of its courses, even without the AP designation.", "to attend. Aside from compensating for the decreases in funding, the increase in out of state admission has also allows universities to address the ever-present concern in rankings as they are able to increase the academic requirements for admission due to the rising number of applicants. In higher ranking universities the increases in out of state admissions has had a significant effect on admission of in state low income and underrepresented minority students.\nPrinceton sociologists Thomas Espenshade and Alexandria Walton Radford published a book-length study of admissions that found that an upper-middle-class white applicant was three times as likely to be", "the Central Universities Act, 2009, does not allow reservations for jobs based on domicile. The people felt cheated and no relief was given to them." ]
How do wireless speakers work?
[ "Just like radio. There is a transmitter and a reciever. In the case of Bluetooth, the transmitter is something like a smartphone. Then the speaker recieves the signal, and amplifies it." ]
[ "Wireless speaker Overview Wireless speakers are composed of two units: a main speaker unit combining the loudspeaker itself with an RF receiver, and an RF transmitter unit. The transmitter connects to the audio output of any audio devices such as hi-fi equipment, televisions, computers, mp3 players, etc. An RCA plug is normally used to achieve this. The receiver is positioned where the listener wants the sound to be, providing the freedom to move the wireless speakers around without the need of using cables. The receiver/speaker unit generally contains an amplifier to boost the audio signal to the loudspeaker; it is", "Wireless microphone A wireless microphone, or cordless microphone, is a microphone without a physical cable connecting it directly to the sound recording or amplifying equipment with which it is associated. Also known as a radio microphone, it has a small, battery-powered radio transmitter in the microphone body, which transmits the audio signal from the microphone by radio waves to a nearby receiver unit, which recovers the audio. The other audio equipment is connected to the receiver unit by cable. In one type the transmitter is contained within the handheld microphone body. In another type the transmitter is", "sound to the user. Using wireless technology, the speaker provides up to 90 dB of volume, which can accommodate most hearing impairments. The speaker works by plugging the transmitter into the analog or digital ports of the television, cable, or satellite box and uses infrared to send audio to the speaker. Because the speaker is individual of the television, the volume may be adjusted at no cost to the surrounding listeners. Wireless digital headphone systems Usually battery operated, the wireless headphone system uses digital frequency to operate. Unlike TV Ears, transmitters for wireless headphone systems are typically capable of projecting audio", "uses a microphone to capture an audio source near its origin and broadcast it wirelessly through means of frequency modulation (FM), infrared (IR), an audio induction loop, or another method. The person who is listening may use a wireless Receiver to tune into the signal and listen at their preferred volume. There are also other consumer ALDs such as alarm clocks with bed shakers, amplified stethoscopes, baby monitors, and flashing door bell indicators. Most FM assistive listening devices operate on seventeen channels between 72.1000 and 75.800 MHz.\nThe use of a wireless microphone placed next to the person speaking eliminates the sounds", "that can be set using a tuning knob to overcome potential RF interference with other nearby wireless devices, such as cordless phones or baby monitors. Bluetooth devices use a radio communication frequency such that the devices do not have to be in a visual line of sight with each other.\nDifferent types of wireless speakers are designed for specific needs: Stereo speakers can deliver both Left and Right stereo channels in a single speaker. Speakers designed specifically for outdoor use have a robust casing; manufacturers claim these are weatherproof. Home theatres utilize a specialized set of speakers in", "audio signals using radio frequency (RF) waves rather than over audio cables. There is normally an amplifier integrated in the speaker's cabinet because the RF waves alone are not enough to drive the speaker. This integration of amplifier and loudspeaker is known as an active loudspeaker. Manufacturers of these loudspeakers design them to be as lightweight as possible while producing the maximum amount of audio output efficiency.\nWireless speakers still need power, so require a nearby AC power outlet, or possibly batteries. Only the wire to the amplifier is eliminated. Electrical characteristics of dynamic loudspeakers The load that a driver presents", "A loudspeaker that serves as an earpiece is located above the screen. The microphone is featured on the bottom of the phone and is used for phone calls and voice-commands, although it can also be used in many other third-party applications. The unit has an HDMI-out (type D, micro connector) port, which allows sending content to an HD television set. The Sprint Mobile Hotspot application allows sharing the device's mobile broadband with up to eight devices. Smartphone connectivity The EVO features a CDMA cellular radio that supports 3G EVDO, Revisions 0, A, and the yet-undeployed B allowing faster download and", "required information. In radio communications, a radio receiver is an electronic device that receives radio waves and converts the information carried by them to a usable form. It is used with an antenna. The information produced by the receiver may be in the form of sound (an audio signal), images (a video signal) or digital data. Wired communication Wired communications make use of underground communications cables (less often, overhead lines), electronic signal amplifiers (repeaters) inserted into connecting cables at specified points, and terminal apparatus of various types, depending on the type of wired communications used. Wireless communication Wireless communication involves", "is an optional collar clip to hold the cable in place, and hair/clothing can be used to hide the kit as much as possible. The volume of the speech coming through the earpiece can be adjusted. The wireless receiver gets signals from a transmitter. An audio mixer placed in production control rooms (PCR) would be wired to the transmitter. The input for the audio mixer would come from a microphone in which the director speaks and sends out information. This information is carried to the talkback and the host follows the instruction.", "Smart speaker A smart speaker is a type of wireless speaker and voice command device with an integrated virtual assistant that offers interactive actions and hands-free activation with the help of one \"hot word\" (or several \"hot words\"). Some smart speakers can also act as a smart device that utilizes Wi-Fi, Bluetooth and other wireless protocol standards to extend usage beyond audio playback, such as to control home automation devices. This can include, but is not be limited to, features such as compatibility across a number of services and platforms, peer-to-peer connection through mesh networking, virtual assistants, and others. Each", "Network speaker A conventional loudspeaker is an electromechanical transducer that converts an electrical signal into sound. If locally powered, this can also be termed an active loudspeaker, meaning it contains an audio power amplifier that drives the loudspeaker. A network speaker implies the ability to send audio to such a device from a network connection, usually over an Ethernet network or the Internet. In many cases this type of speaker also contains digital signal processing (DSP) to provide the audio crossover and other tonal functions that exist in conventional speakers. Network speakers are also known as IP", "speaker sometimes doubles as a microphone while in transmit mode.\nAn unusual feature, common on children's walkie-talkies but seldom available otherwise even on amateur models, is a \"code key\", that is, a button allowing the operator to transmit Morse code or similar tones to another walkie-talkie operating on the same frequency. Generally the operator depresses the PTT button and taps out a message using a Morse Code crib sheet attached as a sticker to the radio. However, as Morse Code has fallen out of wide use outside amateur radio circles, some such units either have a grossly simplified code label or", "suppressed while the speaker's voice is enhanced.\nThe processed sound is delivered in stereo to the wearer. This audio allows users to have face-to-face conversations in high noise environments up to 95 dB without removing their hearing protection, as well as providing 360 degree situational awareness (Directional - 3D sound), which allows the wearer to determine in which direction the voice or other audio (Noise) is coming from. Models are available with different communication options including two-way radio connection via cable and/or a Bluetooth capability so users can talk on the phone and/or two-way radio wirelessly without removing their hearing protection. Some", "wireless microphones use the 2.4 GHz band (e.g. AKG model DPT 70). Channel change Often solving interference is as simple as changing the channel of the offending device. Particularly with video senders, whereby plugging in the receiver with no transmitter attached will let you \"see\" the neighbour's video sender, this technique is considered part of the \"Installation process\". Where the channel of one system, such as a Wireless ISP cannot be changed, and it is being Interfered with by something such as a video sender, the owner of the video sender is normally very happy to assist with doing this, providing", "fieldwork situations if a condenser microphone is self-powered (via a battery); however, when power is not a major factor, phantom-powered models can also be used. A stereo microphone setup is needed whenever more than one speaker is involved in a recording; this can be achieved via an array of two mono microphones, or by a dedicated stereo microphone.\nDirectional microphones should be used in most cases, in order to isolate a speaker's voice from other potential noise sources. However, omnidirectional microphones may be preferred in situations involving larger numbers of speakers arrayed in a relatively large space. Among directional microphones, cardioid", "powered receiver systems, of which the headphone is only a component. Cordless headphones are used with events such as a Silent disco or Silent Gig.\nIn the professional audio sector, headphones are used in live situations by disc jockeys with a DJ mixer, and sound engineers for monitoring signal sources. In radio studios, DJs use a pair of headphones when talking to the microphone while the speakers are turned off to eliminate acoustic feedback while monitoring their own voice. In studio recordings, musicians and singers use headphones to play or sing along to a backing track or band. In military applications,", "error does not damage speakers, but is not optimal for listening.\nWith sound reinforcement system, PA system and instrument amplifier speaker enclosures, cables and some type of jack or connector are typically used. Lower- and mid-priced sound system and instrument speaker cabinets often use 1/4\" speaker cable jacks. Higher-priced and higher powered sound system cabinets and instrument speaker cabinets often use Speakon connectors. Speakon connectors are considered to be safer for high wattage amplifiers, because the connector is designed so that human users cannot touch the connectors. Wireless speakers Wireless speakers are very similar to traditional (wired) loudspeakers, but they receive", "line, the microphone (A2) produces a modulated electric current which varies its frequency and amplitude in response to the sound waves arriving at its diaphragm. The resulting current is transmitted along the telephone line to the local exchange then on to the other phone (via the local exchange or via a larger network), where it passes through the coil of the receiver (A3). The varying current in the coil produces a corresponding movement of the receiver's diaphragm, reproducing the original sound waves present at the transmitter.\nAlong with the microphone and speaker, additional circuitry is incorporated to prevent the incoming speaker", "the Smart Listening System™. It uses adaptive audio processing to enhance specific sound frequencies and elevate what the user intends to hear while reducing background noise. Included are four different colored ear tips for fit personalization. The Scoop connects wirelessly to users' phones or tablets via Bluetooth. Wireless Mic The Wireless Mic is a wireless microphone used to hear a specific sound source in a variety of environments. It picks up the intended sound and delivers it to the Scoop. The Wireless Mic comes with a clip for attaching it to clothing or placing it on a table. Charging Case", "receiver secured to the bottom of the housing, and an adjustable acoustic tube secured to the top of the housing with its distal end adapted to be disposed adjacent to the mouth of the user to transmit sound to the microphone. Wireless products In the 1980s, Plantronics created a line of cordless products using infrared technology. Though the technology utilized was the same one being used by television remote controls, the link did not require a Federal Communications Commission (FCC) telecommunications approval. One of the first products used the infrared beam to create a communications link between a small transmitter", "to. This lets the device be used in areas with ambient sounds that would otherwise make the speaker inaudible.\nA parabolic microphone uses a parabolic reflector to collect and focus sound waves onto a microphone receiver, in much the same way that a parabolic antenna (e.g. satellite dish) does with radio waves. Typical uses of this microphone, which has unusually focused front sensitivity and can pick up sounds from many meters away, include nature recording, outdoor sporting events, eavesdropping, law enforcement, and even espionage. Parabolic microphones are not typically used for standard recording applications, because they tend to have poor low-frequency", "is continuously listening for \"hot words\" followed by a command. However, these continuously listening microphones also raise privacy concerns among users. These include what is being recorded, how the data will be used, how it will be protected, and whether it will be used for invasive advertising. Further, an analysis of Amazon Alexa Echo Dots showed that 30–38% of \"spurious audio recordings were human conversations\", suggesting that these devices capture audio outside of strictly after hot word detection. As a wiretap There are strong concerns that the ever-listening microphone of smart speakers presents a perfect candidate for a wiretap.", "microphone network that overcomes the line-of-sight problem by utilizing up to 64 transceivers around the performance area. It is also the only system employing Ultra WideBand pulsed RF technology which doesn't generate intermodulation products common with FM, QAM and GFSK modulated carriers used by most other systems.\nDigital radio microphones are inherently more difficult for the casual 'scanner' listener to intercept because conventional \"scanning receivers\" are generally only capable of de-modulating conventional analogue modulation schemes such as FM and AM. However, some digital wireless microphone systems additionally offer encryption technology in an attempt to prevent more serious 'eavesdropping' which may be", "the granule carbon button microphones.\nUnlike other microphone types, the carbon microphone can also be used as a type of amplifier, using a small amount of sound energy to control a larger amount of electrical energy. Carbon microphones found use as early telephone repeaters, making long distance phone calls possible in the era before vacuum tubes. These repeaters worked by mechanically coupling a magnetic telephone receiver to a carbon microphone: the faint signal from the receiver was transferred to the microphone, where it modulated a stronger electric current, producing a stronger electrical signal to send down the line. One illustration of", "points to connect to the source of the signal (for example, to the audio amplifier or receiver). To accept the wire connection, the loudspeaker enclosure may have binding posts, spring clips, or a panel-mount jack. If the wires for a pair of speakers are not connected with respect to the proper electrical polarity (the + and − connections on the speaker and amplifier should be connected + to + and − to −; speaker cable is almost always marked so that one conductor of a pair can be distinguished from the other, even if it has run under or", "of concern for corporate users and those using radio microphones in security sensitive situations.\nManufacturers currently offering digital wireless microphone systems include AKG-Acoustics, Alteros, Audio-Technica, Lectrosonics, Line 6, MIPRO, Shure, Sony, Sennheiser and Zaxcom. All are using different digital modulation schemes from each other. United Kingdom In the UK, use of wireless microphone systems requires a Wireless Telegraphy Act license, except for the license free bands of 173.8–175.0 MHz and 863–865 MHz, sometimes referred to as \"Channel 70\" (This is not to be confused with TV Channel 69, which was 854–862 MHz. In the UK Channel 69 frequencies always required a license from JFMG", "aids), increase daily hours of hearing aid use, and there is currently no agreed set of outcome measures for assessing this type of intervention. Wireless hearing aids A wireless device has two main components: a transmitter and a receiver. The transmitter broadcasts the captured sound, and the receiver detects the broadcast audio and enables the incoming audio stream to be connected to accommodations such as hearing aids or captioning systems.\nThree types of wireless systems are commonly used: FM, audio induction loop, and InfraRed. Each system has advantages and benefits for particular uses. FM systems can be battery operated or plugged", "is being widely used by wireless keyboards. These devices connect and communicate to their parent device via the bluetooth protocol.\nA wireless keyboard can be connected using RF technology with the help of two parts, a transmitter and a receiver. The radio transmitter is inside the wireless keyboard. The radio receiver plugs into a keyboard port or USB port. Once the receiver and transmitter are plugged in, the computer recognizes the keyboard and mouse as if they were connected via a cable. Bluetooth keyboard A Bluetooth keyboard is a wireless keyboard that connects and communicates with its parent device via the", "Voice coil Operation By driving a current through the voice coil, a magnetic field is produced. This magnetic field causes the voice coil to react to the magnetic field from a permanent magnet fixed to the speaker's frame, thereby moving the cone of the speaker. By applying an audio waveform to the voice coil, the cone will reproduce the sound pressure waves, corresponding to the original input signal. Design considerations Because the moving parts of the speaker must be of low mass (to accurately reproduce high-frequency sounds without being damped too much by inertia), voice coils are usually made as", "and a base unit which was connected to the telephone network. This product was the first \"echo-free\" speakerphone for use in conference rooms. The small transmitter could be handheld or clipped to clothing to ensure a good pickup of the speaker's voice. Wireless office headsets In 2003, Plantronics introduced the CS50 wireless headset for use on office phones. Since that time, Plantronics has manufactured wireless headsets including the \"CS70N\", CS500 Series, and Savi 700 Series. In recent years there has also been strong focus on Unified Communications headsets and speakers. Mobile and Bluetooth mobile headsets Plantronics manufactures mobile headsets, including" ]
Why does touching the contacts on a 9-volt battery not shock you, but something like putting your finger in an electrical outlet will?
[ "here ya' go:\n\n_URL_1_\n\nWhile potential (in this case volts) is 9v, the current is very low. The batteries ability to shock is negligible. As is 120v given low current. However most home circuits are breakered to 15 or 20 amps. More than enough to kill a person who sticks a fork or tongue in an outlet.\n\nAs for the difference in voltage vs current, that is described in ohms law. So where a 120vac circuit can provide (let's say) 20 amps, a 240 volt circuit only need to provide 10 amps for the same power. (watts)\n\nThat's why may appliances use 240vac. The current necessary to carry is half.\n\nA Van de Graph generator can produce 10's of thousands of volts. The current is negligible. Go ahead touch it. \n_URL_2_\n\nHere is a good study on volts x amps\n\n_URL_0_", "If I remember correctly, it takes somewhere in the neighborhood of 17-20 volts of electrical potential to pass the poorly conductive barrier of dry skin. If you wet your finger you will feel it. Try connecting 4 of those batteries in parallel and close the loop with your dry finger. \n\nIf you really want to science, take some 1.5 volt batteries (AA or AAA) and use combinations of 9 and 1.5V to find the approximate number where electrical potential (voltage) will cross your skin and shock you" ]
[ "When a conductive object, such as a finger, comes into contact with a PCT panel, it distorts the local electrostatic field at that point. This is measurable as a change in capacitance. If a finger bridges the gap between two of the \"tracks\", the charge field is further interrupted and detected by the controller. The capacitance can be changed and measured at every individual point on the grid. This system is able to accurately track touches.\nDue to the top layer of a PCT being glass, it is sturdier than less-expensive resistive touch technology. \nUnlike traditional capacitive touch technology, it is", "contact resistance (ECR) phenomena at interfaces. Switch and relay contacts are usually made of springy metals. When the contacts strike together, their momentum and elasticity act together to cause them to bounce apart one or more times before making steady contact. The result is a rapidly pulsed electric current instead of a clean transition from zero to full current. The effect is usually unimportant in power circuits, but causes problems in some analogue and logic circuits that respond fast enough to misinterpret the on‑off pulses as a data stream. In the design of micro-contacts controlling surface structure (surface roughness) and", "can be exposed to any electric charge the user has built up. If the user has built up a substantial charge, the discharge can jump around the door's edge or pass through the door itself (dielectric breakdown). The low-voltage integrated circuit inside the cartridge is extremely ESD sensitive, and can be destroyed by an event of only a few dozen volts which cannot even be felt by the person, delivering a fatal shock to the game unit. This phenomenon was described in detail by John Elder Robison (a former Milton Bradley engineer) in his book Look Me in the Eye.", "and it may regain part of its charge through a process called \"dielectric absorption\". In addition, some types of charging systems can be equally deadly themselves. The trigger voltage can deliver a painful shock, usually not enough to kill, but which can often startle a person into bumping or touching something more dangerous. When a person is charged to high voltages a spark can jump, delivering the high capacitor current without actually touching anything.\nFlashtubes operate at high pressures and are known to explode, producing violent shockwaves. The \"explosion energy\" of a flashtube (the amount of energy that will destroy it", "different from direct current in that the current can flow through what would ordinarily seem to be a physical barrier. In a series circuit, a capacitor blocks direct current but passes alternating current.\nIn power transmission systems, one side of the circuit, known as the neutral, is grounded to dissipate static electricity and to reduce hazardous voltages caused by insulation failure and other electrical faults. It is possible to get a shock by only touching the hot wire, due to the person's body being capacitively coupled to the ground upon which the person stands, even if the person is standing on", "from the high voltage terminal strike the bare skin, they can cause deep-seated burns called RF burns. This is often avoided by allowing the arcs to strike a piece of metal held in the hand, or a thimble on a finger, instead. The current passes from the metal into the person's hand through a wide enough surface area to avoid causing burns. Often no sensation is felt, or just a warmth or tingling.\nHowever this does not mean the current is harmless. Even a small Tesla coil produces many times the electrical energy necessary to stop", "Electrical contacts An electrical contact is an electrical circuit component found in electrical switches, relays, connectors and circuit breakers. Each contact is a piece of electrically conductive material, typically metal. When a pair of contacts touch, they can pass an electrical current with a certain contact resistance, dependent on surface structure, surface chemistry and contact time ; when the pair is separated by an insulating gap, then the pair does not pass a current. When the contacts touch, the switch is closed; when the contacts are separated, the switch is open. The gap must be an insulating medium, such as", "or more coils electrically insulated from each other.\nFor an isolated device, touching a single powered conductor does not cause a severe shock, because there is no path back to the other conductor through the ground. However, shocks and electrocution may still occur if both poles of the transformer are contacted by bare skin. Previously it was suggested that repairmen \"work with one hand behind their back\" to avoid touching two parts of the device under test at the same time, thereby preventing a circuit from crossing through the chest and interrupting cardiac rhythms/ causing cardiac arrest.\nGenerally every AC power line", "finger near fringing electric fields adds conductive surface area to the capacitive system. The additional charge storage capacity added by the finger is known as finger capacitance, or CF. The capacitance of the sensor without a finger present is known as parasitic capacitance, or CP. Surface capacitance In this basic technology, only one side of the insulator is coated with a conductive layer. A small voltage is applied to the layer, resulting in a uniform electrostatic field. When a conductor, such as a human finger, touches the uncoated surface, a capacitor is dynamically formed. The sensor's controller can determine the", "voltage of polarity in the opposite direction of the battery, positive at the lower end of the inductor and negative at the upper end. This voltage pulse, sometimes called the inductive \"kick\", which can be much larger than the battery voltage, appears across the switch contacts. It causes electrons to jump the air gap between the contacts, causing a momentary electric arc to develop across the contacts as the switch is opened. The arc continues until the energy stored in the inductor's magnetic field is dissipated as heat in the arc. The arc can damage the switch contacts, causing pitting", "near the same voltage potential, thus reducing the chance of a shock. This is especially important in bathrooms where one may be in contact with several different metallic systems such as supply and drain pipes and appliance frames. When a system needs to be connected to the physical ground (earth), the equipment bonding conductor also becomes the equipment earthing conductor (see above).\nA grounding electrode conductor (GEC) is used to connect the system grounded (\"neutral\") conductor, or the equipment to a grounding electrode, or a point on the grounding electrode system. This is called \"system grounding\" and most electrical systems are", "but the most energetic arcs are extinguished at the zero crossing. The problem is more severe with DC where such zero crossings do not occur. This is why contacts rated for one voltage for switching AC frequently have a lower voltage rating for DC. Electrical contact theory Ragnar Holm contributed greatly to electrical contact theory and application.\nMacroscopically smooth and clean surfaces are microscopically rough and, in air, contaminated with oxides, adsorbed water vapor, and atmospheric contaminants. When two metal electrical contacts touch, the actual metal-to-metal contact area is small compared to the total contact-to-contact area physically touching. In", "the two.\nFixed contacts are inexpensive but prone to loss of electrical connection. Combination of fixed and flexible contacts are a better solution, but this is subject to an open circuit upon movement in the direction away from the fixed position; the spring contact compresses and allows the battery to move away from the fixed contact. A flexible contact allows for slight expansion of the cell on discharge, as internal chemicals increase in volume. Flexible contacts with multiple fingers touching the anode and cathode allow for movement in multiple directions without losing electrical connection.\nPolarity, or reverse battery, protection can be part", "protect against electric shock when current flows through a person from phase to neutral or from phase to phase, for example where a finger touches both live and neutral contacts in a light fitting; a device cannot differentiate between current flow through an intended load from flow through a person, though the RCD may still trip if the person is in contact with the ground (earth), as some current may still pass through the persons finger and body to earth.\nWhole installations on a single RCD, common in older installations in the UK, are prone to \"nuisance\" trips that can cause", "great amount of static electricity. This is not the result of friction; two non-conductive surfaces can become charged by just being placed one on top of the other. Since most surfaces have a rough texture, it takes longer to achieve charging through contact than through rubbing. Rubbing objects together increases amount of adhesive contact between the two surfaces. Usually insulators, e.g., substances that do not conduct electricity, are good at both generating, and holding, a surface charge. Some examples of these substances are rubber, plastic, glass, and pith. Conductive objects in contact generate", "some older female pin receptacles, the electrical contacts are not deeply recessed in the plug body and can easily be accidentally contacted resulting in an electric shock if the circuit is live. This was one advantage of the Edison outlet in that it was impossible to contact live parts unless something conductive was inserted into the slots. New connectors have the contacts deeper inside the body.\nA major disadvantage to this style of connector is that it can be mated with one connector reversed, reversing ground and line connections. For equipment mechanically attached to grounded building structures such as a lighting", "reach them through the phone jack, Ethernet cable, or electricity outlet. Close strikes can also generate electromagnetic pulses (EMPs) – especially during \"positive\" lightning discharges.\nLightning currents have a very fast rise time, on the order of 40 kA per microsecond. Hence, conductors of such currents exhibit marked skin effect, causing most of the currents to flow through the outer surface of the conductor.\nIn addition to electrical wiring damage, the other types of possible damage to consider include structural, fire, and property damage. Prevention and mitigations The field of lightning protection systems is an enormous industry worldwide due to the impacts", "take over a minute to cool in an extreme case.\nIt is thought that the irons cannot be used indiscriminately for all work; the voltage across and current through the tip can damage electronic circuits being soldered. When not in contact with a joint, the split tip has 6 or more volts across it, enough to destroy semiconductor p-n junctions on contact if the iron accidentally touches multiple closely spaced pads. This is not static-electricity damage; any voltage over about 0.7V capable of delivering high current can destroy a semiconductor junction.\nAccording to ColdHeat:\nIt's a common misunderstanding that high current in the", "Electrical injury Burns Heating due to resistance can cause extensive and deep burns. When applied to the hand, electricity can cause involuntary muscle contraction, producing the \"no-let-go\" phenomenon, and increasing the risk for serious burns. Voltage levels of 500 to 1000 volts tend to cause internal burns due to the large energy (which is proportional to the duration multiplied by the square of the voltage divided by resistance) available from the source. Damage due to current is through tissue heating. For most cases of high-energy electrical trauma, the Joule heating in the deeper tissues along the extremity will reach damaging", "experience the greatest contact wear and will form a high-resistance connection that would cause excessive heating inside the contactor. However, in doing so, it will protect the primary contact from arcing, so a low contact resistance will be established a millisecond later.\nAnother technique for improving the life of contactors is contact wipe; the contacts move past each other after initial contact in order to wipe off any contamination. Arc suppression Without adequate contact protection, the occurrence of electric current arcing causes significant degradation of the contacts, which suffer significant damage. An electrical arc occurs between the two contact points", "tingle would indicate a battery with a strong charge, the absence, a discharged battery. While there have been stories circulating of unfortunate outcomes, the process is rarely dangerous under normal circumstances, though it may be unpleasant. Lithium Lithium 9-volt batteries are consumer-replaceable, disposable high-energy-density batteries. In the PP3 size they are typically rated at 0.8-1.2Ah (e.g., >1.2Ah @ 900 ohms to 5.4V @ 23 °C for one type), about twice the capacity of alkaline batteries. Manufacturers claim \"High energy density, up to 5x more than alkaline\". Common applications for lithium nine-volt batteries are smoke and carbon monoxide (CO) alarms, and electronic", "closed circuit (such as a load or a charger) to the battery terminals can also cause sparks and an explosion, if any gas was vented from the cells.\nIndividual cells within a battery can also short circuit, causing an explosion.\nThe cells of VRLA batteries typically swell when the internal pressure rises, so giving a warning to users and mechanics. The deformation varies from cell to cell, and is greatest at the ends where the walls are unsupported by other cells. Such over-pressurized batteries should be carefully isolated and discarded. Personnel working near batteries at risk for explosion should protect their eyes", "tachycardia). If the device determines that a shock is warranted, it will use the battery to charge its internal capacitor in preparation to deliver the shock. The device system is not only safer - charging only when required, but also allows for a faster delivery of the electric current.\nWhen charged, the device instructs the user to ensure no one is touching the patient and then to press a button to deliver the shock; human intervention is usually required to deliver the shock to the patient in order to avoid the possibility of accidental injury to another person (which can result", "applying electrodes to a person's body, preventing sparks from forming at the point of contact and damaging skin. Similarly, sparks can cause damage to metals and other conductors, ablating or pitting the surface; a phenomenon which is exploited in electric etching. Sparks also produce ozone which, in high enough concentrations, can cause respiratory discomfort or distress, itching, or tissue damage, and can be harmful to other materials such as certain plastics.", "air, vacuum, oil, SF₆. Contacts may be operated by humans in push-buttons and switches, by mechanical pressure in sensors or machine cams, and electromechanically in relays. The surfaces where contacts touch are usually composed of metals such as silver or gold alloys that have high electrical conductivity, wear resistance, oxidation resistance and other properties. Contact states A normally closed (NC) contact pair is closed (in a conductive state) when it, or the device operating it, is in a deenergized state or relaxed state.\nA normally open (NO) contact pair is open (in a non-conductive state) when it, or the device operating", "Contact breaker Purpose The purpose of the contact breaker is to interrupt the current flowing in the primary winding of the ignition coil. When this occurs, the collapsing current induces a high voltage in the secondary winding of the coil, which has many more windings. This causes a very high voltage to appear at the coil output for a short period—enough to arc across the electrodes of a spark plug. Operation The contact breaker is operated by an engine-driven cam, and the position of the contact breaker is set so that it opens (and hence generates a spark) at exactly", "can produce lower-voltage, higher-current radio frequency output. Careful earth grounding is essential to prevent injury or damage to equipment. Hazards Bringing conductive materials or electronic devices close to a plasma globe may cause the glass to become hot. The high voltage radio frequency energy coupled to them from within the globe may cause a mild electric shock to the person touching, even through a protective plastic casing. The radio frequency field produced by plasma lamps can interfere with the operation of touch-pads used on laptop computers, digital audio players, cell phones, and other similar devices. Some types of plasma globes", "the high voltage producing holes in their cell membranes, a process called electroporation.\nIn a direct strike, the electrical currents in the flash channel pass directly through the victim. The relatively high voltage drop around poorer electrical conductors (such as a human being), causes the surrounding air to ionize and break down, and the external flashover diverts most of the main discharge current so that it passes \"around\" the body, reducing injury.\nMetallic objects in contact with the skin may \"concentrate\" the lightning's energy, given it is a better natural conductor and the preferred pathway, resulting in more serious injuries, such as", "can or plastic case with insulated terminals for the high voltage and low voltage connections. When the contact breaker closes, it allows current from the battery to flow through the primary winding of the ignition coil. The current does not flow instantly because of the inductance of the coil. Current flowing in the coil produces a magnetic field in the core and in the air surrounding the core. The current must flow long enough to store enough energy in the field for the spark. Once the current has built up to its full level, the contact breaker opens.", "activity causes the material in the contacts to degrade over time, ultimately resulting in device failure. For example, a properly applied contactor will have a life span of 10,000 to 100,000 operations when run under power; which is significantly less than the mechanical (non-powered) life of the same device which can be in excess of 20 million operations.\nMost motor control contactors at low voltages (600 volts and less) are air break contactors; air at atmospheric pressure surrounds the contacts and extinguishes the arc when interrupting the circuit. Modern medium-voltage AC motor controllers use vacuum contactors. High voltage AC contactors (greater" ]
The Defense Industry
[ "Here's an article about the top 9 defense contractors in the US and the projects they work on: _URL_0_\n\nAs far as I know, they work the same way all government contractors work, mostly, except that they and employees often have special security clearances. They place bids on contracts and the government accepts the best bids. I believe Cheney/Bush was criticized for unfairly favoring Cheney's former company in the bidding process, though." ]
[ "Defense industrial base United States A commonly cited example of a defense industrial base is that of the United States, where, given the onset of the Cold War accompanied by the outbreak of the Korean War, the maintenance \"of a peacetime defense industry of significant proportions was an unprecedented event.\"\nResearchers and public figures critical of close ties among legislators, militaries and the defense industrial base due to a government's monopoly on demand for products of the latter employ the concept of the military–industrial complex to critique these connections. Early studies of interest group representation in the US referred to these", "Acquisition Program Administration (DAPA), and the Agency for Defense Development (ADD) have been developing naval weaponry with local defense companies.", "industry and was ranked in the Top 5 Defense Industry Development areas in US for 2008, 2010, 2011 by Expansion Solutions Magazine. Eight of the ten top American defense contractors are located in the area, including Lockheed Martin, Boeing, Northrop Grumman, General Dynamics, and L-3 Communications. The city hosts Partnership for Defense Initiatives (PDI), a non-profit organization that works with government, academia, and private industry to develop defense solutions. The PDI sponsors a Research and Development laboratory and a Defense Security Technology Accelerator (DSTA), a statewide program to assist new companies in developing their businesses and their technology services and", "made possible the rapid growth in civilian output. The defense industry manufactured a wide variety of goods for civilian use, including motor vehicles, optical equipment, television sets, electrical appliances, pharmaceuticals, and medical instruments and prostheses. Many of these products were consumer goods in high demand. For example, in 1985 the Ministry of Ordnance Industry manufactured 500,000 motorcycles, representing two-thirds of total motorcycle output, as well as 250,000 cameras, 450,000 bicycles, and 100,000 refrigerators.\nFollowing the formulation of regulations and mechanisms for such transfers, defense industries began transferring technology to civilian industries on a large scale in the mid-1980s. Technology transfers provided", "& Defense, a global supplier of technologies, systems and services supporting commercial and military programs. Capabilities within the portfolio range from financing, engineering, and integration services to manufacturing, logistics, and aircraft modifications.\nAll the companies were aligned under the AGC Aerospace and Defense umbrella in 2009. The companies support DoD directly or as subcontractors to OEMs or Tier 1 defense contractors.", "capabilities of the supply chain, at every level, to influence the strategies, policies, and regulations that enable the U.S. aerospace and defense industry to successfully compete in the global market, be profitable, and strengthen the U.S. position as the world leader. The American aerospace industry The US aerospace industry contributed $147 billion in export sales to the economy in 2016. This industry supported almost 1.7 million jobs in 2015. Aerospace manufacturing has two major segments, namely the commercial and the defense. The commercial segment constitutes roughly 60% of the industry. The defense segment caters to US government agencies, such as", "Defense industry of Israel The Defense industry of Israel is a strategically important sector and a large employer, as well as major supplier of the Israel Defense Forces. Israel is one of the world's major exporters of military equipment, accounting for 10% of the world total in 2007. Three Israeli companies were listed on the 2010 Stockholm International Peace Research Institute index of the world's top 100 arms-producing and military service companies: Elbit Systems, Israel Aerospace Industries and RAFAEL. The Defense industry in Israel is a strategically important sector and a large employer within the country. It is also a", "for over one-half of all agricultural production. In 2016 agriculture has surpassed the arms industry as Russia's second largest export sector after oil and gas. Defense industry Russia's defense industry employs 2.5 – 3 million people, accounting for 20% of all manufacturing jobs. Russia is the world's second largest conventional arms exporter after the United States. The largest firearm manufacturer in the country, Kalashnikov Concern, produces about 95% of all small arms in Russia and supplies to more than 27 countries around the world. The most popular types of weaponry bought from Russia are Sukhoi and MiG fighters, air defense systems,", "Foreign Military Sales The U.S. Department of Defense's Foreign Military Sales (FMS) program facilitates sales of U.S. arms, defense equipment, defense services, and military training to foreign governments. The purchaser does not deal directly with the defense contractor; instead, the Defense Security Cooperation Agency serves as an intermediary, usually handling procurement, logistics and delivery and often providing product support, training, and infrastructure construction (such as hangars, runways, utilities, etc.). \nFMS is based on countries being authorized to participate, cases as the mechanism to procure services, and a deposit in a US Trust Fund or appropriate credit and approval to fund", "develops and manufactures a wide array of guns and rifles used by armies and law enforcement agencies around the world.\nRafael Advanced Defense Systems, known as RAFAEL or Rafael, is another large Israeli defense technology company. It was founded as Israel’s National R&D Defense Laboratory for the development of weapons and military technology within the Ministry of Defense; in 2002 it was incorporated as a limited company. Rafael develops and produces weapons, military, and defense technologies for the Israel Defense Forces and for export abroad. All current projects are classified.", "Defence Industrial Strategy The Defence Industrial Strategy (DIS) is a United Kingdom government policy which was published as a white paper on 15 December 2005. The purpose of the DIS is stated to be to ensure that the UK armed forces are provided with the equipment they require, on time, and at best value for money. This is achieved through the maintenance of sovereign capabilities, i.e. the capabilities of UK companies in key defence areas.\nThe DIS is structured into three parts. Part A outlines the strategy, part B reviews the UK defence industry, and part C describes the implications of", "determine the size of the sector. Many of the companies which supply goods and services to the military also have a significant civilian market, and their staff often work on items intended for both military and civilian customers. The Australian Government's 2018 Defence Export Strategy provided the following definition:\nAustralian defence industry consists of businesses with an Australian Business Number who are providing or have the capacity to provide defence-specific or dual-use goods or services in a supply chain that leads to the Australian Department of Defence or an international Defence force.\nA 2015 parliamentary inquiry into the defence industry noted that", "in their home markets. The US defence market is competitive, however largely between American firms, while foreign companies are excluded. In December 2005 the MoD published the Defence Industrial Strategy (DIS) which has been widely acknowledged to recognise BAE Systems as the UK's \"national champion\". The DIS identifies key industrial capabilities which must be maintained within the UK through long-term government commitments to support research spending and procurement. Of these capabilities, several are dominated by BAE Systems, including naval vessels and submarines, combat vehicles, fixed-wing aircraft, general munitions (with the exception of certain \"niche capabilities abroad\") and network-enabled capability (defined", "sales. Economic significance Russia's defense industry employs 2.5 – 3 million people and accounts for 20% of all manufacturing jobs in Russia. Sevmash directly employs 27,000 people. The combined revenue of the industry's 20 largest companies in 2009 was $12.25 billion. Russian shipbuilders and naval missile manufacturers survived the difficult period of transition from a command to a market-driven economy, and kept skills needed for the development of advanced combat systems. With recently won orders for Project 955 and Project 885 submarines, the share of domestic military orders in Sevmash's portfolio has risen to above 70%.\nVisiting Severodvinsk in February, deputy premier", "Strategic Policy Institute report stated that \"Defence’s principal needs from Australian industry are maintenance, repair and upgrading of the ADF’s equipment, most of which is imported\". This report also noted that at the time it was estimated that manufacturing represented 20 percent of the Australian defence industry's revenue, with sustainment services making up the remainder.\nIn 2018 the Australian Government announced a plan to support the Australian defence industry to expand its exports, with the goal of Australia becoming the 10th largest source of military exports. This will include making $A3.8 billion in government funding available for loans to companies and", "represents 0.24% of total employment, and is equivalent to 2.9% of jobs in the total manufacturing sector.\nIn January 2016 Australian Defence Magazine reported that the 40 largest Australian defence companies had a combined revenue of $A 9.2 billion in 2015. A 2017 Australian Strategic Policy Institute report stated that the defence industry \"accounts for 0.22% of Australian industry and 1.7% of the manufacturing sector\", and \"although [the] Australian defence industry is undoubtedly important for our defence force, it represents only a trifling fraction of the overall Australian economy. Exports and imports The scale of the Australian defence industry's exports is", "Defense Integrated Military Human Resources System The Defense Integrated Military Human Resources System was an enterprise program of the Business Transformation Agency's Defense Business Systems Acquisition Executive, within the United States Department of Defense (DoD). As the largest enterprise resource planning program ever implemented for human resources, DIMHRS (pronounced dime-ers) was to subsume or replace over 90 legacy systems. The first phase of DIMHRS was expected to roll out first to the U.S. Army in 2009 and bring all payroll and personnel functions for the Army into one integrated web-based system. The U.S. Air Force, United States Navy", "Defense Security Cooperation Agency History Founded in 1971, the Defense Security Assistance Agency was renamed the Defense Security Cooperation Agency effective October 1, 1998. Foreign military sales (FMS) Foreign military sales (FMS) and International Military Education and Training (IMET) are two key programs included within Security Cooperation. IMET is conducted solely on a grant basis. FMS can be conducted through direct payments of foreign states or United States Foreign Military Financing (FMF).\nForeign Military Sales division is the core activity of DSCA, and yearly sales are between US$30 and US$40 billion. FMS is a U.S. government to foreign government agreement, and", "a large extent from such activities, in the development and manufacture of the weapons it would use. The second category of funds was devoted to basic research and applied science to help modernize the defense industry. The third category went to technological services necessary for research programs. This reform was another measure designed to integrate military and civilian industry by placing the military production of defense industries within the framework of the planned-commodity economy. The new system further sought to provide the military with better equipment at a minimum cost, to force the defense industry to upgrade weapons designs and", "Weapon systems engineering Companies involved Many companies help our government and military to manufacture new weapons and strategies. One is Parsons. The Missile Defense Agency, MDA, is a research agency that develops and tests the missile defense agency to defend the United States and its allies. Parsons helps with this through the MDA missile contract. They provide missile system support including tests and evaluating the performance.\nThe U.S. Navy awarded multi-million-dollar contracts with Tekla Research and Avian-Precise Co. to support the \"Naval Air Systems Command's Systems Engineering Department\". Tekla is to help NAVAIR assess technology, cost, and design. Avian-Precise is to", "the way the DLO and DPA (Defence Procurement Agency) worked together. The aim is to harmonise processes and minimise burden on the delivering and enabling groups, ensuring that we work efficiently and minimise duplications of effort. It is about reducing burden, increasing efficiency and improving coherence for IPTs and enabling services, and aligning strategic direction. Defence Industrial Strategy The Defence Industrial Strategy (DIS) follows and enforces the Defence Industrial Policy and the need to provide the armed forces with the equipment which they require, on time, and at best value for money for the taxpayer. It had a significant bearing", "conflicts around the world. Defense Security Cooperation Agency The Director of the Defense Security Cooperation Agency is responsible for providing Allies and partner nations with financial and technical assistance, transfer of defense matériel, training, and the promotion of military-to-military contacts. Defense Technology Security Administration The Director of the Defense Technology Security Administration is responsible for the formulation and enforcement of technology security policies related to international transfers of defense-related goods, services, and technologies.", "Defense National Stockpile Center The Defense National Stockpile Center (DNSC) is a branch of the United States' Defense Logistics Agency, whose purpose it is to store, secure, and sell raw materials. The DNSC is based in Fort Belvoir and has operations throughout the United States. Materials they offer for sale include: aluminum oxide, beryllium, chromium, cobalt, diamonds, ferrochromium, ferromanganese, iodine, iridium, mica, niobium, platinum group metals, talc, tantalum, thorium, tin, tungsten and zinc.", "for defending soldiers and officers before the military tribunals, during appeals to the Military Court of Appeals, and providing representation and legal advise to members of the military while they undergo an investigation.\nThe Military Defense specializes in the defense of soldiers in military-criminal law, and consists of dozens of enlisted defense lawyers working in each district of the Military Courts, as well as numerous lawyers serving in reserve duty. The military defenders handle thousands of cases annually dealing with a variety of offences in the military justice system, and assist soldiers and commanders throughout legal and related proceedings.\nThrough individual cases", "and the Bureau of Equipment, are often headed by officials from other ministries and are the main centers of power and instruments of civilian control in the Defense Agency. The Bureau of Defense Policy is responsible for drafting defense policy and programs, for determining day-to-day operational activities, and for information gathering and analysis in the JSDF. The Bureau of Finance is instrumental in developing the Defense Agency budget and in establishing spending priorities for the Defense Agency and the JSDF. The Bureau of Equipment, organized into subunits for each of the military services, focuses on equipment procurement. Before any major", "maintains a monopoly on education and advancement in their field, and have an overarching responsibility to the society they serve and thus do not 'compete' in the open market. The military profession requires comprehensive study and training, and thus expertise, of an intellectual set of skills: organizing of forces, planning of activities, and executing and directing activities. The military expertise, the management of violence, includes the science of war and combat as well as organizational and administrative skills. The specializations of the military profession expands far and wide since there are engineers, pilots, mechanics, ordinance experts, and more.\nHuntington argues this", "\"published estimates of the number of people employed in the defence industry have cited varying figures\". The federal government body Skills Australia estimated in 2012 that between 15,000 and 25,000 were employed in the industry. In 2010 the Department of Defence put the figure at up to 29,000 people, and in 2015 it advised the inquiry that around 27,000 people were directly employed in the industry. The 2016 Defence Industry Policy Statement stated that 25,000 people were employed in the defence industry, of whom around 50 percent worked in global defence companies. If accurate, this estimate means that the industry", "type. Arms & Security Project The Arms and Security Project engages in media outreach and public education aimed at promoting reforms in U.S. policies on nuclear weapons, military spending and the arms trade. It seeks to advance the notion that diplomacy and international cooperation are the most effective tools for protecting the United States. According to program director William D. Hartung, \"the use of military force is largely irrelevant in addressing the greatest dangers we face, from terrorism, to nuclear proliferation, to epidemics of disease, to climate change, to inequities of wealth and income. The allocation of budgetary resources needs", "defense giants Raytheon and Lockheed Martin as well as large global companies such as Google, 3M and Airbus. Polish businesses like PZU and Coca-Cola Polska also offer support.", "precision agriculture, engineered films, and Aerostar divisions. The U.S. military and other government agencies are among its clients, and besides the U.S. Department of Defense, Raven Industries has other big name customers such as Google." ]
how do people deep fry ice cream? Wouldn't it melt?
[ "First of all the ice cream for this is frozen at extremely cold temps, then it is quickly battered and fried, so while the ice cream softens up a little....it is still plenty cold.", "It's not the ice cream that's fried. It's coated in batter, basically a thin layer of donut around the whole thing. The dough is fried and insulates the ice cream.", "The ice cream is frozen hard into scoops/ balls. Then it's dipped in the batter and taken out fairly quickly as soon as the batter is cooked. \n\nThe part that keeps the ice cream from melting are the bubbles in the batter. This causes the batter to become insulation for the ice cream from the heat. \n\nI've made deep fried ice cream many times." ]
[ "Ice cream maker Process Ice cream makers may prepare the mixture by employing the hand-cranking method or by employing an electric motor. The resulting preparation is often chilled through either pre-cooling the machine or by employing a machine that freezes the mixture. An ice cream maker has to simultaneously freeze the mixture while churning it so as to aerate the mixture and keep the ice crystals small (less than 50 μm). As a result, most ice creams are ready to consume immediately. However, those containing alcohol must often be chilled further to attain a firm consistency. Some machines—such as certain", "would freeze, being scraped off by paddle until it came together. The ice cream must be made in small batches of 2.5 US gallons (9.5 l; 2.1 imp gal) at a time, then hand-packed into cartons. This results in an ice cream that is more dense and contains 20 to 25 percent air mixed in during the freezing process, as opposed to other styles where 50 percent air is mixed in. Consequently, a pint of Graeter's ice cream weighs 1 pound (0.45 kg), and can be almost twice the weight of other styles. With 14 percent milk fat and high-quality ingredients, the ice cream", "be added, such as fruit, cookies, chocolate, and brownies. These ingredients plus extract powder or syrups are used to create the flavour. Process The process to create stir-fried ice cream takes an average of two minutes. The flavored milk-based liquid is poured onto the ice pan, a freezing-cold stainless steel surface that is chilled by a refrigeration unit, where it is chopped and manipulated until the liquid becomes a cream. Other required ingredients are added and the mixture is chopped and probed until a creamy texture has formed. The mixture is spread in a thin layer across the pan, then", "Salt and ice challenge The salt and ice challenge is an Internet challenge where participants pour salt on their bodies, usually on the arm, and ice is then placed on the salt. This causes a \"burning\" sensation similar to frost bite, and participants vie to withstand the pain for the longest time. The challenge can be recorded and posted on YouTube or other forms of social media.\nThe mixture of ice and salt creates a eutectic frigorific mixture which can get as hot as −18 °C (0 °F), much colder than ice alone.\nThe salt and ice challenge can quickly cause second- and third-degree", "icebox cake is made using pudding (usually chocolate) and graham crackers or vanilla wafers layered in a square or rectangular baking dish. Additional variations include alternating layers of chocolate and vanilla pudding, or the addition of sliced bananas or pineapples between the layers. While this can be done with cold instant pudding, if given ample time in the refrigerator, the best results come from assembling the dessert with still-hot stove-cooked pudding, and then refrigerating overnight. Australian In Australia the cake is made from Arnott's Chocolate Ripple biscuits, hence the name in that country of Chocolate Ripple cake. The biscuits", "freeze and make the ice cream. Some small manual units comprise a bowl with coolant-filled hollow walls. These have a volume of approximately one pint (500 ml). The paddle is often built into a plastic top. The mixture is poured into the frozen bowl and placed in a freezer. The paddles are hand-turned every ten minutes or so for a few hours until reaching the desired consistency and flavor. Electric machines There are four types of electric ice cream machines. Each has an electric motor that drives the bowl or the paddle to stir the mixture. The major difference between the", "falls in the \"superpremium\" segment of the ice cream market.\nGraeter's ice cream is made using the French pot method. All their ice creams are created from an egg custard base. After pasteurization, the flavorings are added. The custard and flavoring mixture is placed into two-gallon French pots. The pots are then spun in −14 °F (−26 °C) saltwater, while a blade scrapes the cream that freezes against the sides of the pot. After 15–20 minutes of immersion in the saltwater, any larger additives are mixed in, such as cookie dough or chocolate chips. Ice cream is hand-scooped into pint containers. Graeter's makes", "speed up the freezing process. The ice/salt mix, along with its submerged kulfi moulds, is placed in a matka or an earthen pot that provides insulation from the external heat and slows down the melting of ice. Kulfi prepared in this manner is hence called Matka Kulfi. Kulfi, thus prepared by slow freezing, also renders a unique smooth mouth feel that is devoid of ice crystals.\nAn easier version is to boil the milk and add bread crumbs, mawa (dried whole milk), and sugar while stirring. The cream layer formed on the boiling milk is scooped initially and added in", "States during the eighteenth century, cooks and confectioners needed a “larger wooden bucket”, “a metal freezing pot with a cover, called a sorbetiere”, ice, salt, and the cream based mixture that they planned on freezing. The process starts with finding ice of a “manageable” size, then mixing it with salt and adding the mixture to a bucket. Together, the ice and the salt create a refrigerating effect. The cook or confectioner adds their ice cream mixture to a freezing pot and then puts the cover on it. The freezing pot is put into the wooden bucket, where it is stirred", "several ways: They can be 'flash frozen' by simply running under cold water or putting them in a bucket to soak for a few minutes, then spread on a baking tray and placed into a freezer. After freezing, they keep very well with the frozen glaze for a long time in airtight plastic containers. However, when thawed they can sometimes turn slightly mushy, so they are best frozen after steaming or frying. Due to their natural porosity, morels may contain trace amounts of soil which cannot be easily washed out. Any visible soil should be removed with a brush, after", "with liquid nitrogen. This process employs the low temperature of liquid nitrogen, -196 degrees Celsius, to emit a gas vapor which freezes the ice cream. Products Lab Made offers liquid nitrogen ice cream in a variety of flavors. Some of the company's past flavors have included apple crumble, Hong Kong crispy toast, mooncake, sticky toffee pudding and strawberry cheesecake.", "and its hot fudge, is freshly made. The ice cream is old-fashioned, with less butterfat than some competitors, and made without eggs. The ice cream is made in small batches of eight flavors (including chocolate, vanilla, butter pecan, and strawberry). No preservatives are used. An article in The New York Times described the ice creams as \"creamy, ethereally light and perfectly balanced. They practically float into your mouth and leave no heavy film on your palate.\" The restaurant serves large portions, and also offers banana splits, sundaes, and shakes.\nThe Clinton St. Baking Company & Restaurant on the Lower", "this method, the ice cream is frozen and mixed at the same time, with little air added during this process. The more popular soft-serve method of production churns the ice cream, then adds a substantial amount of air while it is being frozen. The soft serve method allows for larger batches to be made at one time and produces a lighter, air-filled consistency. Bigger ice cream chains such as Dairy Queen use this soft serve method.\nBecause Kline's does not use this method, they make smaller batches and cannot work as efficiently as chain businesses. Kline's product is denser since there", "be served without ice. However, adding a small amount of ice allows the flavours of the ingredients to blossom.", "to condense and freeze moisture from the air and also re-freeze its own melt-water, thus forming lumps if not used quickly during periods of storage at ambient temperature. It is best stored below zero, but in some applications such as fishing it can be stored at +2°C for moderate lengths of time without too many problems.\nIt is mainly used in the fishing industry, particularly by processors with large ice requirements, and in the concrete industry where huge volumes are often required in hot climates, thus requiring cold storage.\nMost scale ice machines are in the 5 tonne to 30 tonne range,", "The frozen product then goes to the distributor.\nThe quality of ice cream and its smooth texture depend on the structure of their ice crystals and their dimensions, and on the viscosity of the ice cream. Water freezes out of a liquid in its pure form as ice. The concentration of the remaining liquid sugar mixture increases due to water removal, hence the freezing point is further lowered. Thus the structure of ice cream can be described as a partly frozen foam with ice crystals and air bubbles occupying most of the space. Tiny fat globules flocculate and surround the", "ice cream, it is made by freezing for half an hour a mixture of stock made mainly from crab, with an alternative being prawns, and a little milk powder (skimmed), a dozen yolks of egg, and some sugar. Crab ice cream is described to be sweet in flavour to the majority of people, although some may taste otherwise as it has been proven that taste is affected by the brain's expectations. Blumenthal has compared crab ice cream to \"frozen crab bisque\". Notable uses Crab ice cream is made by Heston Blumenthal, a renowned chef and owner of the Fat Duck,", "countries are the US, New Zealand, Denmark, Australia and Belgium.\nThe modern design of industrial ice cream freezers ensures a high level of machine/operator interface and top quality of the produced ice cream.\nThe manufacturing process of ice cream production includes pasteurization, homogenization and maturation of the ice cream mixture. The prepared mixture enters into the industrial double tube scraped crystallizer – heat exchanger, in which the processes of pre-freezing and churning of ice cream are carried out. A refrigerant fluid evaporates and continually circulates in a vessel jacket.\nUsually, the initial temperature of an ice cream mixture is 12–18 °C. After switching on", "hit that sweet spot of ice creams that are clever, whimsical, and crave-inducing (which, yes, is the M.O. for most artisan ice cream makers these days), but that are also quite easy to make. You won't spend hours making a cake only to then crumble it up ... No, most of these recipes involve just a few clever mix-ins that pair flavors for surprising creations.\n— Emma Christensen, The Kitchn\nThe book includes chapters for ice creams, gelatos, sorbets, cookies, toppings, and shakes. Ice cream recipes include Chocolate Orange Cointreau, Whiskey Lucky Charms, and Vegan Horchata.", "further steeping in a refrigerator. For best results, the eggs should be allowed to steep for at least several hours. The dark color of the spiced tea gives the egg a marbled effect when it is peeled to be eaten. Quick method Another method of making tea eggs is to boil the eggs until fully cooked inside, then removing the hard-boiled eggs from their shells and letting them steep in the spiced tea mixture at low heat for a little longer. The eggs and liquid are removed from the heat and transferred to a glass or ceramic container for further", "ice crystals and bubbles as the ice cream freezes. Minimising the need for large ice crystals reduces the required fat content by 30 to 40%, so the process creates low-fat ice cream, but with a creamy consistency and intense taste. The process was used to reduce the fat content in Bourbon Vanilla, Chocolate Chips, Erdbeer (strawberry) Cream and Maple Walnuts flavors. Machinery at the Uelzen factory was upgraded at a cost of 5 to 6 million euros. In 2007, the conchier process was introduced to make \"Decorative\" category flavors have a less than ten percent fat content: Cioccolata Straccietella, Caramel", "hotter than its boiling point. Faster cooling may be obtained by plunging an object into a slush of liquid and solid nitrogen rather than liquid nitrogen alone. Culinary use of liquid nitrogen The culinary use of liquid nitrogen is mentioned in an 1890 recipe book titled Fancy Ices authored by Mrs. Agnes Marshall, but has been employed in more recent times by restaurants in the preparation of frozen desserts, such as ice cream, which can be created within moments at the table because of the speed at which it cools food. The rapidity of chilling also leads to the formation", "until the sugar interacts with the proteins in the yolk, creating a network of proteins. The entire substance turns white, at which point flavouring can be added and cooked in. While stirring the mixture, Blumenthal cools it as fast as possible using liquid nitrogen.\nBlumenthal's bacon-and-egg ice cream, now one of his signature dishes, along with his other unique flavours, has given him a reputation as \"The Wizard of Odd\" and has made his restaurant a magnet for food enthusiasts. In the 2006 New Years Honours List, Blumenthal was awarded Officer of the Most Excellent Order of the British Empire (OBE),", "Soft serve Soft serve is a frozen dairy desert, similar to ice cream but softer and less dense as a result of air being introduced during freezing. Soft serve has been sold commercially since the late 1930s in the US.\nIn the US, soft serve is not sold prepackaged in supermarkets, but is common at fairs, carnivals, amusement parks, restaurants (especially fast food and buffet), and specialty shops. All ice cream must be frozen quickly to avoid crystallization. With soft serve, this is accomplished by a special machine that holds pre-mixed product at a very low, but non-frozen temperature, at the", "carving.\nThe ice may be turned clear after carving by applying heat from a Propane or Mapp Gas cylinder. This alters the opaque effect that is obtained when carving. The ice turns clear after the outside is melted. Caution is to be used as the ice melts very quickly and could soften edges and contours. Sometimes distilled water is used for enhanced clarity. Uses Ice sculptures feature decoratively in some cuisines and may be used to enhance the presentation of foods, especially cold foods such as seafood or sorbets. The story of the creation of the dish Peach", "is less air added into the mixture. \"It also means more milk, fruit and flavoring in every cup or cone.\" Each batch of continuous freeze ice cream takes about two minutes from start to finish. However, this does not make as much product as the conventional soft serve method. With continuous freeze, very little air is added as the machines slowly push out the final product, making only about 10 gallons an hour. Despite the time and effort this method takes, Kline's makes ice cream fresh everyday. In order to make up for the time of production, they only make", "to melting. Sugar (beet or cane) provides 15–17% of the yogurt’s ingredients; in addition to adding sweetness, it increases the volume of solid ingredients, improving body and texture. Gelatin and/or vegetable additives (guar gum, carrageenan etc.) stabilize the yogurt, reducing crystallization and increasing the temperature at which it will melt. This stabilization ensures that the frozen yogurt maintains a smooth consistency regardless of handling or temperature change.\nMajor companies often use assembly lines specifically dedicated to frozen yogurt production. Milk products and stabilizing agent(s) are combined and homogenized. At 32°C, the yogurt culture is added. The mix remains at this temperature", "nearly melting (actually just melting on the surface) then hammered together. A lot like taking two ice cubes and allowing them to sit out until the surfaces are wet, then putting them back in the freezer stacked together. Come back and cut the two ice cubes across the surface where they re-froze and you can't see a seam where they re-joined. Same with forge welding - two melted iron faces puddle together then \"re-freeze\" – a very strong weld with complete joining of the surfaces involved (when everything goes right). Shutter mounts on face of structure and closes within masonry", "ice dessert. It is made with sago pearls, pinipig (toasted pounded rice), various jellies, and coconut milk on shaved ice. Like the halo-halo, it can have multiple variations. It originates from the Hiligaynon people. Melon sa malamig Melon sa malamig, sometimes called \"melon chiller\", \"melon cooler\", or simply \"melon juice\" is, at its most basic, pieces of cantaloupes mixed with sugar and water. Some recipes also add calamansi juice or evaporated or condensed milk. However, if it is made with milk, it must be consumed immediately, as proteolytic enzymes in the cantaloupe will break down the milk proteins and turn", "thickly insulated chest. Commercial The most common use of dry ice is to preserve food, using non-cyclic refrigeration.\nIt is frequently used to package items that must remain cold or frozen, such as ice cream or biological samples, without the use of mechanical cooling.\nDry ice can be used to flash-freeze food or laboratory biological samples, carbonate beverages, make ice cream, solidify oil spills and stop ice sculptures and ice walls from melting.\nDry ice can be used to arrest and prevent insect activity in closed containers of grains and grain products, as it displaces oxygen, but does not alter the taste" ]
Chromosome 2 and Reproduction
[ "other humans with trisomy mutations can sometimes still reproduce so I don't really see why this would be a problem and likely we just got lucky enough for the trisomy to be mirrored in possibly a sibling on sibling relationship due to the higher chance of both parents having the same mutation. From there the extra chromosome just stuck around because it had a pair. I don't really know, but it's plausible enough, from my understanding, that the initial macro-genetic impacts of the extra weren't significant enough to impact reproductive viability in a natural setting." ]
[ "Sexual reproduction Sexual reproduction is a type of life cycle where generations alternate between cells with a single set of chromosomes (haploid) and cells with a double set of chromosomes (diploid). Sexual reproduction is by far the most common life cycle in eukaryotes, for example animals and plants.\nDiploid cells divide into haploid cells in a process called meiosis. Two haploid cells combine into one diploid cell in a process called fertilisation. Between fertilisation and meiosis there can be multiple cell divisions without change of the number of chromosomes.\nFertilisation creates a single-celled zygote which includes genetic material from both gametes. In", "used to describe reproduction modes in hermaphroditic species which can self-fertilize. Sexual Sexual reproduction is a biological process that creates a new organism by combining the genetic material of two organisms in a process that starts with meiosis, a specialized type of cell division. Each of two parent organisms contributes half of the offspring's genetic makeup by creating haploid gametes. Most organisms form two different types of gametes. In these anisogamous species, the two sexes are referred to as male (producing sperm or microspores) and female (producing ova or megaspores). In isogamous species, the gametes are similar or identical in", "it is also possible to see condensed chromosomes. Life History Euglenoids have not been observed to undergo sexual reproduction; however, asexual reproduction does occur through mitosis followed by cytokinesis. The formation of the lorica after asexual reproduction first occurs through the external skin and then a fibrillar layer is formed between the cell surface and the skin. Then manganese and ferric hydroxide compounds are precipitated on the inner fibrillar layer to produce a thick envelope and the original external skin is lost. However, differences in these processes exist among species.", "such as the Komodo dragon, reproduces parthenogenetically, usually only males are produced. This is due to the fact that the haploid eggs double their chromosomes, resulting in ZZ or WW. The ZZ become males, but the WW are not viable and are not brought to term. UV sex chromosomes In some Bryophyte and some algae species, the gametophyte stage of the life cycle, rather than being hermaphrodite, occurs as separate male or female individuals that produce male and female gametes respectively. When meiosis occurs in the sporophyte generation of the life cycle, the sex chromosomes known as U and V", "Reproduction Reproduction (or procreation or breeding) is the biological process by which new individual organisms – \"offspring\" – are produced from their \"parents\". Reproduction is a fundamental feature of all known life; each individual organism exists as the result of reproduction. There are two forms of reproduction: asexual and sexual.\nIn asexual reproduction, an organism can reproduce without the involvement of another organism. Asexual reproduction is not limited to single-celled organisms. The cloning of an organism is a form of asexual reproduction. By asexual reproduction, an organism creates a genetically similar or identical copy of itself. The evolution of sexual reproduction", "these \"books\", called chromosomes. Human gametes usually have 23 chromosomes, 22 of which are common to both sexes. The final chromosomes in the two human gametes are called sex chromosomes because of their role in sex determination. Ova always have the same sex chromosome, labelled X. About half of spermatozoa also have this same X chromosome, the rest have a Y-chromosome. At fertilization the gametes fuse to form a cell, usually with 46 chromosomes, and either XX female or XY male, depending on whether the sperm carried an X or a Y chromosome. Some of the other possibilities are listed", "involve sexual intercourse over several days, after which each mate returns to its solitary lifestyle. Gestation lasts between 40 and 60 days and one or two offspring are born. The young are born in a highly developed state and are weaned by their mothers after 15–25 days; the young reach full sexual maturity close to 50 days after birth.", "homothallic species can mate, and sexually reproduce, with any other individual or itself.\nMost fungi have both a haploid and a diploid stage in their life cycles. In sexually reproducing fungi, compatible individuals may combine by fusing their hyphae together into an interconnected network; this process, anastomosis, is required for the initiation of the sexual cycle. Many ascomycetes and basidiomycetes go through a dikaryotic stage, in which the nuclei inherited from the two parents do not combine immediately after cell fusion, but remain separate in the hyphal cells (see heterokaryosis).\nIn ascomycetes, dikaryotic hyphae of the hymenium (the spore-bearing tissue layer) form", "as those who reproduce sexually, their eggs took longer to hatch. Eggs from parthenogenic females took between 21–23 weeks, while eggs from mated females took between 9–16 weeks. Females from parthenogenetic populations show a barrier to fertilization in captivity when provided with mates, however, males cannot distinguish between sexual and parthenogenetic females. However, two wild populations in New Zealand have reverted to sexual reproduction very recently. Phylogeography With the exception of the West Coast of the South Island, the current distribution of Clitarchus hookeri is widespread on both the North and South Islands of New Zealand. It is thought that", "chromosomes in the vegetative (growing, nonreproductive) stage of life, whereas fungi are almost always haploid in this stage. Biochemical pathways also differ, notably the highly conserved lysine synthesis path. Biology Phytophthora species may reproduce sexually or asexually. In many species, sexual structures have never been observed, or have only been observed in laboratory matings. In homothallic species, sexual structures occur in single culture. Heterothallic species have mating strains, designated as A1 and A2. When mated, antheridia introduce gametes into oogonia, either by the oogonium passing through the antheridium (amphigyny) or by the antheridium attaching to the proximal (lower) half", "splits to form four more cells). Reproduction is also regulated by planktonic food supply. A. stellifera can reproduce asexually by breaking apart into smaller parts and regrowing the missing limb. This explains why Asterina can be found living with less than five arms. Asterian sea stars also reproduce through dispersal of eggs. At the beginning of reproduction, many starfish belonging to the asteroid species form aggregations, nothing has been researched for A. stellifera but it can be assumed they would also mate like this. It is known that other Asterina species deposit up to 1000 eggs in a specific location", "chromosome number arose is a matter of some uncertainty, but two major scientific theories have been proposed. One is that two ancestor species, one with n = 6 and one with n = 8 chromosomes hybridized, resulting in a n = 7 hybrid. The hybrid then, by allopolyploidy doubled its chromosome number spontaneously, leading to the resultant and extant 2n = 14 species. Alternatively, the modern chromosome number could have arisen from an ancestor like Anisocarpus scabridus, with a chromosome complement of n = 7, and then arisen by autopolyploidy, instead of needing to first hybridize.", "Chlorophyceae Reproduction Vegetative reproduction usually takes place by fragmentation. Asexual reproduction is by flagellated zoospores. And haplospore, perrination (akinate and palmellastage). Asexual reproduction by mytospore absent in spyrogyra.\nSexual reproduction shows considerable variation in the type and formation of sex cells and it may be isogamous e.g. Chlamydomonas, Spirogyra. anisogamous e.g. Chlamydomonas, Ulothrix or Oogamous e.g. Chlamydomonas, Volvox. Chlamydomonas has all three types of sexual reproduction.\nThey share many similarities with the higher plants, including the presence of asymmetrical flagellated cells, the breakdown of the nuclear envelope at mitosis, and the presence of phytochromes, flavonoids, and the chemical precursors to the cuticle.\nthe", "they are oviparous, although little is known about their reproduction. Based on captive observations a pair will mate repeatedly over a period of a few months, with each session lasting for hours. In one case, a single mating lasted 44 hours. They mate in the water. In the wild mating has been seen in February, and a female caught in April was likely gravid. The 2–12 (average 8) oval eggs measure about 3 cm (1.2 in) long and have a leathery white shell. They are deposited on land. In captivity the eggs hatch after about three months at a temperature of 27 °C", "yeasts) and jellyfish, may also reproduce sexually. For instance, most plants are capable of vegetative reproduction—reproduction without seeds or spores—but can also reproduce sexually. Likewise, bacteria may exchange genetic information by conjugation.\nOther ways of asexual reproduction include parthenogenesis, fragmentation and spore formation that involves only mitosis. Parthenogenesis is the growth and development of embryo or seed without fertilization by a male. Parthenogenesis occurs naturally in some species, including lower plants (where it is called apomixis), invertebrates (e.g. water fleas, aphids, some bees and parasitic wasps), and vertebrates (e.g. some\nreptiles, fish, and, very rarely, birds and sharks). It is sometimes also", "has both sexual and asexual generations in its life cycle. It also alternates hosts at different times of year. The primary host plants are woody shrubs, and eggs are laid on these by winged females in the autumn. The adults then die and the eggs overwinter. The aphids that hatch from these eggs in the spring are wingless females known as stem mothers. These are able to reproduce asexually, giving birth to live offspring, nymphs, through parthenogenesis. The lifespan of a parthenogenetic female is about 50 days and during this period, each can produce as many as 30 young. The", "of sex chromosomes in each cell. Males have one Y chromosome and one X chromosome, while females have two X chromosomes. In mammals, the Y chromosome contains a gene, SRY, which triggers embryonic development as a male. The Y chromosomes of humans and other mammals also contain other genes needed for normal sperm production.\nThere are exceptions, however. Among humans, some men have two Xs and a Y (\"XXY\", see Klinefelter syndrome), or one X and two Ys (see XYY syndrome), and some women have three Xs or a single X instead of a double X (\"X0\", see Turner syndrome). ", "sexual reproduction, was also found in G. intestinalis. Other protists for which evidence of mating and sexual reproduction has recently been described are parasitic protozoa of the genus Leishmania, Trichomonas vaginalis, and acanthamoeba.\nProtists generally reproduce asexually under favorable environmental conditions, but tend to reproduce sexually under stressful conditions, such as starvation or heat shock. Viruses Both animal viruses and bacterial viruses (bacteriophage) are able to undergo mating. When a cell is mixedly infected by two genetically marked viruses, recombinant virus progeny are often observed indicating that mating interaction had occurred at the DNA level. Another manifestation of mating", "have been known to diet on the same vegetation with a little variety, fruits, eggs, and young birds. Reproduction The exact nature of reproduction is still being studied, however, it is currently believed that they reproduce year round. This would imply that there is no breeding season and females are free to mate as they please. Reproduction is thought to occur slowly with a single new offspring thought to be born once a year. A young tree kangaroo is referred to as a joey as is the case with all kangaroos. The gestation period for this extract species is currently", "and alleles Most animals and some plants have paired chromosomes, and are described as diploid. They have two versions of each chromosome, one contributed by the mother's ovum, and the other by the father's sperm, known as gametes, described as haploid, and created through meiosis. These gametes then fuse during fertilization during sexual reproduction, into a new single cell zygote, which divides multiple times, resulting in a new organism with the same number of pairs of chromosomes in each (non-gamete) cell as its parents.\nEach chromosome of a matching (homologous) pair is structurally similar to the other, and has a very", "Sexual maturity Sexual maturity is the capability of an organism to reproduce. It may be considered synonymous with adulthood, but, in humans, puberty encompasses the process of sexual maturation and adulthood is based on cultural definitions. \nMost multicellular organisms are unable to sexually reproduce at birth (or germination), and depending on the species, it may be days, weeks, or years until their bodies are able to do so. Also, certain cues may cause the organism to become sexually mature. They may be external, such as drought, or internal, such as percentage of body fat (such internal cues are not to", "two distinct sex chromosomes, the X chromosome and the Y chromosome. A diploid human cell has 23 chromosomes from that person's father and 23 from the mother. That is, your body has two copies of human chromosome number 2, one from each of your parents.\nImmediately after DNA replication a human cell will have 46 \"double chromosomes\". In each double chromosome there are two copies of that chromosome's DNA molecule. During mitosis the double chromosomes are split to produce 92 \"single chromosomes\", half of which go into each daughter cell. During meiosis, there are two chromosome separation steps which assure that", "Hermaphrodite species include the common earthworm and certain species of snails. A few species of fish, reptiles, and insects reproduce by parthenogenesis and are female altogether. There are some reptiles, such as the boa constrictor and Komodo dragon that can reproduce both sexually and asexually, depending on whether a mate is available.\nOther unusual systems include those of the swordtail fish; the Chironomus midges; the platypus, which has 10 sex chromosomes but lacks the mammalian sex-determining gene SRY, meaning that the process of sex determination in the platypus remains unknown; the juvenile hermaphroditism of zebrafish, with an unknown trigger; and the", "or have other intersex/hermaphroditic qualities, though one would still be considered genotypically (if not necessarily phenotypically) male so long as one has a Y-chromosome. During reproduction, a male can give either an X sperm or a Y sperm, while a female can only give an X egg. A Y sperm and an X egg produce a male, while an X sperm and an X egg produce a female.\nThe part of the Y-chromosome which is responsible for maleness is the sex-determining region of the Y-chromosome, the SRY. The SRY activates Sox9, which forms feedforward loops with FGF9 and PGD2 in the", "a mate. They are monogamous, and most couples stay together all of their lives. If one dies, the other may find a new mate. The female lays from two to nine eggs with an average of five, and both parents protect the nest while the eggs incubate, but the female spends more time at the nest than the male.\nIts nest is usually located in an elevated area near water such as streams, lakes, ponds, and sometimes on a beaver lodge. Its eggs are laid in a shallow depression lined with plant material and down.\nThe incubation period, in which the female", "including both sexual and asexual reproduction. In asexual reproduction the generation of new organisms does not require the fusion sperm with an egg. However, in sexual reproduction new organisms are formed by the fusion of haploid sperm and eggs resulting in what is known as the zygote. Although animals exhibit both sexual and asexual reproduction the vast majority of animals reproduce by sexual reproduction. Gametogenesis Gametogenesis is the formation of gametes, or reproductive cells. Spermatogenesis Spermatogenesis is the production of sperm cells in the testis. In mature testes primordial germ cells divide mitotically to form the spermatogonia, which in turn", "reproduce sexually and asexually. Reproduction also allows coral to settle in new areas. Reproduction is coordinated by chemical communication. Sexual Corals predominantly reproduce sexually. About 25% of hermatypic corals (stony corals) form single sex (gonochoristic) colonies, while the rest are hermaphroditic. Broadcasters About 75% of all hermatypic corals \"broadcast spawn\" by releasing gametes—eggs and sperm—into the water to spread offspring. The gametes fuse during fertilization to form a microscopic larva called a planula, typically pink and elliptical in shape. A typical coral colony forms several thousand larvae per year to overcome the odds against formation of a new colony.\nSynchronous spawning", "of the species reach sexual maturity after one year of life. The breeding season occurs in the spring and early summer. The males arrive before the beginning of the season to establish their territories. The males use a series of courtship displays to attract the females to their sites. They run around the area either to showcase their territory to the females or to pursue the females. The males also engage in flight to showcase their wings. They sing and call as they perform all of these displays. The species can remain monogamous for many years, but incidents of polygyny", "Marchantia Reproduction Marchantia can reproduce both sexually and asexually. Sexual reproduction involves sperm from antheridia on the male plant fertilizing an ovum (egg cell) in the archegonium of a female plant. The antheridia and archegonia are borne atop special gametophore stalks called antheridiophores and archegoniophores, respectively. These are borne on separate thalli; hence, the plants are dioicous.\nOnce fertilized, the ovum is called a zygote and develops into a small sporophyte plant, which remains attached to the larger gametophyte plant. The sporophyte produces spores which develop into free-living male and female gametophyte plants.\nAsexual reproduction occurs by means of gemmae, discoid", "Age at first reproduction in the Mediterranean, Oman, Japan, and Brazil are unknown. Nesting loggerheads have a straight carapace length of 70–109 cm (28–43 in). Because of the large range, carapace length is not a reliable indicator of sexual maturity. Their estimated maximum lifespan is 47–67 years in the wild. Reproduction Female loggerheads first reproduce between the ages of 17 and 33, and their mating period may last more than six weeks. They court their mates, but these behaviors have not been thoroughly examined. Male forms of courtship behavior include nuzzling, biting, and head and flipper movements. Studies suggest females produce cloacal" ]
On what grounds can a gaming company sue an individual for creating gameplay hacks? (Aimbots, etc?)
[ "When you pay for software, you're not actually buying it- you're buying a *license* for the right to use the copy that you have.\n\nThis may seem like a minor difference, but legally this allows the owner of the software to determine *how* you're allowed to use it.\n\nThe details of licensing are found in the EULA, which most people don't read. In practice it rarely crops up, but it gives the software company leverage in their back pocket if they ever need it. Included in the license agreements may be the right to revoke access without notification, the right to collect information about your usage of the software, & c.\n\n_URL_0_" ]
[ "work with the developer and have confidence in a new build.\" A user also proved that ban appeals were not looked over; instead, copy and paste responses were issued stating \"We have evidence that you have used multiple hacks. Your ban appeal has been denied.\" The developers have also been accused of bullying and bribing people who complain about the game. Valve allowed users to submit a ticket for a refund if they weren't satisfied with the game.\nOn April 2, 2013, OP Productions announced that The War Z game and forums had been taken offline as \"hackers gained access", "Hackers (video game) Story Hackers takes place in an alternate reality, where a piece of software (codenamed Ergo) was designed to make hacking into systems easier. The software has been made available to the public, so that anyone and everyone can get into hacking. But unlike real-world hacking which consists of command line usage and programming, this alternate reality puts systems and the hacking process into a GUI (Graphical User Interface) to make things easier to try and hack other people.\nThe game starts you out performing simple hacks with a recently met acquaintance called \"Marty\". As the game progresses you", "and some vendors have challenged hackers to attack their products.", "with physical destruction, clandestine operations, hostile extraction or elimination of vital personnel, and other means of sabotage. Because no corporation wants to be held liable for damages, it has to be done by hireed deniable assets, or \"shadowrunners\", invisible to the system where every citizen is tagged with a System Identification Number (SIN). Technology and the Matrix Despite the Crash which caused much data corruption, technology in the game is advanced. Ability-enhancing Cyberware (artificial cybernetic implants) and Bioware (genetically engineered biological implants) emerged and has become commonplace. Characters can also augment their bodies with nanotechnology implants.\nIn earlier editions of the", "forward to pass laws that help enforce socially acceptable conduct and thereby minimize undue losses to developers.\nCheating thus negatively affect both developers and users alike, as unfair exploitation which ultimately lowers the value of both purchase and product. Thereby warranting action as to protect the whole of the industry.\nCriticism of this policy shifts the responsibility of anti-cheat policing to developers themselves. However, the Indie sector is especially vulnerable and often has limited resources with which to combat the trend.\nHistorically, some game companies have also filed suit against individuals or commercial entities that have created and sold cheating tools in video", "Malicious (video game) Gameplay The game is meant to offer a simple play experience. The main goal is to defeat a dangerous group of enemies known as the Keepers, and a great evil entity called the Malicious. There is no actual stage progression in Malicious. Instead, all stages start the player directly in fights against a boss and their subordinates.\nThe player makes use of a special black mantle that hangs from the main character's neck called the Mantle of Cinders (灰の外套 Hai no Gaitou). The mantle, created using technology from the great prophets, changes into a variety of forms. As", "by hackers Job applications are known to be used by hackers to get employees to open attachments or links or connect USB sticks with malware. As companies typically have more financial resources than private individuals they are often a target of cyberextortion − so called ransomware. Ransomware such as \"Petya\" and \"GoldenEye\" were found to make use of job applications. Cyberespionage and attacks on critical infrastructure-related companies may be other reasons for such attacks and other than ransomware attacks may leave employees in the dark about their computer or network infection. The best method for mitigating such risks would be", "games, giving the players relative anonymity, and giving people an avenue to communicate cheats.\nExamples of cheats in first-person shooter games include the aimbot, which assists the player in aiming at the target, giving the user an unfair advantage, the wallhack, which allows a player to see through solid or opaque objects or manipulate or remove textures, and ESP, with which the information of other players is displayed. There are also cheats that increase the size of the enemies' hitbox which allows you to shoot next to the enemy, which would usually result in a miss, but the game would detect", "be tolerated and seen as a necessary compromise in many situations. Some argue that it should not be, due to this negative meaning; others argue that some kludges can, for all their ugliness and imperfection, still have \"hack value\".\nIn non-software engineering, the culture is less tolerant of unmaintainable solutions, even when intended to be temporary, and describing someone as a \"hacker\" might imply that they lack professionalism. In this sense, the term has no real positive connotations, except for the idea that the hacker is capable of doing modifications that allow a system to work in the short term, and", "manipulate every mobile phone featured in the game, disrupt traffic by hacking cars and traffic lights, hack into monitoring cameras, and carry out \"mass hacking\", which hacks the electrical equipment of a large group of people. The player can also gain multiple options while hacking the same object. For instance, if the player attempts to hack a car, they can gain direct control over them, or have the car lose control and crash in a random direction. If the player hacks a junction box, they can choose whether they should deactivate it or turn it into a proximity mine. Unlike", "agreement several times, adding explicit restrictions, apparently in response to hacker activity. Hackers argued that the changes did not apply retroactively to devices that had been purchased under older versions of the license, and that the thousands of users who received unsolicited CueCats in the mail had neither agreed to nor were legally bound by the license.\nNo lawsuit was ever brought against \"hackers,\" as this tactic was not employed to go after specific users or the hacker community, but to show \"reasonable assertion\" that would prevent a corporation from developing integrated software within an operating system or browser which could", "could be used as a dangerous weapon. He was wearing a pair when he repeatedly stomped the face of a john who was trying to leave a Portland hotel without paying Clardy's prostitute in June 2012. According to The Oregonian, this lawsuit gained \"considerable attention across the nation and the world.\" Romine v. Stanton In March 2016, James Romine, an independent video game developer who founded Digital Homicide Studios sued video game critic Jim Sterling (James Stanton) for criticizing the games published under his studios' name, seeking $10 million in damages for \"assault, libel, and slander\" to Romine's business. He", "making \"defective\" products (the defects alleged were violent features and lack of warnings) and violation of RICO, the Racketeer Influenced and Corrupt Organizations Act, for distributing this material to minors. Said Thompson, \"We intend to hurt Hollywood. We intend to hurt the video game industry. We intend to hurt the sex porn sites.\"\nThe suit was filed in federal district court and was dismissed for failing to present a legally recognizable claim. The court concluded that Carneal's actions were not reasonably foreseeable by the defendants and that, in any case, his actions superseded those of the defendants, so the latter could", "to send a numerous amount of bogus infringement claims, inundating the defendant and forcing them to pay up to $30,000. This same principle makes large-scale companies basically immune to the law, since they have the money to pay for, and defend themselves, while most lone artists and creators do not.", "are introduced to other characters representing various factions such as StormCorp, MIRAGE, Cyber Alliance, Eastern Coalition and DejaVu. During the course of the story you get to experience various security, activist and terrorist missions that test your skills as a hacker. Development The game was developed in-house by Trickster Arts. The game was developed in Unity Engine. Development was started in Summer 2014. While working on Hero of Many the developers started working in parallel on another project. This project was cancelled for design reasons and Hackers was created from old gaming design notes out of the desire to keep", "who are not in the player's direct line of sight; the Pickpocket owns a coin-collecting monkey; the Mole can dig through walls and open vents quickly; the Gentleman has the ability to temporarily change his appearance, making the player less detectable to enemies; the Redhead can charm enemies into not attacking and making characters follow her; and the Hacker has the ability to upload computer viruses to security systems, shutting them off temporarily.\nMany in-game items, including smoke bombs and C4 explosives, as well as firearms including a shotgun and machine gun, can be picked up. The quantity of the gun's", "as Aimbot in shooting games. This is also known as \"hacking\" or \"glitching\". Cheating in video games is often done via a third party program which modifies the game's code at runtime to give one or more players an advantage. In other situations, it is frequently done by changing the games files to change the game's mechanics.", "Trademark infringement Defenses The party accused of infringement may be able to defeat infringement proceedings if it can establish a valid exception (e.g., comparative advertising) or defence (e.g., laches) to infringement, or attack and cancel the underlying registration (e.g., for non-use) upon which the proceedings are based. Other defenses include genericness, functionality, abandonment, or fair use. Globally The ACTA trade agreement, signed in May 2011 by the United States, Japan, Switzerland, and the EU, requires that its parties add criminal penalties, including incarceration and fines, for copyright and trademark infringement, and obligated the parties to actively police for infringement.\nIn many", "spoof his or her MAC address to gain access to the ISP. Hackers can gain unauthorized access to the ISP via the same technique. This allows hackers to gain access to unauthorized services, and the hacker will be hard to identify because the hacker uses the client's identity. This action is considered an illegitimate use of MAC spoofing and illegal as well. However, it is very hard to track hackers that are utilizing MAC spoofing.\nThis also applies to customer-premises equipment, such as cable and DSL modems. In cases where the provider leases the equipment to the customer on", "that appeared to be a game, but proved to have more a more \"nefarious purpose\". However, they recognized there would be too much jarring between the live-action and in-game segments, and instead took a different route, by envisioning how a member of the hacker culture would interact. The viewer of the work would be put in place of a hacker, looking at the hacker's computer monitor, showing various streams from cameras, video calls, and other audiovisual elements that they could bring anyone to the forefront at any time. Rather than having the viewer make any explicit decision, the work would", "software vendors, both of which appeared to be vulnerable to bugs of a similar nature. These bugs allowed a malicious hacker to glean information on employees relating to the affected companies, such as the name, email, and employee ID of the chat agent, alongside other information such as the backend systems in use, allowing a malicious hacker to potentially gain a foothold within these networks. Some of the affected companies included Google, PayPal, Bank of America, Verizon, Sony, Tesla, Orange, Kaspersky, BitDefender, AT&T, and many other large corporations\n. One of the founders of this exploit was Kane Gamble, who was", "a different set of abilities; in addition to the player's hacker with their Deck, another character will have a saw to break through doors, while another will be able to climb and move quickly through levels. The player will experience what the agents would see through virtual reality goggles that relay what they see to the hacker character. When the agents encounter locked doors, cameras, and other security features, the player, as the hacker, will have to create a program – typing this as code on their physical keyboards – that manipulates the security features without setting off additional alarms", "display drivers in 2001 that enabled players to use wallhacks, announcing the settings as \"special weapons\" that users could employ in multiplayer games. In a poll by the Online Gamers Association, 90% of its members were against the release of the drivers. Removal of game elements Removals allow the cheater to remove a game's inhibitors or annoyances. These include gun recoil, bullet spread, and obfuscating visual effects. Such removals can significantly decrease a user's skill requirement levels. Boosting / Win trading Players will set up multiple accounts and play one against the other. Usually, the primary account will get an", "through doxing, they may be targeted for harassment through methods such as harassment in person, fake signups for mail and pizza deliveries, or through swatting (dispatching armed police to their house through spoofed tips).\nA hacker may obtain an individual's dox without making the information public. A hacker may look for this information in order to extort or coerce a known or unknown target. Also, a hacker may harvest a victim's information in order to break into their Internet accounts, or to take over their social media accounts.\nThe victim may also be shown their details as proof that they have been", "not shown their use of the trademarks to \"legitimately extend beyond trolling various gaming-related industries for licensing opportunities.\"\nEA and Edge Games reached a settlement in early October, where Edge Games would surrender the trademarks \"edge\" (registered twice), \"cutting edge\", \"the edge\", and \"gamer's edge\". No damages were awarded to EA or Edge Games, and each would pay their own legal fees. The settlement stipulated that neither party admitted fault or wrongdoing and that no party was found guilty of wrongdoing. On October 10, 2010, it was reported that the settlement had been approved by the judge, and a final order", "also causes many problems for websites which record IP addresses to ban and/or track users. This means that if a website bans one offender, it bans everyone in the same area. Also, many on-line games automatically ban IP addresses with multiple usernames associated with them. Small-scale games do not cause too many problems, but when friends attempt to spread the game around, the system prevents everyone (including the original player) from using the game.\nOn the other hand, advanced users can easily create a large number of illegitimate accounts on the aforementioned websites, allowing one user both to prevent all other", "games as a means to curb their use. In April 2013, coder DrUnKeN ChEeTaH was sued by Nexon America for operating GameAnarchy, a popular subscription based cheat provider for Combat Arms, and lost, Nexon being awarded $1.4M in damages. In January 2017, Riot Games successfully sued the LeagueSharp service, which offered a subscription-based hacking service for Riot's League of Legends, with a $10 million award to be paid to Riot. Blizzard Entertainment sued Bossland GMBH for distributing software hacks for several of its games, and was awarded $8.5 million in damages.", "companies regain access to their stolen data or hijacked servers, by using Spybots. This was done by fighting \"data battles\", which were essentially strategic turn-based games where the player would use their software programs to eliminate enemy software. During such battles, credits could be earned, with which the player could buy aforementioned software programs. The goal of the game was to win all data battles, of which each would be fought in a different \"node\" in the network, and eventually to defeat the rogue ex-S.M.A.R.T-agent Disarray, who appears to be the one who caused Nightfall (the crashing of the network,", "compared to the relatively simple methods listed above, anything is possible with ASM hacking (of course, within the limits of the hardware/software of the gaming platform), ranging from altering enemy AI to changing how graphics are generated. (Of course, the possibilities are still limited by the hacker's ability to comprehend and modify the existing code.)\nIf the developers used a typed language, the hacker may be able to compile their own code for the game in the same language if they have access to a proper compiler. One such example would be using C to hack Nintendo 64 games, since MIPS-GCC", "direct termination without warning. In the 3D immersive world Second Life where a breach of contract will append the player warnings, suspension and termination depending on the offense.\nWhere online games supports an in-game chat feature, it is not uncommon to encounter hate speech, sexual harassment and cyberbullying. Players, developers, gaming companies, and professional observers are discussing and developing tools which discourage antisocial behavior.\nThere are also sometimes Moderators present, who attempt to prevent anti-Social behavior.\nRecent development of gaming governance requires all video games (including online games) to hold a rating label. The voluntary rating system was established by the Entertainment Software" ]
Why does my nose get runny when I eat/drink something hot.
[ "Spicy foods irritate the mucus membranes in your head and lungs. Your body reacts to this by making you create mucus, to coat and protect you from whatever may be causing the irritation. You also tear to protect your eyes, which drains into your nose, exacerbating your snot nose. \n\nYou can also sweat because your body thinks it's overheating, and is trying to cool itself down. \n\n\nI always put some hot sauce on my food and over time you gain a sort of resistance. Can be a fun way to win bets." ]
[ "Dried nasal mucus Dried nasal mucus, colloquially known as a boogie, booger or bogey, is found in the nose. It is a result of drying of the normally viscous colloidal mucus, commonly known as snot. Eating Stefan Gates in his book Gastronaut discusses eating dried nasal mucus, and says that 44% of people he questioned said they had eaten their own dried nasal mucus in adulthood and said they liked it. As mucus filters airborne contaminants, eating it could be thought to be unhealthy; Gates comments that \"our body has been built to consume snot\", because the nasal mucus", "I laid down there.\nHe shot two girls in the stomach right behind me, thirty feet away from me. And they were lying there in the grass, screaming, begging, pleading for help, trying to crawl along. One girl's legs wouldn't work. The other one was vomiting pieces of herself out of her mouth. And I could smell the blood and the odor of their stomachs, what was in their stomachs and their colons. The smell was horrible coming out of these poor kids, two young coeds. And he did that to get me and this other guy who", "which is why spicy foods cause nasal drip. The zygomatic sends signals to the lacrimal nerve that activate the lacrimal gland; which is the reason that spicy foods can cause tears. Both the lesser palatine and the zygomatic are maxillary nerves (from the trigeminal nerve).\nThe special visceral afferents of the vagus nerve carry taste from the epiglottal region of the tongue.\nThe lingual nerve (trigeminal, not shown in diagram) is deeply interconnected with chorda tympani in that it provides all other sensory info from the ⅔ of the tongue. This info is processed separately (nearby) in rostal lateral subdivision of nucleus", "Sniffle A sniffle is the reflex action of inhaling quickly to prevent mucus from flowing from one's nose, as an alternative to blowing the nose. Physiology For a fraction of a second, the performer inhales strongly, pulling mucus from the outer part of the nasal cavity higher up, even into the sinus. This action is generally repeated every few seconds or minutes.\nSniffling and runny nose need not come associated with sneezing or coughing. \nSniffling is not necessarily related to illness. In addition to allergies and colds, it can be a result of being in cold temperatures, as a way to", "sinus cavities to warm up the air a takin inhales before it gets to the lungs. Without this adaptation, takins would lose a large amount of body heat just by breathing. Yet another protection is their oily skin. Although they have no skin glands, their skin secretes an oily, bitter-tasting substance that acts as a natural raincoat in storms and fog. Streaks of this oily stuff can be seen where takins rub. They also have an odor that smells like a combination of horse and musk.\nTakins eat in the early morning and again in the late afternoon, and they rest", "many cultures, blowing one's nose in public is considered impolite, and in reaction, people can make a habit of sniffling.\n\"The sniffles\" can also refer by metonymy to the common cold, though colds often do not result in sniffles and sniffles often are not caused by colds.", "is harmful if swallowed and has an unpleasant odor at even extremely low concentrations. Its ignition temperature is 205 °C.", "are most often eaten as fillets or steaks. Larger species, such as the great barracuda, have been implicated in cases of ciguatera food poisoning. Those who have been diagnosed with this type of food poisoning display symptoms of gastrointestinal discomfort, limb weakness, and an inability to differentiate hot from cold effectively.\nWest Africans smoke them for use in soups and sauces. Smoking protects the soft flesh from disintegrating in the broth and gives it a smoky flavour.", "goes over to get a bottle of perfume and sprays it over himself and Pepé. Unable to stand the smell of perfume, Pepé runs off outside, jumps into the icy water and returns to thaw himself out in the fireplace, at which point he catches a cold himself. The pair finally agree to live with the colds and each other since neither can get rid of the other, and as they sneeze, they both say \"Gesundheit!\".", "challenge often results in considerable irritation, discomfort, burning, or itching of the affected nasal tissue and nostrils. On YouTube, people have been seen \"coughing, choking and lunging for water, usually as friends watch and laugh.\" Vomiting is also known to have occurred.\nThe risks can be worse, even fatal. In the first three months of 2012, American poison control centers had received over a hundred phone calls as a result of the cinnamon challenge. A high-school student in Michigan spent four days in a hospital after attempting the cinnamon challenge. Pneumonia, inflammation and scarring of the lungs, and collapsed lungs", "strong smell, similar to many cleaning products. It is often served in cubes on toothpicks. Those new to it may gag involuntarily on the first attempt to eat it because of the high ammonia content. First-timers are sometimes advised to pinch their nose while taking the first bite, as the smell is much stronger than the taste. It is often eaten with a shot of the local spirit, a type of akvavit called brennivín. \nIt comes in two varieties; chewy and reddish glerhákarl (lit. \"glassy shark\") from the belly, and white and soft skyrhákarl (lit. \"skyr shark\") from the body.", "risk of people gagging on cinnamon inhaled into the lungs. In July 2015 a four-year-old boy died of asphyxiation after ingesting cinnamon.\nIn 2017, a challenge regarding the consumption of Tide Pods began.", "yourself clean.”\nA reporter for Reuters described its effect in the following words:\nImagine taking a chunk of rotting corpse from a stagnant sewer, placing it in a blender and spraying the filthy liquid in your face. Your gag reflex goes off the charts and you can't escape, because the nauseating stench persists for days.\nHowever, when tested in India, the product failed miserably:\nWe used it on a captive crowd consisting of CRPF personnel and general public. But they managed to tolerate the smell without much difficulty. [...] Those who can ignore [the] smell can drink the liquid also. \nIn December 2017, Haaretz", "series of short, quick sniffs versus one long inhale will also maximize the likelihood of aromatics being detected. The human nose starts to \"fatigue\" after around six seconds and so a pause may be needed between sniffs.\nWhen wine is sipped, it is warmed in the mouth and mixes with saliva to vaporize the volatile aroma compounds. These compounds are then inhaled \"retro-nasally\" through the back of the mouth to where it is received by nearly five million nerve cells. The average human can be trained to distinguish thousands of smells but can usually only name a handful at a time", "After smelling smoke again, Frazer looks over the fence and spots Stonie smoking. After a mishap where Charlie Hoyland accidentally discovers the dope, Stonie then comes clean to Toadie and Charlie's mother, Steph and explains he is depressed because he and Chantelle were trying for a baby and they are not having much luck. Chantelle comes to Ramsay Street to sort her husband out. Stonie announces he is giving up marijuana. However, just as he is about to throw the rest in the bin, he holds onto it. Chantelle gives him an ultimatum: her or the marijuana. Stonie chooses", "in fresh urine of healthy individuals; its presence may be a sign of a urinary tract infection.\nThe odor of normal human urine can reflect what has been consumed or specific diseases. For example, an individual with diabetes mellitus may present a sweetened urine odor. This can be due to kidney diseases as well, such as kidney stones.\nEating asparagus can cause a strong odor reminiscent of the vegetable caused by the body's breakdown of asparagusic acid. Likewise consumption of saffron, alcohol, coffee, tuna fish, and onion can result in telltale scents. Particularly spicy foods can have a similar effect, as their", "eye or a wound) produce a similar sensation of heat when exposed to hotness agents. Asian countries within the sphere of, mainly, Chinese, Indian, and Japanese cultural influence, often wrote of pungency as a fifth or sixth taste. Coolness Some substances activate cold trigeminal receptors even when not at low temperatures. This \"fresh\" or \"minty\" sensation can be tasted in peppermint, spearmint, menthol, anethol, ethanol, and camphor. Caused by activation of the same mechanism that signals cold, TRPM8 ion channels on nerve cells, unlike the actual change in temperature described for sugar substitutes, this coolness is only a perceived", "skin, mouth, tongue, and throat, and result in swelling of throat, difficulty breathing, burning pain, and upset stomach. However, their acrid taste, coupled with the almost immediate tingling sensation in the mouth when consumed, means that large amounts are rarely taken and serious harm is unusual. It is one of the most common causes of accidental plant poisoning based on attendance at hospital emergency departments.\nThe root-tuber may be very big and is used to store starch. In mature specimens, the tuber may be as much as 400 mm below ground level.\nAll parts of the plant can produce allergic reactions in many", "the nose; texture, detected through a variety of mechanoreceptors, muscle nerves, etc.; temperature, detected by thermoreceptors; and \"coolness\" (such as of menthol) and \"hotness\" (pungency), through chemesthesis.\nAs taste senses both harmful and beneficial things, all basic tastes are classified as either aversive or appetitive, depending upon the effect the things they sense have on our bodies. Sweetness helps to identify energy-rich foods, while bitterness serves as a warning sign of poisons.\nAmong humans, taste perception begins to fade around 50 years of age because of loss of tongue papillae and a general decrease in saliva production. Humans can also have distortion", "has been a common superstition that a sneeze taking place before the start of any work was a sign of impending bad interruption. It was thus customary to pause in order to drink water or break any work rhythm before resuming the job at hand in order to prevent any misfortune from occurring.\nContrarily, in Polish culture, especially in the Kresy Wschodnie borderlands, a popular belief persists that sneezes may be an inauspicious sign that one's mother-in-law speaks ill of their son-in-law at that moment. The same phenomenon is thought to correspond to daughters-in-law and their mothers-in-law. As with other Catholic", "Because of a lot of rain the village had been receiving, the restroom wasn’t cleaned recently due to “weather precautions”. As Huan entered the restroom he found that it reeked with awful smells and flies were everywhere in the room. This experience reminded him of his childhood and the small crowded, unclean restrooms he used when he was growing up. “Once I stepped in, I found myself surrounded by thousands of flies that seemed to have been disturbed by my appearance. I felt as if my body was being devoured by the flies.” This experience served as inspiration for the", "problem with a rumor that a man's head was blown off after covering his sneeze. To attract some girls, Greg had been trying some cherry lozenges due to their sweet smell. However, many other boys like the smell, with Speed Bump even lock-picking Greg's locker to get the lozenges. It gets windier when Greg and Rowley come back from school. They have been trying to find places to stay warm, but they didn't stay in those places for long. Rowley was nearly caught by some of the Lower Surrey Street kids before he and Greg managed to escape.\nGreg and some", "throughout the body and has a very healthy aroma, so that it is not noticed on the breath, or only a little; but the Median [Iranian] is weaker in power and has a nastier smell.\" Nevertheless, it could be substituted for silphium in cooking, which was fortunate, because a few decades after Dioscorides' time, the true silphium of Cyrene became extinct, and asafoetida became more popular amongst physicians, as well as cooks.\nAsafoetida is also mentioned numerous times in Jewish literature, such as the Mishnah. Maimonides also writes in the Mishneh Torah \"In the rainy season, one should eat warm food", "in 1963, by Austen Young, when both nostrils were closed. The patient had a chronic condition causing social ostracism due to the strong odour. Both nostrils were re-opened in 1965 and the patient has had no problem since then. However, the patient has no sense of smell and inhibited taste (i.e. cannot taste spices/herbs).", "That Fatal Sneeze Plot An uncle (Thurston Harris) decides to play a practical joke on his nephew (Gertie Potter) at dinner, adding large amounts of pepper to the nephew's food, prompting an uncontrollable outburst of sneezing. In revenge, the nephew puts pepper on several items in his uncle's bedroom, so that when the uncle gets dressed the following morning, the pepper causes a violent sneezing fit, which shakes the room and knocks over the bed.\nThe pepper continues to have an effect on the uncle during the day, as his sneezing causes damage to a few shops. The shopkeepers and other", "spiciness or hotness) Substances such as ethanol and capsaicin cause a burning sensation by inducing a trigeminal nerve reaction together with normal taste reception. The sensation of heat is caused by the food's activating nerves that express TRPV1 and TRPA1 receptors. Some such plant-derived compounds that provide this sensation are capsaicin from chili peppers, piperine from black pepper, gingerol from ginger root and allyl isothiocyanate from horseradish. The piquant (\"hot\" or \"spicy\") sensation provided by such foods and spices plays an important role in a diverse range of cuisines across the world—especially in equatorial and sub-tropical climates, such as Ethiopian,", "Season 2, Episode 2, Sybil calls Basil a \"Benzedrine puff adder\" in reaction to him fawning over the two Doctors who have just arrived, yet in contrast to him spitting bile at the 'low-class' playboy guest he despises. The full line she says is \"You never get it right, do you? You're either crawling all over them, licking their boots, or spitting poison at them like some Benzedrine puff adder.\" The particular irony of John Cleese and Connie Booth including this reference to Benzedrine in the script of this episode is notable as Psychiatrists once flirted with Benzedrine as a", "his hand. Their owner can’t have been much into baths because they smelled like something tepid from a canteen counter. Gust wrung them like the devil having a go at a set of wedding bells with all the grip he had, until the man was shrieking on the same D minor as the music. \n \n‘It’s nothing personal,’ said Gust, ‘but I’m afraid you’re going to have to learn to fuck all over again.’ He wiped the blood off the man's prick down his face, then pulled the face towards him and drove his nose into his brain with his", "increase warmness and dryness in the body and are the signs and also the cause of dry and warm Mizaj as someone with warm and dry Mizaj is more prone to get angry or excited. People who consume too much warm and dry food stuff might be affected by anger and excitement more often.\nTherefore, all lifestyle tips for warm and dry Mizaj (temperament) would apply to anger and excitement as two psychiatric conditions. Eating spicy, sweat, salty, deep fried and roasted food stuff especially in warm seasons would trigger anger and excitement.\nPleasure and worry are warm and wet while fear,", "Feces Characteristics The distinctive odor of feces is due to bacterial action. Gut flora produces compounds such as indole, skatole, and thiols (sulfur-containing compounds), as well as the inorganic gas hydrogen sulfide. These are the same compounds responsible for the odor of flatulence. Consumption of spicy foods may result in the spices being undigested and adding to the odor.\nThe perceived bad odor of feces has been hypothesized to be a deterrent for humans, as consuming or touching it may result in sickness or infection. Human perception of the odor may be contrasted by a non-human animal's perception of it; for" ]
Someone dies before they get a chance to retire. What happens to all of their social security benefits?
[ "US Social Security works less like a piggy bank, and more like a Ponzi Scheme (some critics would argue that it's *literally* a Ponzi scheme, although I think that goes a bit too far).\n\nUnlike most pension plans, citizens do not have individual \"Social security accounts\" which they pay into while they're working, and later withdraw from when they're retired. Instead, every currently working citizen pays into one big pool, which is used to support citizens who are currently retired. \n\nWhen a citizen retires, they're not supported by the money paid in by their *own* generation, but by the generations which are currently working. If a veteran police officer gets shot two days before his retirement, nothing special happens to \"his social security benefits\", because there was no specific package of benefits with his name on them yet. There is, however, a system of benefits for widows and orphans.\n\n[Ida May Fuller](_URL_0_) of Vermont, ~~Social Security Number 000-00-0001~~, began paying payroll taxes into the Social Security system in 1937. She retired in November 1939 (having paid money into the system for three years), and collected the very first monthly social security check in January 1940. She continued receiving benefits for 35 years, until her death at the age of 100.", "Immediate family of the deceased are eligible to receive the deceased benefits under certain situations, in part or full. Kids get less than spouses.\n\nWhen an unmarried, no kids, divorced, or already widowed person died, the payment liability disappears. The gov doesn't have to pay anyone.", "Social security isn't a personal bank account. There's no fixed total sum of money each person is entitled to. \n\nThere's a spousal benefit if the spouse survives. There's also a children's benefit with some limits. \n\nIf there's no spouse or qualifying children, there's nobody entitled to a benefit. So there's no benefit. Because it's not a personal bank account, there's no money that then has to get redirected somewhere else." ]
[ "Health Insurance died within 3 months of resignation, Employees' Health Insurance will pay for the funeral allowance, not NHI. Also, if the death was due to the act of a third party (such as a traffic accident) and their compensation is available, NHI will not provide the funeral allowance. Individual Medical Expense Reductions or Exemptions A portion of the cost of medical treatment must be paid by the NHI member. However, if their livelihood has been effected by a natural disaster, unemployment, or other difficulties, then reductions of or exemptions from paying their copayment are possible for a period of", "weeks, an employee who is insured in the statutory health insurance (Gesetzliche Krankenversicherung) receives about 70% of their last salary, paid by the insurance. According to § 48 SGB V (social code 5) the health insurance pays for a maximum of 78 weeks in case of a specific illness within a period of 3 years. In case another illness appears during the time when the employee is already on sick leave then the new diagnosed illness will have no effect on the maximum duration of the payment. Only if the patient returns to work and falls sick again with a", "of pension or income they receive, upon marriage and request of the daughters, whose income or pensions should be terminated due to marriage.\" Funeral Benefit Funeral benefit \"shall be payable to the right holders of the insurance holder who deceased when receiving permanent incapacity income due to work accident or occupational disease, invalidity, duty disability or old-age pension or when minimum 360 days of invalidity, old-age and survivors insurance premiums are notified\" for themselves.", "death. For example, a worker who becomes disabled at a young age could receive a large return relative to the amount they contributed in FICA before becoming disabled, since disability benefits can continue for life. As in private insurance plans, everyone in the particular insurance pool is insured against the same risks, but not everyone will benefit to the same extent.\nThe analogy to insurance, however, is limited by the fact that paying FICA taxes creates no legal right to benefits and by the extent to which Social Security is, in fact, funded by FICA taxes. During 2011 and 2012, for", "the spouse of the main annuitant after his or her death, for as long as the spouse survives. The annuity paid to the spouse is called a reversionary annuity or survivorship annuity. However, if the annuitant is in good health, it may be more beneficial to select the higher payout option on their life only and purchase a life insurance policy that would pay income to the survivor.\nOther features such as a minimum guaranteed payment period irrespective of death, known as life with period certain, or escalation where the payment rises by inflation or a fixed rate annually can also", "after home or family, 29 people are sick or disabled in the long-term, and 27 are unemployed.", "having died of a heart attack around two weeks earlier. The coroner criticised the retirement home Giese lived in and said that it was \"unacceptable that a person may lie deceased in their home for some weeks\".", "May 2019, Bloomberg reported that in spite of the recent mental health crisis, insurance companies, including UnitedHealth Group, are doing what they can to limit coverage and deny claims for mental health related issues.\nA 2019 study by the National Bureau of Economic Research says there is a direct causal link between worker's wages and suicide rates, and that raising the minimum wage would result in a quick drop in the suicide rate. Murder–suicide There have been many high-profile incidents in the United States in the 1990s, 2000s and 2010s of individuals thought to be attempting \"suicide by cop\" or killing", "ruin, and suicides have been reported as a result. The Financial Times reported the suicide a 40-year-old man who did not receive the £17,000 lump sum promised to him from a liberation scheme. \nPension liberation operators may use website promotions, cold calls or text messages to encourage people to access their pension before 55. The Financial Conduct Authority warns against cold-calling scams and it is advised to only work with a company registered on the FCA's list of regulated companies. Differences with Pension Release Pension release is when a person removes money from their pension once they are 55", "Dead-end job A dead-end job is a job where is little or no chance of career development and advancement into a higher paid position. If an individual requires further education to progress within their firm that is difficult to obtain for any reason, this can result in the occupation being classified as a dead-end position. Based on human resources and career strategist Toni Howard Lowe, some individuals who have worked for the same company for several years may not be privy to the signs that they are currently employed in a dead-end job. Miscellaneous occupations Dead end work is usually", "when a woman is on maternity leave, she is entitled to Unemployment Insurance Fund benefits for half the time spent away. Usually the employer will pay the other half, but this is not required in the Basic Conditions of Employment Act. Family-responsibility leave If the employee has been working for more than four months, he is entitled to 3 days family-responsibility leave, as in the case where there has been a death in his family. Remuneration Employers must keep records of the hours worked and remuneration awarded for each employee for at least three years.\nEmployees are to be paid in", "more years. She told the local news reporter interviewing her that after her retirement she would be moving to her husband's hometown, 90 minutes north of Seattle, Washington. How Not to Die How Not to Die: Surprising Lessons on Living Longer, Safer, and Healthier from America’s Favorite Medical Examiner is a book about safe and healthy living written by Jan Garavaglia. The book was released on October 14, 2008 by Crown Publishing, a division of Random House. Using cases from her 20 years of experience as a medical examiner, Garavaglia identifies some lifestyle and behavioral choices that may result", "be purchased.\nAnnuities with guaranteed periods are available from most providers. In such a product, if death takes place within the guaranteed period, payments continue to be made to a nominated beneficiary.\nImpaired life annuities for smokers or those with a particular illness are also available from some insurance companies. Since the life expectancy is reduced, the annuity rate is better (i.e. a higher annuity for the same initial payment). This can have the unfortunate appearance of one \"betting against\" the nominee.\nLife annuities are priced based on the probability of the nominee surviving to receive the payments. Longevity insurance is", "death penalty with life imprisonment without the possibility of parole, require people sentenced to life in prison without the possibility of parole to work in order to pay restitution to victims' families, and allocate approximately $30 million per year for three years to police departments for the purpose of solving open murder and rape cases. Supporters of the measure raised $6.5 million, dwarfing the $1 million raised by opponents of Proposition 34.\nThe proposition was defeated with 52% against and 48% in favor. July 2014 and November 2015 federal decisions On July 16, 2014, federal judge Cormac J. Carney of", "End of Life Choice Bill Contents of the bill Eligibility for assisted dying\nThe End of Life Choice Bill allows New Zealand citizens or permanent residents aged 18 or older to request assisted dying, provided that they suffer from a terminal illness that is likely to end their life within 6 months, or they suffer from a grievous and irremediable medical condition; that they are in an advanced state of irreversible decline in capability; and they experience unbearable suffering that cannot be relieved in a manner that they consider tolerable; and they have the ability to understand the nature of assisted", "to fixed-term, though total time served must be no less than ten years. Life without parole was enacted into the Criminal Law on Dec 11, 2015, is applicable to those convicted with embezzlement.\n Death penalty with two years reprieve will be commuted to life imprisonment if the convicted did not commit another serious crime within the two year period or fixed-term imprisonment if the convicted helped solve a major crime or contributed the society greatly. Death penalty with reprieve, without parole can be automatically reduced to life without parole if another crime is not committed within the two year period,", "a totalization agreement with the United States, as well as citizens of 53 other countries, can receive Social Security payments indefinitely while residing outside of the United States. Otherwise, Social Security benefit payments will stop after the alien has spent six full calendar months outside of the United States, and cannot be resumed until the alien spends one full calendar month inside of the United States and is lawfully present for that entire month. U.S. citizens, in contrast, can receive Social Security payments outside of the U.S. regardless of their length of residence abroad. Other government benefits Relinquishment of U.S.", "of paid time off if they are diagnosed with cancer or have other serious medical conditions or to take care of family members who are seriously ill. Sanders has also cosponsored a bill that would guarantee workers at least seven paid sick days per year for short-term illness, routine medical care, or to care for a sick family member. Gun laws Sanders supports banning assault weapons, universal federal background checks, and closing the gun show loophole.\nWhile in the House of Representatives representing a \"state with virtually no gun laws\", Sanders voted against the Brady Handgun Violence Prevention Act that required", "have resided in Maryland and had coverage with the employer for at least three months prior to death. In all cases, continuation coverage must be offered for eighteen months, with the exception that a former spouse's continuation coverage ends upon remarriage. Virginia Virginia's legislation applies to employers with a group health insurance plan, other than an HMO plan, and with twenty or fewer employees. Employers must offer continuation coverage to employees for twelve months. The legislation does not apply to employees who did not have coverage from the employer for at least three months prior to the qualifying event.", "\"essentially a PDF and an excel spreadsheet full of red herrings\" — meant that no firm conclusion could be drawn from these figures alone about whether the death rate of people found fit for work is any higher or lower than expected. Deaths and claims ending DWP figures show that, between January and November 2011, 10,600 sick and disabled people died within six weeks of their benefit claim ending; many disability campaigners believe that these deaths occurred after — and even because — the claimants were declared fit for work. The Daily Telegraph has questioned this: it posits that the", "\"I am saddened that Justice Ma. Alicia Austria-Martinez has opted to retire early from the Supreme Court due to 'health reasons.' She is not bedridden. Neither is she physically or mentally incapacitated, but she has chosen to retire on April 30, 2009 because she felt she could no longer cope with the heavy caseload.\" The 1987 Constitution of the Philippines provides that: \"Section 11, Article VIII. The Members of the Supreme Court xxx shall hold office during good behavior until they reach the age of seventy years or become incapacitated to discharge the duties of their office.\" Family Born as", "employers would likely lose their employee benefits. At the start of the program in January 2006, it was expected that eleven million people would be covered by Medicare Part D; of those, six million would be dual eligible. About two million people who were covered by employers would likely lose their employee benefits.\nAs of January 30, 2007, nearly 24 million individuals were receiving prescription drug coverage through Medicare Part D (PDPs and MA-PDs combined), according to CMS. Medicare offers other methods of receiving drug coverage, including the Retiree Drug Subsidy. Federal retiree programs such as TRICARE and Federal Employees Health", "minimum of five paid sick days annually.\nThe legislation failed in the legislature, mainly over concerns regarding how to pay for the mandate—which would have applied to state workers and government employees as well.\nOn September 10, 2014, the Healthy Workplaces, Healthy Families Act of 2014 was signed by Governor Jerry Brown, which applies to employers regardless of size, with only a few enumerated categories of employees ineligible for leave. Authored by San Diego Assemblywoman Lorena Gonzalez, the bill is expected to affect more than 6.5 million employees who have no paid sick days. That's roughly 40 percent of the workforce in", "and on HMRC guidelines (drafted with reference to mortality tables), his life expectancy is deemed to be 15 years.\n£4,000 x 15 = £60,000 is the discount, or the amount of the gift which has technically been 'carved out' and retained (in reality this would be lowered a little to reflect the real cost of providing £4,000 over fifteen years assuming there is some return on capital held).\nIf he dies within seven years:\n- The value of the \"right to withdrawals for life\", which started as £60,000, is now deemed to be nil (as he is dead). Thus, the £60,000 does not", "available estimates of longevity may be incorrect. Though a given patient may properly be considered terminal, this is not a guarantee that the patient will die within six months. Similarly, a patient with a slowly progressing disease, such as AIDS, may not be considered terminally ill if the best estimate of longevity is greater than six months. However, this does not guarantee that the patient will not die unexpectedly early.\nIn general, physicians slightly overestimate the survival time of terminally ill cancer patients, so that, for example, a person who is expected to live for about six weeks would likely", "dying in the next year is low for anyone that the insurer would accept for the coverage, purchase of only one year of coverage is rare.\nOne of the main challenges to renewal experienced with some of these policies is requiring proof of insurability. For instance the insured could acquire a terminal illness within the term, but not actually die until after the term expires. Because of the terminal illness, the purchaser would likely be uninsurable after the expiration of the initial term, and would be unable to renew the policy or purchase a new one.\nSome policies offer a feature", "which can make their health worse and push them further from the workplace. We urgently need to see a complete overhaul of the system, to ensure nobody else falls through the cracks. Michael O'Sullivan Michael O'Sullivan suffered from long-term depression and anxiety and was receiving sickness benefit in the form of Income Support until it was stopped by the DWP following a WCA. He committed suicide after being on Jobseekers Allowance for six months. After the inquest, the coroner said: \"The intense anxiety that triggered his suicide was caused by his recent assessment...as being fit for work\". The assessor —", "My Life Without Me Plot Ann (Sarah Polley) is a hard-working 23-year-old mother with two small daughters, an unemployed husband (Scott Speedman), a mother (Deborah Harry) who sees her life as a failure, and a jailed father whom she has not seen for ten years. Her life changes dramatically when, during a medical checkup following a collapse, she is diagnosed with metastatic ovarian cancer and told that she has only two months to live.\nDeciding not to tell anyone of her condition and using the cover of anemia, Ann makes a list of things to do before she dies. She decides", "period of 18 to 22 years before they become eligible for parole. \nIn the case of child murder involving rape or torture, the premeditated murder of a state official (since 2011), and terrorism resulting in death, the court can impose a safety period of up to 30 years, or order that the prisoner is ineligible for parole at all, and thus will spend the rest of their natural lives in prison.\nIt is possible to give a reduction of the safety period for serious signs of social re-adaptation (even if the court has ordered that the prisoner is to spend the", "although it is generally months or less. Life expectancy for terminal patients is a rough estimate given by the physician based on previous data and does not always reflect true longevity. An illness which is lifelong but not fatal is a chronic condition.\nTerminal patients have options for disease management after diagnosis. Examples include caregiving, continued treatment, hospice care, and physician-assisted suicide. Decisions regarding management are made by the patient and his or her family, although medical professionals may give recommendations or more about the services available to terminal patients.\nLifestyle after diagnosis largely varies depending on management decisions and also the" ]
How much knowledge can the human brain store?
[ "This is a commonly asked question here. Please see [these previous posts.](_URL_0_) If they don't entirely answer your question, you might create a new post with\na more specific question.\n\nTry our handy Search function sometime. :-)\nFor best results in most cases, use 2 or 3 general, common words\nthat refer to the key concepts in your topic." ]
[ "10^18 instructions per second. Estimates suggest that the storage capacity of an individual human brain is about 10^12 bytes. On a per capita basis, this is matched by current digital storage (5x10^21 bytes per 7.2x10^9 people)\". Relation to economics Eventually, Information and Communication Technology—computers, computerized machinery, fiber optics, communication satellites, the Internet, and other ICT tools—became a significant part of the economy. Microcomputers were developed and many businesses and industries were greatly changed by ICT.\nNicholas Negroponte captured the essence of these changes in his 1995 book, Being Digital. His book discusses similarities and differences between products made of atoms and", "determine how best to achieve its goals. Like any computer, Living Brain can process and collate large amounts of information. Living Brain can find any weaknesses in a being or structure as well as determining the best situation to overcome this obstacle. Living Brain has dense metal exo-skeleton and possesses super-strength and speed. It can also fly and has clawed hands. The joints of Living Brain's limbs can rotate nearly 360 degrees. Originally, Living Brain had external controls on its thorax, with which it can be deactivated, yet Living Brain has always countered any attempts to reach it. Living Brain", "memory loss of the events and mental processes immediately before the time of brain scanning.\nA full brain map has been estimated to occupy less than 2 x 10¹⁶ bytes (20,000 TB) and would store the addresses of the connected neurons, the synapse type and the synapse \"weight\" for each of the brains' 10¹⁵ synapses. However, the biological complexities of true brain function (e.g. the epigenetic states of neurons, protein components with multiple functional states, etc.) may preclude an accurate prediction of the volume of binary data required to faithfully represent a functioning human mind. Serial sectioning A possible method", "over a day you use 100 percent of the brain\".\nAlthough parts of the brain have broadly understood functions, many mysteries remain about how brain cells (i.e., neurons and glia) work together to produce complex behaviors and disorders. Perhaps the broadest, most mysterious question is how diverse regions of the brain collaborate to form conscious experiences. So far, there is no evidence that there is one site for consciousness, which leads experts to believe that it is truly a collective neural effort. Therefore, as with James's idea that humans have untapped cognitive potential, it may be that a large number of", "among a variety of neural systems, yet certain types of knowledge may be processed and contained in specific regions of the brain. Overall, the mechanisms of memory are poorly understood. Such brain parts as the cerebellum, striatum, cerebral cortex, hippocampus, and amygdala are thought to play an important role in memory. For example, the hippocampus is believed to be involved in spatial and declarative learning, as well as consolidating short-term into long-term memory.\nIn Lashley's experiments (1929, 1950), rats were trained to run a maze. Tissue was removed from their cerebral cortices before re-introducing them to the maze, to see", "article in the recognized Journal Trends in Ecology and Evolution reports that by now digital technology \"has vastly exceeded the cognitive capacity of any single human being and has done so a decade earlier than predicted. In terms of capacity, there are two measures of importance: the number of operations a system can perform and the amount of information that can be stored. The number of synaptic operations per second in a human brain has been estimated to lie between 10^15 and 10^17. While this number is impressive, even in 2007 humanity's general-purpose computers were capable of performing well over", "brain size in some species, such as bats. Most of the brain's energy consumption goes into sustaining the electric charge (membrane potential) of neurons. Most vertebrate species devote between 2% and 8% of basal metabolism to the brain. In primates, however, the percentage is much higher—in humans it rises to 20–25%. The energy consumption of the brain does not vary greatly over time, but active regions of the cerebral cortex consume somewhat more energy than inactive regions; this forms the basis for the functional brain imaging methods of PET, fMRI, and NIRS. The brain typically gets most of its energy", "to determine how many neurons there are in the brain. Suzana Herculano-Houzel has developed a method of counting of neurons of human and other animals' brains and the relation between the cerebral cortex area and thickness and number of cortical folds. Humans and other primates pack about twice the number of neurons in a cubed inch of brain as most other mammals. Appearances in science films and TV shows Discovery Channel, \"Paleoworld\", 1994.\"Back To The Seas\" Paleoworld (Season 1)\nBBC, \"Walking with Beasts\", 2001 (work covered with extensive interviews).\nNHK (Japanese National Public Television), \"The Oceans\", 1996\nDiscovery Channel, 2001 \"The Oceans\".\nDiscovery Channel", "PET, and MRI results to interpret these. A key issue is that the latest brain research not only contributes to increased understanding of brain functions, but is also used to attempt to explain what it means to be human. CIMBI The Lundbeck Foundation, created in 1954, donated one of the largest amounts ever given toward the development of medical knowledge, listing a total of DKK 504 million to various institutions in 2011. With a 40 million grant from this program, Knudsen, together with a team of researchers from the Center for Integrated Molecular Imaging of the Brain (CIMBI),", "is considered a plausible claim. The concept gained currency by circulating within the self-help movement of the 1920s; for example, the book Mind Myths: Exploring Popular Assumptions About the Mind and Brain includes a chapter on the ten percent myth that shows a self-help advertisement from the 1929 World Almanac with the line \"There is NO LIMIT to what the human brain can accomplish. Scientists and psychologists tell us we use only about TEN PERCENT of our brain power.\" This became a particular \"pet idea\" of science fiction writer and editor John W. Campbell, who wrote in a 1932", "and research about the brain. Evidence suggests that, by instructing through multiple learning pathways, more \"dendritic pathways of access\" are created. This can be achieved by using several senses (i.e. sight, sound, smell) or by creating cross-curricular connections. When more regions of the brain store data about a subject, there is more interconnection and cross-referencing of data from multiple storage areas in response to a single cue, meaning one has learned rather than memorized.\nAs Wolfe (2001) argues, information is acquired through the five senses: sight, smell, taste, touch and sound. This information is stored temporarily, and", "and cognitive development Brain research shows that some general aspects of the brain, such as myelination, plasticity, and connectivity of neurons, are related to some dimensions of general intelligence, such as speed of processing and learning efficiency. Moreover, there are brain regions, located mainly in the frontal and parietal cortex that subserve functions that are central to all cognitive processing, such as executive control, and working memory. Also, there are many neural networks that specialize in the representation of different types of information such as verbal (temporal lobe of the brain), spatial (occipital lobe of the brain) or quantitative information", "unlimited capacity (Sternberg & Sternberg, 2012) and its duration is as good as indefinite. Although sometimes it is difficult to access, it encompasses everything learned until this point in time. One might become forgetful or feel as if the information is on the tip of the tongue. Cognitive development theory Another approach to viewing the ways in which information is processed in humans was suggested by Jean Piaget in what is called the Piaget's Cognitive Development Theory (Presnell, 1999). Piaget developed his model based on development and growth. He identified four different stages between different age brackets characterized by the", "Mind uploading Overview The human brain contains, on average, about 86 billion nerve cells called neurons, each individually linked to other neurons by way of connectors called axons and dendrites. Signals at the junctures (synapses) of these connections are transmitted by the release and detection of chemicals known as neurotransmitters. The established neuroscientific consensus is that the human mind is largely an emergent property of the information processing of this neural network.\nNeuroscientists have stated that important functions performed by the mind, such as learning, memory, and consciousness, are due to purely physical and electrochemical processes in the brain and are", "of the brain as an explorer constantly controlling the body to test hypotheses and not as an information absorbing coding device.", "to back up some of his theories, concluding:\nUntil we clear up the ground-floor aspects of human consciousness—in particular, first-person being—claims to advance our understanding of its higher levels, and of the grand edifice of civilization, by peering into intra cranial darkness will not withstand even the most cursory examination. ...The Tell-Tale Brain, though it is engagingly written and often fascinating, reminds us how little cause we have to privilege what the neuro scientists tell us about what makes us human over the testimony of novelists, poets, social workers or philosophers.\nNicholas Shakespeare (The Telegraph):\nRamachandran wanders along intriguing neural pathways, pausing to", "around personal rights and control over personal information. As technology improves, it is possible that collecting neurodata without consent or knowledge will be easier or more common in the future. One argument is that the collection of neurodata is a violation of both personal property and intellectual property, as the collection of neurodata involves scanning the both the body and the analysis of thought.\nOne of the main ethical controversies regarding neuroprivacy is related to the issue of free will, and the mind-body problem. A possible concern is the unknown extent to which neurodata can predict actions and thoughts", "billion gigabytes of storage.\" Therefore, they believe that \"soon it will be technologically possible for an average person to access virtually all recorded information.\"", "allows us to store information for later retrieval. Memory is often thought of as consisting of both a long-term and short-term store. Long-term memory allows us to store information over prolonged periods (days, weeks, years). We do not yet know the practical limit of long-term memory capacity. Short-term memory allows us to store information over short time scales (seconds or minutes).\nMemory is also often grouped into declarative and procedural forms. Declarative memory—grouped into subsets of semantic and episodic forms of memory—refers to our memory for facts and specific knowledge, specific meanings, and specific experiences (e.g. \"Who was the first president", "have suggested that the short-term memory of adult humans can hold only a limited number of items; grouping items into larger chunks such as in a mnemonic might be part of what permits the retention of a larger total amount of information in short-term memory, which in turn can aid in the creation of long-term memories.", "1934, as their source, p. 250). Individuals have limited cognitive resources and abilities to process and comprehend information and situational complexity. A person cannot grasp every nuance of a stimuli required to assign its full and complete meaning. Salience is the way researchers understand what information will most likely capture one's attention in a given situation and have the greatest influence on one's cognitions about the stimuli. Research has shown that the most salient information is not always the most accurate or important, but a “Top of the Head Phenomenon” (Taylor & Fiske, 1978). People are", "no mental content, and that organization and function of the brain comes solely from life experiences. The standard social science model views the brain simply as a large domain-general structure, whose functions have evolved gradually through cultural input. Today, many scientists continue to view the brain as a black box, where only its inputs and outputs can be measured, but their internal mechanisms will never be known.\nOne of the first discoveries relevant to this hypothesis came from a French neurologist, Joseph Jules Dejerine. He discovered that a stroke affecting a small area of the brain's left visual system left patients", "groups. Is Your Brain Really Necessary? In 1980, Roger Lewin published an article in Science, \"Is Your Brain Really Necessary?\", about Lorber studies on cerebral cortex losses. He reports the case of a Sheffield University student who had a measured IQ of 126 and passed a Mathematics Degree but who had hardly any discernible brain matter at all since his cortex was extremely reduced by hydrocephalus. The article led to the broadcast of a Yorkshire Television documentary of the same title, though it was about a different patient who had normal brain mass distributed strangely in a very large skull.", "that the idea that \"memories were stored in our brains\" was \"only a theory\" and \"despite decades of research, the phenomenon of memory remains mysterious.\" This provoked a response by Steven Rose, a neuroscientist from the Open University, who criticised Sheldrake for being \"a researcher trained in another discipline\" (botany) for not \"respect[ing] the data collected by neuroscientists before begin[ning] to offer us alternative explanations,\" and accused Sheldrake of \"ignoring or denying\" \"massive evidence,\" and arguing that \"neuroscience over the past two decades has shown that memories are stored in specific changes in brain cells.\" Giving an example of experiments", "any given moment, there is a great deal of information made available to each individual. Psychologists have found that one's mind can attend to only a certain amount of information at a time. According to Csikszentmihályi's 2004 TED talk, that number is about \"110 bits of information per second\". That may seem like a lot of information, but simple daily tasks take quite a lot of information. Just decoding speech takes about 60 bits of information per second. That is why when having a conversation one cannot focus as much attention on other things.\nFor the most part (except for basic", "to identify irrelevant data and filter it out, enabling significant data to be distributed to the other mental processes. For example, the human brain may simultaneously receive auditory, visual, olfactory, taste, and tactile information. The brain is able to consciously handle only a small subset of this information, and this is accomplished through the attentional processes.\nAttention can be divided into two major attentional systems: exogenous control and endogenous control. Exogenous control works in a bottom-up manner and is responsible for orienting reflex, and pop-out effects. Endogenous control works top-down and is the more deliberate attentional system, responsible for divided attention", "to be the seat of intelligence. According to Herodotus, during the first step of mummification: \"The most perfect practice is to extract as much of the brain as possible with an iron hook, and what the hook cannot reach is mixed with drugs.\" Over the next five thousand years, this view came to be reversed; the brain is now known to be the seat of intelligence, although colloquial variations of the former remain as in \"memorizing something by heart\". Early views The Edwin Smith Surgical Papyrus, written in the 17th century BC, contains the earliest recorded reference to the brain.", "Nutrition and cognition Relatively speaking, the brain consumes an immense amount of energy in comparison to the rest of the body. The mechanisms involved in the transfer of energy from foods to neurons are likely to be fundamental to the control of brain function. Human bodily processes, including the brain, all require both macronutrients, as well as micronutrients.\nInsufficient intake of selected vitamins, or certain metabolic disorders, may affect cognitive processes by disrupting the nutrient-dependent processes within the body that are associated with the management of energy in neurons, which can subsequently affect synaptic plasticity, or the ability to encode new", "tasks. The missing structures of his brain have yet to be linked to his increased abilities, but they can be linked to his ability to read pages of a book in 8–10 seconds. He was able to view the left page of a book with his left visual field and the right page of a book with his right visual fields so he could read both pages simultaneously. He also had developed language areas in both hemispheres, something very uncommon in split-brain patients. Language is processed in areas of the left temporal lobe, and involves a contralateral transfer of information", "of the state of knowledge in 2002, and might be said to represent a landmark in the century-long goal to establish the basic neurobiological principles which govern the actions of the brain.\nMany other journals exist which contain relevant information such as Neuroscience.\nSome of them are listed at Brown University Library." ]
Is Magneto (from X-Men) good or bad?
[ "Think of Magneto (and Charles Xavier) as ideologies. \n\nX-Men has always been a metaphor for people who are different, marginalized, etc.\n\nThinking back to the Civil Rights struggles of the 1960's (when X-Men was created), you had people advocating non-violent protest (Martin Luther King Jr.) and you had people who were, well, not necessarily violent, but definitely more militant (Malcolm X).\n\nBoth had more or less the same goals, but their methods and messages were different.\n\nCharles Xavier is MLK, Magneto is Malcolm X.\n\nThey did have to write things in to make Magneto be more towards the \"bad\" sides when talking about mutant superiority (which is subjective), which isn't related at all to civil rights, but the Professor and Magneto started at the same point and diverged.", "He is a shade of grey. His motives are good, but his methods are immoral.", "Misguided.\n\nHe wants to create a utopia for his species, at the expense of billions of innocent members of another species.", "In my mind, he's neither entirely good nor bad. Certainly he's got the best interests of mutants as his primary motivation, and he does tend to be harsh against those who stand in his way, but the fact that he's even willing to talk to Xavier, and even work with him if necessary, suggests someone who is less than entirely bad. And from some of the things that he said in DoFP, I'd even suggest that, at least for old Magneto, he's probably more good than bad." ]
[ "the X-Men, and Hulk in confronting the Phoenix Force-powered Cyclops. Scarlet Witch uses her abilities to keep Magneto from being harmed. Following the defeat of Cyclops, Magneto and the other former members are reported to have gone on the run.\nAfter finding out that his control of his powers have been lost due to contact with the Phoenix Force, Magneto nonetheless teams up with Cyclops, Emma Frost, and Magik to start a new school for mutants, as new mutants have started appearing again, in the old Weapon X facility. Magneto also pretended to serve as a disgruntled informer for SHIELD", "in 2015.\nComic Book Resources named him as the 8th top X-Men villain they would like to see in the Marvel Cinematic Universe.", "to the cold-hearted villain he was previously portrayed as in earlier shows like Pryde of the X-Men.\nIn the series, he briefly appears in the first episode \"Night of the Sentinels: Part I\" on a television screen Jubilee accidentally turns on with her powers but Magneto makes his true first appearance in the third episode \"Enter Magneto\", where he attempts to incite a war between humans and mutants by attacking a military base and launching its nuclear armaments, though they are prevented from reaching their targets by the X-Men. It is revealed that his real name is Magnus, and he is", "yes, real star magnetism, both individually and together: They're both cool and intense, suave and unaffected, playful and dead serious about their grand comic-book work.\" Peter Howell of the Toronto Star called it \"a blockbuster with brains\" and said Vaughn \"brings similar freshness to this comic creation as he did to Kick-Ass, and manages to do so while hewing to the saga's serious dramatic intent.\" Box office X-Men: First Class went on general release on June 3, 2011. In North America, the film opened on approximately 6,900 screens at 3,641 locations, debuting atop the weekend box office with earnings of", "round, she managed to get almost two-thirds of the votes (64%) when pitted against video gaming's female icon Lara Croft. In 2006, IGN also rated Psylocke as the 22nd top X-Men character, comparing her to Rogue\" and calling her \"a born leader\" whose \"abilities make her one of the most potent fighters to ever wear the X\", and also placed her third on their list of top 'X-Babes' for her being an \"Asian gal with incredible body and a British accent\". Marvel themselves declared her their own second most favorite hero of 2011, citing her \"tremendous and thankless heroism\". That", "Herman, Ernst, No-Girl, Redneck, the Stepford Cuckoos, and Tattoo. Another group of middle-age X-Men eventually do show up, albeit late and pathetic. Cyclops pretends like he’s still the guy leading an entire race, but he just makes a fool of himself. Magneto establishes here that Cyclops and Emma Frost are basically a bunch of has-beens since their powers are fading away. Even the rest of Magneto’s team goes out of their way to berate them and not in a very good way. Meanwhile, at a mutant medical center, Beast is helping out a couple of prospective parents. Apparently, they want", "female character: According to Tom Brevoort, \"Originally, Allan pitched Hulkling as a female character using her shape-changing abilities to pose as a man. I suspect this was as close as Allan felt he could get to depicting an openly gay relationship in a Marvel comic. But as we got underway... he started to have second thoughts and approached me about maintaining Hulkling and Wiccan as two involved male characters.\"\nIn the latest incarnation of X-Factor, written by Peter David, depowered mutant Rictor and his longtime friend Shatterstar (with whom he'd had an ambiguous relationship) were shown in an on-panel kiss. After", "X-Men series, these children are mutants, brought together to explore their unique abilities and study in secret at an exclusive school for gifted children, lest they be hated and feared by a world that would not understand them. The Oakland Tribune described it in 1953 as \"the inevitable adjustments and maladjustments of minority genius to majority mediocrity\".\nIn Shiras' book, none of the children are given paranormal super powers such as telekinesis or precognition—their primary difference is simply that of incredible intellect, combined with an energy and inquisitiveness that causes them to figuratively devour every book in their local libraries, to", "makes them immune to telepathic control, although they are still susceptible to mind readings.\nIn the shared universe of Ultimate Marvel, the X-Men have more than once crossed the paths of other superheroes: Peter Parker is a good friend of the X-Men and is Shadowcat's ex-boyfriend. The X-Men share a wary truce with Nick Fury and The Ultimates, who have been both their best benefactors (\"New Mutants\" arc) and worst enemies (Ultimate War) in the past. The Ultimate Fantastic Four have met the X-Men in Ultimate X4 and the teams are generally on positive terms.", "was still struggling with the script, sent them a four-page-long memo where he explained the core concepts and what differentiated the X-Men from other superheroes. In late 1998, Singer and DeSanto sent a treatment to Fox, which they believed was \"perfect\" because it took \"seriously\" the themes and the comparisons between Xavier and Magneto and Martin Luther King and Malcolm X, unlike the other scripts. They made Rogue an important character because Singer recognized that her mutation, which renders her unable to touch anyone, was the most symbolic of alienation. Singer merged attributes of Kitty Pryde and Jubilee into the", "headquarters. However, Machinesmith had been manipulating her into trying to break him loose while trying to take over her body. Danger regains control and returns him to Beast and the Avengers, and Frost comforts her in saying that she is still young and still learning to trust others, but that is one thing that makes her human. Greg Pak run Marvel would announce that Greg Pak and Mike McKone would be the next creative team to take over Astonishing X-Men. A teaser image was released of Cyclops and Storm kissing, fueling speculation that the run would feature a romantic arc", "inspiration for his run on New X-Men, Morrison explains Beast as a \"brilliant, witty bipolar scientist\". Morrison continues, \"I saw Henry McCoy as an incredibly clever, witty, cultured, well-traveled, experienced, well-read character so I brought out those parts of his personality which seemed to me to fit the profiles of the smartest and most worldly people I know – his sense of humor is dark and oblique. He's obviously quite clearly bipolar and swings between manic excitement and ghastly self-doubt. He has no dark secrets, however, and nothing to hide.\"\nJoss Whedon's \"Astonishing X-Men: Gifted\" story arc featured a \"mutant cure\"", "he begins showering his audience with gifts and encourages them to vote on which scenario they would like to see the X-Men face using an app.\nTransported to Asteroid M, Longshot, Kitty, Prestige and Cyclops are forced to fight a simulation of Magneto. Scott then admits that the X-Men Blue have been working with Magneto and concludes that they never should have agreed as it is impossible for someone to change their behaviour so significantly. Meanwhile, Logan, Storm, Iceman and Angel are sent to the X-Tinction Agenda where they come under attack by the Magistrates and the Press Gang who swiftly", "they were in the Avengers booklet; Beast was as well, of course, but they could hardly miss one of the original X-Men. Phoenix is in and, as might have been expected, is tough enough to take on everyone else in the booklet put together and win easily—the booklet sensibly recommends that she only enter games as an NPC. There are, however, some surprising omissions, including the Starjammers, Shi'Ar Imperial Guard and Alpha Flight. There are not many mutants in that lot, but they're all part of the X-Men circle. Another book, perhaps?\" He continued, \"I have got a few gripes", "villain with incredible jumping ability and a medieval costume, and Mastermind, with the power to create illusions of sight, smell, taste, touch and sound. Quicksilver and the Scarlet Witch are Magneto's children, although at the time of the original Brotherhood all three of them were unaware of it. They had joined after Magneto saved Wanda from a mob who believed she was a Witch after she accidentally made a house burst into flame. She joined to repay the debt, and Pietro joined to keep her safe. Time and again, the Brotherhood clashed with the original X-Men team (consisting of Cyclops,", "words, the two groups engaged each other in battle. The X-Men gained the upperhand as the Upstarts retreated but Shinobi was left behind, only to kill himself as he didn't wanted to get captured or be controlled by the Hellfire Club. Powers and abilities Cortez possesses the ability to enhance a mutant's abilities to occasionally dangerous limits and dance beyond their control (temporarily powering them up at the expense of burning out their bodies). In X-Men #1 (1991), while onboard Asteroid M, Magneto returned from a fight with the X-Men having suffered deep lacerations to his lower abdomen from Wolverine's", "Medina. The series stars Jimmy Hudson, Kitty Pryde, Johnny Storm, Bobby Drake and Rogue. Villains and supporting cast Ultimate X-Men introduced revised versions of classic X-Men villains, such as mutant supremacist, would-be world conqueror, and evil genius mastermind Magneto. He heads the anti-human and genetic terrorist group Brotherhood of Mutants. The series also features the amoral, Mengele-like mutant super-weapon project Weapon X, the shady Hellfire Club and many more. In addition, the Academy of Tomorrow is the Ultimate Marvel version of a spin-off X-Men team called the New Mutants. In this world the group consists of: headmistress Emma Frost, who", "defeats Iron Man and is attacked by the Thing, who rips Doom apart and reveals him as a Doombot. As Squadron Supreme 31916 attacks Squadron Supreme 712, Nighthawk 712 approaches Captain America, mistaking him for the Captain America of Earth-616. Scarlet Witch reveals that her powers have resulted in this unusual doppelganger phenomenon.\nOn the Helicarrier, Nick Fury orders Spider-Man to oversee the Hulk and act as his \"conscience\" as Hulk leaps into the fray. Issue Nine The Hulk battles both Squadrons Supreme and the Ultimates heroes and begins overwhelming them all. With their combined powers, the Squadrons and the Ultimates", "a member of Magneto's unnamed supervillain group during the fight against Red Skull's Red Onslaught form. After the heroes and villains present at the battle experience a moral inversion due to the Scarlet Witch and Doctor Doom's attempt to bring out the Xavier in Onslaught backfiring, Magneto recruits Enchantress as one of his new 'Avengers' to stop the now-villainous Avengers and X-Men.\nFollowing the \"Secret Wars\" storyline, she has become a member of Malekith the Accursed's Dark Council. Through a spell, she takes control of the queen of the Light Elves, allowing her marriage to Malekith to happen and the conquest", "1970s described him as a hybrid, not a mutant, to distinguish him from the mutant X-Men. When the series was revived in 1990, the series title logo carried the subtitle \"Marvel's first and mightiest mutant!\".\nNamor is actually a hybrid of Atlantean and human physiology, although he has principal characteristics that neither Atlanteans (Homo mermanus) nor humans (Homo sapiens) possess. These include his ability to fly, and possibly his durability and strength (which is several times that of an Atlantean).\nIn the first issue of the five-part Illuminati miniseries, after being experimented on by the Skrulls, it was confirmed that Namor is", " Realizing that he has come to regard the lives of those who oppose him to be as worthless as the Nazis considered his people to be, Magneto stands down and leaves the scene; though most of the X-Men are dismayed that he escaped, Xavier expresses hope that the encounter might prove a turning point for his former friend.\nMagneto later discovers that former Brotherhood members the Scarlet Witch and Quicksilver are actually his children, simultaneously learning about their recent marriages to the Vision and Crystal. He reveals to Quicksilver and the Scarlet Witch that he is their father. He also", "acting more or less as his mainstream counterpart would. Throughout the series, Scott also discovered that his father was the space-pirate Corsair. During a battle with the government team known as X-Factor, Scott had to fight his brother Alex. Neither of the two seemed aware that they were brothers, and their powers seemed to have no effect on each other. When the series ended, Scott and Alex never had the chance to discover they are related. In the series, it was also revealed that he was one of the original X-Men members along with Beast, Jean, and Iceman. In the", "2008 interview, Stan Lee said he \"did not think of Magneto as a bad guy. He just wanted to strike back at the people who were so bigoted and racist... he was trying to defend the mutants, and because society was not treating them fairly he was going to teach society a lesson. He was a danger of course... but I never thought of him as a villain.\" In the same interview, he also revealed that he originally planned for Magneto to be the brother of his nemesis Professor X. Writer Chris Claremont confirmed that Malcolm X was an inspiration", "a heart of gold, and she's very strong. To be a female as strong as she was, in the kind of world she came from, was wonderful, I think.\" Lauding the character, Adams says that it's Ishka's backbone that helps her grow as an actress and as a person. Prior to November 2000, Adams appeared at several Star Trek conventions with her \"Ferengi family\" and relished meeting fans who expressed how much they love the character of Ishka.", "to keep a secret that she was a mutant. They also joined with Charlotte Jones and the morlock Marrow. After Bastion was defeated, he took Cecilia and Marrow to the mansion, and soon left the X-Men again for a while to be with his parents.\nMuch later, the X-Men found evidence in one of Destiny's journals of a group known as the Twelve, including Xavier, Magneto, Cyclops, Phoenix, Iceman, Polaris, Storm, Cable, Bishop, Sunfire, Mikhail Rasputin and the Living Monolith. They also learned that the Apocalypse's Horsemen had been kidnapping these mutants from around the globe. Iceman was captured in the", "Exodus. Later, Shen Xorn is revealed to have been one of the mutants depowered due to the events of the House of M miniseries.\nThe true identity of Xorn, and his relationship to the character Magneto, became a subject of confusion to fans. Marvel refrained from giving a complete explanation, eventually hinting that the summer 2005 crossover House of M would clear up the situation. The Xorn entry in the Official Handbook of the Marvel Universe: X-Men 2005 stated that \"Kuan-Yin eventually revealed himself to be a duplicate of the X-Men's nemesis Magneto, a transformation believed to have been caused", "took her to their desert headquarters, with the X-Men in pursuit. The psyche-generator awakened her mutant powers and Mesmero named her \"Queen of the Mutants\".\nWhen the X-Men attempted to rescue her, Magneto revealed himself as the leader of the group behind her abduction—and, more importantly, claimed to be Lorna's father. Despite the X-Men's assertions that Magneto is evil, Lorna could not bring herself to fight her own father. Iceman returns from meeting with her foster parents who told him that her birth parents had died in a plane crash years earlier. This information caused Lorna to turn against", "Magneto is shown fighting Iceman during a flashback in \"Cold Comfort\". It may be possible that only Iceman knows him since he was not present in \"Enter Magneto\" and was the only one fighting Magneto in the flashback. X-Men: Evolution Magneto's voice was provided by Christopher Judge in the animated television series X-Men: Evolution.\nDuring the show's first season he is a shadowy, mysterious manipulator where the X-Men, except for Professor Xavier, do not know of his existence, until the first X-Man, Wolverine, figures it out, although Magneto becomes a more direct threat from the first-season finale. In the first season", "learning about them for the first time, to his fellow students' surprise. He decides that the New X-Men should beat them up, with himself fighting Hulkling. Fellow students Loa and Anole tell him that Hulkling would win.\nRockslide accompanied the X-Men when they jumped from the Blackbird to save Cessily from the Facility. He helped with great enthusiasm during the fight, and in the aftermath, made fun of Shadowcat and her powers, saying that being an X-Man must be \"really hard\". Kitty then jokingly threatened to kill him. Quest for Magik Santo and the other students were captured by Belasco, and", "is the authority most of the Marvel superhero community turns to for advice on mutants. Despite this, his status as a mutant himself and originator of the X-Men only became public during the 2001 story \"E Is for Extinction\". He also appears in almost all of the X-Men animated series and in many video games, although usually as a non-playable character because of his disability. Patrick Stewart plays him in the 2000s film series, as well as providing his voice in some of the X-Men video games (including some not connected to the film series).\nAccording to BusinessWeek, Charles Xavier is" ]
Why does Bayern Munchen/Munich have the 2 names, and which one is "correct"?
[ "Its official German name is \"Fußball-Club Bayern, München e.V.\", normally abbreviated to \"FC Bayern München\" or just \"Bayern München\".\n\n\"München\" is the name of the city -- its German name. To English-speaking people, the city is better known as \"Munich\", so in English-speaking countries the club is known as \"Bayern Munich\". That's not its official name, but the English version of the abbreviation of its official name.\n\nOf course, \"Bayern\" is German for \"Bavaria\", so you might expect the English name to be \"Bavaria Munich\". But English-speakers have no problem pronouncing \"Bayern\", so it's left as it is. \"München\", on the other hand, is really difficult for English-speakers: the sound written \"ch\" does technically exist in most English dialects but never in the middle of a word like this; while the sound written \"ü\" doesn't exist in English at all. As a result, English-speakers simply can't pronounce \"München\" correctly.\n\nIf you're in any doubt as to the \"correct\" form, just look at [their logo](_URL_0_pics/logos/fcb.png) on their [official website](_URL_0_). However, to avoid embarrassing yourself, unless you speak German well, it's probably best to just stick with saying \"Bayern Munich\".", "Bayern is English for Beieren. Beieren is a province located in the south of Germany. Munich is English for München. München is a city located in the province of Beieren.", "Bayern is the south-eastern most German state, Munich is its capital.\n\nI assume you are asking about the soccer club.\n\nThat is named Bayern Muenchen, because there are more than 1 soccer club in Bayern. It explicitly refers the the city it is in, aka Muenchen.", "FC Bayern München is the official name; FC Bayern is frequently used as well. If you're not a fan, there are various other names for them depending on who you are a fan of." ]
[ "Au (Munich) Au is a district in the south eastern plain tract of the German city of Munich in Bavaria. Au extends from the Deutsches Museum in the north and along the Isar up to Wittelsbacherbrücke (Wittelsbacher Bridge) in the south.\nIn the centre of the area the Auer Dult takes place three times a year on the Mariahilfplatz, which is the largest annual market in Munich.\nBordering boroughs of the city are Ludwigsvorstadt-Isarvorstadt and Altstadt-Lehel on the western side of the Isar, Untergiesing-Harlaching in the south and Giesing in the south-east. The Haidhausen district lies to the east and along with", "Giselastraße (Munich U-Bahn) Name The station is named after the nearby Giselastraße, running from Leopoldstraße eastward towards the Englischer Garten. The stretch of Ludwigstraße between Universität station at Siegestor in the south and Münchner Freiheit in the north as well as its side streets are part of Munich's Schwabing bar scene (although the \"real\" cliché Schwabing is actually part of the borough of Maxvorstadt, along Türkenstraße and Schellingstraße, east of the university.)", "ten list of 2005. James Berardinelli wrote that \"Munich is an eye-opener – a motion picture that asks difficult questions, presents well-developed characters, and keeps us white-knuckled throughout.\" He named it the best film of the year; it was the only film in 2005 to which Berardinelli gave four stars, and he also put it on his Top 100 Films of All Time list. Entertainment Weekly film critic Owen Gleiberman mentioned Munich amongst the best movies of the decade. Differently, Rex Reed from New York Observer belongs to the group of critics who didn't like the film: \"With no heart,", "Bavarian Film Awards (Best Acting) The Bavarian Film Awards (German: Bayerischer Filmpreis) have been awarded annually since 1979 by the state government of Bavaria in Germany. They are among the most highly regarded awards for filmmaking achievement in Germany. There are several categories for actors and actresses.", "Bavarian Group Administration The Bavarian Group Administration or Gruppenverwaltung Bayern was a largely autonomous railway administration within the Deutsche Reichsbahn (German Imperial Railways) between the two world wars. It was formed on 1 April 1920 from the former Bavarian State Railways, and was unique, Bavaria being the only former German state to have such status after the merger of the seven state railway companies into the Reichsbahn. The rest of Germany was simply divided into various regional Reichsbahn railway divisions.\nThe Bavarian Group Administration itself also had four railway divisions: Augsburg, Munich, Nuremberg and Regensburg which reported to it and not,", "Dillmann.\nOn 30 October 1999, the name was officially changed to Deutsches Filminstitut - DIF. In January 2006 the organisation merged with the Deutsches Filmmuseum (\"German Film Museum\"), also based in Frankfurt am Main.", "Central Bavarian Differences There are noticeable differences in the language within the group, but changes occur along a west-east dialect continuum on both sides of the historic border of the Bavarian stem duchy with the later Duchy of Austria. That means that the distinct languages of Vienna and Munich are very different from each other, but the dialects of any two neighboring towns in between will be quite similar. However, due to influences of the corresponding political centers, discontinuous change is nowadays noticeable along the national border between Austria and Germany.\nGenerally, Viennese has some characteristics differentiating it from other Bavarian", "Karlsplatz (Stachus) Stachus is a large square in central Munich, southern Germany. The square was officially named Karlsplatz in 1797 after the unpopular Charles Theodore, Elector of Bavaria. Munich natives seldom use that name, calling the square instead Stachus, after the pub Beim Stachus, once owned by Eustachius Föderl, that was located there until construction work for Karlsplatz began. Even the U-Bahn and S-Bahn announcements use the unofficial name. Architecture The most important buildings dominating the square are on the east side of the Karlstor, a gothic gate of the demolished medieval fortifications together with the rondell buildings on", "Tal (Munich) The Tal is a street in the old town of Munich.\nThe Tal extends over a length of 500 meters between the Old Town Hall on Marienplatz in the west and Isartor in the east. The Tal was therefore a part of the Salzstrasse, which led from Salzburg or Bad Reichenhall through Munich and Landsberg on the Lech to Switzerland. The street was located outside the first medieval city wall, which is why it starts at the Holy Spirit Church, which was used as the church for the first Munich hospital and was consciously constructed outside the walls. The", "Dachauer Straße The Dachauer Straße is the longest street in Munich with a length of 11.2 km and is received its named since it is the connecting road to Dachau Palace. In the north of Munich, it is part of the Bundesstraße 304. Route The Dachauer Straße begins today as a track-leading street of the tram lines 20 and 21 north of the Bahnhofplatz in the district of Maxvorstadt. Until 1877, the southern part of today's Dachauer Sraße to the height of Marsstraße was still part of the Schützenstraße. From Hirtenstraße, the Dachauer Straße then also serves for use by motor", "Bavarian Maximilian Railway The Bavarian Maximilian’s Railway (German: Bayerische Maximiliansbahn) was as an east-west line built between the Bavarian border with Württemberg at Neu-Ulm in the west via Augsburg, Munich and Rosenheim to the Austrian border at Kufstein and Salzburg in the east as part of the Royal Bavarian State Railways. The Munich–Augsburg section of the line had already been built by the Munich-Augsburg Railway Company and opened in 1840. The line was named after the reigning King of Bavaria from 1848 to 1864 Maximilian II. History Relatively late for a German state, Bavaria decided in around 1851 to complete", "after the fall of the Austro-Hungarian Empire in the First World War. It coincided with the rise of another new term, \"the Sudetenland\", which referred only to the parts of the former Kingdom of Bohemia that were inhabited predominantly by ethnic Germans. These names were derived from the Sudeten Mountains, which form the northern border of the Bohemian lands. As these terms were heavily used by the Nazi German regime to push forward the creation of a Greater Germanic Reich, many contemporary Germans avoid them in favour of the traditional names. Middle Ages and early modern period There have been", "Zweibrücken Name The name Zweibrücken means 'two bridges'. Older forms of the name include Middle High German Zweinbrücken, Latin Geminus Pons and Bipontum, and French Deux-Ponts, all with the same meaning. History The town was the capital of the former Imperial State of Palatinate-Zweibrücken owned by the House of Wittelsbach. The ducal castle is now occupied by the high court of the Palatinate (Oberlandesgericht). There is a fine Gothic Protestant church, Alexander's church, founded in 1493 and rebuilt in 1955.\nFrom the end of the 12th century, Zweibrücken was the seat of the County of Zweibrücken, the counts being descended", "Neuhausen-Nymphenburg Neuhausen and Nymphenburg are boroughs of Munich, the capital of the German state of Bavaria. They had been merged into the borough 09 - Neuhausen-Nymphenburg (German: Stadtbezirk 09) in 1992. For further information on the Munich boroughs, see: Boroughs of Munich. Location Nymphenburg borders in the north-west on Obermenzing, in the southwest on Pasing in the north on Moosach and in the southeast on Neuhausen.\nThe borough 09 ranges from the Mars-field at the inner edge of town to the Nymphenburg Palace in the west and extends from the Olympic Park over the villa colony in Gern to the railway", "the lion, laurels and filmstrip. All the elements of the logo were re-built in 3-D and then placed on different planes to add dimensional layers and drama. The 1995 roar is reused once again as Leo roars and the company name is brought in from above to center the top screen, which completes the logo sequence. MGM's website address was removed, as MGM is no longer as of 2012 a self-distribution entity, but rather a production company. This logo was first used in the 2012 film Skyfall. Secondary MGM logo MGM also used a secondary logo, seen in the opening", "Weser Etymology Linguistically, the names of both rivers, Weser and Werra, go back to the same source, the differentiation being caused by the old linguistic border between Upper and Lower German, which touched the region of Hannoversch Münden.\nThe name Weser parallels the names of other rivers, such as the Wear in England and the Vistula in Poland, all of which are ultimately derived from the root *weis- \"to flow\", which gave Old English/Old Frisian wāse \"mud, ooze\", Old Norse veisa \"slime, stagnant pool\", Dutch waas \"haze; soggy land\" (see Waasland), Old Saxon waso \"wet ground, mire\", Old High German wasal", "since 1975 part of Mönchengladbach. Odenkirchen remained a separate district within Mönchengladbach until 2009, when it was merged into the larger Mönchengladbach Süd city district.\nThe name Odenkirchen may derive from the Low German for either \"wooden church\" or \"old church\". Alternatively it may be from the given name Odo. Odenkirchen was in use as a locational surname from at least the 18th century (anglicized as Odenkirk in the United States from the early 19th century).", "by Ahn. The title refers to the director's 2004 Korean film, Bunshinsaba, though none of the films in the trilogy bear any resemblance to it. It starred Xin Zhilei, Park Han-byul, Zhang Haoran, Sienna Li, Sun Shaolong, Yang Fan, and Zhang Tingting. It is almost a shot-for-shot remake, aside from the setting, language, and actor changes, a few details (Hyun-jun previously played baseball, whereas his Chinese counterpart, Hongrui, played tennis), and an additional scene that pays homage to the 2004 film Bunshinsaba.", "the name \"Czechvar\". In other territories, one or other or even both may use the name, depending on local trademark law. Background Beer brewing in the city of České Budějovice (German: Budweis), which was then in the Kingdom of Bohemia and is now in the Czech Republic, dates back to the 13th century, when the city was granted brewing rights during the reign of Ottokar II of Bohemia. During the time when both Czech and German were official languages in the kingdom, two breweries were founded in the city. Both breweries made beer which they called \"Budweiser\", similar to how", "Altstadt-Lehel Altstadt and Lehel are districts of the German city of Munich. Together they form the first borough of the city: Altstadt-Lehel. Location The borough covers the historical area of Altstadt (as defined by the Altstadtring) and the Lehel area, which is attached to Altstadt via the north east. It also covers the Isar in the east and the Englischer Garten as well as Prinzregentenstraße, bordering it in the north. History \"(The) Lehel\" (with locals, the article will never be missing) is regarded \"the oldest suburb of Munich\"; it was, however, officially incorporated into the city as of 1724 only.\nLehel", "Bühl (Baden) Etymology The word Bühl is derived from Old German \"puhil\" and Middle German \"buhel\", meaning \"hill\". The three yellow hills on blue ground seen on the coat of arms (already displayed in the court seal of Bühl in 1324) confirm this interpretation.\n \nTo distinguish Bühl from other towns named Bühl, not only in Germany, but other German-speaking countries like Switzerland and Austria, the town used the denominator Bühl (Baden) or Bühl/Baden, clearly identifying Bühl in the Margravate of Baden (Baden) and later in the Grand Duchy and the State of Baden. With the unification of Baden, Hohenzollern and", "is divided into four parts: The upper quarter shows the double eagle and signifies the affiliation to Austria. The lower quarter contains the \"Bavarian Wecken\" - white-blue rhombuses - and indicates that the town originally belonged to Bavaria.\nIn the left quarter is the laced boot, which was also on the older coat of arms and refers to the founding legend of the city. The tendrils in the right quarter were also in the original coat of arms and refer to the importance of the city as a centre of brewing. Twin city Since 1974, the Bavarian city of Landshut has", "three names: one for the Microsoft player, one for a hypothetical Sony player, one for \"a broadband experience for MTV.\" He refused to tell the San Francisco Chronicle which team came up with \"Zune\", the name Microsoft chose. Placek said the name was chosen because the \"Z\" was perceived as fun and irreverent, it has one syllable compared with iPod's two, and it has a musical sound that rhymes with iTunes, Apple's media distribution platform. Controversies arose due to similarities between the name and vulgar words in Hebrew and Canadian French. In 2008, Lexicon came up with the name of", "Miller, a story artist on the first film and a head of story on the second, and co-directed by Raman Hui, a supervising animator on the first two films.\nThe film was developed under the working title of Shrek 3. By March 2006, the title of the film was changed to Shrek the Third. According to Miller, the reason behind the title change was because they \"didn't want to just sort of title it like it was just a sequel,\" instead they wanted \"something to make it stand on its own, give it its own personality and really try to treat", "print logo, which had been introduced in 1992.), The website address was also shortened to, \"MGM.COM\". The lion's roar was remixed once again by sound editor Eric Martel, maintaining most of the original 1982 sound elements. However, beginning with The Taking of Pelham 123 (2009), the 1995 roar was reused. The newly-done logo debuted with the release of the James Bond film Quantum of Solace.\nIn 2012, Shine Studio was chosen to redesign and animate the logo in stereoscopic 3-D (three-dimensional). Shine modeled a close up of Leo's eye creating an element to pull back through for a dramatic reveal of", "Isarkreis History In the years between 1806 and 1808 the Kingdom of Bavaria was divided into 15 districts. Their names were taken from their main rivers.\nThe Isarkreis, with Munich as its capital, was initially composed of 14 rural divisions and, since 1809, of the independent cities of Munich and Landsberg.\nIn 1810, the Isarkreis was expanded. In 1817, there was another reshuffle; some areas were added and other ones given to the Upper Danube District (Oberdonaukreis). In another territorial reorganization initiated by King Ludwig I on 29 November 1837, the Isarkreis was renamed Upper Bavaria (Oberbayern).", "Orkla (river) Name The Old Norse form of the name was just Ork (still found in the names Orkanger, Orkdal and Orkland). The meaning of the name is unknown (maybe derived from the verb orka which means \"to work\" - the meaning of the name would then be \"the river that works its way forward\"). The name Orkla (with the diminutive ending -la) originally belonged to the uppermost part of the river (lying in Tynset, Hedmark), and the meaning of this name is probably \"the small part of Ork\".", "within the oblast. Nomenclature Most of Ukraine's oblasts are named after their capital cities, officially referred to as \"oblast centers\". The name of each oblast is a relative adjective, formed by adding a feminine suffix to the name of respective center city: Kiev (Kyiv in transliterated Ukrainian) is the center of the Kyivs’ka oblast' (Kiev Oblast). Most oblasts are also sometimes referred to in a feminine noun form, following the convention of traditional regional place names, ending with the suffix \"-shchyna\", as is the case with the Kiev Oblast, Kyivshchyna.\nKiev is the traditional English name for the administrative center of", "Oberding Geography Oberding is located in the Munich area in the middle of Erdinger Moos between the rivers Sempt and village. The village is located about 6 km north-west of the county Erding, 17 km south of Freising and 36 km from the state capital Munich in the immediate vicinity of the Munich Airport. Waters The Middle-Isar-channel and the river village, both flow in roughly a north-south direction. History The region was part of the Electorate Bavaria, forming a closed Hofmark of cathedrals of Bishopric of Freising, with the Bishopric in 1803 deleted. In the course of administrative reform, the Bavaria was given", "Maria-Josepha-Straße Maria-Josepha-Straße is a street in Munich's Schwabing district. It runs west of the Englischer Garten from Dillisstraße, or the Nikolaiplatz to the corner of Mandlstraße/Königinstraße, and forms the southern edge of the heritage-protected building ensemble Alt-Schwabing. The name of the street came from Maria Josepha of Portugal, the second wife of Karl Theodor, Duke in Bavaria. The renaming of the street from its originally name, Wiesenstraße, took place in the course of 1891 and was carried out with the incorporation of Schwabing to Munich. Countless streets of the Altschwabinger village center were then given new addresses and names. According" ]
Where do TV ratings come from?
[ "The main ratings firm is the Nielsen Company. Hence the term Nielsen ratings.\n\nThis works basically the same way a political poll works. There are statistical methods for looking at the way a small number of people answer a question and figuring out how the population as a whole would answer it. Just like they don't have to ask *everyone* who they're going to vote for to figure out that President Obama polls at X percent while Mitt Romney polls at Y percent, they don't have to count every single person watching a program to say this many people watched it.\n\nThey pick a sample the same way pollsters do. In this case people sign up to be \"Nielsen families\" and they're given a diary. They're supposed to track when someone is watching TV and what they're watching, and then report that information back to the Nielsen Company, who figures out how many of their sample are watching a show and then work out how many people that compares to across the whole country using a lot of statistics and math.\n\nOne problem with this method is that it relies on the families to tell the truth, and sometimes they don't. Nielsen also uses electronic monitors that track what channel the TV is tuned to, and even has experimented with cameras that would confirm whether the TV's just on in an empty room or whether there are actually people in there watching it." ]
[ "Nielsen ratings Nielsen TV ratings (commonly referred to as \"Nielsen ratings\") are the audience measurement systems operated by Nielsen Media Research that seek to determine the audience size and composition of television programming in the United States using a rating system.\nNielsen Media Research was founded by Arthur C. Nielsen, a market analyst who started his career in the 1920s with marketing research and performance analysis. The company expanded into radio market analysis in the late 1930s, culminating in the Nielsen Radio Index in 1942, which was meant to provide statistics as to the markets of radio shows. The first", "of television in a particular demographic area.\nPUTs is calculated by considering the average audience figures gauged from the peopleometer, for all channels during a particular time period and adding them together to get the cumulative number. Put is used to calculate the demographic persons rating. Almost all media scales are technically based on person's ratings. It is observed that the percentage rating remains constant from year to year. If changes are observed, then they are slight in nature and only due to changes in viewing habits. PUT and PVT Persons Using Television (PUT) and Persons Viewing Television (PVT) are both", "with television viewing not to be restrained to be \"home-watched\". Internet measurement is taken to the next level through its sophistication and high tech distribution. This allows several audiences measurement companies to refer to the Internet as the most measurable media. Ratings point Ratings point is a measure of viewership of a particular television programme.\nOne single television ratings point (Rtg or TVR) represents 1% of television households in the surveyed area in a given minute. As of 2004, there are an estimated 109.6 million television households in the United States. Thus, a single national ratings point represents 1%, or 1,096,000", "Nielsen household rating. Nielsen ratings are audience measurement systems that determine the audience size and composition of television programming in the United States, which means that the episode was seen by 1.5 percent of all households in the country at the time of the broadcast. The episode was the 2nd most-watched Cartoon Network program on the night it aired. The episode first saw physical release as part of the 2014 The Suitor DVD, which included 16 episodes from the series' first through fifth seasons. It was later re-released as part of the complete fifth season DVD in July 2015.\nSava awarded", "Television ratings in Australia Measurements In Australian media, the most common ratings metric reported publicly is total viewers of a program from all age groups. However, advertisers typically prefer the viewership of demographic ranges based on the type of viewers they are seeking to promote their product to. The three common aged-based demographic groups, known as the 'key demographics,' include people aged 16 to 39, 18 to 49 and 25 to 54.\nIn advertising and media, the reporting of ratings has historically been confined to what is known as '5 city metro,' which only includes viewership of the OzTAM panels in", "rating point represents one percent of the total number of television sets in American households, and a share means the percentage of television sets in use tuned to the program.", "television households for the 2004–05 season. When used for the broadcast of a program, the average rating across the duration of the show is typically given. Ratings points are often used for specific demographics rather than just households. For example, a ratings point among the key 18- to 49-year-olds demographic is equivalent to 1% of all 18- to 49-year-olds in the country.\nA Rtg/TVR is different from a share point in that it is the percentage of all possible households, while a share point is 1% of all households watching television at the time. Hence the share of a broadcast is", "of 10.1, with a 14 share. Nielsen ratings are audience measurement systems that determine the audience size and composition of television programming in the U.S. This means that roughly 10.1 percent of all television-equipped households, and 14 percent of households watching television, were watching the episode. In the U.K., \"The Sixth Extinction II: Amor Fati\" was seen by 840,000 viewers, making it the channel's third-most watched program for that week after episodes of The Simpsons and Friends. On May 13, 2003, the episode was released on DVD as part of the complete seventh season. Two years later, the episode was included on The X-Files Mythology,", "TV Parental Guidelines The TV parental guidelines are a television content rating system in the United States that was first proposed on December 19, 1996, by the United States Congress, the television industry and the Federal Communications Commission (FCC), and went into effect by January 1, 1997, on most major broadcast and cable networks in response to public concerns about increasingly explicit sexual content, graphic violence and strong profanity in television programs. It was established as a voluntary-participation system, with ratings to be determined by the individually participating broadcast and cable networks.\nThe ratings are generally applied to most television series,", "applied to television. Today, these are commonly referred to as \"Nielsen ratings\".\nThe company began measuring television audiences in 1950, at a time when the medium was just getting off the ground. Just as with radio, a sampling of homes across the U.S. was used to develop ratings. This information was collected on a device that was attached to a television that recorded what was being watched. In 1953, the company began sending out diaries to a smaller sample of homes (\"Nielsen families\") within the survey to have them record what they had watched. This data was put together with information", "Content rating A content rating (also known as maturity rating) rates the suitability of TV broadcasts, movies, comic books, or video games to its audience. A content rating usually places a media source into one of a number of different categories, which tell what age group is suitable to view said media. The individual categories include the stated age groups within the category, along with all ages greater than the ages of that category.", "49-year-old demographic. Nielsen ratings are audience measurement systems that determine the audience size and composition of television programming in the United States, which means that the episode was seen by 0.3 percent of all households aged 18 to 49 years old were watching television at the time of the episode's airing. The network released the episode on DVD, first in 2012, as part of the It Came from the Nightosphere box set, and later in 2013, as part of a box set for the complete second season.\nCharlie Jane Anders of io9 itemized the episode in a list of fictional depictions", "Persons using television Calculation It is a term coined by Nielsen Media Research. It refers to the total number of people in a particular demographic area, that are watching television during a given time period. Nielsen defines “PUT as a percentage of the population or as a number that represents the thousands of persons viewing television.” The formula used to calculate PUT is similar to HUT [Houses Using Television]\nPUT = (Rating / Share) x 100\nNielsen's formula for PUT is the number of persons viewing TV divided by the total persons universe i.e. the television rating divided by the total share", "earned a Nielsen household rating of 9.1, with a 13 share. Nielsen ratings are audience measurement systems that determine the audience size and composition of television programming in the U.S. This means that roughly 9.1 percent of all television-equipped households, and 13 percent of households watching television, were watching the episode. It was viewed by 15.35 million viewers in the United States. On May 28, 2000, the episode debuted on Sky 1 in the United Kingdom and gathered 0.68 million viewers, making it the eighth most watched program shown on Sky 1 that week, in front of Angel and The Simpsons. The", "that are recorded for replay at a different time), rendering the \"raw\" numbers useless from a statistical point of view. Even in 2013, it was noted that Internet streams of television programs were still not counted because they had either no ads (such as Netflix) or totally different advertising (such as Hulu) than their television counterparts, effectively skewing the raw data on a show’s popularity.\nA related criticism of the Nielsen ratings system is its lack of a system for measuring television audiences outside homes, such as college dormitories, transport terminals, bars, prisons and other public places where television is frequently", "Nielsen ratings for radio programs were released the first week of December 1947. They measured the top 20 programs in four areas: total audience, average audience, cumulative audience, and homes per dollar spent for time and talent.\nIn 1950, Nielsen moved to television, developing a ratings system using the methods he and his company had developed for radio. That method became the primary source of audience measurement information in the US television industry. Ratings/share and total viewers The most commonly cited Nielsen results are reported in two measurements: ratings points and share, usually reported as: \"ratings points/share\". There were 119.6 million TV", "have been used to calculate a portion of television ratings. The rise in various devices currently available for viewers to access television content on has caused for the traditional Nielsen ratings system to become outdated and thus no longer capable of generating an accurate depiction of viewership. Functions such as online viewing, recorded DVR content, and live streams over the Internet are not taken into account when calculating television ratings. The Nielsen Media Research took a survey at the end of 2009 which concluded that 59% of Americans simultaneously watched television and accessed the internet at least once per month,", "example, Nielsen may report a show as receiving a 4.4/8 during its broadcast; this would mean that 4.4% of all television-equipped households (that is to say homes with a TV set, not total number of people), regardless of the TV being on or not, were tuned in to that program, while 8% of households that were watching TV at that time were watching the specific program.\nBecause ratings are based on samples, it is possible for shows to get a 0.0 rating, despite having an audience; the CNBC talk show McEnroe was one notable example. Another example is The CW show,", "episode was viewed by 2.21 million viewers, making it the top-rated Cartoon Network series during the week of May 6–12. The episode scored a 1.4 Nielsen household rating. Nielsen ratings are audience measurement systems that determine the audience size and composition of television programming in the United States, which means that the episode was seen by 1.4 percent of all households watching television at the time of the airing. The episode first saw commercial release as part of the 2014 The Suitor DVD, which included 16 episodes from the series. It was later re-released as part of the complete fifth", "that it was \"contemporary and no where near as good\". In one notably positive review, The New York Times called the show \"one of television’s rare examples of successful farce.\" U.S. Nielsen ratings In the following chart, \"rating\" is the percentage of all households with televisions that tuned to the show, and \"share\" is the percentage of all televisions in use at that time that are tuned in. \"18–49\" is the percentage of all adults aged 18–49 tuned into the show. \"Viewers\" are the number of viewers, in millions, watching at the time.\nUnless otherwise cited, the overnight rating and share", "rating would survive. In addition, the Nielsen ratings encouraged a strong push for demographic measurements. This caused problems with households that had multiple television sets or households where viewers would enter the simpler codes (usually their child's) raising serious questions to the quality of the demographic data. The situation further deteriorated as the popularity of cable television increased the number of viewable networks to the extent that the margin of error has increased, because the sampling sizes are too small. Compounding matters is that of the sample data that is collected, advertisers will not pay for time shifted programs (those", "of households watching television were tuned in. Nielsen ratings are audience measurement systems that determine the audience size and composition of television programming in the United States. It was viewed by 18.68 million viewers. \"The Post-Modern Prometheus\" was the eleventh most watched television program for the week ending November 30. Reviews \"The Post-Modern Prometheus\" received generally positive reviews from critics. Mike Duffy, a Knight Ridder correspondent, wrote a largely positive article on the episode, noting that although the episode was special, this did not make it feel like a gimmick. He wrote, \"when most shows blow promotional smoke about 'a very special", "and television guide data. One is a more traditional Channels menu that allows viewing shows by channel. Moxi also provides an assortment of category menus that only contain certain types of TV shows, such as HDTV, Movies, Sports, Kids, News, and Music. Also, a Favorites category automatically populates with the channels watched most frequently.\nBy default, users can view program titles for multiple TV channels simultaneously, but, except for the currently selected or displayed channel, only for one time slot at a time. For the currently selected or displayed channel, the next three shows and their times are displayed in a", "TV by the Numbers Impact According to one source, much of the information Gorman and Seidman had access to was not readily available to the media, and thus their efforts to analyze the data led to many \"savvy readers\" becoming interested in the workings of the ratings process.\nTV by the Numbers has been cited by such media outlets as CNN, the Associated Press, National Public Radio, and former sister publication the Chicago Tribune. Harry's Law TV by the Numbers received criticism from several facets of the television industry for their ratings analyses. Harry's Law star Kathy Bates publicly bashed the", "the percentage of all persons in a certain viewing area that are viewing television during a specific time period. The difference is that PVT term is used especially by Arbitron. It is a kind of persuasion process used to influence audience, a fundamental part of various advertising terms. (PVT) is used especially to denote the TV ratings in relation to the persuasion process involving the process of advertising influence which is intended to change the audiences' or prospects' attitudes and purchase behavior.", "ratings in Australia. OzTAM OzTAM is an Australian television ratings research firm that collects and markets news rating data. It is jointly owned by the Seven Network, the Nine Network and Network Ten, and is the official source of television news ratings data for all metropolitan television in Sydney, Melbourne, Adelaide, Brisbane and Perth as well as subscription services (such as Sky News Australia) on a national basis. Regional TAM Regional TAM is a research firm that provides the television news ratings for regional television markets with three commercial television operators. Nielsen Media Research Australia Nielsen Media Research Australia is", "and advertising agencies subscribe to this paid service, because ratings are key in the broadcast industry. Ad agencies generally purchase radio based on a target demographic. For example, their client may want to reach men between 18 and 49 years old. The ratings enable advertisers to select a specific segment of the listening audience and purchase airtime accordingly. Ratings are also referred to as \"numbers\" in the business.\nThe numbers can show who is listening to a particular station, the most popular times of day for listeners in that group, and the percentage of the total listening audience that can be", "TV 33.8%, newspapers 20.2%, weekly periodicals 8.6%, radio 24.9%, cable internet 2.3%, and all other internet 10.2%. Within each media type, the number of outlets were assigned an equal market share. The summation of all media types for each owner was then squared and added to the index. Scores were determined for all markets with five or fewer television stations, all markets with 15 to 20 television stations, and ten randomly selected markets with between six and ten stations. The FCC then considered what would happen to scores under different ownership limit scenarios. In small sized markets, scores dramatically increased,", "episode was viewed by 2.273 million viewers and scored a 0.3 Nielsen rating in the 18- to 49-year-old demographic. Nielsen ratings are audience measurement systems that determine the audience size and composition of television programming in the United States, which means that the episode was seen by 0.3 percent of all households aged 18 to 49 years old were watching television at the time of the episode's airing. The episode first saw physical release as part of the 2012 It Came from the Nightosphere DVD, which included 16 episodes from the series' first three seasons. It was later re-released as", "These allow a bulk ratings number to be competed which allows for more homes to be calculated in a final rating, along with removing any in-house competition, with each of the networks carrying the same ceremony and same advertising. Another example is a \"roadblock strategy\", where a family of networks will air the premiere of a new series, music video or other event such as a telethon at the same time to maximize their audiences. During major breaking news events, a simulcast of the Fox News Channel is aired on the Fox broadcast network and Fox Business Network.\n\"Live Simulcast\" is" ]
What are the main differences between Republicans and Democrats in USA?
[ "full disclosure, I'm a registered democrat and this is a very loaded question, but VERY broadly:\n\nDemocrats tend to believe that the solution to problems lies in enabling (forcing) a community to come together to support the poorest/weakest individuals. They try to put policies in place that directly provide money or services to these people at the expense of the more wealthy members of society. The disadvantage is that it puts a disproportionate burden on the wealthy, since they have to pay not only to support their families but also contribute to poorer families. Any system or policy put in place at a government level can be gamed, and it also carries a certain level of inefficiency and bureaucracy. Additionally, individuals don't get to choose which parts of their taxes to pay, so if you don't care about the arts and don't want to support them, a portion of your taxes will still go to fund them. The advantage is that these policies provide greater opportunity for people to rise from poorer classes. People born into poor homes start off with disadvantages - just a few examples would be that they can't afford high-quality food, have to attend schools with less funding, and are more likely to grow up with domestic violence. As a result, they are less likely to go to a good college, and thus less likely to get a good job. The deck is stacked against them, and democrats aim to fight that a little bit, arguing that even if their policies are imperfect, they are worth it.\n\nRepublicans believe that these policies should be limited in order to keep them as efficient as possible. They believe that what you earn should belong to you, and that good people will help the poor anyways, but that forcing you to fund certain programs that you may not agree with isn't fair. The argument is that the \"American dream\" means coming from nothing and making something of yourself, and if you do that then you deserve to reap all the benefits of your determination and hard work. They also argue that rich people and wealthy companies have more money to hire workers, which therefore creates jobs. The disadvantage of this is that once someone is rich, their kids tend to do better, and poor people are stuck by the wayside; a few people climb the ladder but it becomes increasingly difficult to do that, so it is advantageous to the people already in power and harmful to others. The advantage is that wasteful spending is reduced and people can choose what to fund rather than having the government decide for them.\n\nThe Tea Party has become a big part of the Republican party, but it's actually quite unique and I think it should be separated out. The Tea Party is vehemently opposed to a lot of government policies. Think Republicans on steroids. However, the Tea Party relies on sensationalizing false facts and figures to make their case. For example, many Tea Party politicians state that the US was founded as a Christian nation, which is explicitly NOT true according to writings from the founding fathers. They often say that programs cost more than they actually do or blame the current administration for policies that were actually created under the previous administration. They do not seem to fact check most of their claims, but they say them convincingly and people assume they know what they're talking about. They refuse to compromise on legislation (which completely obstructs the process of creating laws), and thus make congress unable to get things done, and then use the fact that congress isn't doing anything as evidence when they complain that government is broken.\n\nHistorically, Republicans and Democrats have been able to work out their differences to pass programs that are in the public interest while keeping them small enough to minimize their impact on your paycheck. A great example is Medicare, which was passed with bipartisan support in 1965 and helps us pay for care for the people over 65, which is the time when care is most expensive and also the time when people are not working and thus won't have insurance through their employer.\n\nThe parties have been growing apart for a while, but the advent of the Tea Party in the last several years has really highlighted their differences, and forced Democrats to be the party of \"Big Government\" and Republicans to be the party of \"Rich Privilege\". The people we elect to congress are increasingly more extreme on both sides, so it's harder to reconcile differences and work together to govern.", "Well first off, today's modern republican is the most conservative they've been in about four decades. They've also evolved multiple layers like Neoconservative. Also, things like homosexuality have nothing to do with conservatism; those are religious views; which HAPPEN to be held by republicans and certain branches of both parties have infused religion into their party. Also, for funsies, the nation did an about face during the civil rights movement. sixty years ago, the south would have NEVER voted for a republican...ever; but, due to varying civil rights acts being supported; which they weren't huge fans of, they switched parties, and Yes, there was a meeting (no, there really wasn't) But there was. (Not really).\n\nRepublicans: They think taxes should be lower and that many things such as healthcare, education, legal application of laws, etc...should be decided by the states, not the national federal government. They do not support many of the social safety nets like welfare, food stamps, medicaid (healthcare for the poor), etc.. They believe that you should work for what you receive and that government is not helpful in cases like this; nor is it a nanny, hence the term \"nanny state. Ideally, they hold this opinion not out of being selfish; but, each state is different and should be governed under that premise. They believe in tax breaks for all, figuring the money everyone gets back will be pumped into the economy, expanding it. They think corporations should get subsidies and tax breaks because they figure the money they save will go into technology, new jobs, new locations, so forth. Now a days they may tend to be religious; but, that is not compulsory for being conservative. If they happen to be religious, they will tend to disapprove of abortion; but, in some cases approve of the death penalty (this is some; but, not all). They can also be quite hawkish and pro world involvement (pro-war). They also tend to believe in individual liberties versus the \"the needs of the many outweigh the needs of the few/for the greater good\" mentality. This leads to far less restrictive gun laws. Typically they believe in a literal translation of the constitution and if its not specifically stated there it doesn't need to be added and the states will sort it out. \n\nTL;DR: small national government involvement, low low low taxes, big state government, big military and no government involvement in the economy. \n\nDemocrats: They think that the government knows what its doing and that people can't just be left to their own devices. They want more government involvement; but, only to a certain point. Full on involvement would be socialism. Democrats are NOT socialists; or, communists. Those are their own parties with their own ideologies. The Democrats support most, if not all of the social safety nets. They believe in a far more structured tax system; believing that since we should all have equal access to the government as we need it, then those who earn more should pay more into it, on the basis that if there is no impoverished class, then society on the whole is lifted up economically (this has been proven to work in the Scandinavian countries). Since corporations exist in the US then they should be paying into its betterment; so there should be no havens, loopholes; or breaks for corporations. They tend to be more hands-off in terms of world affairs and the military. They do believe in a strong national defense; but, not to the detriment of social policy (healthcare/education); which they believe should be implemented by the national government. They believe in a loose translation of the constitution and that there is NO way the founders could have predicted a modern world; or, its problems. Just because something is not there it doesn't mean it can't be added; or done anyways. \nTL;DR: Big national government involvement in the economy and domestic social policy, higher taxes for those who can afford it, move the budget towards domestic policy such as education and healthcare so that it is open to those who can't necessarily afford it, they tend to not care, at least as where the government is concerned, about religion, they tend to be more open to equal rights and equality based on the premise \"the needs of the many outweigh those of the few\" \n\nThis is just a broad-strove overview. Each party has its far left and far right version of each of these. As time went on, new parties that became popular in the US attached themselves to these two large parties because they are the only two that ever get elected. Thats why the Tea Party adopted Republicans and socialists/communists adopted Democrats. Ideally each of these individual parties would be represented in congress; this would ease the ridiculous congressional stalemate of the past 12 years. Also, you can have a bible thumping democrat and a die hard atheist republican. In the past sixty years religion has been injected into politics, unnecessarily so, as there is a clear separation of church and state built into our governance. This would explain why both parties all of a sudden started randomly caring about abortion and homosexuality. This is a newer trend. You can easily have a republican who may have personal opinions on both; but, due to the fact they want limited national government, they will say it is none of the government's business. \n\nHope this helps, I tried to stay as neutral as possible.", "**On the Surface**\nThey oppose each other on most 'pop' issues to keep up appearances. Democrats prefer larger government programs that aid those that need a little extra help. Republicans prefer limiting government and putting the onus on the individual to advocate for and support themselves.\n\n**In Reality**\nNot very different. Obama has continued many of GWB's programs. They both hoard power and will band together to push out third parties (ex: they prevent third parties from joining sanctioned debates). They perpetuate business-as-usual and petty issues to remain in power (ex: they quarrel over details of bills rather than pushing for real reform of bloated and broken systems).", "Well, basically they try to take the opposite stance on every contentious issue. \n\nThere's really no strict overriding theme to either party, their beliefs are simply a mish-mash of ideas that come from years of trying to appeal to different voting blocs. If you really want to learn more, you should look it up by specific issue." ]
[ "Both Republican majorities in the House and Senate were held until the Democrats regained control in the mid-term elections of 2006. The Republican Party has since been defined by social conservatism, a preemptive war foreign policy intended to defeat terrorism and promote global democracy, a more powerful executive branch, supply side economics, deregulation, and support for the Second Amendment.\nA George W. Bush-Dick Cheney ticket won the 2000 and 2004 presidential elections. In the presidential election of 2008, the John McCain-Sarah Palin ticket was defeated by Senators Barack Obama and Joe Biden.\nThe Republicans experienced electoral success in the wave election of", "funding. Electoral politics In American politics, the Republican Party is the largest political party with some socially conservative ideals incorporated into its platform. Social conservatives predominantly support the Republican Party, although there are also socially conservative Democrats who break ranks with the party platform. Despite this, there have been instances where the Republican Party's nominee has been considered too socially progressive by social conservatives. This has led to the support of third party candidates from parties such as the Constitution Party, whose philosophies more closely parallel that of social conservatism. While many social conservatives see third parties as a", "Political positions of the Republican Party The platform of the Republican Party of the United States is generally based on conservatism, in contrast to the modern liberalism of the Democrats. The party incorporates moderates, sometimes described as establishment Republicans, and members of the Tea Party or Freedom Caucus, who have been described as populist, right-wing, and far-right. The Republican Party's conservatism involves support for free market capitalism, free enterprise, business, a strong national defense, deregulation, restrictions on labor unions, social-conservative policies, and traditional values, usually with a Christian foundation. The party is generally split on the issue of how to", "winner-take-all system of elections (with the exceptions of Nebraska and Maine).\nThe Democratic and Republican parties within a particular state may have a platform that departs from that of the national party, sometimes leading that state to favor one party in state and local elections and the other in Presidential elections. This is most evident in the Southern United States, where the state Democratic Party organizations tend to be more conservative than the national party, especially on social issues. Likewise, Republicans have elected a number of statewide officeholders in states that are solidly Democratic at the presidential level, such as", "The Republican Party is commonly known as the dominant right-wing national party, and the alternative Libertarian Party attracts some independent-leaning voters who tend to be more social liberal on social issues and fiscally conservative on economic policy. Suffrage The right of suffrage is nearly universal for citizens eighteen years of age and older. All states and the District of Columbia contribute to the electoral vote for president. However, the District, and other U.S. holdings like Puerto Rico and Guam, lack federal representation in Congress. These constituencies do not have the right to choose any political figure outside their respective areas.", "party is the most common ideological breakdown in such a system but in two-party states political parties are traditionally catch all parties which are ideologically broad and inclusive.\nThe United States has gone through several party systems, each of which has been essentially two-party in nature. The divide has typically been between a conservative and liberal party; presently, the Republican Party and Democratic Party serve these roles. Third parties have seen extremely little electoral success, and successful third party runs typically lead to vote splitting due to the first-past-the-post, winner-takes-all systems used in most US elections. There have been several examples", "ethnic minorities, the unmarried and union workers having shifted to the Democratic Party. According to a 2015 Gallup poll, 25% of Americans identify as Republican and 16% identify as leaning Republican. In comparison, 30% identify as Democratic and 16% identify as leaning Democratic. The Democratic Party has typically held an overall edge in party identification since Gallup began polling on the issue in 1991. In 2016, The New York Times noted that the Republican Party was strong in the South, the Great Plains, and the Mountain States. The 21st century Republican Party also draws strength from rural areas of the", "Independent Republican (United States) In the politics of the United States, Independent Republican is a term occasionally adopted by members of United States Congress to refer to their party affiliation. It is also used at the state level by individuals who loosely identify with the ideals of the national Republican Party but who choose not to formally affiliate with the party (i.e. chooses to be an independent). \nIndependent Republican is not a political party. Several elected officials, including members of Congress, have identified as Independent Republicans. It has generally been used by members of Congress who have considered themselves", "Citing the big tent nature of American political parties, he argues \"You can't just say that, because you’re a British Conservative, so you have to be a [U.S.] Republican. American politics isn’t contained in that way. Turn the clock back to the 1970s, and the Democrat Party went from the liberal Kennedy wing right through to the out-and-out racists in the Southern states. The Republican Party had its liberal wing – people like John Lindsay, Chuck Percy and Nelson Rockefeller.\"", "political issues within their party is a false assumption. Despite contrary beliefs, there are many liberal Republicans and conservative Democrats in the U.S. who have differing political beliefs within their parties. However, these voters most often align with their party because of the limited choice of candidates, and to do otherwise (i.e. vote for a third-party candidate) is perceived as a waste of time. Issue partisanship Despite various claims that argue American society is more polarized today than leading up to the U.S. Civil War, numerous scholars explain that much evidence shows there is a relatively stable public opinion on", "each House of the Arizona Legislature tends to have members with identical political philosophies, which is illustrated by the fact that the Republican party has two-thirds of the seats in each House. This produces, in effect, a \"two-house unicameral\" legislature.\nArizona's electoral districts are different from the majority of U.S. states, where larger state senate districts and smaller assembly districts have different boundaries encompassing different communities. The crossing of upper and lower house districts into a single voting constituency is found in only six other U.S. state legislatures: the Idaho Legislature, Maryland General Assembly, New Jersey Legislature, North Dakota Legislative Assembly,", "the Republicans becomes a centrist third party which has some representation in the House of Representatives, but had not won the presidency since James G. Blaine was held responsible for the loss during the Second Mexican War. Assistant Secretary of War Franklin D. Roosevelt referred to the Republicans as \"neither cold nor hot\", quoting the Book of Revelation. However, the Republicans would sometimes win electoral votes in the Midwest, especially when the Democrats and Socialists ran in close-contested elections. States and territories of the United States At the beginning of the Great War, there were 33 states in the Union.", "narrow Democratic majority, with 50 seats compared to the Republicans' 48. Both parties picked up seats from the other party, resulting in the same overall composition.", "not unheard-of opinion that the two mainstream American political parties are the same with different names. Often, this usage expresses the sentiment of ordinary citizens who see all politicians as serving the same special interests and make little distinction between the two parties.\nEarl Killian's U.S. political glossary defines the term as \"a portmanteau of the words \"Republican\" and \"Democrat\"...used to symbolize the one-party nature of U.S. politics, when it comes to issues on which the dominant parties of the two-party system agree....In this view...Republicrats is then the name of the single U.S. political party, and the Republicans and Democrats are", "of South Carolina, Billy Tauzin of Louisiana, Kent Hance and Ralph Hall of Texas and Richard Shelby of Alabama are examples of this. The influx of conservative Democrats into the Republican Party is often cited as a reason for the Republican Party's shift further to the right during the late 20th century as well as the shift of its base from the Northeast and Midwest to the South.\nInto the 1980s, the Democratic Party had a conservative element, mostly from the South and Border regions. Their numbers declined sharply as the Republican Party built up its Southern base. They were sometimes", "Indiana; (Chris Chocola, John Hostettler and Mike Sodrel), giving the Democrats a majority of the delegation again.\nHistorically, Republicans have been strongest in the eastern and central portions of the state, as well as the suburbs of the state's major cities. Democrats have been strongest in the northwestern and southern parts of the state along with the major cities. However, outside of Indianapolis, the Chicago suburbs, and Bloomington, the state's Democrats tend to be somewhat more conservative than their counterparts in the rest of the country, especially on social issues.", "the Republican Party hold a supermajority in the House, or three-fourths seats. There are 77 Republicans and 24 Democrats. Representation Originally, the House was apportioned according to a method spelled out in the state constitution, in which each county formed a legislative district. Representation was determined by taking the total population of the state, according to the most recent federal census, and that number was divided by one hundred, with the quotient equaling one ratio. Counties having a population less than one full ratio received one Representative; every county containing an entire ratio but less than two ratios was", "U.S. states. With almost 60% of the population identifying with or leaning towards the Republican Party, compared to less than 30% identifying with or leaning towards the Democrats, it is also the most solid Republican state, ahead of Idaho and Utah. In the 2012 presidential election, incumbent President Barack Obama received less than 28% of the votes, trailing Mitt Romney by more than 40 points.", "of the Republican Party. The Democratic Party made steady gains there, however, and in 1992, 1996, 2004, 2008 and 2012 all eleven Northeastern states, from Maryland to Maine, voted for the Democrats except New Hampshire leaned more Republican. The same trend can be observed on the West Coast and Upper Midwest (excluding The Dakotas and including Illinois and Iowa) of the nation, as they shifted from solidly Republican and swing-states, respectively, to a change in political party strength. \"Southern strategy\" today Although Republicans gradually began doing better in presidential elections in the South starting in 1952, Republicans did not finish", "States Congress since 1856. The Democratic Party positions itself on the left of the left–right political spectrum in American politics and supports a modern American liberal platform, while the Republican Party positions itself on the right of the spectrum and supports a modern American conservative platform.\nThird parties and independent voters have achieved relatively minor representation from time to time at local levels. The Libertarian Party is the largest third party in the country, claiming more than 250,000 registered voters in 2013; it generally positions itself as centrist or radical centrist and supports a classical liberal position. Other contemporary third parties", "as many local commentators who support Republican causes while vocally opposing the left. Business community The Republican Party has traditionally been a pro-business party. It garners major support from a wide variety of industries from the financial sector to small businesses. Republicans are about 50 percent more likely to be self-employed and are more likely to work in management.\nA survey cited by The Washington Post in 2012 stated that 61 percent of small business owners planned to vote for Republican presidential candidate Mitt Romney. Small business became a major theme of the 2012 Republican National Convention. Demographics The Democrats do", "can't market 'Republican' any more. It means depression, recession, runaway inflation, big business, multinational corporations, Watergate, and Nixon. It's easier to sell an Edsel or Typhoid Mary. 'Independent' and 'American'--those are words which will sell. Don't kid yourself. That's the way we're moving. All the Republican party needs is a decent burial. In ten years, there won't be a dozen people in the country calling themselves Republicans. …Nixon, whose name is poison to voters now, wiped out every issue the Republicans could use--balanced budget, morality in government, law and order, national security. Richard Nixon flushed them all down the commode.\"\nViguerie", "Many Republicans oppose higher tax rates for higher earners, which they believe are unfairly targeted at those who create jobs and wealth. They believe private spending is more efficient than government spending. Republican lawmakers have also sought to limit funding for tax enforcement and tax collection.\nRepublicans believe individuals should take responsibility for their own circumstances. They also believe the private sector is more effective in helping the poor through charity than the government is through welfare programs and that social assistance programs often cause government dependency.\nRepublicans believe corporations should be able to establish their own employment practices, including benefits and", "Republican Party of Arkansas History The United States Republican Party, or GOP, is the second oldest currently existing political party in the United States after its older rival, the Democratic Party.\nBoth parties exist in all fifty states. Historically, prior to the late 20th century, the Republican Party was much weaker than the Democrats in the former Confederate States of America, including Arkansas.\nThe Arkansas party did not hire its first paid executive director until 1970, when businessman Neal Sox Johnson, then of Nashville, Arkansas, assumed the position in the last year of Winthrop Rockefeller's second term as governor of Arkansas.\nJohnson", "Democrats retained control of the State House, they lost their majority in the Senate when four Democrats switched parties. They lost the House in the 2004 election. Republicans then controlled all three partisan elements of the state government.\nEven before 2002, the state had become increasingly supportive of Republicans in Presidential elections. It has supported a Democrat for president only three times since 1960. In 1976 and 1980, native son Jimmy Carter carried the state; in 1992, the former Arkansas governor Bill Clinton narrowly won the state. Generally, Republicans are strongest in the predominantly white suburban (especially the Atlanta suburbs) and", "Republican In Name Only Republican In Name Only (RINO) is a pejorative term used by conservative members of the United States Republican Party to describe Republicans whose political views or actions they consider insufficiently conservative. The acronym emerged in the 1990s. Origins In 1912, former President Theodore Roosevelt, then-President William Howard Taft, and Senator Robert M. La Follette fought for ideological control of the Republican Party and each denounced the other two as \"not really Republican.\" The phrase Republican in name only emerged as a popular political pejorative in the 1920s, 1950s, and 1980s.\nThe earliest known print appearance of the", "one of the most reliably Republican states in the nation—and by some measures, the most Republican. Its demographics are a perfect fit for the Republican Party. It is the least populated state in the nation (even less than the District of Columbia), has no major metropolitan areas, and is a heavily rural and White/Caucasian state. Voters in the state tend to be very conservative on both social and fiscal issues. No Democratic presidential nominee has won Wyoming since Lyndon B. Johnson in his landslide election in 1964--one of only five times a Democrat has won the state since", "especially on social issues.\nIndiana's delegation to the United States House of Representatives is not completely Republican either. Instead, it has generally served as a bellwether for the political movement of the nation. For instance, Democrats held the majority of seats until the 1994 Republican Revolution, when Republicans took a majority. This continued until 2006, when three Republican congressmen were defeated in Indiana; (Chris Chocola, John Hostettler and Mike Sodrel), giving the Democrats a majority of the delegation again.\nFormer governor and U.S. Senator Evan Bayh announced in 2006 his plans for a presidential exploratory committee. His father was a three-term senator", "the Catholic percentage among self-identified Democrats, who are more likely to be nonwhite than Republicans. Politics There has never been a Catholic religious party in the United States, either local, state or national, similar to Christian Democratic parties in Europe.\nHistorically, a majority of the Catholics in the United States supported the Democratic Party before 1968. Since the election of the Catholic John F. Kennedy as President in 1960, Catholics have split about 50-50 between the two major parties, but the Democrats have a slight lead due to the growing population of Hispanic Americans. On social issues the Catholic Church takes", "conservative political views, or with views relatively conservative with respect to those of the national party. While such members of the Democratic Party can be found throughout the nation, actual elected officials are disproportionately found within the Southern states and to a lesser extent within rural regions of the United States generally, more commonly in the West. Historically, Southern Democrats were generally much more ideologically conservative than conservative Democrats are now.\nMany conservative Southern Democrats defected to the Republican Party, beginning with the passage of the Civil Rights Act of 1964 and the general leftward shift of the party. Strom Thurmond" ]
The controversy surrounding the 2000 election (George W. Bush vs Al Gore)
[ "It was an extremely close race, the deciding state being Florida. 537 more Floridians voted for Bush than for Gore, but across the board, in the entire country, Gore got more of the popular vote. \nSo the supreme court made the decision that since Bush won Florida, the deciding state, by a margin of 537 votes, that Bush had won the presidency.\n\nSomebody Correct me if I'm wrong please.", "You had several. \n\n1) Al Gore won more of the popular vote than George W Bush but in the USA popular vote doesn't decide presidential elections,the electoral college does and Bush won enough states in the electoral college.This leads to the next controversy. \n\n2) Florida is what you call a purple or swing state in that it could vote either Republican or Democrat. Bush barely beat Gore in Florida(He won by 500 votes which was very small since several million people voted in Florida) which lead to several recount elections. Eventually the supreme court put a stop to the recounts in the Bush v Gore decision. People are still in debate on who really won Florida.", "Bush and Gore came close to a 50:50 vote split that was insanely close.\n\nThere were a large number of controversies after the election took place that would normally just be minor controversies.\n\nOn the night of the election a member of the Bush staff told Fox News that Bush was declared the winner. Fox News ran the story. Once they ran the story every news network ran the story despite none of their sources being able to confirm the story. The standard practice for when this happens is for the other guy to step down and give the presidency up, Al Gore did not do that due to exactly how close the election was.\n\nThe deciding state of the election was Florida. The Governor of Florida was Jeb Bush, his brother. The states organizations tend to decide how the vote will take place. They started looking at polling booths and setups and started finding some problems.\n\nOne problem happened to be with old Jewish seniors who were voting for Ralph Nader instead of Al Gore. How the ballots were setup caused some confusion because you could accidentally vote for Ralph Nader when you wanted to vote for Al Gore.\n\nThen there was the matter of the overseas votes. The \"every vote counts\" campaign began. This was really the rise of the Republican Super PACs. People who did absentee voting would only have their votes counted if it was too close to call. So basically they never count most of the people who don't have time to vote on election day. So they counted the absentee ballots of American citizens in Florida, but not those overseas. The overseas ones would end up in some sort of depot in which you had to sort out every single state... and honestly it was just simpler to shred them if they were never needed. But as the numbers kept getting closer and closer the call was made to sort and count the overseas ballots. In the supply process about 650 ballots went missing. The margin of error for the end of it all was about 500 votes. That's a significant amount to decide who won the election.\n\nAt the end of the day Al Gore stepped down after being dragged through the mud and having his reputation ruined by everyone.\n\nIn the next election George W. would go on to win by a very high margin against Secretary of State John Kerry. Leading up to and following it every left leaning media source was trying to remind everyone of how Bush \"stole\" the election. Everyone still had sour grapes over the event, some still do." ]
[ "Election of 2000 During the 2000 presidential election, the Democrats chose Vice President Al Gore to be the party's candidate for the presidency. Gore ran against George W. Bush, the Republican candidate and son of former President George H. W. Bush. The issues Gore championed include debt reduction, tax cuts, foreign policy, public education, global warming, judicial appointments and affirmative action. Nevertheless, Gore's affiliation with Clinton and the DLC caused critics to assert that Bush and Gore were too similar, especially on free trade, reductions in social welfare and the death penalty. Green Party presidential candidate Ralph Nader in particular", "'honesty' preferred Bush over Gore by over a margin of five to one. Forty Four percent of Americans said the Clinton scandals were important to their vote. Of these, Bush reeled in three out of every four.\nPolitical commentators have argued that Gore's refusal to have Clinton campaign with him was a bigger liability to Gore than Clinton's scandals. The 2000 US Congressional election also saw the Democrats gain more seats in Congress. As a result of this gain, control of the US Senate was split 50–50 between both parties, and Democrats would gain control over the US Senate after Republican", "Some liberal supporters of Al Gore argued that the media had a bias against Gore and in favor of Bush. Peter Hart and Jim Naureckas, two commentators for Fairness and Accuracy in Reporting (FAIR), called the media \"serial exaggerators\" and alleged that several media outlets were constantly exaggerating criticism of Gore: they alleged that the media falsely claimed Gore lied when he claimed he spoke in an overcrowded science class in Sarasota, Florida, and also alleged the media gave Bush a pass on certain issues, such as Bush allegedly exaggerating how much money he signed into the annual Texas state", "Al Gore hosting Al Gore was supposed to host on May 6, 1999, with Oprah Winfrey as a guest and the topic was supposed to be the aftermath of the Columbine High School massacre. However, with Gore's candidacy for Presidency pending, CNN decided not to let him host as a result of the controversy.", "Olson, who had previously opposed each other in Bush v. Gore (Boies representing Al Gore and Olson representing George W. Bush), the case that effectively decided the 2000 presidential election. They were listed on the 2010 Time 100 for \"their nonpartisan and strong legal approach to challenging Proposition 8.\"\nLambda Legal and the American Civil Liberties Union (ACLU) opposed the filing because they felt a federal challenge at this time might do more harm than good. Olson and AFER rebuffed this argument and defended the timing of the lawsuit.\nFollowing a pre-trial hearing on July 2, 2009, the three legal groups", "Gore then dropped out of the race. The New York Times argued that he lost support due to his attacks against Jackson, Dukakis, and others, as well as for his endorsement by Koch.\nGore was eventually able to mend fences with Jesse Jackson, who supported the Clinton-Gore ticket in 1992 and 1996, and who also campaigned for the Gore-Lieberman ticket during the 2000 presidential election. According to some, Gore's policies had changed in 2000, reflecting his eight years as Vice President. Statewide contests won South: Tennessee, Kentucky, North Carolina, Arkansas, Oklahoma\nOutside the South: Nevada, Wyoming", "was very vocal in his criticisms.\nGore won a popular plurality of over 540,000 votes over Bush, but lost in the Electoral College by four votes. Many Democrats blamed Nader's third-party spoiler role for Gore's defeat. They pointed to the states of New Hampshire (4 electoral votes) and Florida (25 electoral votes), where Nader's total votes exceeded Bush's margin of victory. In Florida, Nader received 97,000 votes and Bush defeated Gore by a mere 537. Controversy plagued the election and Gore largely dropped from elective politics.\nDespite Gore's close defeat, the Democrats gained five seats in the Senate (including the election of", "Tilden, and Grover Cleveland. Theories There were a number of theories connected to Gore's loss. Gore, according to a 2002 NPR article, attributed it to \"the economic downturn and stock market slide that began earlier that year.\" His running mate, Joe Lieberman, criticized Gore for adopting a populist theme, stating that he had objected to Gore's \"people vs. the powerful\" message, as he believed that it was not the best strategy for a sitting Vice President (Lieberman also stated that he would still endorse Gore if he decided to run for the 2004 election). Other critics attributed Gore's loss in", "part to Green Party candidate Ralph Nader who garnered 2.7% of the vote, enough of whose votes which they argued might have otherwise gone to Gore to swing the result.\nAnother theory suggests that Al Gore attempted to run a populist campaign but failed to separate himself from the abuses of the Clinton presidency. The public was not able to forget the Campaign fund raising controversy at the Hsi Lai Temple 1996 United States campaign finance controversy. There is also a theory concerning Al Gore's first campaign interviews on CNN.\nHowever, it has been acknowledged that Gore's decision to distance himself from", "Vice President again. On the timing and nature of Gore's endorsement, some argued that Gore waited because he did not want to repeat his calamitous early endorsement of Howard Dean during the 2004 presidential election. On the final night of the 2008 Democratic National Convention, shortly before Obama delivered his acceptance address, Gore gave a speech offering his full support. Such support led to new speculation after Obama was elected President during the 2008 presidential election that Gore would be named a member of the Obama administration. This speculation was enhanced by a meeting held between Obama, Gore, and Joe", "Persian Gulf War and high approval ratings, Bush's reelection initially looked likely. Many pundits believed that Democrats were unlikely even to improve on Dukakis's 1988 showing. As a result, many leading Democrats, including Mario Cuomo, Dick Gephardt, and Al Gore, declined to seek their party's presidential nomination. However, Bush's tax increase had angered many conservatives, and he faced a challenge from the right in the 1992 Republican primaries. Conservative political columnist Pat Buchanan rallied the party's right-wing with attacks on Bush's flip-flop on taxes and his support for the Civil Rights Act of 1991. Buchanan shocked observed by finishing a", "Clinton-whose Gallup approval ratings were well above 50% throughout the year- was a costly mistake for his campaign. Television appearances A few years later, Gore began to make a number of television appearances in which he displayed a willingness to poke fun at himself, such as in episodes of Futurama and Saturday Night Live. Some argued that this was evidence that he was \"presenting a whole new side of himself\" to contradict the perception of a persona \"often associated with stiffness and caution.\" There was further speculation that it was indicative of a 2004 presidential run. HBO film The election", "nomination, McCain would later suspended his campaign on the 9th. A poll conducted from March 8–9 showed that Gore was leading Bush by two points with 48%, but another poll conducted from March 10–12 showed Bush leading with 49% against Gore's 43%. April The controversy over Elián González was a major issue throughout 2000 that mobilized the sentiments of Cuban voters in Florida. Despite Gore giving his support to a congressional bill that would give the 6-year-old Cuban boy and his Cuban family permanent residency in the United States, it was Bill Clinton's refusal to support the bill that angered", "campaign Gore was able to match and overtake Bush in multiple polls following his boost due to the Democratic convention. Due to Gore's rise in the polls the RNC and the Bush campaign each prepared $5 million in advertisements in swing states to match the $30 million the DNC and Gore campaign had spent in the past two months. December As the controversy in Florida heated up the recounts in counties throughout the United States brought it to many other swing states. In New Mexico amended results from Roosevelt County gave Al Gore a 368-vote lead, but as Gore had", "was shunted to low visibility appearances in areas where he was popular. Experts have argued that this could have cost Gore votes from some of Clinton's core supporters.\nRalph Nader was the most successful of third-party candidates. His campaign was marked by a traveling tour of large \"super-rallies\" held in sports arenas like Madison Square Garden, with retired talk show host Phil Donahue as master of ceremonies. After initially ignoring Nader, the Gore campaign made a pitch to potential Nader supporters in the final weeks of the campaign, downplaying Gore's differences with Nader on the issues and arguing that Gore's ideas", "Senator Jim Jeffords defected from his party in the spring of 2001 and agreed to caucus with the Democrats.\nAl Gore reportedly confronted Clinton after the election, and \"tried to explain that keeping Clinton under wraps [during the campaign] was a rational response to polls showing swing voters were still mad as hell over the Year of Monica\". According to the AP, \"during the one-on-one meeting at the White House, which lasted more than an hour, Gore used uncommonly blunt language to tell Clinton that his sex scandal and low personal approval ratings were a hurdle he could not surmount in", "favor on this, although he did concede that Gore's \"use of the phrase was judged by many commentators to have been a political mistake of the first order\" and noted that it was used often in stump speeches by George W. Bush when Bush was campaigning against Gore in that year's presidential race. Impeachment and impact Soon afterwards, Gore contended with the Lewinsky scandal, involving an affair between President Clinton and an intern, Monica Lewinsky. Gore initially defended Clinton, whom he believed to be innocent, stating, \"He is the president of the country! He is my friend ... I want", "but receiving 266 electoral votes (1 DC Elector abstained) to Bush's 271.\nGore strongly disagreed with the Court's decision, but in a widely praised concession speech, co-written with his chief White House and campaign speechwriter Eli Attie, Gore said, \"for the sake of our unity as a people and the strength of our democracy, I offer my concession.\"\nIn the introduction to his global warming presentation, Gore later jokingly introduced himself as \"the former next President of the United States\". Gore became the fourth candidate in American history to win the popular vote but lose the electoral vote after Andrew Jackson, Samuel", "inaccuracies) the VNS was disbanded in 2003.\nAccording to Bush adviser Karl Rove, exit polls early in the afternoon on election day showed Gore winning by three percentage points, but when the networks called the state for Gore, Bush led by about 75,000 votes in raw tallies from the Florida Secretary of State.\nAlso, charges of media bias were leveled against the networks by Republicans. They claimed that the networks called states more quickly for Al Gore than for George W. Bush. Congress held hearings on this matter, and the networks claimed to have no intentional bias in their election night reporting.", "that Gore lied when he claimed he spoke in an overcrowded science class in Sarasota, Florida, and giving Bush a pass on certain issues, such as the fact that Bush wildly exaggerated how much money he signed into the annual Texas state budget to help the uninsured during his second debate with Gore in October 2000. In the April 2000 issue of Washington Monthly, columnist Robert Parry also argued that several media outlets exaggerated Gore's supposed claim that he \"discovered\" the Love Canal neighborhood in Niagara Falls, New York during a campaign speech in Concord, New Hampshire on November 30,", "conservative Democrat than Gore, had publicly blasted President Clinton for the Monica Lewinsky affair. Many pundits saw Gore's choice of Lieberman as another way of trying to distance himself from the scandals of the Clinton White House. However, Lieberman voted against Clinton's removal from office in both counts. Lieberman was selected from a group of potential running mates that included Senators John Kerry from Massachusetts and John Edwards from North Carolina, both of whom eventually became the Democratic nominees four years later.\nGore's daughter, Karenna, together with her father's former Harvard roommate Tommy Lee Jones, officially nominated Gore as the Democratic", "Bush v. Palm Beach County Canvassing Board Background The 2000 presidential election was contingent upon who won the popular vote in Florida. Republican George W. Bush was narrowly ahead in the tally. Democrat Al Gore challenged the decision of Katherine Harris, Florida's Secretary of State, to certify Bush as the winner on November 14 (a deadline established by Florida statute). Gore asserted that Harris had disregarded manual recount results in four Florida counties. The Florida Supreme Court responded to Gore's challenge by holding that Harris had to wait until November 26 to certify the winner, and that she", "end to recounting underway in selected Florida counties, effectively giving George W. Bush a 537 vote victory in Florida and consequently Florida's 25 electoral votes and the presidency. The results of the decision led to Gore winning the popular vote by approximately 500,000 votes nationwide, but receiving 266 electoral votes to Bush's 271 (one District of Columbia elector abstained). On December 13, 2000, Gore conceded the election. Gore strongly disagreed with the Court's decision, but in his concession speech stated that, \"for the sake of our unity as a people and the strength of our democracy, I offer my concession.\"", "Gore rejected the argument from uncertainty by a margin of 6–3, and halted the recount process on other grounds. Bush won Florida and the election.\nIn 2001, Feeney was one of the lawmakers who opposed a demand by Bud Selig that the state finance a new baseball stadium for the Florida Marlins. At that time, Selig had threatened that the Marlins might leave South Florida if they did not receive a tax break. U.S. House of Representatives Florida gained two congressional districts after the 2000 census. One of them was the 24th District in the Orlando area. Some have argued that", "reasoning, Fox News and the other networks were even more premature in initially calling the state for Gore, a call made while polls were still open, and which may have depressed voter turnout for Bush, actually affecting the election, whereas the call for Bush later could not have, as the polls were closed by then.\nOn January 9, 2010, the son-in-law of Rupert Murdoch and the husband of Murdoch's daughter Elisabeth, Matthew Freud, stated he and other members of the media mogul's family are \"ashamed and sickened\" by the right leaning tendencies of Fox News in the opening salvo in a", "found that viewers felt Gore won the debate by 48% to 41%. Media analysis focused on the presentation style of each of the candidates. Issues of style and presentation would continue to be a theme throughout the election. Stuart Rothemberg analyzed the debate and declared that Bush appeared to be a \" 'deer in the headlights' in the first debate. But the governor was relaxed and authentic, and he seemed at ease on the same stage with the sitting vice president [...] Gore may have been more aggressive on issues, and he surely was more detailed. But the vice president", "he was acquitted by the Senate, as all Senate Democrats and several Senate Republicans voted not guilty on both impeachment charges. Due to the strong economy, Clinton's Vice President, Al Gore, most Washington pundits regarded Gore as the early favorite in the 2000 presidential election. However, in an extremely close and contested election that ended in a controversial Supreme Court decision, Governor George W. Bush of Texas, the son of former President Bush, defeated Gore.\nBush's administration included many prominent figures from previous Republican administrations, including Donald Rumsfeld, Dick Cheney, and Colin Powell. Upon taking office, Bush signed a major tax", "Biden in Chicago on December 9, 2008. However, Democratic officials and Gore's spokeswoman stated that during the meeting the only subject under discussion was the climate crisis, and Gore would not be joining the Obama administration. On December 19, 2008, Gore described Obama's environmental administrative choices of Carol Browner, Steven Chu, and Lisa Jackson as \"an exceptional team to lead the fight against the climate crisis.\"\nGore repeated his neutrality eight years later during the Democratic presidential primaries of 2016 until endorsing Hillary Clinton on July 25, 2016, the first day of that year's Democratic National Convention. Gore appeared with her", "his campaign ... [with] the core of the dispute was Clinton's lies to Gore and the nation about his affair with White House intern Monica Lewinsky.\" Clinton, however, was unconvinced by Gore's argument and insisted to Gore that he would have won the election if he had embraced the administration and its good economic record. Ensuing events for 13 House managers Of the 13 members of the House who managed Clinton's trial in the Senate, one lost to a Democrat in his 2000 bid for re-election (James E. Rogan, to Adam Schiff). Charles Canady retired from Congress in 2000, following through", "Al Gore 2000 presidential campaign CNN interview Prior to his announcement that he would be running in the 2000 election, Gore participated in a March 9, 1999, interview for CNN's Late Edition with Wolf Blitzer. Gore stated in the interview, \"During my service in the United States Congress I took the initiative in creating the internet. I took the initiative in moving forward a whole range of initiatives that have proven to be important to our country's economic growth and environmental protection, improvements in our educational system.\" Former UCLA professor of information studies, Philip E. Agre and journalist Eric" ]
What's the difference between a flash drive and external hard drive?
[ "An external hard disk is called as such because it utilizes a Hard Disk Drive (HDD). One of these drives has a metal platter with different magnetic sections, called sectors, that are read by a small magnetic sensor called a head on the end of an actuator arm. Many people are now moving over to flash storage, however, which is what a flash drive utilizes and thus is named for. Flash storage does not contain moving parts but rather is similar to a large grid of capacitors and transistors that are used to keep data. It is faster to access than an HDD because you do not need to wait for the disk to spin to the correct location. It can decay, however, unlike an HDD. The more an area of flash is written the more it wears out and eventually it will fail.", "To add onto the other comments, hard drives are mechanical, so they are very sensitive to physical abuse, especially if they're running at the time.\n\nDrop a spinning hard drive, and the heads slam into the disk, destroying both instantaneously. Lights out for your precious data.\n\nYou can drop and shake an SSD all day long even while it's running full steam ahead, and it simply won't care because there are no moving parts to get damaged.\n\nAlso, since they're mechanical, HDDs can also wear out over time. \n\nHowever, at the end of life, hard drives still win. When a hard drive dies of old age or suffers an electronic as opposed to a mechanical failure, the data can still be recovered professionally as long as the disks inside are intact. \n\nAn SSD, however, is pretty much impossible to retrieve data off of once it dies.", "You can now get external flash drives. \n\nA traditional hard drive has a disk similar to a CD but is made to an industry standard. A flash drive is like a USB stick which is a solid state and means no time wasted spinning the disk loading the info." ]
[ "Ethernet controllers, DSL modems, wireless network devices, etc. Flash memory as a replacement for hard drives One more recent application for flash memory is as a replacement for hard disks. Flash memory does not have the mechanical limitations and latencies of hard drives, so a solid-state drive (SSD) is attractive when considering speed, noise, power consumption, and reliability. Flash drives are gaining traction as mobile device secondary storage devices; they are also used as substitutes for hard drives in high-performance desktop computers and some servers with RAID and SAN architectures.\nThere remain some aspects of flash-based SSDs that make them unattractive.", "shock, magnetic fields, scratches and dust. These properties make them suitable for transporting data from place to place and keeping the data readily at hand.\nFlash drives also store data densely compared to many removable media. In mid-2009, 256 GB drives became available, with the ability to hold many times more data than a DVD (54 DVDs) or even a Blu-ray disc (10 BDs).\nFlash drives implement the USB mass storage device class so that most modern operating systems can read and write to them without installing device drivers. The flash drives present a simple block-structured logical unit to the host operating system,", "devices (e.g., digital cameras, portable music players) cannot make use of USB flash drives (even if the device has a USB port), whereas the memory cards used by the devices can be read by PCs with a card reader. External hard disk Particularly with the advent of USB, external hard disks have become widely available and inexpensive. External hard disk drives currently cost less per gigabyte than flash drives and are available in larger capacities. Some hard drives support alternative and faster interfaces than USB 2.0 (e.g., Thunderbolt, FireWire and eSATA). For consecutive sector writes and reads (for example, from", "drives, thereby freeing up main memory. Although hard disks usually have higher sequential data transfer rates, flash drives can be faster for small files or non-sequential I/O because of their short random seek times. Offline Files Offline Files is a feature of Windows, introduced in Windows 2000, which maintains a client-side cache of files shared over a network. It locally caches shared files marked for offline access, and uses the cached copy whenever the network connection to the remote files is interrupted. Windows Vista Business, Enterprise and Ultimate editions contain significant improvements to Offline Files. Beginning with Windows Vista, whenever", "Flash file system A flash file system is a file system designed for storing files on flash memory–based storage devices. While flash file systems are closely related to file systems in general, they are optimized for the nature and characteristics of flash memory (such as to avoid write amplification), and for use in particular operating systems. Origins The earliest flash file system, managing an array of flash as a freely writable disk, was TrueFFS by M-Systems of Israel, presented as a software product in PC-Card Expo at Santa Clara, California, in July 1992 and patented in 1993.\nOne of", "the device is fitted with a single Standard-A USB plug; some flash drives additionally offer a micro USB plug, facilitating data transfers between different devices.\nInside the plastic casing is a small printed circuit board, which has some power circuitry and a small number of surface-mounted integrated circuits (ICs). Typically, one of these ICs provides an interface between the USB connector and the onboard memory, while the other is the flash memory. Drives typically use the USB mass storage device class to communicate with the host. Flash memory Flash memory combines a number of older technologies, with lower cost, lower power", "DVD and compact discs and the nearly-universal presence of reader drives in personal computers and consumer appliances. Flash memory (in particular, NAND flash) has an established and growing niche as a replacement for magnetic hard disks in high performance enterprise computing installations due to its robustness stemming from its lack of moving parts, and its inherently much lower latency when compared to conventional magnetic hard drive solutions. Flash memory has also long been popular as removable storage such as USB sticks, where it de facto makes up the market. This is because it scales better cost-wise in lower capacity ranges,", "flash drives is that they are easily misplaced or otherwise lost. This is a particular problem if they contain sensitive data (see data security). As a consequence, some manufacturers have added encryption hardware to their drives, although software encryption systems which can be used in conjunction with any mass storage medium will achieve the same result. Most drives can be attached to keychains or lanyards. The USB plug is usually retractable or fitted with a removable protective cap. Storage capacity Storage capacity of USB flash drives in 2013 was up to 1 TB while hard disk can be as large", "of mass data storage after the hard drive. They are slower than their flash-based counterparts. Standard 120 mm optical discs are larger than flash drives and more subject to damage. Smaller optical media do exist, such as business card CD-Rs which have the same dimensions as a credit card, and the slightly less convenient but higher capacity 80 mm recordable MiniCD and Mini DVD. The small discs are more expensive than the standard size, and do not work in all drives.\nUniversal Disk Format (UDF) version 1.50 and above has facilities to support rewritable discs like sparing tables and virtual allocation tables, spreading", "V.Flash CDs Unlike most other CD-ROM-based consoles, this system uses 12 cm CDs enclosed with plastic to protect damage from touching, which is somewhat similar to 3.5\" floppy disks or UMDs. The discs use the ISO 9660 file system, without any copy protection mechanism other than a simple sensor in the case jacket, making it possible to make a disc image out of the media, although there hasn't been any known cases of piracy involving the V.Flash. Because of this, the V.Flash can also play audio CDs and user-recorded CD-Rs using the supplied disc adapter. Other hardware The processor is an", "is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device. Data storage is a core function and fundamental component of computers. Fixed media Data is stored by a computer using a variety of media. Hard disk drives are found in virtually all older computers, due to their high capacity and low cost, but solid-state drives are faster and more power efficient, although currently more expensive than hard drives in terms of dollar per gigabyte,", "a software-based file storage company for an undisclosed amount. Products Pure Storage develops flash-based storage for data centers using consumer-grade solid state drives. Flash storage is faster than traditional disk storage, but more expensive. Pure Storage develops proprietary de-duplication and compression software to improve the amount of data that can be stored on each drive. It also develops its own flash storage hardware. Pure Storage has three primary product lines: the FlashBlade for unstructured data, the FlashArray//M that uses Pure Storage's proprietary flash hardware, and the higher-end NVMe FlashArray//X. Its products use an operating system called Purity. Most of Pure's", "flash memory, they serve very different markets and purposes. Each has a number of different attributes which are optimized and adjusted to best meet the needs of particular users. Some of these characteristics include power consumption, performance, size, and reliability.\nSSDs were originally designed for use in a computer system. The first units were intended to replace or augment hard disk drives, so the operating system recognized them as a hard drive. Originally, solid state drives were even shaped and mounted in the computer like hard drives. Later SSDs became smaller and more compact, eventually developing their own unique form factors", "type of data storage device. For example, most operating systems store files on a hard disk. Hard disks have been the ubiquitous form of non-volatile storage since the early 1960s. Where files contain only temporary information, they may be stored in RAM. Computer files can be also stored on other media in some cases, such as magnetic tapes, compact discs, Digital Versatile Discs, Zip drives, USB flash drives, etc. The use of solid state drives is also beginning to rival the hard disk drive.\nIn Unix-like operating systems, many files have no associated physical storage device. Examples are /dev/null and most", "data writes, NOR flash chips typically have slow write speeds, compared with NAND flash.\nTypical NOR flash does not need an error correcting code. Flash file systems Because of the particular characteristics of flash memory, it is best used with either a controller to perform wear leveling and error correction or specifically designed flash file systems, which spread writes over the media and deal with the long erase times of NOR flash blocks. The basic concept behind flash file systems is the following: when the flash store is to be updated, the file system will write a new copy of the changed data to", "hard disk's native signal to the appropriate protocol. Parallel ATA and internal Serial ATA hard disks are frequently connected to such chassis because nearly all computers on the market today have USB or FireWire ports, and these chassis are inexpensive and easy to find. Network protocols iSCSI, NFS, or CIFS are all commonly used protocols that are used to allow an external hard drive to use a network to send data to a computer system. This type of external hard drive is also known as Network-attached storage or NAS. Often, such drives are embedded computers running operating systems such", "speed for large ones. The examples given are chosen to illustrate extremes....′ Personal data transport The most common use of flash drives is to transport and store personal files, such as documents, pictures and videos. Individuals also store medical information on flash drives for emergencies and disaster preparation. Secure storage of data, application and software files With wide deployment(s) of flash drives being used in various environments (secured or otherwise), the issue of data and information security remains important. The use of biometrics and encryption is becoming the norm with the need for increased security for data; on-the-fly encryption", "Flash memory controller A flash memory controller (or flash controller) manages data stored on flash memory and communicates with a computer or electronic device. Flash memory controllers can be designed for operating in low duty-cycle environments like SD cards, CompactFlash cards, or other similar media for use in digital cameras, PDAs, mobile phones, etc. USB flash drives use flash memory controllers designed to communicate with personal computers through the USB port at a low duty-cycle. Flash controllers can also be designed for higher duty-cycle environments like solid-state drives (SSD) used as data storage for laptop computer systems clear up to", "MB\" flash card provides at least 256 million bytes (256000000), not 256×1024×1024 (268435456).\nThe flash memory chips inside these devices contain considerably more than the quoted capacities, but much like a traditional hard drive, some space is reserved for internal functions of the flash drive. These include wear leveling, error correction, sparing, and metadata needed by the device's internal firmware. Floppy drives Floppy disks have existed in numerous physical and logical formats, and have been sized inconsistently. In part, this is because the end user capacity of a particular disk is a function of the controller hardware, so that the", "hiding the individual complex implementation details of the various underlying flash memory devices. The operating system can use any file system or block addressing scheme. Some computers can boot up from flash drives.\nSpecially manufactured flash drives are available that have a tough rubber or metal casing designed to be waterproof and virtually \"unbreakable\". These flash drives retain their memory after being submerged in water, and even through a machine wash. Leaving such a flash drive out to dry completely before allowing current to run through it has been known to result in a working drive with no future problems. Channel", "flash drives, as well as most memory card formats available today. Magnetic The magnetic medium is found in magnetic tape, hard disk drives, floppy disks, and so on. This medium uses different patterns of magnetization in a magnetizable material to store data and is a form of non-volatile memory. Magnetic storage media can be classified as either sequential access memory or random access memory although in some cases the distinction is not perfectly clear.\nSmall polarized ferrous cores in the shape of wires or poles are flipped along the surface of reading and writing into the desired data is stored. Accessing", "from a conventional electromechanical hard disk drive, the disk controller must first position the head, relatively slowly, to the track where a given fragment resides, and then wait while the disk platter rotates until the fragment reaches the head. A solid-state drive (SSD) is based on flash memory with no moving parts, so random access of a file fragment on flash memory does not suffer this delay, making defragmentation to optimize access speed unnecessary. Furthermore, since flash memory can be written to only a limited number of times before it fails, defragmentation is actually detrimental (except in the mitigation", "internal flash RAM is combined with the flash on the card. For example: If a memory card were to have 4 MB of DRAM and 2 MB of flash, the Newton would report having 4 MB of flash, and 4 MB of DRAM, not 5 MB of DRAM.\nIn addition to the expansion slot, the eMate also featured a single non-CardBus PCMCIA slot. It could be used for a number of different cards, including modems, ethernet cards, wireless cards, bluetooth cards, and flash memory (linear and ATA/Compact Flash). Design The eMate 300 featured a green-colored translucent durable case designed for intense", "as 10 TB. As of 2011, USB flash drives were more expensive per unit of storage than large hard drives, but were less expensive in capacities of a few tens of gigabytes. Robustness Most USB-based flash technology integrates a printed circuit board with a metal tip, which is simply soldered on. As a result, the stress point is where the two pieces join. The quality control of some manufacturers does not ensure a proper solder temperature, further weakening the stress point. Since many flash drives stick out from computers, they are likely to be bumped repeatedly and may break at", "flash memory systems very much like hard disk drives, where the controller system has full control over where information is actually stored. The actual EEPROM writing and erasure processes are, however, still very similar to the earlier systems described above.\nMany low-cost MP3 players simply add extra software and a battery to a standard flash memory control microprocessor so it can also serve as a music playback decoder. Most of these players can also be used as a conventional flash drive, for storing files of any type. Size and style of packaging Most USB flash drives weigh less than 30 g (1 oz).", "the buffer, and re-writing it into the same field. This required considerable computer support, and PC-based EEPROM flash memory systems often carried their own dedicated microprocessor system. Flash drives are more or less a miniaturized version of this.\nThe development of high-speed serial data interfaces such as USB made semiconductor memory systems with serially accessed storage viable, and the simultaneous development of small, high-speed, low-power microprocessor systems allowed this to be incorporated into extremely compact systems. Serial access requires far fewer electrical connections for the memory chips than does parallel access, which has simplified the manufacture of multi-gigabyte drives.\nComputers access modern", "memory chips. Reading, writing, and erasing When the system or device needs to read data from or write data to the flash memory, it will communicate with the flash memory controller. Simpler devices like SD cards and USB flash drives typically have a small number of flash memory die connected simultaneously. Operations are limited to the speed of the individual flash memory die. In contrast, a high-performance solid-state drive will have as many as 100 or more dies organized in a matrix with parallel communication paths to enable speeds many times greater than that of a single flash die. Wear-leveling", "position the heads over marks in the disk surface. The original drive stores 21 MB, while also reading and writing standard DD and HD floppies. In order to improve data transfer speeds and make the high-capacity drive usefully quick as well, the drives are attached to the system using a SCSI connector instead of the normal floppy controller. This makes them appear to the operating system as a hard drive instead of a floppy, meaning that most PCs are unable to boot from them (because they aren't close enough in structure to bootable hard disks either). This again adversely affected", "drives is not supported. Desired mode of operation (either regular USB mass storage device or of floppy drive emulation) is made selectable by a sliding switch on the device's housing. Operating system installation media Installers of some operating systems can be stored to a flash drive instead of a CD or DVD, including various Linux distributions, Windows 7 and newer versions, and macOS. In particular, Mac OS X 10.7 is distributed only online, through the Mac App Store, or on flash drives; for a MacBook Air with Boot Camp and no external optical drive, a flash drive can be used", "thousand books on a flash chip. Personal computers may allow the user to boot and install an operating system off a USB flash drive instead of CD ROM or floppy disks. Digital cameras with flash drive slots allow users to rapidly exchange cards when full, and allow rapid transfer of pictures to a computer or printer. Advantages and disadvantages Storing software on ROM cartridges has a number of advantages over other methods of storage like floppy disks and optical media. As the ROM cartridge is memory mapped into the system's normal address space, software stored in the ROM can" ]
Why are colleges and universities so different from each other (Yale vs a local community college) but all of the information taught in school is the same for their respected fields ?
[ "I studied physics at a reasonably high-ranked school, and I can tell you definitively that 90% of what I learned that actually stuck was from working with other students, not from lectures. The caliber of fellow students is hugely important in my opinion, and you simply get better students at better schools. I also contest your statement that the information taught is the same. With better professors and better students, more can be covered in the same amount of time, so subjects can be taught more completely and more thoroughly.", "I didn't go to Yale, but I did go to a reasonably good private university after a few semesters at a community college.\n\nIn my experience, the quality of the instruction is hugely better at the private school. Professors actually seem to care about their students' progress, and they are (in general) just better at presenting the material in ways that the students can understand.\n\nI also noticed, even at my comparatively middle-brow university, that the caliber of the students was better. They catch on more quickly, have more interesting thought processes, and help each other rather than dragging each other down. Because the students are more engaged and quicker, the professors are more able to teach, and the classes go faster and cover more ground, more deeply.\n\nLet us not forget the administration, which is also leaps and bounds ahead in the private school. It's not just fill in the form and take a number, it's actually possible to get good, thoughtful answers from people. When I needed to talk to an advisor, it was easy and friendly to set up an appointment. When I emailed abstruse questions to the Registrar, I got thoughtful responses very quickly.\n\nTL;DR: Everything about private schools is just of higher quality and done better.", "You pay extra for (in no particular order):\n\n1) prestigious faculty members (academe)\n\n2) amount of research done (scholastics)\n\n3) difficulty getting in (exclusivity)\n\n4) name brand\n\n5) facility\n\n... that's what I can think for now", "I attended one of the top universities in the world, and I think that the biggest benefit education-wise is the fact that you're surrounded by other brilliant, driven students all the time (monetarily, the name on the diploma may be worth more, as you'll get better job offers). There are a ton of benefits to this.\n\nSocially:\nMany people have had trouble fitting in at all of their previous schools, but are now around people like them, which can help shy/awkward people (like me) catch up on some social skills development that they fell behind on/lower stress levels.\n\nIn classes:\nDo you remember that kid in your high school class who sat in the back and slept through classes because he was bored, but still wrecked the curve on every test? I was that kid in high school, and so were most of my college classmates. When the lecturer doesn't have to repeat everything or do a bunch of examples, things move faster, and you can cover more material more in depth. Similarly, homework wasn't just doing problems that were similar to examples from class with different numbers; you had to understand the concepts and apply them to a problem that's not quite the same as anything you've ever seen before. \n\nOpportunities:\nThis isn't really related to the rest, but the fact that I (even as an undergraduate) had access to faculty doing cutting edge research (the student-faculty ratio was better than almost anywhere else) meant that I could get real experience doing actual science (we're talking designing and running my own experiments to get real data) much earlier than I'd have been able to do anywhere else. This was especially important for me, as it taught me that I absolutely did not want that to be my career, which is something I may not have otherwise discovered until a year or two into grad school (which I then decided not to do). I don't know much about non-sciency fields, but I imagine top schools in those fields have similarly useful opportunities that would be extremely difficult to get at a normal school.", "Contrary to what you said, the information taught varies in both method and content. If you are a college student, I'm sure you've Google searched a term you didn't understand, only to be brought to a different university's website where the explanation was even more vague/unintelligible (or perhaps much better stated). The curriculum's vary as well, and the requirements and standards are higher at most private schools than community colleges. \n\nAs an Ivy League undergraduate, I can personally attest to the importance of being immersed in an environment where everybody wants to excel. Though this can breed unhealthy stress and competition (see the recent streak of suicides at Penn), it also provides motivation and inspiration. I am inspired by my classmates daily, and it never ceases to amaze me how incredibly accomplished they are. I can also attest to how humbling it is to be taught by the forefront of academic knowledge, where many of my professors are the premier authorities in their respective fields. \n\nThere have been many op-eds lately ridiculing the culture of Ivy League admissions and educations, and while many points hold truth, others are purely experiential and cannot be so easily captured from one perspective. I recommend you check them out but take them with a grain of salt", "I wonder this myself. Did my bachelor's at a renowned private university, doing my post-bacc at a 'regular' college and am receiving the same -- if not better -- education. I also love my professors here just as much as I did there. It honestly baffles me; I wish my parents (one of whom is a student at this college) would've encouraged me to go city/ state instead.", "Schools aren't vending machines and education isn't just the downloading of information. The effectiveness of learning is highly dependent on how information is shared and what we do as we encounter it. \n\nI have taught at a community college, small liberal arts college and a large research university. Each have merits.\n\nAt a research university students have a far greater chance to be involved in the cutting edge of the field - sometimes even as lab assistants for top researchers. The premium that is offered is to be where new knowledge is being created - not just learning what others did a few years ago. The basics of the education are prerequisites to prepare students for this kind of thing.\n\nBoth SLACs and community colleges have undergraduate teaching as their main goal, so class sizes will be smaller and there will be far more direct student-instructor interaction than in most large university classes. However, there is still a big difference in my experience, and it is one that will translate across many levels of academia. \n\nIt's my job to design a class that the majority of students can succeed in. If the majority of my students can learn quickly I can cover more material and have students work with each other more. If I have students that learn more slowly or are less committed, I have to slow things down a lot and cover less. More advanced students get more bored and get less bang for the buck. Smarter students=more content learned. Less advanced students=more time taken to get those students started moving forward.\n\nTL:DR - It's never the same information. Not really.", "I've taken physiology at both a top tier university, and also at community college (credit transfer SNAFU). I used the same textbook for both courses. There is a huge world of difference between the two. The material on the exams at the top-tier university is FAR more difficult than the material on the CC exams. I studied hard in my university physio course. I flew through the CC course effortlessly (and in fact, helped teach a few lectures in the course and oversee the final).\n\nOh, and one of my biology professors recently won the Nobel Prize. You don't study under Nobel laureates at CC." ]
[ "Duke, Johns Hopkins, the University of Pennylvania, and Caltech, as well as notable public universities including Tsinghua, Peking, Edinburgh, University of Michigan, and University of Virginia.\nOpen education has been called the biggest change in the way people learn since the printing press. Despite favourable studies on effectiveness, many people may still desire to choose traditional campus education for social and cultural reasons.\nMany open universities are working to have the ability to offer students standardized testing and traditional degrees and credentials.\nThe conventional merit-system degree is currently not as common in open education as it is in campus universities, although some open", "Yale and Harvard. Though Yale's colleges resemble their English precursors organizationally and architecturally, they are dependent entities of Yale College and have limited autonomy. The colleges are led by a head and an academic dean, who reside in the college, and university faculty and affiliates comprise each college's fellowship. Colleges offer their own seminars, social events, and speaking engagements known as \"Master's Teas,\" but do not contain programs of study or academic departments. All other undergraduate courses are taught by the Faculty of Arts and Sciences and are open to members of any college.\nAll undergraduates are members of a college,", "However, community colleges, which provide the first two years of post-secondary education and adult vocational courses, are organized in community college districts, which operate one or more community colleges within their jurisdiction. Community college districts in California are governed by elected boards.\nCalifornia's first community colleges were established as extensions of high schools. Through legislation enacted in 1907, high schools were allowed to create \"junior colleges\" to provide a general undergraduate education to local students, approximating the first two years of university courses. In the early 1920s, the Legislature authorized the creation of separate colleges, in addition to the programs offered", "independent corporations is generally followed and many universities, including Yale and Harvard, also follow Durham in keeping teaching centralised. \nThere is also a split between fully collegiate universities (e.g. the University of Notre Dame, where all freshmen are put in a residential college) and those (e.g. Northwestern University) where not all students are members of colleges. Another variant at some US universities is residential colleges that do not cover all years at the institute, e.g. Princeton University's system of paired four-year and two-year residential colleges, or Cornell University's West Campus House System, which only takes sophomores and above, with most", "the word university has been applied to institutions of the most diverse character, and it is only since 1880 or thereabouts that an effort has been seriously made to distinguish between collegiate and university instruction; nor has that effort yet completely succeeded. Harvard, William and Mary, and Yale . . . were organized . . . on the plans of the English colleges which constitute the universities of Oxford and Cambridge. Graduates of Harvard and Yale carried these British traditions to other places, and similar colleges grew up in New York, New Jersey, Pennsylvania, New Hampshire and Rhode Island.... Around", "be an upper division college.\nAt the time they were created, upper division colleges were seen as a way to better manage community resources and provide opportunities for students. It was thought that separating the upper division from the lower division of coursework would improve the relationship between undergraduate and graduate programs. Additionally, some believed that by creating 2+2 programs between community colleges and upper division colleges, students could continue their education without the state needing to expand existing community colleges into full four year colleges. Some commentators at the time saw the widespread development of upper division", "of higher education which have traditionally emphasized interactive instruction (although research is still a component of these institutions) at the undergraduate level. While there is no nationwide legal standard in the United States, the term \"university\" is primarily used to designate graduate education and research institutions, and is reserved for doctorate-granting institutions, and some US states, such as Massachusetts, will only grant a school \"university status\" if it offers graduate programs in multiple disciplines.\nThese colleges also encourage a high level of student-teacher interaction at the center of which are classes taught by full-time faculty rather than graduate student TAs (who", "colleges, which will often have their own faculties and departments. This is represented by examples such as Oxford and Cambridge up to the mid 19th century, the University of Wales from 1893 to 2007, and the University of London from 1900. The level of legal separation – e.g. whether the colleges are separate corporate bodies – varies between universities. As the colleges are primarily teaching institutions, they may not always be residential communities and many are effectively universities in their own right.\nSome colleges are part of loose federations that allow them to exercise nearly complete self-governance, and even (as in", "or near these nuclei, during the course of the 19th century, one or more professional schools were frequently attached, and so the word university was naturally applied to a group of schools associated more or less closely with a central school or college. Harvard, for example, most comprehensive of all, has seventeen distinct departments, and Yale has almost as many. Columbia and Penn have a similar scope. In the latter part of the 19th century Yale, Columbia, Princeton and Brown, in recognition of their enlargement, formally changed their titles from colleges to universities.\nThe issue is further confused by the fact", "schools, in the same way community colleges had expanded in the prior decades. Decline By the 1980s and 1990s, many states began to move away from the upper-division model. Despite concerns of crowding out of community colleges, it was felt that offering only the upper-level courses resulted in a poor public image and prevented the establishment of a full university setting. Many of the students seeking to transfer from a community college desired a full college experience, including electives and extra-curricular activities. The inability to reach a large critical mass prevented the upper division colleges from competing", "Quality of Undergraduate Education, which focuses on collaborative education approaches, including learning communities as one of its centerpieces.\nLearning communities began to gain popularity at other U.S. colleges and universities during the late 80s and throughout the 90s. The Washington Center's National Learning Commons Directory has over 250 learning community initiatives in colleges and universities throughout the nation. Results Universities are often drawn to learning communities because research has shown that they improve student retention rates. Emily Lardner and Gillies Malnarich of the Washington Center at the Evergreen State College note that a learning community can have a much greater", "the separation of teaching and examination, but others see the distinction as being one of governance and distribution of authority. A distinction is sometimes made between federal universities, collegiate universities (where the college is the primary academic unit, i.e. Oxford and Cambridge) and universities that have residential colleges but where these do not participate in teaching. One definition of a collegiate university states that \"it’s the sense of community within a big environment that’s the common feature\". Collegiate universities with centralised teaching In many collegiate universities, the teaching is centrally organised through departments and faculties on a university-wide basis. The", "and the central library are run by the university. Most colleges take both graduates and undergraduates, but several are for graduates only.\nUndergraduate and graduate students may name preferred colleges in their applications. For undergraduate students, an increasing number of departments practise reallocation to ensure that the ratios between potential students and subject places available at each college are as uniform as possible. For the Department of Physics, reallocation is done on a random basis after a shortlist of candidates is drawn upon and before candidates are invited for interviews at the university.\nFor graduate students, many colleges express a preference for", "universities do already offer conventional degrees such as the Open University in the United Kingdom. Presently, many of the major open education sources offer their own form of certificate. Due to the popularity of open education, these new kind of academic certificates are gaining more respect and equal \"academic value\" to traditional degrees.\nOut of 182 colleges surveyed in 2009 nearly half said tuition for online courses was higher than for campus-based ones.\nA recent meta-analysis found that online and blended educational approaches had better outcomes than methods that used solely face-to-face interaction. Education sector The education sector or education system is", "like L&T Infotech, IBM, Patni, Accenture, Microsoft, and Google.\nThe schools are around the central administrative block, leading to close relation between the university and the associated schools.", "between the various departments is carried out utilizing the advantages of a comprehensive university, to achieve world level advanced and innovative education and research.", "1998). As school districts often have decision-making panels that consist of stakeholders such as teachers, parents, and students, curriculum integration may take away their agency to make curricular choices. In addition to issues of local control, truly integrated curricula may or may not prepare students for the high-stakes tests that have become a reality for most high schools around the world, depending on whether they cover the same material. Finally, there is also concern that integrated teaching discounts the value of deep subject-specific knowledge, which is essential for specialization in areas such as medicine, law, and engineering (Gatewood, 1998). \nThematic", "York University has similar \"learning communities\" to support non-residential students. The specifics of how the collegiate system is organised – whether college membership is necessary for students, whether colleges are legally independent, the role colleges play in admissions, etc. – vary widely between different universities.\nWhile the ancient universities of Oxford and Cambridge consist of independent colleges that supplement the university's teaching with their own tutorials, some universities have built colleges that do not provide teaching but still perform much of the housing and social duties. Such colleges are planned, built and funded entirely by the central administration and are thus", "Oxbridge colleges, but similarly to Durham, these residential colleges are not autonomous legal entities nor are they typically much involved in education itself, being primarily concerned with room, board, and social life. At the University of Michigan, University of California, San Diego and the University of California, Santa Cruz, however, each of the residential colleges does teach its own core writing courses and has its own distinctive set of graduation requirements.\nMany U.S. universities have placed increased emphasis on their residential colleges in recent years. This is exemplified by the creation of new colleges at Ivy League schools such as Yale", "in the names of many secondary schools such as Rangitoto College, New Zealand's largest secondary. Philippines In the Philippines, colleges usually refer to institutions of learning that grant degrees but whose scholastic fields are not as diverse as that of a university (University of Santo Tomas, University of the Philippines, Ateneo de Manila University, De La Salle University, Far Eastern University, and AMA University), such as the San Beda College which specializes in law, AMA Computer College whose campuses are spread all over the Philippines which specializes in information and computing technologies, and the Mapúa Institute of Technology which specializes", "in most areas have a choice between free tax-funded public schools, or privately funded private schools.\nPublic school systems are supported by a combination of local, state, and federal government funding. Because a large portion of school revenues come from local property taxes, public schools vary widely in the resources they have available per student. Class size also varies from one district to another. Curriculum decisions in public schools are made largely at the local and state levels; the federal government has limited influence. In most districts, a locally elected school board runs schools. The school board appoints an official called", "students with limited jurisdiction over student affairs. Issues affecting multiple colleges are governed by the Council of the Heads of College (before 2016 called the Council of Masters), composed of the Heads of College of the fourteen colleges. Residential colleges The most distinctive feature of Yale College undergraduate life is the residential college system. The system was established in 1933 through a gift by Yale graduate Edward S. Harkness, who admired the college systems at Oxford University and Cambridge University. Each college consists of dormitory buildings surrounding an enclosed courtyard, and features a dining hall, library, and student facilities ranging", "College consists of three blocks which offers a variety of courses and options varying from Intermediate to PG in Arts, Social Sciences, Commerce and Business Management and Sciences.", "concept that schools stand in loco parentis, creating a greater legal obligation for the university to govern student life. However, professional student affairs administration in the United Kingdom is of relatively recent date: student affairs departments became a feature of all United Kingdom universities in 1992, having previously been widespread only in the new universities. United States The profession of student affairs \"grew from the campus up, not from theory down\". Early higher education in the United States was based on the Oxbridge model of education; thus, most early institutions were residential and the tutors lived in the halls", "students in foreign countries in applying to American universities, more students applying by an early method, applications submitted by Internet-based methods including the Common Application, increased use of consultants, guidebooks, and rankings, and increased use by colleges of waitlists. These trends have made college admissions a very competitive process, and a stressful one for student, parents and college counselors alike, while colleges are competing for higher rankings, lower admission rates and higher yields to boost their prestige and desirability. Admission to U.S. colleges in the aggregate level has become more competitive but most colleges admit a majority of those", "differences from studying in a brick and mortar university. There are no buildings and no campus to go to because students receive learning materials over the Internet. In most cases, only a personal computer and an Internet connection is needed that traditionally required physical presence of students in the classroom. Course materials can include printed material, books, audio and video cassettes, TV programmes, CD-ROM/software, and web sites. Support is offered to learners from the professor or a tutor online through e-mails if they are having problems with the course.\nTaking courses on-line means that students will be learning", "of education was heavily influenced by the British starting in 1835.\nIn India, the term \"college\" is commonly reserved for institutions that offer degrees at year 12 (\"Junior College\", similar to American high schools), and those that offer the bachelor's degree; some colleges, however, offer programmes up to PhD level. Generally, colleges are located in different parts of a state and all of them are affiliated to a regional university. The colleges offer programmes leading to degrees of that university. Colleges may be either Autonomous or non-autonomous. Autonomous Colleges are empowered to establish their own syllabus, and conduct and assess", "the post-16 provision provided by sixth form colleges and further education colleges. Comprehensive schools do not select their intake on the basis of academic achievement or aptitude, but there are demographic reasons why the attainment profiles of different schools vary considerably. In addition, government initiatives such as the City Technology Colleges and Specialist schools programmes have made the comprehensive ideal less certain.\nIn these schools children could be selected on the basis of curriculum aptitude related to the school's specialism even though the schools do take quotas from each quartile of the attainment range to ensure they were not selective by", "privilege\".\nBecause public and private institutions of higher learning are almost all to some extent publicly funded (i.e., federal student loans and research grants), Guinier has argued that the nation has a vested interest in seeing that all students have access to higher education and that these graduates \"contribute as leaders in our democratic polity\". By linking diversity to merit, Guinier thereby seeks to argue that preferential treatment of minority students \"confirms the public character and democratic missions of higher-education institutions. Diversity becomes relevant not only to the college's admissions process but also to its students' educational experiences and to what", "The curriculum is in no way limited to films made in the United States; a wide variety of films can be analyzed. With the United States' film industry second worldwide only to India, the attraction for film studies is high. To obtain a degree in the United States, a person is likely to pursue careers in the production of film, especially directing and producing films. Often classes in the United States will combine new forms of media, such as television or New media, in combination with film study. Those who study film want to be able to analyze the numerous" ]
How do various worms dig into people, and how do we not feel it?
[ "they normally enter through food when they are very very small. \n\nalternately there are some parasites who can enter through cuts that already exist in the skin." ]
[ "worm is highly mobile, as observed in patients’ mouths and as evidenced by the morphological design of the worm. Life cycle In humans, the hypothesized life cycle is as follows: Ingestion of contaminated food, water, or infected dung beetle. Infects upper esophagus, moves around and lays eggs in buccal cavity of human host, ingested eggs locate near esophagus, develop and mature into adult worms after two subsequent molting stages, migrate into buccal cavity, no eggs are ever found in human feces, which strengthens the assumption that humans are solely incidental, accidental, and dead end hosts for the Gongylonema pulchrum parasite", "in the preferred place, according to type, either in the veins of the bladder or veins of the wall of the intestine, where it reaches the growth of sexual in a few weeks , Also, adult worms live in humans for an extended period of 30 years. Paragonimus This worm has a global spread in mammals, but its presence in humans is confined mainly to the Far East. The adult worm lives in the human lungs. Humans get infected by eating an infected raw crab, or astacus. This is commonly followed in the Far East, where raw and salted crustaceans", "clitellum (behind the spermathecae) secretes material which forms a ring around the worm. The worm then backs out of the ring, and as it does so, it injects its own eggs and the other worm's sperm into it. As the worm slips out of the ring, the ends of the cocoon seal to form a vaguely onion-shaped incubator (cocoon) in which the embryonic worms develop. Locomotion Earthworms travel underground by the means of waves of muscular contractions which alternately shorten and lengthen the body (peristalsis). The shortened part is anchored to the surrounding soil by tiny claw-like bristles (setae) set", "By randomly moving through these pores, P. rudis larvae find their host worms. A larva is prompted to penetrate an earthworm when it senses “penetration inducing factor,” a substance that is present in the slime and coelomic fluid of an earthworm. The larvae then use their mandibles to penetrate the dorsal side of a worm. It is important that they find their host quickly, because larvae must penetrate a worm within three days in order to survive.\nMore than one larva can penetrate a single earthworm, and two or more larvae can share a penetration site. Once the host worm", "Worm charming Worm charming, worm grunting, and worm fiddling are methods of attracting earthworms from the ground. The activity is usually performed to collect bait for fishing but can also take the form of a competitive sport in areas such as east Texas. As a skill and profession worm charming is now very rare, with the art being passed through generations to ensure that it survives. Methods Most worm charming methods involve vibrating the soil, which encourages the worms to the surface. In 2008 researchers from Vanderbilt University claimed that the worms surface because the vibrations are", "worms' bodies were in the passages of the sponges. The bodies branched repeatedly so that each worm had a single head and many anuses.\nS. ramosa is a \"stolonate\" worm and has a bizarre life cycle. The terminal portion of a branch is known as a \"stolon\", and develops an extra head with large eyes and no mouth. The gut in this part of the animal is absorbed, the muscles are rearranged to facilitate swimming and the stolon becomes a storage receptacle for the eggs or sperm. When the breeding period arrives, the stolon becomes detached and swims to the surface", "underground by burrowing.\nIn biology, \"worm\" refers to an obsolete taxon, vermes, used by Carolus Linnaeus and Jean-Baptiste Lamarck for all non-arthropod invertebrate animals, now seen to be paraphyletic. The name stems from the Old English word wyrm. Most animals called \"worms\" are invertebrates, but the term is also used for the amphibian caecilians and the slowworm Anguis, a legless burrowing lizard. Invertebrate animals commonly called \"worms\" include annelids (earthworms and marine polychaete or bristle worms), nematodes (roundworms), platyhelminthes (flatworms), marine nemertean worms (\"bootlace worms\"), marine Chaetognatha (arrow worms), priapulid worms, and insect larvae such as grubs and maggots.\nWorms may also", "worms can cause many different gastrointestinal symptoms and allergic responses. Common symptoms include chronic urticaria, skin eruption, and phlyctenular keratoconjunctivitis. Diphyllobothriasis Diphyllobothriasis is caused by infection with Diphyllobothrium latum (also known as the \"broad tapeworm\" or \"fish tapeworm\") and related species. Humans become infected by eating raw, undercooked, or marinated fish acting as a second intermediate or paratenic host harboring metacestodes or plerocercoid larvae.\nClinical symptoms are due to the large size of the tapeworm, which often reaches a length exceeding 15 m (49 ft). The most common symptom is pernicious anemia, caused by the absorption of vitamin B₁₂ by the worm. Other", "300 affecting humans alone.\nHelminths of importance in the sanitation field are the human parasites, and are classified as Nemathelminthes (nematodes) and Platyhelminthes, depending on whether they possess a round or flattened body, respectively.\nRingworm (dermatophytosis) is actually caused by various fungi and not by a parasitic worm. Reproduction and life cycle The lifetime of adult worms varies tremendously from one species to another but is generally in the range of 1 to 8 years (see following table). This lifetime of several years is a result of their ability to manipulate the immune response of their hosts by secreting immunomodulatory products. \nHelminths", "the lung tissue. The adult parasitic worm is a hermaphrodite and grows to be about ten times the length of the free-living form. The eggs it produces are coughed into the frog's mouth, are swallowed and develop in its intestine. They are passed in the feces and develop into free-living forms. In the soil, the worms feed on bacteria and other organic matter. The female may produce a pheromone to attract a male. Parasitism Rhabdias bufonis is found in the parts of Europe and Asia in which its host frogs are found. Besides the common toad from which this roundworm", " Additionally, chronic abscesses can be caused by the dying worms.\nThe most visual sign of an adult worm infections is when the worm crosses the sclera of the eye, which causes significant pain to the host and is usually associated with inflammation and less likely, blindness. Eye worms typically cause little eye damage and last a few hours to a week. Other tissues in which this worm can be found includes: the penis, testes, nipples, bridge of the nose, kidneys, and heart. The worms in these locations are not always externally visible. Risk factors People at the highest risk for", "Worm cast A worm cast is a structure created by worms, typically on soils such as those on beaches that gives the appearance of multiple worms.", "cord running back along its length to motor neurons and sensory cells in each segment. Large numbers of chemoreceptors are concentrated near its mouth. Circumferential and longitudinal muscles on the periphery of each segment enable the worm to move. Similar sets of muscles line the gut, and their actions move the digesting food toward the worm's anus.\nEarthworms are hermaphrodites: each individual carries both male and female sex organs. As invertebrates, they lack either an internal skeleton or exoskeleton, but maintain their structure with fluid-filled coelom chambers that function as a hydrostatic skeleton.\n\"Earthworm\" is the common name for the largest members", "Trematoda in Kuwait Trematoda is a whole-living worm that lives in different parts of the host's body, some of which live in bile ducts. These are called hepatic worms such as Fasciola species, including species that live in the intestines such as the genus Heterophyes, including those living in blood vessels such as the genus that causes schistosomiasis, the genus of Schistosoma. Including what lives in the lung such as the genus of Paragonimus.\nThese worms are characterized by particular growth in the reproductive organs and reduction in the organs of movement and digestion, most of which are effeminate, that the", "of coenurosis-causing parasites cannot develop into worms inside of humans. Symptoms In humans, this parasitic infection causes a variety of symptoms, depending on where the cyst occurs. The tapeworm larvae group together to form fluid filled cysts in various body tissues. These cysts start out small, but as the larvae grow, the cyst can reach the size of an egg. The cysts of T. multiceps are usually between 2 and 6 cm in diameter and are most commonly found in the CNS and can contain anywhere from a few to over a hundred worm larvae within them. T serialis and", "Parasitic worm Parasitic worms, also known as helminths, are large macroparasites; adults can generally be seen with the naked eye. Many are intestinal worms that are soil-transmitted and infect the gastrointestinal tract. Other parasitic worms such as schistosomes reside in blood vessels. \nSome parasitic worms, including leeches and monogeneans, are ectoparasites - thus, they are not classified as helminths, which are endoparasites.\nParasitic worms live in and feed in living hosts. They receive nourishment and protection while disrupting their hosts' ability to absorb nutrients. This can cause weakness and disease in the host. Parasitic worms cannot reproduce entirely within humans;", "includes a pair of antennae, tentacle-like palps, and a pair of pits lined with cilia, known as \"nuchal organs\". These latter appear to be chemoreceptors, and help the worm to seek out food. Internal anatomy and physiology The outer surface of the body wall consists of a simple columnar epithelium covered by a thin cuticle. Underneath this, in order, are a thin layer of connective tissue, a layer of circular muscle, a layer of longitudinal muscle, and a peritoneum surrounding the body cavity. Additional oblique muscles move the parapodia. In most species the body cavity is divided into separate compartments", "be called helminths, particularly in medical terminology when referring to parasitic worms, especially the Nematoda (roundworms) and Cestoda (tapeworms) which reside in the intestines of their host. When an animal or human is said to \"have worms\", it means that it is infested with parasitic worms, typically roundworms or tapeworms. Lungworm is also a common parasitic worm found in various animal species such as fish and cats. History In taxonomy, \"worm\" refers to an obsolete grouping, Vermes, used by Carl Linnaeus and Jean-Baptiste Lamarck for all non-arthropod invertebrate animals, now seen to be polyphyletic. In 1758, Linnaeus created the first", "up burrows, and for food. Worms drag experimental triangles of paper by the apex most of the time, and do not rely on trial and error. Worms excavate burrows by consuming material or, preferably, pushing it away. They mainly consume soil for nutrients. They are found down to six or more feet, especially in extreme conditions. Burrows are lined, which serve several functions, and terminate in a chamber lined with stones or seeds. Worms are found all over the planet, some on isolated islands; how they got there is a mystery. Darwin draws on correspondence with people from around the", "Worms of the Earth Plot Bran Mak Morn, King of the Picts, vows vengeance on Titus Sulla, a Roman governor, after witnessing the crucifixion of a fellow Pict. He seeks forbidden aid from the Worms of the Earth, a race of creatures who Bran Mak Morn's ancestors banished from their kingdom centuries ago. They were once men, but millennia of living underground caused them to become monstrous and semi-reptilian. \nSearching for a contact with these creatures, Bran Mak Morn encounters a witch who lives in a secluded hut, shunned by her neighbors, who was born from a sexual encounter between", "them. The worms' digestive systems create environments that allow certain species of microbes to thrive to help create a \"living\" soil environment for plants. The fraction of soil which has gone through the digestive tract of earthworms is called the drilosphere. Suitable worm species One of the species most often used for composting is the red wiggler or tiger worm (Eisenia fetida or Eisenia andrei); Lumbricus rubellus (a.k.a. red earthworm or dilong (China)) is another breed of worm that can be used, but it does not adapt as well to the shallow compost bin as does Eisenia fetida. European nightcrawlers", "like all other tapeworms, lacks a digestive system and feeds by absorption on nutrients in the intestinal lumen. They have nonspecific carbohydrate requirements and they seem to absorb whatever is being passed through the intestine at that time. When it becomes an adult, it attaches to the intestinal walls with its suckers and toothed rostellum and has its segments reaching out into the intestinal space to absorb food. Treatment The prescription drug Praziquantel is usually prescribed in a single dose to patients suffering from infection of H.nana. Praziquantel is widely used and preferred due to its high efficacy. Research has", "of the other's body they are able to penetrate. After successfully injecting the other, the spermatozoa stream through their partner's body on their way to ovaries, where they will fertilize the eggs. The stream is visible through the body tissue of the worm, appearing as pale streaks, like lightning jags.", "Worm Worms /wɜːrm/ are many different distantly related animals that typically have a long cylindrical tube-like body, no limbs, and no eyes. Worms vary in size from microscopic to over 1 metre (3.3 ft) in length for marine polychaete worms (bristle worms), 6.7 metres (22 ft) for the African giant earthworm, Microchaetus rappi, and 58 metres (190 ft) for the marine nemertean worm (bootlace worm), Lineus longissimus. Various types of worm occupy a small variety of parasitic niches, living inside the bodies of other animals. Free-living worm species do not live on land, but instead, live in marine or freshwater environments, or", "corporis is found on the body, tinea cruris (jock itch) on the groin, tinea capitis on the scalp, and tinea pedis (athlete’s foot) on the foot. Although they are not harmful, they are highly contagious and difficult to treat. The symptoms of ringworm include patches of skin that are red, swollen, and irritated, forming the shape of a ring. Ringworm will last between two and four weeks with treatment. Tinea infections can be combatted orally or topically with numerous different medications. Some topical treatments include Mentax 1%, Lamisil 1%, Naftin 1% and Spectazole and these creams should", "Earthworm An earthworm is a tube-shaped, segmented worm found in the phylum Annelida. They have a world-wide distribution and are commonly found living in soil, feeding on live and dead organic matter. An earthworm's digestive system runs through the length of its body. It conducts respiration through its skin. It has a double transport system composed of coelomic fluid that moves within the fluid-filled coelom and a simple, closed blood circulatory system. It has a central and a peripheral nervous system. The central nervous system consists of two ganglia above the mouth, one on either side, connected to a nerve", "chronic mucous diarrhea interrupted with colic and discomfort in the abdomen. If worms penetrate the intestinal wall, they may reach the lymphatic or blood vessels and cause tumors in the heart or brain.\nInfection can be avoided by refraining from eating raw or poorly cooked fish or eating salted and grounded salted Fesikh for less than 14 days. Schistosoma Schistosoma is one of the most important parasitic worms on humans, and this worm does not take the life cycle in Kuwait, but some of those coming to Kuwait come from neighboring countries where this worm is endemic and spread, as the", "than eight sometimes forming a complete circle of setae per segment. Special ventral setae are used to anchor mating earthworms by their penetration into the bodies of their mates.\nGenerally, within a species, the number of segments found is consistent across specimens, and individuals are born with the number of segments they will have throughout their lives. The first body segment (segment number 1) features both the earthworm's mouth and, overhanging the mouth, a fleshy lobe called the prostomium, which seals the entrance when the worm is at rest, but is also used to feel and chemically sense the worm's surroundings.", "within the adult male worm's gynaecophoric canal, which is a modification of the ventral surface of the male, forming a groove. The paired worms move against the flow of blood to their final niche in the mesenteric circulation, where they begin egg production (>32 days). The S. mansoni parasites are found predominantly in the small inferior mesenteric blood vessels surrounding the large intestine and caecal region of the host. Each female lays approximately 300 eggs a day (one egg every 4.8 minutes), which are deposited on the endothelial lining of the venous capillary walls. Most of the body mass of", "tapeworm that is 3- 6mm long, and lives in the small intestine of canines. The segmented worm contains a scolex with suckers and hooks that enable attachment to the mucosal wall, since tapeworms do not have a digestive tract. A short neck connects the head to three proglottids, the body segment of the worm which contains the eggs to be excreted in the feces. Diagnosis Serological and imaging tests are commonly used to diagnose this disease. Since the serological tests for alveolar echinococcosis only indicate exposure to the parasite and not ongoing infection, visualization of the parasitic mass is required" ]
why are transgender issues suddenly all over the place?
[ "Causes are fashion for many people. And transgender issues are currently the most fashionable. I say this as someone who fully believes that trans people deserve equality and freedom from persecution, but also as someone who recognises that people clearly bandwagon." ]
[ "or prejudice.\nTransgender people who are going through divorce, inheritance battles or custody disputes are vulnerable to legal challenges. This is because the validity of their marriages is often called into question due to inconsistent laws regulating transgender equality.\nA tremendous inconsistency in the US is that some states recognize a transgender person's gender transition while other states do not. Laws vary from state to state concerning the requirements for changing the gender on birth certificates and other identity documents. Laws also vary concerning whether a state will accept such identity documents as conclusive with respect to one's gender identity.\nIn August 2013,", "with unemployment, low income, and assault (both sexual and physical) raising the risk factors.\nThe pure social stigma of being transgender is a root cause for poor health care, which manifests into other areas of transgender people. Social determinants of health, including violence and discrimination, may result in negative personal psychological and physiological effects. The access to proper health care is essential in both the transitioning and resilience. In a study of resilience of transgender people of color, Jay, a 41-year-old FTM POC, stated he “had no place to turn to get help in transition—and worked five jobs trying to save", "transgender woman was killed by a mob in Hyderabad, India, following false rumors that transgender women were sex trafficking children. Three other transgender women were injured in the attack.\nRecent research on university-level students indicated the importance of queer visibility and its impact in creating a positive experience for LGBTIQ+ members of a campus community, this can reduce the impact and effect of incidents on youth attending university. When there is a poor climate - students are much less likely to report incidents or seek help. Violence at universities In the United States, colleges and universities in the past few years", "discrimination and violence (transgender people are 28% more likely to be victims of violence) against transgender persons can make coming out a risky decision. Fear of retaliatory behavior, such as being removed from the parental home while underage, is a cause for transgender people to not come out to their families until they have reached adulthood. Parental confusion and lack of acceptance of a transgender child may result in parents treating a newly revealed gender identity as a \"phase\" or making efforts to change their children back to \"normal\" by utilizing mental health services to alter the child's gender identity.\nThe", "health problems due to living on the margins of society. The authors of the study recommended that the World Health Organization declassify transgender identity as a mental disorder, to reduce stigma against this population. United States Transgender people face various kinds of discrimination, especially in health care situations. An assessment of transgender needs in Philadelphia found that 26% of respondents had been denied health care because they were transgender and 52% of respondents had difficulty accessing health services. Aside from transition related care, transgender and gender non-conforming individuals need preventative care such as vaccines, gynecological care, prostate exams, and other", "women in the US have encountered the subject of anti-trans stigma, which includes criminalization, dehumanization, and violence against those who identify as transgender. From a societal stand point, a trans person can be victim to the stigma due to lack of family support, issues with health care and social services, police brutality, discrimination in the work place, cultural marginalisation, poverty, sexual assault, assault, bullying, and mental trauma. The Human Rights Campaign tracked over 128 cases that ended in fatality against transgender people in the US from 2013-2018, of which eighty percent included a trans woman of color. In the USA,", "marriage rights and the retirement abilities that come with that to LGBTQ+ citizens. Transgender-specific issues The transgender population of the United States has been fairly hidden until the late 20th century, not being exposed to the national spotlight until recently, and only being declassified as a mental illness in 2012. As the earlier set of transgender population reaches retirement age, or as older persons come out as transgender, there are certain issues that have arisen. There is a large variance in medical treatment across the United States, for example; a lasting issue is the fact that many health insurance agencies", "as encountering troubles with the law, including arrest and criminal prosecution; enduring workplace violence; and possibly contracting sexually transmitted diseases such as HIV.\nThe transgender community faces huge amount of employment discrimination due to their gender identity, and there are very few laws that protect the employment rights of this community. It results in limited career options for the transgender community leaving them economically vulnerable. A study conducted by Anneliese Singh and Vel McKleroy on transgender people of color revealed that difficulty finding a job or losing a job due to transphobia in workplace resulted in some of the transgender people", "leave their families or live a life of secrecy. It’s also really hard to find work thanks to societal perceptions, which again is why you get many trans people who are engaged in sex work or who are dancers,”.\n\nA number of transgender people complain about the high cost of undertaking conversion to their desired gender, in-part because government funded facilities are generally of poorer quality and that a lack of trained staff exist on the island.\nChandrasena’s success enables her to get first-rate medical care. She started getting hair removal treatments in 2009; the facial laser treatment she undergoes every six", "stated that transgenders have remained untouchable in society with restricted access to education, health care and jobs. The justices criticized the government for such discrimination during a hearing of public interest litigation filed by the National Legal Services Authority\". This problem for Hijras first began during the British rule (1757-1947) with the introduction of Section 377 of the Indian Penal Code in 1860 which declared homosexuality as a crime, and had an extended listing which has declared \"Transgenders as criminal elements in society\".\nTransgender people have been treated as outcasts within Indian society and thus have been \"deprived of social and", "Pakhtunkhwa alone, and 46 transgender people had been killed since January 2015. There are reports that show that violence against transgender individuals has been increasing every year. Very often when these cases are reported to the police they may be met with inaction or indifference. Actions After a long period of public protests and appeals, In 2009, Supreme Court of Pakistan legally recognized transgenders as a third gender promising them Computerised National Identity Card (CNIC). The court also directed government agencies and offices to employ transgenders but that hasn't seen much traction. However, Cantonment Board Faisal (CBF) gave out an", "were reasons for pessimism and inactivity in transgender community.\nNevertheless, legal status improved across the country, resulting in easier paths for transgender people to change the gender designations on state-issued identification documents and to find professional and affordable health care. In 1975, the city of Minneapolis became the first governmental entity in the United States to pass trans-inclusive civil rights protection legislation. New questions, subcultures and challenges in 1980s and after When the AIDS epidemic became visible in 1981, transgender people—especially minorities involved in street prostitution and injection drug subcultures—were among the hardest hit. One of the few bright spots in", "living in crime-ridden neighborhoods, and getting involved in abusive relationships. Lack of employment has also resulted in the transgender community resorting to illegal activities like selling drugs or sex work for the income support. From government Transgender people also face the denial of right of asylum or inhuman treatment in process of asylum-seeking. For example, Fernada Milan, a transgender woman from Guatemala was placed in an asylum center for males in Denmark and while there, was raped by several men. She was in danger of deportation into Guatemala where transgender people have no rights and face possible execution, but has", "birth gender. In addition to many of the same barriers as the rest of the LGBT community, a WHO bulletin points out that globally, transgender individuals often also face a higher disease burden. A 2010 survey of transgender and gender-variant people in the United States revealed that transgender individuals faced a significant level of discrimination. The survey indicated that 19% of individuals experienced a healthcare worker refusing care because of their gender, 28% faced harassment from a healthcare worker, 2% encountered violence, and 50% saw a doctor who was not able or qualified to provide transgender-sensitive care. In Kuwait, there", "and forced them to sleep and bathe in the presence of men. Transgender people may also be denied service in restaurants.\nThe experience of being misgendered is common for all transgender people before they transition, and for many afterwards as well. Transgender people are regularly misgendered by doctors, police, media and peers, experiences that they have described as mortifying, hurtful, especially to transgender youth, cruel, and \"only making our lives harder\". A 2018 study of 129 transgender and other gender-expansive youth, published in the Journal of Adolescent Health, found that \"for each additional social context in which a youth's chosen name", "and physically assaulted, both by strangers and acquaintances, than cisgender individuals are. In addition, there are several factors that limit transgender people's access to health care facilities and proper medical care, including transphobia and the tendency of gender-segregated homeless and domestic violence shelters to refuse service to transgender and gender nonconforming individuals. One study reported that 19% of transgender individuals interviewed reported being refused medical care due to their gender identity, while 28% reported being harassed in a medical setting and 2% reported violence toward them in a medical setting due to their gender identity. In the same study, 50%", "since been granted entry.\nTransgender disenfranchisement is the practice of creating or upholding barriers that keep transgender individuals from voting and therefore restrict the principles of universal suffrage. In education Within the school system, many transgender teens are harassed and mistreated with reported negative effects on both victim and the school's population in general. \"Transgender youth frequently report fear and anxiety about using restrooms and locker rooms at school because they had experienced harassment by both peers and adults when using them.\" Over 80% of transgender teens report feeling unsafe in a school environment, more than 40% report having been physically", "reported violence or harassment because of their gender identity. 56% had been harassed or verbally abused, 30% had been assaulted, 17% had had objects thrown at them, 14% had been robbed and 8% had experienced what they characterized as an unjustified arrest.\nA study of 81 transgender people in Philadelphia found 30% reported feeling unsafe in public because they were transgender, with 19% feeling uncomfortable for the same reason. When asked if they had ever been forced to have sex, experienced violence in their home, or been physically abused, the majority answered yes to each question.\nA review of American studies on", "transgender unit, some transgender detainees request to be placed with the male population, as they fear that stigma may possibly arise as a result from being separated from the normal population. Investigations of the conditions under which queer detainees (LGBT) live in has resulted in an overwhelming plea for reformation, suggesting that these individuals do not receive adequate protection, care, and housing After investigating the conditions under which transgender detainees live in within these facilities, the SPLC generated a series of potential improvements that can be made to better provide for the safety and comfort of these transgender individuals.\nMany LGBTQ", "informing the public about transgender individuals and the challenges they face. Legal rights According to the Transformative Justice Law Project of Illinois, transgender people are \"over-represented in the criminal legal system due to institutionalized oppression and increased poverty and criminalization.\"\nMany transgender individuals have difficulties correcting their name and gender on their ID and personal documents. According to the National Center for Transgender Equality, \"only one-fifth (21%) of transgender people who have transitioned in the National Transgender Discrimination Survey have been able to update all of their IDs and records with their new gender and one-third (33%) had updated none of", "often discourages transgender people from seeking further employment opportunities or entering the job market. The research also found that they are faced with \"daily discrimination and humiliation\" which often cuts short their careers. An editorial in the Bangkok Post in 2013 noted that \"we don't find transgenders as high-ranking officials, doctors, lawyers, scientists, or teachers in state-run schools and colleges. Nor as executives in the corporate world. In short, the doors of government agencies and large corporations are still closed to transgender women.\"\nIn 2007, the Thai National Assembly debated allowing transgender people to legally change their names after having a", "family member and 8% were kicked out of their homes for being transgender. The majority of those who were openly transgender or perceived as transgender at school were victims of some form of mistreatment on account of this, including verbal abuse (54%), physical attacks (24%), and sexual assault (13%). 17% experienced such severe mistreatment that they had to leave school. Support from one's community or family was correlated with more positive outcomes related to mental health and social functioning.\n62% of lawsuits involving transgender people state that defendants face family problems. Poverty and homelessness Nearly one third of U.S. transgender people", "gay people have experienced some form of discrimination and harassment at the workplace. Moreover, a staggering 90 percent of transgender workers report some form of harassment or mistreatment on the job.\" Many people in the LGBT community have lost their job, including Vandy Beth Glenn, a transgender woman who claims that her boss told her that her presence may make other people feel uncomfortable.\nAlmost half of the United States has laws banning the discrimination of gender non-conforming and transgender people in both public and private workplaces. A few more states ban LGBT discrimination in only public workplaces. Some opponents of", "from her job at the Georgia Legislative Assembly due to her transgender status. Relying on Price Waterhouse v. Hopkins and other Title VII precedent, the Court concluded that the plaintiff was discriminated against based on her sex because she was transitioning from male to female. The Court stated that a person is considered transgender \"precisely because of the perception that his or her behavior transgresses gender stereotypes.\" As a result, there is \"congruence\" between discriminating against transgender individuals and discrimination on the basis of \"gender-based behavioral norms.\" \"Because everyone is protected against discrimination based on sex stereotypes, such protections cannot", "responding to the 2015 U.S. Transgender Survey lived in poverty, compared to 14% of the population. During the 12 months prior to the survey, 30% of employed transgender people were either fired or mistreated for being transgender, from verbal abuse to sexual violence. 30% had been homeless at some point in their life, and 12% had been homeless during the previous year. Family and community support were correlated with significantly lower rates of homelessness and poverty. Violence and harassment During the year prior to the 2015 U.S. survey, 46% of respondents had been verbally harassed and 9% had been physically", "women object. Violence against trans women In 2009, United States data showed that transgender people are likely to experience a broad range of violence in the entirety of their lifetime. Violence against trans women in Puerto Rico started to make headlines after being treated as \"An Invisible Problem\" decades before. It was reported at the 58th Convention of the Puerto Rican Association that many transgender women face institutional, emotional, and structural obstacles. Most trans women don't have access to health care for STD prevention and are not educated on violence prevention, mental health, and social services that could benefit them.\nTrans", "where they were able to vet clients.\nFrequently, the media, and politicians (and as a result, society) sensationalize transgender identities and oppression is reinforced. Aware of this trend, in 2016, a coalition of over 250 anti-sexual assault and domestic violence organizations have released a joint letter decrying the trend of portraying transgender people in restrooms as sexual predators as untrue and harmful. Likewise, GLAAD has released a media guide for reporters covering restroom usage in relation to the transgender community.\nMany transgender advocates also advocate for converting single-occupant, gender-segregated restrooms into single-occupant, all-gender restrooms by simply changing the signs due to the", "high rates of Intimate Partner violence impact trans women differently because they are facing discrimination from police and health providers, and alienation from family. In 2018, it was reported that 77 percent of transgender people who were linked to sex work and 72 percent of transgender people who were homeless, were victims of intimate partner violence. Reproductive and sexual health and rights The importance of women having the right and possibility to have control over their body, reproduction decisions, and sexuality, and the need for gender equality in order to achieve these goals are recognized as crucial by the Fourth", "and a sense of belonging to a community. These reasons contribute to the belief that the United States Armed Forces is one of the largest, if not the largest, employer of transgender Americans. \nA key controversy and concern for transgender service members is the use of military medical services to transition from one gender to another. Barack Obama administration On 22 August 2013, the day after her sentencing at an Army court-martial, U.S. soldier Chelsea Manning issued a public statement declaring herself to be a transgender woman. In 2014, while incarcerated in the United States Disciplinary Barracks, Manning filed a", "\"were contented with what they had done and that only a few regretted it. But in every other respect, they were little changed in their psychological condition. They had much the same problems with relationships, work, and emotions as before. The hope that they would emerge now from their emotional difficulties to flourish psychologically had not been fulfilled\". He has said that medical treatment for transgender youth is “like performing liposuction on an anorexic child”, described post-operative transgender women as “caricatures of women” because the surgery failed to change many of their male traits, and stated that “The transgendered" ]
How can clams grow shells?
[ "In a very similar manner to how humans grow bones and teeth. They capture the elements they need to form them from their environment, and react them together in such a way as to deposit a solid mineral in the places they need it." ]
[ "and in some cases can cover the shell, and which are partially retractable. The mantle is attached to the shell, and creates the shell and makes shell growth possible by secretion. \nMost molluscs, including land snails, have a shell which is part of their anatomy since the larval stage, and which grows with them in size by the process of secreting calcium carbonate along the open edge and on the inner side for extra strength. Although some land snails create shells that are almost entirely formed from the protein conchiolin, most land snails need a good supply of calcium in", "Afterwards, they leave the ocean permanently and lose the ability to breathe in water. As with all hermit crabs, they change their shells as they grow. Young coconut crabs that cannot find a seashell of the right size often use broken coconut pieces. When they outgrow their shells, they develop a hardened abdomen. The coconut crab reaches sexual maturity around 5 years after hatching. They reach their maximum size only after 40 to 60 years. Distribution Coconut crabs live in the Indian Ocean and the central Pacific Ocean, with a distribution that closely matches that of the coconut palm. The", "shells are less than 1 mm at adult size. Because the shells of sea snails are strong and durable in many cases, as a group they are well represented in the fossil record. Anatomy Sea snails are a very large group of animals and a very diverse one. Most snails that live in salt water respire using a gill or gills, a few species, though, have a lung, are intertidal, and are active only at low tide when they can move around in the air. These air-breathing species include false limpets in the family Siphonariidae and another group of false limpets", "that feed on stone crabs include horse conch, grouper, sea turtles, cobia, and octopuses. Habitats Stone crabs can be found in 6-inch- to 3-foot-deep holes near dock pilings in water 1 foot to 5 feet deep. Oftentimes the hole will have shells around the opening; the crab uses the shell as a digging tool for the hole construction. Reproduction Females reach sexual maturity at about two years of age. Their long spawning season lasts all spring and summer, during which time females produce up to a million eggs. The larvae go through six stages in about four weeks before emerging", "their diet and environment to produce a strong shell. A lack of calcium, or low pH in their surroundings, can result in thin, cracked, or perforated shells. Usually a snail can repair damage to its shell over time if its living conditions improve, but severe damage can be fatal.\nWhen retracted into their shells, many snails with gills (including some terrestrial species) are able to protect themselves with a door-like anatomical structure called an operculum.\nLand snails range greatly in size. The largest living species is the Giant African Snail or Ghana Tiger Snail (Achatina achatina; Family Achatinidae), which can measure", "shell leaving its old shell vacant, the crabs then all rapidly exchange shells, in sequence, until they all have a larger shell, allowing them to grow without restriction. This behavior makes Hermit crabs an ideal animal model for testing predictions of vacancy chain theory. Similar shelter-based vacancy chains are likely to take place in many animal groups that use discrete, reusable resources that are limited to occupancy by a single individual or group at a time; some other examples include anemone-dwelling clownfish, and cavity-nesting birds.", "the brains of mammals, reptiles and birds, but nonetheless, snails are capable of associative learning. Growth of the shell As the snail grows, so does its calcium carbonate shell. The shell grows additively, by the addition of new calcium carbonate, which is secreted by glands located in the snail's mantle. The new material is added to the edge of the shell aperture (the opening of the shell). Therefore, the centre of the shell's spiral was made when the snail was younger, and the outer part when the snail was older. When the snail reaches full adult size, it may build", "instead harden their abdominal terga by depositing chitin and chalk. Not being constrained by the physical confines of living in a shell allows this species to grow much larger than other hermit crabs in the family Coenobitidae. Like most true crabs, B. latro bends its tail underneath its body for protection. The hardened abdomen protects the coconut crab and reduces water loss on land, but must be moulted periodically. Adults moult annually, and dig a burrow up to 1 m (3 ft 3 in) long in which to hide while vulnerable. It remains in the burrow for 3 to 16 weeks, depending on the", "large variety of algae, and sometimes also on detritus. They actively scrape the algal growths off rocks, and this tends to cause erosion over time. Feeding commonly occurs during the nocturnal period, when the snails are most active. Biological interactions A small limpet, Lottia leucopleura, often lives on the underside of the shell of this large sea snail. The crab Pinnotheres barbatus is mentioned as a commensal. The sessile vermetid gastropod Dendropoma corrodens (also known as ringed wormsnail) and the tube dwelling polychaete Spirorbis may live attached to the shell of Cittarium pica, as is also the case for several", "quickly before they reach a career bottleneck caused by the lack of opportunities at higher levels. In other species Synchronous and asynchronous vacancy chains have been found to occur amongst both terrestrial and marine populations of hermit crabs. The crabs live in shells left behind by other species but need to move into a new, larger, shell as they grow. When a vacant shell becomes available, the crabs may slowly form a chain, ranging from the largest to the smallest crab until one arrives that is just the right size for the shell. Once the \"Goldilocks\" crab claims the new", "Acanthoceras (ammonite) Description Their shells had ornate ribs whose function is unknown, although some scientists have speculated that these ribs helped strengthen the animals' shells to allow them to live at greater depths where the water pressure is higher. An adult had a shell diameter of approximately 100 centimetres (39 in). Distribution Acanthoceras fossils have been found in Australia, Brazil, Bulgaria, Colombia (Hondita Formation, Prado, Tolima), Denmark, Egypt, France, Germany, India (Gujrat)\n, Iran, Madagascar, Mexico, Mozambique, Nigeria, Papua New Guinea, Peru, the United Kingdom, United States (California, Minnesota, New Mexico, Texas), and Venezuela.", "shells in sequence, each one moving up to the next size. Hermit crabs often \"gang up\" on one of their species with what they perceive to be a better shell, and pry its shell away from it before competing for it until one takes it over.\nThere are cases when sea shells are not available and hermit crabs will use alternatives such as tin cans or any other types of debris or even custom-made shells.\nFor some larger marine species, supporting one or more sea anemones on the shell can scare away predators. The sea anemone benefits, because it is in position", "shell is found to be too large, the crab goes back to its own shell and then waits by the vacant shell for up to 8 hours. As new crabs arrive they also inspect the shell and, if it is too big, wait with the others, forming a group of up to 20 individuals, holding onto each other in a line from the largest to the smallest crab. As soon as a crab arrives that is the right size for the vacant shell and claims it, leaving its old shell vacant, then all the crabs in the queue swiftly exchange", "plankton. They eventually settle on the ocean floor where they develop into hard-shelled snails. Growth is rapid over the first year of life, and reproduction occurs from the second year onwards. Large specimens may be over ten years old. Reasons for the survival of this invasive species It is known that the abundance of prey, the lack of competition from other gastropod species, as well as the absence of direct predators of R. venosa may be some of the factors that contributed to the successful establishment of new populations of this sea snail outside its native range. The thick", "Soft-shell crab Soft-shell crab is a culinary term for crabs that have recently molted their old exoskeleton and are still soft. Soft-shells are removed from the water as soon as they molt to prevent any hardening of their shell. This means that almost the entire animal can be eaten, rather than having to shell the animal to reach the meat. The exceptions are the mouthparts, the gills and the abdomenal cover, which, though edible when shells are very soft, are usually discarded (\"cleaned\"). The remaining, edible part of the crab is typically deep fried or sautéed.\nIn the United States,", "They gain their name due to the fact they grew on stalks with branches. It is possible to find a branching coral in life position, although this is quite uncommon. Snails Gastropods, or snails, are uncommon in Michigan's Devonian deposits. Usually all that is found are pieces of the shell, but it is possible to find complete specimens. Most of Michigan's fossil snails are small, but some grew to the size of a human head. It is also possible to find the gastropod Platyceras attached to a crinoid or brachiopod, indicating that they may have fed on their waste. Many", "Development of freshwater crabs is characteristically direct, where the eggs hatch as juveniles, with the larval stages passing within the egg. The broods comprise only a few hundred eggs (compared to hundreds of thousands for marine crabs), each of which is quite large, at a diameter around 1 mm (0.04 in).\nThe colonisation of fresh water has required crabs to alter their water balance; freshwater crabs can reabsorb salt from their urine, and have various adaptations to reduce the loss of water. In addition to their gills, freshwater crabs have a \"pseudolung\" in their gill chamber that allows them to breathe in air.", "shell has hardened. Inseminated females retain spermatophores for up to one year, which they use for multiple spawnings in high salinity water. During spawning, a female extrudes fertilized eggs onto her swimmerets and carries them in a large egg mass, or sponge, while they develop. Females migrate to the mouth of the estuary to release the larvae, the timing of which is believed to be influenced by light, tide, and lunar cycles. Blue crabs have high fecundity: females may produce up to 2 million eggs per brood.\nMigration and reproduction patterns differ between crab populations along the East Coast and the", "migrate upward in the water column as tides travel landward toward estuaries. Eventually blue crabs arrive in brackish water, where they spend the majority of their life. Chemical cues in estuarine water prompt metamorphosis to the juvenile phase, after which blue crabs appear similar to the adult form.\nBlue crabs grow by shedding their exoskeleton, or molting, to expose a new, larger exoskeleton. After it hardens, the new shell fills with body tissue. Shell hardening occurs most quickly in low salinity water where high osmotic pressure allows the shell to become rigid soon after molting. Molting reflects only incremental growth, making", "of calcium carbonate shells to protect themselves. These organisms are one of the most abundant groups of shelled organisms, but are very small, usually between 0.05 and 0.5mm in diameter. However their shells are divided into chambers that accumulate during growth, in some cases allowing these single-celled organisms to become almost 20 centimeters in length. Foraminiferal classification is dependent on the characteristics of the shell, such as chamber shape and arrangement, surface ornamentation, wall composition, and other features. Coccolithophores Phytoplankton, such as coccolithophores, are also well known for their calcium carbonate production. It is estimated that these phytoplankton may contribute", "sand settled at the bottom, while the shells, being buoyant, float up on the surface. This is because, although the shells are chemically same as the minerals, their internal cavities contain air pockets. The shells were then examined under microscope. The taxonomic description was published in the 2 November 2015 issue of ZooKeys, and the paper also included a report of other 47 new species of snails. Schilthuizen remarked, saying, \"Our paper was in review when that paper on Angustopila dominikae came out and it was only then that we realized that one of 'our' species was actually smaller.\" The", "supplement the planktonic particles it filters from the water. This is a similar feeding strategy to that employed by the related giant clams (Tridacninae) which also contain symbiotic algae. In the clams this strategy is so successful that their shells become stronger, they have long lives and are able to grow to a very large size. By contrast, in Fragum erugatum, the molluscs remain small but thrive, becoming very numerous, sometimes being found at densities of 4,000 per square metre (11 sq ft). They are found subtidally at depths of between 1.2 and 6.5 metres (3 ft 11 in and 21 ft 4 in).", "at which point they sink to the ocean floor. As is the case in all shelled mollusks, the mantle is what secretes the shell; shell growth begins at what will later become the apex of the shell, and typically rotates clockwise. As the animal gradually matures, the mantle continues to secrete shell material. Scotch bonnets complete maturation in one to six years. However, some have lived more than six years. Predators The Scotch bonnet is preyed upon by vertebrates, such as fish, and invertebrates, including crabs such as the blue crab and the Florida stone crab. Crabs can crush the", "to the abdomen of the female crab. After the eggs are attached, the female leaves immediately heading to the mouth of the river. The larvae hatch from the eggs during summer and they float and drift about the brackish waters. Because the journey to breed for crabs is so great, they only breed once during their lifetimes. The breeding age is normally toward the end of their life spans. Since these crabs only breed once, they have very sizeable egg production counts. After the crabs successfully reproduce, they have very little energy and begin to waste away.\nDifferent life stages of", "swimming, with their toes ending in claws. They often have oxymoronic rings, similar to the featherquill porcupine or rubbertooth shark. Large females can live upwards of 50 years. Habitat Gulf coast spiny soft shell turtles inhabit various freshwater sources such as rivers, lakes, marshes, farm ponds, as well as bays of larger lakes. They prefer open habitats with a small amount of vegetation and a sandy or muddy bottom. They require sandy raised nesting areas close to water. Behavior These turtles are diurnal animals, spending most of the day basking in the sun and foraging for food. They are often", "organisms. This diverse group contains the slugs, cuttlefish, oysters, limpets, snails, scallops, mussels, clams, octopi, squid, and others. In order for organisms such as oysters and mussels to form calcified shells, they must uptake carbonate and calcium ions into calcifying areas next to their shells. Here they reinforce the protein casing of their shell with calcium carbonate. These organisms also pump hydrogen out so that it will not bond to the carbonate ions and make them unable to crystallize as calcium carbonate. Echinoderms Echinoderms, of the phylum Echinodermata, include sea creatures such as sea stars, sea urchins, sand dollars, crinoids,", "the bottom and metamorphosing into juveniles. The free-living glaucothoe larvae sometimes find a suitable sized shell before metamorphosis, otherwise the juveniles need to find suitable new homes before they are consumed by predators. An adult female has several broods each year and may produce 180,000 eggs during the reproductive season. Ecology As it grows, Clibanarius vittatus periodically needs to change the shell in which it lives. At this stage it is at its most vulnerable to predators. If a suitable vacant shell cannot be found, crabs may fight each other for shells or even kill living molluscs. The shells chosen", "Tridacna Anatomy Compared to other clams, the soft mantle that secretes the shell is greatly expanded. The clams even have small lens-like structures called ocelli through which light penetrates. Ecology and behaviour Tridacna clams are common inhabitants of Indo-Pacific coral reef benthic communities in shallower waters. They live in symbiosis with photosynthetic dinoflagellate algae (Symbiodinium) that grow in the mantle tissues. Light penetrates the mantle through small lens-like structures called ocelli. They are sessile in adulthood. By day, the clams spread out their mantle so that the algae receive the sunlight they need to photosynthesize, whereas the colour pigments", "eggs develop on their own. Their eggs are large, and after a couple weeks, the eggs hatch into miniature versions of the adults.\nMangrove horseshoe crabs in Singapore breed from August to April. Juveniles grow about 33% bigger each time they moult, and it takes the juveniles about five moults to grow from 2 centimetres (0.79 in) to adult size. Use by humans Thousands of the horseshoe crabs are caught by local fishermen. While the crabs have very little flesh, their roe is prized as a delicacy, in Thailand most commonly served as a salad called yam khai maeng da (ยำไข่แมงดา).\nThere", "other legs to pull out the white flesh of the coconut. Using their strong claws, larger individuals can even break the hard coconut into smaller pieces for easier consumption. Habitat Coconut crabs are considered one of the most terrestrial-adapted of the decapods, with most aspects of its life oriented to, and centered around such an existence; they will actually drown in sea water in less than a day. Coconut crabs live alone in burrows and rock crevices, depending on the local terrain. They dig their own burrows in sand or loose soil. During the day, the animal stays hidden to" ]
Do News sites still see that I watched their video even if I said screw this when the Ad came up?
[ "If the video loads even for an instant, yes - that counts as a view. It does not technically count as a complete view if you left before the video ends, however, a view in the internet world is counted as an impression.\n\nThey will also know if you left before the actual video by tallying up the number of times the ad and the actual video has been viewed (or similar metric). If the number of ad impressions exceeds the number of views, they will know that their ads suck and they need to put it elsewhere 'cause people are not seeing the actual content.", "In the case of YouTube, they actually take good notes of how much percentage you watched a video, this goes into the algorithm of the search engine in order to promote videos that are fully watched." ]
[ "the video footage for their front pages the next morning. A BBC executive said that the news organisation edited the footage before broadcasting, and \"dealt with the material as carefully as we could.\" The spokesman said they \"thought very carefully about the pictures...and gave great consideration to how we used the footage\". They argued that the footage was an important element of the story and shed light on the perpetrators and the possible motives for the attack.\"\nThe Guardian reported there were \"around 800 complaints from distressed viewers\". Most complaints were targeted at the television coverage, with ITV receiving 400 complaints", "a cameo in the clip). The studio director comes by and leads the girls to the studio where they will be filming their appearance but as he is looking away, the girls head into the other studio. They end up hijacking the news broadcast in order to get their message out to the public.", "get their information directly from Trump himself, comparing it to the news media of North Korea. He ended the video by suggesting that people fact-check their information before sharing it on social media and announcing that he was purchasing airtime on cable systems in Washington, D.C. and Trump's hometown of New York City to run locally inserted advertisements during cable news programs that Trump liked to watch, namely CNN's New Day, MSNBC's Morning Joe, and Fox News Channel's Fox & Friends. In these advertisements, another catheter-using cowboy (played by Thomas Kopache) describes topics like the nuclear triad, global warming, and", "hour. Total traffic on the site, which averages 860,000 unique users per week, reached 1.2 million for the day of the attack.\nManaging editor of The Sun, Richard Caseby, said the newspaper had faced \"a very difficult decision\". Both media outlets argued they had released the video \"in the public interest\". BBC News showed some parts of the video. Sky News decided not to follow suit, as senior editors were of the opinion that the graphic images were \"unnecessarily distressing\". Both ITV and the BBC ran warnings before showing the footage. Most of Britain's national daily newspapers grabbed still images from", "The promos contain language decrying \"biased and false news\", and accusing unnamed mainstream media figures of bias. Stelter states that the script is written to sound like it's the opinion of the local anchors, despite the text being in fact a mandate from corporate management. At least 66 Sinclair-owned stations produced their own version of the message, with the first being aired on March 23, 2018. Sinclair-owned WMSN-TV refused to air the message (although its news is produced by Morgan Murphy Media-owned WISC-TV).\nThe promos began to receive mainstream media attention after the sports blog Deadspin, as well as ThinkProgress, posted", "comment, getting it into the top comments section and making the message more visible.\nYet another kind is actual video spam, giving the uploaded movie a name and description with a popular figure or event that is likely to draw attention, or within the video has a certain image timed to come up as the video's thumbnail image to mislead the viewer, such as a still image from a feature film, purporting to be a part-by-part piece of a movie being pirated, e.g. Big Buck Bunny Full Movie Online - Part 1/10 HD, a link to a supposed keygen, trainer, ISO", "in public. A prime example of this is the recent addition of video adverts to the beginning of online video content. This is a form of 'forced' wait marketing, as the viewer has to watch the advert before they can view the video they want to see. Thus, they will see the product or service advertised and likely pay attention to it as they are waiting.\nAnother instance are landing pages, used by many businesses on their company websites and social media platforms. These are pop-up type boxes that appear over the web page encouraging the site user to follow them", "was fired by the station for \"his failure to exercise good news judgment\" and for violating the Federal Communications Commission's rules about showing stock footage without identifying it as such.", "News Headlines The Late Show News Headlines, presented by Gleisner, would blend the week's real news headlines with fake information and footage. For example, when covering the replacement of Japanese Prime Minister Kiichi Miyazawa, footage from an Asian bodybuilding competition was shown. The News Headlines would also feature interviews with newsmakers, most often played by Sitch in costume and prosthetics. Some of the better-known impersonations included H. Ross Perot, Jeff Kennett, John Hewson, Paul Keating, Imran Khan, Yasser Arafat, Gareth Evans and Desmond Tutu.\n(Sitch also appeared in other segments as Elton John among others.) Mick's Serve This would", "footage There are clips of some classic footage, news, events, weather, programmes and RTE advert breaks since the 1970s featured in it. Every Aprés Match programme will be on YouTube in future in full and clips.", "this morning.\" The video was actually taken from a 2008 McCain/Palin campaign rally. Fox News senior vice-president of news Michael Clemente issued an initial statement saying, \"This was a production error in which the copy editor changed a script and didn't alert the control room to update the video.\" Fox offered an on-air apology the following day during the same \"Happening Now\" segment citing regrets for what they described as a \"video error\" with no intent to mislead.\n\nIn September 2010, FNC anchor Sean Hannity was criticized notably by Stewart and CNN anchor Howard Kurtz, for selectively editing a video of", "means it appears they couldn't put the graphics directly to air. Instead of turning the presenter's microphones down during the break, everything the presenters and the studio crew said was clearly audible, including the unfounded rumour that Kidman was gay. The presenters apologised when they learned that this had been accidentally broadcast.\nVictor Lewis Smith wrote a scathing review of this episode the next day. Content Broadcasts contained content that was vapid and gratuitous - an example of which can be experienced on YouTube. Here, Stevie Kennedy interviews a wrestler on a show titled Backyard Wrestling. Ofcom Content Sanctions Committee Eventually,", "news report may give rise to substantial liability has disturbing implications, for the decision could lead to a degree of media self-censorship. Hereafter, whenever a television news editor is unsure whether certain film footage received from a camera crew might be held to portray an \"entire act,\" he may decline coverage – even of clearly newsworthy events – or confine the broadcast to watered-down verbal reporting, perhaps with an occasional still picture. The public is then the loser. This is hardly the kind of news reportage that the First Amendment is meant to foster.\nJustice Stevens wrote a separate dissent.", "magazines showing the video's violently explicit cover, depicting a man being drilled through the forehead by the Driller Killer. The tagline for the advertising and video box was: \"There are those who kill violently.\"\nThe advertising resulted in a large number of complaints to the Advertising Standards Agency, and opposition to the film from the press and elsewhere; however, it seems that very few of the complainants ever saw the film but based their opinion on the poster and title.\nThe film was lumped together with other \"video nasties\" released at the time and a vociferous campaign was launched by the press", "noted (albeit retired) news anchor Vanocur and noted journalist Bree Walker (who had previously anchored for Los Angeles CBS O&O station KCBS-TV) in major roles portraying themselves, plus a faux interview with noted author Arthur C. Clarke, still left some viewers wondering.\nIn addition, when it originally premiered, CBS had warnings during the commercial breaks stating that the film was completely fictional, and that the events were not actually happening. Some CBS affiliates, such as KHOU in Houston, had similar warnings in the form of a news ticker \"crawl\" during the broadcast. The producers used actual CBS News graphics", "full-page advertisements in The New York Times and Los Angeles Times to denounce Going Clear, comparing it to the story \"A Rape on Campus\" published by Rolling Stone magazine. Gibney subsequently said that he was grateful for the church's advertising, as it had attracted much publicity for the film; he only wished \"they'd put in showtimes.\" The head of HBO Documentary Films, Sheila Nevins, commented that when she saw the advertisements she knew that Going Clear would be a big success: \"Docs don’t get full page ads, and when they do, they do really well.\"\nThe church also published a \"special", "(consisting of select major headlines of given warranty and other notable general news and legal-related stories) as well as lifestyle and human interest features. In the late 2000s, as video sharing websites such as YouTube came into prominence, Inside Edition began incorporating viral videos in most broadcasts, either those in relating to a news story covered in that day's edition or, more commonly, humorous or amazing videos (including clever marriage proposals, people and animals displaying interesting talents or stunts, active military personnel returning home from duty surprising family members and practical jokes); videos of the latter type are typically included", "a direct message to any friends, post to a timeline or add to a Story. Views If users post a story to a timeline it will appear at the top of the profile as if it were any other picture or video. And just like posting to a Timeline, users can decide who sees it (Public, Friends and so on). But posting to a \"Story\" will make it available to all friends for a 24-hour period and will appear as a bubble at the top of their feeds. Right now, there's no way to select who sees—or doesn't see—a", "trademark infringement. The court finds in HHM's favor, and Jimmy is ordered to remove the billboard within 48 hours.\nAfter failing to persuade any news outlets to cover his predicament as a human interest story, Jimmy hires a freelance media team to record his video plea for sympathy. During filming, the worker removing the billboard slips and falls, and is held up only by his safety harness. Jimmy climbs up and pulls the worker to safety while passersby watch and record, as does his media team. It is revealed that the accident was staged by Jimmy as a publicity", "also typically provide a summary of pertinent information for the host or hosts to provide context for on air interaction, such as the caller's name, age, gender, location and a precis of what they intend to talk about.\nDuring breaking news events, screeners are responsible for verifying the caller's identity, to ensure that correct information will be presented to the news anchor. A failure here can allow an embarrassing on-air prank call through. Richard Roeper blamed call screeners in 2003 for a phone pranker getting through to Dan Rather live on-air during the Space Shuttle Columbia disaster, by not checking the", "against simulcasting the full episode online as they were worried about a backlash from advertisers. The webcam footage was free of advertisements and audio, which would have caused the broadcast to fall out of sync.\nThe premise of the episode saw webcams installed in Drew's house after he becomes a 24-hour salesman for the Winfred-Louder department store where he works. When Drew leaves his house, the webcams continue to stream events involving other characters that the television audience does not get to see. Sequences include: Mr. Wick being tempted into his office by a woman wearing a dominatrix-cowgirl outfit; Ed McMahon", "video compilations featuring all of the promos being played simultaneously. The promos have been criticized as in regard to the greater political context of \"fake news\" in the media for media bashing, comparing it to the rhetoric of Donald Trump in regard to these topics. Sinclair maintains that its \"must-runs\" are standard procedure often covering a wide variety of issues such as news updates regarding terrorism and other public matters the company has an opinion on while remaining \"committed to reporting the facts\". After the compilations went viral, Trump responded to the promos on April 2, 2018, defending the company", "Jimmy Kimmel YouTube Challenge Kimmel will give out a challenge to viewers asking them to videotape themselves pulling a prank on a family member or significant other, and then revealing that \"Jimmy Kimmel told me to do it\". The best clips are then aired on the show. Lie Witness News A correspondent not seen on camera will ask pedestrians on Hollywood Boulevard a fake question related to an actual current news event. Most of the people answering the question will usually play along, giving the impression that they believe that the so-called fake event really happened. Jimmy Kimmel Pedestrian Question", "are going to have to learn to deal with it. My hope is that after the anger there will be some reflection on the complexity of these issues.\"\nSome of the media accused of making distorted reports have given replies. CNN made a formal response to the charges of the cropping of cover pictures and mismatching captions, but asserted that the selection of material was \"appropriate for the editorial context, and will not cause any confusion\". Der Spiegel mentioned the site in an editorial, where it referred to the argument over the credibility of Western media on this particular issue with", "show began accepting clips via e-mail, and more recently, the inclusion of mobile phone videos; noted on-screen by a small mobile symbol in the corner of the screen, resembling a digital on-screen graphic. Granada Reports newsreader Andrew Brittain was a regular announcer from 1991 until the end of the Jonathan Wilkes era in 2003 when he left Granada Reports.\nNowadays in the show, Hill makes regular obtuse references to the Norfolk market town of Swaffham, in reprisal of the serious injuries he once received in a bizarre bird attack in the town. Additionally, whenever a woman vaguely resembles former host Lisa", "to the video \"blackboard\". In a final installment a user scans in a newspaper by placing it on the screen of the full-sized version, and then has it help him learn to read by listening to him read the scanned results, and prompting when he pauses. Credits The videos were funded and sponsored by Bud Colligan, Director of Apple's higher education marketing group, written and creatively developed by Hugh Dubberly and Doris Mitsch of Apple Creative Services, with technical and conceptual input from Mike Liebhold of Apple's Advanced Technologies Group and advice from Alan Kay, then an Apple Fellow. The", "the next couple of months\", video and image ads would start appearing in between users' photos in the news feed for users in the United States. A sample ad from Instagram, featuring the text \"Sponsored\" at the top right of the image, was the first to be released, with a limited number of brands being allowed to advertise in the early stages. Image advertisements officially started appearing in feeds starting November 1, 2013, followed by video ads on October 30, 2014. In June 2014, Instagram announced the then-upcoming rollout of ads in the United Kingdom, Canada and Australia, planned for", "advertisements in local newspapers to advertise the film. The last print advertisement appeared in local newspapers on 16 September 2006, the tenth day after the release of the film.\nDue to the small advertising budget, however, a large part of the film's advertising took place through the Internet. For instance, the film's directors spoke directly to the viewers through their blog to advertise the film through word-of-mouth. In particular, they instructed viewers to tell at least ten friends about the film. The producers also appeared on the 6 September 2006 release of the mrbrown show and, in a 31-minute podcast, shared", "to Kinney, \"Zeitgeist engages in willful confusion by showing TV screen shots of network or cable news with voice-overs from unidentified people not associated with the news programs. If one weren't paying close attention, the effect would be to confer the status and authority of TV news upon the words being spoken. Even when quotes or sound bites are attributed to a source, there's no way to tell if they are quoted correctly or in context.\" Use in other media In June 2013, Peter Joseph directed the music video for \"God Is Dead?\" by Black Sabbath, using extensive imagery from", "then they'll take me off it, you see. And it didn't work that way ... I'd have to say the order of things especially at Channel 9, the order of news items. And if I said, \"Look, this is really important\", I'd look at the camera and say, \"This is a really important story\" and set it up, and if it was an important story, then the audience think, \"Oh this guy's a good filter.\" If you said, \"Look, this is a silly item, I don't know why we're running it\" and you run it and it is a silly" ]
Black athletes with hyphenated names
[ "No I meant why is it so prevalent in black athletes. I know about hyphenated names with divorced parents. \n\nI want to know why it seems to only occur in black athletes and not in other races IN SPORTS.", "Hyphenated names=parents, for whatever reason, who don't share a surname. \n\nBut saying it's \"black athletes\" is ignorant. It's actually pretty common in the general population as marriage becomes less a focus for couples raising kids or men not requiring their wife to take their name for some ideological reason.", "Not sure what you mean, do you mean when people hyphen their last names of their separated parents? If so, it's because they love their parents, so they take both their names." ]
[ "Matthews Batswadi Matthews Batswadi (born 1949), a South African athlete, was the first black athlete to be awarded Springbok Colours, the name then given to South African national sporting colours, after the implementation of the policy of apartheid by the National Party in 1948.\nBatswadi received Springbok Colours in 1977 after the national athletics federation, the South African Amateur Athletics Association, deracialised its constitution to allow blacks and whites to compete against each other.\nBatswadi won nine national titles from 1975 to 1980 and was renowned for his frontrunning tactics. He was born at Dithakong, near Vryburg in the Northern Cape Province,", "included in the database (no word of mouth reports are included). To be listed in the ASA archive, verifiable evidence of an athlete's participation and/or placing must be provided; this can include official results, photos on the podium, magazine or newspaper articles, certificates, passbooks, awards, etc. Name controversy Although sambo is a Russian acronym, exponents of the sport in the English-speaking world have faced problems concerning the linguistically unrelated racist term. Sambo representatives have opted to use the alternative spelling Sombo to avoid offense. In Swedish, \"sambo\" is the term for an unmarried couple living together on permanent basis. To", "the weakest players on the Black team: Sam, Cheryl, Andrea, Stephanie, Sherry, and Ashley. He put the heaviest competitors on Blue: Koli, Daris, Lance, Miggy, Sunshine, as well as himself, and gives immunity to O'Neal. When they meet the trainers, both Bob and Jillian express surprise and Jillian expresses dismay, saying it's the \"most unfair thing I've ever seen.\"\nFor the first team challenge, the teams have to raise a banner to the top of a building by pulling it up. The winning team will get letters from home. The Blue team wins. The contestants also check in with Dr. H", "driver, and they liked his quiet, uncomplaining manner. They saw him as someone similar to themselves, another hard-working blue-collar guy swept up in the adrenaline rush of racing, not somebody trying to make a racial point. \"He was a racer – you could look at somebody and tell whether they were a racer or not,\" said driver Rodney Ligon, who was also a moonshine runner. \"Didn't nobody send him [to the track] to represent his race – he come down because he wanted to drive a damn racecar.\" Some white drivers became his close friends and also occasionally acted as", "do not necessarily win National titles. Only sanctioning bodies active during the racer's career are listed. Miscellaneous His pants motto* was \"Just Be Kos/ nice try/ Kid Kos \"\nA small image of what Mr. Kosmala looks like today.\n*Riders often put slogans on the seat of their pants instead of their surname as a small physiological ploy against their competitors behind them to read.", "continue this tradition.\nImportant athletes in other sports include NBA players, Nenê and Leandro Barbosa, nicknamed \"The Brazilian Blur\", referring to his speed. João Carlos de Oliveira Jadel Gregório, Nelson Prudêncio, Adhemar da Silva.\nParticularly important among sports is capoeira, itself a creation of Black Brazilians; important \"Mestres\" (masters) include Mestre Amen Santo, Mestre Bimba, Mestre Cobra Mansa, Mestre João Grande, Mestre João Pequeno, Mestre Moraes, Mestre Pastinha, Mestre Pé de Chumbo.\nSince the end of the military dictatorship, the political participation of black Brazilians has increased. The first female senator, Benedita da Silva, is Black; other important politicians include Senator Paulo Paim,", "the South African population to identify directly with the sport. Selection of Black Players Hoskins has encouraged the South African Super 14 teams, and the national team, to involve a higher number of black players. This policy was encouraged after the ANC chairman of the Parliamentary Committee for sport, Butana Komphela, criticized SARU heavily. Conflict with Jake White His period as president occurred over a period of continued clashes between the SARU administration and coach Jake White. After having led South Africa to the country's second world cup victory, White was informed by the administration that he was expected to", "Arthur Friedenreich, Ademir da Guia, Romário are well known historic names of Brazilian Football.\nImportant athletes in other sports include Daiane dos Santos (gymnastics), known for the invention of original movements, Alex Garcia (basketball), who played in the NBA, etc.\nFile:Ildi Silva 01.jpg| Ildi Silva Moreno In daily usage, Brazilians use the ambiguous term moreno, a word that means \"dark-skinned\", \"dark-haired\", \"tawny\", \"swarthy\", \"Brown\" (when referring to people), \"suntanned\". Moreno is often used as an intermediate colour category, similar to pardo, but its meaning is significantly broader, including people who self identify as black, white, Asian and Amerindian in the IBGE classification", "was accused of racism after saying it was \"laughable\" for black players to represent the Russian national team. Serbia In October 2006, 37 Borac Čačak fans were arrested and eight faced criminal charges after racially abusing the club's Zimbabwean player Mike Temwanjera during a first division match. Borac Čačak was at the centre of more controversy in March 2008 when a Ghanaian player, Solomon Opoku, was attacked by fans; six fans were later arrested, with four being later charged.\nOn 29 November 2006, Hajduk Kula coach Nebojša Vučićević racially insulted Red Star Belgrade's Senegalese defender Ibrahima Gueye. The coach responded to", "rankings were hard to achieve. The normal starting conditions would be those corresponding to the players being of equal rank, or tagaisen. This means they should alternate with Black and White, this being before the era of komigo. Not all matches were played on tagaisen terms.\nIf agreed, there was the possibility of playing at a handicap, e.g. Black two games out of three, if one player went far enough ahead. This could be reinforced to one player always taking Black, a handicap equivalent to two professional ranks, in extreme cases. For details see professional go handicaps. An uchikomi jūbango was", "race-occupation combinations such as a basketball player or a golf player will receive race assumptions. Without any information of the individual's race, a basketball player will be assumed to be black and a golf player will be assumed to be white. This is based upon stereotypes because of the majority of race in each sport tend to be dominated by a single race, but in reality, there are other races within each sport . Complexity Complexity is the “C” component of VUCA, that refers to the interconnectivity and interdependence of multiple components in a system. When conducting research, complexity is", "worn black on yellow back numbers. Beginning in 2012 the best team was awarded the right, but not the obligation, to wear yellow helmets. Status The team classification is considered less important than the individual general classification, and it is rare that a team starts the Tour with the main goal of winning the team classification. If during the race a team is in a good position to win the team classification, the team may change tactics in order to win.\nWhen Lance Armstrong lost hopes of winning in 2010, he instructed his teammates to keep an eye on their main", "Nigeria (AFN) for Athletes as part of the 3rd Leg of AFN Golden League at Yaba College of Technology Sports Complex, Yaba. An abridged version of this paper titled \"Fighting the Root Causes of Doping in Athletics\" is available online.\nIn the second half of 2010, Ajunwa stepped up her anti-doping activities by starting an integrated campaign aptly tagged 'Compete Fair & Clean'. This personally-financed initiative involves communicating anti-doping messages directly to athletes and coaches at athletic events. Awareness and Red-flag workshops and seminars are being organised with the Athletics Federation of Nigeria (AFN). Ganners are placed at athletic events and", "team leader said she was unaware of the incident and added, \"[the Indian coach] must find out whether the person was one among us. If he was not wearing a red jersey, he would not be part of the side. I will speak to the Indian coach about it.\" Limba Ram said that he failed to identify the person as he had chosen to ignore the one-off incident. There have also been accusations that Ram was called a monkey on two different occasions by an English official. Athletics During the Final of the Women’s 100m sprint final, a controversy was", "red-black for the fact of be an athlete disciplined and have led only one yellow-card in the dispute of the Serie B. He made 35 games in championship. In his first press conference as a football player of Flamengo, the left back, he declared himself a fan of Thierry Henry, including revealed that the name of his son, Therry Daniel, was in honor of the French striker. Premiered in victory of 4 to 0 over the Bonsucesso, in match valid for the 2012 Campeonato Carioca.", "about the dominance of African athletes and athletes of African descent in professional athletics. The article was later republished in The Best American Sports Writing.", "men and women in tennis. She was also a big fan of her future coach Lindsay Davenport as well as Kim Clijsters.\nKeys is very close friends with Sloane Stephens and CoCo Vandeweghe. She hugged Stephens after losing the 2017 US Open final and jumped in Vandeweghe's lap after beating her in the 2017 Stanford Classic final.\nKeys is biracial, as her mother is white and her father is African-American. Nonetheless, she prefers to be recognized for who she is rather than her race, saying, \"I don’t really identify myself as white or African-American. I’m just me. I’m Madison.\"\nKeys is an ambassador", "his passport was confiscated following his arrest on a charge of identity theft.\nThe final team on the entry list comprises the names of 155 athletes, including 2 athletes invited by the IPC for exhibition\nevents: Joshua George, 400m T53 (wheelchair) men, and Amberlynn Weber, 800m T54 (wheelchair) women.\nAfter all, 127 athletes competed in the different events.", "Rajo Jack Dewey Gatson, better known as Rajo Jack or his pseudonym Jack DeSoto, (July 28, 1905 – February 27, 1956) was an American racecar driver. He is known as one of the first African American racers in America. He won races up and down the West Coast of the United States in stock cars, midgets, big cars and motorcycles. Rajo Jack was inducted in the West Coast Stock Car Hall of Fame in 2003 and the National Sprint Car Hall of Fame in 2007. Early life Rajo Jack was the oldest of six children. He", "all team members have the IOC country code. Track athletes also wear a lane number on the shorts.\nAt the 2019 Boston Marathon, organisers gave special numbers for celebrities. Tedy Bruschi (5454) and Jimmie Johnson (4848) were given four-digit numbers that were their squad numbers repeated. Joan Benoit Samuelson was given 1979, the year of her first win. A former Boston police chief was given 7671, his police badge.", "Ebony Shoe The Ebony Shoe award (Dutch: Ebbenhouten schoen, French: Soulier d'ébène) is a football award in Belgium given annually to the best African or African origin player in the Belgian Pro League. The jury is composed of the coaches of league clubs, the Belgian national team manager, sport journalists, and honorary juror(s).\nAs of 2017, Mbark Boussoufa (3 wins), Daniel Amokachi (2 wins) and Vincent Kompany (2 wins) are the only players to have won the trophy more than once.", "performed AIS athletes. As of 2011, the following athletes have been recognised - Alisa Camplin, Robert De Castella, John Eales, Simon Fairweather, Neil Fuller, Bridgette Gusterson, Rechelle Hawkes, Shane Kelly, Luc Longley, Michelle Martin, Glenn McGrath, Michael Klim, Michael Milton, Clint Robinson, Louise Sauvage, Kate Slatter, Zali Steggall, Mark Viduka, Vicki Wilson, Todd Woodbridge, Lauren Jackson, Chantelle Newbery, Petria Thomas, Kerry Saxby-Junna, Jamie Dwyer, Anna Meares, Malcolm Page, Ricky Ponting, Oenone Wood and Matthew Cowdrey. In August 2013, Stuart O'Grady was indefinitely suspended from the 'Best of the Best' due to his admission to doping in 1998.\nThe Australian Institute", "has the highest net worth of any Brazilian female entertainer, estimated at US$350 million.\nWhites also dominate the sciences and academics. According to a Folha University Ranking, among the rectors and vice-chancellors of the 25 top universities, 89.8% are white; 8.2% are pardos and 2% are black and none as Asian.\nIn the world of Brazilian sports, some of the most successful Brazilian athletes have been white. Ayrton Senna was among the most dominant and successful Formula One drivers of the modern era and is considered by many as the greatest racing driver of all time. Robert Scheidt is one of the", "Formula One drivers from South Africa Current drivers There are no South African drivers currently competing in Formula One, and none have competed in the sport since 1980. Jody Scheckter was the last person to enter a race having started the 1980 United States Grand Prix at Watkins Glen. Former drivers A total of 18 South African drivers have started in at least one race, but only three of them have ever scored any points. Some other drivers have entered Grand Prix events but did not qualify or otherwise make it through to start the race. That includes Desiré Wilson,", "'50 Club', '100 Club', '250 Club' and '500 Club' for anyone who has completed that number of runs. Anyone in the world entering a 'club' is awarded a free colour-coded T-shirt with a number on the back to represent the club they are in. The T-shirts are coded as follows; ten runs for white; fifty runs for red; one hundred runs for black; 250 runs for green, and 500 runs for a blue T-shirt. There is also a purple T-shirt for those that have been a volunteer 25 times or more. Parkrun tourism and unofficial challenges Parkrun tourists travel especially", "team completes the challenge before Blue or Red get any players to shore, and the team members win massages. The Blue team and Red team are put through last chance workouts while the Black team enjoys an evening at the spa.\nRed team wins the weigh in during a strong week all around. Kae is the Biggest Loser, with a percentage weight loss of 3.66%. Black team loses for the first time since arriving at campus.\nIsabeau, Hollie and Julie work to persuade Jez to team up with the girls and send one of Jim or Bill home. The Black team votes", "highest basketball player on the list, behind Cheryl Miller, Teresa Edwards, Ann Meyers, Nancy Lieberman and Anne Donovan.\nThe high school gym in her hometown, Lafayette, Tennessee, is named after White.\nA local highway (State Route 10 North) has been renamed Nera White Highway. Death White died on April 13, 2016 at a hospital in Gallatin, Tennessee from complications of pneumonia, at the age of 80.", "he was given a small wooden trophy with no nameplate. Only seven black drivers have ever competed at NASCAR's top level, most notably Scott and Willy T. Ribbs.\nFemale drivers have been equally scarce within auto racing. Although there was a time when women were banned from entering the pit area during races, there has been no official legislation preventing women from participating during most of NASCAR's history. Sara Christian drove in the inaugural Cup Series (then Strictly Stock) race at Charlotte Speedway in 1949, and is the only woman in Cup Series history to score a top five finish. The", "about him. They were two different men.\nElias Bowie became the first African-American to race in NASCAR's top series, then known as Grand National, when he raced in the July 31, 1955 event at San Mateo, California.\nRay died in Louisville of pneumonia.", "He traveled around in a hot air balloon and wore a brown-and-yellow version of his current outfit, albeit with a larger, looser hat and sculpted chest piece.\nIn the TV show, Sportacus wore a blue and white tracksuit, a blue vest, a blue stocking cap with a thick white stripe and thin black stripe on it, light blue goggles, deep blue boots with red, black and white stripes running down them, blue metal bracers on his arms, and a black pointed mustache. Reception Sportacus has taken part in several health campaigns. In 2010, Sportacus and then first lady of the USA" ]
I had a fruit fly wander into my microwave and I decided to nuke him for 3 minutes, for science of course, and in the end the little bugger flew out. How is this possible?
[ "1. The insect is too small to act as an efficient receiver of microwave energy.\n2. There area areas within the machine that get far less energy, and (by moving from hot to not-hot areas) the fly can seek them out.", "Microwaves send out micro waves of radiation. There are spaces small enough for insects to fit. The insect can stay in those spaces keeping safe." ]
[ "bug hits. This causes a worldwide nuclear attack, with vehicles crashing and missiles self-launching, completely destroying Spooner Street. The Griffins remain safe, though their house has been severely damaged. The next week, Meg whines about Kevin getting vaporized, and the Griffins discover that Quagmire and Cleveland have been stitched together and are now called \"Clevemire\" (or \"Quagland\"), and Tom Tucker and Diane Simmons have cooked and eaten Tricia Takanawa. Starving, Peter immediately eats all the dehydrated meals, without adding water. Peter recalls that the snack food Twinkies are the only food that can survive a nuclear holocaust, so the family", "for takeoff. His wife, Marge, encourages him to take advantage of the opportunity, and he rejoins the launch; it receives good television ratings. \nHomer smuggles a bag of potato chips aboard the shuttle, and opens it upon reaching space. Because of the weightlessness in space, the chips disperse and clog the instruments. While eating them, Homer breaks an ant farm, and the ants destroy the navigation system. During his broadcast of the space mission, newscaster Kent Brockman erroneously believes the ants are giant aliens set to enslave Earth. Musician James Taylor, who was singing over the radio, suggests they blow", "aircraft carrying one were shot down and recovered, there was a very good chance the block would survive, at which point the secret would be revealed to anyone familiar with microwave techniques. This is precisely what occurred on the night of 2/3 March 1943, when the second mission to attempt to use H2S led to one of the Short Stirling bombers carrying it being shot down near Rotterdam. The magnetron was recovered and this Rotterdam Gerät (gadget, or device) led to the rapid formation of a study group to exploit it.\nThe group first met at the Telefunken offices in Berlin", "across the entire Earth, killing millions. Then, once set off, the bomb will be set to allow the crew twenty-five minutes to escape. When the crew lands on the ball, Fry is amazed by all of the 20th-century items on the ball. Such as: a Beanie Baby, a Mister Spock collectors plate, and Bart Simpson dolls; but Leela reminds Fry that these things were garbage, which is why they are in the garbage ball in the first place.\nUnfortunately, after starting the bomb, they find out the Professor put the bomb's countdown display in upside down, and it actually only allows", "a better indication of how the weapon would behave when dropped from a bomber. Detonation in the air maximized the energy applied directly to the target, and generated less nuclear fallout. The gadget was assembled under the supervision of Norris Bradbury at the nearby McDonald Ranch House on 13 July, and precariously winched up the tower the following day. Observers included Bush, Chadwick, Conant, Farrell, Fermi, Groves, Lawrence, Oppenheimer and Tolman. At 05:30 on 16 July 1945 the gadget exploded with an energy equivalent of around 20 kilotons of TNT, leaving a crater of Trinitite (radioactive glass) in the desert", "chamber, but is surprised to find that Simmons is still awake and takes his hand. They both disappear in a flash of blue light and they are replaced by a nuclear bomb. The technicians and scientists suddenly recall that Dr. Heilman was once a bomb expert for the United States nuclear team.\nDr. Curt Lockridge attempts to reason with the creature, saying that it will probably survive the explosion but those in the complex will not. When the timer reaches zero, Heilman appears again and runs through the open door with Lockridge at his heels. Heilman is confronted at a launch", "dropped between 30 and 50 atomic bombs on his air bases and other depots strung across the neck of Manchuria.... It was my plan as our amphibious forces moved south to spread behind us—from the Sea of Japan to the Yellow Sea—a belt of radioactive cobalt. It could have been spread from wagons, carts, trucks and planes.... For at least 60 years there could have been no land invasion of Korea from the north. The enemy could not have marched across that radiated belt.\"\nIn 1985 Richard Nixon recalled discussing the atomic bombings of Hiroshima and Nagasaki with MacArthur:\nMacArthur once spoke", "boots, in front of a roomful of observers. Enrico Fermi reportedly told Slotin and others they would be \"dead within a year\" if they continued performing the test in that manner. Scientists referred to this flirting with the possibility of a nuclear chain reaction as \"tickling the dragon's tail\", based on a remark by physicist Richard Feynman, who compared the experiments to \"tickling the tail of a sleeping dragon\".\nOn the day of the accident, Slotin's screwdriver slipped outward a fraction of an inch while he was lowering the top reflector, allowing the reflector to fall into place around the", "been dropped. Fourteen press releases were prepared, and thousands of copies made by mimeograph. The final wartime shipment of uranium-235 left the Clinton Engineer Works on 25 July. Shipments reached Tinian on C-54 aircraft on 28 and 29 July. They were incorporated into the Little Boy bomb dropped on Hiroshima on 6 August. The news was greeted with wild celebration in Oak Ridge. Patterson issued a letter to the men and women of the Clinton Engineer Works:\nToday the whole world knows the secret which you have helped us keep for many months. I am pleased to be able to add", "Eatherly had already turned back for their Tinian Island base by the time the bomb was dropped. To quote Tibbets: \"Actually, Major Eatherly did not take part in the attack and did not see the bomb blast that was supposed to have haunted him through many sleepless nights.\" Contrary to popular opinion, one of Eatherly's Straight Flush crewmen has suggested that Eatherly was actually upset that the Hiroshima raid had not made him famous, and was only too eager to play to the journalists that came to get the story of the \"distraught pilot\".", "Princeton University. Isidor Isaac Rabi and Willis Lamb, two Columbia University physicists working at Princeton, heard the news and carried it back to Columbia. Rabi said he told Fermi; Fermi gave credit to Lamb. It was soon clear to a number of scientists at Columbia that they should try to detect the energy released in the nuclear fission of uranium from neutron bombardment. On 25 January 1939, Slack was a member of the experimental team at Columbia University which conducted the first nuclear fission experiment in the United States, which was conducted in the basement of Pupin Hall; the other", "was then used in the Trinity nuclear test on July 16, 1945. Langsdorf urged President Harry S Truman not to use the bomb against the Japanese, but a plutonium-based bomb was dropped on Nagasaki soon after.\nHe continued to urge against expansion of nuclear weapons. He helped found Bulletin of the Atomic Scientists, and his wife Martyl Langsdorf designed the 1947 cover of the publication which debuted the Doomsday Clock. Langsdorf also invented the diffusion cloud chamber and the reactor oscillator.\nLangsdorf died in Elmhurst, Illinois, from complications from hip surgery.", "into a bomb instead results in B.O.B. temporarily acquiring the ability to read minds, and allowing them to find out about a secret exit from Area 52. Unfortunately, the plan fails when B.O.B. smashes the jet they were using to escape believing it to be a piñata, with the resulting explosion erasing B.O.B.'s new power. Night of the Living Carrots Night of the Living Carrots is a 2011 13-minute 3D Halloween short film based on Monsters vs. Aliens, and a sequel to Mutant Pumpkins from Outer Space. It was directed by Robert Porter. First part of the short premiered on", "Bomb project, Graham Farmelo wrote that \"Chadwick did more than any other scientist to give Churchill the Bomb. ... Chadwick was tested almost to the breaking point.\" So worried that he could not sleep, Chadwick resorted to sleeping pills, which he continued to take for most of his remaining years. Chadwick later said that he realised that \"a nuclear bomb was not only possible—it was inevitable. Sooner or later these ideas could not be peculiar to us. Everybody would think about them before long, and some country would put them into action\". Sir Hermann Bondi suggested that it was fortunate that", "W. Tibbets, Jr. at the controls. Tinian was approximately 2,000 miles (3,200 km) away from Japan, so it took six hours to reach the target at Hiroshima.\nThe Little Boy atomic bomb was dropped over Hiroshima at 08:15 local time. Tibbets recalled that the city was covered with a tall mushroom cloud after the bomb was dropped. Comments † Big Stink was a backup aircraft for the Hiroshima bombing; it was used for strike observation and photographic purposes for the Nagasaki bombing.", "1950 Rivière-du-Loup B-50 nuclear weapon loss incident Background Returning one of several US Mark 4 nuclear bombs secretly deployed in Canada, a USAF Boeing B-50 Superfortress had engine trouble and jettisoned the weapon at 10,500 feet (3,200 m). The crew set the bomb to self-destruct at 2,500 ft (760 m), and released it over the St. Lawrence River. The non-nuclear explosion shook area residents and scattered nearly 100 pounds (45 kg) of radioactive uranium (U-238) used in the weapon's tamper. The plutonium core (\"pit\"), which is the key component for a nuclear reaction and detonation, was not installed in the bomb at the time.", "the wrong wall (into the kitchen) at 3 am. They realize there is not enough time left to reach and crack open the safe, but Toto finds $1,000 in a cookie jar and so they decide to heat some soup on the apartment stove so as to eat before leaving – whereupon the stove blows up. After the explosion, the group is standing at the bus stop. Riley suggests that they shouldn't see one another again, but just as he gets on the bus the other three decide to give Riley all of the $1,000 for his wife’s jail fine.", "was detonated during the Trinity Test in the desert of New Mexico on July 16, 1945. Two other fission bombs, codenamed \"Little Boy\" and \"Fat Man\", were used in combat against the Japanese cities of Hiroshima and Nagasaki in on August 6 and 9, 1945 respectively.\nEven the first fission bombs were thousands of times more explosive than a comparable mass of chemical explosive. For example, Little Boy weighed a total of about four tons (of which 60 kg was nuclear fuel) and was 11 feet (3.4 m) long; it also yielded an explosion equivalent to about 15 kilotons of TNT, destroying a large", "of the bomb would increase as the nuclear chain reaction progressed, but proved to be impractical. He also investigated using uranium hydride instead of uranium metal, but its efficiency turned out to be \"negligible or less\". He continued to push his ideas for a fusion weapon even though it had been put on a low priority during the war (as the creation of a fission weapon proved to be difficult enough). On a visit to New York, he asked Maria Goeppert-Mayer to carry out calculations on the Super for him. She confirmed Teller's own results: the Super was not going", "send a strongly worded signal to Wilson. Bombs The Little Boy bomb, except for the uranium payload, was ready at the beginning of May 1945. There were two uranium-235 components, a hollow cylindrical projectile and a cylindrical target insert. The projectile was completed on June 15, and the target insert on July 24. The projectile and eight bomb pre-assemblies (partly assembled bombs without the powder charge and fissile components) left Hunters Point Naval Shipyard, California, on July 16 aboard the cruiser USS Indianapolis, and arrived on Tinian on July 26. The target insert followed by air on July 30, accompanied by", "out. The Patch is also where the first \"Zinger Bombs\" were dropped, according to Weapon Brown via in-story monologue. The epicenter of the patch is a massive bomb crater, which sits over what appears to be an underground shelter to be used in the eventuality of nuclear attack. Weapon Brown and Snoop use the hatch found at the middle of the crater to reach the underground hideout Linus is using in his attempt to raise 'The Great Pumpkin' to destroy the world.\nKite Eating Trees: A parody of the Kite-Eating Trees from the Peanuts franchise. These creatures are mobile, anthropomorphic and", "the cellars of Washington to see whether there were atomic bombs, I think my most important tool would be a screwdriver to open the crates and look. I think that just walking by, swinging a little gadget would not give me the information.\n This sparked further work on the question of smuggled atomic devices during the 1950s.\nDiscussions of non-state nuclear terrorism among experts go back at least to the 1970s. In 1975 The Economist warned that \"You can make a bomb with a few pounds of plutonium. By the mid-1980s the power stations may easily be turning out 200,000 lb", "to the Los Alamos National Laboratory in New Mexico in December 1944 to work in the bomb physics group of Robert Bacher. Work at Los Alamos At Los Alamos, Slotin's duties consisted of dangerous criticality testing, first with uranium in Otto Robert Frisch's experiments, and later with plutonium cores. Criticality testing involved bringing masses of fissile materials to near-critical levels to establish their critical mass values. Scientists referred to this flirting with the possibility of a nuclear chain reaction as \"tickling the dragon's tail\", based on a remark by physicist Richard Feynman, who compared the experiments to \"tickling the tail", "atomic bombs. He was then transferred to the Project's Los Alamos Laboratory in New Mexico, where he worked on the preparations for the Trinity nuclear test, witnessing the blast on July 16, 1945. \"I will never forget the sight of that explosion\", he later told his parents, \"the thing is really terrific\".\nA similar bomb was used in the bombing of Nagasaki on August 9, 1945. He later expressed regret that he and his fellow scientists did not pay much attention to the moral and ethical issues of the use of nuclear weapons, as they were absorbed in the urgency and", "did not think that the Japanese would capitulate immediately). Colonel Lyle E. Seeman reported that at least seven Fat Man-type plutonium implosion bombs would be available by X-Day, which could be dropped on defending forces. Seeman advised that American troops not enter an area hit by a bomb for \"at least 48 hours\"; the risk of nuclear fallout was not well understood, and such a short amount of time after detonation would have resulted in substantial radiation exposure for the American troops.\nKen Nichols, the District Engineer of the Manhattan Engineer District, wrote that at the beginning of August 1945, \"[p]lanning", "9, 1945, leading to the Japanese surrender.\nThe secret program was under the general direction of J. Robert Oppenheimer, whom Bachelder described as:\nA \"pencil and paper man\", immersed in physics theory, who was more than a little amazed by the Los Alamos lab machinery. Bachelder recalled Oppenheimer standing in front of her lab's most important and expensive instrument punching buttons at random ... He asked \"What does this do?\" Then he'd punch another button ... He might have wrecked the machine if he hadn't finally been persuaded to leave it alone. Contribution to post-war developments in nuclear energy The conclusion of the Second", "Bomb (The Young Ones) Plot The episode opens with footage of a flying bomber dropping a payload, revealed to be a huge red atom bomb that lands into the quartet's house unexploded. Neil fails to notice the real reason for an enormous hole in the ceiling when he gets out of bed to do the breakfast, assuming that one of his flatmates had put it there somehow. Eventually Vyvyan points out that the atom bomb is perched against the refrigerator. The initial panic is diverted by the arrival of a sadistic television licence officer who wants blood, but soon the", "he then received additional delayed gamma radiation and beta burns while disassembling his experiment. He quickly collapsed with acute radiation poisoning and died 25 days later in the Los Alamos base hospital. Planned return to teaching After the war, Slotin expressed growing disdain for his personal involvement in the project. He remarked, \"I have become involved in the Navy tests, much to my disgust.\" Unfortunately for Slotin, his participation at Los Alamos was still required because, as he said, \"I am one of the few people left here who are experienced bomb putter-togetherers.\" He looked forward to resuming teaching and", "The Atomic Kid Plot While uranium prospector \"Blix\" Waterberry is in the desert, he wanders into an active atomic bomb test site and is accidentally exposed to radiation from a direct overhead A-bomb blast. He miraculously survives, becoming radioactive, and in the process gaining special powers. He is then recruited for his powers by the FBI to help break up a spy ring. After helping to capture the spy ring, Bix and his former nurse decide to get married. They head toward Las Vegas and get lost in the desert along the way. They stop at a lone ranch-style house", "atomic bombings of Hiroshima and Nagasaki and the end of World War II quickly followed the 1945 Trinity nuclear test, and the Little Boy device was detonated over the Japanese city of Hiroshima on 6 August 1945. Exploding with a yield equivalent to 12,500 tonnes of TNT, the blast and thermal wave of the bomb destroyed nearly 50,000 buildings and killed approximately 75,000 people. Subsequently, the world's nuclear weapons stockpiles grew.\nOperation Crossroads was a series of nuclear weapon tests conducted by the United States at Bikini Atoll in the Pacific Ocean in the summer of 1946. Its purpose was to test" ]
Why do I get a feeling someone's watching me even when I can't see them?
[ "I've always heard that the brain records and processes every single thing your eyes see. EVERYTHING. Although it sees all, it has to choose what information it presents to your aware mind at the moment in time. Although your brain saw everything when you walked into a new room, there is only certain information that you need to be aware of, and only a certain amount of information you can actually use.\n\nMy best guess is you can sense someone is watching you because at some point in the last few minutes your brain actually saw someone...but you just werent aware of it at the time. But because the brain is wired for survival it tries to send messages to you that you should be careful, hence the feeling of being watched.\n\nThats the way i understand it.", "lookup 'the sense of being looked at' by whatshisname, he made a career out of studying phenomenae that contradict skeptic materialism" ]
[ "\"seeing\" it, while another might suggest that a person might be \"seeing\" something, but not truly \"look at\" it. Both arrangements suggest that the person is directing their vision towards the thing, but failing to give sufficient attention to notice specific characteristics or implications of what is in the visual field. Looking in intense, pronounced, or prolonged ways A number of troponyms exist to illustrate kinds of looking that are either intentionally or unconsciously done in intense, pronounced, or prolonged ways.\n\"Staring\" is an intense form of looking in which the eyes of the person looking remain fixed on the subject", "can't see, or don't see, or our brain doesn't let us see, because we think that it's somebody else's problem. That’s what SEP means. Somebody Else’s Problem. The brain just edits it out, it's like a blind spot.\nThe narration then explains:\nThe Somebody Else's Problem field... relies on people's natural predisposition not to see anything they don't want to, weren't expecting, or can't explain. If Effrafax had painted the mountain pink and erected a cheap and simple Somebody Else’s Problem field on it, then people would have walked past the mountain, round it, even over it, and simply never have noticed", "dealing with our stuff, and we don't look, and don't see, and so then we don't notice.\"", "is possible that observers are not even able to identify that the stimuli they are seeing are coherent objects. Thus observers perceive some representation of the stimuli but are actually unaware of what that stimulus is. It is because the stimulus is not encoded as a specific thing, that it later is not remembered. Individuals fail to report what the stimuli is after it has been removed. However, despite a lack in ability to fully process the stimuli, experiments have shown a priming effect of the critical stimuli. This priming effect indicates that the stimuli must have been processed to", "of the reasons why people instinctively don't look deep into another's eyes. It is an immediate way to identify someone or something flawlessly. It is notably something he has never shared with Murphy, although he has with Susan (who tricked him into the Gaze). Harry has no idea how people perceive him, although those who have Gazed him tend to have their opinion and respect for him taken up several notches after it happens, as they realize the true nature of who they are dealing with. The crime lord Marcone, for instance, evidences a remarkable amount of respect for Harry", "different peoples, although they are far away from me in distant lands and places. And because I see them this way in my soul, I observe them in accord with the shifting of clouds and other created things. I do not hear them with my outward ears, nor do I perceive them by the thoughts of my own heart or by any combination of my five senses, but in my soul alone, while my outward eyes are open. So I have never fallen prey to ecstasy in the visions, but I see them wide awake, day and night. And I", "see anything I'll freak out, but if I don't see anything I'll freak out. It's a lose, lose situation for me.\"", "being stared at, they tend to assume that they are, despite having too little information to make that determination. Test subjects asked to determine if an individual wearing dark sunglasses is looking at them, for example, would assume they are indeed being stared at, even though the starer's eyes were obscured and the actual position of their eyes was not known to the subject. Humans, they reason, are \"hard-wired\" to err on the side of caution since the consequences of not recognizing such a potential threat or important social cue would be more detrimental than a false positive", "he says, people like looking at images because of the pleasure of contemplating [theôrizein] what something is through manthanein and syllogizesthai (syllogism: a bringing together of logoi or accounts). We even \"enjoy contemplating the most precise images of things whose sight is painful to us\".", "Looking Looking is the act of intentionally focusing visual perception on someone or something, for the purpose of obtaining information, and possibly to convey interest or another sentiment. A large number of troponyms exist to describe variations of looking at things, with prominent examples including the verbs \"stare, gaze, gape, gawp, gawk, goggle, glare, glimpse, glance, peek, peep, peer, squint, leer, gloat, and ogle\". Additional terms with nuanced meanings include viewing, watching, eyeing, observing, beholding, and scanning. Looking is both a physical act of directing the focus of the eyes, and a psychological act of interpreting what is seen", "as a result of his comments and his attitude I began to see, observe, how blind we are to one another's humanity. Blinded by a lot of things that have, perhaps, initiated feelings in that light. We don't see into the depths of our interconnection. The gifts, the strength and potential within other human beings. We stop at color quite often. So one of the things we have to be aware of is who we are in order to have the capacity to like others. But when you cannot visualize the offerings of another human", "believe what you hear, don't believe what you see / If you just close your eyes / You can feel the enemy...' I can't remember it, but the point is: you start to see the world in a different way, and you're part of the problem, not just part of the solution\". In 2006, he noted it was \"a song about being a hypocrite, and I think we all can be and I certainly have been. And you know, you exact very high standards on people in the world but then you don't live them personally\", noting the theme was", "better view, and has been described as a human trait that is associated with morbid curiosity. \"Ogling\" is an \"impertinent\" form of staring \"often in a way that indicates improper interest\". Looking in quick, subtle, or hidden ways A number of troponyms exist to illustrate kinds of looking that are either intentionally or unconsciously done in a quick, subtle, or hidden way.\n\"Glancing\" and \"glimpsing\" are terms that imply looking at things in a subtle way, or seeing things very briefly before they move out of the range of vision. Although the two are often confused, a glance is more commonly", "de Maupassant, in his story \"Le Horla\", describes a man who suddenly may see his own back in the mirror. His back is there, but it is deprived of the gaze of the subject. It appears as a strange object, until he feels it is his own. There is no cognitive dissonance here, we rather cross all possible cognition, to find ourselves in the field where we do not know how to distinguish bad and good, pleasure from displeasure. And this is the signal of anxiety: the signal of the real, as irreducible to any signifier.\nHitchcock was the master in", "return. “If I can observe the watcher who spies upon me, I can control my surveillance, I can spy in turn, I can learn the watcher’s ways, his weaknesses, I can study his habits, I can elude him. If the eye is hidden, it looks at me even when it is not actually observing me. By concealing itself in the shadows, the eye can intensify all its powers.” For Bentham, “reality is worth no more than the appearance it produces.” Consequently, one could study the behavioral patterns of the inmates as a consequence of their surroundings. For the fear", "external appearance. Lacan extrapolated that the gaze and the effects of the gaze might be produced by an inanimate object, and thus a person's awareness of any object can induce the self-awareness of also being an object in the material world of reality. The philosophic and psychologic importance of the gaze is in the meeting of the face and the gaze, because only there do people exist for one another. The gaze in systems of power In The Birth of the Clinic (1963), Michel Foucault first applied the medical gaze to conceptually describe and explain the act of looking, as", "my eyes because I saw two eyes coming close to mine, and I felt like the eyes had pushed into my eyes\" (from his second hypnosis session) and \"All I see are these eyes... I'm not even afraid that they're not connected to a body. They're just there. They're just up close to me, pressing against my eyes.\"\nBarney related that he and Betty were taken onto the disc-shaped craft, where they were separated. He was escorted to a room by three of the men and told to lie on a small rectangular exam table. Unlike Betty, Barney's narrative of the", "(to open your eyes): if any will see, it will be for (the good of) his own soul; if any will be blind, it will be to his own (harm): I am not (here) to watch over your doings.\n— The Cattle: 006.104 Judaism and Christianity In Judaism and Christianity, the concept is the manifestation of God rather than a remote immanence or delegation of an angel, even though a mortal would not be able to gaze directly upon him. In Jewish mysticism, it is traditionally believed that even the angels who attend him cannot endure seeing the divine countenance directly.", "that you are in the surroundings you suppose you are in ... various hypotheses could explain how things look and feel. You might be sound asleep and dreaming or a playful brain surgeon might be giving you these experiences by stimulating your cortex in a special way. You might really be stretched out on a table in his laboratory with wires running into your head from a large computer. Perhaps you have always been on that table. Perhaps you are quite a different person from what you seem...\"\nSuch scenarios had been used many times in science fiction but in philosophy", "may be seen by others, he or she claims not to see it.", "To see, to see oneself, to be seen, what does it mean?\"", "could see their reflection in each other. They are the most familiar strangers.", "second. Even adolescents. I guess for a minute they get the feeling they got when they watched the picture. They like to hear it but they 'don't' like to hear it. And then they go, 'Ohhhhhhhhhh ... !' The picture made a terrible impression of some kind on them, sometimes a ghastly impression, but most of them got over it, I guess ... because when I talk like the Witch, and when I laugh, there is a hesitation and then they clap. They're clapping at hearing the sound again.\nHamilton played two credited roles in the famous film: Almira Gulch and the Wicked Witch", "of everything that is going on ... The hidden observer sees more, he questions more, he's aware of what is going on all of the time but getting in touch is totally unnecessary ... \nHe's like a guardian angel that guards you from doing anything that will mess you up ... The hidden observer is looking through the tunnel, and sees everything in the tunnel ... Unless someone tells me to get in touch with the hidden observer I'm not in contact. It's just there. (Hilgard, 1977, p. 210) The hidden observer protects us from doing anything in hypnosis that we would not do under", "phenomenon in which a person's internal state influences their visual perception. People have the tendency to believe that they perceive the world for what it is, but research suggests otherwise. Currently, there are two main types of wishful seeing based on where wishful seeing occurs—in categorization of objects or in representations of an environment.\nThe concept of wishful seeing was first introduced by the New Look approach to psychology. The New Look approach was popularized in the 1950s through the work of Jerome Bruner and Cecile Goodman. In their classic 1947 study, they asked children to demonstrate their perception of the", "that the inside and outside is relative to each other in which both are a kind of inner joy, to mobilize your senses. For example, the senses are developed from mobilizing the substance itself to gain pleasure from Coca-Cola or olive oil, it is a kind of illusion, forged emotion or a desire stimulated within the body. This cannot control the quality of the substance, neither can control what the viewer will see or sense at particular time, but at least through this illusion we can understand the world without an exterior. Everything We Create is not Ourselves is based", "one of the common issues discussed at the time of al-Hadi who believed it was impossible to see Him. He argued that \"seeing is not possible if there is no air (space) between the seer and the seen thing through which sight goes through. If there is no air and no light between the seer and the seen thing, there will be no sight. When the seer equals the seen thing in the cause of sight between them, sight takes place, but those who compare the seer (man) to Allah, they are mistaken because they liken Allah to man…for effects", "no other reason than you feel as if you’ve experienced a change yourself from seeing it.\"", "ground, — my head bathed by the blithe air, and uplifted into infinite spaces, — all mean egotism vanishes. I become a transparent eye-ball; I am nothing; I see all; the currents of the Universal Being circulate through me; I am part or parcel of God.\nHowever, only a \"few adult persons can see nature.\" For most people seeing is superficial. It is light illuminating the eye revealing what is physically evident as opposed to sun \"shine[s] into the eye and heart of the child.\" \"Emerson argues that outer and inner vision merge to reveal symbols in the natural", "what it must be like to be on the outside looking in - to see comfort, warmth, love, and security but not to be a part of it. Wonderful. (...)\"\n- Richard Dorment, The Daily Telegraph, 22 September 2008" ]
what is "old man" strength?
[ "Nobody's mentioned this, so I figured I'd give my $0.02. Old man strength is typically from those who have been performing some form of physical labor for a long time, and have such developed incredible grip strength. This is the part that /u/WOT_IF_UR_LEGS is talking about where it feels as if they can crush your hands. Additionally, what they may lack in raw power, they make up for from years of lifting heavy objects and have developed a proficiency in it so that they may look a lot weaker (old man) than they really are (strength).", "Old man strength is nothing special you gain with age, it's just when we're surprised by how strong Grandpa still is. After all, he just took five minutes to get out of his chair without his joints exploding, so we definitely didn't expect him to casually break loose the stuck jar lid Junior was struggling with.\n\nBecause of their appearance and mannerisms, we think of old people as being frail and weak, but they're often far stronger than they look. It's unlikely an 80-year-old will actually be stronger than a 40-year-old, but the difference in their strength may be smaller than the difference in their appearance. We're occasionally reminded of that and it surprises us.", "Young men today actually have weaker grips than men did 30 years ago, and likely in generations prior to that. Grip strength is often used as a proxy for general body strength in populations.\n\n\"In 1985, men ages 20-24 had an average right-handed grip of 121 pounds and left-handed grip of 105 pounds. Today, men that age had grips of only 101 and 99 pounds, the study found. Men 25-29 posted losses of 26 and 19 pounds.\"\n\n_URL_0_\n\nThe truth is that men today are likely weaker than any recent generations of men. This is probably due to obvious shifts in physical activity for pleasure and for work.", "Studies have actually proven that men tend to peak in physical strength at around 35-40 years old. That’s certainly not “old man” age, but it does show that men get stronger with age\n\nWhat many people refer to is how older men will absolutely crush your hand during a handshake, and that is mostly due to the fact that they have been practicing handshakes for decades, and are going to be able to have much better technique.", "* older people, men in particular, are more likely to have engaged in physical labor all of their lives, leaving them with muscles, bones, tendons, joints, and pain tolerances better suited to feats of strength\n* while coordination and endurance suffer as we age, people often retain much of their raw strength, and it can be unexpected to find a man who has trouble climbing a flight of stairs will has a vice-like grip\n\nIn either case, they are not stronger than they were at the prime, just strong they most people would expect them to be.\n\nMy mom worked in nursing homes, and mentally incapacitated older male patients were often a problem. They weren't necessarily violent, but they often got confused, and if they didn't want to do something, it was often difficult, or even dangerous, to try to make them do something. They were just as strong as any nurse or orderly, even if they were in a wheelchair.", "It’s a term that has a lot to do with the connecting tissues, and the tendons being stronger. But also how the muscles work as a whole, and the experience behind the muscle. Think of it like a tug-of-war. The tug-of-war game is based on the strength of the group as a whole, it has an anchor person, and a front line person, and the people in the middle giving strength to the front line person. \n\nFor a high school kid, who may look the same size or even much bigger than a grizzly 40-60 year old man, his strength is a bunch of strong kids that get the concept of the game and individually may be stronger but as a whole don’t work together as well or as coordinated. Also their anchor and front line(tendons) are not going to be nearly as strong. \n\nWhereas the “old man” has well developed anchors and front line(the tendons) and his middle(the muscle) know exactly how to pull in sync with the front line guy and invariably they will win, even if they are cumulative smaller than the opposite side. \n\nEssentially the “kid” has the weakest players in the position where the “old man” puts his strongest, and that allows an advantage. \n\nKid: xxXXXXx\nMan: XxxxxxX\n\nMan will win with the right technique most of the time. \nKid may have the upper hand with a burst of strength at the right moment.", "in actual fact, men and women get progressively weaker after about the age of 35. this loss of muscle mass and strength is termed sarcopenia and really accelerates in the 6th and 7th decades of life. its associated with a loss of neural tissue in the spinal cord and decreases in concentric muscle tension/power. the interesting thing is that there is a disproportionate maintenance of eccentric (or muscle lengthening) strength in old men that is likely due to muscle architectural modifications. so it really depends on what you define old as, in addition to the training history of the individual in question. likely people who have strength trained their whole lives are able to buffer the inevitable muscle mass decrements seen in aging by already having large musculature. i did my masters in a lab that focused on muscle function in aging humans", "A lot of it is knowing how to lift, hold, or grip things. I find myself out doing my son and his friends with tasks and chores and I believe much of it is do to experience not sheer strength." ]
[ "Iron man (sports streak) An Iron man is an athlete of unusual physical endurance. This durability is generally measured by an athlete's ability to play without missing a game and/or start for an extended period of time, sometimes, even for an entire career. Some of the more notable athletes with significant streaks in sports history includes baseball's Lou Gehrig and Cal Ripken Jr., American football's Brett Favre and Joe Thomas, basketball's A. C. Green, ice hockey's Doug Jarvis, and stock car racing's Jeff Gordon. Background The term \"iron man\" as it pertains to sports longevity has origins from major league", "performed feats of strength that were non-traditional or sensationalistic. Strongman competitions like World's Strongest Man began their television popularity in the 1970s. Origins Strength competitions pre-date written history. The first Olympics (running, throwing, jumping) were believed to be held in 776 BCE. There are records in many civilizations of feats of strength performed by great heroes, perhaps mythological, such as Heracles, Goliath, Orm Storolfsson and Milo of Croton.\nCompetitions that modern strongman events are modeled on, Scottish Highland Gatherings, were formalized around 1820 by Sir Walter Scott. In 1848, Queen Victoria attended the Braemar Highland Games. \nIn the 18th and 19th", "abilities Even during his early years, Danner displays superhuman strength. He demolishes his wooden crib as a newborn, saves a man's life by lifting a two-ton supply wagon at 6 years old, and uproots entire trees at 10. He progressively grows stronger as he gets older. During his twenties, he can stop and kill a charging bull with a single punch, bend a railroad rail, lift a seventy-five millimeter howitzer cannon singlehandedly, lift a car and its driver singlehandedly, rip open a 5-foot-thick (1.5 m) bank vault, and easily catch a falling 8,000-pound block of stone.\nDanner's physical strength extends to", "Strength athletics Strength athletics, also known as Strongman competitions, is a sport which tests competitors' strength in a variety of non-traditional ways. Some of the disciplines are similar to those in powerlifting and some powerlifters have also successfully competed in strongman competitions. However, strongman events also test physical endurance to a degree not found in powerlifting or other strength-based sports, such as carrying refrigerators, flipping truck tires, and pulling vehicles with a rope. \nCompetitions designed to test the strength of participants pre-date recorded history. The Highland games in Scotland are often recognized as the first strongman competitions. Circus strongmen also", "is regarded as the strongest man to have ever lived. Beaupré's height was measured at 218 cm (7 ft 2 in) and he weighed 164 kilograms (362 lb), whereas Cyr's height was measured at 180 cm (5 ft 11 in) and he weighed 166 kilograms (366 lb). The match was very short, with Cyr winning. Death Beaupré signed a contract on July 01, 1904 with the Barnum and Bailey circus to appear at the St. Louis World's Fair in St. Louis, Missouri. He died of a pulmonary hemorrhage, a complication of tuberculosis, at the fairground hospital on July 03, 1904. At the time he was 23 years old", "achievements of a particular strongman over the previous year. 2008 Mariusz Pudzianowski 2009 Zydrunas Savickas Fortissimus Lifetime Achievement Award The Fortissimus Lifetime Achievement Award is given to recognize the greatest strongman athletes in the history of the sport, both past and present athletes are eligible for this title. 2009 Magnus Ver Magnusson", "not weight-room strength. It's brute strength.\" 2005–2006 Shaw began his career as a strongman with a win when he entered the Denver Strongest Man contest in October 2005. He had entered with no formal training. Just seven months later in June 2006 he joined the professional ranks and his successes continued. 2009 In 2009 he entered Fortissimus, otherwise known as the Strongest Man on Earth competition, in Canada where he came in third and was the only man to lift six Atlas stones weighing from 300–425 lb (136–193 kg). He then competed in Romania in the World Strongman Super Series. In September", "he secured an invite to the World's Strongest Man (\"WSM\"), the premier strength athletics event. Here, he was noted for producing \"unbelievable performances for a guy his size.\" The next year he came third in the Britain's Strongest Man finals after Terry Hollands and Mark Felix who had both been in the top four athletes in the world at one stage. He was again invited to the WSM and was just short of making it into the top ten finalists. He has been quoted as saying his greatest achievement in strongman is to have been invited to, and attend Being", "fading abilities. Gehrig had been a consistent performer on the field having attained a batting average of at least .300 throughout his career until the previous season when he had fallen to .295. A common characteristic of an iron man is the ability to play through injury. Gehrig displayed this trait in 1934 when his streak was in jeopardy of being snapped at 1,427 games. He had been injured during a game and was pulled from the lineup. The next day, after receiving heat treatments and massages for a stiff back, he was able to get a hit before leaving", "men. Various proofs of his strength are given: he carried twenty hundredweight of straw and a tree as if they weighed nothing, kicked a football so far that nobody could find it and turned the tables on four men who tried to rob him. He eventually got a job carting beer in Wisbech, but the long journey tired him, so one day he cut across the land of the Wisbech Giant. The giant took this badly and fetched his club to beat Tom, but at this point Tom took the axle-tree and cartwheel and fought the giant. After a furious", "Tȟašúŋke) (1830-September 9, 1876) is renowned as a great warrior for his leadership, Spartan courage and honor. American Horse the Elder is notable in American history as one of the principal war chiefs allied with Crazy Horse during Red Cloud's War and the Battle of the Little Bighorn during the Great Sioux War of 1876-1877. Chief American Horse the Elder was a son of Old Chief Smoke, an Oglala Lakota head chief and one of the last great Shirt Wearers, \"Ogle Tanka Un\", a highly prestigious Lakota \"chief warrior\" society. He was a signatory to the Fort Laramie Treaty of", "than peak human, levels. On a number of occasions characters have described his strength as enhanced (Nick Fury described him as being able to bench press a Toyota). He has been shown bending steel with his bare hands, catching a tree heavy enough to crush a Jeep. He is also shown jumping large distances, and the Ultimate Red Skull, when he was fourteen and scientists said he had abilities comparable to his father, is shown running alongside a motorcycle.\nCaptain America is also shown to have fast healing, while nowhere near as powerful as Wolverine and Sabretooth's, in \"Blade vs the", "Strength athletics in the United States Strength athletics in the United States refers to the various strongman events throughout United States and North America in the sport of strength athletics in association with the World's Strongest Man (\"WSM\") contest. America has both an amateur and a professional sanctioning body. Pro/Amateur organizations American Strongman Corporation (\"ASC\") is the sole sanctioning body for all professional American strength athletes and organizes the annual America's Strongest Man contest, as well as the NAS US Amateur National Championships, the winner of which receives their pro card to compete in professional contests. North American Strongman (\"NASM\")", "with his feats of strength. After learning of the tale, Cyr attempted to mimic the practice of legendary strongman Milo of Croton, who as a child carried a calf on his shoulders, continuing to carry it as it grew into a full-grown bull and he into a grown man. Cyr's calf, however, bolted one day, kicking him in his back, after which he instead began carrying a sack of grain ¹⁄₄ mile (0.40 km) every day, adding 2 pounds (0.91 kg) each day. According to one of his biographers, his mother decided \"he should let his hair grow, like Samson in the", "all of the men are larger than average, especially his great uncle Chudd, who was 6 ft 7 in, weighed approximately 500 lb, never had a pair of manufactured shoes, and was known as the strongest man in the Piney Woods of East Texas.\nHenry played football in high school until his senior year, when he strained ligaments in his wrist during the first game of the year and scored below 700 on the SAT. Powerlifting career By the time Mark Henry was in the fourth grade, he was 5'5\" and weighed 225 lb (102 kg). His mother bought a set of weights for him", "in a strongman competition would have to be found custom-made or at a strongman gym. These equipment include Atlas Stone, Log (Log Press), Farmers Walk Bars, Yoke (Yoke Walk), Keg (Keg Toss), a vehicle.\nAnother part of a strongman's training is its intense diet regime. A top athlete in strongman would need to ingest upwards of 10,000 calories a day. Incorrect usage Strongman is often incorrectly used to describe a person who does weightlifting or bodybuilding. Due to the circus and entertainment background, nineteenth-century bodybuilders were expected to mingle with the crowd during intermission and perform strength feats like card tearing,", "short but spirited. He's a fast runner and a good pitcher. His small size allows him to get into places where the other two boys won't fit. Putting him at the head of the team will make them walk faster.\nMax (マックス) (in green; age 12) – He is the largest and strongest of the three. He likes to eat, but also likes to play soccer and swim. He is also a good boxer. He also can lift up heavy objects.\nJack (ジャック) (in blue and red; age 12) – He is the smartest of the three. He's good with his hands.", "obesity. Volstagg's speed, stamina, and agility are now inferior to that of the majority of his race.\nVolstagg is extremely long lived, although not truly immortal, and ages much slower than a human being. The tissues of his body are also superhumanly resistant to physical injury. It is possible to injure him but his life-force enables him to recover with superhuman speed and efficiency.\nVolstagg has demonstrated the ability to increase his mass to make himself nearly unmovable.\nIn a number of stories, Volstagg is represented as an excellent overall battlefield warrior and is highly proficient in all Asgardian weapons; an excellent hand-to-hand", "was mostly due to his body's natural contraction during the day, and over the length of his playing career. With a weight of 141 kg (312 pounds), he was described as, \"well built and dry\". He was not a talented pupil, but he was exceptionally persistent, and performed all the drills that were set by his coach. His strongest point, according to Gomelsky, was his mental balance and reliability. On the other hand, he was too shy for a team leader. Seeing a 2.20 m (7'3\") giant, most defenders did not hesitate to step on his toes, or to push or", "40% standard strength was introduced by the Russian government already in 1843, when Mendeleev was nine years old.", "Mark Philippi Strongman As a young man, Mark saw the early strongman competitions featuring his soon-to-be hero, Bill Kazmaier. He has stated that having seen Kazmaier on television he said to himself \"I want to be like Bill.\" A career in athletic events focused on strength including powerlifting and strength athletics followed.\nAfter winning the title of America's Strongest Man in 1997, he went on to represent his country in the 1997 World's Strongest Man finals, the first of seven appearances. He made the final on 2 occasions, but his greatest success came in the World Muscle Power Championships where", "of the 20th century, and in to the 21st, other strongman programs and events were created, such as: the World Muscle Power Championships, World Strongman Challenge, Arnold Strongman Classic, Giants Live, Highlander World Championships, World Strongman Federation, and Europe's Strongest Man.", "Lionel Strongfort Lionel Strongfort, born Max Unger (23 November 1878 - 27 November 1967) was a German bodybuilder, wrestler and author of the correspondence physical exercise course, known as the Strongfort System of Physical Culture, or Strongfortism. Biography Strongfort was born in Berlin. He worked as a watch and clockmakers apprentice. A turning point in the life of the young, sixteen-year-old was a meeting with German strongman Louis Attila. He immediately noticed the potential of the young man and encouraged him to attend his trainings. After a year Strongfort achieved a phenomenal form (at the age of seventeen, with one", "Arnold Strongman Classic History The Arnold Strongman (which has been variously referred to as the \"Arnold Classic\", the \"Arnold Classic Strongman\", \"Arnold's Summit\" and \"Arnold's Strongest Man\") is one of the many offshoots of the Arnold festival. The Arnold Sports Festival, founded in 1989 as the Arnold Classic and named after Arnold Schwarzenegger, was originally a bodybuilding contest. It featured a competition for men (Arnold Classic) and for women (Ms. International). The bodybuilding contests have since expanded to include a Fitness International and Figure International competition for women. However, the event had also expanded to include other sports and", "Capes, Jamie Reeves and Gary Taylor dominated, with these three in particular going on to win World's Strongest Man titles. The modern era has seen this trend continue with Terry Hollands, Mark Felix and Laurence Shahlaei being regular faces at World's Strongest Man and its associated Super Series. Featured events in these contests have been tailored to emphasize a more well-rounded athlete, to reflect that viewpoint on strongman as a whole, and in the interests of increased popularity and marketability among the masses. Almost inevitably, more than one interested party has seen the benefits of strength competitions. Alternative organizations have", "Jason Bergmann (strongman) Career Jason Bergmann came to international attention with a third-place finish in the All-American Strongman Challenge 2007. He then became a leading competitor on the Strongman Super Series circuit and in 2008 came second in the America's Strongest Man competition. Having then been invited to the 2008 World's Strongest Man he made the final ten (coming ninth overall). Strong finishes in the Strongman Super Series grands prix in Venice Beach and Gothenburg were followed by a period of injury. In 2010 he began competing again and once again made the final ten of the prestigious 2010 World's", "spinal column condition (cervical spinal stenosis), which forced him to announce his early retirement on August first, 1987. It would eventually take 4 days for the strength in his legs to return and 2 years to get his upper-body strength back to normal. World's Strongest Man competition He participated in the World's Strongest Man competitions for many years. At 6-feet-4 and 400 pounds, he developed a 65-inch chest, 22-inch biceps and the power lift was his specialty. He made it to the finals twice, in 1994 and 1995. Personal life Onosai has been a pastor at Destiny Christian Church since", "musculature and body shape By the end of puberty, adult men have heavier bones and nearly twice as much skeletal muscle. Some of the bone growth (e.g. shoulder width and jaw) is disproportionately greater, resulting in noticeably different male and female skeletal shapes. The average adult male has about 150% of the lean body mass of an average female, and about 50% of the body fat.\nThis muscle develops mainly during the later stages of puberty, and muscle growth can continue even after boys are biologically adult. The peak of the so-called \"strength spurt\", the rate of muscle growth, is attained", "World Muscle Power Classic History The World Muscle Power Classic (WMPC) first took place in 1985, with the by then established World's Strongest Man having made the popularity of strongman competitions such that this second world title was viable. In a sport notorious for the difficulty with which organisers are faced in making an event enduring, the WMPC stood side-by-side with the World's Strongest Man for almost twenty years and in that time saw many other events come and go. From the outset it attracted the very best athletes in the field and the final placings in that inaugural 1985", "made an astonishing impact and gained 4th place. This placing gave him an invitation to the ultimate strength competition, World's Strongest Man, held in LA. He managed a very respectable 4th place in his group and even won his first event (loading race), his lack of top level experience being his major downfall.\nHis key strength has been his pressing power. He was the first person in the UK to lift a 200 kg log and has since gone on to press a 211 kg log in world loglifting championship in 2015 along with Eddie Hall. Eddie Hall and Graham Hicks hold the" ]
Why Do People Have Fetishes?
[ "I have a bag of frozen peas. I always buy Birdseye, I just prefer that brand, but some people like other brands and that's OK too. If you're having peas with dinner you'll cook them in a pot or in the microwave so you have warm peas in the plate. That's just how it's done, right. \n\nA few years ago I was making dinner on a really hot day, and there was a bowl of frozen peas sat there waiting to be cooked. The bowl was nice and cool, frost on the outside and all. It felt good on my clammy hands. I wondered what they'd taste like frozen, but that'd be weird, cold hard peas, wouldn't it?\n\nTentatively, I picked a few up and tossed them into my mouth, rolled them around with my tongue and crunched down on a couple. That sensation of going from cool and refreshing to defrosting and releasing that sweet juicy pea flavour were just wonderful. \n\nI often enjoy a mug of frozen peas, much to the scorn and ridicule of my nearest and dearest. \n\nAnyway, I tried a thing and I liked it, even though it might be considered unconventional.", "There's not really a 100% established answer for why, or what causes people to have fetishes. The more common explanations are a result of conditioning and psychological development. \n\nConditioning is where a non-typical object, body part, or act is associated with sex by pairing it with typical erotic stimulation, either visual, audio, or physical. So for example someone could develop a sexual fetish for women in boots by watching porn where women are wearing boots, or just by touching themselves in an arousing way while looking at the boots themselves.\n\nPsychological Development suggests that the roots for sexual fetishes often develop during childhood. It can arise from things such as social taboos, if it's forbidden or frowned upon to show a specific body part (such as calves) then maybe seeing a naked calf when you hit puberty could be considered arousing.", "There is no reasoning behind a fetish. It is simply just a term used to describe a liking, generally gearing towards sexual arousal, of a certain body part, object or act that is not generally enjoyed by the majority of people but more towards a smaller following of people.\n\nFetishes can be brought forth in people for a various number of reasons. Depending on the situation, it also is up to the person to decide if they classify it a fetish or not. For example, most believe that fetishes have to do with the sexual excitement or sexual arousal of a person. I am much the same. Not meaning anything negative, the poster who mentioned eating peas cold, to me that is not a fetish, but just enjoying cold peas. While it may be unconventional to them or their family and friends, I have often seen cold peas in salads and such.\n\nA fetish can be brought on by something you adored in your childhood that sparks memories in your adulthood or it can be something that you find extremely fascinating, that just happens to get you sexually aroused.\n\nI have a co-worker that goes to Furry Conventions. They dress up like animals and enjoy the pretending of being an animal instead of a person. Does this come from cartoons where characters are often animals, but walk, talk and act like people or is it from the time we were little and were given soft stuff animals that were supposed to comfort us? \n\nIt is up to the individual to explain why they have a fetish and how it came about.\n\nTo me, it is just another label that people are given to describe something." ]
[ "Sexual fetishism Definitions In common parlance, the word fetish is used to refer to any sexually arousing stimuli, not all of which meet the medical criteria for fetishism. This broader usage of fetish covers parts or features of the body (including obesity and body modifications), objects, situations and activities (such as smoking or BDSM). Paraphilias such as urophilia, necrophilia and coprophilia have been described as fetishes.\nOriginally, most medical sources defined fetishism as a sexual interest in non-living objects, body parts or secretions. The publication of the DSM-III in 1980 changed that by excluding arousal from body parts in its diagnostic", "must be ascetic for religious reasons, neurotic, or asexual for political reasons. Self-stimulation Some people use sex toys such as dildos, vibrators, anal beads and Sybian machines while alone. Autocunnilingus remains unproved but autofellatio, the act of orally stimulating one's own penis, is thought to occur in less than 1% of the male population, possibly because of the physical flexibility required to perform it. Criticism and controversies Some people, for religious or personal reasons, believe autoeroticism to be wrong. For example, masturbation is considered a sin by the Roman Catholic Church. Teaching adolescents about masturbation remains controversial in some", " This suggests that people purchase objects because the materials reflect an aspect of the consumer's personality.\nFetishism is propelled by the cycle of desire and consumption and levels of society participate. It also becomes a physical and mental ritual practiced daily in all settings in order to achieve divine perfection. \nQueerness \nWilliam's previous job as a hustler presents sexuality as a commodity. William exploits his masculinity and gender stereotypes to compensate for the assumption that Asian men are essentially feminine. Race impacts sexuality. It correlates with orientalism to suggest sexual roles. William's sexual preference illustrates that Asian", "It is also uncommon in forensic populations. History The word fetish derives from the French fétiche, which comes from the Portuguese feitiço (\"spell\"), which in turn derives from the Latin facticius (“artificial”) and facere (\"to make\"). A fetish is an object believed to have supernatural powers, or in particular, a man-made object that has power over others. Essentially, fetishism is the attribution of inherent value or powers to an object. Fétichisme was first used in an erotic context by Alfred Binet in 1887. Early perspectives on cause Alfred Binet suspected fetishism was the pathological result of associations. He argued that,", "in ritual. \"Fetishism\" is about relations among people, rather than the objects that mediate and disguise those relations.\nTherefore, McGaffey concludes, to call a minkisi a fetish is to translate \"certain Kongo realities into the categories developed in the emergent social sciences of nineteenth century, post-enlightenment Europe.\"", "or subculture's set of values, especially its biases against genders (sexism). For example, words such as whore and slut are typically used to refer to sexually promiscuous women.\nSexual slurs are common across many cultures and historical periods. The most common slurs directed against men historically include accusations of being a passive homosexual (Aristophanes notably enjoyed using such allusions) or of being effeminate; for example, in the Hittite military oath, oath-breakers are threatened with being made into women (a promise of either actual castration, or of divine revenge on the traitors' manhood).\nThe pejorative term prick for a contemptible person is ", "exaggerated adoration of goods. The \"fetish\" instead is to be referred to the structure of the commodity. It is then a theory of \"objective fetishism\" (Jappe) or radicalized, that is to say, so long as value (the objectification of the specific function of the spirit of labour under capitalism), the goods and money, society is actually governed by the self-movement of created things themselves, and not by the subjective manipulation of the ruling classes. The subjects are not men, but it is rather their objectified relationships that are at the heart of socialization under capitalism. Fetishism, Postone notes, must be", "loyalty and care-giving to the extent that these fetishes can be seen as exercises in trust rather than primarily a humiliation fetish. The desire to be beneath the other partner during intercourse, the idea of \"getting caught\" (as in having sex in the garden or woods), and simulated rape are emotional games that emphasise status, vulnerability, and control. However, for most people such ideas remain fantasies; the people would have strong reservations about the fantasies' being made public, or engaged in with a partner in real life, however erotic the idea may be. When someone reveals a fetish to", "and religious ideologies of two radically different types of noncapitalist society, as they encountered each other in an ongoing cross-cultural situation. This process is indicated in the history of the word itself as it developed from the late medieval Portuguese feitiço, to the sixteenth-century pidgin Fetisso on the African coast, to various northern European versions of the word via the 1602 text of the Dutchman Pieter de Marees... The fetish, then, not only originated from, but remains specific to, the problem of the social value of material objects as revealed in situations formed by the encounter of radically heterogeneous social", "concepts of fetish and fetishism, derived from economic and ethnologic studies, to the development of the theory of commodity fetishism, wherein an economic abstraction (value) is psychologically transformed (reified) into an object, which people choose to believe has an intrinsic value, in and of itself. In the critique of political economy Marx proposed that in a society where independent, private producers trade their products with each other, of their own volition and initiative, and without much coordination of market exchange, the volumes of production and commercial activities are adjusted in accordance with the fluctuating values of the products (goods and", "can be classified into the gender and sexual orientation of the participants, as well as by the relationship of the participants. For example, the relationships can be ones of marriage, intimate partners, casual sex partners or anonymous. Sexual activity can be regarded as conventional or as alternative, involving, for example, fetishism, paraphilia, or BDSM activities. Fetishism can take many forms ranging from the desire for certain body parts, for example large breasts, navels or foot worship. The object of desire can often be shoes, boots, lingerie, clothing, leather or rubber items. Some non-conventional autoerotic practices can be dangerous. These include", "fixation, fantasies or behaviors toward an inanimate object, these objects frequently are articles of clothing. It is only through this object which the individual can achieve sexual gratification. It is not rare that an individual will rub or smell the object. This disorder is more common in males and it is not understood why. \nTransvestic fetishism also commonly known as transvestism. Sexual sadism and sexual masochism The disorders known as sexual sadism and sexual masochism are oftentimes confused or hard to separate when their definitions are compared but diagnostic criteria differ slightly between the two and allows for more easy", "with the indigenous theories of them, and on the other hand, \"fetish\", an idea, and an idea of a kind of object, to which the term above applies.\nAccording to Pietz, the post-colonial concept of \"fetish\" emerged from the encounter between Europeans and Africans in a very specific historical context and in response to African material culture.\nHe begins his polemic with an introduction to the complex history of the word:\nMy argument, then, is that the fetish could originate only in conjunction with the emergent articulation of the ideology of the commodity form that defined itself within and against the social values", "Some feminists of the 1970s sought to eliminate disparaging terms such as cunt. Twat is widely used as a derogatory epithet, especially in British English, referring to a person considered obnoxious or stupid. Pussy can indicate \"cowardice or weakness\", and \"the human vulva or vagina\" or by extension \"sexual intercourse with a woman\". In contemporary English, use of the word pussy to refer to women is considered derogatory or demeaning, treating people as sexual objects. In contemporary literature and art The vagina loquens, or \"talking vagina\", is a significant tradition in literature and art, dating back to the ancient folklore", "fetishism, while only detaching and overvaluing of a single feature resulted in pathological fetishism. Today, Hirschfeld's theory is often mentioned in the context of gender role specific behavior: females present sexual stimuli by highlighting body parts, clothes or accessories; males react to them.\nSigmund Freud believed that sexual fetishism in men derived from the unconscious fear of the mother's genitals, from men's universal fear of castration, and from a man's fantasy that his mother had had a penis but that it had been cut off. He did not discuss sexual fetishism in women.\nIn 1951, Donald Winnicott presented his theory of transitional", "Fetishism Historiography The term \"fetish\" has evolved from an idiom used to describe a type of objects created in the interaction between European travelers and Africans in the early modern period to an analytical term that played a central role in the perception and study of non-Western art in general and African art in particular.\nWilliam Pietz, who conducted an extensive ethno-historical study of the fetish, argues that the term originated in the coast of West Africa during the sixteenth and seventeenth centuries. Pietz distinguishes between, on the one hand, actual African objects that may be called fetishes in Europe, together", "femininity through one's gender and sexuality is clearly seen in soft butch women, but also across many people of a variety of sexual orientations.", "orientation is as ludicrous as suggesting that one can choose one's skin color.\" Most people traditionally view their gender as something God has given them (whether man, woman, or muxe), and few muxe desire genital surgery. They generally do not suffer from gender dysphoria because transphobia is a rare attitude in their culture, people are generally accepting of them and they usually have their gender recognised through their clothing, there is not as much pressure to \"pass\" as in Western societies.\nLynn Stephen writes: \"Muxe men are not referred to as \"homosexuals\" but constitute a separate category based on gender attributes.", "individuals, specifically women, for sexual behavior deemed excessive, has been referred to, since at least spring of 2010, with the neologism slut shaming (also hyphenated, as slut-shaming).\nCuckold fetish is colloquial for a paraphilia in which sexual gratification is gained from maintenance or observation of sexual relations by a woman with a man or a number of men besides her husband, boyfriend or long-term male sex partner.\nThe popular slang cougar refers to a woman who seeks sexual relations with considerably younger men.\nThe term fallen woman was used to describe a woman who has \"lost her innocence\", and fallen from the grace", "sample's favorite fantasies found that 14% of the male fantasies involved fetishism (including feet, nonsexual objects, and specific clothing), and 4.7% focused on a specific body part other than feet. None of the women's favorite fantasies had fetishistic themes. Another study found that 28% of men and 11% of women reported fetishistic arousal (including feet, fabrics, and objects \"like shoes, gloves, or plush toys\"). 18% of men in a 1980 study reported fetishistic fantasies.\nFetishism to the extent that it becomes a disorder appears to be rare, with less than 1% of general psychiatric patients presenting fetishism as their primary problem.", "tactics to show their sexual desire, they are typically more indirect in nature. On the other hand, it is known masculinity is associated with aggressive behavior in all mammals, and most likely explains at least part of the fact that masculine people are more likely to express their sexual interest. This is known as the Challenge hypothesis.\nVarious studies show different communication strategies with a feminine person refusing a masculine person's sexual interest. Some research, like that of Murnen, show that when feminine people offer refusals, the refusals are verbal and typically direct. When masculine people do not comply with this", "to modesty\", as an antidote to sexual objectification.\nOthers contest feminist claims about the objectification of women. Camille Paglia holds that \"[t]urning people into sex objects is one of the specialties of our species.\" In her view, objectification is closely tied to (and may even be identical with) the highest human faculties toward conceptualization and aesthetics. Individualist feminist Wendy McElroy says, given that 'objectification' of women means to make women into sexual objects; it is meaningless because, 'sexual objects', taken literally, means nothing because inanimate objects do not have sexuality. She continues that women are their bodies as well as", "that women are voluntarily taking actions that justify sexual advances. \"For example, women continue to be blamed if they are raped because of how they are dressed, the assumption that women purportedly lie about being raped remains popular, and certain women, such as married women or women of colour, are still considered 'unrapeable'”. The word slut and the double standard it contains reflects the gender norms and gender biases that are prevalent in a culture in which rape is constantly justified. People from all sects of society contribute to this justification.\nThere have been many movements or \"SlutWalks\" taking", "Clothing fetish Clothing fetishism or garment fetishism is a sexual fetish that revolves around a fixation upon a particular article or type of clothing, a particular fashion or uniform, or a person dressed in such a style.\nThe clinical definition of a sexual fetish would require that a person be fixated on a specific garment to the extent that it exists as a recurrent (or exclusive) stimulus for sexual gratification.\nAn individual with a clothing fetish may be aroused by the sight of a person wearing a particular garment, or by wearing the clothing themselves. The arousal may come from the look", "Culture and menstruation Culture and menstruation is about cultural aspects surrounding how society views menstruation. A menstrual taboo is any social taboo concerned with menstruation. In some societies it involves menstruation being perceived as unclean or embarrassing, inhibiting even the mention of menstruation whether in public (in the media and advertising) or in private (among friends, in the household, or with men). Many traditional religions consider menstruation ritually unclean, although anthropologists point out that the concepts 'sacred' and 'unclean' may be intimately connected.\nDifferent cultures view menstruation in different ways. The basis of many conduct norms and communication about menstruation in", "the fetish object, the therapist might recommend orgasmic reconditioning or covert sensitization to increase arousal to normal stimuli (although the evidence base for these techniques is weak). Epidemiology The prevalence of fetishism is not known with certainty. The majority of fetishists are male. In a 2011 study, 30% of men reported fetishistic fantasies, and 24.5% had engaged in fetishistic acts. Of those reporting fantasies, 45% said the fetish was intensely sexually arousing. In a 2014 study, 26.3% of women and 27.8% of men acknowledged any fantasies about \"having sex with a fetish or non-sexual object\". A content analysis of the", "a central problem historically and sociologically.\nIn 1927, Sigmund Freud published his essay on \"Fetishism\", in which he writes that the meaning and purpose of the fetish turns out, through analysis, to always be the same: \"the fetish is a substitute for the penis...for a particular and quite special penis that had been extremely important in early childhood but had later been lost.\" In refusing to see his mother's lack of penis, the boy disavows (German: Verleugnung, not repression: Verdrängung) what he sees, resulting in both a belief and a non-belief in the woman's phallus. This compromise (produced by the conflict", "persons for sexual purposes. Sexual opportunism is sometimes also defined as the use of sexual favours for selfish purposes quite unrelated to the sexual activity, in which case taking a sexual opportunity is merely the means to achieve a quite different purpose, for example to advance one's career or obtain status or money. This may be accepted or tolerated, or it may be criticized because the concerns of others are not adequately taken into consideration (or because it is contrary to authentic sexual love).\nTo the extent that the feelings, wishes, intentions, purposes, interests or norms of others are not adequately", "Taboos Despite the fact that menstruation is a healthy biological process, it is approached with hesitance and misinformation because of deeply-rooted cultural taboos surrounding menstruation.\nCultural, religious and traditional beliefs — particularly in developing countries — can lead to restrictions that women or girls face during their period. In some societies, women do not wash their bodies, shower or bathe during menstruation. They may not be allowed to use water sources during menstruation. Even if they have access to toilets, they might not use them because of the fear of staining the toilet bowls (in the case of dry toilets or flush toilets", "Underwear fetishism Underwear fetishism is a sexual fetishism relating to undergarments, and refers to preoccupation with the sexual excitement of certain types of underwear, including panties, stockings, pantyhose, bras, or other items. Some people can experience sexual excitement from wearing, while others get their excitement when observing, handling, or smelling the underwear worn by another, or watching somebody putting underwear on or taking it off. Some may steal used underwear to get satisfaction. Not only does this include physical contact with the garment(s), or their wearers, but also includes arousal by printed or electronic image with depictions of underwear.\nUnderwear fetishism" ]
I've been without an internet connection since June 12th. What's going on in the world?
[ "Most major stuff has already been covered but:\n\n*The largest Ebola outbreak ever is going on right now", "For future reference, they still print newspapers and nothing on Reddit is actually noteworthy." ]
[ "to serve the developing world. For instance, in July 2009, an underwater fiber optic cable line plugged East Africa into the broader Internet. The company that provided this new cable was SEACOM, which is 75% owned by Africans. The project was delayed by a month due to increased piracy along the coast. Antarctica Antarctica is the only continent not yet reached by a submarine telecommunications cable. All phone, video, and e-mail traffic must be relayed to the rest of the world via satellite links that have limited availability and capacity. Bases on the continent itself are able to communicate with", "the Web. In 1983, CRC set up the first permanent Canadian governmental connection to the Internet, via an ARPANET connection (the first full international connection to the USENET portion of the then-Internet being the set up in 1981 by Henry Spencer at the University of Toronto). In the 1980s, the CRC funded and led the development of SHARP, which in 1987 became the world's first microwave-powered aircraft to fly. The CRC is responsible for many other firsts that have impacted Canadian telecommunications: in wireless systems; radio fundamentals, e.g., Software Defined Radio; communication networks; photonics and interactive multimedia.\nRecognition of the CRC's", "to the Usenet newsgroup soc.culture.filipino to alert Filipinos overseas that a link had been made. His message read: \n\"As of March 29, 1994 at 1:15 am Philippine time, unfortunately 2 days late due to slight technical difficulties, the Philippines was FINALLY connected to the Internet via SprintLink. The Philippine router, a Cisco 7000 router was attached via the services of PLDT and Sprint communications to SprintLink's router at Stockton Ca. The gateway to the world for the Philippines will be via NASA Ames Research Center. For now, a 64K serial link is the information highway to the rest of the", "the end of 2009 is 90458Mb and number of ports 970557. which is seeing a dramatic increase from the first quarter of 2009 of only 16,995 Mb. 2008 marine cable damage On 30 January 2008 the Internet service in Egypt and the Middle East was affected by a breakage of the two marine cables, FLAG and SMW4, connecting Egypt to the world. TE Data users were not totally disconnected from the Internet, as the company had a third international gateway to the Internet, SMW3. However, they suffered from reduced bandwidth until the issue was resolved. The local National Telecom Authority", "cable. 2016 The Asia-American Gateway cable underwent maintenance again from 22 June 2016 to 28 June 2016, slowing down internet connections between Southeast Asia and North America. \nOn 2 August 2016 the AAG cable snapped again, about 90 km from the South Lantau landing station in Hong Kong. The incident seriously affected the quality of Internet services in Southeast Asia. Repairs were completed on 24 August 2016. 2017 On 8 January 2017 Vietnam’s internet speed slowed following problems with AAG. The disruption was triggered by a problem off the southern town of Vung Tau. \nThe issue was resolved on 26", "connection was - for countries in Southeast Asia - interrupted in 2017 for at least 157 days, or 43% of the year. If only taking into account the last 6 months of 2017, AAG performed even worse with outages for at least 92 days, or more than 50% of the time. 2018 Because of the expansion of Singapore Changi Airport, AAG cables had to be moved. This disruption was announced. The outage started on January 6, 2018 but the cable's capacity was back within a day. However, new faults were detected and a reconfiguration was carried out. The complete restoration", "Sierra Leone.\nIn April 2010 Akhtaruzzaman Manju, president of the Internet Service Providers' Association of Bangladesh, told Xinhua that the country's six cell phone operators and Internet Service Providers have so far provided over 800,000 internet connections. \"We've estimated that nearly 10 million people in the country are using 800,000 internet connections on a shared basis,\" he said, adding the number of internet users in the country is increasing yearly by around 15–16 percent.\nA 2009 study by the Boston Consulting Group found that the number of Internet subscribers in Bangladesh is likely to reach 18.3 million by the year 2020, equivalent", "calls to the U.S. and Europe from the Middle East and South Asia. Over 70 percent of the network in Egypt was down. Although central to India's largest carrier, Bharat Sanchar Nigam Limited, the deputy-director general of that organisation said \"Only 10 to 15 percent of our connectivity with the international gateway faced problems\".\nOn 19 December 2008, the cable was again severed, simultaneously with SEA-ME-WE 4, the FLAG FEA cable, and the GO-1 cable.\nOn 10 January 2013, the cable was again severed, this time 1,126 kilometres from the Tuas Cable Landing Station in Singapore, between repeaters 345 and 346. The", "of date could be accurate. To only list Southern Cross as the only internet cable network here might have been relevant 10 years ago (when only coaxial cables were available), but Australia now has seven cables going out of country. Australia has a very resilient network nowadays.\"\nBill Gorman, sales director of David Brown Ltd., said: \"We make gearboxes for our platinum and gold mines. We have supplied equipment via the US for other countries, but have only once exported directly to the States, for a copper mine seven years ago. I have no idea why we're on the list.\"\nA BAE", "announcements out of the country had been withdrawn, almost completely disconnecting the country from the global Internet, with only a single major provider, Noor Data Networks, remained up. And while Noor continued to operate for several days, its routes started to be withdrawn at 20:46 UTC on 31 January.\nIt was later reported that the five major Egyptian service providers—Telecom Egypt, Vodafone Egypt/Raya, Link Egypt, Etisalat Misr, and Internet Egypt—all went dark one after the other between 22:12 and 22:25 UTC (12:12–12:25 am. Friday 28 January Cairo time). As a result, approximately 93% of all Egyptian networks were unreachable by late afternoon.", "Telecommunications in Norway Telecommunications in Norway are relatively advanced. There are about as many cellular phone subscription as there are inhabitants in the country (5.3 million), while the number of fixed line telephone subscriptions is declining towards 800,000. As of 2006, 79% of the population had access to internet at home, rising to 95% by 2012.\nNorway was the first non-English-speaking country on the net. In 1971 NORSAR (Norwegian Seismic Array) at Kjeller just outside Oslo was connected by satellite to the SDAC (Seismic Data Analysis Center) in Virginia, US as part of ARPANET in order to monitor nuclear test-ban treaties", "NetDay NetDay (1995–2004) was an event established in 1995 that \"called on high-tech companies to commit resources to schools, libraries, and clinics worldwide so that they could connect to the Internet\". It was developed by John Gage (then-chief science officer at Sun Microsystems) and activist Michael Kaufman. They approached Delaine Eastin, California's State Superintendent of Public Instruction, to put together the first event in California. The first official NetDay was held in 1996.\nIn 2005, NetDay merged with Project Tomorrow (tomorrow.org), a California nonprofit involved with math and science education. The organization is continuing to work with schools to improve", "City\", which in fact is at the section off Vung Tau once again. Repairs were scheduled to take place between 28 November and 2 December 2017. However, due to bad weather, repair was delayed twice, first to between December 14-18 and then again to 'sometime' after December 26, because the repair vessel will first tend to another broken internet cable, SEA-ME-WE_3. \nThe November-December outage of AAG cable will be an all-time record, surpassing the almost 7 week long breakdown earlier this year.\n2017 is the most troublesome year for the Asia-America Gateway internet cable, so far. In total the", "in both categories. Both categories showed substantial increases over the previous decade; in 1995 there were only 3.6 million cellular telephone subscribers and around 20 million main-line telephone subscribers. By 2003 there were 42 telephones per 100 population.\nInternet use also has soared in China from about 60,000 Internet users in 1995 to 22.5 million users in 2000; by 2005 the number had reached 103 million. Although this figure is well below the 159 million users in the United States and although fairly low per capita, it was second in the world and on a par with Japan’s 57 million users.\nBy", "was renamed WarnerMedia.\nOn July 10, 2018, AT&T announced that it would acquire cybersecurity startup AlienVault for an undisclosed amount. The acquisition was completed on August 22, 2018. AT&T Long Lines The American Telephone & Telegraph Long Lines wire, cable, and microwave radio relay network provided long-distance services to AT&T and its customers. The connection to other countries from the United States began here. By the 1970s, 95% of distance and 70% of intercity telephone calls in the United States were carried by AT&T.\nBefore utilizing microwave relay and coaxial cables, AT&T used twisted-pair copper wire for long distance service. In", "1989, Australia, Germany, Israel, Italy, Japan, Mexico, the Netherlands, New Zealand, and the UK were connected to the Internet, which had grown to contain more than 160,000 hosts.\nIn 1990, the ARPANET was formally terminated. In 1991 the NSF began to relax its restrictions on commercial use on NSFNET and commercial network providers began to interconnect. The final restrictions on carrying commercial traffic ended on 30 April 1995, when the NSF ended its sponsorship of the NSFNET Backbone Service and the service ended. Today almost all Internet infrastructure in the United States, and large portion in other countries, is provided and", "here. I want you,\" into the telephone, which was heard by his assistant Dr. Watson in San Francisco, for a long distance call of 3,400 miles (5,500 km). Dr. Watson replied, \"It will take me five days to get there now!\" The Alexander Graham Bell call officially initiated AT&T's transcontinental service. The phone call was merely symbolic. Dr. Watson was at 333 Grant Avenue in San Francisco to receive the call, placed by Bell from the Telephone Building at 15 Dey Street in New York City. President Woodrow Wilson and the mayors of both cities were also involved in the call.\nLater,", "September 2019 offers no services to the public.\nAll operators rely on satellite communication for their uplink to the wider internet, which results in slow response times and drives up data prices. At least one project to physically connect Timor-Leste to Indonesia using a submarine fiber optic cable has been greenlit by the Government in 2018, but as of 2019 no progress appears to have been made.\nAs of 2015, 13.4% of the population were connected to the internet with the vast majority of users using cellular internet. According to Timor Telecom about 94% of the population is able to access cellular", "Internet offered another medium for communication. Through the introduction of email in 1993, Sonoma, California could communicate instantaneously with its sister city Kaniv, Ukraine.\nIn 1995, the U.S. House of Representatives passed legislation to eliminate the United States Information Agency (USIA) with vocal support from the U.S. Conference of Mayors International Affairs Committee and Sister City members. The broadcasting functions of the USIA were maintained by the now independent Broadcasting Board of Governors (BBG); all other continuing functions became part of the organizational structure overseen by the purposefully established Under Secretary of State for Public Diplomacy and Public Affairs within the", "the best deal.\"\nCIS' number of users grew, peaking in April 1995 at 3 million worldwide. By this point AOL had over 20 million users in the United States alone, but this was off their peak of 27 million, due to customers leaving for lower-cost offerings. By 1997 the number of users leaving all online services for dialup Internet service providers was reaching a climax. Technology The original 1969 dial-up technology was fairly simple—the local phone number in Cleveland, for example, was a line connected to a time-division multiplexer that connected via a leased line to a matched multiplexer in", "2008 submarine cable disruption 23 January Although it was not reported at the time, there was a cut off of FALCON on 23 January. The FALCON cable system connects several countries in the Persian Gulf and India. 30 January On 30 January 2008, news agencies reported Internet services were widely disrupted in the Middle East and in the Indian subcontinent following damage to the SEA-ME-WE 4 and FLAG Telecom cables in the Mediterranean Sea. The damage to the two systems occurred separately several kilometers apart near Alexandria.\nWhile the respective contributions of the two cable systems to this blackout is", "Dial-up Internet access History In 1979, Tom Truscott and Steve Bellovin, graduates of Duke University, created an early predecessor to dial-up Internet access called the USENET. The USENET was a UNIX based system that used a dial-up connection to transfer data through telephone modems. Dial-up Internet has been around since the 1980s via public providers such as NSFNET-linked universities. The BBC established Internet access via Brunel University in the United Kingdom in 1989. Dial-up was first offered commercially in 1992 by Pipex in the United Kingdom and Sprint in the United States. After the introduction of commercial broadband in the", "hour, and then on November 11, 1994 they changed to 230 francs per month. World-NET's websites were worldnet.fr and worldnet.net.\nOn September 15, 1994, for the first time in France, hundreds of thousands of connection kits offering three hours of free Internet access were distributed in the computer magazines InfoPC and Le Monde Informatique (an IDG group publication). Millions of CDs were subsequently distributed in several French magazines.\nIn October 1994, World-NET had to handle the influx of 1,000 new subscribers every month, which overloaded its equipment. Even so, PC Expert named World-NET the \"best Internet service provider\" that", "nations in providing financial transactions over cellular networks. The Philippine Long Distance Telephone Company commonly known as PLDT is the leading telecommunications provider. It is also the largest company in the country.\nThe National Telecommunications Commission is the agency responsible for the supervision, adjudication and control over all telecommunications services throughout the country. There are approximately 383 AM and 659 FM radio stations and 297 television and 873 cable television stations. On March 29, 1994, the country went live on the Internet via a 64 kbit/s connection from a router serviced by PLDT to a Sprint router in California. Estimates for", "one week has been estimated at between €550 million and €800 million. About 7,500 homes in the departments of Var and Alpes-Maritimes lost internet or phone service on 6–7 November.", "early days of the Internet and network communication. Internet and other communications companies clustered in the Dulles Corridor. By 1993, the Washington area had the largest amount of Internet backbone and the highest concentration of Internet service providers. In 2000, more than half of all Internet traffic flowed along the Dulles Toll Road, and by 2016 70% of the world's internet traffic flowed through Loudoun County. Bill von Meister founded two Virginia companies that played major roles in the commercialization of the Internet: McLean, Virginia based The Source and Control Video Corporation, forerunner of America Online. While short-lived, The Source", "lost the ability to send and receive calls and text messages for several hours. The company confirmed the outage via Twitter. The company stated that approximately five percent of its subscribers had been affected. It claimed that the problem was caused by a system software error.\nOn February 13 and March 25, 2015, T-Mobile suffered LTE outages along the east coast causing users to lose data connections.\nOn May 8, 2018, subscribers throughout Houston, Texas experienced an approximately four-hour interruption in service caused by damage to a fiber-optic cable. Marketing Jamie Lee Curtis was the spokesperson for T-Mobile USA's predecessor, VoiceStream Wireless,", "AMX-1 Information The submarine cable means an investment of 500 million of dollars. It connects six countries (Mexico, Guatemala, Colombia, Dominican Republic, Puerto Rico and Brazil) with United States. The cable has a length of 17,500 kilometers, and ends in Miami, Florida.", "folded in 2010. Internet Internet access in Colombia shows a marked increase during the last few years. As September 2009, the web connections surpasses two million, as compared with an estimated total of 900,000 Internet subscribers by the end of 2005. The current figure equated to 17 million Internet users, plus 3.8 million mobile internet users, or 38.5 percent of the 2009 population, as compared with 4,739,000 Internet users in 2005, or 11.5 percent of the 2005 population (10.9 per 100 inhabitants). Media ownership Media ownership remains concentrated in the hands of wealthy families, large national conglomerates, or groups associated", "AT&T Business Internet AT&T Business Internet (ATTBI) is a provider of Internet access and services.\n\nATTBI provides local access. It is available in 59 countries. Extended access feature allow users to reach 147 additional countries." ]
Why is a mouse more accurate than a joystick on a controller
[ "Because with a computer mouse you move it exactly X distance on the table so the cursor moves Y distance. With a joystick, you essentially 'toggle' the cursors movement in any given direction, for a certain length of time, until the cursor reaches what you need. It's also less accurate because you're dealing with a fixed joystick instead of a mouse that you can move all the way across your desk if you wanted to.\n\nThis is my interpretation of it, anyway", "Because a movement on a joystick applies \"velocity\" but movement on a mouse applies a position change.\n\nThink about it, you move a joystick to the left, it will keep going left even though your hand is not moving anything, just keeping the joystick on the left side. A mouse on the other hand requires movement to apply this change, stopping this movement will stop this movement. This is simply something more natural and understood to humans.", "Mouse moves by pixels. That is using a camera it counts them.\n\nJoysticks move by binary off and on multiplying by sensitivity so the smallest move can never be a single pixel." ]
[ "could roll on virtually any surface. However, most subsequent mechanical mice starting with the steel roller ball mouse have required a mousepad for optimal performance.\nThe mousepad, the most common mouse accessory, appears most commonly in conjunction with mechanical mice, because to roll smoothly the ball requires more friction than common desk surfaces usually provide. So-called \"hard mousepads\" for gamers or optical/laser mice also exist.\nMost optical and laser mice do not require a pad, the notable exception being early optical mice which relied on a grid on the pad to detect movement (e.g. Mouse Systems). Whether to use a hard or", "were \"very much about the mouse and [the] keyboard\". He went further on to state \"Before that, when we did Descent for example, it was perfectly common for people to have joysticks – we sold a lot of copies of Descent. It was around that time [when] the more modern FPS with mouse and keyboard came out, as opposed to just keyboard like Wolfenstein [3D] or something.\".\nSince the late 1990s, analog sticks (or thumbsticks, due to their being controlled by one's thumbs) have become standard on controllers for video game consoles, popularized by Nintendo's Nintendo 64 controller, and have the", "to detect rotation of the ball about two axis, similar to an upside-down mouse: as the user rolls the ball with a thumb, fingers, or palm the pointer on the screen will also move. Tracker balls are commonly used on CAD workstations for ease of use, where there may be no desk space on which to use a mouse. Some are able to clip onto the side of the keyboard and have buttons with the same functionality as mouse buttons. There are also wireless trackballs which offer a wider range of ergonomic positions to the user. Joystick Isotonic joysticks are", "control, the Esc. key, and the F1–F12 keys. Overview The two primary, and most commonly used, devices for players to use when gaming on a computer are the mouse and the keyboard. While both are integral in the interaction of the game, their evolutionary track has not been equal.\nThe mouse, over the years, has had better adaptation and incorporation into gaming than the keyboard has. This could easily be attributed to the fact that the mouse is a much more simplified device. The mouse has had many advances to make it a much more adapted device for gaming. It has", "most popular control system among genre enthusiasts, however, is the joystick. Most fans prefer to use this input method whenever possible, but expense and practicality mean that many are forced to use the keyboard and mouse combination (or gamepad if such is the case). The lack of uptake among the majority of modern gamers has also made joysticks a sort of an anachronism, though some new controller designs and simplification of controls offer the promise that space sims may be playable in their full capacity on gaming consoles at some time in the future. In fact, X3: Reunion, sometimes considered", "buttons, and an internal motor to provide force feedback.\nThere are programmable joysticks that can emulate keyboard input. Generally they have been made to circumvent the lack of joystick support in some computer games, e.g. the Belkin Nostromo SpeedPad n52. There are several programs that emulate keyboard and mouse input with a gamepad such as the free and open-source cross-platform software antimicro, Enjoy2, or proprietary commercial solutions such as JoyToKey, Xpadder, and Pinnacle Game Profiler. Early designs The 1962 video game Spacewar! initially used toggle switches built into the computer readout display to control the game. These switches were awkward and", "been upgraded from a rolling ball to an optical sensor, and the optical sensor has been upgraded to a laser. The results of these progressions have allowed players increased sensitivity and accuracy while in a game environment. The mouse has also been equipped with increasingly more buttons. Starting with two buttons, the mouse can now be found with up to seventeen buttons. Buttons have also become programmable, such that the player can perform a greater variety of actions with their mouse.\nThe keyboard has not seen as much advancement in terms of making it a formidable gaming device. The keyboard is", "For example, the movement of the mouse could provide control of the players viewpoint from the character and the mouse buttons may be used for weapon trigger control. Certain keys on the keyboard would control movement around the virtual scenery and also often add possible additional functions. Games consoles however, use hand held 'control pads' which normally have a number of buttons and joysticks (or 'thumbsticks') which provide the same functions as the mouse and keyboard. Players often have the option to communicate with each other during the game by using microphones and speakers, headsets or by 'instant chat' messages", "using the term when describing the controllers for the Sega Genesis in instruction manuals and other literature. Arcade games, however, have largely continued using joysticks.\nModern consoles, beginning with the Nintendo 64, provide both a D-pad and a compact thumb-operated analog stick; depending on the game, one type of control may be more appropriate than the other. In many cases with games that use a thumbstick, the D-pad is used as a set of extra buttons, all four usually centered on a kind of task, such as giving commands to friendly non-player characters. Even without an analog stick, some", "ultimately the mouse won out because of its speed and convenience. The first mouse, a bulky device (pictured) used two potentiometers perpendicular to each other and connected to wheels: the rotation of each wheel translated into motion along one axis. At the time of the \"Mother of All Demos\", Engelbart's group had been using their second generation, 3-button mouse for about a year.\nOn October 2, 1968, a mouse device named Rollkugel (German for \"rolling ball\") was described as an optional device for its SIG-100 terminal was developed by the German company Telefunken. As the name suggests and unlike Engelbart's mouse,", "mice used a D-subminiature 9-pin connector to send the quadrature-encoded X and Y axis signals directly, plus one pin per mouse button. The mouse was a simple optomechanical device, and the decoding circuitry was all in the main computer.\nThe DE-9 connectors were designed to be electrically compatible with the joysticks popular on numerous 8-bit systems, such as the Commodore 64 and the Atari 2600. Although the ports could be used for both purposes, the signals must be interpreted differently. As a result, plugging a mouse into a joystick port causes the \"joystick\" to continuously move in some", "games, and other applications where multiple functions are mapped to the mouse. Criticism Although the Mighty Mouse can sense both right and left clicks, it is not possible to press both sensors simultaneously. The user must learn to lift the left finger off the sensor surface before attempting a right-mouse click.\nThe scroll ball will eventually become clogged with dirt and require cleaning. While there are methods to clean the ball without dismantling the mouse some users have complained that the Mighty Mouse is difficult to clean because the scroll ball mechanism is hard to take apart. Name Prior to launching", "soft mousepad with an optical mouse is largely a matter of personal preference. One exception occurs when the desk surface creates problems for the optical or laser tracking, for example, a transparent or reflective surface, such as glass. In the marketplace Around 1981, Xerox included mice with its Xerox Star, based on the mouse used in the 1970s on the Alto computer at Xerox PARC. Sun Microsystems, Symbolics, Lisp Machines Inc., and Tektronix also shipped workstations with mice, starting in about 1981. Later, inspired by the Star, Apple Computer released the Apple Lisa, which also used a mouse. However, none", "and so it can be used by CAD software, web browsers, and other applications where multiple functions are mapped to the mouse. Reception The 3D navigation style provided by the mouse was met with praise. Comments have been noted by the press on its innovativeness and functionality. Atomic Magazine highlighted its unique design and stated that it “is very good at providing an alternative way to mouse around pro applications...or even more mainstream apps”. Other publications, including Proclockers, Engadget and Sound on Sound, have praised specific advantages of the mouse, such as improvements in computer navigation via rotational scrolling and", "sales of the game. In NowGamer's interview with Jim Boone, a producer at Volition, he stated that this could have been due to joysticks' being sold poorly because they were \"going out of fashion\" because more modern first-person shooters, such as Quake, were \"very much about the mouse and [the] keyboard\". He went further on to state \"Before that, when we did Descent for example, it was perfectly common for people to have joysticks – we sold a lot of copies of Descent. It was around that time [when] the more modern FPS with mouse and keyboard came out, as", "concentrate on selling standard products at higher prices to smaller OEMs. Assistive technology Specialist joysticks, classed as an assistive technology pointing device, are used to replace the computer mouse for people with fairly severe physical disabilities. Rather than controlling games, these joysticks control the pointer. They are often useful to people with athetoid conditions, such as cerebral palsy, who find them easier to grasp than a standard mouse. Miniature joysticks are available for people with conditions involving muscular weakness such as muscular dystrophy or motor neurone disease as well. They are also used on electric powered wheelchairs for control since", "used on modern video game consoles is the analog stick. Joysticks are also used for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius lawn mowers. Miniature finger-operated joysticks have been adopted as input devices for smaller electronic equipment such as mobile phones. Aviation Joysticks originated as controls for aircraft ailerons and elevators, and are first known to have been used as such on Louis Bleriot's Bleriot VIII aircraft of 1908, in combination with a foot-operated rudder bar for the yaw control surface on the tail. Origins The name \"joystick\" is thought to", " MousePaint was bundled with an Apple Mouse II and interface card for the Apple II. Apple Computer released the mouse and software in May 1984.\nBYTE's reviewer stated in December 1984 that he made far fewer errors when using an Apple Mouse with MousePaint than with a KoalaPad and its software. He found that MousePaint was easier to use and more efficient, and predicted that the mouse would receive more software support than the pad. After EA Budge ported Pinball Construction Set to the Sega Genesis, which was published by Electronic Arts in 1993 as Virtual Pinball. Ten tables can", "handle sticks where the user can freely change the position of the stick, with more or less constant force.\nIsometric joysticks are where the user controls the stick by varying the amount of force they push with, and the position of the stick remains more or less constant. Isometric joysticks are often cited as more difficult to use due to the lack of tactile feedback provided by an actual moving joystick. Pointing stick A pointing stick is a pressure-sensitive small nub used like a joystick. It is usually found on laptops embedded between the G, H, and B keys. It operates", "wired to the same input as the CTRL key on the keyboard, and when it was used it would cause scrolling in BASIC programs to slow down. Due to the way keyboard scanning was handled, holding down the trigger would cause random characters to be generated. As a result, many C64 games required the joystick to be plugged into Control Port 2.\nOn the Atari ST, the two ports were normally configured with Port 0 set to mouse mode and Port 1 to joystick. In joystick mode they operated largely identically to the earlier machines, but in mouse mode the system", "the left thumb).\nGamepads failed to achieve any sort of dominance outside of the home console market, though several PC gamepads have enjoyed popularity, such as the Gravis PC GamePad. Three-dimensional control Though three-dimensional games rose to prominence in the mid-1990s, controllers continued to mostly operate on two-dimensional principles; in order to move with six degrees of freedom, players would have to hold down a button to toggle the axis on which the directional pad operates, rather than being able to control movement along all three axes at once. One of the first gaming consoles, the Fairchild Channel F, did have", "the Lisa Mouse) in 1984, and of the Amiga 1000 and the Atari ST in 1985. Specific uses Other uses of the mouse's input occur commonly in special application-domains. In interactive three-dimensional graphics, the mouse's motion often translates directly into changes in the virtual objects' or camera's orientation. For example, in the first-person shooter genre of games (see below), players usually employ the mouse to control the direction in which the virtual player's \"head\" faces: moving the mouse up will cause the player to look up, revealing the view above the player's head. A related function makes an image of", "a keyboard only, but the team was later inspired by the phallic shape and vibration features of the Wiimote. The team decided that this controller allowed to get a \"dynamic of people looking at each other, not the screen, and also a certain about of physicality\". However, the team does not consider that the Wii version is \"better\" than the other. The keyboard version forces players to be pressed close to each other, making this version more provocative in some aspects.\nThe game was developed in Java, under the development environment Eclipse. The sound aspect operates on the software library FMOD.", "not all have left and right buttons below, possibly making mouse clicks less ergonomic. The touchpads of the X220 double as regular mouse buttons, which is also the case with some newer models (as of December 2013). This can cause problems, such as accidental clicking if too much pressure is exerted during mouse movements.\nOn the occasion of the 20th anniversary of ThinkPad's introduction, David Hill authored and designed a commemorative book about ThinkPad design. Titled ThinkPad Design: Spirit & Essence, the book was revealed at an event held at the MoMA. Reviews and awards ThinkPads are especially popular with", "can also be used as game controllers capturing movements of the body of the player.\nAs technology continues to advance, more can be added onto the controller to give the player a more immersive experience when playing different games. There are some controllers that have presets so that the buttons are mapped a certain way to make playing certain games easier. Along with the presets, a player can sometimes custom map the buttons to better accommodate their play style. On keyboard and mouse, different actions in the game are already preset to keys on the keyboard. Most games allow the player", "not used with Mac OS X, the mouse behaves as a four \"button\" mouse with a vertical and horizontal scroll wheel. There are third-party drivers (XMouse, AppleM) that provide more functions to users of other platforms such as Windows.\nThe Mighty Mouse does not report whether the right and left sensors are activated simultaneously. In fact, it reports a right-click only when there is no finger contact on the left side of the mouse. Thus a right-click requires lifting the finger off the mouse, then right-clicking. This also means that the Mighty Mouse cannot support mouse chording, used by CAD software,", "wood, Bakelite and toggle switches. Although they are often considered to be the first joysticks, Kotok did not accept credit for coinventing them with Saunders. He thought there were similar controllers in use at the time in games such as Tennis for Two and at NASA or another organization. Influence T-Square is a small part of the reason people use today's computers for drafting, architecture, drawing and illustration and engineering. Prior to this revolution and in some places to this day, draftsmen and women used triangles, wood or metal T-squares, pencils and technical pens on film and paper. The beginning", "has only one corresponding command for each application window.\nHolding down buttons while moving the mouse can be awkward and requires some practice, since the downwards action increases friction for the horizontal motion. An optical mouse would be less susceptible to changes in behavior than a ball mouse with increased friction because the sensor does not rely on mechanical contact to sense movement; a touchpad provides no added friction with all its buttons held down with a thumb. However, it was also argued that muscular tension resulting from holding down buttons could be exploited in user interface design as it gives", "resilient material to refrain the pad from sliding on the surface of a table, for instance.\n— Xerox Disclosure Journal, Volume 4, Number 6, November/December 1979\nBy 1982, most users of the Xerox ball mouse were using \"special pads\" to increase the friction of the ball.\nThe first commercial manufacturer of mousepads was Moustrak, founded by Bob McDermand. The company began gaining traction when Apple decided to distribute its mousepads, featuring the Apple logo, to computer stores in the United States. Moustrak signed licensing deals with Disney, Paramount, and LucasFilm, and advertised in magazines including MacWorld. However, by the end of the 1980s, lower", "Mousepad A mousepad is a surface for placing and moving a computer mouse. A mousepad enhances the usability of the mouse compared to using a mouse directly on a table by providing a surface to allow it to measure movement accurately and without jitter. Some mousepads increase ergonomics by providing a padded wrist rest. History During a 1968 presentation by Douglas Engelbart marking the public debut of a mouse, \nEngelbart used a control console designed by Jack Kelley of Herman Miller that included a keyboard and an inset portion used as a support area for the mouse.\nAccording to Kelley \nand" ]
When was the last time in human history it would be more common to see someone walking barefoot than with shoes or sandals?
[ "It was common up until the 1950s in the south for children to go without shoes. It is still somewhat common in regions with lots of creeks.", "Right now, in a whole lot of poorer places.\n\nA good friend of mine didn't have shoes until she was 16 because her family couldn't afford them.", "It depends on where you are in the world. Sandals or barefoot is still very common in most tropical areas year round." ]
[ "(notably repetitive stress injuries) caused by heel striking in padded running shoes.\nThe barefoot movement has prompted some manufacturers to introduce thin-soled and flexible shoes such as traditional moccasins and huaraches for minimalist running. History Throughout most of human history, running was performed while barefoot or in thin-soled shoes such as moccasins. This practice continues today in Kenya and among the Tarahumara people of northern Mexico. Historians believe that the runners of Ancient Greece ran barefoot. According to legend, Pheidippides, the first marathoner, ran from Athens to Sparta in less than 36 hours. After the Battle of Marathon, it is said", "Barefoot skiing History of barefooting Barefoot water skiing originated in Winter Haven, Florida. According to the Water Ski Hall of Fame, and witnesses of the event, 17-year-old A.G. Hancock became the first person ever to barefoot water ski in 1947. That same year, Richard Downing \"Dick\" Pope Jr., was the first person ever to be photographed barefooting, stepping off his skis on a training boom alongside the boat. In 1950, the first barefoot competition was held in Cypress Gardens, with Pope and Mexican competitor Emilio Zamudio as the only two known barefooters in the world at the time.", "of Africa made them out of rawhide. In India they were made from wood. In China and Japan, rice straw was used. The leaves of the sisal plant were used to make twine for sandals in South America while the natives of Mexico used the Yucca plant.\nWhile thong sandals were commonly worn, many people in ancient times, such as the Egyptians, Hindus and Greeks, saw little need for footwear, and most of the time, preferred being barefoot. The Egyptians and Hindus made some use of ornamental footwear, such as a soleless sandal known as a \"Cleopatra\", which did not provide", "Foster Powell Foster Powell (1734–15 April 1793) was the first notable exponent of long distance walking known as pedestrianism and has been called \"the first English athlete of whom we have any record\". Life Powell was baptized in Horsforth in 1734, and moved to London in 1762 where he worked as a lawyer's clerk. In 1764 he began his pedestrian career by wagering that he could walk 50 miles in 7 hours, which he accomplished on the Bath Road. He became a national celebrity, but made very little money from walking, which he treated as a hobby, and died", "with the expedition group \"The Explorer School\". In 2009–2010 he became the first person to walk the entire 700 km of the Egyptian Great Sand Sea, following the route of German explorer Gerhard Rolhfs across the Egyptian Sahara.", "has been described as the world's most accessible sport. History It is thought that human running evolved at least four and a half million years ago out of the ability of the ape-like Australopithecus, an early ancestor of humans, to walk upright on two legs.\nEarly humans most likely developed into endurance runners from the practice of persistence hunting of animals, the activity of following and chasing until a prey is too exhausted to flee, succumbing to \"chase myopathy\" (Sears 2001), and that human features such as the nuchal ligament, abundant sweat glands, the Achilles tendons, big knee joints and muscular", "had received shoes that were too small, so he decided to simply run barefoot; Bikila had trained running barefoot prior to the Olympics. He would go on to defend his Olympic title four years later in Tokyo while wearing shoes and setting a new world record.\nBritish runner Bruce Tulloh competed in many races during the 1960s while barefoot, and won the gold medal in the 1962 European Games 5,000 metre race.\nIn the 1970s, Shivnath Singh, one of India's greatest long distance runners, was known for always running barefoot with only tape on his feet.\nDuring the 1980s, a South African runner,", "and to exercise foot gymnastics, balancing, and climbing. The Barfußpfad (barefoot trail) at Bad Sobernheim in Germany attracts over 100,000 visitors annually and has seen approximately 1 million visitors since its inception in 1999.\nThis concept was first developed in the 19th century by Sebastian Kneipp, one of the founders of the Naturopathic medicine movement. He believed that applying your feet to a range of natural stimuli would have therapeutic benefits. This is related to the ancient practice of reflexology, practiced in China for thousands of years for relaxation and to promote longevity.\nSeoul, South Korea, has 158 barefoot parks, allowing people", "century between the villages of Tuoro/Foresta and Piccilli. Local people attributed them to the Devil, the only being considered capable of walking on lava without burning his feet, but despite this the site was not considered cursed or threatening. In 1986 a writer suggested that the footprints might have been created in historic times by a human. It was not until 2002 that they were first brought to scientific attention by two amateur archaeologists who noticed them and informed archaeologists at the University of Padua.\nA cattle path through the forest formerly crossed the fossil tracks and caused accelerated erosion at", "Dennis Bramble, “Endurance Running and the Evolution of the Genus Homo” proposed that humans evolved to run long distances to scavenge and hunt. His research on running in general, especially barefoot running was popularized in Chris McDougall’s best-selling book Born to Run. Lieberman is an avid marathon runner, often barefoot, which has earned him the nickname The Barefoot Professor.", "to relax in a natural environment. Running Many leisure and competitive runners have been known to run barefoot, including well-known athletes Zola Budd of South Africa and Abebe Bikila of Ethiopia. Todd Ragsdale, of Talent, Oregon, set the world record (pending confirmation by Guinness World Records) for the longest distance run barefoot on June 5, 2010, as part of the Relay for Life fundraiser for the American Cancer Society. He logged 102 miles (164 km), or 413 laps on the South Medford High School track, barefoot. The fastest person to run 100 meters (325 feet) on ice while barefoot is Nico Surings", "Barefoot running Barefoot running, also called \"natural running\", is the act of running without footwear. With the advent of modern footwear, running barefoot has become less common in most parts of the world but is still practiced in parts of Africa and Latin America. In some Western countries, barefoot running has grown in popularity due to perceived health benefits.\nScientific research into the practice of running barefoot has not reached a clear consensus regarding its risks or its benefits. While footwear might provide protection from cuts, bruises, impact and weather, proponents argue that running barefoot reduces the risk of chronic injuries", "runners to go barefoot. However, the American Podiatric Medical Association has stated that there is not enough evidence to support such claims and has urged would-be barefoot runners to consult a podiatrist before doing so. The American Diabetes Association has urged diabetics and other people with reduced sensation in their feet not to run barefoot, citing an increased likelihood of foot injury. One study showed a link to early bone damage in new barefoot runners.\nThe structure of the human foot and lower leg is very efficient at absorbing the shock of landing and turning the energy of the fall", "on the health benefits of walking, both during the walk and afterwards.\nOver the next few decades, Weston continued his professional walking career. While he was sometimes beaten in indoor multiday races, he held numerous records for long-distance endurance events. In 1869 he walked 1058 miles (1703 km) through snow-covered New England in 30 days. In 1871, he walked backwards for 200 miles around St. Louis, Missouri in 41 hours.\nWeston spent 8 years touring Europe, starting in 1876 in England where he challenged England's racewalking champion to a 24-hour, 115 mile ultramarathon. The Englishman quit 14 hours and 65.6 miles into the", "people who have walked across the country, who have completed the walk as either a personal challenge or to raise funds and awareness for charity. Imperial Trans-Antarctic Expedition The Imperial Trans-Antarctic Expedition was an attempt from 1914 to 1917, to march across Antarctica, and was the last major expedition of the Heroic Age of Antarctic Exploration. Trans-Europe Foot Race In the Trans-Europe Foot Race, participants cross Europe on foot, although they are mainly running, not walking. It is a multiday race, and in 2003 crossed Europe from Lisbon to Moscow, with 21 finishers (not counting a wheelchair user). In 2009,", "center he operates, Crow's Path. He ran 100 km barefoot on UVM's track in 7 hours 13 minutes and 25 seconds. In December 2017, O'Connor ran 100 miles in 14 hours 22 minutes. Health and medical implications Since the latter half of the 20th century, there has been scientific and medical interest in the benefits and harm involved in barefoot running. The 1970s, in particular, saw a resurgent interest in jogging in western countries and modern running shoes were developed and marketed.\n Since then, running shoes have been blamed for the increased incidence of running injuries and this has prompted some", "By November 2010, the organization claimed 1,345 members, nearly double the 680 members it had when it was founded.\nOne barefoot runner, Rick Roeber, has been running barefoot since 2003, and has run more than 50 marathons, 2 ultra-marathons of 40 miles, and over 17,000 miles (27,000 km) all barefoot. Other prominent barefoot runners include Ken Bob Saxton, known as the \"godfather of barefoot running\", and Todd Byers, a barefoot marathon runner from Seattle who has run over 100 marathons barefoot. On 8 December 2006, Nico Surings of Antwerp, Belgium, became the fastest person to run 100 meters (330 feet) on ice", "Chaco (footwear) History Mark Paigen was a white water rafting and fly fishing guide, and in 1989 he decided to create an outdoor sandal that allowed his feet to dry in the sun so he wouldn't end his days with wrinkled feet. His goal was to produce a sandal that also provided support to the foot. He created a pair of custom sandals that included a continuous pull-through strap of synthetic material and a buckle instead of velcro. The first pair of shoes was sold to a client who accompanied Paigen on a 3-day float. Paigen traced that person's feet", "was an experiment that involved five groups of runners from Kenya and the United States. The two American groups were adult athletes who had run with shoes since childhood, and those who habitually ran barefoot or with minimal footwear such as Vibram FiveFingers (mentioned by name in the study). The three Kenyan groups were adults who had never run in shoes until late adolescence, as well as two teenage groups: those that habitually wore shoes and those that always ran barefoot. The runners were instructed to run over a force plate that was embedded in a 25-meter track, and were", "Karl Bushby Karl Bushby (born 30 March 1969) is a British ex-paratrooper, walking adventurer and author, currently attempting to be the first person to completely walk an unbroken path around the world. Bushby's trek is known as the Goliath Expedition. Early life Bushby was born 30 March 1969 in Hull, England. He attended a local comprehensive school and joined the British Army at the age of 16. Bushby served with the 3rd Battalion The Parachute Regiment for 11 years. Goliath Expedition The Goliath Expedition is Bushby's attempt to walk around the world \"with unbroken footsteps\", from Punta Arenas, Chile, to", "World Records for both the Fastest 100 km Barefoot and the Longest Distance Run Barefoot in 24 Hours, as part of the Sri Chinmoy Sydney 24 Hour Race. He logged 166.444 km (103.424 mi), or 416 laps on the Blacktown International Sportspark track, barefoot. Later this record was surpassed by several runners, most recently Andrew Snope of Los Angeles, CA who ran 232.72 km (146.6 miles) on December 8, 2018 at the Desert Solstice Track Invitational 24 hour race in Phoenix, Arizona. On August 13, 2017, barefoot runner Teage O'Connor broke 100 km record as part of a fundraiser for the environmental education", "over 24 hours. In 1909, he walked 4,000 miles, from New York to San Francisco, in 100 days.\nHis last great journey was in 1913, when he walked 1546 miles (2488 km) from New York to Minneapolis in 51 days.\nWeston spent most of the remainder of his life urging others to take up walking for exercise and competition. He warned that automobiles were making people lazy and sedentary. Death Weston was severely injured when he was struck by a New York City taxicab in 1927, and never walked again. He died in his sleep two years later. Legacy His life story has", "small chapel. From ancient times pilgrims have climbed the mountain barefoot, as an act of penance, a practice that still continues today. \nSome pilgrims carry out 'rounding rituals', in which they pray while walking sunwise around features on the mountain. In medieval times, pilgrims carried stones as an act of penance, or to represent a prayer intention. The stones were carried to the cairn on top of the mountain, or to the Cairn on the \"saddle\" of the mountain, which marks the unofficial \"half-way\" point at the base of the summit. This practice of carrying stones or rocks on a", "while barefoot, completing the task in 17.35 seconds. And on 12 December 2010, the Barefoot Runners of India Foundation (BRIF) organised a 21 km (13 mi) barefoot half-marathon at Kharghar near the Indian city of Mumbai. The run had 306 participants.\nOn 1 April 2012, runner Rae Heim embarked on a 3,000-plus mile barefoot run from Boston, Massachusetts, finishing on November 14 in Manhattan Beach, California. She raised money for a Tennessee-based organization, Soles4Souls, who delivered one pair of shoes to needy children for each dollar raised by Heim. And on 23 June 2012, Robert Knowles, of Brisbane, Australia, set two Guinness", "that it was probably the first time a cyclist had done it. The pass is 10,976 feet high and Stallard made it in less than 15 hours, sometimes through deep snow.\nHe also walked over Mount Whitney, at 14,496 feet, in the US, but came close to dying after running out of water while walking down into the Grand Canyon and back out again along mule tracks. He also crossed the Sierra Nevada in four days of 1973.\nHe travelled 25,000 miles across America by Greyhound bus and organised more than 100 coach trips for fellow walking enthusiasts.\nHis life ended riddled with", "the first African woman to win the New York City Marathon in 1994, winning again in 1998.\nIn the early 21st century, barefoot running has gained a small yet significant following on the fringe of the larger running community. Organizers of the 2010 New York City Marathon saw an increase in the number of barefoot runners participating in the event. The practice saw a surge in popularity after the 2009 publication of Christopher McDougall's book, Born to Run, promoting the practice. In the United States, the Barefoot Runners Society was founded in November 2009 as a national club for unshod runners.", "his own boots, and from that time he began to go barefoot through the snow.\nIrenarchus was a mystic and visionary. After his death many physical, psychological, and spiritual healings were attributed to the touching of his relics. He is commemorated 13 January in the Eastern Orthodox Church.\nIrenarchus was a companion of John the Hairy.", "Robert Barclay Allardice Robert Barclay Allardice of Ury (25 August 1779, Stonehaven, Kincardineshire – 8 May 1854), generally known as Captain Barclay, was a notable Scottish walker of the early 19th century, known as the celebrated pedestrian. His most famous feat was the walking of 1000 miles in 1000 hours for 1000 guineas in 1809. He is considered the father of the 19th century sport of pedestrianism, a precursor to racewalking.\nHe should not be confused with his father, who had assumed the name Robert Barclay Allardice, who undertook the first redevelopment of the town of Stonehaven. Family Robert Barclay Allardice was", "Rémy Bricka Rémy Bricka (born April 10, 1949 in Niederbronn-les-Bains, Bas-Rhin) is a French musician, one-man band, and singer. He became the first person to walk across the Atlantic Ocean, in 1988, using floating skis to walk on water.\nHis most successful album is La Vie en couleur, and in 1977 that song of his became a number five hit in France. The single Elle dit bleu elle dit rose sold 250,000 copies.\nAlong with the French versions, he released German versions of Petite fille du roi (Lakritz und Pfefferminz) and Chanter la vie (Freunde zu haben). In May 2008, Bricka appeared", "fact walk on four legs, the front pair not being adapted for walking, so, Wilkins concludes, Aristotle was correct. Translations The Arabic translation comprises treatises 1–10 of the Kitāb al-Hayawān (The Book of Animals). It was known to the Arab philosopher Al-Kindī (d. 850) and commented on by Avicenna among others. It was in turn translated into Latin, along with Ibn Rushd (Averroes)'s commentary on it, by Michael Scot in the early 13th century.\nEnglish translations were made by Richard Cresswell in 1862 and by the zoologist D'Arcy Wentworth Thompson in 1910.\nA French translation was made by Jules Barthélemy-Saint-Hilaire in 1883." ]
Why do some drinks seem to pass right through you whereas plain water is retained?
[ "The sugar and electrolytes in Gatorade and other sports drinks actually increase how much water you absorb into your blood stream. This can be perceived as too much fluid and your body will try to get rid of it if you aren't actually dehydrated. Normal water, on the other hand, lacks the sugar and electrolytes that promote water absorption so it stays around in your gut longer." ]
[ "diameter in its middle.\nAlcohols such as ethanol are often used rather than water. Alcohols have low viscosity and surface tension, which allows the bubble to travel the tube quickly and settle accurately with minimal interference from the glass surface. Alcohols also have a much wider liquid temperature range, and won't break the vial as water could due to ice expansion. A colorant such as fluorescein, typically yellow or green, may be added to increase the visibility of the bubble. \nA variant of the linear spirit level is the bull's eye level: a circular, flat-bottomed device with the liquid under a", "The inclusion of some sodium in fluid replacement drinks has some theoretical benefits and poses little or no risk, so long as these fluids are hypotonic (since the mainstay of dehydration prevention is the replacement of free water losses).\nThe consumption of overly sugary and/or salty foods can cause dehydration. Treatment The treatment for minor dehydration that is often considered the most effective is drinking water and stopping fluid loss. Plain water restores only the volume of the blood plasma, inhibiting the thirst mechanism before solute levels can be replenished. Solid foods can contribute to fluid loss from vomiting and diarrhea.", "against water, which is required especially for storage of beverages and food.", "more in order to look into the future.\nWater too would seem to be an excellent metaphor between the liquid word (the visible) and vapour (the invisible). So would the wind when you don’t even notice it rustling the leaves or conversely, when nothing seems to move, when it comes and sweeps across your face like a ray of light. Or quite differently, money now that the banking rules have disappeared and that monetary value has become more and more immaterial, if not totally virtual and transvisible\nThis is why it is so difficult to explain how quick the passage is between", "the total volume of the drink in many countries and localities if the drink is to be considered non-alcoholic. Fruit punch, tea (even kombucha), and other such non-alcoholic drinks are technically soft drinks by this definition, but are not generally referred to as such. Unsweetened sparkling water may be consumed as an alternative to soft drinks.\nSoft drinks may be served chilled, over ice cubes, or at room temperature, especially soda. They are available in many container formats, including cans, glass bottles, and plastic bottles. Containers come in a variety of sizes, ranging from small bottles to large multi-liter containers. Soft", "and some chemicals tend to \"hang out\" longer. A valid analogy is to imagine a busy street with people walking in the same direction past great places to eat. The hungriest people will tend to stop right away. The people that were pretty full will make it far down the street. Now imagine flooding the whole town with water and everyone runs out where you can collect them according to how hungry they were. In technical terms the liquid flush is called the desorbent.\nThis type of separation was first commonly used in the laboratory to", "to transport water more than 100 m upward. Water as a solvent Water is an excellent solvent due to its high dielectric constant. Substances that mix well and dissolve in water are known as hydrophilic (\"water-loving\") substances, while those that do not mix well with water are known as hydrophobic (\"water-fearing\") substances. The ability of a substance to dissolve in water is determined by whether or not the substance can match or better the strong attractive forces that water molecules generate between other water molecules. If a substance has properties that do not allow it to overcome these strong intermolecular", "can be mixed with certain other drinks in order to dilute any unpleasant taste, being careful that the mixture will not destroy the active substances.\nDepending on the quality of the extraction, the remaining solid matter may have some residual active substances. It can be consumed (being fully hydrated), used in another batch, or discarded.", "Bottled water is another example of a highly packaged, wasteful food product. It is estimated that Americans throw away 40 million plastic water bottles every day, and bottled water is often shipped trans-continentally. Carbonated water must be chilled and kept under pressure during storage and transport so as to keep the carbon dioxide dissolved. This factor contributes greater energy usage for products shipped longer distances.", "it matches the shape of any container. Water can not be broken and is able to adjust to pressure and work around it. The lesson, according to Lee, is to be flexible and adaptable to different people in different situations. Fourth, water can be very clear and transparent. Being clear shows others that you are trustworthy, as you have nothing to hide. Gentle and persistent force will complete the task overtime, rather than forcing a task and creating more problems. In other words, human beings should be honest and transparent with others. Finally, water can be very soft and gentle", "by the addition of aromatic ingredients such as essential oils. Carbonated water is often consumed mixed with fruit juice to make sparkling punches or other cocktails, or infused with flavor by the addition of cut-up fresh fruit or mint leaves. Alcoholic beverages Carbonated water is a diluent mixed with alcoholic beverages where it is used to top-off the drink and provide a degree of 'fizz'.\nAdding soda water to 'short' drinks such as spirits dilutes them and makes them 'long' not to be confused with long drinks such as those made with vermouth. Carbonated water also works well in short drinks", "tricks, the original \"any drink\" where a single container can pour multiple drinks, and the \"endless pour\" in which a seemingly large or continuous amount of liquid is poured from a container that is too small to hold it. Any drink The original method from Hocus Pocus Junior was a single large barrel that is modified with internal baffles to create three sections. A single spigot on one of the flat ends of the barrel is extended with three pipes, one leading into each of the different partitions. The flow is controlled through a bunghole on the top that is", "and some bitters. As a consumer product, it is almost always mixed with other beverages to create drinks like alcoholic punch or Jello shots or is sometimes added to cocktails in place of vodka or rum. It is also used to make homemade liqueurs, such as limoncello or cassis, and in cooking because its high concentration of alcohol acts as a solvent to extract flavors. Rectified spirits are also used for medicinal tinctures and as a household solvent. It is sometimes consumed undiluted; however because the alcohol is very high proof, over consumption can cause alcohol poisoning more quickly than", "pull on the surrounding fluid more strongly than a region with a higher alcohol concentration. The result is that the liquid tends to flow away from regions with higher alcohol concentration. This can be easily and strikingly demonstrated by spreading a thin film of water on a smooth surface and then allowing a drop of alcohol to fall on the center of the film. The liquid will rush out of the region where the drop of alcohol fell.\nWine is mostly a mixture of alcohol and water, with dissolved sugars, acids, colourants and flavourants. Where the surface of the", "As such, the food must be light, well packaged, fast to serve and require minimal cleaning up. (Foods that tend to leave crumbs, for example, are ill-suited for space.) Finally, foods require a minimum of energy expenditure throughout their use; they must store well, open easily and leave little waste behind.\nCarbonated drinks have been tried in space, but are not favored due to changes in belching caused by microgravity; without gravity to separate the liquid and gas in the stomach, burping results in a kind of vomiting called \"wet burping\". Coca-Cola and Pepsi were first carried on STS-51-F in", "drinks are made primarily for visual enjoyment rather than taste. They are sipped, sometimes through a silver straw, one liqueur at a time. The drink must be made and handled carefully to avoid mixing; however, some layered drinks, such as shooters, are generally drunk quickly. Preparation The layers must be poured very gently to avoid mixing. They can be poured over the back of a spoon or down a glass rod. Non-alcoholic Latte macchiatos may be prepared as layered drinks.", "are miscible whereas water and gasoline are immiscible. In some cases a mixture of otherwise immiscible liquids can be stabilized to form an emulsion, where one liquid is dispersed throughout the other as microscopic droplets. Usually this requires the presence of a surfactant in order to stabilize the droplets. A familiar example of an emulsion is mayonnaise, which consists of a mixture of water and oil that is stabilized by lecithin, a substance found in egg yolks. Microscopic description The molecules which compose liquids are disordered and strongly interacting,\nwhich makes liquids difficult to describe rigorously at the molecular level. This", "soluble liquids, and their solutions if the partial pressure is replaced by the solubility of the solid (or a second liquid) at the given radius, , and by the solubility at a plane surface. Hence small particles (like small droplets) are more soluble than larger ones.\nThese results led to the problem of how new phases can ever arise from old ones. For example, if a container filled with water vapour at slightly below the saturation pressure is suddenly cooled, perhaps by adiabatic expansion, as in a cloud chamber, the vapour may become supersaturated with respect to liquid water.", "Drinking Drinking is the act of ingesting water or other liquids into the body through the mouth. Water is required for many physiological processes. Both excessive and inadequate water intake are associated with health problems. In humans When a liquid enters a human mouth, the swallowing process is completed by peristalsis which delivers the liquid to the stomach; much of the activity is abetted by gravity. The liquid may be poured from the hands or drinkware may be used as vessels. Drinking can also be performed by acts of inhalation, typically when imbibing hot liquids or drinking from a", "of the designers who worked on porting it to America, after there were complaints about it being hard to drink from. These bendable straws make it easier for children to drink and generally results in less of a mess, and the bending nature of the straw helps it not fall into the box. However, there are some juice boxes available for purchase that are equipped with a pull tab; this variation of the juice box is ideal for larger portions that are not consumed in one sitting, because the tab is resealable.", "least the 1850s, for automatic siphon mechanisms that attempt to overcome these problems using various pneumatic and hydrodynamic principles. Applications and terminology When certain liquids needs to be purified, siphoning can help prevent either the bottom (dregs) or the top (foam and floaties) from being transferred out of one container into a new container. Siphoning is thus useful in the fermentation of wine and beer for this reason, since it can keep unwanted impurities out of the new container.\nSelf-constructed siphons, made of pipes or tubes, can be used to evacuate water from cellars after floodings. Between the flooded cellar and", "a liquid can completely dissolve in another liquid the two liquids are miscible. Two substances that can never mix to form a solution are said to be immiscible.\nAll solutions have a positive entropy of mixing. The interactions between different molecules or ions may be energetically favored or not. If interactions are unfavorable, then the free energy decreases with increasing solute concentration. At some point the energy loss outweighs the entropy gain, and no more solute particles can be dissolved; the solution is said to be saturated. However, the point at which a solution can become saturated can change significantly with", "counts and a \"half-jigger\" 3 counts. This system is not perfect because liquids of different viscosities will pour at different rates through the same spout, but it does allow consistent pours from drink to drink for a consistent result from each bartender, while being much faster than using a thimble measure or similar spirit measure.", "means the same. If two identical volumes of fluids are compared, the denser one weighs more than the lighter one. Floating Liqueurs in practice Floating only works if the denser liquor is poured into the glass first. If the lighter one is poured in first, the denser one falls through to the bottom of the glass, which creates a lot of unwanted turbulence. Densities of common cocktail ingredients can be looked up online, or one uses the following rule of thumb. Sweet liqueurs with low proof are the heaviest, and dry liqueurs with high proof the lightest.\nBegin by pouring the", "prepared with different ingredients in different towns and cities, meaning that the alcohol content is highly variable. However, a common denominator is the presence of Prosecco and sparkling water, with the remaining being made up from a great variety of alcoholic drinks, sometimes mixed, but with an unwritten rule to preserve the red/orange color of the cocktail. Finally, a slice of lemon, orange or an olive and a few ice cubes are added.", "other aged liquor are most often served neat, while lower-quality whisky is usually served with a mixer or on the rocks. Vodka can be stored as a liquid well below the freezing point of water because of its high proof and low particulate content, and cocktails made with sub-freezing vodka are sometimes requested to minimize the amount of added water from melted ice during shaking. Well and top-shelf Drinks establishments will often have a lower-priced category of drinks, known as \"well drinks\" or \"rail drinks\", and a higher-priced category known as \"top-shelf\" or \"call\" drinks, and will use upselling by", "is a consequence of the fact that alcohol has a lower surface tension and higher volatility than water. The water/alcohol solution rises up the surface of the glass due to capillary action. Alcohol evaporates from the film leaving behind liquid with a higher surface tension (more water, less alcohol). This region with a lower concentration of alcohol (greater surface tension) pulls on the surrounding fluid more strongly than the regions with a higher alcohol concentration (lower in the glass). The result is the liquid is pulled up until its own weight exceeds the force of the effect, and the liquid", "to break down the food. The alcohol cannot be absorbed through the stomach, thus cannot be absorbed until the sphincter is opened and the consumed alcohol can flow to the small intestine. Carbonated beverages Alcohol in carbonated beverages is absorbed faster than alcohol in non-carbonated drinks. Stress Being under stress causes alcohol to metabolize faster. Retrograde extrapolation Retrograde extrapolation is the mathematical process by which someone's blood alcohol concentration at the time of driving is estimated by projecting backwards from a later chemical test. This involves estimating the absorption and elimination of alcohol in the interim between driving and", "not a liquid, because it may support shear stresses and therefore may display an angle of repose.", "a carbonated drink bottle with the lid on. If a person moves to a higher ambient pressure, then the gas inhaled is at a higher pressure, so more of it dissolves in the blood and diffuses into body tissues (Henry's and Fick's gas laws). If they slowly move back to a lower pressure, then the extra gas comes out slowly until they are back to their normal amount of dissolved gas. But if they move quickly to a lower ambient pressure, then the gas comes out of our blood and tissues violently, in large bubbles, in the same way that" ]
How does a disease make a comeback like Ebola or the Bubonic plague have recently?
[ "Ebola has no cure, or even a real treatment. It never really went away. It's just that humans aren't commonly exposed to it (it probably normally lives in bats), and when they are it tends to kill quickly enough that it burns itself out. So you see a series of fairly quick and nasty outbreaks in the areas in which infected bat populations come in contact with humans, in west and central Africa. \n\nPlague is different, in that it's curable with antibiotics. It lives in various rodents, and occasionally breaks out because it too has never really gone away. If it happens in a richer country, it's usually dealt with pretty easily. Isolated cases pop up in the US and Canada now and again, incidentally.", "These diseases exist in natural reservoirs that humans occasionally come in contact with. Their spread can be aided by poverty or poor infrastructure, areas where easy access to medical care is lacking, or medical standards or provisions are insufficient to deal with the disease. \n\nI'm not aware of a particular threat of the bubonic plague returning as a major 'world changing' threat, it is treatable by several forms of antibiotics. Of course, a region where these are not readily available or affordable would be at higher risk." ]
[ "the World health organization stated that there was a \"moderate\" chance of re-occurrence. Malagasy Prime Minister Olivier Mahafaly Solonandrasana had declared the crisis over on 23 November 2017. August The outbreak began in August 2017 with the death from pneumonic plague of a 31-year-old man who had been traveling in a crowded minibus toward the capital city of Antananarivo in the central highlands. The outbreak expanded rapidly, transmitted person-to-person in the pneumonic form of the disease, which accounted for more than 60 percent of cases. Scientists discovered three new strains of Y. pestis in Madagascar in 2017. Additionally, one", "time to time. In the case of varicella zoster virus, after an initial acute infection (chickenpox) the virus lies dormant until reactivated as herpes zoster.\nMore serious ramifications of a latent infection could be the possibility of transforming the cell, and forcing the cell into uncontrolled cell division. This is a result of the random insertion of the viral genome into the host's own gene and expression of host cellular growth factors for the benefit of the virus. In a notable event, this actually happened during gene therapy through the use of retroviral vectors at the Necker Hospital in", "after they start. He sees globalization and global warming as contributing factors, as they have upset the ecological niches of bats, which he feels are the most likely viral reservoirs. The current outbreak, in his opinion, represents a \"perfect storm\" for a disease such as Ebola, having erupted in poor countries with meager medical care and where governments have little control over their populations.\nLobel adds that besides Ebola, there are other \"bad\" viruses out there, which the developed world prefers to ignore so long as they aren't affected. This has resulted in little research into other infectious diseases, with the", "6 November, the CDC indicated that the current outbreak in the east region of the DRC may not be containable due to several factors. This would be the first time since 1976 that an outbreak has not been able to be curbed. Due to various situations surrounding the current EVD outbreak, WHO indicated on 13 November, that the viral outbreak would last at least six months.\nOn 23 November, it was reported that due to a steady increase in cases, it is expected that the EVD outbreak in DRC will overtake the Uganda 2000 outbreak of 425 total cases, to become", "natural resistance to the infection and it is only when viruses become well-adapted to new host that their virulence decreases. Some zoonotic infections are often \"dead ends\", in that after the initial outbreak the rate of subsequent infections subsides because the viruses are not efficient at spreading from person to person.\nThe beginning of the 21st century saw an increase in the global awareness of devastating epidemics in developing countries, which, in previous decades had passed relatively unnoticed by the international health community. Beneficial viruses Sir Peter Medawar (1915–1987) described a virus as \"a piece of bad news wrapped", "virus is one of several viruses identified by WHO as a likely cause of a future epidemic in a new plan developed after the Ebola epidemic for urgent research and development before and during an epidemic toward new diagnostic tests, vaccines and medicines.\nThe outbreak was originally mistaken for Japanese encephalitis, but physicians in the area noted that persons who had been vaccinated against Japanese encephalitis were not protected in the epidemic, and the number of cases among adults was unusual. Despite the fact that these observations were recorded in the first month of the outbreak, the Ministry of Health failed", "infections, treating those already infected, protecting healthcare providers, and ultimately bringing this epidemic to an end.\"", "behavior and other factors may trigger outbreaks among animal populations.\nEvidence indicates that both domestic dogs and pigs can also be infected with EBOV. Dogs do not appear to develop symptoms when they carry the virus, and pigs appear to be able to transmit the virus to at least some primates. Although some dogs in an area in which a human outbreak occurred had antibodies to EBOV, it is unclear whether they played a role in spreading the disease to people. Reservoir The natural reservoir for Ebola has yet to be confirmed; however, bats are considered to be the most likely", "the Asfarviridae family. The virus causes a lethal haemorraghic disease in domestic pigs. Some strains can cause death of animals within as little as a week after infection. In other species, the virus causes no obvious disease. ASFV is endemic to sub-Saharan Africa and exists in the wild through a cycle of infection between ticks and wild pigs, bushpigs and warthogs. Retroviruses Retroviruses are established pathogens of veterinary importance. They are generally a cause of cancer or immune deficiency. Flaviviruses Flaviviruses constitute a family of linear, single-stranded RNA(+) viruses. Flaviviruses include the West Nile virus, dengue virus, Tick-borne Encephalitis", "Post-Ebola virus syndrome Cause Although there is some progress that may potentially help Ebola survivors, adequate funding and further research is required to help provide more answers about post-Ebola syndrome. Studies from previous outbreaks reveal that the virus is able to survive for months after recovery in some parts of the body such as the eyes and testes, where the immune system cannot reach. It is not known if the neurologic symptoms seen in survivors are a direct result of the virus or, instead, triggered by the immune system’s response to the infection. It is known that", "Special Pathogens Branch of the Centers for Disease Control in Atlanta, USA, provided evidence that the causative agent of the disease is a virus from the family Arenaviridae, which ultimately resulted in the deaths of four out of the five infected in Zambia and South Africa during the outbreak which began in September 2008.\nArenavirus has also recently pinpointed as the cause of death of three donor organ recipients in Australia who contracted the virus after receiving kidney and a liver donations from a single infected organ donor in late 2006. All three died in the first week of 2007.\nWHO and", "When it replicates, it causes the nucleus to increase in size and eventually burst. After, the virion starts to form and spread. Asfarviridae A member of the family Asfarviridae is a known as an asfarvirus. This virus is the cause of African swine fever. Some of the symptoms for this flu include fever, high pulse, fast breathing, and it can cause death. These symptoms can be similar to those from hog cholera, the difference is that the African swine flu can not be cured. There is no vaccine developed to fight this virus. Iridoviridae The Iridoviridae have linear double stranded", "blood, retrosternal abdominal pain, prostration with 'heavy' articulations, and rapid evolution death after a mean of three days.\"\nThe virus responsible for the initial outbreak, first thought to be Marburg virus, was later identified as a new type of virus related to marburgviruses. Virus strain samples isolated from both outbreaks were named \"Ebola virus\" after the Ebola River, near the first-identified viral outbreak site in Zaire. Reports conflict about who initially coined the name: either Karl Johnson of the American CDC team or Belgian researchers. Subsequently, a number of other cases were reported, almost all centered on the Yambuku mission hospital", "7 people, killing 4, and the second affected 24, killing 17.\nOn 17 August 2012, the Ministry of Health of the DRC reported an outbreak of the Ebola-Bundibugyo variant in the eastern region. Other than its discovery in 2007, this was the only time that this variant has been identified as responsible for an outbreak. The WHO revealed that the virus had sickened 57 people and killed 29. The probable cause of the outbreak was tainted bush meat hunted by local villagers around the towns of Isiro and Viadana.\nIn 2014, an outbreak occurred in the DRC. Genome-sequencing showed that this outbreak", "from a single hunter/cook occupationally infected with SIVcpz to several thousand patients treated with arsenicals or other drugs, a threshold beyond which sexual transmission could prosper.\" They do not suggest specifically serial passage as the mechanism of adaptation.\nAccording to Pépin's 2011 book, The Origins of AIDS, the virus can be traced to a central African bush hunter in 1921, with colonial medical campaigns using improperly sterilized syringe and needles playing a key role in enabling a future epidemic. Pépin concludes that AIDS spread silently in Africa for decades, fueled by urbanization and prostitution since the initial cross-species infection. Pépin", "of health workers to trace the origins and strains of the virus.\nWhile WHO terminated the Public Health Emergency of International Concern (PHEIC) on 29 March 2016, the Ebola Situation Report released on 30 March confirmed 5 more cases in the preceding two weeks, with viral sequencing relating one of the cases to the November 2014 outbreak.\nThe epidemic also affected the treatment of other diseases in Guinea. There was a decline in healthcare visits by the population due to fear of being infected and mistrust in the health care system, and a decrease in the system's ability to provide routine health", "outbreak eventually infected 264 individuals and killed 187.\nOn 30 November 2007, the Uganda Ministry of Health confirmed an outbreak of Ebola in the Bundibugyo District in Western Uganda. After confirming samples tested by the United States National Reference Laboratories and the Centers for Disease Control, the World Health Organization (WHO) confirmed the presence of a new species of genus Ebolavirus, which was tentatively named Bundibugyo. The WHO reported 149 cases of this new strain and 37 of those led to deaths.\nThe WHO confirmed two small outbreaks in Uganda in 2012, both caused by the Sudan variant. The first outbreak affected", "including the US. A national eradication program was started in the US in 1962 and resulted in eradication in the US by 1976. Reintroduction of CSF into the US would be devastating. Contagious bovine pleuropneumonia Contagious bovine pleuropneumonia Contagious bovine pleuropneumonia (CBPP) is one of the most important infectious diseases of cattle in Africa. CBPP is caused by Mycoplasma mycoides mycoides small colony, and is highly contagious with losses up to 80% in naive herds possible, although mortality rates greater than 50% are uncommon. Cattle (both Bos taurus and Bos indicus) are the primary hosts,", "to neighbouring villages. By March 2014 the outbreak was severe enough to raise the concern of local health officials who reported it to the Guinean Ministry of Health. By the middle of the year the epidemic had spread to Liberia and Sierra Leone. As of June 2015, the World Health Organization reported over 27,000 cases of the disease, which had resulted in more than 11,000 deaths.\nThe natural source of Ebola virus is probably bats. Marburg viruses are transmitted to humans by monkeys, and Lassa fever by rats (Mastomys natalensis). Zoonotic infections can be severe because humans often have no", "plants can carry the disease on seed as well, making it difficult to control. BFB is a unique disease because its late discovery gives scientists an opportunity to track the outbreak from the start. Like all plant diseases, the BFB epidemic is related to the interactions of a triangle of disease components (Pathogen, Host, and Environment). Therefore, BFB provides an opportunity to better understand how to track these interactions in real time while this disease spreads.", "dozens of others. The main causes of the large outbreak include students being unaware of being infected, and other students who knowingly ignored quarantine restrictions. The outbreak began after St. Patrick's Day, and has spread beyond the university community, with confirmed cases reaching 350 cases of mumps since February, including about 24 new cases that have surfaced during the week ending June 9, 2007. The end of the university year in May meant that many students travelled to their homes across the country carrying the infection, leading to a large scale spread, the extent of which is still not", "the functioning of oncoviruses was clarified considerably. Until that time, it was thought that these viruses carried certain genes called oncogenes which, when inserted into the host's genome, would cause cancer. Michael Bishop and Harold Varmus showed that the oncogene of Rous sarcoma virus is in fact not specific to the virus but is contained in the genome of healthy animals of many species. The oncovirus can switch this pre-existing benign proto-oncogene on, turning it into a true oncogene that causes cancer.\n1976 saw the first recorded outbreak of Ebola virus disease, a highly lethal virally transmitted disease.\nIn 1977, Frederick Sanger", "cases of Ebola infection, and upon further isolation, researchers concluded it was another strain of Ebola, or a new filovirus of Asian origin, which they named Reston ebolavirus (RESTV) after the location of the incident. Reston virus (RESTV) can be transmitted to pigs. Since the initial outbreak it has since been found in nonhuman primates in Pennsylvania, Texas, and Italy, where the virus had infected pigs. According to the WHO, routine cleaning and disinfection of pig (or monkey) farms with sodium hypochlorite or detergents should be effective in inactivating the Reston ebolavirus. Pigs that have been infected with RESTV tend", "majority of VEE outbreaks occur in Central and South America, the virus has potential to outbreak again in the United States. It has been shown the invasive mosquito species Aedes albopictus is a viable carrier of VEEV. Vaccine There is an inactivated vaccine containing the C-84 strain for VEEV that is used to immunize horses. Another vaccine, containing the TC-83 strain, is only used on humans in military and laboratory positions that risk contracting the virus. The human vaccine can result in side effects and does not fully immunize the patient. The TC-83 strain is generated by passing the virus", "current location had 3 previous outbreaks in January 2017 with the origin of infection unknown. Real time PCR results tested positive for SPV and the infected were removed from the population either through death, destruction, or slaughter. Measures that were taken in response to these outbreaks were proper disposal of the cascaras, movement control within the country, and quarantine. Prevention There is no treatment for sheeppox virus, thus efforts are directed towards prevention. Vaccines The most effective control over the disease has been the live, attenuated virus vaccine which have been shown to produce good immunity. There are inactivated vaccines,", "Reston virus (another member of genus Ebolavirus) between infected macaques. A similar change in the current circulating strains of EBOV could greatly increase the infection and disease rates caused by EBOV. However, there is no record of any Ebola strain ever having made this transition in humans.", "the WHO stated, \"we believe that this is probably again, somehow, someone who has come in contact with a virus that had been persisting in an individual, who had suffered the disease months ago.\" Two members of the US CDC were sent to the country to help to ascertain the cause of the new cases. The infected boy died on 24 November, and on 3 December the two remaining cases were released after recovering from the virus. The 42-day countdown toward Liberia being declared Ebola-free, for the third time, started on 4 December 2015 and ended", "species, especially over a wide area) outbreak was stopped by the killing of the entire domestic poultry population within the territory. However, the disease has continued to spread; outbreaks were reported in Asia again in 2003. On December 21, 2009 the WHO announced a total of 447 cases which resulted in the deaths of 263. Contagiousness H5N1 is easily transmissible between birds, facilitating a potential global spread of H5N1. While H5N1 undergoes mutation and reassortment, creating variations which can infect species not previously known to carry the virus, not all of these variant forms can infect humans. H5N1 as an", "a past infection. Epidemiology A significant increase in the number of cases is seen every three to four years; the last epidemic year was 1998. Outbreaks can arise especially in nurseries and schools.\nParvovirus B19 causes an infection in humans only. Cat and dog parvoviruses do not infect humans. There is no vaccine available for human parvovirus B19, though attempts have been made to develop one. AIDS Parvovirus B19 is a cause of chronic anemia in individuals who have AIDS. It is frequently overlooked. Treatment with intravenous immunoglobulin usually resolves the anemia although relapse can occur. The parvovirus infection may trigger", "disease with a short infectious period, such as measles in the UK prior to the introduction of a vaccine in 1968. Such diseases tend to occur in cycles of outbreaks due to the variation in number of susceptibles (S(t)) over time. During an epidemic, the number of susceptible individuals falls rapidly as more of them are infected and thus enter the infectious and recovered compartments. The disease cannot break out again until the number of susceptibles has built back up as a result of offspring being born into the susceptible compartment.\nEach member of the population typically progresses from susceptible to" ]
How do they clean up the lead at gun ranges?
[ "Nowadays that lead is worth good money as scrap. There are guys that come out with some attachment that fits on a tractor that kind of sifts the lead out of the dirt. The gun range makes big money for letting them come take the lead.", "Brother used to do this. Helped him once. This was at a police station. We used a giant vacuum. One hose was about a foot wide which sucks the lead and foam or rubber I can't remember which. The vacuum was strong enough to suck the lead and foam but dropped the lead in another pile while a secondary hose on the vacuum blew the foam back against the wall. We started at one end of the wall and worked our way down. We pretty much shoveled the lead into 5 gallon buckets but only filled them halfway because those buckets got pretty damn heavy. We had to wear respirators and painting outfits because of the dust from the foam/rubber makes you itch like crazy. Will apologize in advance about spelling or grammatical errors, I'm on my phone.", "If you're the old gun range near me, you go out of business and sell the contaminated land for a pittance so it's no longer your problem. Then, the developer that buys it offers to clean it up (which they are legally obligated to do anyway) in return for the town re-zoning the lot for a shopping center, over the objections of the lot's neighbors and in direct contradiction to the town's master zoning plan (where the lot is reserved as recreation space). Implicitly, if the town refuses, the subsidiary that holds the land goes bankrupt and leaves an unusable toxic dump in the middle of town, and the developers pay for campaign ads in the next town board election blaming the board's \"anti-business\" climate.", "I used to work at the NRA HQ Range in Fairfax, VA, which is a 150 ft. indoor range. For indoor ranges, the filtration systems are rather intricate. The range itself has a large steel backstop that slopes inward to a powerful vacuum system that picks up lead and lead dust. \n\nBehind it, there is an auger that feeds the lead and lead dust into another, finer filtration system. That machine ends up feeding the remaining lead and lead dust into industrial barrels, which are then sold to a local metal scrapping company by the ton.\nThe building also has it's own dedicated HVAC system with special filtration systems required by federal law, as well as its own dedicated water supply, which is filtered through a course and then a fine filter to pick out the lead that washes off people's hands. That water comes from public sinks that are separate from the bathroom sinks, dedicated specifically for this use. Not washing your hands after exiting the Range is against the Range rules.\n\nAs far as the \"EPA nightmare\" goes, it's not actually that bad at all. All of these things are heavily regulated, and the Range must follow very strict rules to prevent contamination. There is much, much more lead contamination from coal burning power plants than there is from indoor or outdoor gun ranges. \n\nAs an added sidenote, there is no machinery dedicated to picking up the brass shells left on the range after shooting hours. We would use large floor squeegees to collect the leftover brass in five gallon barrels, which we would then dump into industrial barrels which are sold at the same time to local metal scrappers.", "I used to go through the sandtrap with a riddle till I'd filled a bunch of three gallon buckets. Melt it down and recast at a later date, this would probably be a lot more practical for 45 as oposed to 223 though.", "Environmental engineer here. They needed to dig up the first foot or two of soil and haul it to a special landfill. Not cheap, but pretty standard clean up.", "They just replaced an outdoor range near me. They trucked out all the old dirt and trucked in new dirt laced with some chemical that will bond with the lead and stop it from leaching into the groundwater.\n\nRepeat this process every decade or so.", "I don't know how it's usually done, but we had one close near my house a few years back and it just sat there for years before someone bought it up, after which the new owners had to pay for an expensive cleanup operation. Basically they had to dig really far down into the soil and replace it all, so there were dump trucks taking out soil and others coming in and replacing it.\n\nCouldn't say for sure where the old soil went, or where the new soil came from, though.", "I am actually at work right now at a indoor gun range in Bellevue, WA. The modern system for cleaning up lead on indoor gun ranges is a very very strong air filtration system to take all the lead out of the air ASAP and a steel metal trap to catch the bullets ( Shooting into sand takes much longer to clean and is much more expensive ). All the solid lead from the shots gets dropped into a bucket behind each steel bullet trap. Every night ( in full hazmat suits with respirators ) our cleaning crew which consists of normal range safety staff, empties the buckets of lead into a massive enclosed container that we have. The lead is later sold off at auctions along with our brass. We also vacuum the whole range once a week to pick up whatever lead doesn't get picked up in the ventilation system.\n\nsource; I am typing this while I am working at a indoor gun range.", "Range officer/sales agent at lgs here in Central Florida. Indoor range, lead dust at the end of the day is swept down range in a neat line. Once a week all that lead is swept into buckets and put in hazmat barrels. The lead from projectiles goes into whatever trap the range uses. Ours consists of rubber bits, that is shoveled up to keep the backstop even, every so often the rubber is taken out with all the bullets that didn't get swept up and is replaced with new rubber.", "Funny you mention the EPA, they have a BMP guide for gun ranges to deal with lead:\n_URL_0_", "I actually work in a building that was converted from a gun range. In order for us to move in, a clean-up team had to come in and completely work the place, and then the EPA had to come in and test to make sure there wasn't still lead particles that could cause us harm. I know this doesn't answer your question, but I just wanted to verify that the EPA takes it very seriously and there is, in fact, a very thorough means of cleaning the lead.", "All indoor firing ranges have some sort of 'collector' for lead, which simply consist of a steel wall that stops the projectiles. It varies alot when it comes to outdoor ranges. On my local outdoor shooting range (50 m), we are only allowed to shoot .22 lr. as it is the discipline in which we compete. Because of the low calibre, we can set up lead collectors without them being shot to pieces. We have simply dug large plastic pipes down behind every target on the range and filled them with sand. Once a year we dig out the sand, put the sand through sieves, collect the lead, fill the pipes with sand again and sell the lead. This system has saved us alot of time and effort, as we used to dig out all the dirt behind the range and look for lead by hand.\n\nIn my country, Denmark, we have very strict envirromental laws that prohibits lead in the nature as it contaminates the ground water. On our 'fixed' firing ranges, we always collect the lead, as the lead is a great income as scrap metal, but also because the authorities would terminate our license to use the range otherwise. These rules have been here for longer than I can remember and I respect them, but I am always amazed when I visit the large firing ranges. There are a few large areas in Denmark which have formerly been used as military training ground, but which have been giving/sold to locals to use for shooting competetions and for the hunters to train on. There are usually a few fixed ranges in these terrains, but the majority of the ranges used are random, temporary ranges set up for the occasion. These terrains are NEVER cleared of lead and I find it strange that our government are setting strict rules for fixed ranges, but lack enforcement when it comes to former state-owned firing ranges.", "Some new ammunition is manufactured as \"lead free\" such as the new 5.7 (FHN FiveSeven) reducing the exposure. Most lead exposure from other calibers comes from the gas discharge of the accerant escaping from the barrel. This lead is discharged into the air and can be absorbed by breathing. Indoor ranges have air scrubbers or filter systems to remove lead from the air to acceptable levels. An avid indoor range user, in some cases, may have detectable levels of lead in their blood. After testing, the doctor most likely would recommend chealting tablets to remove this lead from the body. Outdoor ranges have a drastically reduced risk of inhaled exposure. Also, the shell casing, projectile and firearm would only have lead residue. There is not enough lead to value harvesting components for scrape. Brass is most likely what they are selling for scrape. This is only to help offset cost and is not profitable in its own merit. Projectiles that are lead jacketed or hollow point would have more lead than FMJ (full metal jacket) rounds. \nHope this helps!!", "Range officer @ rifle club here. We hired a lead miner to come in and clean our backstops, something that we wanted to turn around for profit towards upgrading the club, we are a non profit organization. \n\nThey took 2 weeks excavating/filtering the ground with a screen that traps the jacketed lead bullets and other lead based material into a loader, then off to a recycler. Rebuilding the backstops with clean fill dirt.\n\nWe had roughly 50-60 tons of lead which was about $22,500 at the current lead prices (.35 cents a pound) and after maintenance fees.\n\nLead sucks we as employees take much precaution to prevent long term exposure and hygiene awareness dealing with lead, I myself working the most hours get tested annually.", "I work for a hazmat company, we get contracted to shovel the lead out of shelves in the wall, sweep up, and clean the room with a mild soap. The lead gets disposed of in drums and goes wherever the most profitable recycle place at the time.", "A number of years ago there was a skeet shooting range right on the lake in Chicago. When it closed down, the city had the lake bottom dredged to recover the lead." ]
[ "procedures for lead inspections is outlined in the United States Department of Housing and Urban Development (HUD) Guidelines, Chapter 7, 1997 Revision. The other testing is a lead-based paint risk assessment. In this testing, only deteriorated painted surfaces are tested and dust wipe samples are collected. This information will help the risk assessor determine if there are any lead hazards. Many property owners decided to get a combination of both tests to determine where the lead-based paint is present and what hazards are present as well. Risk assessments are outlined in the HUD Guidelines, Chapter 5. In addition, if a", "to Tommy Sopwith after the First World War. The shooting estate is currently shared between the Duke of Norfolk and a Dutch shooting syndicate. Lead mining Lead is found in veins running through the extensive limestone and chert beds which extend from Swaledale. One of the earliest techniques for extracting the ore is called \"hushing\". It involved the controlled release of dammed water along the line of a lead bearing vein to wash away the top soil allowing the vein to be worked. The Roman historian Pliny records this method being used in Britain to extract lead. Some fine examples", "the eyes from molten metal splash, overalls or dustcoat kept in the lead workshop to stop contamination spreading, and dedicated workbenches equipped with air extraction.\nRegular lead burners should be screened for accumulated lead exposure. Industrially this is done by weekly checks for blue lines around the gums, a simple indicator for heavy metal poisoning, and by regular urine testing.", "all situations. The use of lead shot is banned in Canada and the United States when hunting migratory game birds, such as ducks and geese, forcing the use of non-toxic shot in these countries for waterfowl hunting (lead shot can still legally be used in the United States for hunting game other than waterfowl). This means that manufacturers need to market new types of lead-free shotgun ammunition loaded with alternative pellets to meet environmental restrictions on the use of lead, as well as lead-based and cheaper shotshell ammunition, to remain competitive worldwide.\nThe C.I.P. enforces approval of all ammunition a manufacturer", "lead can be poured through a strainer at the top of a tower or shaft. The droplets become spherical as they fall and cool in this shape during their descent. The pellets are caught in a water basin to break their fall and finish cooling.\nIn 1830 a businessman from Green Bay, Wisconsin, named Daniel Whitney was traveling along the Wisconsin River and recognized a sharp bluff near the town of Helena as a promising location for a shot tower. Lead deposits had recently been discovered in several locations around Iowa County. From the top of the", "Jackson Ferry Shot Tower Manufacturing process Shot towers or shot factories were designed and constructed to manufacture lead shot for firearms. At the top of the tower, a firewood furnace melted lead with arsenic, which was poured through a sieve forming drops of lead corresponding to the size of the sieve. The lead droplets would fall 150 feet, become spherical, cool sufficiently to become rigid and drop into a large kettle of water at the bottom of the tower, completing the cooling process and providing a soft enough landing to keep the shot from deforming. The finished shot", "the use of bismuth shotshells in the place of lead shotshells is common. Other alternatives to lead shotshells than bismuth also exist that are legal for hunting waterfowl, and which are safe for use with older chokes. Within recent years, several companies have created \"heavier than lead\" non-toxic shot out of tungsten, bismuth, or other elements with a density similar to or greater than lead, and with a shot softness comparable to lead. These shells provide more consistent patterns than steel shot and provide greater range than steel shot. They are also generally safe to use in older", "have been estimated to be two to three times those of pre-industrial levels. Although the use of leaded gasoline was largely phased out in North America by 1996, soils next to roads built before this time retain high lead concentrations. Lead (from lead(II) azide or lead styphnate used in firearms) gradually accumulates at firearms training grounds, contaminating the local environment and exposing range employees to a risk of lead poisoning. Entry routes Heavy metals enter plant, animal and human tissues via air inhalation, diet, and manual handling. Motor vehicle emissions are a major source of airborne contaminants including arsenic, cadmium,", "Friends of Henry Horton State Park, a nonprofit organization set up in 2006 to \"Support Henry Horton State Park by assisting with park programs,etc...\" MT2 removed more than 100 tons of lead shot from their award-winning Trap and Skeet Range. The top six to eight inches of soil were harvested, dried and then separated from the lead shot. This method prevented most seepage of lead into the ground. Bullet shortages Recent national bullet shortages have resulted in higher prices for consumers, and lower ammunition availability for the military. This need has provided a significant market for", "in a retort and then poured through a sieve at the top of the tower. The droplets of molten lead would become round during the 150-foot descent. The shot would collect in a kettle of water and slave laborers would enter through a 110-foot access tunnel located near the bank of the New River to retrieve the shot from the kettle.\nThe lead mines closed in 1982 due to new United States Environmental Protection Agency standards and the lack of a market for lead. The mines have since filled with water; the main shaft extended in excess of 1100 feet", "are also used for pest control at airports, warehouses, stockyards, etc. Lead free At the beginning of the 21st century lead-free shotshell ammunition loaded with steel, bismuth, or tungsten composite pellets instead of more traditional lead-based pellets was introduced.\nDue to environmental regulations, lead-loaded ammunition must be used carefully by hunters in Europe. For instance, in France, it cannot be fired in the vicinity of a pond. In fact, the laws are so complex that some hunters in Europe prefer not to risk getting into problems for firing lead pellets in the wrong places, so they opt for composite pellets in", "the prime lead mining region. Lead as shot compared to lead ingots carried more value per ton and therefore these investors saw a good opportunity. Whitney hired a small crew to go to his new saw mill at Pointe Basse and saw enough lumber for the tower and any other needed facilities. The shaft digging was delayed during the Blackhawk War, but shot was manufactured starting in 1830.\nAs the shot tower was beginning its operation, Whitney also built a store at Helena, which was to serve local workers but also other settlers in the area and travelers", "reverse federal regulation that prohibits hunters from using lead ammunition in National Parks.", "up in the firearm. The limit is the point at which the powder gas temperature and pressure starts to melt the base of the bullet, and leave a thin coating of molten and re-solidified lead in the bore of the gun—a process called leading the bore. Cast lead bullets may also be fired in full power magnum handgun rounds like the 44 Magnum with the addition of a gas check, which is a thin aluminum, zinc or copper washer or cup that is crimped over a tiny heel on the base of appropriate cast bullets. This provides protection for", "the base of the bullet, and allows velocities of over 1500 ft/s (450 m/s) in handguns, with little or no leading of the bore.\nSuch cast lead bullets, intended for use with a gas check, will have a reduced diameter at the rear of the cast lead bullet, onto which the gas check can be swaged using a lubricating/resizing press. All cast lead bullets, whether with or without a gas check, must still be lubricated, to prevent leading of the rifling of the barrel. A lubricating/resizing press, which is a special purpose bullet processing press, can be either a standalone press", "Resources and Environmental Control (DNREC) took emergency actions after wind blew lead paint chips beyond the reach of a protective tarp and onto the surrounding residential community. DPH Officials began going door to door to warn residents about lead paint chipping from St. George's Bridge in February 2000, handing out information about the dangers of lead, a guide on foods that naturally fight lead poisoning, and providing residents with information on free blood testing. DNREC filed an enforcement action against the US Army Corps of Engineers in March 2000. DNREC required the USACE to 1) employ “state", "Jacket) bullets are subsequently fired without first removing the lead buildup. Either a mechanical lead removing tool (i.e., a Lewis Lead Remover or a generic equivalent) and/or chemical removal techniques may be used to remove the lead build-up caused from shooting wadcutters at too high a velocity. Air rifle and pistol wadcutters Target airguns used for 10 metre air rifle and 10 metre air pistol competitions generally shoot wadcutter pellets at muzzle velocities around 570 ft/s (170 m/s). The use of wadcutter match diabolo pellets is nearly universal in airgun target shooting where paper targets are used, at distances of 25", "MT2. There is an estimated 15 years worth of lead bullets in the ground in American shooting ranges, waiting to be extracted. In 2007 MT2 extracted 560,000 pounds of the heavy metal.", "can be found readily in the environment, especially in urban and industrialized areas. The majority of modern day environmental lead contamination can be traced back to leaded paint and the addition of tetraethyllead and tetramethyllead to gasoline, though other sources have contributed as well. Though some of the hazards of lead exposure have been documented for centuries, recognition of the hazards posed did not appear to gain much traction until the 1960s with the Senate hearings of Edmund Muskie that would help lead to the phaseout of leaded gasoline and lead-based paint in the 1970s. Blood lead levels would drop", "and 350 feet (110 m) in length.\nBesides the alleged burials, lead waste from expended ammunition is still present at the abandoned rifle range as of Spring 2007. It is possible this waste has contaminated local water supplies but this has not been documented.\nThe Corps of Engineers' (New York) District were unable to locate the engineering and architectural plans for the camp in response to a freedom of information act request. The plans were produced by the Corps of Engineers' (New York) District Engineer in 1949.", "to lead poisoning owing to mistaken ingestion of lead (instead of small stones and grit) to aid digestion, or even prohibit the use of lead for all hunting, such as in the Netherlands. Bismuth-tin alloy shot is one alternative that provides similar ballistic performance to lead. (Another less expensive but also more poorly performing alternative is \"steel\" shot, which is actually soft iron.) Bismuth's lack of malleability does, however, make it unsuitable for use in expanding hunting bullets.\nBismuth, as a dense element of high atomic weight, is used in bismuth-impregnated latex shields to shield from X-ray in medical examinations, such", "sniper shoots the flipped vehicle’s gas tank. The resulting explosion kills the man and the woman. The sniper then executes their daughter.\nAfter night falls, Keren and Jodi set fire to their SUV to create a smokescreen. Before the women can make a break for it however, a sheriff arrives at the scene with a deputy and two police marksmen. The sniper takes out one of the sharpshooters as well as the sheriff. The sheriff’s truck loses control. Keren makes a run for it in the smoke, but the sniper shoots her through her head.\nJodi regroups at the sheriff’s truck with", "occupational exposures at indoor firing ranges can be found at NIOSH Firing Range topic page\nIn 2013, The National Academy of Sciences published a report titled Potential Health Risks to DOD FIRING-RANGE PERSONNEL from Recurrent Lead Exposure. The report highlighted the shortcomings of current occupational lead exposure standards and urged The Department of Defense to update its guidelines and practices for protecting workers from lead exposure on firing ranges. Safety areas Safety areas are own places on shooting ranges where a small bay with a safe direction is set up for shooters to be able to handle unloaded firearms without the", "desired Brinell hardness. Other sources of scrap lead, such as recovered bullets, lead cable sheathing, lead pipe, or even lead–acid battery plates, (EXTREME caution should be used as modern battery components, when melted, can yield hazardous, even deadly gases) can yield usable lead with some degree of effort, including purification and measuring of hardness.\nCast bullets are also the cheapest bullets to buy, though generally only handgun bullets are available in this form. Some firearms manufacturers, such as those using polygonal rifling like Glock and H&K, advise against the use of cast bullets. For shooters who would like to shoot cast", "to a non-lead ammunition as an alternative, then burning the carcass is the next best option. Though burying the carcass is better than leaving it out in the open, the carcass can easily be dug up by rodents and other mammals and then it would also be exposed to raptors again. Hunters should also realize how lead will be in the meat they hunt for food if they use lead ammunition, which isn’t safe for human consumption either.", "on the moistened test paper to form a grey precipitate of lead(II) sulfide.\nAn aqueous solution of lead(II) acetate is the byproduct of the 50/50 mixture of hydrogen peroxide and white vinegar used in the cleaning and maintenance of stainless steel firearm suppressors (silencers) and compensators. The solution is agitated by the bubbling action of the hydrogen peroxide, and the main reaction is the dissolution of lead deposits within the suppressor by the acetic acid, which forms lead acetate. Because of its high toxicity, this chemical solution must be appropriately disposed by a chemical processing facility or hazardous materials", "house painted with lead colors.\"\nCongress banned the use of lead-based paint in residential structures and environments in 1971, and the Consumer Product Safety Commission followed with implementing regulations, effective in 1978. Additional regulations regarding lead abatement, testing and related issues have been issued by the Environmental Protection Agency (EPA).\nMuch of the government's response to the lead public health problems in the 1970s can be credited to the work of epidemiologist and pediatrician Philip J. Landrigan, who conducted detailed studies of lead poisoning near lead refineries, as well as the effects of lead in gasoline.\nIn 1991, the Secretary of the Department", "Comparative bullet-lead analysis Comparative bullet-lead analysis (CBLA), also known as compositional bullet-lead analysis, is a now discredited and abandoned forensic technique which used chemistry to link crime scene bullets to ones possessed by suspects on the theory that each batch of lead had a unique elemental makeup.\nThe technique was first used after U.S. President John F. Kennedy's assassination in 1963. From the early 1980s through 2004 the US Federal Bureau of Investigation conducted about 2,500 analyses on cases submitted by law-enforcement groups. The results of these analyses had often been questioned by defence lawyers and the press,", "child is poisoned in a property, the owner may be required to perform abatement (permanent elimination of the lead hazard). The Lead-Based Paint Disclosure Regulation In 1996, the Department of Housing and Urban Development and the Environmental Protection Agency enacted the Lead-Based Paint Disclosure Regulation. It requires owners of pre-1978 \"target housing\" to disclose to potential buyers or renters all known information about the presence of lead-based paint and/or lead-based paint hazards in the property. It requires that the potential buyer or tenant be given the lead information pamphlet, \"Protect Your Family From Lead In Your Home,\" or other", "bullet catcher, it rapidly loses its kinetic energy and will not easily bounce off. Lead is toxic and hazardous to the environment, so that when shooting with lead pellets precautions should be taken.\nMatch air gun shooters are encouraged to perform shooting group tests with their gun clamped in a fixed rest in order to establish which particular pellet type performs best for their air gun.\nTo facilitate maximum performance out of various air guns the leading match pellet manufacturers produce pellets in graduated weight variants (the light/high speed variants are often marketed for air pistol use) and with graduated \"head sizes\"," ]