text
stringlengths
8
1.28M
token_count
int64
3
432k
Unsolved Problems in Biology/Introduction. This biology textbook originated in Wikipedia with the article (started 08:56, 27 Jun 2003 . . Ike9898). The endless frontier. No matter how much we know about living organisms, there is always more to learn. This book is dedicated to the idea that asking questions is important. We welcome contributions of new questions about biology on the Grist page. Answers to all questions about biology can start with what is already known and then move on to what remains to be discovered, what remains unsolved. The goal of this textbook is to serve as an unorthodox introduction to biology. Each chapter starts with a question, maybe the sort of question a small child would ask, and explores the implications of that question out to the limits of the current state of research and then moves on into speculation about what might be discovered in the future. What is life? The first chapter is called "What is life?" It starts with some of the history of biology and gives a version of the "textbook answer" that might typically be found in an introductory biology textbook. Related questions are then investigated in an attempt to explore the boundaries of the physical domain we call "life". Why is life on Earth made out of certain atoms such as carbon and oxygen? Are there life forms in the universe that are not based on carbon? Is there a clear boundary between carbon-based life and Artificial life? Does the concept of a non-physical thinking being make any sense or is life always instantiated in matter? The chapter concludes with a discussion of the idea that life is the means by which the universe comes to know itself. Some Unsolved Problems in Biology. How did biological organisms start? Are the conditions necessary for the origin of life narrow or broad? How are the sizes of cells, organs, and bodies controlled? Did life start on this planet or was there an extraterrestrial intervention (for example a meteor from another planet) ? Why have so many biological systems independently developed sexual reproduction? What constitutes a species?
465
Plant Sciences/Resources. Online resources. Mainly Plant Molecular Biology and Development Plant Physiology Online (2002). "This site is a good general introduction to learn about plant biology". "There is an edited version of the Plant Physiology book which is far more developed, with very nice figures to illustrate the science. If you are seriously interested in plant biology, it is strongly recommended that you get it from a library or buy it." http://4e.plantphys.net/ a companion to Plant Physiology, Third Edition by Lincoln Taiz and Eduardo Zeiger, published by Sinauer Associates. ABOUT THE SITE This site provides a wealth of additional material to accompany the textbook. Much of the content is referenced in the textbook (as well as listed at the end of each chapter), but the site is a continuously growing resource, so check back regularly to see what new material has been added. There are four main categories of content on the site: 1. Web Topics: This is material that adds to the coverage in the textbook. Topics include text, figures, and tables, and are referenced throughout textbook (and also listed at the end of each chapter). 2. Web Essays: These are original articles on various topics related to each chapter, written by experts in the field. 3. Study Questions: These short answer-style questions are designed to help you learn the key concepts covered in each chapter, and apply them to problems. 4. Readings: Suggested readings for further study. ----http://4e.plantphys.net/categories.php?t=t Topics covered : To get access to the above topics : http://4e.plantphys.net/categories.php?t=t The Arabidopsis Book. Description: Edited by Chris Somerville and Elliot Meyerowitz. Co-edited by Jeff Dangl and Mark Stitt. An Open Access electronic book, The Arabidopsis Book (TAB), is an attempt at a new mode of communication between researchers and a new model for scientific publishing. TAB in its initial stage is a compilation of over 100 invited chapters, each reviewing in detail an important and interesting aspect of the plant Arabidopsis thaliana, with reference to what is known in other plants and in other kingdoms. Each set of authors has agreed that their chapter can be kept up-to-date either by the original authors or by others. TAB will therefore be a dynamic information resource that will evolve with the state of knowledge. We envision evolution of the format as well as the contents - initially by taking advantage of the Web-based possibilities of hyperlinks, which will be added to cross-reference gene names and references to other chapters, and which will eventually lead from each gene and sequence reference to sequence databases, and from each paper cited to its abstract. The Arabidopsis Book is therefore envisioned as a complementary resource to the many databases that contain specific information about Arabidopsis, including The Arabidopsis Information Resource. It is our hope that this book will be broadly useful and, more generally, that it will facilitate the development of new web-based tools for dissemination of knowledge. TAB will be available only via the Internet and will be available free of charge. The American Society of Plant Biologists will provide funds for the mounting and maintenance of the book on the Internet as a public service. Electronic URL: http://www.aspb.org/publications/arabidopsis/ http://www.bioone.org/action/showBook?doi=10.1199%2Ftab.book Lectures and virtual journal club from Jen Sheen's lab (Harvard University). PowerPoint Presentations: http://genetics.mgh.harvard.edu/sheenweb/courses/genetics300.html http://genetics.mgh.harvard.edu/sheenweb/courses/genetics300.html Jen Sheen's lab give access to its virtual journal club, where they provide every month a list of papers of particular interest, with comments. http://genetics.mgh.harvard.edu/sheenweb/virtual_journal.html
933
Plant Sciences/Introduction. Plant cells are immobile, encased in a rigid cell wall. Unlike animal cells, migration and programmed cell death play little role in the patterning of plant cell fates, nor can they move when their environment changes. If the supply of food is low or if there is a predator, animals can move, fight or fly. But plants cannot. They have to adapt constantly to their environment and their development is highly plastic. Animal development is mainly embryonic: the body shape is defined during embryogenesis and the adult derive from the enlargement of the embryo. In contrast, in plants, most of the development occurs post embryonically and never ceases. In fact, because plants can't escape from their physical locations, they adapt and "escape" through development. When there is a lack of nutrients or energy, the plant develops its root system to explore the ground or its aerial system to get some light. Under attack from a pathogen or herbivore, the plant is able to synthesise signalling molecules to change its development and defend itself. Despite their sessile lifestyle, plant development is highly plastic, due to the important role of information exchange between neighbouring plant cells. It appears that cell are more dependent on their positional information rather than lineage origine as in animals. Almost every plant cell containing nucleus has been shown to be able to re-enter the cell cycle and divide. This occurs for example after wounding, neighbouring cells are able to divide and differentiate to replace dead cells. In normal plant development, post embryonic growth comes from meristems. Meristem is a type of embryonic tissue in plants consisting of unspecialised, youthful cells called meristematic cells and found in areas of the plant where growth is or will take place - the roots and shoots. Meristematic cells are small isodiametric cells, the nuclei occupy most of the cell. The cytoplasm contains undifferentiated plastids and posses a small vacuole. Pool of cells are kept meristematic and divide, cells exiting the meristematic zone, start elongating and then differentiating. We’ll look at some of these unusual features of plant development using examples from the model plant, Arabidopsis thaliana.
505
Plant Sciences/Arabidopsis thaliana. "Arabidopsis thaliana" grows quickly, produces prolific seed, and is easy to transform. Its genome is completely sequenced and a large variety of experimental tools and genetic resources are available. This has made the plant one of the favourite tools of plant scientists.
69
Chess Opening Theory/1. e4/1...c5/2. Nf3/2...d6/3. d4/3...cxd4/4. Nxd4/4...Nf6/5. Nc3/5...e5/6. Bb5/6...Nbd7. Open Sicilian 5...e5 6. Bb5+ Nbd7. was played in the 2024 fide chess Canidates tournament between GM Hikaru Nakamura and GM Fabiano Caruana which went 1. e4 c5 2. Nf3 d6 3. d4 cxd4 4. Nxd4 Nf6 5. Nc3 e5 6. Bb5+ Nbd7 7. Nf5 a6 8. Ba4 b5 9. Bb3 Nc5 10. Bg5 Bxf5 11. exf5 Be7 12. Bxf6 Bxf6 13. O-O e4 14. Nxe4 Nxe4 15. Re1 O-O 16. Rxe4 Bxb2 17. Rb1 Bf6 18. Qd5 Rc8 19. Qb7 Rc5 20. Qxa6 Rxf5 21. Rd1 d5 22. Rb4 Bc3 23. Rxb5 Rxf2 24. Rbxd5 Qh4 25. Qd3 Rf6 26. g3 Qb4 27. Kg2 Bb2 28. Rf5 g6 29. Rxf6 Bxf6 30. Qf3 Qe7 31. a4 Kg7 32. a5 Ra8 33. Rd5 Ra7 34. Rb5 Qd8 35. Rd5 Qc7 36. h4 Rxa5 37. Rxa5 Qxa5 38. Qb7 Qd8 39. Qxf7+ Kh6 40. Kh3 Qe7 41. Qc4 Qe3 (Draw by agreement)
516
Chess Opening Theory/1. d4/1...Nf6/2. Nd2. Nd2 is a weak move by White where Black can play /2...e5/, the dubious Lazard Gambit, hoping that White falls into the trap 3. dxe5 Ng4 4. h3?? Ne3. The most principled response by Black is /2...d5/.
92
Guitar/Campfire Diploma. = The Campfire Diploma = The Campfire Diploma is the first part of a multi-volume guitar school in the Wikibooks project guitar. The first volume teaches the basics of playing the guitar for hobby guitarists, that you can't get along without. The campfire diploma, including all songs, sheet music and tablature for guitar lessons, may be freely copied and used free of charge. Learning goals for 8 lessons. <score> \new ChordNames { \chordmode { a1 d g c e:m a:m \new FretBoards { % \override FretBoards.FretBoard.size = #'2 % \override FretBoard.fret-diagram-details.finger-code = #'in-dot % \override FretBoard.fret-diagram-details.dot-color = #'white \override FretBoard.fret-diagram-details.orientation = #'landscape < a, e a cis' e' > % A < a, d a d' fis' > % D < g, b, d g b g'> % G < c e g c' e' > % C < e, b, e g b e' > % Em < a, e a c' e' > % Am » </score> Despite the very limited learning material, on successful completion of the course you will be able to accompany hundreds of songs. You will be able to accompany many popular songs in addition to the typical scout songs. Unfortunately, due to strict copyright law, it is not possible to publish popular song lyrics with the appropriate accompaniment, but you can find the examples in many song books. We'll give you tips on which chords you can use to accompany well-known songs. This helps if the arrangements in the songbooks are not so convenient for the guitar beginner. What you learn here will accompany you throughout your entire life as a guitarist. You can build on these basic techniques and come back to them again and again. Lessons. A lesson is intended for one unit per week (the time to practice and repeat the lesson is not included). There are a total of 8 lessons that teach chords, rhythms and a little harmony, so a lesson can have several chapters. In youth groups where there is a lot of singing (scouts, church youth work, etc.), many texts and melodies are familiar. These can be used as practice examples and you make rapid progress. If you have to concentrate more on learning the individual songs in class, each lesson can be spread over two or three weeks. The lessons are structured in such a way that the material (i.e. the chords and strumming patterns) of the previous lessons is repeated. Therefore, you can move forward with the lessons, even if the last one is not yet completely error-free. Even if you miss a lesson in the group, the learning curve is so flat that you can easily make up for what you missed. So that the repetitions don't become boring for the other students, they are packaged in new songs. The 8 lessons of the Campfire Diploma are designed to last two months. However, self-learners should plan a little more time. What is the “Campfire Diploma”? The guitar courses on Wikibooks are aimed at hobby musicians. Based on the Pawn Diploma (along with the Rook Diploma and the King's Diploma) of the German Chess Federation, the Wikibooks' diplomas (Campfire Diploma, Folk Diploma, Rock Diploma, Ballad Diploma, etc.) offer beginners the opportunity to declare that they have reached a certain level of playing the guitar. You achieve a diploma by being able to play a collection of songs that cover all learning objectives. The diplomas can be issued without examination by any guitar teacher (including volunteers) who has received the order from a public institution or organization (municipalities, schools, church institutions, music schools, adult education centers, etc.) and who has the diploma with a stamp the organization can have it certified. The songs don't have to be played from memory, nor do they have to be 100% error-free. However, you should have a minimum of security when it comes to rhythm and grip changes. With the “Campfire Diploma” you have enough chords and percussion techniques to accompany songs (around the campfire) for well over three hours without repeating yourself. You don't get just any campfire diploma, but the campfire diploma. The term campfire diploma and the other diplomas are new words created by the author Mjchael and were adopted specifically for the Wikibooks. Any use of this term therefore refers to the learning content and learning objectives conveyed here. Every guitar teacher is welcome to advertise with the term "campfire diploma" as long as he refers to this Wikibooks course and includes an easy-to-read link to the campfire diploma or at least the guitar book as the source, so that it is clear that it is a Wikibooks book. From an idea to a concept. In my Boy Scout camp there was the following rule: If you didn't have a minimum level of knowledge and skills, you weren't allowed to touch a guitar. The aim was to protect both the guitars and ears of everyone involved. This is how the idea for the campfire diploma came about. This course provides such a minimum of knowledge and skills. The Campfire Diploma represents something like a 'free float of guitar playing'. The knowledge imparted is a must for every guitarist. It doesn't matter whether you want to play the electric guitar, western guitar or classical guitar. From concept to practice. Before the Campfire Diploma was introduced as a book for the German Wikibooks in 2006, the teaching concept had already been used, tested and further developed for several years. With their campfire diploma, educators, teachers and leaders of youth groups have the courage to put their newly acquired song accompaniment skills into practice in their groups. In addition, the online course has been and is constantly being read and improved by members from various guitar forums and Facebook groups. Errors that are noticed are usually corrected immediately. More tips. Although the courses (campfire diploma and following) are intended for self-learners and have been formulated in detail, it should be mentioned that you learn faster with a teacher. If no one is available, tips from an experienced guitar player can also help. It's also worth taking a look at one or two guitar books. Books have the advantage that you don't have to sit in front of the PC, but rather wherever you like. In addition, books and teachers are not limited to copyright-free exercise examples, so they may offer a larger selection of songs.
1,584
Guitar/The four quarters strumming patterns. = Introducing stroke patterns = You'll learn a handful of strumming patterns here in the Campfire Diploma. Play these exactly as they are written. Later in the folk diploma you will learn how to vary the rhythms a little. But first, a secure rhythm is the most important thing besides the chords. The 4/4-Strumming Pattern. The easiest strumming pattern is four downstrokes. Most of the songs you find in standard songbooks are written in 4/4 time. Therefore, “counting to 4” must become second nature through constant practice. It is important to develop a feeling for where the beginning of a measure - i.e. the "1" - is. You can hit the "1" a little louder than the other beats, or you can count it a little louder. The "1" often goes hand in hand with the beginning of a sentence, but unfortunately not always. Listen to the music examples and try to hear the "1" in a bar. Maybe pay attention to the drums in the background. Even if you can't read music yet, the bar lines on a staff can be helpful. Chord changes usually occur on the "1". Many things come together when learning rhythm. Counting - consciously paying attention to the beat of music - practically executing a beat pattern - using the bar lines as a guide to the notes - the beat pattern images - everything works together. All the elements help make your first steps easier so you get a feel for the rhythm. Strumming is not just a matter of the head, but hearing and the movement of your body (here more specifically: the strumming pattern you perform) are part of it. It's best to practice the strumming patterns with songs that you listen to at the same time. If you have a Midi file, MP3 or video download for the piece, you can use some programs (VanBasco, VLC, BestPractice, Music Speed ​​Changer app, etc.) to slow down the tempo so that you no longer have any difficulties. to play along. Although the arrows are drawn the other way around in some books, in this graphic "top" and "bottom" are not swapped! Like the chord diagrams, the strings are always shown from the player's perspective; the way he looks at the strings from above. You've already seen it with the chord pictures, and when you learn the tablature later, you'll see that "upside down" is the general standard. For each number, strike with the fingernails of your right hand (2-3 fingers or - if you want to be a little quieter - just the index finger) from top to bottom. Your fingernails are parallel to the strings. It doesn't hurt if the fingernails protrude half a millimeter or a little more. You use the same natural motion as if you were trying to remove a few cake crumbs from your pant leg. Your thumb and index finger can touch each other a little, but they should remain mobile (almost as if you had a ball of plasticine or something similar between your fingers). Alternatively, you can use a soft pick to start with. However, I would only recommend it if you have problems with your fingernails. You can get a better feel for the instrument with your fingers. Use picks more for playing loudly. Later it's purely a matter of taste whether you play with or without a pick. However, you should be able to do both. The blows are delivered evenly, like the ticking of a clock. This movement is completely independent of the melody you are currently singing. You don't start to walk faster or slower when you talk to someone on a walk and sometimes speak faster and sometimes slower. From the elbow. With the simple strokes, which are played at a moderate tempo as here, the movement does not come from a rotation of the forearm, at least at the beginning. The punch doesn't initially come from the wrist either (although both are possible). Later, when you play individual quick melodic sequences with a plectrum (small plastic plate), the movement by rotating your forearm or plucking with your wrist makes sense. This allows you to play very quickly but also very messily. Now for the first few chords it's important to have a clean, even beat. Therefore, the movement for the punch comes from the elbow joint. So the upper arm muscle has a lot to do. Although it is not possible to make extremely fast strokes with this movement, the strokes are much more consistent and that is what matters now. The strokes of an experienced guitar player does not come solely from the wrist, as in plucking and fingerstyle, nor solely from a rotation of the forearm, as when playing alternate strokes with a plectrum, nor solely from the upper arm taught here, as with a simple strum pattern, but rather it is a combination from all three movements. Trust that with more routine and fluency your strokes will become more fluid, subtle and relaxed, and don't expect yourself to be able to play like a pro in the first lesson. Der 4/4 Schlag. The strumming pattern sounds even better when played slightly offset. You try to hit the top three bass strings on the "1" and "3" and the bottom three melody or treble strings on the "2" and "4". (If you hit four strings instead of three, it won't bother anyone. The consistent up and down movement is much more important here.) Don't stop somewhere in the middle of the strings, but move your arm evenly up and down. Feel free to reach out a little further so that your arm moves up and down almost as far as the width of the guitar. As I said, this applies to the very first few hours until the rhythm is established. When you later play individual strings (like a bass line), your strike will naturally become more subtle. <score midi="1" vorbis="1"> \new ChordNames { \chordmode { d4 \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 4 \downbow _"4 bars of D major in 4/4 beat" \downbow 4 \downbow \downbow 4 \downbow \downbow 4 \downbow \downbow 4 \downbow \downbow 4 \downbow \downbow 4 \downbow \downbow 4 \downbow \downbow » </score> Don't be surprised if the distinction between bass and melody strings is not made when specifying different strum patterns. This is mostly due to the limited capabilities of the used software . For the D major chord, release the E string. There is one small thing to note about the D major chord, the first chord you will learn here. The top, thick E string must not resonate. You can recognize this by the (X) in the chord diagram. The reason: The note "E" does not fit the D major chord. We don't need to be interested in what the other notes are called at the moment. We just note that the top thick E string doesn't fit the D major chord. To do this, we strike the next two or the next three strings (as I said above, it doesn't really matter...) We always strike "above", "below", "above", "below" . 1,2,3,4.
1,736
Songbook/Brother John. = Brother John = Brother John. <score sound="1" raw="1"> \version "2.20.0" \header { title = "Brother John" composer = "T+M: fran. folk song" % arranger = "arr: ccbysa Mjchael" % Akkorde akkorde = \chordmode { \germanChords \set Staff.midiInstrument = #"acoustic guitar (nylon)" % Akkorde nur beim Wechsel Notieren \set chordChanges = ##t d,4 d d, d | d,4 d d, d | \break d,4 d d, d | d,4 d d, d | \break d,4 d d, d | d,4 d d, d | \break d,4 d d, d | d,4 d d, d melodie = \relative c' { \clef "treble" \time 4/4 \tempo 4 = 120 %Tempo ausblenden \set Score.tempoHideNote = ##t \key g\major \set Staff.midiInstrument = #"trombone" d4-"The starting note D is the third open string from the top" e fis d | d e fis d | fis g a2 _"just one word but two down strokes" | fis4 g a2 | a8_"four quick syllables but only two strokes" b a g fis4 d | a'8 b a g fis4 d | d a d2 | d4 a d2 \bar "|." text = \lyricmode { \set stanza = "1." Are you slee -- ping, are you slee -- ping, Bro -- ther John, brot -- her John, Mor -- ning Bells are ring -- ing, Mor -- ning Bells are ring -- ing, Ding ding dong, ding ding dong. \score { % unterdrückt im raw="!"-Modus das DinA4-Format. \paper { indent=0\mm % DinA4 0 210mm - 10mm Rand - 20mm Lochrand = 180mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> Frère Jacques. <score sound="1" raw="1"> \version "2.20.0" \header { title = "Frère Jacque" composer = "T+M: fran. Volkslied" % arranger = "arr: ccbysa Mjchael" % Akkorde akkorde = \chordmode { \germanChords \set Staff.midiInstrument = #"acoustic guitar (nylon)" % Akkorde nur beim Wechsel Notieren \set chordChanges = ##t d,4 d d, d | d,4 d d, d | d,4 d d, d | d,4 d d, d | d,4 d d, d | d,4 d d, d | d,4 d d, d | d,4 d d, d melodie = \relative c' { \clef "treble" \time 4/4 \tempo 4 = 120 %Tempo ausblenden \set Score.tempoHideNote = ##t \key g\major \set Staff.midiInstrument = #"trombone" d4 e fis d | d e fis d | fis g a2 | fis4 g a2 | a8 b a g fis4 d | a'8 b a g fis4 d | d a d2 | d4 a d2 \bar "|." text = \lyricmode { \set stanza = "1." Frè -- re Jac -- que, Frè -- re Jac -- que! Dor -- mez vouz? Dor -- mez vouz? Son -- nez les mar -- ti -- nes. Son -- nes les mar -- ti -- nes. Ding, ding, dong. Ding, ding, dong. \score { % unterdrückt im raw="!"-Modus das DinA4-Format. \paper { indent=0\mm % DinA4 0 210mm - 10mm Rand - 20mm Lochrand = 180mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score>
1,169
Guitar/Forming the D chord. = Basic information about playing chords = There is more than one way to form the chords, set the fingerings and determine the tones. Here I will introduce you to a method that is particularly suitable for simple chords in song accompaniment. The goal is to be able to grip all the handles comfortably and with little effort. A position that is as natural as possible makes your fingers more flexible and prevents cramps. Pay attention to the way you finger chords in future lessons. Based on experience, the mistakes shown in this lesson are often corrected in the first month or so. Position of the thumb. For simple chords, the thumb is opposite the middle finger, approximately at the height shown. In practical terms, this means that your thumb always begins behind the second fret. This makes it easier for fingerings that extend over three frets to get the index finger into the first fret, the middle finger into the second fret and the ring finger into the third (see C major chord in the 3rd lesson). If the thumb is too far towards the head, you can no longer reach the 3rd fret with your ring finger and little finger. However, if the thumb is too far towards the sound hole, the index finger tends to slip from the first to the second fret. The left hand only touches the fingerboard at two points, so the palm remains mobile. The main job of the thumb is to keep the hand from falling. This may sound obvious, but many beginners use their thumb like a vise to create counter pressure against their fingers. This works, but the thumb is actually too weak and tires quickly. Then your hand cramps and playing is no longer fun. The solution? The pressure on the strings is not created by the thumb, but by the pull of the arm; almost like you want to open a drawer: In this position the wrist is not (or only slightly) bent. Without going into too much detail about the anatomy of the hand, you should know that the tendons of your fingers are held together by ligaments at the wrist. If the hand is bent, the tendons of the fingers rub against these ligaments. In the short term this isn't a big problem, but in the long run it can lead to inflammation, which could be avoided if you don't bend the wrist unnecessarily. By the way, the counter pressure is created with the elbows of the playing hand by pressing the guitar body a little bit and thus pushing the fingerboard slightly forward. The fretting hand only needs to pull back the fingerboard and thus generate enough force to grasp the chords. It should be clear that you should not rest the elbow of the gripper arm on your stomach, but should hold it loosely at your side; otherwise it will be difficult to pull the fingerboard back. Any tension or tension in the palm of your hand is a sign that you are tensing more muscles than necessary. Of course, you shouldn't pull on the guitar neck so hard that it changes the tone. Much less force is required for gripping than you think. The goal is to apply as little pressure as possible, but just enough so that the strings don't buzz. If the hand does not tense up, the fingers will become much looser and therefore faster for changing grips (and later for solo playing). Many students find it hard to believe that they have more than enough finger strength to play the chords cleanly, and that the main problem is the unfamiliar position of the fingers. Exercise. Even if you can hardly do without your thumb when changing grips (just because of the orientation), it is a good exercise to try out playing the first grips without your thumb. To practice, first finger the chord with your thumb, as usual. But then, when the chord sounds good, you take your thumb away while playing. The chord should sound full and flawless even without the thumb. Of course, the next time you change chords, the thumb is added again. Getting a clean fingering and realizing that the thumb doesn't have to build up a lot of pressure to make the chord sound. If you realize that the chord also sounds without the thumb, you can do without a "clamp grip". The fingers find their position even without cramped gripping. Without a thumb, they may need to adopt a different posture to achieve their goal. These positions are often more comfortable or open up new posture options for the guitarist that he would never have thought of with his thumb. Unfortunately, a tense posture already works somehow, so you don't think that there is an easier way. It takes a bit of practice to figure out how much pressure is needed to push a string down. At first you almost always push too hard. Of course, the fingering shown here is not the only possible one. Later (on the Rock Diploma) you will learn additional fingering techniques for the barre chords, where you place your thumb a little lower and apply a little more counter pressure than with the simple chords. You also like to hold your thumb a little lower when plucking and playing solo because it gives you more flexibility. But we'll save that until then. Teachers who first teach classical guitar, including reading music, often frown upon placing the thumb in the upper neck area. But a high thumb base is only really unfavorable if it impairs the reach of the fingers (especially the 4th finger). For the first few simple chords, you can choose the convenient way that you can always fall back on when you want to relax your fingers a little after a strenuous solo. Where to put your fingers? If you experiment a little, you will notice that the strings buzz every now and then. The fingers apply enough pressure, but they are too close or too far away from the waistband. If a finger is too far away from the fret, there will not be enough pressure to push the string all the way onto the fret. The string then does not rest properly on the fret and buzzes. A common reason for this error: the thumb is too far towards the bridge and no longer above the second fret. The ring finger in particular no longer reaches the third fret. Try to remember this when you have trouble reaching the third fret with your ring finger on the C major chord. The optimal position is just before the fret. So, if possible, try to keep your fingers in the last third of the band. You won't always be able to do this because you still need space for the other fingers (you'll notice this at the latest when you play the A major chord...). Still, try to get as close to the frets as possible. Of course, you can't be "'too"c close to the fret, otherwise you'll accidentally push the string onto the fret after that. A common reason for this error: the thumb is not over the second fret, but rather in the third (see above). Don't stall strings. Don't worry if everything doesn't work out right away. During the first few exercises it can sound a little off (if you don't make any serious mistakes), and you can ignore that. Experience has shown that such errors disappear after a few lessons. From the beginning, try to touch the strings of the guitar only with your fingertips (as in the first illustration). The finger lies like a hammer on the string. The second illustration shows the finger "choking off" the adjacent string. In addition, such a posture damages the finger joints. To protect your joints, you should avoid flexing your fingers if possible. Look again at the photos of the handles. The fingers do not come vertically from below, but rather at a slight angle from the bottom left (as seen from the guitarist). This creates a little more space to the neighboring string. Avoid spreading your fingers unnecessarily. Try to keep your fingers straight as much as possible. This means: keep your fingers closed as much as possible when gripping. Any spread of the fingers leads to cramps, which are avoidable. The first chord for the first song. You can reach most positions on the fretboard by simply stretching and bending your fingers. Most chords can be played comfortably. As described above, the palm of the hand should remain movable and not stick to the neck of the guitar.
1,820
OpenSCAD User Manual/WIP/Roof. codice_1 generates a chamfer of 45° over 2D child polygons. It is constructed via voronoi or straight point mesh generation. roof(method = ["straight" | "voronoi"], convexity = N) { children }; default values: roof() square(10); yields: roof(method = "voronoi", convexity = 1) square(10); Example: beveled text $fa=1; $fs=0.4; intersection() { cube([100,100,2],true); scale([1,1,3]) roof(convexity=6) text("Wow");
169
Guitar/Chord changes from D to A. Original page translated by Google = The change of fingering from D major to A major = The first change of chords Here I'll show you in slow motion how to change from D to A. Try to follow the sequence exactly. What seems slow to you now will become incredibly fast over time. Just by singing the examples you will practice the correct movement sequence over and over again and your fingers will get used to the position. The first few chord changes are not extremely fast. Speed ​​takes time and comes with practice. Note that it would be much easier and faster if a teacher showed you everything and you didn't have to read everything. It is more important to be able to play the chord changes than to be able to play the individual chords. You will then learn the chords automatically. The change of fingering from A major to D major. Now the whole thing goes backwards. The A major chord. <score sound="1" raw="1"> \version "2.20.0" \header { title="4/4-Downstrokes with changing D and A major " encoder="mjchael" myChords = \new ChordNames { \chordmode { d1 a d a myRhythm = { \repeat volta 4 { 4 \downbow \downbow 4 \downbow \downbow <e, a e>4 \downbow \downbow <e, a e>4 \downbow \downbow 4 \downbow \downbow 4 \downbow \downbow <e, a e>4 \downbow \downbow <e, a e>4 \downbow \downbow \mark "4x" \score { « \myChords \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm \score { « \unfoldRepeats { \tempo 4 = 120 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" \myRhythm 1 \downbow \paper { indent=0\mm line-width=120\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> Finally. I repeat myself again: At first, everything is practiced veeeeery slooooowly!</br> Only gradually can you get faster with the changes. </br> It is important to change correctly, i.e. in the right order. The aim is for the fingers to then be placed smoothly on the fingerboard. If you "just" place your fingers on the fingerboard, you run the risk of placing the fingers one at a time, with each finger still having to find its place. It is then not a smooth movement, but three choppy movements that take much more time. Imagine the flow of the movement! The whole thing looks something like this:</br> What today happens slowly, one after the other, will soon solidify, so that the fingers know their position so well that they can sort themselves out in the air. After a few weeks, the fingers know the position they should take so well that when making small or large chord jumps (D-A; C-D / G-Am; Em-D) you can put all your fingers down at the same time without even looking at the fretboard. Of course, the fingers are sorted then too, but that happens in the air. You do exactly the same movement sequence that you are learning here in slow motion. It will take a little while before you can play pieces that require extremely fast fingering changes. But there is still time for that. For the first strumming patterns, where you always switch back and forth between the bass string and the melody strings, it is perfectly sufficient to take care of the fingers of the top three bass strings first. Because they are struck first. The fingers of the melody strings therefore have a little bit of time. You don't even need to think about it too much, because it happens automatically. Take your time and don't develop false ambition. That would simply be out of place here. In traffic, too, you often shift down a gear before overtaking. "All fingers at the same time" is not a goal for the first 6 lessons of the Campfire Diploma. You will learn that a little later. And with the right finger switching, it almost happens automatically. Fingering. Pay attention to the position of your middle and ring fingers! One position or the other will appear again and again in the next 6 chords for the “Campfire Diploma” and in 3 chords for the “Folk Diploma”. It is worth paying attention. Pay attention to the opening. In many songs, you don't start with the beat pattern right from the first word. Look at the song sheets to see where the first chord is. It is the first word that is given more emphasis in terms of rhythm. The words before the first "1" are called the upbeat.
1,275
Songbook/He's got the whole world. = He's Got the Whole World in His Hands = <score sound="1" raw="1"> \version "2.20.0" \header { title = "He's Got the Whole World in His Hands" composer = "Spiritual" % arranger = "arr: ccbysa Mjchael" myChords = \chordmode { \set Staff.midiInstrument = #"acoustic guitar (nylon)" % Akkorde nur beim Wechsel Notieren \set chordChanges = ##t \partial 2 r2 | d,4 d d, d | d,4 d d, d | a,4 a, a, a, | a,4 a, a, a, | d,4 d d, d | d,4 d d, d | a,4 a, a, a, | d,4 d | myMelody = \relative c' { \clef "treble" \time 4/4 \tempo 4 = 120 %Tempo ausblenden \set Score.tempoHideNote = ##t \key d\major \set Staff.midiInstrument = #"trombone" \partial 2 r8 a' a fis | a2 fis8 d4. | r8 a' b a4 a8 a fis | g2 e8 cis4. | r8 a' b a4 a8 a fis | a2 fis8 d4. | r8 a' b a4 a8 a fis | a4 a g8 e4. | d2 \bar "|." myLyrics = \lyricmode { \set stanza = "1." He's got the whole wo -- rld in His hands, He's got the whole wo -- rld in His hands, He's got the whole wo -- rld in His hands, He's got the whole world in His hands. \score { % \new TabStaff { \myChords } % Test % unterdrückt im raw="1"-Modus das DinA4-Format. \paper { indent=0\mm % DinA4 0 210mm - 10mm Rand - 20mm Lochrand = 180mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> <poem> He's got the whole world in His hands, He's got the whole world in His hands, He's got the whole world in His hands, He's got the whole world in His hands. He's got my brothers and my sisters in His hands, He's got my brothers and my sisters in His hands, He's got my brothers and my sisters in His hands, He's got the whole world in His hands. He's got the sun and the rain in His hands, He's got the moon and the stars in His hands, He's got the wind and the clouds in His hands, He's got the whole world in His hands. He's got the rivers and the mountains in His hands, He's got the oceans and the seas in His hands, He's got you and he's got me in His hands, He's got the whole world in His hands. He's got everybody here in His hands, He's got everybody there in His hands, He's got everybody everywhere in His hands, He's got the whole world in His hands. </poem>
890
Songbook/Rock My Soul. = Rock my Soul = Abraham's bosom alludes to "The parable of the rich man and Lazarus"; a biblical story from the New Testament. (see ) Only children are actually allowed to sit on the lap of a grandfather (symbolic of Abraham's forefather). And then it is usually the grandchildren and close relatives who enjoy a close relationship of trust. The song thus expresses the deep desire to experience such trust in God for oneself. There is hardly a gospel choir that does not have this song in its repertoire. The text is so easy that the audience can sing along immediately. This gospel has been covered very often. To name just a few: Golden Gate Quartet (1938), Les Humphries Singers, Peter, Paul & Mary, Louis Armstrong, Nana Mouskouri, Elvis Presley and many more. <score sound="1" raw="1"> \version "2.20.0" \header { title = "Rock my soul" composer = "Spiritual" % arranger = "arr: ccbysa Mjchael" myChords = \chordmode { \set Staff.midiInstrument = #"acoustic guitar (nylon)" % Akkorde nur beim Wechsel Notieren \set chordChanges = ##t \repeat volta 3 { d,4 d d, d | d,4 d d, d | a,4 a, a, a, | a,4 a, a, a, | d,4 d d, d | d,4 d d, d | a,4 a, a, a, | d,4 d d, d | myMelody = \relative c' { \clef "treble" \time 4/4 \tempo 4 = 120 %Tempo ausblenden \set Score.tempoHideNote = ##t \key d\major \set Staff.midiInstrument = #"trombone" fis4 fis d d8 d | fis fis fis a4 g8 fis4 | e e cis cis8 cis | e e e g4 fis8 e4 | \break fis4 fis d d8 d | fis fis fis a4 g8 fis4 | a2 g8 e4. | d2. r4 \bar "||" \break fis2 d4 4 | fis4 8 a4 g8 fis4 | e2 cis4 4 | e4 8 g4 fis8 e4 | \break fis2 d4 4 | fis4 8 a4 g8 fis4 | a2 g8 e4. | d2. r4 \bar "||" \break fis8 r4 fis4. r4 | fis2. r4 | e8 r4 e4. r4 | e2. r4 | fis8 r4 fis4. r4 | fis2. r4 | a2 g8 e4. | d2. r4 \bar "|." myLyrics = \lyricmode { \set stanza = "1." Rock my soul in the Bo -- som of A -- bra -- ham. Rock my soul in the Bo -- som of A -- bra -- ham. Rock my soul in the Bo -- som of A -- bra -- ham. Oh, rock my soul. \set stanza = "2." So high, you can't get o -- ver it. So low, you can't get un -- der it. So wide, you can't get round of it. Oh, rock my soul. \set stanza = "3." Rock my soul. Rock my soul. Rock my soul. Oh, rock my soul. \score { % \new TabStaff { \myChords } % Test % unterdrückt im raw="1"-Modus das DinA4-Format. \paper { indent=0\mm % DinA4 0 210mm - 10mm Rand - 20mm Lochrand = 180mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> Rock - my - soul - Rock - my - soul Rock - my - soul - oh rock mysoul. Rock my Soul. Rock - my - soul - Rock - my - soul Rock - my - soul - oh rock mysoul. Weblinks.
1,072
Guitar/Song Examples/Campfire Diploma. =Song Examples for the Campfire Diploma=
25
Chess Opening Theory/1. e4/1...e5/2. Nf3/2...Nc6/3. c3/3...d5. 3.d5. This move takes advantage of White playing c3. After the natural exd5?! Qxd5, White cannot play the usual Nc3 attacking the queen as the c3-square is occupied by the pawn. Because of this, White's best option is /4. Qa4/, pinning the c6-knight and threatening Nxe5 next move. This is the theoretically best response to the Ponziani Opening, scoring the best in databases and being most chess engines' preferred move. It is also the second most common response to the Ponziani by masters, behind the Jaenisch Counterattack with 3. Nf6. Theory Table. 1. e4 e5 2. Nf3 Nc6 3. c3 d5
219
Number Theory/Powers modulo 11. The following table shows the powers of integers modulo 11.
27
Chess Opening Theory/1. e4/1...e5/2. Nf3/2...Nc6/3. c3/3...Nf6. = Ponziani Opening, Jaenisch Counterattack = 3. Nf6. The Jaenisch Counterattack is the most common response to the Ponziani Opening at both amateur and master level. With 3. Nf6, Black attacks the e4 pawn. This takes advantage of White's last move, as Nc3 is no longer possible due to the pawn on c3. White's best response is to continue with the plan of d4.
152
Chatbots For Social Change/Theory of Conversation/Talking to Strangers. Gladwell, M. (2021). Talking to strangers: What we should know about the people we don’t know (First Back Bay trade paperback edition). Back Bay Books. Introduction. The idea would be to build to a full and convincing explanation of the extent to which miscommunication negatively impacts our collective lives. In ideal form, it would include: This may serve as a good very first chapter to the section Conversation. Defining "Clear Conversation". We can break conversation down into a few fundamental pieces. For instance, the signs and symbols exchanged, the manner in which they are expressed, the speaker, and the listener. We also want to be able to talk about "communication" being successful. Because this word in English has several related definitions we need to be specific about what we mean. I am interested in the context of Chatbots for Social Change in "clear communication" in particular, admittedly dropping out all the vagaries of much of conversation. This chapter will deal with one person A intentionally and successfully updating person B's knowledge using language. If time were paused after the statement and we could ask A and B a dozen questions about the last statement made, they would be capable of reflecting consistently with each other. Indeed, when a statement B's mind they might be doing this themselves, asking questions to themselves and to A. There are some examples in which we might test the listener's understanding through simply watching their behavior. For instance, if they arrive to an appointment they made on time, you can be pretty sure the statements surrounding it were understood to some extent. Yet one of the best ways to know if the listener understood is to ask questions. People often ask questions in normal conversation when they believe they don't understand what their conversation partner is trying to say. It is through this practice that we become better at communicating to each other, and produce clear commonly held understandings. For anything to be effectively communicated, the speaker and listener must have some shared language. That is, some overlap between the strategies for (re-)presentation of the speaker, and for interpretation by the listener. We may consider communication successful when the listener grasps the meaning intended by the speaker. Commonly held? One way to define a group of people holding the same understandings is their ability to pass "understanding tests." This definition may seem strange, but it is directly parallel to how the people themselves define it -- through common answers to certain kinds of questions about what was said, or what they believe. Of course, sometimes people will forego being understood in communication. When someone asks for my name at Starbucks, I say "Alec," and they respond, "Alex?," I will 99% of the time nod my head yes. I've not had my coffee, I like both names equally. It's not worth the effort for me to clarify because I haven't had my coffee yet, and it would result in a slight inconvenience at no benefit. Other times people will forego understanding. But most of the time, people forego communication at all. Communication not always easy, especially with strangers. It takes time and patience to craft sentences of a textbook, and interacting meaningfully with a stranger requires attention, creativity, and interest. Humans have a fallback in lightweight interaction with some formulaic style, i.e. "small-talk". This makes communication with strangers easier. Conversations with a limited or pre-described context, or which have already happened many times before, are spaces where our muscle-memory can kick in and enable near-effortless communication. Successfully communicating is also much easier for people you talk to all the time. At the extreme, the smallest behavior can communicate complex concepts, enabling communication of information without any intent by either party. Speaking across social distance is always an attempt at translation. The more local the person, and so the more familiar to you, the more shorthand can be employed, and the more can be effectively said in a short time. What makes talking to strangers, as Gladwell beautifully illustrates, so difficult? This will be the topic of the present chapter.
916
A-level Mathematics/CCEA. CCEA is the awarding organization based in Northern Ireland, offering A-level Mathematics as one of its many subjects. A-Level Mathematics is split into 3 sections:
48
Minecraft/Target Block. Use. The target block has a number of uses, related to redstone.
23
Transportation Planning Casebook/Westconnex - What Went Wrong. Summary. WestConnex is a significant road infrastructure project in Australia and is considered a crucial part of a larger effort to improve the transportation system in Sydney and Australia. This project spans about 33 km and has built approximately 26 km of tunnels between Homebush and Kingsgrove, running beneath Inner West communities such as Haberfield and St Peters. Along with the NSW Government's unprecedented investment in public transportation infrastructure, WestConnex aims to reduce traffic congestion, create many job opportunities, and connect communities. The origins of the WestConnex project can be traced back to early planning initiatives such as the Cumberland County Plan of 1948. This plan aimed to establish a network of radial motorways that would revolve around the Central Business District (CBD) of Sydney. However, it faced opposition from the community and the government and lost its significance over time. The subsequent plans, such as the "Roads 2000" in the 1970s and the motorway projects proposed under the Labor government in the 2000s, laid the initial groundwork for the WestConnex project. The "First Things First" strategy of 2012 was an important turning point for the Sydney motorways, where Infrastructure NSW identified the WestConnex motorway as the most significant road priority in New South Wales. The initial proposal included expanding existing motorways, constructing new tunnels, and repairing surface roads. However, the proposal lacked a direct link to the CBD. Despite some concerns and criticism, construction began in 2015, marking the beginning of several stages aimed at improving traffic flow, connectivity, and travel times. Over the years, with modifications to the initial proposals, major portions of the project, including the M4 Tunnels and WestConnex M8, was completed, allowing drivers to save significant time. However, the project faced several challenges, such as criticism for its high cost, environmental impacts, and community health concerns. The completion of the Rozelle Interchange, which is a crucial milestone especially for future projects such as the Western Harbor Tunnel and Sydney Gateway, also resulted in traffic congestion, causing inconvenience to the commuters. Additionally, the tolling system raised concerns regarding affordability and fairness, with commuters potentially having to pay high tolls. Overall, the WestConnex project is a significant development in Sydney's infrastructure that is expected to transform the city's transportation system. The project has implemented various proactive solutions, including design alterations, emergency works, and improved transparency. Moving forward, the project will continue to progress with proposals for the Western Harbor Tunnel, Sydney Gateway, and the M6 Stage 1 and Stage 2 Motorways, with the aim of enhancing Sydney's transportation network and reducing congestion. As Sydney grows and evolves, WestConnex will remain an essential component of the city's infrastructure plan, shaping the future mobility and connectivity of New South Wales. Policy Issues. Funding Mechanisms. Public / Private Funding. The WestConnex project was initially funded through a hybrid model of financing which included an initial contribution from the NSW and Australian Government, alongside private sector debt and tolling revenue. A new Government owned corporation, the Sydney Motorway Corporation was set up in 2014 in order to finance and deliver WestConnex. Initial investment into the government owned corporation included: After the delivery of the initial stages of WestConnex, the New South Wales government in 2018 sold a 51% stake in the Sydney Motorway Corporation for $9.26 billion, raising money from project equity which could be invested into the later stages of the project. In September 2021 the remaining 49% of the Sydney Motorway Corporation was sold to the Sydney Transport Partners consortium for an additional $11.11 billion. Tolling Strategy. By purchasing the Sydney Motorway Corporation, the Sydney Transport Partners gained access to guaranteed tolling concessions. These concessions provide guarantees around the ability to raise tolls on the WestConnex motorway through to the end of 2060. NSW Government Strategic Objectives. When recommending the delivery of the WestConnex project in 2012, Infrastructure NSW proposed the following objectives: Narrative. Early Planning. Cumberland County Plan. The Cumberland County Plan, which led to the development of WestConnex, was the first comprehensive plan for the Sydney motorways. The plan was proposed by the Cumberland County Council in 1948 and adopted by the New South Wales government in 1951. Its objective was to establish a radial motorway network centered around the Central Business District (CBD) of Sydney which advocated for decentralization, zoning, green belts, open spaces, and improved road and rail systems. However, this vision was not fully realized. While Sydney had a comprehensive plan for the railway system and several planned areas, including the city core, the city's expansion was primarily organic and followed a "starfish" structure in the early twentieth century. This structure closely followed the railway and tramway lines that extended from the city center. To address the postwar metropolitan growth, the McKell Labor government passed legislation in 1944 that established a unified planning authority for Sydney. As a result, the Cumberland County Council was founded in July 1945 to serve as the sole planning body of Sydney. The plan faced opposition from NSW Government agencies, landowners, and local citizens and lost its patron when the county council was abolished in 1963. In 1976, with the election of the Australian Labor Party under Premier Neville Wran, the plan lost its relevance which resulted in halting of work on inner-city projects, reducing the under-construction Eastern Suburbs railway line, and eliminating many of Cumberland Plan's inner-city road reservations. Though Wran's choice to sell up the M4 East corridor was later questioned, the Cumberland Plan's radial design was already beginning to lose relevance. Roads 2000. In 1975, the Commonwealth Bureau of Roads proposed a significant investment in the construction of urban arterial roads to address the urban requirements. However, due to economic constraints in the late 1970s and early 1980s, this proposal was not supported by the state or federal governments. Consequently, the existing urban road difficulties threatened to halt the smooth functioning of Sydney by 1987. To address this issue, the Department of Main Roads proposed to revive the motorway plans.. The resulting state-wide planning program, "Roads 2000," aimed to re-sheet highways, replace bridges in rural regions, and implement new traffic controls. Its most ambitious project, the orbital, was a new freeway/motorway route around Sydney that would connect all of the radial and intercity highways while bypassing the congested urban areas. The Western Motorway (M4), from Lapstone to Concord, was completed in 1992, and the South-Western Motorway (M5), from Prestons to Beverly Hills, was completed in 1995. However, the M5 East segment of the orbital, which connects Beverly Hills and the airport, remained debated. Though a surface corridor had been reserved for much of the route, the Labor government was concerned about minimizing surface damage. Following last-minute design changes, the resulting roadway that opened in 2001 still was too steep for heavy trucks returning from Port Botany, which led to an increase in vehicle emissions and overloaded ventilation systems. Labor Proposals from the 2000s. The Labor government proposed several Sydney motorways during the 2000s. "First Things First" Strategy of 2012. The "First Things First" strategy of 2012 was a turning point in Sydney's transport planning. The Coalition government of Premier Barry O'Farrell, which was elected in 2011 with the intention of overhauling the city's transportation system, commissioned Infrastructure NSW (iNSW), led by former Premier Nick Greiner, to review projects and identify priorities. The following year, iNSW's strategy nominated the construction of a 33 km freeway, known as the "WestConnex," as the state's top road priority. Initially, the WestConnex plan proposed: Despite its emphasis on travel to and from Botany Bay's international ports, the proposal lacked a direct link to the CBD, limiting the federal investments. Further Improvements and Alterations. In 2013, the WestConnex project was separated into three sections: M4 Widening, M4 East, and M5 East Airport Link, with additional stages planned to complete the inner-city bypass. The initial concept was further modified in late 2014, particularly for the M4-M5 Link, which included realignments to enable a future second harbor road tunnel as well as improvements such as the Rozelle Interchange and a tunnel beneath Rozelle to bypass Victoria Road congestion. Construction Phase. Time to Start Property Acquisition and Construction. Property acquisition and construction work for the WestConnex project began in 2015. Specifically, construction of the M4 widening began in March 2015, marking the start of actual construction on the project.This phase of work includes widening the old M4 Western Motorway from Parramatta to Homebush Bay to four lanes from its original two or three lanes, and a new three-lane tunnel from Homebush to Haberfield. Public and Political Reaction. The WestConnex project has been met with widespread public and political reaction, including questions about the project's cost, expected traffic mitigation effects and concerns about environmental and community health impacts. Specifically, criticisms regarding health impacts have focused on the underestimation of health impacts during the planning process, with impact assessments on air quality and noise in particular being seen as inadequate. In addition, the City of Sydney City Council clearly opposes the WestConnex project, believing that this project fails to solve Sydney's transportation connectivity problems and may lead to increased air pollution and traffic congestion. The city government also pointed out that the total cost of the project may be as high as A$45 billion and will have a minimal impact on most people's commuting time savings, while also increasing the financial burden on citizens due to high tolls. Trade-offs and Design Changes during the Construction Phase. In 2016, Transport for New South Wales revised the conceptual design of the M4-M5 Link Road and Rozelle Interchange to better integrate existing roads and communities. These modifications are designed to reduce the impact on surrounding communities while optimizing traffic flow and reducing congestion on major roads, without increasing the overall cost of the project. These design changes include realigning the route to reduce disruption to residential areas and adding sound insulation to reduce noise pollution during construction and operation. In addition, the design adjustments to the Rozelle Interchange include more public spaces and green areas to enhance the quality of life for the surrounding community and strive to minimize environmental impact. Contract and Management Innovations. Significant innovations in contract management and procurement helped accelerate the project timelines. For example, the M4 East segment benefitted from an accelerated procurement strategy that allowed for faster contract awards and construction commencement, which was crucial in meeting tight deadlines. Westconnex Opening. Major stages. The M4 Tunnels. The first major stage of WestConnex were completed in July 2019, linking to the widened M4 motorway and Haberfield. Motorists on this section of WestConnex are saving an average of 35 minutes on their westbound peak time journey compared to Parramatta Road. WestConnex M8. The second stage of WestConnex, open since July 2020, doubles the capacity of the M5 East via twin 9km tunnels. The tunnels cut up to 30 minutes off a trip between Liverpool and the southern CBD. The new extensions of the M4 and M8. The third stage of WestConnex opened in January 2023, linking the M4 at Haberfield with the M8 at St Peters. The Rozelle Interchange. The final stage of WestConnex opened to traffic in November 2023. It connects the M4-M5 Link to the Anzac and Iron Cove bridges, and the future Western Harbour Tunnel and Beaches Link. The Rozelle Interchange is being built almost entirely underground, freeing up space for a new regional park. Issues and solutions. After the Rozelle Interchange was delivered, some issues appeared. As a result of the new junction, 10 lanes of traffic now have to merge into four lanes on the Anzac Bridge. Instead of bringing convenience to the public, the project has caused traffic bedlam. Therefore, people called it the labyrinthine "spaghetti" junction, the world's most complex underground. On 4th December, 2023, emergency works were carried out to improve "pinch points" on Sydney's Rozelle interchange, which will add a second lane for 400 meters where the City West Link merges with the new Crescent Overpass before Anzac Bridge. In February, 2024, The NSW Government responded to community calls for greater transparency around the Rozelle Interchange, with the release for the first time of travel time data to help motorists plan their trips. Future Plans. Western Harbour Tunnel. The Western Harbour Tunnel is currently under construction and will provide a third road crossing point of Sydney Harbour and will provide a western bypass of the Sydney CBD. Some of the traffic from Westconnex entering the Rozelle Interchange will be diverted from the Anzac Bridge and be able to travel directly across the harbour into North Sydney or from North Sydney directly to the inner west, bypassing the Sydney CBD. Sydney Gateway. The Sydney Gateway project is currently under construction and will provide a connection from the WestConnex motorway at St Peters to the domestic and international Sydney Airport terminals. It will also provide more connectivity from Port Botany into the motorway network for road freight. Alongside the motorway project the freight rail line between Port Botany and Mascot has been duplicated to provide additional freight rail capacity, and contribute to reducing the number of trucks on Sydney roads. M6 Stage 1 Motorway. The M6 stage 1 motorway project is currently under construction and will connect the Westconnex M8 at Arncliffe to the A1 at President Avenue in Kogarah via an underground tunnel. The aim of the project is to provide a more direct connection from southern Sydney into the wider motorway network. It is also intended to reduce traffic on surface streets (particularly heavy vehicles). The project also incorporates a road/tunnel stubs to allow for the future extension of the M6 tunnels. M6 Stage 2 Motorway. The M6 Stage 2 project is a planned extension of the M6 to the south which would extend the motorway network through the Sutherland Shire and connecting to the A1 motorway at Loftus. This would divert traffic (particularly heavy vehicles) from existing surface roads, and extend the motorway network to the southern urban fringe of Sydney. The project has no committed funding or planning approvals and was shelved indefinitely by the NSW Government in June 2022, however the road corridor for the extension has been reserved since 1951.
3,548
Death Stranding. This is the Wikibook game guide for Death Stranding product of Japan. Setup. You can export your save game from Death Stranding to Directors cut. The best way to play Death Stranding on Steam Deck while using the FSR optimization seems to be: Before the game begins you need to enter your birthday and month. Beginning. When the prologue video ends Recover your dropped item walk to a straight line until a cave Press up to wear sunglasses. Once the movie ends Go down the cliff from right cross the river and keep pushing toward the city. There is a force field , go right cross the river , when you get more items you must manoeuvre and balance the cargo weight when taking turn or else they fall Episode 1. Getting to the incinerator there aren't any enemies, there is a cutscene then some BTs appear and you get past them holding Rb. If they surround you try and get away by hitting x. Episode 2. Order 14: Connect Port Knot City. While delivering aid package, you can both avoid or fight BT whale with grenades. if you have the bike park it halfway at the distribution center. Checklist. https://docs.google.com/spreadsheets/d/1k5eCt2GspfQP_8HgPczoPNOTy3qsU7xsyWLVKEKaF1I/edit#gid=0
338
Acing the SQE/Dispute Resolution/Different options for dispute resolution. =Introduction= In this chapter, we will examine three distinct approaches to dispute resolution: arbitration, mediation, and litigation. The first two methods fall under the category of alternative dispute resolution (ADR). The section on arbitration will explore its historical roots and development, followed by an assessment of its strengths and weaknesses. We will then delve into the arbitration process, both within domestic and international contexts. Next, we will turn our attention to mediation and its fundamental principles. This increasingly prevalent ADR approach will be evaluated based on its effectiveness in resolving various civil disputes. A solicitor specializes in dispute resolution should keep in mind that they have a professional obligation to explore various dispute resolution options available to their client when representing them in a matter involving a conflict with a third party. During this process, they should discuss with their client whether alternative dispute resolution (ADR) techniques, such as mediation, may be a better alternative to formal procedures like arbitration or litigation. This requirement was initially included in the Solicitors Regulation Authority's (SRA) Code of Conduct 2011, although it has since been updated. Parties and their legal representatives should bear in mind that the Practice Direction on pre-action conduct encourages the settlement of disputes before litigation commences and mandates the consideration of alternative dispute resolution (ADR). It serves as a reminder that litigation should only be pursued as a last resort. In accordance with the relevant pre-action protocol or Practice Direction, the parties should contemplate whether negotiation or some other form of ADR could facilitate resolution of their dispute prior to commencing legal proceedings. If a party fails to consider ADR, there may be cost sanctions imposed at the conclusion of the litigation. Even if litigation is ultimately chosen as the preferred dispute resolution mechanism, the Civil Procedure Rules and associated Practice Directions require parties to consider the use of ADR. For example, Rule 1.4(2)(e) directs the court to promote the use of ADR if it is deemed appropriate. Rule 26.4 allows the court to stay cases to permit ADR to take place, and the Practice Direction to Part 29 empowers the court to issue directions regarding ADR on its own initiative without requiring a hearing. Different options for dispute resolution. Alternative dispute resolution is an important option for solving civil disputes and the parties should engage if at all possible. Failure to do so may result in financial sanctions. The characteristics of arbitration, mediation and litigation which make them an appropriate mechanism to resolve a dispute. Arbitration, mediation, and litigation are three distinct mechanisms for resolving disputes within the English dispute resolution system, each with its own characteristics that make it appropriate for different situations: Litigation: Adversarial Process: Litigation is an adversarial process where parties present their case to a judge or jury in a court of law. Each party advocates for its own position, and the judge or jury makes a binding decision based on the evidence presented and applicable law. Formal Rules and Procedures: Litigation follows formal rules and procedures set out by the court, including rules of evidence and civil procedure. These rules provide structure and ensure fairness in the resolution process. Legal Representation: Parties in litigation typically have legal representation, such as solicitors and barristers, who advocate on their behalf and navigate the complexities of the legal system. Binding Decision: The decision reached in litigation is binding on the parties involved and can be enforced through court orders. Appeals may be available in certain circumstances, but generally, the decision is final. Arbitration: Adjudicative Process: Arbitration is a quasi-judicial process where an impartial arbitrator or panel of arbitrators is appointed to resolve the dispute. The arbitrator(s) listen to both parties, consider evidence, and render a decision, which is binding on the parties. Flexibility: Arbitration offers parties more flexibility in choosing the procedures, rules, and arbitrators to govern the process. This flexibility allows parties to tailor the arbitration to their specific needs and preferences. Confidentiality: Arbitration proceedings are often confidential, which can be beneficial for parties seeking to keep sensitive information out of the public domain. Enforceability: Arbitration awards are generally enforceable through the courts, both domestically and internationally, under the New York Convention on the Recognition and Enforcement of Foreign Arbitral Awards. Mediation: Facilitative Process: Mediation is a voluntary and confidential process where a neutral third party, the mediator, assists the parties in reaching a mutually acceptable agreement. The mediator facilitates communication, identifies underlying interests, and helps parties explore options for resolution. Informal and Non-binding: Unlike litigation and arbitration, mediation is informal and non-binding. Parties have control over the outcome and can choose whether or not to accept any proposed settlement. Preserves Relationships: Mediation can help preserve relationships between parties by fostering open communication and collaboration. It allows parties to address underlying issues and find creative solutions that meet their interests. Cost and Time Efficiency: Mediation is often faster and less expensive than litigation or arbitration, as it avoids lengthy court proceedings and discovery processes.
1,172
Acing the SQE/Dispute Resolution/Resolving a dispute through a civil claim. Resolving a dispute through a civil claim. preliminary considerations: limitation, pre-action protocols. Limitation: There are time limits for bringing a civil claim, known as the limitation period. The limitation period varies depending on the type of claim, but in most cases, it is six years from the date of the event that caused the dispute. It's important to be aware of the limitation period and ensure that the claim is brought within the prescribed time limit. Pre-action protocols: Before issuing a claim, parties are expected to follow the relevant pre-action protocol. The pre-action protocol sets out the steps that parties should take before commencing proceedings, including exchanging information and attempting to resolve the dispute through negotiation or alternative dispute resolution (ADR). Failure to comply with the pre-action protocol may result in cost sanctions. parties and causes of action. In England and Wales, a dispute can be resolved through a civil claim in court. The parties involved in a civil claim can include individuals, businesses, organizations, and government bodies. The party bringing the claim is known as the claimant or plaintiff, while the party defending the claim is known as the defendant. There are many different causes of action that can give rise to a civil claim in England and Wales. Some common causes of action include: Breach of contract: When one party fails to fulfill their obligations under a contract, the other party may bring a claim for breach of contract. Negligence: When one party owes a duty of care to another party and breaches that duty, resulting in damage or loss to the other party, the injured party may bring a claim for negligence. Defamation: When a person makes a false statement that harms another person's reputation, the injured party may bring a claim for defamation. Trespass: When a person enters another person's property without permission, the owner of the property may bring a claim for trespass. Breach of fiduciary duty: When a person who owes a fiduciary duty to another person breaches that duty, resulting in harm or loss to the other person, the injured party may bring a claim for breach of fiduciary duty. Nuisance: When a person's use or enjoyment of their property is interfered with by another person, the affected party may bring a claim for nuisance. These are just a few examples of the many causes of action that can give rise to a civil claim in England and Wales. The appropriate cause of action will depend on the specific facts of each case. In order to bring a civil claim in England and Wales, the claimant must file a claim form with the court and serve it on the defendant. The defendant will then have an opportunity to respond to the claim, and the case will proceed through the court system. Ultimately, the court will make a decision on the merits of the case, based on the evidence presented by both parties. calculating limitation periods for claims in contract and tort. For claims in contract, the limitation period is usually six years from the date of breach of contract. This means that a claim for breach of contract must be brought within six years of the date when the breach occurred. However, in some cases, the limitation period may be extended to 12 years if the contract is executed as a deed. For claims in tort, the limitation period is usually six years from the date when the cause of action accrued. This means that a claim for tort must be brought within six years of the date when the damage occurred, or the claimant became aware of the damage. However, in some cases, the limitation period may be shorter. For example, the limitation period for personal injury claims is three years from the date of the accident or injury. It's important to note that limitation periods can be complex and depend on the specific circumstances of each case. In some cases, the limitation period may be extended or suspended, for example, if the claimant was under a disability or the defendant fraudulently concealed the cause of action. It's therefore important to seek legal advice to determine the limitation period that applies to a particular claim. In summary, the limitation period for claims in contract is usually six years from the date of breach, while the limitation period for claims in tort is usually six years from the date when the cause of action accrued. However, the limitation period can vary depending on the specific circumstances of each case, and it's important to seek legal advice to determine the appropriate limitation period for a particular claim. principles and purpose of pre-action protocols governing particular claims and consequences for failure to follow their terms. In English civil litigation, pre-action protocols are sets of rules and procedures that govern the conduct of parties before commencing formal legal proceedings. The purpose of pre-action protocols is to encourage the early resolution of disputes, reduce costs, and promote efficient use of court resources. The principles underlying pre-action protocols include the duty of parties to communicate with each other in a timely and constructive manner, to exchange information relevant to the dispute, to explore alternative methods of dispute resolution, and to avoid unnecessary litigation. There are various pre-action protocols that apply to specific types of claims, such as personal injury, construction disputes, professional negligence, and debt claims. Each protocol sets out the specific steps that parties should take before commencing legal proceedings, such as exchanging letters of claim and response, providing relevant documents, and attending pre-action meetings. If a party fails to follow the terms of a pre-action protocol, there may be consequences in terms of costs and case management. For example, a court may order the defaulting party to pay costs incurred as a result of their failure to comply with the protocol, or may stay or strike out the claim altogether. It is therefore important for parties to be aware of and comply with the relevant pre-action protocols to avoid these potential consequences. applicable law: mechanisms to determine which country’s laws apply to a contractual or tortious claim issued in the courts of England and Wales. In England and Wales, the applicable law in contractual and tortious claims is determined by the rules of private international law, which are commonly referred to as "the conflict of laws." The conflict of laws rules provide a framework for determining which country's laws should be applied in a case where there is a foreign element involved. For contractual claims, the applicable law is determined by the Rome I Regulation, which is a European Union regulation that governs the law applicable to contractual obligations in civil and commercial matters. The regulation sets out a number of rules to determine which country's law should apply, based on various factors such as the place of performance of the contract, the nationality or habitual residence of the parties, and the governing law chosen by the parties in the contract. In tortious claims, the applicable law is determined by the Rome II Regulation, which is another EU regulation that governs the law applicable to non-contractual obligations in civil and commercial matters. The regulation sets out a number of rules to determine which country's law should apply, based on various factors such as the country in which the damage occurred, the country in which the event giving rise to the damage occurred, and the country where the parties are domiciled or habitually resident. In cases where there is no clear connection with any particular country, the court may apply the common law rules of private international law to determine the applicable law. These rules include the principle of closest connection, which involves considering various factors such as the place of the relevant conduct and the nationality or domicile of the parties to determine which country's law has the closest connection to the dispute. Overall, the determination of the applicable law can be a complex and fact-specific process, and it is important for parties to seek legal advice to ensure that they are aware of their rights and obligations under the relevant laws. jurisdiction: mechanisms to determine jurisdiction over an international contractual or tortious claim. In English civil litigation, determining whether a court has jurisdiction over an international contractual or tortious claim involves a number of mechanisms. These mechanisms include the application of the Brussels I Regulation (recast), which is a European Union regulation that governs jurisdiction and the recognition and enforcement of judgments in civil and commercial matters. Under the Brussels I Regulation, a defendant can be sued in the courts of the Member State where they are domiciled. This is known as the principle of domicile jurisdiction. If the defendant is not domiciled in an EU Member State, jurisdiction may be determined by other factors, such as the place where the contract was performed or the place where the harmful event occurred. In addition to the Brussels I Regulation, the English courts may also apply common law principles to determine jurisdiction. This involves considering various factors such as the connection of the dispute to England and Wales, the convenience of the parties and witnesses, and the availability of an alternative forum. Furthermore, parties may agree on the jurisdiction of a particular court in their contract. In this case, the English courts will generally uphold the parties' choice of jurisdiction, unless there are exceptional circumstances that would make it unreasonable to do so. Once a court has been determined to have jurisdiction, it will have the power to hear and determine the dispute. However, the court may also stay the proceedings if it is more appropriate for the dispute to be heard in another jurisdiction. Overall, determining jurisdiction over an international contractual or tortious claim in English civil litigation involves a careful analysis of various factors and the application of both EU and common law rules. Parties should seek legal advice to ensure that they understand their rights and obligations under the relevant laws.
2,128
Guitar/Chord changes from G to D. Original page translated by Google = The chord change from D to G = Audio example: From G to D. Now the whole thing goes backwards again: Audio example: Once again: Which trick or learning aid works best for you ultimately depends on the individual, of course. But it is worth using all the tools available to help you memorize a chord sequence or teach it to others. This makes use of the learning psychology phenomenon: the more senses are addressed, the easier it is to learn. Pay attention to the opening. Here too, pay attention to which word is emphasized first. Only then does the actual bar begin (i.e. the "1" of the beat pattern).
163
Songbook/Sloop John B. = Sloop John B. = The original text is about two drunken passengers arguing and longing for port. The ship's name "John B." presumably refers to Captain John Bethel, one of the first Welsh settlers on Eleuthera-Bahamas. In addition to covers by the Kingston Trio, Johnny Cash and many others, the Beach Boys' version became particularly popular. <score sound="1" raw="1"> \version "2.20.0" \header { title = "Sloop John B." subtitle = "easy to play" % poet = "Texter" composer = "anonym: vor 1917" % arranger = "arr: ccbysa: Wikibooks (mjchael)" myKey = { \clef "treble" \time 4/4 \tempo 4 = 140 %%Tempo ausblenden \set Score.tempoHideNote = ##t \key d\major %% Akkorde %% 4/4-Schlag %% 1 . 2 . 3 . 4 . %% Lagerfeuerschlag %% 1 . 2 + . + 4 . %% Lagerfeuerschlag mit sus4 myChords = \chordmode { \set Staff.midiInstrument = #"acoustic guitar (nylon)" %% Akkorde nur beim Wechsel notieren \set chordChanges = ##t \partial 4 s4 \myD \myD \myD \myD \myD \myD \myA \myA \myD \myD \myG \myG \myD \myA \myD \myD %d,1 %Schlusston myChordsSus = \chordmode { \set Staff.midiInstrument = #"acoustic guitar (nylon)" %% Akkorde nur beim Wechsel notieren \set chordChanges = ##t \partial 4 s4 \myDsus \myDL \myDsus \myDL \myDsus \myDL \myAsus \myAL \myDsus \myDL \myGsus \myGL \myDL \myAL \myDsus \myDL d,1 %Schlusston myMelody = \relative c" { \myKey \set Staff.midiInstrument = #"trombone" \relative c'{ \partial 4 a4 | fis'8 4 8 4 g | fis2. a,4 | fis'4. 8 4 g | fis2. a,4 | fis'4. 4. g4 | a4. a4( g8) fis4 | e1| r4. a,8 b4 cis | d r4 r2 | d4 8 4 e8 fis4 | g1 | g1 | fis4 8 4 d4. | r4 e8 4 d8 cis4 | d1~ | d4 r4 r2 | \bar "|." myLyrics = \lyricmode { \set stanza = "1." We | came on the Sloop John | B., My | grand -- fa -- ther and | me. A -- | round Nas -- sau | town we did | roam, | Drin -- king all | night, | Got in -- to a | fight, Well I | feel so break up, | I wan -- ta go | home. \score { % \new TabStaff { \myChords } %% Check \score { %% unterdrückt im raw="1"-Modus das DinA4-Format. \paper { indent=0\mm %% DinA4 0 210mm - 10mm Rand - 20mm Lochrand = 180mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> Accompaniment pattern (suggestion). The song can also be used for the campfire diploma without the Sus4 chords. Simply ignore all the numbers.<br> From the ballad diploma onwards you can practice some with this song.<br> The designation D4-3 is a short form for D4 - D . The Sus4 chord always occurs on the "4" of the campfire strumming pattern. The second verse in the MIDI gives you a rough impression, although the piano accompaniment with guitar sound does not exactly reproduce the guitar. Weblinks. <hr>
1,144
Songbook/When the Saints Go Marching In. = When The Saints = <score sound="1" raw="1"> \version "2.20.0" \header { title = "Oh when the saints" % subtitle = "MeinSubtitle" % poet = "Texter" composer = "trad." % arranger = "arr: ccbysa: Wikibooks (mjchael)" myKey = { \clef "treble" \time 4/4 \tempo 4 = 100 %%Tempo ausblenden \set Score.tempoHideNote = ##t \key d\major %% Akkorde %% 4/4-Schlag doppelt so schnell %% 1 . 2 . 3 . 4 . 1 . 2 . 3 . 4 . myChords = \chordmode { \set Staff.midiInstrument = #"acoustic guitar (nylon)" %% Akkorde nur beim Wechsel notieren \set chordChanges = ##t \partial 2. s2 \myD \myD \myD \myD \myD \myD \myA \myA \myD \myD \myG \myG \myD \myA \myD d,2 myMelody = \relative c" { \myKey \set Staff.midiInstrument = #"trombone" \relative c'{ \partial 2 r8 d8 fis g | a2 r8 d,8 fis g | a2 r8 d,8 fis g | a4 fis d fis | e2 r4 fis8( e) | d4. d8 fis4 a8 8 | a8 g4. r4 fis8 g | a4 fis d e | d2 \bar "|." myLyrics = \lyricmode { \set stanza = "1." Oh when the saints go march -- ing in, oh when the saints go march -- ing in, I want to be in that numb -- er, when the saints go march -- ing in. \score { \new ChordNames { \myChords % \new TabStaff { \myChords } %% Check \score { \new ChordNames { \myChords % \new TabStaff { \myChords } %% Check %% unterdrückt im raw="1"-Modus das DinA4-Format. \paper { indent=0\mm %% DinA4 0 210mm - 10mm Rand - 20mm Lochrand = 180mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> <poem> 1) Oh, when the saints go marching in Oh, when the saints go marching in Oh Lord I want to be in that number When the saints go marching in. 2) Oh, when the drums begin to bang... 3) Oh, when the stars fall from the sky... 4) Oh, when the moon turns red with blood... 5) Oh, when the trumpet sounds its call... 6) Oh, when the horsemen begin to ride... 7) Oh, when the saints go marching in... </poem>
842
Guitar/G without pinky. Side note on fingering. This article is only intended for guitar players who have already learned a little guitar and have perhaps learned a chord (especially G major) with a different fingering. Unfortunately, people who are changing their way of playing the guitar often have problems playing G major with their little finger ("I've always played it like this, why should I play it differently..."). New learners, on the other hand, have much less trouble learning G major with the little finger. For them, every chord is difficult anyway. They don't even notice that G major should be more difficult than any other chord. It does represent a small hurdle, and you may have to make do with a slightly imprecise chord for a few days, but it rarely takes more than two weeks (or two lessons) to master G major. And after three weeks you'll wonder what the problem actually was. But once you've mastered G major with the little finger, I can guarantee that you'll pass the campfire and folk diplomas. Future lessons (including melody picking, solo playing, other chords with the little finger) will also be easier because the little finger has been trained right from the start. Unnecessary mass migration with the imr-G. If you can already play the guitar a little, you may have looked in other books and noticed that the G major chord can be played in a different way. It will often happen that a book or a guitar player plays a chord differently than the one taught in this course. The G major chord can also be played without the little finger. We can only hope that no one is now thinking "Why didn't they tell you that right away, it's so much easier!" This chord may be easier to play at first, but this supposed convenience comes at a high price. If you have learned the G major chord in the slightly less elegant way (i.e. without the little finger), you should try the following: With the first, more advantageous grip change, the fingers only have to move a little. With the second, supposedly "easier" grip, however, a kind of mass migration occurs. Advantages of the G with pinky. The grips with the supposedly more comfortable fingerings may "work" for the first time, but sooner or later you will simply not be able to progress any further and will remain at a modest level because you will no longer be able to increase your own speed when changing. But even if you can change quickly enough, it will be much more difficult to follow the lessons in this course. Because a lot of things simply build on one another. Advantages of a more consistent fingering changes. Switching to other grips is in most cases more ergonomic and therefore easier, faster and smoother with the pinky-variant. There is a finger position for the middle finger and ring finger that can be found in 4 chords (and some variants): These are suitable for: In contrast, there is a second typical position of the middle and ring fingers: für die Akkorde When changing chords, a typical movement occurs: These similarities make learning the basic chords easier. Afterwards, it is also much easier to learn terms like "major third" and "fourth" because you already have them in your fingers somehow. Without any significant effort, you can learn all the notes of the C major scale with a few tricks. If you can play the 6 open strings, then you only need to know where the root note is for one of the chords mentioned above in order to have another 6 notes. Because the root note is almost always under the ring finger of the chord of the same name. (Exception: A major, but there is also the alternative fingering that is used for Switching between E A and B7 is presented in the following folk diploma. As you can see, there is nothing wrong with variations of chords in general. But not every variation that is available is ultimately cheap. Animation. You can see from this animation that many chord changes are relatively similar if you use a similar fingering for all chords. These similarities make the fingering changes much smoother for the first chords you learn. Advantages of learning the C major scale. The standard fingering helps you find all the notes on the fingerboard. For the easy you need G major with your little finger. For simple bass lines in C major, it is enough to learn one bass line and then simply transfer it to the other chords. The ring finger always stays on the 3rd fret and the middle finger stays on the 2nd fret. And so you can quickly learn part of the C major scale. In my experience, calling out individual bass notes is easier if you can quickly derive them from the chord using the "open string rule" and "ring finger rule". Advantages of the first technical exercises. If you have learned a bass run in C major, you can transfer it to the chords G major and F major without much practice. The same applies to the pull-off or It is much easier when you first learn hammering if you only have to concentrate on the middle finger. First western accompaniments are so much easier to learn I would have to forego all the learning benefits if I played a G like this: E ||---|---|-R-|- H ||---|---|---|- G ||---|---|---|- D ||---|---|---|- A ||---|-I-|---|- E ||---|---|-M-|- Advantages of switching to similar chords. Other chords can be more easily derived from the standard G: Advantages for other chords with the little finger. If you train your little finger from the beginning, it will be much easier for you to play other chords where you cannot do without your little finger (B7, E7, A7, etc.) Advantages for later melody playing. At the latest when melody picking the G major variant without a little finger proves to be a hindrance. Many pieces from melody picking and from simple classical music cannot be played with the ZMR variant of G at all. The ZMRK variant. But don't get me wrong: as long as the result is right, no fingering is actually wrong in and of itself. It may even be that for a certain effect it makes sense to deviate from a standard fingering so that other fingerings are easier to achieve. As long as a clear advantage can be achieved with one fingering, you can certainly try to learn both the one and the other fingering and use them as needed. For example, the following variant of the G major chord: I would like to save these as an alternative for later in the Ballad Diploma (Fixed Fingers), in order to combine them with chords such as Cadd9 (x32033), Dsus4 (xx0233), Em7 (022033) and/or A7us4 (x02233). But the extended chords are material for later, after you have mastered the basics. With such fingering combinations (which often only work in a single key and for a few songs), it is worth learning a variant. However, I strongly advise against preferring a finger position "just" because of its convenience, if you later have to pay for this convenience by losing speed when changing. I hope you have realized that the G major chord with the little finger has significantly more advantages overall than the variant without the little finger. It is true that you have a little more trouble getting the fingering right in the first few days. But this will also be the case later with other chords. Experience has shown that barre chords will also take a few days or weeks to get right. You should experience right from the start that the initial effort is worth it. False ambition, that everything has to work out perfectly right away, is poison for learning the guitar. If you have learned G major differently, simply learn G major with your little finger as a new chord and use it for all new songs. Many people have relearned years later because they have realized that it is worth it. I know that you can learn G in one or two days with the ZMR variant, and that you need one or two weeks for the RMK variant to really get it right. But the extra work is quickly recouped later by the many learning advantages. In my opinion, the RMK variant is far better preparation for playing the guitar than the ZMR variant. Train your little finger right from the start. And if you start taking the supposedly easier route with G major, you will also avoid other grips that seem a bit more complicated at first. But at the latest with B7 , the little finger is absolutely necessary. Not to mention the barre chords (Rock Diploma)... So why shouldn't you train your little finger right from the start? The fingerings taught in this course are well thought out, systematically structured and have proven themselves in practice, and are therefore played exactly like this by most guitar players. Anyone who still insists on playing G major without a little finger without there being a real anatomical reason (tendons between the ring finger and little finger are too closely connected) should look for another course or another teacher. back to -General rules for fingering-
2,075
Guitar/The major cadence - The great triumvirate. Original page translated by Google = The first major cadence or "The great triumvirate" = A little harmony theory. You have now learned three chords: D, A and G major. Believe it or not, you can accompany hundreds of songs with just these three chords. Many songs are played with just three major chords. The order of the chords can vary quite a bit, but within a key it is always the same three chords that you find together. Other major chords are rare in the key of D major and are then considered an exception. Typical chord progression (cadence in D major). Play the chord progression D G A D in exactly this order! This series of chord is called a D major cadence. A cadence is something like a standard chord progression that leads back to the basic chord. The D major cadence is used both for descriptions in harmony theory and for pure exercises of chords in the key of D major. It is something like a formula that represents all songs in D major that are only accompanied by the three chords D, G and A. <score sound="1" raw="1"> \version "2.20.0" \header { encoder="mjchael" myChords = \new ChordNames { \chordmode { d2 g a d d1 g a d AA_D = { 4 \downbow \downbow \downbow \downbow AA_A = { <e, a, e>4 \downbow \downbow <e, a, e> \downbow \downbow AA_G = { <g, b, d>4 \downbow <g b g'> \downbow <g, b, d> \downbow <g b g'> \downbow myRhythm = { \repeat volta 2 { 2 \downbow <g, b, d g b g'> \downbow <e, a, e a cis' e'> \downbow \downbow \mark "2x" \repeat volta 4 { \AA_D \AA_G \AA_A \AA_D \downbow \mark "4x" \score { « %layout \myChords \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm \new TabStaff { \myRhythm \score { « % midi \unfoldRepeats { \tempo 4 = 90 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" \myRhythm \paper { indent=0\mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f bookTitleMarkup=##f scoreTitleMarkup=##f </score> As soon as you get to know several songs, you will probably find out for yourself which major chords usually appear together and which major chords are rarely or almost never found together. In the circle of fifths, which you will get to know better sooner or later, the major chords that are often found together are arranged nicely next to each other as neighbors, as shown in the diagram above. A few more minor chords are added later, but even then the triumvirate of the major cadence is usually retained. Of course there are a few exceptions, but most of the songs we know in Western Europe stick to this simple division into a group of three. The three functions of major chords. The calm tonic. is the root chord and also indicates the key of the entire piece of music. Unfortunately, you can't rely on it 100%, but a piece usually begins and ends with this basic chord. As a mnemonic, remember: "The tonica indicates the ton."; and that a song should at least end with the tonic. Of the three chords you have learned so far, the tonic is always D major. So always start and end your dry runs with D major. The basic chord is almost always a kind of calming influence in the piece of music. How you change in between doesn't really matter. The main thing is that you come back to the basic chord D major. D is the first note in the D major scale, and therefore the D major chord is said to be on the first degree of the scale, just like the note D. The tension-filled dominant. It is typical for a cadence (formulaic chord sequence) that one of the three chords is responsible for the tension. Here in the D major key it is the A major chord. If you pay attention when singing, you will notice that the melody progression in the dominant is often a little more tension-filled than in the other two chords. This might help you if you want to learn your songs by heart. The tension of the dominant can be increased even further if it is played as a 7th chord. So as an A7. The A7 is actually quite easy to play (you just need to raise your middle finger), but until we learn and use the A7, remember the following: So if an A7 appears in your songbook, don't spend a long time looking around in a fingering chart, just play an A major. Whether the piece would sound better with A7 is another matter. For now, it's enough to just leave out the numbers (this will help you find a few more songs in your songbook straight away). But don't worry, you'll get to know all of the 7th chords. They'll just be pushed back a little. A dominant or a dominant seventh chord (7th chord) triggers a tense auditory impression that we're used to resolving back to the base chord, i.e. the tonic. A is the fifth note in the D major scale (D E F# G A), and therefore the A major chord is said to be on the fifth degree of the D major scale, just like the note A. The forward subdominant. G major is the third in our small chord sequence. As a subdominant, it connects the calm basic chord (tonic) with the tension-filled dominant. It doesn't matter whether G major forwards from D major to A major, or whether G forwards from A back to D. The subdominant (G major) is not as tension-filled as the dominant (A major), but also not quite as calm as the tonic (D major). It doesn't normally want to be resolved, but only forwarded. This chord has something floating and driving about it. G is the fourth note in the D major scale (D E F# G), and so it is said that the G major chord, like the note G, is on the fourth degree of the D major scale. Chord degrees. The three chords D, A and G belong to the D major scale. <score sound="1"> \relative c' { \clef treble \key d \major d2 e4 fis g a b cis d1 \break d2 cis4 b a g fis e d1 } \addlyrics { "D = 1" "E = 2" "F# = 3" "G = 4" "A = 5" "H = 6" "C# = 7" "D = 8 = 1" "D = 8 = 1" "C# = 7" "H = 6" "A = 5" "G = 4" "F# = 3" "E = 2" "D = 1" </score> Chord levels are usually indicated with Roman numerals. <score sound="1" raw="1"> \version "2.20.0" \header { % title = "MeinTitel" % subtitle = "MeinSubtitle" % poet = "Texter" % composer = "Komponist" % arranger = "arr: ccbysa: Wikibooks (mjchael)" myKey = { \clef "treble" \time 4/4 \tempo 4 = 100 %%Tempo ausblenden \set Score.tempoHideNote = ##t \key d\major %% Akkorde myChords = \chordmode { \myKey \set chordChanges = ##t d2 e4:m fis:m g a b:m cis':dim d'1 \break d'2 cis'4:dim b:m a g fis:m e:m d1 myMelody = \myChords myLyrics = \lyricmode { "I" "II" "III" "IV" "V" "VI" "VII" "VIII = I" "VIII = I" "VII" "VI" "V" "IV" "III" "II" "I" \score { % \new TabStaff { \myChords } %% Check %% unterdrückt im raw="1"-Modus das DinA4-Format. \paper { indent=0\mm %% DinA4 0 210mm - 10mm Rand - 20mm Lochrand = 180mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> Don't worry, you don't have to be able to read music yet. You just need to know how the chord degrees come about. However, even a minimal knowledge of music is helpful. If you have a songbook with music notes in front of you, such as, you can look for all the songs whose musical notation has two sharps. Then look at the chords above the notes. If there is an E minor (Em or e) then you will have to wait two more lessons. If there is a B minor (Hm, h in English songs also Bm or b) or an F sharp minor (F#m, f#) then the songs are not for you yet. We'll save the chords for the . But many songs are played with the three major chords D, G and A (A7). If you know the lyrics and the melody, you can try to play these. Paying attention only to the two ## (or one # in the next lesson) makes it easier to find songs that you may already be able to play. Audio examples. The vocabulary itself often puts even experienced guitarists off. And yet this vocabulary is not much more difficult than the math vocabulary "addition, subtraction, division, multiplication" or the grammar vocabulary "noun, verb, adjective". There is actually not that much to it. You just have to make sure that the vocabulary is not dry, but that you also associate an auditory impression with the vocabulary. And to do this, you absolutely have to play the following explanatory examples. Then you will simply hear what is being talked about here. The subdominant leads on. If the chord G major (subdominant) is heard in the key of D major, you can easily go back to the basic chord D major (tonic). The subdominant doesn't really care whether it goes back or on to A major. Perhaps you can remember as a mnemonic that the subdominant is "subordinate" to the other two chords. "Sub" means "below" - in this case the "lower dominant", because it is one step below the dominant. D=1, E=2, F#=3, G=4, A=5... Or also because it comes before and not after the tonic in the circle of fifths (which you will learn more about later). G D A ... (goes down and ends...) <score sound="1" raw="1"> \version "2.20.0" \header { encoder="mjchael" myChords = \new ChordNames { \chordmode { d1 g d s AA_D = { 4 \downbow \downbow \downbow \downbow AA_A = { <e, a, e>4 \downbow \downbow <e, a, e> \downbow \downbow AA_G = { <g, b, d>4 \downbow <g b g'> \downbow <g, b, d> \downbow <g b g'> \downbow myRhythm = { \repeat volta 4 { \AA_D \AA_G \AA_D 1 \downbow \mark "4x" \score { « %layout \myChords \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm \new TabStaff { \myRhythm \score { « % midi \unfoldRepeats { \tempo 4 = 90 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" \myRhythm \paper { indent=0\mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f bookTitleMarkup=##f scoreTitleMarkup=##f </score> You don't need to be able to read tablature yet. That comes a little later when you're plucking. This is nothing other than the chord sequence D major, G major and D major again, whereby each chord is accompanied for exactly one bar by the 4/4-pattern. It therefore corresponds exactly to the following beat pattern. But if you're already interested in how to read a tablature, then take another look at the chapter in the introduction. It's described there. The two chords could also be played one after the other for a while... <score sound="1" raw="1"> \version "2.20.0" \header { encoder="mjchael" myChords = \new ChordNames { \chordmode { d1 g AA_D = { 4 \downbow \downbow \downbow \downbow AA_A = { <e, a, e>4 \downbow \downbow <e, a, e> \downbow \downbow AA_G = { <g, b, d>4 \downbow <g b g'> \downbow <g, b, d> \downbow <g b g'> \downbow myRhythm = { \repeat volta 8 { \AA_D \AA_G \mark "8x" \score { « %layout \myChords \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm 1 \downbow \new TabStaff { \myRhythm 1 \downbow \score { « % midi \unfoldRepeats { \tempo 4 = 90 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" \myRhythm 1 \downbow \paper { indent=0\mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f bookTitleMarkup=##f scoreTitleMarkup=##f </score> The dominant pushes towards the tonic. We have already seen enough songs in the first lesson that are accompanied exclusively by the tonic D and the dominant A. As soon as A major appears as the dominant, you get the impression that there has to be an end (or at least a stopover). Perhaps you can remember as a mnemonic that the dominant dominates the action. The dominant says: "Now it's over!" D - G - D - G - A - D <score sound="1" raw="1"> \version "2.20.0" \header { encoder="mjchael" myChords = \new ChordNames { \chordmode { d1 g d g a d AA_D = { 4 \downbow \downbow \downbow \downbow AA_A = { <e, a, e>4 \downbow \downbow <e, a, e> \downbow \downbow AA_G = { <g, b, d>4 \downbow <g b g'> \downbow <g, b, d> \downbow <g b g'> \downbow myRhythm = { \repeat volta 4 { \AA_D \AA_G \AA_D \AA_G \AA_A 1 \downbow \mark "4x" \score { « %layout \myChords \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm \new TabStaff { \myRhythm \score { « % midi \unfoldRepeats { \tempo 4 = 90 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" \myRhythm \paper { indent=0\mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f bookTitleMarkup=##f scoreTitleMarkup=##f </score> As soon as A major (the dominant) sounds, you expect the end. It doesn't matter whether there is a G major in between. G major (the subdominant) can delay this end a little, but since you have heard the dominant A major before, you definitely want to go back to the basic chord. D - G - D - G - A - "G" - D <score sound="1" raw="1"> \version "2.20.0" \header { encoder="mjchael" myChords = \new ChordNames { \chordmode { d1 g d g a g d AA_D = { 4 \downbow \downbow \downbow \downbow AA_A = { <e, a, e>4 \downbow \downbow <e, a, e> \downbow \downbow AA_G = { <g, b, d>4 \downbow <g b g'> \downbow <g, b, d> \downbow <g b g'> \downbow myRhythm = { \repeat volta 4 { \AA_D \AA_G \AA_D \AA_G \AA_A \AA_G 1 \downbow \mark "4x" \score { « %layout \myChords \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm \new TabStaff { \myRhythm \score { « % midi \unfoldRepeats { \tempo 4 = 90 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" \myRhythm \paper { indent=0\mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f bookTitleMarkup=##f scoreTitleMarkup=##f </score> You're finally happy to be back in D major. The dominant as a stopover. It often happens that a verse ends with the tension-filled dominant (A major). The end is withheld, although we expect it. The section ends, but you have the impression that it has to continue somehow. Such an incomplete part then sounds comparatively like a "yes, but" - D - G - D - G - A - A (incomplete)</br> D - G - D - G - A - D (end) The next verse, the next verse or the chorus is already prepared with the dominant as an incomplete end. The resolution of the dominant (A major) therefore occurs with the first bar (tonic D major) of the next verse. The actual end then comes a little later. Either in the next verse or, if you're unlucky, the actual final chord comes right at the end of the song. <score sound="1" raw="1"> \version "2.20.0" \header { encoder="mjchael" myChords = \new ChordNames { \chordmode { d1 g d g a s d1 g d g a d AA_D = { 4 \downbow \downbow \downbow \downbow AA_A = { <e, a, e>4 \downbow \downbow <e, a, e> \downbow \downbow AA_G = { <g, b, d>4 \downbow <g b g'> \downbow <g, b, d> \downbow <g b g'> \downbow myRhythm = { \repeat volta 4 { \AA_D \AA_G \AA_D \AA_G \AA_A 1 \downbow \break \AA_D \AA_G \AA_D \AA_G \AA_A 1 \downbow \mark "4x" \score { « %layout \myChords \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm \new TabStaff { \myRhythm \score { « % midi \unfoldRepeats { \tempo 4 = 90 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" \myRhythm \paper { indent=0\mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f bookTitleMarkup=##f scoreTitleMarkup=##f </score> The cadence as a learning aid. Many verses and verses of a song are divided into manageable sections of meaning by the tonic-subdominant-dominant division. Even if you don't hear it right from the start, it is advisable to pay attention to these "functions" of the chords. The melody becomes more suspenseful: aha, a dominant is coming. The melody progression is continuous, floating: aha, the subdominant. We have arrived at a starting or landing point in the melody (and take a short break): aha, the tonic. Exercise. You often make mistakes, especially at the beginning, and that's completely normal. But with the simple songs with 3 chords, there are actually only 2 ways to proceed. You just try out one chord, and if it doesn't fit, you just use the other one. You'll soon notice that you're making fewer and fewer mistakes. And after more or less time, you'll just hear what's coming (at least with the simple songs with 3 chords). Even if it doesn't always work right away, it's still amazing that guitar students aged 10 to 13 were often able to do it after the fourth or fifth lesson. They could hear what kind of chord had to follow in simple songs. Admittedly, the hit rate was more like 80% to 90%. But with a 50/50 chance, that's still a good result! The students even outperform some guitar players with several years of playing experience who have never heard of the "functions" of chords. You just have to know what to look out for. Or as my teacher used to say: You only see (or hear) what you know. <hr>
6,175
Transportation Planning Casebook/F6-M6 in NSW. Summary. The M6 (formerly known as the F6 extension) is a planned motorway which connects Sydney to the Illawarra Region. The M6 has a total of three stages, with the first stage currently under construction, and stage 2 and 3 yet to be approved. Stage 1 a four-kilometre-long twin motorway tunnel, which will connect to the M8 motorway (formerly known as the New M5 Motorway) in Arncliffe with President Avenue in Kogarah. The M6 was first proposed in the 1950’s as part of a wider Sydney study which highlighted the need for a strong south link. Due to political aspects, the project remained under ground for quite some time, till it became a talking point in the 2000s. With the start of the new Liberal movement in 2012, the F6 became a strategic priority. The route alignment which would be proposed in 2017 would follow the same route as the initial planned freeway in 1951. The M6 plays great significance in the network as it's positioned to be one of few public funded toll roads in recent years. Policy issues. Net Zero. The NSW government, and by extension organizational bodies, have set Net Zero goals. A significant contributor to emissions is transport, contributing to 24 per cent of all emissions. Of this 24 per cent, light vehicles (private or commercial) contributed 66 per cent. Most notable to transport, TfNSW has outlined the goal to reduce emissions from the transport sector to 0 by 2050.   The M6 (in its entirety as well as Stage 1) is a significant project which will incur significant costs. Stage 1 is projected to cost $3 billion, with the entire M6 estimated to be around $10.8 billion. While the project is expected to generate time savings (and thereby emission savings because of petrol savings in reduction of vehicle standby), the project is also expected to lead to induced demand and an increase in vehicle use.   The investment in the M6 does not match up with environmental priorities set out by the Government. Funding. Funding for the M6 has been achieved via both public funding, making it one of the first public funded toll roads in recent years. The M6-Stage 1 is proposed to have toll rates of: Narrative. Early Planning. Cumberland County Plan (1948). The Cumberland County Plan (CCP) was officially released in 1948 and officially adopted in 1951. The purpose of the plan was to consider more appropriate and efficient uses of land for the region of Sydney, which was comprised of 68 shires and municipalities and the City of Sydney. The plan set out not only land use, but proposed transportation across the region. A key point to highlight is the relevancy of the post war on the planning which transpired. With the rapid population growth and economic expansion after the war, updates to the transportation network were required. And with the emergence of private vehicles as the favoured transportation mode, naturally connected road networks were the focus of any transport planning by the CCP. As part of the CCP, a high-level road network was proposed. Relevant to the case study, a southern expressway, connecting the regions of Sydney CBD and Wollongong. Corridor Reservation. As a follow-up to the CCP, a series of corridors were reserved. This includes the road corridor from Loftus to St Peters, relevant to the M6 extension. Sydney Area Transportation Study (SATS) (1974). Other documentation supporting the Southern Freeway was the SATS. The study highlighted strong demand volumes from the CBD down south (via Sutherland). Future Motorway in Trouble. 1977 - Neville Wran. The proposal for the F6 Southern Freeway, originally planned to connect Ultimo to Wollongong, was abandoned as part of a political pre-election promise to stop the construction of freeways in inner city areas. This political will not only stopped the construction of the F6 (in its totality) but also put a hold on other notable road projects (Warringah Freeway F1, Gorehill Freeway F2, Western Freeway F4, and Eastern Freeway F7). In addition to the cancelled freeway, the road corridor which had previously been reserved as part of the Cumberland County Plan was also altered. Changes included the removal of the city portion, which included space from the City’s CBD to Huntley Street, (Alexandria), with the remainder of the corridor staying intact. 2002 – Public Transport Corridor. In September 2002, then Transport Minister Carl Scully announced a shift from the planned F6 freeway extension to promoting public transport and recreational use along a 20-kilometer corridor from St Peters to Loftus. This further marked a departure from road expansions, as the area reserved since 1951 would now focus on innovative transport solutions like light rail and bus-only roads while preserving green spaces. Political scuffle. Back on the menu – 2005. In 2005, the debate over the F6 Motorway extension was reignited by Roads Minister Michael Costa, despite his predecessor Carl Scully's decision to halt the project in favour of public transport alternatives. Paul McLeay, the Member for Heathcote, supported the NRMA's survey to assess the project's benefits, advocating for the extension as a crucial link for the Illawarra and Sutherland Shire residents. This move suggested a potential reversal of Scully's earlier plans, emphasizing ongoing conflicts within the government and between different stakeholders regarding Sydney's transport infrastructure priorities. State Election – 2007. Leading up to the NSW state election, talks around the F6 extension would restart. While Michael Costa highlighted the project in 2005, no new development on the F6 occurred. With no firm positions held by the state parties, discussions for the F6 were brought to light by local MPs and external parties (NRMA and Tourism and Transport Forum (TTF)). NRMA’s push for the F6 found support within the Liberal Party, with Miranda Candidate Graham Annesley. The (Miranda) Labour opposition was adamantly against the F6 extension, due to potential of increased traffic on local roads. Labor wins – limbo (2007 – 2011). After Labour’s win in 2007, the F6 was shelved. During this period, there was no state budget allocation to the planning or study of the F6.   In 2010, Scott Morrison, now former Australian Prime minister, at the time Shadow Minister, highlighted the need for the F6 extension and the failure of the Labour party to deliver it. Back on the Menu. With the Coalition Government back at the helm after a 16-year absence (last held in 1995), the F6 was quickly reintroduced as a major project. The liberal party issued two key documents within a short period of time, which would highlight the F6 as a key strategic project which would bring major improvements to the network. The State Infrastructure Strategy 2012 – 2032. The State Infrastructure Strategy (SIS) is a 20-year strategic infrastructure plan which sets out future initiatives and opportunities to address infrastructure challenges and enhance productivity, living standards, and economic growth. The plan is updated every 4 years to maintain a relevant focus on the required infrastructure.   The strategy had the F6 officially added to the project agenda, with plans to roll it out within a timeframe of 10 to 20 years. This F6 extension would be between Sydney Airport and the locality of Waterfall. Note that, in the project's framing, the strategy highlights that it could be accelerated if the private sector provided financing. The plan scoped the project to cost $3 billion, assuming all work was done above ground. It was also assumed that two thirds of the funding would be contributed by user funding. NSW Long Term Transport Master Plan 2012. The Master Plan was the first comprehensive transport plan developed by the Liberal government in New South Wales after they came into power in 2011. The plan aligned with the SIS, which was issued a few months prior.   A key gap identified in the plan is the missing sections in the motorway network, particularly the F6 which does not provide access to the network from the south.   This plan would be the first to reference the alignment the extension of the F6, which outlined the connection between Loftus and St Peters. State budget 2014 - 2015. The F6 extension would receive its first set of funding in the 2014-2015 budget of $10 million for a feasibility study. Planning and Approval. Route Alignment. While planning was being done in the background, the official announcement for the F6 extension came in October 2017 as part of the 2056 Future Transport Strategy. The route alignment assessed four different routes, which included: Planning found that the F6 corridor would be most suitable. Economic Benefits. As per the 2018 business case, the project was found to have a benefit to cost ratio of 1.56. BCRs for the release of the different amounts of the F6 reserved corridor were also assessed as a comparison. All BCR’s returned values greater than 1, with the most conservative assumption returning a BCR of 1.2. The benefits of the project have been assessed over a 30-year operational period. The residual value of assets with a lifespan greater than 30 years has been valued at $88 million and included within the calculation of transport benefits. Controversy. While there has been opposition to the M6, it has not amassed the same level of controversy as the WestConnex. Protests regarding the M6 have been seen on the local level as well as incorporated in larger protests against toll roads in Sydney. Protests for stage 1 have mostly been in regard to induced demand, citing that the extension will increase the amount of traffic on local roads. In addition to the wary concerns of locals, there has been political controversy regarding the beneficiary of M6. While the project will bring economic benefit (as seen through the business case) to Sydney, it should also be highlighted that owner of WestConnex (a consortium of private investors, most notably Transurban) will also benefit. With the M6 not connecting on the Genral Holm Drive, it provides users limited opportunities to leave the toll road eco-system, thus generating additional revenue for toll collectors. Construction. Start. Construction of the M6 Stage 1 began in November 2021. The project was awarded to a joint venture between CPB Contractors, UGL, and Ghella. To date. As of April 24, over 70% tunnel excavation across the project alignment. Trouble in paradise. On the 1st of March 2024, excavation works at the tunnels near West Botany Street halted due to the formation of sink holes. The factory located 16-metres above the tunnels experienced a partial collapse. Later that month, on the 9th of March, another subsidence event occurred near the south-bound tunnel, approximately 12m from the surface.   Since these events, the CGU joint venture has paused all tunnelling work in the affected areas while assessments are conducted. Geotechnical and engineering evaluations are underway to understand the subsidence and its implications on the project timeline. Future. Stage 1. Stage 1 of the M6 from WestConnex at Arncliffe to President Avenue, Kogarah is due for completion in 2025. Stage 2 and 3. Stage 2: President Avenue to Tarren Point and Stage 3: Tarren Point to Loftus have no available timeline, funding commitment, or planning approval.   A large factor in the delay to these projects is the current market constraints and labour shortages.
2,790
Quantum Graphs. This is a book devoted to the spectral theory of Schrödinger operator on metric graphs (also known as "quantum graphs"). Every theoretical concept is to be illustrated by studying in detail several examples. The exposition is to be kept as elementary and accessible as possible.
61
Number Theory/Powers modulo 19. The following table shows the powers of integers modulo 19.
27
Patsho/Sei. Introduction. The sei(wordplay or pun) is an old tradition that existed since the establishment of the villages across the region. It is closely identical with Paronomasia or Malapropism (also called a malapropism, sexologist, or Dogberryism). It became popular during the 80s and 90s and continues to exist till today. But the norms have changed in accordance with the compelling alternate present situation. Significance. It is a form of sentence that interestingly rhymes, used by a group of people from a village against the opponent village. Ostensibly, the infelicity in this culture is inevitable, debated to champion over other villages. It is quite invective when stated by a village against others that the rivalry village could not sit idle without a response to win over. History. The idea that the Sei was developed to triumph over the opponent village is somehow culturally rooted. To exemplify, the statement “Ei Patsho hai mo, vi-ie kü le mo”, is indeed the most significant message of proving bravery against other villages. It translates to, “I am from Patsho, equally skilled to confront” which is a statement of unintimidated nature over dangers. Such culture came into existence as the by-product of the nature of headhunting practice, where warrior tradition is overwhelmed. To affront the neighboring village, the statement “Asa tü pingha, jüsa tü lai shua”, is allusively crafted to subdue the opponent group. It indicates the weak nature of the opposer but formidableness of the other. “You are the tail of the spear, we are the head of the spear” , is indeed a daunting message for the adversaries. Conclusion. The pure Sei tradition may cease to exist due to an obsolete form of society where engaging in war was an everyday norm. But the alternate form of Sei tradition is live, filled with excitement and joy, usually performed during occasions for entertainment purposes. Some statements and words are from ancestors still carried on verbally and may be intimidating for the antagonist.
486
Patsho/Pou (Morung). Introduction. Beside the inheritance of rich culture and custom, the Morung(dormitory), a grand building was primarily the cornerstone of the village life. It was practically the educational institution of the young children and adult members of the village. Significance. It was a home of the menfolk, where the elders propagated the spirit of patriotism, social etiquette and decorum, self-reliance, humility, unity and so on. It was a center of social, religious and political activities. Similarly, it was also a guard-house against the enemies. Rituals associated with Morung. Seemingly, several rituals were consistently performed inside and outside the Murong in the ancient days. Such rituals have become obsolete in the present day. The conception that performing such rites fulfills the needs of individual and social commitments in daily life. Conventional Methods and Superstitions. In the village, meetings were held in the Morung and the discussion and records of these gatherings were kept secret from the womenfolk. This paves the way to keep the secrets limited to a group of higher authority in the community. Thus, making sure that the security was highly maintained against enemy access. The night before a group of headhunters moved out to raid villages, they would sleep in the Morung for that particular night. In this time frame, men were supposed to avoid eating meals cooked by women in beliefs that their enemies would slay them in the battlefield. Moreover, these warriors in the post-war would again sleep over the night in the Morung as a way of redefining oneself and ready to settle a normal life. Bamboo raised platforms. In those days women were neither allowed to enter the Morung nor on the raised bamboo platforms as people believed that it caused the death of menfolk in large numbers. Log Drum/Slit Drum. Log drums of the Khiamniungans are huge enough to produce a loud tremendous sound which can easily be heard by the entire village. The size of these drums is enough for several people to sit inside in a row. These were carved far away from the village. It requires hard work, skills and months to complete the ordeal. But once it is completed, the elders in the village would command the entire menfolk to drag them to a village together. Once it is brought, this drum is finally kept inside the Morung against the side of the wall. In the traditional village society, these drums were beaten to signal the dangers and rare happenings and especially to warn the presence of enemies and also to keep all those who are in the line of duty more vigilant. Person(s) skilled in beating the drum were more favorable for it produces rhythmic and dulcet sounds which really resonate with the listeners. Either a single person or in a group can beat the drum in a manner that is synchronized or metachronous but should produce musical and exhilarating sound. Though the Log drum is still prevalent in the village, the significance of its use is vanishing and disappearing. The physical structure may dissipate but the image and features is worth eternal Conclusion. Perhaps Morung(Pou) was an inevitable part of the tribal society, its significance lives only in the minds of the people as a great reward of their forefathers. There are no more gatherings inside the Morung, no more education being imparted, no more securities against enemies but living in peace and tranquility of an excitingly shared-culture and highly globalized world. All these have merely become a part of the memories that can be reflected through thoughts, images and can only keep the practice living through imitation and transmission forever more.
820
Chess Opening Theory/1. e4/1...e5/2. Nf3/2...Nc6/3. Bb5/3...a6/4. Ba4/4...Bc5/5. Nxe5/5...Qg5. This move pressures e5 and g2, but Ng4! covers g2 and knight is not on e5
87
Transportation Planning Casebook/Metronet Western Australia. Summary. Metronet is one of the largest infrastructure construction projects undertaken by the Western Australia government for the extension of railway lines. Around 72km new passenger rail line is proposed along with 23 new stations and is said to develop 8000 hectares of land around the stations for housing, work, and recreation. The total cost of the project according to data from the 2023-2024 WA Budget projects a cost of 10.5 billion AUD, an overall increase from the Labour Governments' 2.5 billion AUD projections in 2017. The main objective of Metronet is to promote economic growth by creating greater accessibility to Perth. The introduction of Metronet project has generated jobs in the rail manufacturing in Western Australia for the first time in approximately 30 years, trains will be created and engineered in Western Australia. Metronet also aims to implement three main strategies (Gnarla Biddi Aboriginal Engagement Strategy, Public Art Strategy and Sustainability Strategy) with the aim to create unity in the community and create opportunities for residents. Furthermore, the addition of the Metronet is also expected to benefit North-East and South-East areas of Perth by creating more housing opportunities due to the greater accessibility to these areas which can be attributed to Metronet. Maps of Locations. Metronet consist of 15 individual projects:   The locations of the stations are either completely new or an upgrade to the existing station and lines on the previous train network. According to Metronet Caledonian Avenue Level Crossing Removal, Claremont Station, Denny Avenue Level Crossing Removal, Forrestfield-Airport Link, Lakelands Stations and Mandurah Station Multi-Story Car Park are the only completed projects with the remaining projects currently under construction or yet to have construction take place.   Clear Identification of Policy Issues. Cost Overrun. The total cost of the Metronet project has quadrupled to $11.5 billion from the original estimate of $3 billion in 2017. Though there were changes in scope of project that led to some increase in the cost but overall, the project cost has increased considerably. Time Overrun. It has already been more than six years since the commencement of Metronet project and many components are yet to be completed. Time overrun has increased total project cost and has delayed using services on time. Railcar Manufacturing. The sustainability of railcar program can be realized only if the manufacturing of railcars can be done on such a scale that it can become an exporter otherwise it will not be a good investment of tax-payers money. Aboriginal Procurement Policy 2017. The policy targets to provide 3% of State Government and Metronet contracts with value greater than $50,000 to registered Aboriginal businesses. This can be a challenging task to achieve giving the open competition method in procurement processes. Narrative of the Case. The Public Transport Authority (PTA) is the major organization that provides public transport services in Western Australia. PTA, through its Transperth division, provides bus services, urban train transport and ferry services in the greater metropolitan area of Perth. The train service comprises more than 180km of rail serving 72 stations. The network comprises five main lines, namely the Armadale/Thornlie line, Fremantle line, Joondalup line, Midland line and Mandurah line. The Metronet project will assist the Western Australia Government’s Perth and Peel @3.5 million by providing a well-connected transport link along with new housing schemes and employment opportunities for people in the metropolitan area of Perth. The Metronet railway system in Western Australia is currently being operated and new lines are being developed to create a more integrated Perth with more transport, employment opportunities and housing. The main objective of the Metronet is to support economic growth, create better connectivity and access to jobs and businesses, create infrastructure that promote easy and accessible travel and lifestyle, create communities with a sense of support and belonging, plan for the future growth of Perth and to lead a cultural shift in the way sectors such as the government, industrial and private can work together to achieve integrated transport solutions and land use .   The Metronet is an important project in Western Australia for many reasons, the main reason is that it upgrades the current rail network by providing new trains and new stations to the system. In addition, the Metronet planned projects are a major stepping stone for the planned economic development and growth of Perth. Some of the planned stations are projected to increase housing prices as there will be more accessibility to these places. In addition, the Metronet also has generated jobs in Perth as it has created greater accessibility and with the Western Australia Railcar Program with the goal to produce 246 new C-series railcars replacing the old A-series trains and six new diesel trains, it has created jobs in train building in Western Australia which is the first time in approximately 30 years since train manufacturing was around in Western Australia .   The addition of new lines through the Metronet is predicted to generate interest in locations and influence property values particular in places in the North-East and South-East of Perth. Furthermore, places such as newer suburbs such as Brabham and Dayton will also benefit from the introduction of the new Metronet as it provides more housing options and easier travel for residents in Perth.   The Metronet project aims to connect Perth with three core strategies Gnarla Biddi Aboriginal Engagement Strategy, Public Art Strategy and Sustainability Strategy. The Gnarla Biddi Aboriginal Engagement Strategy is long-term strategy to create engagement with the Aboriginal community. The program was endorsed by the Whadjuk and Gnaala Karla Booja working parties. The strategy is supported by five engagement streams of Noongar cultural recognition, Noongar cultural input into place making, Aboriginal procurement, Aboriginal employment and land access and site management.   Public Art Strategy aims to create a legacy of transformative transport infrastructure and to create a unique identity of each station and precinct. The strategy will guide public art delivery, take creative inspiration from Perth’s Aboriginal and local history, land, locations and culture.   The Sustainability Strategy revolves around the application of high-level principles that provide a framework for transport infrastructure and station precinct projects during the planning, procurement design and construction stages. Discussion Questions. 1. How long we must wait for major infrastructures (railway tracks and stations) to be completed in the Metronet Project? 2. How will the funding for Metronet change in the future considering time and cost overrun and the state election in 2025? 3. Will the station precincts develop in the way Metronet has imagined, increasing density, job opportunities, commercial activities, and recreational activities, and when? 4. How will the WA Railcar Program shape the future of manufacturing trains and development in Western Australia? Additional Readings. 1. METRONET Station Precincts Gateway The document analyzes the characteristics of each station precincts that will help in future development of precincts. URL: https://www.metronet.wa.gov.au/Portals/31/METRONET%20Station%20Precincts%20Gateway.pdf?ver=4kwHHxUjmHZk2ag-at9SVA%3d%3d 2. NEWest Alliance Annual Sustainability Report 2023. Yanchep Railway Extension and Thornlie-Cockburn Link URL: https://www.metronet.wa.gov.au/Portals/31/Project%20Documents/Thornlie-Cockburn%20Link/2023%20Annual%20Sustainability%20Report%20-%20Thornlie-Cockburn%20Link%20and%20Yanchep%20Rail%20Extension.pdf 3. New Midland Station SUMMARY PROJECT DEFINITION PLAN NOVEMBER 2020 URL: https://www.metronet.wa.gov.au/Portals/31/Project%20Documents/Midland%20Station/Midland%20Station%20Project%20Definition%20Plan.pdf 4. Morley Station Precinct Concept Master Plan URL: https://www.metronet.wa.gov.au/Portals/31/Project%20Documents/Morley-Ellenbrook%20Line/Morley%20Station%20Precinct%20Concept%20Master%20Plan%20Fact%20Sheet.pdf
2,014
Mechanics of Materials/Background. This Wikibook is to provide living content for an undergraduate course in mechanics of materials or strength of materials. The material here will eventually be of sufficient quality and interest for self-learning or prescribed study by instructors/faculty members. One objective is that the material here would facilitate in-class discussions, group projects, or problem-solving that would leverage the instructors' expertise to enhance learning outcomes. Another objective is to facilitate students, instructors, professionals, and interested users adding/curating content to accommodate learning styles that might benefit from a spectrum of insights coming from learners and teachers with diverse backgrounds. The course will draw on material openly available with inspiration from key relevant texts. There is also a crowd-sourced mind map available (needs updating) on GitHub for this Wikibook on undergraduate mechanics of materials.
183
Famous Theorems of Mathematics/e is transcendental. The mathematical constant formula_1 is a transcendental number. In other words, it is not a root of any polynomial with integer coefficients. Proof. Let us assume that formula_2 is algebraic, so there exists a polynomial such that formula_4. Part 1. Let formula_5 be a polynomial of degree formula_6. Let us define formula_7. Taking its derivative yields: Let us define formula_9. Taking its derivative yields: Since formula_11 is differentiable, we shall apply the mean Value Theorem on the interval formula_12 for formula_13. So there exists a formula_14 such that Now let: Summing all the terms yields Part 2. Let formula_5 be a polynomial with a root formula_19 of multiplicity formula_6. We will show that for all formula_21 we get formula_22. Let us write formula_23, such that formula_24 is a polynomial with formula_25. with formula_27 all polynomials. Part 3. Let us now define a polynomial for prime formula_29 such that formula_30 and formula_31. We get: hence for all formula_33, the function formula_34 is a polynomial with integer coefficients all divisible by formula_29. By part 2, for all formula_36 we get: Therefore formula_38 is also an integer divisible by formula_29. On the other hand, for formula_40 we get: but formula_42, and formula_43 are not divisible by formula_29. Therefore formula_45 is not divisible by formula_29. In other words, the sum formula_47 is an integer not divisible by formula_29, and particularly non-zero. Part 4. By part 1, for all formula_36 we have formula_50. Therefore, By the triangle Inequality we get: But formula_53, hence for sufficiently large formula_29 we get formula_55. A contradiction. formula_56
492
Guitar/Railway and Western Strumming Pattern. Original page translated by Google
18
Flora of New York/Clade Acrocystis.  « Main "Carex" page
25
Algebra/Chapter 15/Introduction to Sequences and Series. Sequence. Within algebra, a sequence is an ordered list of numbers, called terms. It is often described by an equation or rule. The domain often begins with formula_1, but doesn't have to. Sequences can be separated into two types, finite and infinite. Finite sequence. A finite sequence is one that has a list of terms in a certain order with a beginning and ending term. ex: {1, 2, 3, 4, 5} Infinite sequence. An infinite sequence is a sequence with an indefinite list of terms, this happens when the sequence is extended to all positive integers. Writing sequences. When writing sequences there are two formats that are most commonly used, function notation and subscript notation. Function notation is modeled as formula_2, subscript notation on the other hand is modeled as formula_3. In both of these notations formula_4 denotes the number in the sequence. Both of these notations will elicit the same results. Series. A series is the expression formed by adding the terms in a sequence. Much like sequences, series can be split into finite and infinite. A finite series is when the terms of a finite sequence are added together, an infinite series expresses the sum of the terms in an infinite sequence and has an infinite number of addends. This is represented with summation notation (sigma notation) Summation notation. formula_5 This is an example of a finite series, breaking it down it can be seen as three separate parts that come together to make up the summation notation. at the top of the formula_6 (sigma) is the upper limit, the upper limit is where to stop adding terms. At the bottom of the sigma is the lower limit or the starting point where a variable from m to n is equal to our first term. In front of the sigma is a summation term or what is being added together.
436
God and Religious Toleration/Introduction. Many people share the dream of a peaceful world. However, we live in a world filled with a diversity in beliefs, opinion, desires, and needs. In history, we often find that war and hate is rooted in religious disputes. Although either group is equally convinced of being on the right side of history, the resulting conflict perpetuates suffering indefinitely. Is this inevitable? Or is this something we can change? Tolerance between religions and all people is requirement to create a world of peace, love, and happiness, and even theists and atheists should find a way of understanding one another. To create a global dialog of faiths is the goal of the Parliament of the World's Religions. This book will cover some of this dialog, in hopes to connect people and bring opposing views into a better light.
183
Famous Theorems of Mathematics/Root of order n. For all formula_1 and for all formula_2 there exists formula_3 such that formula_4. Proof. Let us define a set formula_5. This set is non-empty (for formula_6) and has an upper-bound formula_7 (for all formula_8 we get formula_9). Therefore, by the completeness axiom of the real numbers it has a supremum formula_10. We shall show that formula_4. Therefore formula_4. formula_27
130
Transportation Planning Casebook/Cross-River Rail. Summary. Brisbane’s Cross River Rail project is a 10.2km heavy rail project that is currently under construction.  It is intended to be a primarily underground single line railway that connects core parts of Brisbane together allowing for better connections into and out of the CBD and reducing road congestion with its new nine-car trains which allows for almost double the capacity of existing railway networks from the south into the CBD.  The current plans entail the upgrade of eight existing surface stations, the construction of three brand new surface stations, and four underground stations.  Initial cost projections for the plan first made in 2012 was $4.5 billion, however as the project commenced, projected costs raised to $5.4 billion for upfront construction in 2017. The current railway network in South-East Queensland (SEQ) has been deemed insufficient for its current population and does not serve a critical role in transport across the area, as such the Cross River Rail is intended to alleviate the issues that currently face the existing network.  The modernised design of the rail combined with the renovation of existing stations and entirely new stations will allow it to be better integrated with existing bus networks.  The currently existing roads across SEQ are deemed to be at capacity, costing the state $2 billion per year, with no alternatives as the existing rail network is constrained by its age and lack of capacity. The Cross River Rail is also set to allow faster connections from further away from the city centre, allowing for more urban development that still has fast access to major business points across SEQ. By forming the connection from the CBD to areas further south is intended to boost economic growth, by allowing easy access to core business centres, provide reliabile travel as the scale of the project will allow up the 24 trains on the line and serve as the first step in improving Brisbane's rail network by boosting the core of the problem, before ideally expanding outwards and improving the network further away from the centre. Currently the project is still under development, the construction is projected to finish in late 2025 and after safety and maintenance checks are completed, public services are expected to commence in 2026.  The project is being delivered by a partnership of three different private sector groups each covering a separate portion of the project.  The Tunnel, Stations and Development (TSD) is set to deliver the underground tunnels, stations and all related mechanical and electrical components and systems, Rail, Integration and Systems (RIS) will develop and design the integration of the project to the existing railway lines and supporting railways, while also providing the complete renovation of Exhibition station and announced in 2019, the building of six brand new stations.  The final group is the Sequence Alliance, combination of Hitachi Rail, Queensland Rail and the Cross River Rail Delivery Authority (CRRSA), who is set to deliver the European Train Control System (ETCS) which is a new experimental signalling system for the rail line that is intended to improve safety and capacity for carriages on the network. Policy Issues. Queensland Government Strategic Objectives: SEQ Rail Connect SEQ Rail connect is the Queensland Government's 5-10 year rail strategy for improving accessibility to key precincts and increasing the capacity of the rail network. Cross-River Rail is the centrepiece SEQ Rail Connect providing the necessary infrastructure to meet the demands of State Government Policy. The key objectives of SEQ Rail connect are : Environmental Policy The Cross River Rail Project is obliged to meet the requirements of its Environmental Policy as per the following legislation: As a result of these requirements, the project will adopt an environmental strategy in accordance with the Australian Standard ISO 14001. The project must identify all environmental risks at every stage of the project and implement management strategies to mitigate potential impacts. The project's environmental policy must be visible to all project stakeholders. The Project's environmental policy has led to the creation of the "Cross-River Rail Outline Environmental Management Plan (OEMP)" . The OEMP presents the sub-plans for the following identified environmental issues: Sustainability Policy Cross River Rail is obliged to pursue sustainability initiatives as directed by the following policies: The project is thus obliged to deliver infrastructure that is constructed using sustainable processes and designed to meet the demands of a changing environment. As part of the sustainability policy, the project is also must be responsive to and consider local indigenous heritage during construction. In response to the requirements of sustainability legislation relevant to the project, the following sustainability initiatives are being undertaken on the Cross River Rail Project : Narrative. Throughout the life-time of the project different proposals and methods of completing the objective of increasing rail access across the Brisbane River were made. Each proposal promised varying benefits and costs that were balanced in decisions to proceed or abandon projects. Politics particularly had a significant impact on the decision with the BaT project being introduced when the LNP was voted into office and then abandoned by the Labor party when the LNP party was voted out . 2010 Cross River Rail. In this proposal the project included: This proposal was tasked with the objective of increasing rail access across the bottleneck point of the river which had been identified to reach maximum capacity by 2016 . The Federal Government provided $20 million in the feasibility phase of the 2010 project, as part of the 'Building Australia' Fund established in 2009 for the development of the nationwide infrastructure. Initially planned to be approved and completed before 2016 it was delayed due to funding reallocation to repairs from extreme weather . Newman who was Lord Major at the time already voiced his disapproval of the expenses required for this rail project suggesting a Subway alternative instead for the same cost . 2012 Cross River Rail. At this stage the proposed project included: This proposal was a scaled down version of the 2010 proposal in attempt to gain funding. This proposal by the Liberal Nationals government in power at the time sought out 80% of the initial capital cost from the Federal Government. The project was labelled as a 'Top Priority' by Infrastructure Australia (IA) and the proposal was approved as "ready to proceed" but delayed by funding disagreements between state and federal government . Bus and Train (BaT) Project. The proposal included: The incorporation of buses into the project was in attempt to address bus crowing problem on Victoria Bridge . The proposal built upon the previous "Cross River Rail" case and Brisbane City Council's "Suburbs 2 City" bus project, which both amounted to a total of $8 billion, much greater than the proposed $5 billion BaT project. The Newman government abandoned the 2012 Cross River Rail proposal in favour of this change, with the project progressing to 'threshold status' by Infrastructure Australia in 2014 . When the Palaszczuk government was voted in in 2015, this project was abandoned again on the basis of buses being less efficient for solving the original bottlenecking problem . 2017 Business Case. At this stage the proposal includes: This version of the Brisbane Cross River Rail is the final, approved version of the plan and is currently being constructed as of 2024. Overall Influences on Narrative. As can be noted from the history of proposals for the Cross River Rail Project significant disagreements were voiced by opposing politicians on the funding and extent of works to be completed. Severe weather events or external factors such as COVID also caused delays and issues in the construction and deployment of the project. Disagreements between state and federal governments over funding also significantly delayed the project from coming to fruition.
1,730
Transportation Planning Casebook/IPART Fare Setting in New South Wales. The Independent Pricing and Regulatory Tribunal or IPART is an independent decision-making body established in 1992 tasked with regulating certain markets as well as government services to ensure effective social, environmental and economic outcomes. Despite being a government agency, the tribunal operates independently in making decisions and recommendations to protect consumers from unreasonable price hikes and unfair competition. It also improves the quality and efficiency of service providers, encourages competition, protects the environment and ensures service providers stay financially viable. IPART regulates prices and reviews pricing policies of the New South Wales (NSW) government supplied services. IPART also provide assistance to other entities within the NSW government such as in conducting special reviews in pricing, industry, or competition. It also serves as an arbiter in access disputes and protects registers of the subsequent access agreements. Apart from transport, IPART also provides advisory services and regulation compliance monitoring of regulated entities according to their license or authorization conditions in the water, gas, electricity, and transport industries. Summary. The public transportation fare in New South Wales is highly dependent on the maximum fare price determination undertaken by the IPART. Although a government entity in itself, it functions independently to calculate the maximum fare price that serve primarily as the basis of Transport for New South Wales (TfNSW) for the issuance of fare orders in the state. IPART is composed of three members appointed by the Premier of NSW. These members are expected to have substantial experience in business, economics, finance, engineering, or any relevant field to equip them in undertaking the regulatory tasks of IPART. Since 2014, when it was mandated to undertake maximum fare price determination under the Passenger Transport Act 2014 No 46 (Part 2, Division 2), IPART has become an integral part in the development of the fare system of NSW public transportation. The fare increase proposals of TfNSW have consistently complied with the IPART maximum fare prices as both government entities ensure the sustainability of the business case of NSW's public transportation. IPART has witnessed the gradual shift from paper tickets to its phase out when the Opal cards were in the early stage of their roll out. The Opal card payment methods complemented by contactless credit card payments simplified further the payment structures of fares with the continuous decline in the demand for single journey tickets. IPART uses several parameters in determining the maximum fare prices. These include indexation to inflation, cost recovery, demand management, social and policy objectives, intermodality, and incentive systems. Among the recent policy issues include the proposal of a fare-free pubic transportation and the upcoming maximum fare price determination that will set maximum fare prices from 2024 until 2028. Annotated List of Actors. The IPART’s organizational structure is outlined in the state legislation of New South Wales entitled the Independent Pricing and Regulatory Tribunal Act 1992 No. 39. The tribunal is composed of three members appointed by the premier of as permanent members. Temporary members may be added as appointed also by the premier. The tribunal is led by a chairperson to be appointed from among the permanent members. It is the responsibility of the premier to ensure that members of the tribunal have a knowledge and understanding of economics, consumer interests, and supplier interests. Actors. In the specific concern of fare setting, IPART is tasked to conduct reviews and reporting to the premier as mandated under the Passenger Transport Act 2014. Among the key actors on the IPART, specifically on fare setting are as follows: 1 Not a permanent actor and is dependent on the engagement with IPART. Current Members of the Tribunal. The tribunal is currently being led by Carmel Donnelly PSM, whose term started on 1 July 2023 and will end on 30 June 2026. Maps of Locations. IPART's role in fare setting expands to a wide range of public transport types in New South Wales including buses, trains, light rail, and ferries. Policy Issues. Fare-Free Public Transportation. Affordable public transport has been an ongoing debate in NSW to incentivise economic mobility, to reduce car dependence and ease the financial burden on households. In December of 2019, IPART conducted an independent investigation of a free-fare public transportation service in New South Wales as part of the 2020-2024 Maximum Opal Fares plan. The review concludes that implementing free public transport in NSW, by subsidising a 100% of operational costs from taxpayers, will marginally improve the travel costs for families individuals. A loss of $1.6 billion in yearly revenue will not be fed into the economy through other ways. It also makes its point by comparing free-fare public transportation programs in other parts of the world, mainly Europe. One of the examples is in the Estonia's capital of Tallinn, that launched a free public transportation program. The real goal in its design, found by scholars, is that it was supposed to bring more subsidies by only allowing registered residents of Tallinn to use the system for free. However, it did little to tackle mobility, accessibility or reduction in car traffic. IPART that 2-5% reduction in car ridership does not explain a proposed 40% increase in public transport patronage. IPART takes these real examples to make an argument that the cost and operational burden outweighs the social impact of free travel. It advises that the cost of travel was already below the inflation adjusted cost for most patrons so a 5.0% annual increase at a 4 year span is proposed. IPART does not force Transport NSW to increase Opal fares, which can be seen by the effects of Covid-19 reducing patronage for all public transportation services in 2020-2021. The rising fares were limited to about 3% a year to make it more affordable. Maximum Opal Fares until July 2028. Overview of Fare Setting Process. Under the current public transportation system fare structure in NSW, the entire pricing is divided into two sectors: Maximum fare and fare below maximum. Fares below maximum are determined by the NSW Transport Department. The advice on the maximum fare is offered by the IPART to the government. The maximum fare would be discussed and set every four years, with the current fare lasting until June 2024, and the next fare would be applied until July 2028. In this regard, several key steps are included in the fare setting process of IPART (Independent Pricing and Regulatory Tribunal) for public transportation in New South Wales: IPART considers the following attributes during the setting of fare, among other requirements provided by the law: IPART undertakes robust public consultation during each review process to be able to understand the full extent of stakeholder views and consider them alongside the findings of our economic modeling and analysis. This ensures that, in any fare changes taking place, there is due information and consequent fairness to the parties involved, supporting efficiency and effectiveness of the public transport system. Public Reception of Current OPAL Fare Structure. The new introduced cheaper fares on Friday, applying at a 30% discount for services on metro, train, bus, and light rail, have won positive feedback, meant to boost city visit and, on traditionally quieter days, business. However, there was a mixed reaction among the common people in general, as at the said juncture, the living cost had already shot up very high. Business leaders and government officials emphasize that cheaper travel would entice more people to the city, both for work and leisure, which would actually revitalize the city center, especially given the situation that many people work-from-home on Fridays. This is viewed as a strategic response to the challenge of reduced commuter traffic due to increased remote work practices. Petition of travel concessions for international students in NSW. New South Wales (NSW) is currently the only state which does not provide discount for international students in Australia. In Victoria, international undergraduate students can buy a Travel Pass that can save $1,034 a year. Full-time International students studying in Queensland can access a 50% concession fare. For over 20 years, campaigns—such as those by the Sydney University Postgraduate Representative Association (SUPRA) and the University of Sydney's Students' Representative Council (SRC)—have highlighted this inequity. Despite all the petitions and advocacy, we still have poor progress, and many students face financial hardships due to high transportation costs, which goes into their overall living costs. Petition Advocates In 2024, SUPRA initiated the second round of the petition. With over 20,000 signs, the petition went through the Parliament of NSW and discussed on it. This petition denotes the Legislative Assembly of New South Wales for extending travel concessions to all students, including international and part-time students, referring to the existing unfair policy. It also shows that New South Wales is the only Australian state that does not give any concessions to be given to international students, who significantly contribute to the economy of the same state. When lacking the concessions, it has a bearing not only on their potential to be involved in state-wide economic activities but also places undue financial burdens on the part-time students, many of whom face challenges like caregiving responsibilities or disabilities. Response from Government The NSW government realizes that since full fee-paying overseas students in New South Wales are supposed to show sufficiency of funds under visa conditions, they will also not be eligible to avail themselves of travel concessions. However, through this study fare, it will allow these students to benefit by getting a 15% discount on regional rail. These students are also exposed to the adult Opal ticket, which has a weekly cap of fares. Part-time students with disabilities are also permitted travel concessions, but other part-time and correspondence students are not eligible since their study format allows potential full-time employment. Fare Change Options. Options that are usually available when considering changes to the public transport fare structure in NSW generally include: Social Optimization of Fares. Social fare optimization is the pricing and modification of public transportation prices in order to attain broader social objectives associated with an increase in accessibility, decrease of congestion, and improvement of environmental sustainability. The following are key approaches and considerations in social optimization of fares: Narrative. IPART Role in Fare Setting. The fare setting process for public transportation in New South Wales (NSW) is managed by the Independent Pricing and Regulatory Tribunal (IPART). It involves evaluating transportation costs, aligning them with economic and public needs, and incorporating feedback from public consultations. The NSW Transport Department sets fares below the maximum, while IPART advises on the maximum fare, reviewed every four years. Key considerations include cost-efficiency, consumer protection, social impact, service quality, government funding, and any relevant legal requirements. This thorough process ensures that fare adjustments are fair, informed, and support an efficient public transport system. Leadership. The main three members of the tribunal are appointed by the premier of as permanent members. Temporary members may be added as appointed also by the premier. The tribunal is led by a chairperson to be appointed from among the permanent members. It is the responsibility of the premier to ensure that members of the tribunal have a knowledge and understanding of economics, consumer interests, and supplier interests. Free-fare travel. IPART considered the viability of a purely taxpayer subsidised public transport. After an extensive review of public transport networks four major cities in Europe (Paris and Dunkirk in France, Tallinn in Estonia, and Hasselt in Belgium, it determined that: Public Reception of Current OPAL Fare Structure. Newly introduced 30% discounted fares on Friday for public transport aim to boost city visits and business, receiving mixed reactions due to high living costs. Officials believe the cheaper fares will attract more people to the city, countering decreased commuter traffic from increased remote work. Petition of travel concessions for international students in NSW. New South Wales (NSW) remains the only Australian state that doesn't offer transportation discounts to international students, unlike Victoria and Queensland where significant savings are available. Despite over 20 years of advocacy by organizations like the Sydney University Postgraduate Representative Association (SUPRA) and the University of Sydney's Students' Representative Council (SRC), little progress has been made. This lack of concession contributes to the financial burden of high transportation costs for many international students, affecting their overall living expenses. Fare Change Options. In NSW, changes to public transport fares are typically considered to address several goals. Fares might be indexed to inflation to maintain value, adjusted for cost recovery to offset higher service or infrastructure costs, or used to manage demand by encouraging off-peak travel. They can also reflect broader objectives like increasing accessibility for low-income passengers or promoting public transport to alleviate traffic and environmental issues. Additionally, fare structure may be simplified or new products introduced for specific groups, and fare caps or discounts could be applied to support various passenger categories. Social Optimization of Fares. Social fare optimisation adjusts public transportation prices to achieve goals such as improved accessibility, reduced congestion, and enhanced environmental sustainability. This approach includes making fares affordable for all societal segments, including low-income groups, disabled persons, and seniors, through mechanisms like tiered fares or fare caps. It also involves using fare structuring to manage peak and off-peak usage, encouraging travel outside busy periods to evenly distribute demand. Integration of fares across different transportation modes, like buses, trains, and ferries, simplifies the payment system and may encourage shifts from private to public transport. Additionally, promoting the use of environmentally friendly transport options, such as electric or zero-emission vehicles, helps reduce traffic and emissions. Engaging the community through public consultations is crucial to understanding diverse needs and crafting widely accepted fare systems.
3,145
Transportation Planning Casebook/Melbourne Metro and Suburban Rail Loop. Summary. Metro Tunnel. The Metro Tunnel is a 9km long railway tunnel currently under construction under the Melbourne CBD. It will be fitted with five new train stations, each equipped with platform screen doors and advanced signaling. The Metro Tunnel is being built to bypass the congested city loop around the Melbourne CBD. When Melbourne’s railway network was being developed, there were two main stations in the Melbourne CBD. Flinders Street station was the terminus for trains coming into the CBD from the east, and Spencer Street station (now called Southern Cross) was the terminus for trains coming into the CBD from the west. In 1891, these two stations were linked up by the two-track Flinders Street Viaduct. This enabled trains to through-run from the east of the CBD to the west. Having Melbourne’s entire railway network linked only by a two-track viaduct quickly led to congestion on the network. To address these capacity concerns, the Flinders Street Viaduct was widened twice more from two tracks to four, and then from four tracks to six. Additionally, the City Loop was constructed to form a ring around the CBD. The City Loop is a set of four separate railway tunnels opened progressively between 1981 and 1985. This enabled trains coming into the CBD to loop around it and then return, which was useful because more trains were coming into the CBD from the east than from the west. The City Loop also saw the addition of Flagstaff, Melbourne Central (formerly Museum), and Parliament stations. Since the City Loop opened, congestion on the network in the Melbourne CBD has got worse. The City Loop is reaching capacity, which limits the frequency of services on all the lines it serves. This is what the Metro Tunnel hopes to solve. The metro tunnel will provide a new route through the Melbourne CBD, enabling trains to run between the east and west of Melbourne without clogging up the City Loop. The current proposal is to run the Sunbury, Cranbourne, and Packenham (soon to be East Packenham) lines through the Metro Tunnel, creating a direct service between the east and west of Melbourne. The Metro Tunnel will also include five new stations. ANZAC Station will be located near the shrine of rememberance. Town Hall station will be located at the south end of the Melbourne CBD and will be linked up with the existing Flinders Street station. State Library station will be located on the north side of the Melbourne CBD and will link up with the existing Melbourne Central station. Parkville station will be located to the north of north of the Melbourne CBD and will primarily serve the University of Melbourne. Finally, Arden station will be located west of Parkville station and will serve a new urban renewal project. The Metro Tunnel passes very close to South Yarra station but does not have an interchange there. This has been criticized as a missed opportunity to connect the Metro Tunnel to the trams on the road above. As of April 2024, the Metro tunnel is predicted to open in late 2024 and the final cost is predicted to be over $12B. Suburban Rail Loop. The Suburban Rail Loop (SRL) is a 90km rail line currently under construction in the suburbs of Melbourne. It will be Melbourne’s first circumferential line and will provide a loop around Melbourne that does not go through the CBD. Melbourne has a large train network extending nearly 450km and consisting of over 200 stations. However, Melbourne’s train network is entirely radial. This means that all of Melbourne’s train lines radiate out from the CBD. While this makes commuting from the suburbs to the CBD extremely easy, it makes travelling between suburbs by train extremely hard. For passengers who want to travel from one suburb to another on a different line, they would need to take a train into the CBD and change trains. If the destination is on the same side of the CBD as the origin, then this would mean a huge detour. A transfer would still be necessary even if the stop in question is on the other side of the city, as only the Werribee, Williamstown, and Frankston lines run from one side of the CBD to the other. There are tram routes between suburbs, but they mostly serve Melbourne’s inner suburbs. This means that the only practical public transport option for travel between the outer and middle suburbs is buses. However, many of these inter-suburban bus routes have frequencies as bad as every 40 minutes, and some only operate on selected days of the week. The SRL aims to fix this by providing a loop through the suburbs from the east of the city to the west. This will make inter-suburban travel far easier and link to new areas previously unserved by rail. The project is split into four phases. SRL East is currently under construction and will link Cheltenham to Box Hill via the existing Clayton and Glen Waverley stations and provide new stations at Monash and Burwood. The next phase is SRL North which will link Box Hill to Melbourne Airport via the existing Heidelberg, Reservoir, Fawker, and Broadmeadows stations. New stations will be built at Doncaster and Bundoora. The third phase is SRL Airport which aims to connect Melbourne Airport to the existing station at Sunshine via a new station at Keilor East. The final stage is SRL West which will connect Sunshine to Werribee. This stage is still in planning, and it is unclear where any new stations will be located. The SRL has come under fire for its ballooning price tag. The most recent cost blowout has put the cost of the SRL at $216 Billion. This includes construction, and 50 years of operation. The project has also come under scrutiny due to the secretive nature of its development, the timing of its announcement (in the leadup to the 2018 Victorian Election), and the questionable business case. The Victorian Liberal Party has pledged to scrap the SRL if elected, citing the enormous cost. Given that the SRL will take many decades to construct and plans for SRL West are still in their early stages, the future of the project looks uncertain. As of April 2024, SRL east is currently predicted to open in 2035. The current cost estimate stands at $32.8B and this is estimate is predicted to increase over time. Policy Issues. Metro Tunnel Project. Poor Planning. The Metro Tunnel's electromagnetic field interference towards nearby medical facilities like the Victorian Comprehensive Cancer Centre and Royal Melbourne Hospital has raised concerns. When experts first became concerned about electromagnetic interference in 2016, data was gathered to establish exact interference levels. If these levels raise additional concerns, the state government might have to spend millions on shielding or reducing train electrical current in certain tunnel sections. Given the tunnel's projected 2025 opening and the predicted increase in testing diligence, mitigating long-term methods are currently being discussed. MRIs have been moved to lessen the effects, and more hospital wings or floors have been built to protect equipment. Furthermore, urgent imaging requirements will be given priority to maintain the course of treatment. Still, there are issues, especially with the University of Melbourne's and Parkville Biomedical Precinct's sensitive scientific equipment. The project's environmental consequences statement also mentions various environmental dangers, like asbestos in the ground, vapours in station boxes, and contaminated groundwater. The Melbourne Metro Rail Authority intends to work with contractors to decide how to dispose of and stockpile materials. Critics point to the 2016 decision to designate Domain as the spoil stockpiling site without providing precise location details to support their claims that waiting until after the building contract is granted is misleading or indicative of poor planning. Opposition asserts that proper project planning requires finalising important elements. Cost Overruns. The Metro Tunnel project in Melbourne, Australia, has faced some challenges, including significant cost overruns and delays. Despite the government's cost-saving measures, such as removing 27 km of high-capacity signalling and limiting other network improvements, the tunnel and station construction phase has exceeded its budget by $364 million. The project's total estimated cost has also risen from the original 2017 budget of $10.7 billion to $12.58 billion, an increase of $1.88 billion. Suburan Rail Loop Project. Nontransparent Planning Process. The development of the Suburban Rail Loop project followed an unconventional and confidential process. It did not involve the state's two most senior transport bureaucrats and bypassed typical channels of involvement from senior planning and transportation officials. Instead, the initiative was led by a group of PwC consultants, and funds were transferred from the Department of Premier and Cabinet to Development Victoria without the latter organisation's board being informed. Oversight of the project was assigned to a deputy secretary within the Department of Premier and Cabinet. Additionally, the most senior transport infrastructure bureaucrat requested a non-disclosure agreement to participate. These circumstances raise questions about government procedures and project development transparency. An investigation highlights potential consequences stemming from the project's secretive nature and exclusion of public sector professionals. Concerns about the lack of collaboration and information exchange across portfolios and with external experts have been raised, which are deemed essential for comprehensive testing and risk assessment. This casts doubt on the reliability of the project's risk evaluation and management of potential hazards. The investigation, prompted by revelations of how the Victorian government bypassed its usual bureaucratic processes to initiate the largest and most expensive infrastructure project in any Australian state, underscores concern about transparency and adherence to appropriate procedures in the development of the Suburban Rail Loop project. These findings prompt further scrutiny of the project's transparency and procedural integrity. Planning Document Background. As the Suburban Rail Loop project was started without any forethought or discussion, it has come under fire for what is seen as a lack of strategic vision. To effectively direct government responses to urban expansion, experts stress the significance of a thorough metropolitan planning strategy, especially in light of the significant financial commitment necessary. Additionally, there are concerns regarding alignment with planned transportation networks due to the lack of orbital rail in the 2017 document "Plan Melbourne: 2017 – 2050," which the Premier claims inspired the Suburban Rail Loop. The exclusion of an orbital rail project from Infrastructure Victoria's 30-year infrastructure vision, which was unveiled in December 2016, highlights this disparity even more. These differences indicate a mismatch between the proposed Suburban Rail Loop and current planning frameworks. Although the government intends to expand neighbourhoods and establish new activity hubs based on the Melbourne Plan, other experts contend that other, more affordable measures, including a medium train and bus system, would be adequate. But it's important to understand that the Suburban Rail Loop is more than just transportation infrastructure—it's a foundation for city-shaping projects. In conclusion, the Suburban Rail Loop project broke away from earlier strategy papers and arose in the middle of subpar metropolitan planning. This calls into question the project's conformance to more general goals of urban development as well as the coordination of government initiatives. Technical Design Aspect. In relation to station spacing and accessibility, passengers may have to walk a considerable distance between lines at stations where Melbourne's current rail network intersects, and preliminary plans suggest that important stops throughout the first stage of the loop may be far from the main hubs they are intended to service. This comment has appeared as the small number of proposed stations—just 15 throughout the whole loop, with an average distance of six km between them—is cause for alarm. The arrangement casts questions on the system's usability and accessibility for those who live close to the route, as large populations may be left underserved by the stations that are close by. For example, in the first stage, the stations between Cheltenham and Clayton are eight km apart, meaning that almost 200,000 people live between these sites with limited access to stations. Although the Suburban Rail Loop is intended to link major centres, its ability to benefit the surrounding community is still up for question. Feasibility & Business Case. The Victorian Auditor-General criticised the Suburban Rail Loop's business case, pointing out that it did not satisfy normal investment standards, evaluate alternatives sufficiently, or calculate benefits appropriately. Instead of following Infrastructure Australia's recommended benchmark of 7%, the Suburban Rail Loop economic appraisals employed a discount rate of 4%. This disparity in discount rates affects how future project expenses are calculated and prompts more investigation into the project's financial components. Furthermore, the Victorian Auditor made the calculation of the benefit-cost ratio (BCR) with the recommended discount rate, and it was between 0.6 and 0.7. This indicates a likely nett social cost, despite a BCR greater than 1 indicating predicted nett societal benefits. Another issue has also appeared: the worries about the project's location and possible effects on commuting times. They contend that the project's emphasis on remote, low-density locations with significant automobile ownership and travel lengths casts doubt on its viability. The absence of sizable employment centres close to the planned stations raises additional concerns about the project's viability. The business case's partial submission to the state government further erodes trust in the project's sound economic justification. Cost Overruns. When the Suburban Rail Loop project first became public in August 2018, it was estimated that developing its 90 kilometres would cost $50 billion. However, projections of the costs skyrocketed, going as high as $125 billion. According to a thorough 400-page business and investment case published in 2021, the project's east and northeast phases are expected to cost $50.5 billion. Notably, the SRL North segment's cost was excluded from this scenario. In a report conducted in August 2022 by Victoria's Parliamentary Budget Office (PBO), building the project's first and second phases will cost $125 billion by 2084–2025. This estimate is consistent with the $30 billion to $34.5 billion government projection in the 2021 business case. However, details regarding the cost of the SRL West section—which connects Melbourne Airport with Werribee—weren't included in either the PBO research or the government's case. The state opposition requested a fresh analysis in March 2024, which revealed that the project's first two phases would cost an astounding $216 billion to build and run. This updated estimate, based on the 2022 research, estimated the construction and operating costs for the first two stages at $200 billion. Funding. The federal government was supposed to pay one-third of the project's total cost. Still, it has clarified that it would only contribute the $2.2 million originally set aside for the tunnelling phase. This leaves a sizable financial gap despite the government's claim that the first stage would be supported by a combination of state and federal contributions coupled with value capture, which would lessen the burden on taxpayers. The Federal Government released a new infrastructure policy statement that seeks to realign federal spending priorities to support more funding for projects that support housing availability. According to this policy, a project must meet certain requirements to be deemed nationally significant and qualify for federal assistance. These requirements include having a minimum worth of $250 million, connecting to important freight routes, or aligning with larger national goals like housing or essential minerals. Therefore, the federal government would not contribute more money unless the SRL project was judged to align with the policy. Creative Funding. The project financing plan relies heavily on public-private partnerships and realising enhanced asset values. However, concerns have been raised about the feasibility of these methods covering project costs without increasing the financial burden on taxpayers. Economists and property tax experts caution that the proposed funding mechanisms outlined in the business case may not generate sufficient revenue to cover government operating expenses. These proposals, scheduled to take effect in 2025, include a stamp duty supplement for commercial property, payments from developers of residential real estate, and a tax for commercial parking. The project aims to generate $11.5 billion in revenue for the government through value-capture levies on properties benefiting from the project. However, the Victorian Auditor-General's Office doubts this target will be achieved. Analysts suggest that implementing broad-based fees, such as a broad land tax or 'betterment levy,' on all businesses and individuals would more effectively capture the project's benefits. Marion Terrill of the Grattan Institute expresses concern that the project's limited levies and developer fees might discourage the investment it aims to promote. This underscores the need for a comprehensive funding strategy that fairly and efficiently addresses the project's financial challenges. Timeline and Delivery. The project is expected to be finished in 2081, assuming the future Premier will fulfils the commitment. Only the eastern part, which runs from Cheltenham to Box Hill, is under construction; completion is scheduled for 2035. The government has stated that succeeding administrations will decide whether to proceed with the next phases. The Government emphasised that these undertakings are long-term in nature, characterising them as bold and progressive projects intended to meet Victorians' requirements in the present and the future. Andrews, as the Premier that introduce the project, explained that although his government would start the project, it would take longer to complete than it would. This multi-decade timeline emphasises how long-term the project is and how worldwide cooperation is required to see it through to completion. Seamless Integration. Initial designs for six stations along a 26-kilometre tunnel from Cheltenham to Box Hill are an issue of concern. Stations such as Monash, Cheltenham, and Burwood are particularly significant because they are situated across from major train stations or activity centres. This raises concerns about commuters traversing dangerous roads without designated pedestrian walkways. Whitehorse Mayor Andrew Munroe questions the government's commitment to a "seamless interchange" at Box Hill because it is thought that the project's scope does not include the construction of an underground pedestrian connection. The proposed Burwood station, which would be located across from Deakin University, is especially worrying since it raises questions about the safety of students crossing the street. The university demands a grade-separated crossing; the council wants an underpass. Likewise, Kingston Mayor Steve Staikos objects to the first designs for Cheltenham station, pointing out that there aren't enough exits and that it would be a long walk to the terminals. Given the Monash station's location above Normanby Road, experts advise placing it in the centre of the university campus. Monash University supports an entry south of Normanby Road to protect students crossing the busy road in front of the Monash Waste Transfer Station in the industrial region. Narrative. Melbourne, known for its extensive rail transport system, has encountered substantial obstacles in preserving and extending its network to accommodate the needs of an increasing population and a changing urban landscape. The Metro Tunnel and the Suburban Rail Loop (SRL) are two significant projects. Metro Tunnel. The Metro Tunnel project aims to alleviate congestion in Melbourne's CBD by constructing a 9km tunnel that will serve as a direct route for trains passing between the east and west of the city. This tunnel has been constructed to address the constraints of the City Loop. Despite being a groundbreaking solution in the 1980s, the City Loop has become overcrowded, resulting in reduced service frequency and delays. The Metro Tunnel project encompasses the building of five new stations that are equipped with modern safety features, including platform screen doors and a state-of-the-art signalling system. Nevertheless, the initiative has encountered certain challenges. There are concerns regarding the potential electromagnetic interference that may occur with medical equipment in neighbouring facilities such as the Victorian Comprehensive Cancer Centre and the Royal Melbourne Hospital. These problems emphasize the unexpected intricacies of urban infrastructure projects, especially those located in heavily populated city centers. The project's expenses have also increased, with cost overruns amounting to nearly $1.88 billion beyond the original budget, highlighting the inherent unpredictability of large-scale projects. Suburban Rail Loop. It was proposed in August 2018 by Prime Minister Daniel Andrews, is a comprehensive initiative aimed at linking Melbourne's suburbs directly, eliminating the need to pass via the CBD. The purpose of this 90km loop is to enhance cross-suburban transportation and will be implemented in stages. The initial phase, known as SRL East, will establish a connection between Cheltenham and Box Hill. The development phase of the SRL experienced criticism for its private planning process and cost overruns, which resulted in a lack of transparency. Additionally, there was widespread dissatisfaction regarding the economic basis of the project. The SRL project has been compromised by challenges surrounding its development process. The criticisms mostly centre around the lack of transparency and unconventional approaches employed during its development, which involved avoiding traditional regulatory procedures and extensively relying on consultation with private experts. This approach has resulted in close examination of the project's effectiveness and its compatibility with broader transportation plans in Victoria. Implemented measures to enhance project disclosure and community participation have been employed to enhance transparency and foster confidence among stakeholders. The planning process was modified to include a greater amount of input from the public and experts . The cost estimations for the SRL have been remarkably high, with latest estimates indicating a price of over $216 billion for only the first two phases. These concerns have sparked much concern regarding the project's viability economically and the potential burden it could place on future generations. Stakeholder viewpoints. Government officials perceive these projects as crucial for ensuring the long-term viability of Melbourne's infrastructure . Community leaders have expressed concerns on the environmental effects and disruptions to the community. Residents displayed ambivalent sentiments, weighing their fears about potential disruptions against their anticipation of enhanced mobility . Challenges and Solutions. Metro Tunnel Challenges: The project encountered technical and environmental obstacles, such as electromagnetic interference with local medical facilities and worries regarding asbestos and contaminated groundwater during construction. Solutions: The implementation of mitigation measures included the transfer of delicate equipment in hospitals and the implementation of strict environmental monitoring to effectively handle and dispose of dangerous substances in a responsible manner . The Suburban Rail Loop Challenges: The development phase of the SRL experienced criticism for its private planning process and cost overruns, which resulted in a lack of transparency. Additionally, there was widespread dissatisfaction regarding the economic basis of the project. Solution: Implemented measures to enhance project disclosure and community participation have been employed to enhance transparency and foster confidence among stakeholders. The planning process was modified to include a greater amount of input from the public and experts . Analyzing Impact. Economic: Thousands of jobs created, local economies boosted by better accessibility and fresh business prospects . Social: Better quality of living with shorter commute times and more connectedness . Environmental: Issues include how building debris is managed and how long-term such massive infrastructure projects can last . Project Milestones and Events. Metro Tunnel: In 2016, there was an announcement made and development began. The expected completion date for the project is 2024, with continual modifications being made to handle electromagnetic issues and other unforeseen obstacles. The Suburban Rail Loop: 2018: Announcement of the project. 2022: The year in which groundbreaking and the start of initial construction activities take place. In 2035, the SRL East will be opened in a planned and specific manner, with other phases to be implemented later as part of Victoria's Big Build project, specifically in 2024b.
5,495
Guitar/Simple three-quarter beat. Original page translated by Google =The simple 3/4 beat= If you come across a song in 3/4 time, you can simply use the following beat. With 3/4 time you have a different rhythm. You always have to count to 3 and not to 4. Experience shows that beginners always have problems switching from 4/4 time to 3/4 time and vice versa. Whether it is 4/4 time or 3/4 time, you just have to count it out. Either it works to always count to 4, or it works to always count to 3. It is easier if you can find the information in the song itself, or if you can find the time signatures in the musical notation. If necessary, a 6/8 time can also be accompanied with the 3/4 beat, although you will learn more suitable strumming or plucking patterns for the 6/8 beat later.
219
Cherokee/Accessibility. This site is dedicated to continuously monitoring and improving accessibility features so that everyone is able to learn the content with as few obstacles as possible. We welcome comments, concerns, or questions about accessibility on the Discussion page associated with this page. Here are the people this website aims to be particularly accessible for in the medium term:
75
Western Music History/Old Country Music. Introduction Old country music traces back to the early 20th century. The music itself emerged from multiple unique musical traditions in the Southern United States. Its origins can be found in folk music, blues, gospel, and Appalachian music. Old country music is a large blend of elements from these diverse influences. During the early years of old country music, all the way from the 1920s through the mid-20th century, America experienced significant challenges. These challenges were social, economic, and cultural changes that were harshly happening during this time. The era itself was defined by the Great Depression, rural life, migration, technological advancements like radio and the recording industry that made the music become more popular. The southern “cowboy” lifestyle also influenced the sound. Old country music both romanticized and highlighted the challenges of rural life. The music also reflected social issues such as gender roles and patriotism. It was a time of hardship and resilience. Folk Music The influence of British folk music on the development of southern old country music is significant. Many settlers in the southern United States mainly in the Appalachia, were of British descent. Many of these settlers brought many musical traditions that would later merge with other influences to form what is now known as old country music. British folk music also has a large emphasis on storytelling with simple instrumentation and themes of everyday life that provide a foundation on which old country music would continue to build. Folk musics oral tradition also influenced how old country songs were shared with artists, adding their own touches to traditional sounds or creating new ones inspired by folk melodies. Gospel Music Gospel music provided a unique influence on old country music. This became evident in their shared roots in African American spirituals that were similar to blues and folk traditions. They also related similarly to the musical style and lyrical themes. There are many groups that influenced old country. One of these groups being The Dixie Hummingbirds. The Dixie Hummingbirds were a gospel group that dates back to the 1930s and had a significant impact on old country music despite mainly belonging to the gospel genre. While their main focus was gospel, they also occasionally collaborated with country artists. They showcased their multiple talents and strongly crossed genre boundaries. With their unique harmonies and dynamic stage presence, the Dixie Hummingbirds brought together large audiences from various musical backgrounds. Through these collaborations and shared performances they played a significant role in connecting gospel and country music which had left a lasting impression on the landscape of old country music. Blues and Jazz Blues and jazz played large roles in shaping the evolution of old country music during its developmental years in the early 20th century. Their impact was clear in multiple factors of the genre. The distinct 12-bar chord progressions and emotional melodies of blues heavily influenced the structure and tonality of many old country songs. Elements of jazz, such as improvisation and syncopation were starting to make their way into the musical arrangements and performances of popular country musicians. Blues introduced the slide guitar, this instrument became a defining feature of old country recordings. Occasional jazz instruments like the trumpet and saxophone added variety and sophistication to the music. Through Jazz and Blues, the cultural exchange between African American communities and white rural communities began. Both communities contributed to the artists and ideas which had blurred the boundaries between genres. This exchange enriched the musical landscape as well as fostering collaborations and inspiring new sounds within old country music which ultimately shaped its evolution over time. Harmony Old country harmony is characterized by simple yet highly emotional vocal arrangements that often feature tight harmonies and close intervals. The harmonies in traditional old country music typically consist of two or three voices blending together to create a rich heartfelt sound. The harmony parts usually follow a traditional chord structure. This will often complement the melody while also adding depth and texture to the overall sound. Unlike more complex vocal arrangements found in genres like cappella, old country harmony tends to prioritize authenticity over technical precision. Many old country songs leave many mistakes and voice cracks in their music to leave a realistic feel to the song. This approach allows the emotional content of the lyrics and melody to shine through which creates a timeless and everlasting musical experience for listeners. Artists that are similar to The Carter Family are known for their talent because of the use of harmony in old country music. Many artists to this day follow their lead in harmonizing. Dynamics and Rhythm Old country music is strong in storytelling where artists expressed the experiences and emotions of everyday people through simple instrumentation and a strong emphasis on meaningful lyrics. The sound itself showcased acoustic guitars, fiddles, banjos, and harmonicas. The simplicity of these instruments added more emotion and character to the songs. These narratives were often tales of love and heartbreak to reflect on the struggles and joys of rural Southern life in America. Old country songs often favored memorable tunes that were easy to sing along with. It offered a diverse range of tempos from slow melancholic ballads to lively fast tunes. Some songs brought in elements of call and response which adding depth and texture to the storytelling. The dynamics and rhythm of old country music created a rich tapestry of sounds and emotions that continue to relate with audiences. Hank Williams Hank Williams was born by Hiram King Williams and was one of the most influential American singer songwriters of the 20th century. He was particularly popular within the realm of country music. He was born on September 17, 1923 in Mount Olive, Alabama, and grew up to become a strong musician and performer. William’s contributions to old country music include iconic songs such as "Your Cheatin' Heart" and "Hey Good Lookin'". He is often renowned for shaping the honky tonk style and is considered one of the pioneers of the genre. William’s career was unfortunately cut short when he died at the age of 29 on January 1, 1953. His impact on music continues to be felt to this day as his songs continue to be covered by thousands of artists. Conclusion In conclusion, old country music still exists as a powerful reflection of early 20th century America. Its impact still being felt today. As the sound has evolved into modern country, it stayed true to its original roots. The sound is influenced by a unique blend of folk, blues, gospel, and jazz music. This mix of genres not only shaped its unique sound but also brought communities together through shared experiences. To this day, many iconic artists have made and will make significant contributions within country music. References 1. Bertrand, Michael T. Southern History Remixed: On Rock 'n' Roll and the Dilemma of Race. University Press of Florida, 2023. 2. Dallin, Leon. Folk Songster. W.C. Brown Co. 1967. 3. Library of Congress. "Dolly Parton and the Roots of Country Music." In Dolly Parton and the Roots of Country Music: Articles and Essays, Country Music Timeline. 2021. 4. Alexander, Otis. "Dixie Hummingbirds (1928- )." Black Past, December 18, 2021 5. Wallenfeldt, Jeff. "Hank Williams." In Encyclopedia Britannica. April 16, 2012. 6. Wald, Elijah. "Blues and Country Music." In The Blues: A Very Short Introduction, by Elijah Wald, 95. Oxford University Press, June 2010. 7. Buar, Pat. "Country Music." The Editors of Encyclopaedia Britannica. April 17, 2020. 8. Peacock, Kenneth, and Carmelle Bégin. "Folk Music." Published Online February 7, 2006.
1,769
Cherokee/Pairs. "Critical pairs" is a concept that may help you remember certain vocabulary by emphasizing the typically one-to-two correspondence between some English and Cherokee terms. In other words, a critical pair refers to either the "two" ways in Cherokee that a single concept in English is expressed, or the one way that "two" English concepts are expressed in Cherokee. The number two is not important—it could be three or even more. The point is that you should ideally be conscious of the cases in which the correspondence of terms between the two languages is not one-to-one.
135
Information Technology and Ethics/Privacy and Data Big Data. Big Data and Privacy. Introduction. The rapid advancement of technology has led to the collection and use of big data , which have revolutionized various industries by enabling data-driven decision-making and innovation. However, the collection and use of big data have also raised significant ethical and privacy concerns. This section explores the key privacy issues surrounding data collection, aggregation, and the use of Large Language Models, highlighting the need for robust privacy protections. Data Collection. Data collection is a crucial step in the creation of Big Data models, as large quantities of high-quality data are required to produce accurate results. Data collectors, such as Google, Amazon, and Facebook, are uniquely positioned to collect user data due to the prominence of their platforms. The desire to outcompete rivals drives organizations to collect more data, often at the cost of user privacy. To address privacy concerns, data collectors implement sanitization processes to remove Personally Identifiable Information (PII). However, not all instances of data collection can afford to have the data sanitized, particularly in industries like finance, where personal information is essential for operations. Privacy concerns surrounding data collection have grown as social media has become more prominent, calling into question the responsibility of data collectors in shaping how humans interact, socialize, and hold others accountable. Governments have also become involved in big data, with authoritarian regimes collecting increased amounts of data for surveillance purposes, while liberal democracies have created legislation to guide private enterprises in being less invasive with data collection, often with mixed results. Several notable scandals have revealed that many liberal democracies engage in mass surveillance. Data Aggregation. Data aggregation is fundamental in industries such as finance, healthcare, and cybersecurity, where it enhances decision-making and operational efficiencies by synthesizing data from multiple sources. However, the benefits of data aggregation come with significant ethical concerns regarding privacy and data security. The integration of data from diverse sources can inadvertently expose PII, even when individual datasets are anonymized, highlighting weaknesses in current privacy protection methods. Ethical challenges in data aggregation extend to issues of consent and the potential for reinforcing biases. The opaque nature of data collection practices complicates individuals' ability to provide informed consent, and aggregated data can unintentionally perpetuate existing biases, leading to discriminatory outcomes in services or decision-making processes. To address these ethical challenges, there is a pressing need for enhanced transparency and accountability in how aggregated data is handled. Organizations must ensure that individuals understand how their data is being used and have mechanisms in place for data subjects to control their information . Developing robust privacy protections and ethical guidelines for data use is crucial to safeguard individual rights and maintain public trust. Large Language Models LLMs. LLMs have raised significant privacy concerns due to their ability to memorize and potentially leak sensitive information from their training data. LLMs like GPT-3.5-turbo can inadvertently expose non-public details about their training data, such as passwords, during interactions with users. This data leakage vulnerability stems from the vast amounts of web-scraped data used to train these models, which may include private information. Researchers evaluating LLMs often feed them test set data in ways that allow the model providers to use that data for further training, potentially exposing millions of samples and providing a wealth of "gold standard" data that could give these models an unfair advantage. The privacy risks of LLMs extend beyond training data exposure to the potential compromise of user data entered into LLM-powered applications, as demonstrated by end-to-end attacks that exploit vulnerabilities in output generation and interactions with system components like plugins and user interfaces . The scale and complexity of the data used to train and interact with these models have opened up new ways of breaching privacy. Case Study. The Equifax data breach serves as a cautionary tale, highlighting the risks that arise as new technologies are introduced and the rate at which technology grows outpaces the law. Equifax, one of the three main US credit reporting agencies, failed to implement sufficient cybersecurity policies, leaving behind unresolved security issues. Attackers were able to exploit vulnerabilities to gain access to Equifax's network and steal sensitive consumer data, including names, addresses, dates of birth, social security numbers, and credit card numbers . Equifax had an ethical obligation to honor promises made to customers to protect their data, but their inability to implement cybersecurity policies and patch vulnerabilities in a timely manner led to the preventable breach. The company also failed in its obligation to be transparent, waiting six weeks after the discovery of the breach to alert their customers. Equifax's position as a major credit reporting company leaves consumers with little choice but to use their services, and the company's failure to protect PII resulted in harm to their customers. The FTC-mandated cash payout for the event was insufficient to reverse the inflicted harm, emphasizing the need for companies to act ethically and protect user privacy as technology continues to advance. Conclusion. The evolution of big data models and the proliferation of large language models have introduced significant ethical and privacy concerns. Data collection, aggregation, and utilization, while essential for decision-making and innovation across various industries, have raised questions about individual privacy, consent, and the potential for reinforcing biases. Data collectors must prioritize user privacy while gathering the necessary data to develop reliable big data models. Governments must strike a balance between innovation and privacy protection through effective legislation. Strong safeguards for privacy, increased accountability, and transparency are desperately needed to address the ethical issues surrounding data aggregation.
1,248
Information Technology and Ethics/Algorithmic Bias and Fairness. What is Algorithmic Bias. Algorithmic bias is when a computer system consistently makes systematic and repeatable errors that create unfair outcomes or discriminate against a person or subject based on various factors. Often, the factors used to discriminate against a specific person are factors like race, gender, and socioeconomic standing. There are several places where bias can emerge, including the design of the algorithm, the use of the algorithm differing from the intended use, or the data used in the training of the algorithm. This bias can have a profound effect on the subjects it is being used on and will perpetuate societal inequalities. History. Algorithmic bias saw its first instance when Joseph Wizenbaum wrote about algorithmic bias in his 1976 book "Computer Power and Human Resource". It was Wizenbaum who first suggested that the bias could manifest through the data given to the artificial intelligence as well as the way in which the program was written. Given that a program can only process and come to decisions about data using the set of written rules the program was given, there is a concern that the program will have the same biases and expectations as the writer. Wizenbaum also wrote that any data being fed into the program is another instance of “human decision-making processes” while the data is selected. Wizenbaum also talks about another instance of algorithmic bias showing itself: the blind trust of the writer in the program. Wizenbaum talks about a writer being unable to understand the decision-making of the program, which is the same as a tourist making his way through a hotel, going left and right based on the flip of a coin. It does not matter if the solution ends up being correct; it is irreproducible and inconsistent. An example of algorithmic bias from this time was the applicant screening program used by St. George’s Hospital Medical School. If the applicant was female or had a “foreign-sounding” name, the program already docked points to the application, giving white males a much higher chance of admission. The program was written by Dr. Geoffrey Franglin, who wrote it to lessen discriminatory action and make the task of the initial application round easier. Franglin thought that ceding the responsibility would make the process both easier and fairer. Franglin has coded the bias directly in the program, and the program was perpetuating the same racial bias that the human assessors had. In the modern day, algorithms are more expertly made and often will avoid most bias that the writer may accidentally introduce through rules or by data, but there are still instances where algorithmic bias will still show itself. It can show itself in often unpredictable ways that are hard to account for. Algorithms and algorithmic bias are often used less as a tool to achieve some end and more as an authoritative figure used to generate said end while posturing itself as the virtual means. Instead of using algorithms to study human behavior, it could be a way for human behavior to be defined. Considering this, working groups co-created the group Fairness, Accountability, and Transparency in Machine Learning (FAT). Those within the group had the idea to patrol the outcomes of algorithms and to vote on if algorithms have a harmful effect and if they should be controlled or restricted. Many, however, think that FAT cannot serve effectively due to the fact that many of the members are funded by large corporations. Existing Frameworks and Regulations. Frameworks. When it comes to frameworks for artificial intelligence there is an ever growing amount to choose from.  They are all at least a little different from each other since they are designed for a specific purpose in mind, for example JAX is a framework that was “designed for complex numerical computations on high performance devices like GPUs and TPUs” according to Intel. There are many other frameworks that are available for use for just about any project that could be thought of since there are more and more being made.  So far there isn’t much ethics taken into consideration within artificial intelligence frameworks currently since it is still such a new and evolving technology.  There are many potential areas for concern though.  For example imagine an AI chatbot that was being trained on a framework that didn’t take into consideration any ethics.  That chatbot could potentially, through interactions with people, say some things that it really shouldn’t be saying to people or expose information that it wasn’t supposed to spread.  That could lead a company into a lot of trouble between the incident happening and the potential reputation downfall that it could bring.   Regulations. With regards to the regulation of artificial intelligence there has been a lot of legislation between many states that have been passed.  There is a lot of legislation regarding safeguarding data privacy, accountability, and transparency of ai.  For example according to Rachel Wright “Texas HB 2060 (2023) is one such example. This bill established an AI advisory council consisting of public and elected officials, academics and technology experts.  The council was tasked with studying and monitoring AI systems developed or deployed by states agencies as well as issuing policy recommendations regarding data privacy and preventing algorithmic discrimination.”  There is also a blueprint for a potential AI bill of rights that has been made by the Office of Science and Technology Policy which lays out the rights that people should have when AI is being in use or using ai.  The rights it goes over is protection from unsafe systems, protection from algorithmic discrimination, data privacy measures, the right to know when ai is being used, and the right to opt out of using ai if you don’t want to.   Case Studies. Case Study 1: Predictive Policing: Chicago Police Department and the Strategic Subjects List. Predictive policing algorithms utilize data analysis and machine learning methods to predict the areas where crime is probable to happen and distribute law enforcement resources accordingly. Advocates believe that these systems can reduce crime and improve public safety, but critics fear they may be biased and infringe on civil liberties. A study by Rudin et al. in 2020 examined the utilization of predictive policing algorithms in Chicago. The research discovered that these algorithms focused mainly on Black and Hispanic areas, resulting in unequal monitoring and policing of minority communities. Furthermore, the algorithms depended on past crime data, which could mirror biases in policing methods and uphold systemic disparities. Ethical Implications. The employment of predictive policing algorithms gives rise to ethical concerns regarding fairness, transparency, and accountability. Critics claim that these systems may worsen current inequalities in policing and erode trust between law enforcement and marginalized groups. Public Debate and Reform Efforts. Groups advocating for civil rights, community organizations, and advocates are pushing for more transparency, community involvement, and accountability in the creation and use of predictive policing algorithms such as the SSL. Legislation has been implemented in certain areas to oversee the use of predictive policing algorithms, with a focus on transparency, accountability, and preventing bias and discrimination. The case of the Chicago Police Department's Strategic Subjects List (SSL) shows how predictive policing algorithms have intricate ethical and social consequences. Although these algorithms offer the potential to reduce crime and improve public safety, they also bring up important issues regarding transparency, accountability, fairness, and the risk of bias and discrimination. Dealing with these obstacles involves thoughtful reflection on the ethical principles and values that should steer the creation and utilization of predictive policing technologies to guarantee they advance justice, fairness, and the safeguarding of civil liberties. Case Study 2: Amazon Hiring System. To assist in hiring top people, Amazon created a recruitment tool in 2014 that is driven by AI.  Throughout a ten-year period, resumes submitted to Amazon were used to train the AI model. Since males predominate in the computer field, the majority of these resumes were provided by men. The system thus learnt to devalue graduates of all-women's universities and punish resumes that contained the phrase "women's". Having been unable to completely troubleshoot the biased system, Amazon finally abandoned the project in the following years. The example demonstrated how, if not properly examined and rectified, AI algorithms may inherit and magnify social biases contained in training data. It acted as a warning about the moral perils of using AI recruiting tools without sufficient measures for mitigating prejudice and testing. The event brought to light the need of having a diverse staff in AI and doing thorough bias evaluations when developing AI. Challenges. Data Bias. Algorithms trained on data sets that are skewed, reflecting past biases or social disparities, will pick up on and reinforce those biases. ProPublica's 2018 report uncovered racial bias in COMPAS software used in the American criminal justice system. The algorithm was more likely to misclassify black defendants as high-risk compared to white defendants. This highlights a common issue - unbalanced data sets. If certain demographics are underrepresented in the training data, the algorithm may perform poorly for those groups. Model Bias. Algorithmic Design Choices. The way algorithms are designed can introduce bias. Choices about factors and weightage can lead to discriminatory outcomes. Even with unbiased data, models can still exhibit biases due to the algorithm's design or assumptions. In 2020, the U.S. Department of Housing and Urban Development (HUD) lodged a complaint against Facebook, accusing the company's advertising platform of enabling discrimination based on race, gender, and other protected characteristics. This situation highlights the legal and ethical consequences of biased algorithms in advertising and housing. Perpetuating Bias through Feedback Loops. Algorithms that depend on user data have the potential to magnify existing biases as time goes on. If an algorithm favors a specific group, it could produce outcomes that perpetuate that bias in user engagements. Algorithms that produce biased results can reinforce societal biases when incorporated into decision-making processes, establishing a cycle of perpetuation. YouTube's recommendation algorithm has been criticized for promoting extremist content. This bias arises from the algorithm's tendency to recommend content similar to what a user has previously watched, potentially leading users down paths of radicalization. Lack of Transparency. Many algorithms are complex "black boxes". It's difficult to understand how they arrive at decisions, making it hard to identify and address bias. US Department of Homeland Security involved a US citizen who was selected for extra screening at the border due to an algorithm utilized by Customs and Border Protection (CBP). The plaintiff was granted the right by the court to contest the decision made by the algorithm because of its lack of transparency. Fairness Metrics and Trade-offs. Achieving a balance between various concepts of fairness in algorithmic decision-making is difficult because prioritizing one fairness measure could mean sacrificing another. In 2016, Google researchers discovered that an image recognition algorithm had a greater error rate for individuals with darker skin as opposed to those with lighter skin. When they tried to counteract this prejudice by fine-tuning the model to lower the overall error rates, they discovered that the error rates for people with lighter skin rose, showcasing the compromises needed to tackle algorithmic bias. Legal Issues. Discrimination Laws. Current laws aimed at preventing discrimination, like the Civil Rights Act of 1964 in the US, forbid bias related to protected traits like race, sex, and religion. Yet, the complexity of algorithmic systems makes it challenging to apply these laws and to pinpoint discriminatory intent. In 2019, Apple Card was accused of gender bias when it was found that women were receiving significantly lower credit limits than men, despite having comparable credit scores. Apple and Goldman Sachs faced criticism for lack of transparency in determining credit limits for the card. Privacy and Data Protection. Laws like GDPR in the EU and CCPA in the US seek to safeguard individuals' rights on how their personal data is collected, used, and shared. More and more, rules are focusing on the transparency and accountability of algorithms, making it necessary for companies to give reasons for automated decisions that have a big impact on people. The French Data Protection Authority (CNIL) imposed a €50 million fine on Google in 2019 for breaching GDPR rules on transparent consent for personalized ads. In 2020, the GDPR of the EU was utilized to question a facial recognition technology employed by Clearview AI. The company was penalized for gathering biometric information from individuals in the EU without their permission. Regulatory Challenges. Policymakers face significant challenges in regulating algorithmic bias and fairness because of the rapid pace of technological innovation and the global reach of digital platforms. Attempts to create regulatory structures frequently encounter opposition from industry participants worried about inhibiting innovation or enforcing onerous compliance standards. Nonetheless, regulatory efforts are being made in different areas to tackle the issues of algorithm transparency, accountability, and fairness. The European Commission's proposed Artificial Intelligence Act aims to regulate high-risk AI systems, including those with potential biases that could harm individuals. Ethical Considerations. Data Bias. AI algorithms are trained on data; they learn from the datasets we provide. However, if the data contains biases, the algorithm might inadvertently strengthen or even blow them out of proportion. To prevent this, it's crucial to carefully select and prepare a diverse, well-rounded, and balanced dataset. This ensures that any underlying biases can be identified and minimized for fairer AI systems. Algorithmic Bias. Due to its design, presumptions, or optimization goals, the algorithm itself may generate biases even in the case of impartial training data. It is critical to assess how well the algorithm performs across various subgroups and make sure it does not prejudice against any one group. Data Privacy. Large volumes of personal data are frequently used by AI systems, which presents privacy issues. To preserve people's privacy, strong data protection mechanisms including anonymization, data encryption, and access control must be put in place. Promote Transparency. Organizations can create autonomous oversight tools to keep an eye on the behavior of AI systems and use algorithmic auditing procedures to encourage accountability and transparency in AI. Algorithmic impact evaluations are one type of transparency tool that might improve credibility and accountability. Diverse Perspective. One way to lessen biases in the creation and use of AI systems is to make sure AI teams are inclusive and diverse. Diverse viewpoints and life experiences can aid in recognizing and resolving possible biases and ethical quandaries. Human Oversight. Even if AI algorithms are capable of automating decision-making procedures, human supervision and responsibility must always be maintained. Particularly in delicate or high-stakes circumstances, humans ought to examine and confirm the algorithm's conclusions. Continuous Monitoring and Updating. Biases may appear or change over time in AI systems since they work in dynamic contexts. To preserve fairness and reduce newly developing biases, the algorithm's performance must be regularly monitored and updated as appropriate. Future Directions and Innovations. Advanced Fairness Metrics and Tools. Fairness Metrics. Establishing future metrics in the field of AI ethics, especially regarding algorithmic bias and accuracy, is important to ensure fair and accurate AI systems. Bias in AI comes from systematic errors that lead to negative results. This often results from assumptions made in development phases such as data collection, algorithm design, and model training. For example, a scoring algorithm trained on biased data can favor candidates from certain populations, preserving existing biases in AI systems. This ensures that AI models treat everyone fairly, regardless of factors such as age, gender, race, and socioeconomic status. Technology managers must define and use metrics to ensure the development of ethical AI systems. Although the US government does not have such legislation, the legal environment surrounding AI and equity is changing. Current laws, such as the Fair Credit Reporting Act and the Equal Credit Opportunity Act, affect AI equity. Around the world, countries are moving forward with AI legislation, with the EU and Canada leading the way in promoting transparency, accountability, and fairness in AI systems. Fairness Tools. Tools like IBM’s AI Fairness 360 provide a framework for detecting and mitigating bias in machine learning models, providing the foundation for real-time monitoring solutions. The toolset was designed as a part of IBM’s broader effort to bring processes to the delivery of AI and provide a comprehensive set of algorithms, metrics and datasets focused on accuracy. AIF360 includes over 70 fairness metrics and more than 10 bias mitigation algorithms. AI Fairness 360 can be used in variety of industries and fields such as finance, human resources, healthcare, and criminal justice, where AI decision-making systems can have a significant impact on people’s lives. By installing this set of tools, organizations can ensure that their AI systems are more efficient and accurate, reducing the risk of negative biases that lead to discrimination. Stakeholder Collaboration and Public Engagement. Stakeholder collaboration and public participation are important steps in addressing procedural bias and equity in AI ethics. These efforts demonstrate the importance of collaboration and the power of public action to ensure that AI systems are developed and deployed ethically and fairly. Interdisciplinary Collaborations. Collaborative efforts across multiple disciplines are critical to developing accurate and sustainable AI systems. Stakeholders from various fields, such as technology, social science, ethics, and law, are involved in these collaborations. The objective is to develop AI in a comprehensive manner that incorporates ethical considerations at every stage. This approach of learning aids in comprehending the complex nature of the AI hypothesis and developing a comprehensive mitigation strategy. Public Participation in AI Ethics. Public participation is essential in managing AI technology. This includes community engagement through communications, open forums, and participatory design processes. This work will ensure that the development of AI technologies is consistent with public value and social norms. AI systems will be better understood and accountable. Public engagement can be promoted using methods such as advisory voting, which brings together diverse groups of people to discuss and provide input on AI policy. Educational Initiatives and Awareness. To effectively address algorithmic bias and fairness through educational initiatives and public awareness campaigns, several approaches have been explored and implemented across various organizations and educational bodies. Educational Initiative. The knowledge and attitudes of technologists and policymakers can be shaped by training curricula that focus on the ethics and legitimacy of AI. For example, projects such as the AI ​​+ Ethics curriculum developed by the MIT Media Lab for high school students aim to raise awareness of AI technology and its impact on society, including the issue of algorithmic bias. Public Awareness Campaigns. Organizations like AI for Humanity are using popular culture to raise awareness among some people about the implications of AI for social justice and to focus on the impact of these technologies on black communities. This includes legislative efforts to ensure transparency and accountability in AI applications. Collaborative Research and Public Discussions. Sites like AI and the Carnegie Commission's Equality Initiative bring academics together to discuss and address biases in AI, such as gender bias, inequality persists at algorithmic cost. These debates not only raise awareness but encourage research that informs policy and practice.
4,319
TeX/unskip. Synopsis. codice_1 will remove the last glue from the current list. Description. IF the last item on the current list is glue, codice_1 removes it; otherwise codice_1 has no effect. It does not remove kerns. The command may not be used in vertical mode if the main vertical list-so-far has been entirely contributed to the current page [280]. However, \vskip-\lastskip has almost the same effect. codice_1 is used where you want to allow some flexibility in the input syntax. For example, it's used in some of the centring code to avoid a space at the start of a line messing up the alignment. Examples. %! See = [2] https://tex.stackexchange.com/a/104036 \space\space\unskip % similar to `\space` \space\space\unskip\unskip % similar to `` \space\kern0pt\unskip % similar to `\space\kern0pt` (kern doesn't get removed) %! See = [1] https://www.tug.org/utilities/plain/cseq.html#unskip-rp \ifdim\lastskip=0pt %test for glue. \else \skip1=\lastskip %store last glue in \skip1. \unskip %remove glue from list \fi
333
Guitar/Chord changes G-C-D. Original page translated by Google </noinclude> = C major chord or G major cadence = All you need is a new chord and you're already in a new key. This time it's the key of G major. We're leaving the A major chord behind. A major is not part of the key of G major and only occurs there as an exception at most. On the other hand, the chord C major regularly belongs to the key of G major. The three major chords of the key of G major are G C and D. Comparison using the circle of fifths In the new key of G major, G is now the calm tonic, C is the connecting subdominant and D is the tense dominant. In the key of G major, the dominant often appears as D7, although we can simply ignore the 7 at the beginning.<br>Go through again and replace the tonic D major with the new tonic G major. The old subdominant G is replaced by C and the dominant A by D.<br>This is also how you proceed if you want to transpose a song into a higher or lower key. From G major to C major and back again. Even if it is not yet necessary for the current playing, I would like to point out the "black" notes. These notes have the same name as the chord. They are the basic notes of the chord. Later on, we will use these notes for plucking and for special touch exercises in which the bass note is to be emphasized. For the moment, however, you don't need to concern yourself with this. The Roman numeral 3 (III) only refers to the 3rd fret. Since people like to work with numbers in chords, you can avoid some confusion by indicating the frets with Roman numerals. For me C major is somewhere in the 'c'enter. It is best to practice changing the chords several times in a row. From C to D and back. You should also practice the following grip change a few times in isolation. But in principle you shouldn't have any difficulties with it. Audio example: <score sound="1" raw="1"> \version "2.20.0" \header { title="Western Strumming Pattern G C D C " encoder="mjchael" myChords = \new ChordNames { \chordmode { g1 c d c BB_G = { <g, b d>4 \downbow <g b g'>8 \downbow <g b g'> \upbow <g, b d>4 \downbow <g b g'>8 \downbow <g b g'> \upbow BB_C = { <e, c e>4 \downbow <g c' e'>8 \downbow <g c' e'> \upbow <e, c e>4 \downbow <g c' e'>8 \downbow <g c' e'> \upbow BB_D = { 4 \downbow 8 \downbow \upbow 4 \downbow 8 \downbow \upbow myRhythm = { \repeat volta 4 { \BB_G \BB_C \BB_D \BB_C \mark "4x" \score { « %layout \myChords \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm \score { « % midi \unfoldRepeats { \tempo 4 = 90 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" c4 b, a, \myRhythm <g, b, d g b g,>1 \downbow \paper { indent=0\mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> The three notes at the beginning are an upbeat and give you the cue to get into the strumming pattern. Audio sample. <score sound="1" raw="1"> \version "2.20.0" \header { title="G major cadence with western pattern" encoder="mjchael" myChords = \new ChordNames { \chordmode { g1 c d g BB_G = { <g, b, d>4 \downbow <g b g'>8 \downbow <g b g'> \upbow <g, b, d>4 \downbow <g b g'>8 \downbow <g b g'> \upbow BB_C = { <e, c e>4 \downbow <g c' e'>8 \downbow <g c' e'> \upbow <e, c e>4 \downbow <g c' e'>8 \downbow <g c' e'> \upbow BB_D = { 4 \downbow 8 \downbow \upbow 4 \downbow 8 \downbow \upbow myRhythm = { \repeat volta 4 { \BB_G \BB_C \break \BB_D \BB_G \mark "4x" \score { « %layout \myChords \new TabStaff { \tabFullNotation \myRhythm \score { « % midi \unfoldRepeats { \tempo 4 = 90 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" c4 b, a, \myRhythm <g, b, d g b g,>1 \downbow \paper { indent=0\mm line-width=120\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> This is what the western beat looks like in a tablature. How this is read will be covered at a later date. But pay attention to the notes. Every note that has only one beat (i.e. if you count a number without a following "and") also has only one note stem. There is no additional flag or bar. If a double beat is played down and up, the note stems are usually connected by a bar. The first note is usually the downbeat, and the second, which is connected to the bar, is the upbeat, or the "and". What is a major cadence? The G major cadence G C D G is a special chord progression. So tonic, subdominant, dominant, tonic. Play it once. The chords have a certain auditory impression and therefore a certain function: G = start, C = continuation, D = tension, G = resolution. This chord sequence is called the G major cadence and helps your ear to find its way around the key. Names of the strings. If you don't already know or haven't read it somewhere else: <hr>
1,889
Songbook/Oh, Susanna. =Oh, Susanna= Stephen Collins Foster (*1826 - †1864) was the most famous songwriter in the USA at the time. Many of his songs are still well-known 150 years after they were written. The song "Oh Susanna" is Stephen Foster's biggest hit. Oh, Susanna. <score sound="1" raw="1"> \version "2.20.0" \header { title = "Oh, Susanna" % subtitle = "Subtitle" % poet = "Poet" composer = "Stepen Foster (1848 publ.)" % arranger = "arr: ccbysa: Wikibooks (mjchael)" myKey = { \clef "treble" \time 4/4 \tempo 4 = 140 %%Tempo ausblenden \set Score.tempoHideNote = ##t \key g\major %% Akkorde myChords = \chordmode { \set Staff.midiInstrument = #"acoustic guitar (nylon)" %% Akkorde nur beim Wechsel Notieren \set chordChanges = ##t %% Lagerfeuerschlag %% 1 . 2 + . + 4 . \partial 4 s4 g,4 g,8 4 8 4 % G g,4 g,8 4 8 4 % G g,4 g,8 4 8 4 % G d,4 d8 4 8 4 % D g,4 g,8 4 8 4 % G g,4 g,8 4 8 4 % G d,4 d8 4 8 4 % D g,4 g,8 4 8 4 % G c,4 c8 4 8 4 % C c,4 c8 4 8 4 % C g,4 g,8 4 8 4 % G d,4 d8 4 8 4 % D g,4 g,8 4 8 4 % G g,4 g,8 4 8 4 % G d,4 d8 4 8 4 % D g,4 g,8 4 8 4 % G myMelody = \relative c" { \myKey \set Staff.midiInstrument = #"trombone" \partial 4 g8 a | b4 d d4. e8 | d4 b g4. a8 | b4 b a g | a2. g8 a | b4 d d4. e8 | d4 b g4. a8 | b4 b a a | g2. r4 | \bar "||" c2 c | e4 2 4 | d4 d b g | a2. g8 a | b4 d d4. e8 | d4 b g4. a8 | b4 b a a | g2. r4 | \bar "|." myLyrics = \lyricmode { \set stanza = "1." I _ come from A -- la -- ba -- ma with my ban -- jo on my knee, I'm _ going to Loui -- si -- a -- na, my _ true love for to see; Oh! Su -- san -- na, oh don't you cry for me, I've _ come from A -- la -- ba -- ma with my ban -- jo on my knee. \score { % \new TabStaff { \myChords } %% Check %% unterdrückt im raw="1"-Modus das DinA4-Format. \paper { indent=0\mm %% DinA4 0 210mm - 10mm Rand - 20mm Lochrand = 180mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> These chords and rhythm have been simplified for beginners. The D major chord is played a little earlier than necessary in the simplified version, which makes the accompaniment easier. The song sounds better (in my opinion) if you play D major half a bar later. For this you need a quick chord change which is described in lesson 5 of the campfire diploma. The "later" version of the D major chord is marked with an apostrophe.
1,081
Guitar/song examples/Campfire Diploma/Banana Boat Song (Day-O). <noinclude> </noinclude
38
Songbook/Banana Boat Song (Day-O). = Banana Boat Song (Day-O) = The Banana Boat Song is a calypso, the most famous version of which was sung by Harry Belafonte. Banana Boat Song (Day-O). <poem> Come, Mr. Tallyman, tally me banana Daylight come, and I wanna go home Come, Mr. Tallyman, tally me banana Daylight come, and I wanna go home Heave six foot, seven foot, eight foot bunch Daylight come, and I wanna go home Heave six foot, seven foot, eight foot bunch Daylight come, and I wanna go home A clerk man a check but him check with caution Daylight come, and I wanna go home A clerk man a check but him check with caution Daylight come, and I wanna go home </poem>
219
Guitar/song examples/Campfire Diploma/Oh Marry Don't You Weep. <noinclude> </noinclude
37
Songbook/Down by the riverside. =Down by the riverside= <score lang="ABC" vorbis=1 midi="1" raw="1"> X:1 T:Down By The Riverside (Gospel) C:trad. O:USA R:Spiritual M:2/4 L:1/8 Q:1/4=74 K:Gmaj z/2 B/2B/2^A/2|"G"BD2E|G^A|BG|A<G F2|"G"z B B>^A|B^A|B
154
Guitar/General rules for fingering. = The general rules for fingering = The fingerings that are taught here for the individual chords did not come about by chance. They are based on the classical guitar schools and are intended to prepare you now if you want to play fingerstyle later on (e.g. in the melody picking course). A chord should always be played in such a way that the fingers have to move as little as possible when changing the grip. Advantages of standard fingering. Of course there are exceptions, but these can safely wait until you can play all the standard chords with the standard fingerings and have taken advantage of all the learning benefits of the standard fingering. And if you don't believe it yet: with just a few "mnemonics" you can find all the notes of the C major scale in the first frets. And you won't need more than one lesson to learn it. Preferred positions. From the general fingering rules you can derive a "favorite position" for the fingers for the simple chords. If a finger is not needed for a certain chord, it can lie in wait hovering above its favorite position. It will probably be needed there again soon. Favorite positions: index finger codice_1 codice_2 codice_1 codice_4 codice_4 codice_4 middle finger codice_4 codice_4 codice_9 codice_10 codice_9 codice_4 ring finger codice_4 codice_4 codice_4 codice_16 codice_17 codice_16 pinkie finger codice_19 codice_20 codice_19 codice_4 codice_4 codice_4 It is recommended to always keep your ring and middle fingers close together, as they will most likely be gripped in one of these two positions: Tip. If you have already learned a different fingering, you should simply learn the standard fingering like a new chord and use it for new songs. As soon as you have noticed the advantages of the standard fingering, you will also use the "new" fingering for the old songs. G without pinky?
509
Guitar/Campfire strumming pattern. = The campfire strumming pattern= With the “Western strumming” we had a good preliminary exercise for the “campfire strumming”, because the first half of the “Western strumming” is the same as the first half of the “campfire strumming”: The second half of the campfire strumming takes a little getting used to. The "3" is not played! Instead, an air stroke is played (as if you were deliberately missing the 3). This means that two "ands" or two upbeats follow one another: It is absolutely important that the upstrokes and downstrokes of the hand are executed evenly, because experience shows that two consecutive upstrokes tempt you to execute these two strokes too quickly. This leads to an improper rhythm and a wrong beat. This mistake should be avoided at all costs. Inaccurately played chords, poorly executed downstrokes, even wrong chords, you can tolerate all of this at first and even overlook it, because it all goes away with enough practice. But if a beat is not right, i.e. if it is a little shorter or longer than it should be, then you will throw everyone singing along out of time. The best way to counteract the unwanted "beat shortening" is to make your arm movements quite wide. It helps to raise and lower your hand at least as far as the guitar is wide when you strike. If you manage to perform this somewhat exaggeratedly wide movement fairly evenly, you will get the right rhythm pretty quickly. As soon as the rhythm is right, you can make more subtle beat movements again. It is worth practicing the second half of the campfire beat in isolation for a while first. The first half of the stroke has already been practiced with the Western stroke. The tip with the tap. Use your foot to help you and tap the beat. The striking hand and the foot move in parallel. Just imagine that your hand is connected to your foot with a thread (like a marionette). Each tap is a number and every time you lift your foot you get an “and”. The arm hits down parallel to each tap, and every time you lift your foot the arm also goes up. The rhythm is created by the strings sometimes being touched and sometimes not being touched during the up and down strokes. Even the head can easily follow this movement. And at least when you practice, the rhythm is counted loudly and clearly. “One – two and – and four” – “One – two and – and four” If you accompany a group with the guitar, the striking arm can sometimes replace a conductor’s baton. Therefore, you don't need to be afraid if you make the movements a little too clearly at first. Just imagine that you are conducting a choir with your percussion hand at the same time. When do you use which strumming pattern? The 4/4 beat is a very simple beat that is reminiscent of a simple marching tempo. The western strumming pattern can almost always be used where the 4/4 beat or the campfire beat is also suitable. It is very reminiscent of country and western songs (hence the nickname). If you have songs in which chords are changed often and quickly one after the other, beginners have a little less trouble changing the chord in the middle of the bar than with the campfire strumming pattern. You change at the "1" and at the "3". Now, to practice, you have to practice the songs with the beats suggested here. Later, your own taste will decide which strumming pattern you prefer. At the moment you only know four strumming patterns, but that will change sooner or later. There is no set rule as to which strumming pattern to use, as long as the beat is right. There are a number of beat patterns that are suitable for certain styles of music. And there are countless variations of each beat pattern. It is even quite common to use several beat patterns or variations of a basic pattern in one and the same song. You can choose the beat pattern based on the original, but you don't have to. It is enough if the beat pattern only half fits the piece. Even the original performers vary their beat patterns from performance to performance. Over time, you should learn a handful of beat patterns and learn how to vary them a little until you find a version that suits your taste, or even very close to the original. Later on, you should be able to accompany a song with very different beats, as long as the beat is right. Just try out which beat you like. What you play sometimes depends on your own mood. As already mentioned, there are no set rules for choosing a beat pattern and it doesn't always have to sound exactly like the original! Audio example. <score sound="1" raw="1"> \version "2.20.0" \header { title="Campfire strumming pattern GG CC DD CC " encoder="mjchael" myChords = \new ChordNames { \chordmode { g1 g c c d d c c Lager_G = { <g, b d>4 \downbow %1 <g b g'>8 \downbow %2 <g b g'>4 \upbow %+ <g b g'>8 \upbow %+ <g b g'>4 \downbow %4 Lager_C = { <e, c e>4 \downbow <g c' e'>8 \downbow <g c' e'>4 \upbow <g c' e'>8 \upbow <g c' e'>4 \downbow Lager_D = { 4 \downbow 8 \downbow 4 \upbow 8 \upbow 4 \downbow myRhythm = { \repeat volta 4 { \Lager_G \Lager_G \Lager_C \Lager_C \break \Lager_D \Lager_D \Lager_C \Lager_C \mark "4x" \score { « %layout % Chords \myChords % Slash Notation \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm \score { « % midi \unfoldRepeats { \tempo 4 = 90 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" c4 b, a, \myRhythm <g, b, d g b g'>1 \downbow \paper { indent=0\mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> <score sound="1" raw="1"> \version "2.20.0" \header { title="Campfire strumming pattern G C D C " encoder="mjchael" myChords = \new ChordNames { \chordmode { g1 c d c Lager_G = { <g, b d>4 \downbow %1 <g b g'>8 \downbow %2 <g b g'>4 \upbow %+ <g b g'>8 \upbow %+ <g b g'>4 \downbow %4 Lager_C = { <e, c e>4 \downbow <g c' e'>8 \downbow <g c' e'>4 \upbow <g c' e'>8 \upbow <g c' e'>4 \downbow Lager_D = { 4 \downbow 8 \downbow 4 \upbow 8 \upbow 4 \downbow myRhythm = { \repeat volta 4 { \Lager_G \Lager_C \Lager_D \Lager_C \mark "4x" \score { « %layout % Chords \myChords % Slash Notation \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm \score { « % midi \unfoldRepeats { \tempo 4 = 90 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" c4 b, a, \myRhythm <g, b, d g b g'>1 \downbow \paper { indent=0\mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> You can also practice the campfire strumming pattern with the old chords as repetition. <score sound="1" raw="1"> \version "2.20.0" \header { title="Campfire strumming pattern D A D G" encoder="mjchael" myChords = \new ChordNames { \chordmode { d1 a d g Lager_G = { <g, b d>4 \downbow %1 <g b g'>8 \downbow %2 <g b g'>4 \upbow %+ <g b g'>8 \upbow %+ <g b g'>4 \downbow %4 Lager_A = { <e, a, e>4 \downbow 8 \downbow 4 \upbow 8 \upbow 4 \downbow Lager_D = { 4 \downbow 8 \downbow 4 \upbow 8 \upbow 4 \downbow myRhythm = { \repeat volta 4 { \Lager_D \Lager_G \Lager_D \Lager_A \mark "4x" \score { « %layout % Chords \myChords % Slash Notation \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm \score { « % midi \unfoldRepeats { \tempo 4 = 120 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" g4 fis e \myRhythm 1 \downbow \paper { indent=0\mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> Interesting side note. "Campfire beat" is a somewhat imprecise term for the rhythm. In Spanish, our campfire beat is called "quintillo", which means "five beats". It is the traditional rhythm for the Latin American dance "merengue". The campfire beat has a special feature. In hardly any other beat pattern is the "1" emphasized as well as in this beat pattern. Even if the singer has lost the thread, he can quickly find the "1" again with the campfire beat. This is not so easy with other beat patterns. Take a look at the beat pattern without bar lines. You can find the single "1" relatively easily. Your hearing feels the same way when it hears the campfire beat. The ear also finds the single "1" quite quickly. This is why the campfire beat is very well suited to accompany a group while they sing.
2,975
Information Technology and Ethics/Social Media Content and Targeting. Legal and Ethical Issues of Social Media Content and Targeting. serves as a double-edged sword, offering unprecedented ways to connect and share information while also posing significant legal and ethical challenges. These platforms not only shape public discourse through the content they display but also raise questions about privacy, manipulation, and fairness due to their content targeting practices. The algorithms that underlie these processes can amplify certain voices or suppress others, impacting everything from individual mental health to democratic processes. As such, the intersection of social media content and targeting encompasses a broad spectrum of legal and ethical issues, including , , and the influence on elections and political beliefs. The ethical implications of social networking are complex and multifaceted. According to Shannon Vallor, they can be categorized into three broad areas: Social Media Content. Social media content encompasses a wide array of outputs, from user-generated posts and shared news articles to sponsored content and algorithmically determined feeds. The selection and presentation of this content can significantly influence public opinion and societal norms, making it a critical area of ethical scrutiny. Social Media Targeting. Social media targeting is the practice of delivering content to users based on an analysis of demographic, behavioral, and psychological data. This practice allows platforms to serve seemingly relevant content to each user but also poses serious ethical questions regarding privacy, autonomy, and the potential reinforcement of societal divisions and biases. Freedom of Speech and Social Media Content. Freedom of speech is a cornerstone of democratic societies, enshrined in the , which asserts that "Congress shall make no law...abridging the freedom of speech, or of the press..." However, this right is primarily protected from government infringement and does not apply to private entities, including social media companies, which can define and enforce their own rules regarding acceptable language and content. Social Media Platforms as Arbiters of Free Speech. Social media platforms serve as both a boon for free expression and a potential venue for censorship. These platforms enable individuals to share their views widely and mobilize for various causes. Yet, they also have the power to suppress speech they deem inappropriate, whether for violating community standards or for being legally contentious in certain jurisdictions. As private entities, social media companies often make intricate decisions about the content they allow. This includes decisions to permit certain types of speech from specific users—like heads of state—while blocking similar expressions from others, potentially flagging them as hate speech or terrorist content. This selective enforcement has raised concerns about the consistency and fairness of social media policies."This power that social media companies wield over speech online, and therefore over public discourse more broadly, is being recognized as a new form of governance. It is uniquely powerful because the norms favored by social media companies can be enforced directly through the architecture of social media platforms. There are no consultations, appeals, or avenues for challenge. There is little scope for users to reject a norm enforced in this manner. While a blatantly illegitimate norm may result in uproar, choices made by social media companies to favor existing local norms that violate international human rights norms are common enough."For more information on the regulation of content by social media companies, see the discussions by Kay Mathiesen, who characterizes censorship as limiting access to content either by deterring the speaker or the receiver from engaging in speech. Legal and Ethical Considerations. The legal frameworks that govern freedom of expression on social media vary significantly across countries, which can impact how speech is regulated on these platforms. In more restrictive regimes, social media companies might be compelled to comply with local laws that demand the removal of content that could be considered lawful in other contexts.The ethical challenges of balancing protection from harm against the rights to free speech create a complex landscape for content moderation. Globally, the influence of social media on freedom of expression is profound and multifaceted. Companies must navigate not only diverse legal landscapes but also broad public expectations and international human rights norms. The power wielded by these platforms can sometimes align with local norms that may infringe on universally recognized rights, thus raising questions about the role of social media as a new form of governance without traditional checks and balances. Critics argue that the architectures of social media platforms enforce norms directly through their design, leaving little room for debate or appeal. This unilateral approach to governance has sparked debates about the legitimacy of such power, especially when it might suppress voices advocating for social or political change. Restrictions to Speech and Content on Social Media. Social media platforms, as private enterprises, have the authority to set their own rules about what constitutes acceptable content on their networks. This control is essential not only for maintaining the quality of interactions within these platforms but also for complying with legal standards and protecting users from harm. Several areas of speech are particularly controversial and subject to restriction on social media, including hate speech, disinformation, propaganda, and speech that can cause harm to others. Hate Speech. on social media often targets specific racial, ethnic, or other demographic groups and can incite violence or discrimination against them. For instance, organizations like the Ku Klux Klan have used social media to spread offensive content about various groups, significantly increasing the reach and impact of their hateful messages. The reports a high number of active hate and anti-government groups in the U.S., illustrating the scale of this issue. Disinformation and Propaganda. The spread of false information or on social media is a major concern, especially given its potential to influence public opinion and election outcomes. Studies have shown that false stories reach more people and spread faster than the truth, often due to sensational or controversial content that captures user interest. Social media platforms have also been exploited to disseminate by various actors, including foreign governments. During the 2016 U.S. presidential election, there were documented cases of such activities intended to sway public opinion or create discord. Calls are often made, particularly by political leaders, for social media platforms to take down so-called "fake news," but in almost all cases, lying is classified as protected speech under the First Amendment of the U.S. Constitution. Misinformation. refers to false or inaccurate information that is spread, regardless of intent to mislead. Unlike disinformation, which is deliberately deceptive, misinformation can be spread by individuals who believe the information to be true or who have not intended to cause harm. Misinformation can cover a wide range of content, from simple factual errors to more complex misunderstandings or misrepresentations of data. The dissemination of misinformation often occurs through social media, news outlets, or word of mouth and can accelerate quickly due to the viral nature of online sharing. The effects of misinformation can be widespread, influencing public opinion, affecting decisions, and potentially leading to social or political consequences. The COVID-19 pandemic has been a fertile ground for the spread of misinformation, affecting public understanding and response to health measures, vaccines, and the virus itself. Misinformation surrounding various aspects of the pandemic, such as the efficacy of masks, the safety of vaccines, and the nature of the virus, has led to varied and sometimes contradictory public responses. One particularly damaging rumor was the unfounded claim that COVID-19 vaccines cause infertility in both men and women. This specific piece of misinformation created vaccine hesitancy, significantly impacting public health efforts to combat the virus. Despite being debunked by reputable sources including the American College of Obstetricians and Gynecologists, the American Society for Reproductive Medicine, and the Society for Maternal-Fetal Medicine, the initial rumors had already sown deep seeds of doubt. Speech That Can Cause Harm to Others. Certain types of content on social media, such as or , can directly lead to physical harm. This category also includes speech that may incite violent acts or provide information on committing harmful activities. The responsibility of social media platforms to mitigate the spread of such harmful content is a significant ethical concern. Defamation. on social media can damage individuals' reputations through the spread of false information. Legal measures often require platforms to take action against defamatory content to protect the affected parties. This is a critical area where the freedom of speech intersects with the right to protection from slanderous or libelous statements. Algorithms and Content Delivery. Social media has become incredibly prevalent in modern society, delivering incalculable volumes of content to user’s phone and computer screens. A common topic of discussion regarding social media platforms is the ominous and vague “Algorithm” that dictates user interaction and what content is popular. This “Algorithm” has its roots in the idea of a computer algorithm, broadly defined as “a step-by-step procedure for solving a problem or accomplishing some end.” Essentially, an algorithm is a method that is used to solve a problem. Algorithms are used by social media platforms to achieve the end of “content-based recommendation systems” that decide what content users can and cannot see based on a profile of the user’s interests. This profile is created using numerous data points, which are then used to gauge the user’s interest in the content being displayed to them and then serve similar content to the user. This is all in an effort to keep the user engaged with the social media platform. Incentive for User Engagement. Social media platforms want to keep users engaged with their content so that they can serve them ads, also using algorithms to determine which users should receive which ads and when. Advertisers then pay the social media platforms for displaying their ads to target audiences, granting social media platforms a constant source of revenue. Some consider using algorithms to target users with ads unethical, believing that it will inevitably target those most vulnerable. This is just one controversy, but much of the discourse surrounding social media platforms is entwined with these controversies that have arisen as the result of their use of algorithms. Clickbait and Journalistic Integrity. With the boom of social media, many news organizations found themselves needing to adapt. These news organizations now use social media platforms to distribute their content to audiences. This switch to social media has led to the news organizations relinquishing control over distribution, becoming reliant on algorithms to distribute their content. News organizations and content creators alike know that not receiving enough user interaction will hurt their futures on these social media platforms. This has led to many news organizations and content creators engaging in a practice known as “clickbait”, defined as “something … designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest.” Many news organizations have also traded away “traditional journalistic conceptions of newsworthiness and journalistic autonomy” in favor of content that increases user engagement and algorithmic viability. Targeted Content. To keep users engaged, social media platforms serve up “targeted content” which is synonymous with “content that was selected for users by an algorithm because it believes they would engage with this content.” This content is targeted based on data points like the target’s career, wealth, and education information, among other data points. Critics of targeted content have pointed out that this targeting method is predatory, allowing for targeting of extremely niche groups of people who may be most vulnerable to the ads being served to them. Critics also point out that these social media companies must harvest and process large swaths of user data to get this granular level of targeting, often done with the basis of informed consent. The concern is that users aren’t well informed of the fact they are signing away some of their privacy expectations as the result of using these social media platforms, therefore nullifying the basis of informed consent. Critics also point out that content targeting oftentimes leads to addiction to these social media platforms. This is based on the six “properties of addiction criteria: salience, mood modification, tolerance, withdrawal symptoms, conflict and relapse” that excessive use of social media has fostered in users. You can read more about social media addiction in the dedicated section found here. Content Suppression. There is another side to social media platforms’ use of algorithmic targeting and promotion of certain content, and that side is content suppression. Just as algorithms promote engagement with certain kinds of content, they also suppress other kinds of content. Critics point out that the creation of algorithms is not a neutral process, and often times the biases of the creators or society as a whole can influence the selection of content to promote and suppress. There have been examples of content creators claiming that their content was being suppressed on platforms like TikTok for posting Black Lives Matter content. Subversion of Content Targeting: Influence on Elections and Political Processes. Recent key examples highlight a multitude of ethical and legal concerns associated with content targeting on social media. Notably, instances like the involvement of Cambridge Analytica in the 2016 U.S. Presidential Election and the Brexit Referendum demonstrate how social media can be exploited to manipulate public opinion and influence political outcomes. These cases shed light on the powerful effects of targeted content strategies and the profound implications they hold for democracy. Cambridge Analytica and the 2016 U.S. Presidential Election. , a British consulting firm and a subsidiary of Strategic Communications Laboratories (SCL), gained notoriety for its significant role in political events during the mid-to-late 2010s, ultimately closing in May 2018. The firm's controversial actions stemmed from acquiring the private information of over 50 million Facebook users without authorization. This breach enabled the construction of detailed user profiles, which were then exploited to influence U.S. politics, notably during the 2016 Presidential Election and the United Kingdom’s Brexit Vote. The operation began in 2014 when Alexander Nix, the chief executive of Cambridge Analytica, proposed using psychological profiling to affect voters' behaviors. These strategies were employed to sway public opinion in favor of conservative candidates in local elections, with funding from figures such as Steve Bannon. The insufficient data initially available to the firm led to hiring Aleksandr Kogan, a Russian-American academic, to develop an app that harvested data not only from users but also from their Facebook friends. This massive data collection was facilitated by Facebook's permissive data usage policies at the time. Targeted advertising, fundraising appeals, and strategic planning of campaign activities, such as deciding where Donald Trump should visit to maximize support, were all based on these profiles. Simultaneously, tactics to demobilize Democrat voters and intensify right-wing sentiments were employed, showcasing the dual use of targeted content to both mobilize and suppress voter turnout. Brexit Referendum. Across the Atlantic, similar profiling techniques were used to influence the vote. Connections were discovered between the campaign and Cambridge Analytica through a Canadian firm known as Aggregate IQ, which was linked to various political campaign groups advocating for the UK to leave the European Union. In the crucial final days of the campaign, voters identified as persuadable were inundated with over a billion targeted advertisements, a strategy pivotal in securing the narrow margin needed to pass the referendum. These events have prompted significant changes in how social media platforms manage data and have ignited a broader discussion about the need for stringent oversight of content targeting practices to safeguard democratic processes. Censorship and Content Suppression. Censorship on social media can be nuanced and multifaceted, generally manifesting in two primary forms: censorship by suppression and censorship by deterrence. Each method has its implications and is employed under different contexts, often stirring debate over the balance between free speech and regulatory needs. Censorship by Suppression. Censorship by suppression involves prohibiting objectionable material from being published, displayed, or circulated. In the United States, this form of censorship is often equated with "prior restraint," a concept generally considered unconstitutional unless it meets a high standard of justification, typically only upheld in cases of national security or public safety. Social media platforms sometimes engage in practices that could be considered censorship by suppression when they delete or block access to certain types of content. This might include automated algorithmic suppression of content that mentions specific topics deemed sensitive or controversial. While platforms argue that this is necessary to maintain community standards, critics often view it as a form of censorship that restricts free expression. Copyright Strikes as a Form of Suppression. The issue of intellectual property rights in the context of social media highlights another form of suppression. Copyright strikes are used by platforms to enforce intellectual property laws automatically, often without thorough investigation. This practice can lead to the suppression of content, even if it falls under fair use provisions. Censorship by Deterrence. Censorship by deterrence does not outright block or forbid the publication of material. Instead, it relies on the threat of legal consequences, such as arrest, prosecution, or heavy fines, to discourage the creation and distribution of objectionable content. This form of censorship can be particularly chilling, as it targets both the publishers of the content and those who might access it, fostering a climate of fear and self-censorship. One of the critical issues with both forms of censorship is the difficulty in distinguishing between publishers (those who create and post content online) and platforms (those who host content published by others). In theory, platforms are protected from liability for user-generated content by Section 230 of the Communications Decency Act, a key piece of internet legislation that allows online services to host user-generated content without being liable for its content under most circumstances. Legal Framework Governing Social Media Content. The legal landscape of social media is heavily influenced by of the "Communications Decency Act" (CDA), enacted in 1996. This legislative framework provides platforms with broad immunity, protecting them from lawsuits resulting from user-generated content. Section 230 is pivotal as it allows platforms to moderate material without facing legal repercussions, thereby promoting innovation and free online communication. Section 230 of the Communications Decency Act: Challenges and Criticisms. Section 230 shields social networking sites from lawsuits related to user-posted information, enabling them to control content without being held responsible for the information they disseminate. However, this provision has faced criticism for its role in facilitating the spread of harmful content while limiting platforms' accountability, despite its intentions to foster free speech and innovation. Proliferation of Harmful Content. Critics argue that the protection afforded by Section 230 has led social networking companies to prioritize user interaction and growth over stringent content moderation. This has allowed platforms to avoid doing enough to halt the spread of harmful content, such as hate speech, false information, and cyberbullying. The lack of legal penalties for hosting such content enables bad actors to exploit these platforms, spreading dangerous materials that can harm communities and individuals. Degradation of Responsibility. The legal immunity granted to social networking sites under Section 230 is said to undermine accountability and discourage victims from seeking legal recourse for harassment or defamation experienced online. If platforms face no potential legal repercussions, they may not be motivated to proactively remove harmful content or provide adequate support to those affected. Evolving Legal Interpretations and Future Directions. The debate over Section 230 continues to evolve as stakeholders from various sectors call for reforms that balance the benefits of online free speech against the need for greater accountability. Legal scholars and policymakers are increasingly examining how laws can adapt to the complexities of content management on social media platforms, suggesting that a more nuanced approach may be necessary. This involves considering the potential for algorithmic regulation and the proportional responsibility of platforms regarding online speech. Content Moderation. Social media platforms are tasked with the critical responsibility of moderating content to curb the proliferation of harmful information. This duty involves removing posts that propagate hate speech or incite violence and suspending users who breach platform policies. The scope and efficacy of content moderation can be swayed by various factors, including political influences, cultural norms, and economic incentives. Content moderation refers to the process of screening user-generated content on digital platforms to determine its appropriateness. This encompasses evaluating text, images, and videos to ensure they adhere to the platform's guidelines. Given the immense volume of content uploaded daily, content moderation is indispensable for maintaining a safe online environment. Content moderators, the individuals at the forefront of this operation, often face significant psychological challenges due to the nature of the content they review, including exposure to violent or disturbing images and texts. Recent legal cases highlight these challenges, with Facebook settling a lawsuit for $52 million with moderators over the trauma incurred from their job duties. Similar legal challenges are faced by other platforms like TikTok, emphasizing the severe impact of this work on mental health. Ethical Issues with Content Moderation: Workers' Rights. Moderators are tasked with filtering a range of undesirable content, from spam and copyright infringement to severe violations like hate speech and graphic violence. The distress associated with continuous exposure to such content is profound, affecting moderators' mental health long after their roles end. This is true regardless of whether moderators are employed directly by the platforms or through third-party contractors. However, those employed in-house often benefit from better compensation, work conditions, and access to mental health resources compared to their outsourced counterparts. The Role of Artificial Intelligence in Content Moderation. Large platforms like Facebook employ artificial intelligence (AI) systems to detect a majority of toxic content. Mark Zuckerberg, CEO of Facebook, reported that AI systems were responsible for removing over 95% of hate speech and nearly all content related to terrorism on the platform. Despite these advances, the sheer volume of harmful content that still requires human moderation is overwhelming. AI, while efficient and capable of processing content in multiple languages, often lacks the subtlety needed to understand context or the nuances of human language, particularly in complex cases like memes where text, image, and implied meaning must all be considered. Ethically, Artificial Intelligence used as a tool to moderate content may prove promising in addressing the mental toll on content moderators, but the use of AI in content moderation could also serve to exacerbate existing algorithmic and societal biases. Social Media Targeting and Mental Health. Social media platforms, with their sophisticated design features such as algorithms and infinite scroll, exploit psychological principles to foster habitual use, sometimes leading to addiction. These designs are not benign; they have significant impacts on mental health, influencing user behavior and societal interactions in profound ways. Social networking sites are crafted to exploit variable reward systems, a concept rooted in the behaviorist psychology of B.F. Skinner. Interactions like likes, comments, and shares provide unpredictable yet frequent rewards, compelling users to engage repeatedly in hopes of social validation. This pattern of interaction can stimulate the brain’s reward centers akin to gambling and substance use, leading to compulsive behaviors where users feel an uncontrollable urge to log onto these sites, often at the expense of other activities and responsibilities. The ramifications of this behavioral addiction are evident in reduced productivity, strained relationships, and decreased physical activity. Infinite Scroll: Never Ending Targeted Content. The infinite scroll feature on social networking sites exemplifies persuasive design, intended to maximize user engagement by leveraging natural human curiosity and the fear of missing out (FOMO). This design often leads users into a state of 'flow,' a deep level of engagement that makes time feel like it is passing unnoticed. While flow can be beneficial in activities like learning or art, on social media, it often results in significant time mismanagement and distraction from fulfilling tasks, including disruptions to sleep patterns which can have serious cognitive and health consequences. Dark Pathways: The Mental Health Consequences of Social Networking Content. The term 'dark pathways' describes the detrimental trajectories users might follow due to excessive social media use. Key mental health issues associated with these pathways include anxiety, depression, and social isolation. The drivers for these outcomes are multifaceted:
5,442
Songbook/Cotton Fields. =Cotton Fields= Huddie Ledbetter (better known by his pseudonym "Lead Belly") was born in 1888 and grew up in northwest Louisiana near the Arkansas border. As a teenager, he worked in the cotton fields like his parents and later his wife. In the song, he processes the first-hand experiences of a cotton picker. The song is part of the standard repertoire of blues, country, folk, jazz and rock singers. The countless performers include Johnny Cash, Udo Jürgens, The Beach Boys, Creedence Clearwater Revival, Elton John, Harry Belafonte, Trini Lopez, Elvis Presley, Paul McCartney, and many more. Not to forget the numerous instrumentals. Every artist has their own version of the song, but usually after two melodically similar verses there is a chorus and after that another verse (pattern A A B A), with each line followed by the chorus "In them old cotton fields back home". A verse can also be sung twice in a row. Otherwise they are repeated several times in a loose sequence. Each verse and each chorus can contain smaller or larger melodic variations. There are also many polyphonic arrangements. The melody presented here is largely based on a pentatonic scale. In various interpretations, however, it can be expanded to include a few passing notes or blue notes. It is advisable to listen to different versions of the song and create your own version from the wealth of possibilities. Cotton Fields. <poem> When I was a little pretty baby My mama would rock me in the cradle In them old cotton fields back home But when I became a little older My daddy would take me on his shoulder In a-them old cotton fields back home I was home in Arkansas, people ask me what you come here for, In them old cotton fields back home It was down in Louisiana Just about a mile from Texar-kana In them old cotton fields back home You may think it is very funny But we didn't make much money In them old cotton fields back home It may sound a little funny, but you didn't make very much money, In them old cotton fields back home </poem>
525
Information Technology and Ethics/Intro. Introduction. The Internet has revolutionized global connectivity, enablg the swift and widespread dissemation of formation, ideas, and other expressive content. It serves as a cost-effective medium for reaching vast audiences rapidly. In response to these capabilities, governments and organizations worldwide have formulated laws and policies aimed at guiding the ethical use of this digital platform. In the United States, the First Amendment safeguards freedoms concerng expression and religion. Over time, its scope has broadened to encompass nonverbal, visual, and symbolic communications. Importantly, it also protects the right to anonymous expression, a crucial provision for dividuals regimes restrictive of free speech. However, the First Amendment does not shield certa types of speech, such as perjury, fraud, defamation, and others that can cause significant harm, whether fancial, reputational, or obstructive to one's professional prospects or electoral viability. Freedom of expression is tegral to the frastructure of modern democracies. It empowers citizens to engage political discourse, voice their opions, and vote with formed perspectives. The robust exchange of ideas is essential for scrutizg government actions and sustag democratic prciples. Without such freedoms, democratic processes degrade, undermg the very tenets of democratic governance. Moreover, ternational frameworks like the Universal Declaration of Human Rights (UDHR) recognize freedom of expression as a fundamental human right. Article 19 of the UDHR asserts everyone's right to express opions without terference, underscorg the global acknowledgment of this freedom's importance. However, it also acknowledges that these freedoms come with responsibilities and may be subject to restrictions to protect others' rights, national security, or public order.
400
Information Technology and Ethics/Expansion of Free Expression. The Expansion of Free Expression Onle. The ception of marked a pivotal shift formation sharg, settg the stage for the ternet's profound impact on global communication. This early network fostered unprecedented connectivity among diverse users worldwide, democratizg access to formation and catalyzg collaborative ventures. With the rise of the ternet, the scope of communication broadened significantly, transformg how we teract, share formation, and engage discourse regardless of geographical or cultural boundaries. Today, the ternet is a vibrant hub of novation and cultural exchange, enablg dividuals to connect, learn, and express themselves once conceivable ways. Platforms like social media, onle news sites, and discussion forums have become central to this expression, offerg spaces where dividuals can share their thoughts and opions freely. Let’s explore some stances where the ternet has notably supported free speech: Onle News Outlet. Digital journalism, evolving with the internet, has reshaped news consumption by enhancing accessibility and interactivity. The transition from traditional to digital journalism began with early online experiments by legacy media, and it has since shifted towards a more democratized model. Today, individuals can publish content independently thanks to blogging platforms and content management systems, challenging traditional media's gatekeeping roles. This shift has not only diversified perspectives in the media but also increased users' control over their news consumption through personalized digital experiences. However, the ease of spreading misinformation online poses significant challenges to the credibility and reliability of digital news, highlighting the need for vigilance and critical media literacy. Social Media. Social media platforms have revolutionized personal and public communication, making them powerful tools for information dissemination and social activism. These platforms enable users to share diverse perspectives and rally for causes, enriching public discourse and fostering community engagement. However, they also confront issues such as misinformation and the complexities of content moderation, which necessitate a balanced approach to uphold free expression while ensuring factual integrity. Online Forums and Communities. From Usenet to modern networks like Reddit, online forums have long facilitated a broad exchange of ideas. These platforms allow for deep dives into niche subjects and support vibrant communities that might otherwise lack visibility. As forums evolve, they continue to serve as crucial spaces for discourse and discovery, underscoring the internet's role in expanding expressive boundaries. Diversification of Speech. The internet has significantly lowered barriers to expression, enabling voices from across the spectrum to share their stories and insights. This diversification has enriched global dialogue, offering a platform for marginalized and minority voices and contributing to a more inclusive discourse. Pros and Dangers of Democratization of Information. While the democratization of information empowers individuals and promotes transparency, it also presents challenges, such as the dilution of expert voices and the spread of misinformation. The balance between free expression and responsible communication is delicate, requiring ongoing efforts to enhance content credibility without compromising the open nature of the internet. The Fake Information Risk. Misinformation remains a critical issue, with false content capable of rapidly influencing public opinion and policy. Tackling this challenge involves enhancing platform algorithms, educating users, and developing regulatory measures that support both truth and freedom of expression.
752
Information Technology and Ethics/Challenges Linked with Free Expression Online. Challenges Linked with Free Expression Online. Freedom of Expression in Online Platforms. In the digital age, social media platforms serve as critical venues for individual expression. These platforms offer a convenient and expansive space for sharing thoughts and ideas with an unlimited audience. However, content moderation policies on these platforms dictate what is deemed acceptable, restricting the breadth of permissible expression. This has sparked controversy, particularly on platforms like Facebook, which has faced criticism for policies requiring users to use their legal names, thereby hindering anonymous expression—a fundamental aspect of free speech. This limitation, coupled with the ambiguity of moderation rules, can disproportionately affect minority groups, leading to a sense of exclusion and fostering environments conducive to hate speech. For instance, Facebook's automated systems have mistakenly removed content critical for human rights advocacy, such as documenting war crimes in Syria. Such incidents underscore the tension between maintaining platform integrity and upholding user rights, highlighting the need for transparency and accountability in content moderation. Altering our Understanding of Free Expression in the Digital Age. The digital revolution has transformed the landscape of free expression. Technological advancements have reduced the costs associated with content distribution, enabling anyone to publish and broadcast their views widely with just a click. While this democratizes expression, it also introduces challenges such as the oversaturation of voices, making it difficult for individual messages to stand out. Moreover, the intersection of intellectual property (IP) rights and freedom of expression has become a contentious issue. On one hand, IP laws are designed to protect creators' rights, but they can also impede free access to information and restrict fair use, impacting the public domain negatively. On the other hand, the telecommunications sector advocates for broader speech rights to assert control over communication networks, suggesting a need for a balanced approach that respects both creative rights and freedom of expression. Censorship and Content Moderation Challenges. Governments often impose restrictions on online content, citing reasons such as national security or the suppression of political dissent. These actions raise critical questions about the limits of government intervention and the protection of free speech online. Simultaneously, social media platforms struggle with content removal practices that must balance user rights against preventing harm. Missteps in content moderation can lead to censorship or the unintentional promotion of misleading information, complicating the discourse around digital rights and responsibilities.
545
Information Technology and Ethics/Legal and Ethical Considerations. Legal and Ethical Considerations. Legal Frameworks Surrounding Online Expression. International Human Rights Law and Freedom of Expression. The Universal Declaration of Human Rights (UDHR) and the International Covenant on Civil and Political Rights (ICCPR) affirm freedom of expression as a crucial human right, establishing a global framework to support the unimpeded exchange of information and ideas across any medium. National Laws and Regulations on Censorship and Content Control. Various countries implement their own sets of rules concerning online content, addressing issues like defamation, hate speech, and national security. These laws aim to regulate online activities but can sometimes result in overreach, leading to undue censorship and infringement of free speech. First Amendment to the United States Constitution. In the U.S., the First Amendment provides robust protections for speech, religion, and the press, fundamentally prohibiting government interference in these areas and thereby serving as a cornerstone of American civil liberties. Communications Decency Act Section 230. Section 230 of the Communications Decency Act crucially shields online platforms in the U.S. from being liable for user-generated content. This legal shield has been pivotal in enabling the dynamic growth of the Internet as a platform for free expression and innovation. Federal Communications Commission Open Internet Order. The FCC's regulations on net neutrality are designed to ensure that internet service providers treat all data on the internet equally, without discriminating or charging differentially by user, content, website, or platform. Ethical Considerations. The Balance Between Free Speech and Protecting Vulnerable Individuals. One of the most pressing ethical challenges in digital communication is finding the right balance between protecting free speech and safeguarding vulnerable individuals from harm, such as hate speech, cyberbullying, and harassment. Importance of Self-Regulation and Responsible Online Behavior. Ethical online behavior and self-regulation are essential for sustaining a positive digital environment. It is crucial for users and platforms to engage in practices that promote respectful and constructive dialogue. Role of International Collaboration in Addressing Online Content Issues. Global issues such as misinformation, hate speech, and cyber harassment require robust international cooperation. Sharing best practices and developing joint strategies are vital for addressing these challenges effectively. Hate Speech and Online Harassment. Combating hate speech and harassment online involves ethical dilemmas wherein platforms must navigate the thin line between censorship and the need to protect community standards and individual dignity. The Rise of Online Abuse and Intimidation Tactics. The increase in online abuse and intimidation tactics necessitates the development of strategies that prevent such behaviors while respecting free expression rights. The Impact on Marginalized Groups and Free Expression. Marginalized communities often encounter significant obstacles in expressing themselves online due to prevalent discrimination and targeted harassment. Ethical strategies must focus on amplifying these voices and fostering safer online spaces. Copyright and Intellectual Property Issues. Navigating the complex landscape of copyright and intellectual property in the digital age presents ethical challenges, especially when balancing these rights with the overarching principles of free expression.
726
Information Technology and Ethics/The Future of Free Expression. The Future of Free Expression. Artificial Intelligence and Content Moderation Algorithms. Technological Advances. The evolution of artificial intelligence, with strides in machine learning, deep learning, and natural language processing, is set to profoundly impact content moderation. These technological advancements will likely enhance the efficiency and accuracy of content review processes, reshaping how information is managed online. Privacy and Security Issues. The integration of AI in content moderation raises significant concerns about personal privacy and data security. Discussions are expected to focus on the methods algorithms use to analyze user data, the potential risks of data misuse, and strategies to safeguard user privacy against these risks. Censorship and Freedom of Expression. AI's role in content moderation could lead to debates on its impact on freedom of expression. Key discussions will revolve around the criteria used by platforms to censor content and the delicate balance between curbing harmful content and upholding free speech. Algorithmic Bias and Fairness. Concerns about bias in AI algorithms are paramount, especially regarding data and human biases that could affect decision-making. Ensuring fairness and objectivity in AI requires ongoing adjustments and careful design to minimize these biases. Social Impact and Ethical Considerations. AI's influence extends to the societal level, affecting the discursive environment, political culture, and social interactions. Discussions will likely explore how these technologies shape human behavior and perspectives, emphasizing the need for ethical responsibility in their deployment. Social Media Manipulation and the Spread of Misinformation. Investigations and Reporting. Continued investigative efforts by the media and independent bodies will be crucial in uncovering and addressing the realities of manipulation and misinformation on social media platforms. Speech on Social Media. Public discourse on social media will remain a vital platform for expressing views on media manipulation and misinformation, encompassing a range of activities from posting and commenting to sharing news and research. Artistic and Literary Expressions. Artists, writers, and creators will play a role in highlighting issues of social media manipulation and misinformation through various mediums, potentially influencing public perception and policy. The Need for Ongoing Discussions and Ethical Guidelines. Pluralistic Perspectives. The diversity of viewpoints is essential in framing ethical standards. Free expression facilitates the inclusion of a broad spectrum of opinions, fostering comprehensive discussions on ethical matters. Knowledge Sharing and Transparency. Transparency and the free flow of information are foundational to ethical discourse. Through open communication, society can develop richer and more effective ethical guidelines. Critical Thinking and Debate. A culture of debate and scrutiny underpins ethical understanding. Encouraging critical examination of various ethical views contributes to deeper insights and more viable solutions to ethical dilemmas. The Importance of User Education and Digital Literacy. Critical Thinking Skills. As digital content becomes increasingly pervasive, the ability to critically evaluate information is more important than ever. Educational initiatives should focus on enhancing individuals' skills in verifying the credibility and authenticity of online information. Online Privacy Settings and Data Protection. Education on digital privacy and data protection is crucial. Users need to understand how to manage their online privacy settings effectively and protect their data from potential threats. Promoting Responsible Online Citizenship. Fostering responsible behavior online is essential for a healthy digital community. Educational programs should teach internet users about ethical online conduct, including respect for privacy, avoiding misinformation, and adhering to community norms.
816
Information Technology and Ethics/The Future of Free Expression Conclusion. Conclusion. As we navigate the intricacies of freedom of expression in the digital age, it is evident that the internet acts both as a facilitator of democratic engagement and a medium for notable challenges. Digital technologies have transformed access to information and revolutionized our communication methods, enabling an unprecedented spread of diverse voices and ideas. This has significantly empowered individuals to share their perspectives more freely and broadly, influencing public discourse and policies worldwide. Yet, this expanded freedom comes with substantial risks. Digital platforms that promote free speech also contribute to the spread of misinformation, provide arenas for cyberbullying, and nurture echo chambers that polarize public opinion. While social media plays a crucial role in fostering engagement and raising awareness, it struggles with issues related to content moderation, privacy, and the potential for censorship. The anonymity afforded by the internet, while protective for some, can also be misused by malicious actors. Striking a balance between promoting free expression and regulating its abuses is a delicate endeavor. Governments and platforms are tasked with developing policies that prevent harm without violating fundamental human rights. International human rights frameworks offer foundational guidance; however, the specific challenges of digital interactions require more targeted and flexible approaches. Looking ahead, the application of artificial intelligence and algorithmic content moderation will be central to ongoing ethical and practical discussions. It is vital to ensure that these technologies operate impartially and uphold human dignity. Additionally, enhancing digital literacy and advocating for responsible online behavior is key to building a public that is both informed and capable of discerning the complexities of the digital landscape. To maximize the benefits of digital technologies while protecting the core values of freedom and dignity, ongoing dialogue about the ethical dimensions of digital expression is essential. Continual reassessment of our legal and societal norms will be crucial. This endeavor demands not only vigilance but also a dedication to innovation and collaboration across various sectors and countries. By doing so, we can ensure that the digital space remains a domain of empowerment rather than a tool for suppression.
461
Infrastructure Past, Present, and Future Casebook/PJM Interconnection. Summary. The PJM Interconnection is a regional transmission organization (RTO), overseeing the operation of the power grid and wholesale electricity markets across the Mid-Atlantic and Midwest regions of the United States. Although it initially served the Pennsylvania-New Jersey-Maryland region, earning PJM its name, it provides energy to 13 states today. It falls under the purview of the Federal Energy Regulatory Commission (FERC), an independent regulatory agency under the Department of Energy. PJM stands as one of the largest and most intricate grid operators in North America. Here's an overview of PJM:   Origins and Development: PJM can be traced back to its inception in the 1920s as the Pennsylvania-New Jersey Interconnection (PNI), established to coordinate power transmission among utilities in these states. Over time, it expanded its scope to include utilities from additional states, eventually evolving into the PJM Interconnection in the 1980s. Independent System Operator (ISO): PJM attained the distinction of being the first ISO in the United States in 1997, thereby segregating grid operation and management from generation ownership. This approach fosters competition and efficiency within the wholesale electricity markets.   Wholesale Electricity Markets: PJM administers the world's largest wholesale electricity market, facilitating the trade of electricity among generators, transmission owners, and various market participants. These markets ensure the dependable and cost-effective provision of electricity to consumers. Grid Administration: PJM oversees the management of the high-voltage transmission grid, guaranteeing the dependable and efficient transmission of electricity to millions of consumers within its jurisdiction. It coordinates transmission planning, maintenance, and operations to uphold grid reliability and stability. Integration of Renewable Energy: PJM has taken a pioneering role in incorporating renewable energy sources like wind and solar into its grid. It has implemented market regulations and operational protocols to accommodate the intermittent nature of renewable generation while safeguarding grid reliability. Challenges and Endeavors: PJM confronts a range of challenges, including evolving energy policies, technological advancements, and shifting market dynamics. It remains committed to addressing these challenges through initiatives such as market reforms, grid modernization efforts, and resilience planning. In essence, PJM assumes a pivotal role in ensuring the dependable and efficient operation of the electric grid across a vast and diverse region. It facilitates competitive electricity markets while actively promoting the integration of clean and renewable energy resources. Timeline. 1927: The Federal Power Commission (FPC) authorized the formation of the Pennsylvania-New Jersey Interconnection (PNI), which later became PJM Interconnection. 1947: The PNI is officially formed as a voluntary association of Pennsylvania and New Jersey utilities to coordinate planning and operations. 1960s-1970s: The PNI expands its membership to include utilities from additional states, becoming the Pennsylvania-New Jersey-Maryland Interconnection (PJMI). 1980s: PJMI continues to grow, encompassing utilities from Delaware and the District of Columbia, and changes its name to PJM Interconnection. 1997: PJM becomes the first independent system operator (ISO) in the United States, separating grid operation and management from generation ownership. 2000s: PJM implements various market reforms and introduces competitive wholesale electricity markets to promote efficiency and reliability. 2001: FERC designates PJM as an RTO.   2002: PJM becomes the first fully functioning RTO in the United States. 2005: PJM launches the world's largest wholesale electricity market, encompassing a large portion of the eastern United States. 2010s: PJM continues to expand its footprint and enhance its grid management capabilities, integrating renewable energy resources and improving grid resilience. 2018: PJM initiates a stakeholder process to address challenges related to state-subsidized resources and their impact on competitive markets. 2020s: PJM faces ongoing challenges related to evolving energy policies, technological advancements, and changing market dynamics while striving to maintain grid reliability and affordability. 2024: PJM implements new market rules and operational procedures to address emerging challenges and ensure the efficient operation of the grid. Funding and Financing. Understanding PJM Interconnection, one of the largest power grid operators in the United States, necessitates an examination of its distinct organizational structure, revenue sources, and financial systems. PJM maintains a wholesale power market that serves portions of 13 states and the District of Columbia, managing the transportation of wholesale electricity in its region. Membership Dues: PJM is a membership-based organization whose principal source of revenue is its member utilities. These utilities pay membership fees based on their peak load and market participation. These dues support operating expenses such as system maintenance, market operations, and administrative charges. Market Revenue: PJM runs a variety of wholesale electricity markets, including energy, capacity, and related services. It generates revenue from market players such as power generators and suppliers by charging market fees, transaction charges, and penalties. These revenues significantly contribute to PJM's financial sustainability by funding operations and grid infrastructure investments. Transmission finances: PJM derives money from its transmission services. It charges transmission prices to customers of its transmission system, which includes generators, utilities, and other market players. The Federal Energy Regulatory Commission (FERC) regulates these tariffs, which are dependent on criteria such as transmission capacity utilization. Grants and Federal Funding: PJM may be awarded grants and federal funds for specific initiatives aimed at improving grid dependability, resilience, and modernization. For example, federal entities such as the Department of Energy (DOE) and the Department of Homeland Security (DHS) may fund cybersecurity projects or grid enhancements. However, such funding typically accounts for a lesser fraction of PJM's total revenue than membership dues and market revenues. Debt Financing: Similar to many large infrastructure corporations, PJM may use debt financing to fund capital investments in grid expansion, maintenance, and technology improvements. This could include issuing bonds or obtaining loans from financial organizations. Debt financing enables PJM to stretch the expense of big expenditures over time while using its steady revenue streams to fulfill debt commitments. Investment Income: PJM may generate income by investing its financial reserves in interest-bearing instruments such as bonds, money market funds, or other low-risk assets. This investment income increases financial freedom and can augment incomes from other sources. Institutional Arrangement - Oversight and Maintenance. Institutional Arrangements: Regional Transmission Organization (RTO): PJM is an RTO that acts as an independent entity in charge of coordinating the functioning of the transmission grid and wholesale electricity markets within its jurisdiction. As an RTO, PJM is subject to a set of rules, protocols, and governance structures that assure fair and efficient market operations. Stakeholder Governance: PJM's decision-making process includes input from a diverse group of stakeholders, including utilities, generators, consumers, and state regulators. This stakeholder governance model guarantees that multiple perspectives are taken into account when developing rules, laws, and market designs. Regulatory Oversight: PJM is overseen by several regulatory organizations, including the Federal Energy Regulatory Commission (FERC) and state public utility commissioners. These regulatory bodies assess and approve PJM's tariffs, market rules, and other critical parts of its operations to ensure regulatory compliance and market efficiency. Oversight: Regulatory Oversight: The FERC and state PUCs monitor PJM's operations to maintain regulatory compliance and defend the interests of consumers and market participants. The FERC oversees wholesale electricity markets, while state PUCs are in charge of retail power markets and consumer protection. Market Monitoring: The PJM has a market monitoring feature that detects and mitigates market manipulation, anticompetitive activity, and other inefficiencies. Market monitoring ensures the integrity and competitiveness of wholesale power markets within the PJM footprint. Impartial Market Monitor (IMM): The PJM employs an Independent Market Monitor (IMM), who serves as an impartial watchdog over market operations and participant behavior. The IMM presents its findings and suggestions to PJM's stakeholders, FERC, and state regulatory bodies. Maintenance: system Operations: PJM is in charge of the transmission system's day-to-day operations, which include grid reliability monitoring, grid congestion management, and grid repair coordination. PJM's grid operators guarantee that the electric system operates reliably and securely, responding to real-time changes in supply and demand. Infrastructure Investments: PJM is in charge of overseeing grid infrastructure investments that aim to maintain and improve the reliability and resilience of the transmission system. These expenditures include modifications to transmission lines, substations, and other grid infrastructure to handle shifts in power demand and generation patterns. Market Design and Rules: PJM constantly examines and modifies its market design and rules to reflect changing market conditions, technology improvements, and regulatory needs. This constant maintenance ensures that the PJM wholesale power markets are efficient, competitive, and resilient to interruptions. In summary, the PJM Interconnection's institutional arrangements, oversight mechanisms, and maintenance practices are intended to ensure the consistent operation of the electric grid and wholesale electricity markets, promote market efficiency, and protect the interests of consumers and market participants. Narrative of the Case. The PJM Interconnection case is multidimensional, with a focus on its establishment, operational processes, and regulatory monitoring. PJM, which began as the Pennsylvania-New Jersey Interconnection (PNI) in the early twentieth century, has grown into a critical regional transmission organization (RTO) that manages the power grid and wholesale electricity markets in 13 states across the Mid-Atlantic and Midwest regions of the United States. At its core, PJM operates as an independent company separate from generator ownership, to ensure the transmission grid's reliability and promote competitive wholesale energy markets. Its construction required a joint effort among participating utilities, first from Pennsylvania and New Jersey, with government grants and loans, ratepayer payments, and corporate investments. Institutional systems at PJM include stakeholder governance, regulatory oversight, and market monitoring measures. Stakeholders, such as utilities, generators, consumers, and state regulators, actively participate in decision-making processes, ensuring that varied perspectives are taken into account when developing rules and operating markets. The Federal Energy Regulatory Commission (FERC) and state public utility commissions (PUCs) regulate PJM's operations to protect market integrity and consumer interests. The oversight of PJM includes day-to-day grid operations, infrastructure investments, and market design. Grid operators at PJM maintain grid stability, control congestion, and coordinate repair efforts to protect the electric system's security. Infrastructure investments are made to improve transmission assets and adapt to changing electricity demand and generating trends. Market designs and rules are constantly examined and revised to reflect changing market situations, technical improvements, and regulatory constraints. PJM's market monitoring role, as well as the presence of an Independent Market Monitor (IMM), are critical to its operating efficiency. The IMM acts as a watchdog, detecting and reducing market manipulation and anticompetitive behavior while fostering market competitiveness and transparency. Overall, the PJM Interconnection case demonstrates the value of collaborative governance, effective regulatory oversight, and proactive maintenance in ensuring the electric grid's reliability and promoting competitive wholesale electricity markets across a large and diverse region. Key Issues. Several key issues affect the PJM Interconnection, ranging from operational challenges to regulatory and market-related concerns. Here are some of the key issues: Capacity Market Reforms: The PJM capacity market, which assures there is enough generation capacity to satisfy future energy demand, has encountered considerable obstacles. Oversupply, subsidized resources distorting market prices, and FERC rulings on capacity market rules have all driven PJM to propose capacity market design improvements to retain dependability while addressing market distortion. State Policies and Subsidized Resources: State policies, such as renewable energy mandates and clean energy subsidies, have resulted in an influx of subsidized resources into the PJM market. This influx may affect market prices and reduce the competitiveness of established generators, raising worries about market efficiency and reliability. Grid Resilience and dependability: PJM has problems in ensuring grid resilience and dependability in the face of catastrophic weather events, cyber threats, and aging infrastructure. It is critical to ensure the grid can tolerate disturbances and recover promptly to provide consumers with a stable electricity supply. Transmission Planning and Expansion: As the energy landscape changes with the incorporation of renewable energy resources, PJM must make significant transmission planning and expansion efforts to accommodate the altering generating mix. Identifying and investing in vital transmission infrastructure is critical for ensuring the consistent and efficient distribution of electricity across the PJM footprint. Market Monitoring and Enforcement: PJM's market monitoring and enforcement processes are crucial to maintaining market integrity and competitiveness. Nonetheless, worries regarding market manipulation, anticompetitive activity, and enforcement efficacy remain. Improving market monitoring and enforcement procedures is critical for ensuring fair and transparent wholesale electricity markets. Grid Modernization and Technological Integration: PJM must address the problems and opportunities that come with grid modernization and technological integration. Adopting innovative technology, such as sophisticated grid analytics, energy storage, and distributed energy resources, can improve grid flexibility, efficiency, and resilience. However, incorporating these technologies into PJM's operations necessitates overcoming regulatory, technical, and market challenges. Environmental and Climate issues: PJM is under increasing pressure to incorporate environmental and climate issues into its operations and market design. Transitioning to greener energy sources, lowering greenhouse gas emissions, and promoting energy efficiency are critical for mitigating climate change and reaching sustainability targets. Balancing environmental aims with grid dependability, affordability, and market competitiveness is a major problem for PJM. Citations. https://www.pjm.com/about-pjm/who-we-are https://www.pjm.com/about-pjm https://pjm.com/about-pjm/who-we-are/territory-served https://www.ferc.gov/industries-data/electric/electric-power-markets/pjm https://www.utilitydive.com/news/pjm-private-equity-power-pants-gas-ieefa/697129/ https://www.pjm.com/-/media/committees-groups/committees/fc/2023/20231214/20231214-item-03b---3q2023-pjm-unaudited-financial-statements.ashx Federal Energy Regulatory Commission (FERC), "Wholesale Electricity Market Participation Agreement", https://www.ferc.gov/wholesale-electricity-markets/participation-agreement U.S. Department of Energy (DOE), "Grid Modernization Initiative", https://www.energy.gov/oe/grid-modernization-initiative U.S. Department of Homeland Security (DHS), "Critical Infrastructure Security and Resilience", https://www.dhs.gov/topic/critical-infrastructure-security-and-resilience
3,693
Emerging Threats and Future Outlook. Emerging trends in cybersecurity and Future Outlook This is where continuous challenges and opportunities to the field of cybersecurity currently develop. In a fast-growing world with ever-evolving technology, new vulnerabilities have just come up that would require equally new solutions for mitigation. The view was preventive, considering what might happen in the future with the latest advancement in defense mechanisms. Let us have a look at the latest advances within the cybersecurity field to date and a preview for the next few years of defense of our digital assets. One of the key shifts that have happened in the landscape of cyber threats can be defined through a change in concerns: from data breaches and financial gain toward inflicting business disruption and reputational damage. One recent survey indicated that most respondents now believe that cyber attackers' efforts are focused on business disruption and inflicting reputational damage. These two factors emerge now as the topmost two worries that then draw attention to a new wave of cyber threats that have in place challenges not only in the context of data loss. Some of the factors that could drive this shift of tactics by attackers include: disruption that is no less harmful or even more harmful than data theft to the operations of a company. A well-timed cyberattack can bring down critical systems, stall production lines, and result in financial damage. In addition, a tarnished reputation may impact the company for years. Such a cyberattack can lead to gargantuan business and customer trust losses in case sensitive customer data is exposed or the trust in the brand is compromised. Leading organizations are riding the wave of digital transformation with the use of the latest, state-of-the-art technologies. By integrating new technologies into incumbent systems, they enable also a double-edged sword. The multi-valued opportunities are appealing but enhance complexity in IT environments and their vulnerability to cyber risks. Indeed, leaders are in the perennial struggle to get the right balance—maximize the benefits from new technologies, minimize associated cyber risks. Here, we delve into the key emerging trends shaping the cybercrime landscape, along with the challenges they pose for the future: Supply Chain Attacks. Another tendency that this work reveals is supply chain attacks, that is, an attack of supply chain from an attacker who is trying to compromise the integrity of products and services being offered. Recent happenings, like the SolarWinds breach, epitomize the dire consequences that come with such attacks, attacks that have the potential of bringing businesses to their knees.A group of hackers breached the software development process of SolarWinds, one of the biggest software vendors for managing IT shops. In that manner, they managed to infect its Orion platform with malicious code and subsequently distribute it to thousands of customers, among them governmental agencies and private companies. In the 2022 edition of this report, almost 40% of the surveyed companies got hurt by cyberattacks on their partners, say, suppliers or customers. Attacks brought disturbances not only by themselves but also happened without the companies themselves being the target—their injury was like "collateral damage" in somebody else's cyberwar. Naturally, therefore, almost all the respondents are anxious about the cybersecurity strength of their partners, especially those with access to their data. Supply chain risk is a concern for industries at large and can disrupt critical services. The report also outlines the possibility of conflict of interests in companies. In such a case, security chiefs (CISOs) report to IT chiefs (CIOs), who may be function-happy in making the budget. However, the report says most CIOs who had undergone severe cyber-attacks tend to become security-conscious. This may indicate the general corporate culture and appreciation of cyber risks at the top. The solution may lie in structuring the right incentives, irrespective of the reporting lines. The report concluded by stating that better cyber governance practices would be required, with principles developed by bodies such as the World Economic Forum and the National Association of Corporate Directors to allow boards to manage cyber risks. Advanced Development. Beyond the ever-challenging digital threat landscape lies the most disturbing trend: the proven sophistication that cyberattacks have been taking. In a constant iteration process, the attackers further improved their techniques, improved their approaches, and breached these security systems to exfiltrate sensitive data or disrupt important services. The factors driving this change are numerous: those from potent arsenals of hacking tools at any group's disposal, through proliferation of online forums fostering wider collaboration among cybercriminals, to the more troubling rise of nation-state-sponsored hacking groups. Future Outlook. Embracing security Awareness Everyone needs to be aware and involved in building a good security culture. The study finds that increasing awareness among employees regarding the existence of cyber threats is going to be the most influencing aspect in increasing cyber resilience. An informed workforce, enabled to manage cyber risks, strengthens the security position for the organization as a whole. It calls on leaders to empower business leaders further by holding them to account for operational security measures. For example, making security exceptions that require justification by senior executives can shift the mindset towards valuing security. All along, the security team plays a critical role in helping by giving insights and solutions. For instance, considering the vulnerabilities to which the HR team is exposed by using unsecured attachments, the security team may recommend such solutions as secure portals in which to plug the leaks before they cause damage. Good security leadership includes advising and embedding practice for cyber risk management with other business departments. Good security leaders make sure that the cybersecurity requirements are integrated into business unit KPIs, in order to assure enforcement and incentivization towards secure behavior across the organization. Effortless communications Rising Cybersecurity Anxieties: This year, there is a larger percentage of security leaders who are anxious about the post-cyberattack recovery of their organization compared to last year's (17%). What is even more interesting is the anxiety in that regard of business leaders, whose worry in that category grew from 16% to 27%. Business leader awareness is growing, and it's probably due to a better understanding of the consequences of cyber attacks—from loss of operation to loss of business partners and reputation. The Challenge of Communication In a worrying parallel that is reaching near parity between security and business leaders, the leaders are impeded by a communication problem. Those security leaders who do bridge the gap are expert in translating technical data into clear and meaningful information for the business leader. This difficulty in communication is the result of, among other things, the challenge of translating abstract cyber threats into concrete operational risks. Of course, a word as simple as 'ransomware' will be very easy to understand, but the details of how sophisticated cyber-attacks actually run, especially targeting certain business assets and resources, are much harder to explain.
1,523
The Impact of Information Technology on the Quality of Life. The Impact of Information Technology on the Quality of Life Information Technology, and advances within it, can affect the Quality of Life of every individual for better or worse. IT can be used to make life easier or more fulfilling, but can also produce challenges to human rights and human worth. These effects are categorized into three broad topics: The effects of IT on an individual’s societal life, political life and economic life. As IT has brought disparate communities together and kept alive many cultural traditions, it has also created divisions along who has control over IT resources. As IT has made the sharing of ideas and information easier, it has also led to radicalization, and helped the spread of misinformation. As IT has improved worker productivity and led to unique and flexible working arrangements, such as remote or hybrid working environments, this has led to an undercutting of wages as many jobs have been outsourced to the cheapest labor pools across the globe. Societal Impacts Information technology development includes the rise of the internet and computers, and this has been a significant development in society. However, it is associated with positive and negative impacts on the society. The development of new technologies such as computers and the Internet has had a profound impact on global social structures including the transportation network, security, economic stability, and general well-being, affecting not only American society but the entire global community . The rapid growth and development of technology have significantly improved almost every human life aspect considering various contexts. Incorporation and utilization of information technology in the health industry have been effective in improving individual wellness and also improving the quality of life to greater levels. First, information technology has been effective in improving environmental wellness through the application of smart home devices that help in energy, water, and other resource conservation. Second, IT has improved the quality of life through enhancing intellectual wellness growth, which is enabled using online learning platforms, which have been effective in improving education accessibility and thus allowing individuals to grow intellectually. Third, information technology has positively impacted society's quality of life by enhancing social wellness connections. This is achieved through social media platforms that help people nurture and cultivate their relationships. However, on the other hand, information technology is associated with other negative impacts on society. First, IT contributes to individuals losing employment, which affects their well-being and living standards. This results in people living in poverty since they cannot meet their basic needs. Second, IT contributes to increased cyberbullying, and this is experienced on social media platforms. This affects individuals' well-being since individuals who experience cyberbullying have mixed emotions, including fear, anxiety, and sadness, and the long-term effects include suffering mental health conditions, including depression. Ultimately, despite being associated with positive societal impacts of improved health and social connections, IT is also associated with decreased quality of life due to cyberbullying and also experiencing job loss. The digital gap is evident for individuals who have some access to technology: low-performing PCs, unreliable wireless networks, inexpensive internet, and restricted access to information that requires a subscription. Unequal access to digital technology widens the gap between wealthy and poor nations and hinders the advancement of underprivileged areas . Global development and equity initiatives are undermined by this divide, which creates a gulf between those who have access to modern information and communication technologies and those who do not. In addition, not owning a smartphone isolates people from the digital mainstream, preventing them from communicating with their family and friends. The digital gap continues to be a major obstacle to social and economic advancement in a time when the internet is practically necessary. Furthermore, as we embrace the endless possibilities provided by IT, it is critical that we bridge the digital gap, ensuring that everyone has equal access to technology and its advantages. As we navigate the complexity of the digital age, it is critical to maximize the benefits of IT while also addressing its societal impacts in order to achieve a more sustainable, equitable and rewarding future for all. Political Impacts The integration of Information Technology into daily life has had a huge impact on political ethics as well as people’s thinking and behavior. One of the aspects of technology which helped with this transformation is social media. Being able to use social media on any device with an internet connection, it has become a tool used for political purposes where people gain political information as well as talk about it. It gives people the opportunity to see diverse views regarding politics, and everyone has a chance to speak up even if they are not someone in a position of power. A good thing about this is being able to keep politicians who are in a position of power in check by calling them out if they make a mistake, abuse their power, or simply lie. That said, it is extremely easy for false information to spread. Even so, if people are able to catch the misinformation and call it out, this technology can help affect that person’s reputation. Also, while being able to see diverse political views, social media uses our data to show posts that people might like, which might be of the same point of view. This makes it harder to understand different points of view since all people will see is information that they already agree with. Other than social media, technology also changed the way politicians run for office. The politician’s main goal is to attract voters, and they can use data from technology to target voters via personalized ads. Such data can come from sources such as social media and online browsing. Using this method, politicians can run with a set of proposals with a specific group of voters in mind. This also helps them allocate their resources more efficiently towards reaching the ones who will most likely vote for them. There is a problem with data-driven campaigning though, and it is the fact that it prioritizes winning the election over authentic decision-making. Instead of focusing on addressing and dealing with the biggest issues that society is currently facing, issues that resonate with specific demographics may be taking the front seat, even if they are not the most important for the greater good. Overall, technology has made politics more accessible to people and provided politicians themselves with a strong way of influencing voters and getting their message around, but it also brings ethical challenges such as privacy concerns and the balance of winning the election and serving the interests of the general society as a whole. Ethical guidelines including transparency and accountability are needed to ensure that technology does not have a negative impact on political ethics. Economic Impacts. The Management of  daily activities and interaction with the world has been profoundly transformed by the integration of information technology into numerous spheres of life. These technologies facilitate enhanced personal and professional lives by introducing revolutionary transformations that produce more individualized, user-friendly, and effective experiences. An examination of the effects of diverse technologies across domains sheds light on their role in fostering a more interconnected and convenient society, as well as in dynamically and transformative tackling intricate challenges. In order to exchange data with other devices and systems over the Internet, IoT technology integrates hardware, software, sensors, and connectivity with physical devices, vehicles, and home appliances, among other objects. As a consequence of this connectivity, intelligent home automation systems, improved security, streamlined energy management, and more customized user experiences have been developed. By the end of 2030, IoT has the potential to add trillions to the global economy , primarily on the manufacturing and healthcare sector. This can further evolve of how technology is already existing. For example, IoT devices such as smart lights and thermostats enhance energy efficiency and convenience, thereby reducing utility costs and enhancing household comfort. Artificial intelligence has revolutionized the consumer technology sector through the development of more intuitive and human-centric devices. Adaptive learning technologies, personal assistants, and recommendation systems are all powered by AI, which enhances accessibility and day-to-day interactions. Illustratively, AI-powered virtual assistants such as Alexa and Siri facilitate the execution of routine duties through the utilization of spoken instructions, thereby augmenting technological accessibility and productivity across personal and professional spheres. By delivering scalable resources via the Internet, cloud computing has significantly transformed the field of data management. This innovation has eliminated the requirement for physical infrastructure and facilitated worldwide accessibility to data and services. This technological advancement facilitates telecommuting, real-time collaboration, and the storage and analysis of massive amounts of data, resulting in enhanced flexibility and productivity in both professional and personal spheres. The ease of use provided by cloud services such as Google Drive and Dropbox facilitates the storage, backup, and sharing of data. The influence of information technology on the healthcare sector has been profoundly revolutionary. Patient care is enhanced through the implementation of AI-driven diagnostics, wearable health monitors, electronic health records (EHRs), and telemedicine, which facilitate preventive medicine, support remote or virtual healthcare services, and increase accessibility to medical information. These technologies enhance health outcomes through the facilitation of ongoing monitoring and data-driven insights regarding patient well-being, thereby resulting in treatments that are more timely and individualized. Technology has some economic drawbacks. Automation and digitization can displace jobs, raising concerns about job security in some sectors. Since those without technology are left behind, a growing digital divide can worsen social inequality. Technology has a positive economic impact despite these challenges. It boosts innovation, creates new markets and jobs, and makes the world more connected and prosperous. This dynamic relationship emphasizes the need for balanced technological integration and thoughtful policymaking to ensure that technology improves everyone's life. Impact on Businesses. Information technology (IT) has revolutionized the transport and management of goods along supply chains, making it an important instrument in the transportation and logistics industries. In the transportation and logistics sector, IT technologies are essential for streamlining operations and increasing productivity, from automated procedures to real-time tracking. Transportation process automation, coordination, and smooth communication are made possible by IT systems. Fleet management systems use telematics and GPS to track vehicles in real time and optimize routes. Communication between supply chain participants is streamlined by electronic data interchange, or EDI. Delivery times are shortened and expenses are decreased with the use of transportation management systems (TMS), which automate freight booking, shipment tracking, and carrier management. Information Technology has a significant impact on logistics and transportation, promoting improvements in responsiveness, efficiency, and transparency. Better visibility into supply chain processes is provided by real-time tracking and monitoring, which enables companies to quickly locate and resolve bottlenecks. Businesses can forecast demand, adjust inventory levels, and avoid stockouts with the use of automated procedures and predictive analytics. This improves inventory management and lowers holding costs. IT systems also make it easier for supply chain participants to collaborate and share data, which improves coordination and resiliency throughout the whole chain. Looking towards the future, IT will continue to shape the transport and logistics landscape, ushering in new opportunities for automation, connectivity, and sustainability. Emerging technologies such as blockchain, Internet of Things (IoT), and artificial intelligence (AI) hold the promise of further enhancing supply chain visibility, transparency, and efficiency. Blockchain technology ensures secure and transparent transactions, while IoT devices provide real-time data on cargo conditions and vehicle performance. AI-powered predictive analytics algorithms help optimize logistics operations, anticipate demand fluctuations, and reduce environmental impact, paving the way for a more efficient, sustainable, and resilient transportation and logistics industry. The impact of information technology on business operations in transportation and logistics ultimately extends to improving the quality of life for individuals and communities. By optimizing transportation processes, IT systems contribute to smoother and more reliable supply chains, ensuring that essential goods reach consumers efficiently and on time. This reliability enhances consumer satisfaction and confidence in the availability of goods, leading to a more stable and predictable lifestyle. Additionally, the efficiency gains achieved through IT implementation in logistics can result in cost savings for businesses, which may be passed on to consumers in the form of lower prices or improved services. Moreover, the reduction of environmental impact through IT-enabled sustainability initiatives, such as route optimization and emissions reduction strategies, contributes to cleaner air and healthier living environments for communities. Overall, the positive impacts of information technology on business operations in transportation and logistics translate into tangible benefits that enhance the overall quality of life for individuals and society as a whole.Conclusion In conclusion, Information Technology (IT) greatly impacts our lives in three main areas: society, politics, and economics. It changes how we connect with others, affecting culture and widening the gap between those who have access to technology and those who don't. In politics, IT allows for more transparency and participation but also raises concerns about privacy and whether politicians are more focused on winning elections than solving real issues. In economics, IT improves efficiency and makes services like healthcare more accessible, but it also replaces some jobs and creates a divide between those who can use technology and those who can't. Overall, while IT brings many benefits, we need to use it wisely to address challenges like job loss and inequality. We must set clear rules to ensure IT improves everyone's lives fairly and responsibly.
2,865
Circuit Idea/Creating a circuit with negative differential resistance. Why does voltage decrease when current increases? By "negative differential resistance", they usually mean a circuit where the current decreases when the voltage increases. Well, true... But what is the physical meaning of this statement? How does this magic work? Is it something useful and therefore desirable? If so, what can we use it for? Let's understand it thinking as humans and explain it without using meaningless verbal clichés. Basic idea. The purpose of a negative resistor is to do the opposite of what a "positive" resistor does, i.e. to add rather than dissipate power. True negative resistors do this by adding voltage in series or current in parallel from their own built-in sources. But how is the humble resistor to do so when it does not have that? The only thing it has is resistance and that is something that dissipates power. But wait, it can reduce its resistance and thus increase the power added by an external source! So the idea in general, as we know it from life, is to initially do something bad and then start reducing it, creating the illusion that we are doing good. In this particular case, the negative differential resistor (NDR) has some initial resistance which creates a voltage drop ("bad"). But then it begins to decrease its resistance as the current increases, thus creating the illusion that it is adding power ("good"). Simply put, NDR acts as a "dynamic resistor". NDR acting this way are called "S-shaped" or "current-driven" while the opposite NDR (tunnel diode, lambda diode, etc.) are called "N-shaped" or "voltage-driven". Let's now explore this phenomenon in detail through step-by-step CircuitLab experiments, first with a "positive" resistor and then with an S-shaped NDR. I = 1 mA, V = 1 V, R = 1 kΩ Simulate this circuit – Schematic created using CircuitLab I = 1.5 mA, V = 1.5 V, R = 1 kΩ Simulate this circuit I = 2 mA, V = 2 V, R = 1 kΩ Simulate this circuit The behavior of a 1 kΩ positive resistor matches our intuition confirmed scientifically by Ohm's law. We can see graphically that when we increase the current through the resistor, the voltage across it increases proportionally, and the resistance does not change (R is static). The resistor IV curve does not move. Negative differential resistance. Conceptual circuit. To understand exactly how NDR does this magic, let's simulate it with a variable resistor R. I = 1 mA, V = 2 V, R = 2 kΩ: Its initial (static) resistance is 2 kΩ but in this static state we cannot say how much NDR is. Simulate this circuit I = 1.5 mA, V = 1.5 V, R = 1 kΩ: When the current rises to 500mA, the trick is that we reduce R by 1 kΩ, and the voltage drop instead of rising, drops. Simulate this circuit I = 2 mA, V = 1 V, R = 500 Ω: Then the current increases by another 500 mA, but we reduce R by 500 Ω, and the voltage drops even more. Simulate this circuit In the graphical representation, when the current increases, the resistor IV curve rotates counterclockwise, and the voltage decreases. The intersection points lie on the -1 kΩ NDR IV curve (in green). Why voltage decreases when current increases. The explanation of this mysterious phenomenon (never done in textbooks) turned out to be very simple: Basically, Ohm's law is a function of one variable (input quantity) - Vout = Iin.R. So as we increase the input current Iin, the output voltage Vout increases proportionally with the factor R (constant). If we begin to vary the resistance at the same time as the current, Ohm's law becomes a function of two variables (input quantities) - Vout = Iin.Rin. Depending on the rate of change of R, we have the following cases:
970
Information Technology and Ethics/Virtual and Augmented Reality. Virtual and Augmented Reality<br>Virtual Reality (VR) and Augmented Reality (AR) technologies are revolutionizing multiple industries by providing immersive and interactive experiences that enhance learning, optimize medical procedures, transform retail experiences, and broaden the horizons of entertainment. These technologies utilize digital overlays and simulated environments to provide users with real-time information and experiences that are both captivating and educational. This enhances efficiency and effectiveness in a wide range of tasks, from intricate surgical procedures to basic retail shopping. Common Applications of Virtual and Augmented Reality. Virtual Reality (VR) and Augmented Reality (AR) technologies are becoming more prevalent in different industries, providing distinct applications that enhance experiences and increase efficiencies. Education. VR in education facilitates the creation of immersive learning environments, enabling students to closely examine historical events, remote planets, or intricate biological processes. This not only enhances the learning experience but also facilitates the retention and comprehension of intricate subjects. Augmented reality (AR) superimposes digital information onto the physical world, allowing students to access interactive and captivating educational content within their actual learning environments. Healthcare. Healthcare has also seen development here. Surgeons utilize augmented reality to achieve greater accuracy during surgical procedures by superimposing vital patient information and images directly onto their visual field. Virtual reality is utilized in therapy to assist patients in overcoming phobias, post-traumatic stress disorder (PTSD), and to facilitate physical rehabilitation by providing controlled and secure simulation environments. Gaming. The domains of gaming and entertainment are widely acknowledged as the most prominent fields where virtual reality and augmented reality find their applications. Virtual reality (VR) offers a completely immersive experience that transports users into captivating and interactive virtual environments. Augmented reality (AR) games, such as Pokémon Go, incorporate digital components into the physical world, resulting in an interactive and captivating gaming experience that spans real-world settings. Retail. AR revolutionizes shopping experiences in the retail industry by enabling customers to preview products in their personal environment prior to making a purchase. For instance, furniture retailers employ augmented reality (AR) technology to allow customers to visualize how a particular piece of furniture would appear in their living room. This capability aids in facilitating more informed and advantageous buying choices. Security Concerns. Instances of Data Interception and Breaches. Given the nature of VR and AR technologies, it is important to be aware of the potential risks associated with transmitting sensitive data over networks. These technologies are vulnerable to interception and breaches. The data can encompass personal identification details, location data, biometric data, and even payment information. Exploiting vulnerabilities in the transmission channels or software can allow cyber attackers to gain access to this data, resulting in risks such as identity theft, financial fraud, and unauthorized tracking. Incidents of Malware and Ransomware Attacks. Malware and ransomware pose significant threats to VR and AR systems, causing potential harm. As an example, due to the interactive nature of these platforms, malware has the ability to manipulate VR/AR environments in ways that can be harmful. This includes introducing deceptive elements or malicious triggers. Ransomware has the potential to prevent users from accessing their VR/AR devices or encrypt their personal data, requiring payment in order to regain access or ensure security. Unauthorized Access to an Account. A number of VR and AR applications necessitate user accounts to securely store personal preferences, game progress, and other sensitive information. Unauthorized access to accounts can lead to various consequences, such as virtual identity theft, unauthorized purchases, or intrusion into private virtual spaces. Concerns Regarding Physical Safety. Security vulnerabilities in VR and AR applications may pose potential risks to physical safety. Take, for instance, if an AR mapping application falls into the wrong hands, it has the potential to lead users astray to hazardous locations. In virtual reality, systems that are not well-designed or have been compromised may not accurately map real-world environments. This can be dangerous as users may not be aware of their actual surroundings, potentially resulting in physical injuries. Invasion of Privacy through Surveillance. Both virtual reality (VR) and augmented reality (AR) have the potential to be utilized for surveillance purposes. Continuous monitoring capabilities can be achieved through unauthorized access to cameras, microphones, or real-time location tracking features in these devices. There is a potential for a significant invasion of privacy, where individuals' actions in both virtual and real worlds could be tracked and recorded. Insufficient User Authentication. A significant issue with numerous VR and AR systems is the lack of strong authentication mechanisms, resulting in the potential for unauthorized access and misuse. Insufficient password systems or the absence of multi-factor authentication can create vulnerabilities that could potentially be exploited by malicious actors to gain unauthorized access to devices and the networks they are connected to. Given the distinct interaction models of VR and AR devices, conventional security measures may prove insufficient. This calls for the implementation of novel forms of authentication, such as biometric or behavior-based methods. Deepfakes. Deepfakes pose a notable and growing concern within the realm of Virtual Reality (VR) and Augmented Reality (AR) technologies, specifically in regards to security and privacy. Deepfakes utilize advanced artificial intelligence and machine learning methods to produce authentic-looking images, videos, and audio recordings. This technology has the potential to be seamlessly integrated into VR and AR environments, which may give rise to a number of significant concerns: False Information and Trickery. In VR and AR, deepfakes have the ability to generate lifelike avatars or environments that are virtually identical to real ones. There is a risk of spreading misinformation or misleading users into thinking they are interacting with authentic entities or situations. As an example, a deepfake has the ability to create a virtual reality scenario where a well-known person or someone close to you is simulated. This can have an impact on how users perceive and behave, as they are influenced by these deceptive portrayals. Privacy Violations:. Deepfakes have the potential to infringe upon an individual's privacy by impersonating them without their consent. In the realm of VR and AR, there is the possibility of recreating a person's appearance and voice during virtual meetings or social interactions. This could potentially result in negative consequences such as harm to one's reputation or personal well-being. = Privacy Concerns = Many user technologies necessitate the gathering of substantial personal data, encompassing biometric information, location data, and comprehensive records of user interactions within virtual environments. The extensive amount of data collected raises various privacy concerns, such as the potential exposure of personal information, surveillance and tracking, and worries about how the data is used and shared. Data Collection. Virtual reality (VR) and augmented reality (AR) technologies have the potential to gather sensitive personal data due to their features and capabilities. Personalized and immersive experiences often require the use of biometric data, including eye movements, facial expressions, and voice samples. As an illustration, the utilization of eye-tracking technology has the potential to enhance the virtual reality experience by dynamically adjusting the focus and perspective according to the user's gaze. Nevertheless, this information can provide valuable insights into an individual's inclinations, objectives, well-being, and other aspects. There is a risk that arises when sensitive information is not properly protected, which could potentially lead to unauthorized parties gaining access to it or intercepting it. Instances of cybersecurity breaches can result in the exposure of personal data, which in turn can lead to various negative consequences such as identity theft, financial fraud, and potential risks to personal safety. Developers and providers of VR and AR must prioritize data security by encrypting data, implementing strong access controls, and conducting regular security audits. Surveillance and Tracking. The ongoing tracking capabilities of VR and AR can also be used for less reputable purposes. As an example, the use of location tracking in various AR applications, such as navigation tools or location-based games, can potentially lead to unauthorized monitoring of a user's movements. In a similar vein, VR platforms have the ability to monitor and analyze user behavior and interactions within a virtual environment, allowing for the creation of comprehensive profiles of individual activities. This information holds value for both businesses seeking to customize marketing strategies or create new products, as well as government organizations focused on surveillance. There is a significant potential for misuse, as these technologies have the ability to systematically infringe on individual privacy rights. There is valid reason for concern, as instances of technology being utilized for surveillance by various entities have been extensively documented worldwide. Information Usage and Sharing. There is a significant concern regarding the utilization and sharing of collected data. The extensive information gathered by VR and AR technologies is highly valuable for improving user experience and is also sought after by advertisers and data brokers. It is common for users to lack clear information or control over the usage and sale of their data. It is crucial to have clear and open communication regarding data usage policies and practices. It is important to ensure that users have access to easily understandable and readily available information regarding the collection, usage, sharing, and storage of their data. Incorporating privacy-enhancing technologies like data anonymization and minimization can be effective in reducing the potential risks related to data sharing and retention. = Security Enhancements = Updated Encryption Methods. Ensuring the security of data transmitted between devices and servers involved in VR and AR systems is of utmost importance. By employing cutting-edge encryption standards, data of all types - be it biometric, personal, or operational - is safeguarded against interception and unauthorized access. As an example, the utilization of end-to-end encryption can provide a safeguard for communication channels within VR and AR platforms, rendering it exceedingly challenging for unauthorized individuals to decipher the data. Strong Authentication Mechanisms. In order to ensure that only authorized individuals can gain access, it is crucial for VR and AR devices to include robust authentication systems that require multiple factors for verification. This could involve a mix of factors that the user is familiar with (passwords), possesses (a mobile device), and embodies (biometric data like fingerprints, facial recognition, or voice patterns). These layers greatly minimize the chances of account hijacking and unauthorized access. Incorporating Two-Factor Authentication (2FA) is also recommended in enhancing security in Virtual Reality (VR) and Augmented Reality (AR) systems. Adding an extra layer of security, 2FA ensures that users must provide two different authentication factors to verify their identity before they can access their accounts or devices. This approach greatly reduces the chances of unauthorized access, even if one element, such as a password, is compromised. Integrating 2FA into VR and AR systems not only boosts security, but also aligns with the ongoing imperative to safeguard ever more advanced and personal digital experiences. With the continuous advancement and integration of VR and AR technologies into our daily lives, it is becoming increasingly important to implement strong security measures such as 2FA. These measures are essential for effectively protecting users and their valuable data. Latest Firmware update. Staying current with the most recent software updates is essential for maintaining VR and AR systems. These updates frequently include fixes for identified vulnerabilities that could be targeted by malicious individuals. It is important for developers to prioritize automatic and seamless updates, which will alleviate the user's responsibilities and guarantee that all devices are equipped with the latest secure software version. Technologies that Enhance Privacy. Integrating technologies that prioritize user privacy can have a significant impact. Methods such as data anonymization, which involves removing personal identifiers from the data, and data minimization, which focuses on collecting only the essential amount of data, can be effective in safeguarding user privacy. These technologies provide an added layer of security, making it difficult to trace any potential data breaches back to specific users. Best Practices. It is highly recommended for VR and AR developers to prioritize secure coding practices and consistently conduct security audits and testing during the entire application development process. This involves conducting threat modeling, code reviews, and penetration testing to detect and address potential security vulnerabilities prior to the software being implemented. Emphasizing the importance of security right from the start is crucial when adopting a 'security by design' approach. Ensuring the Security of Hardware. Given the nature of VR and AR devices as standalone systems, ensuring the security of both the hardware and software is of utmost importance. This involves the development of tamper-resistant devices and the utilization of secure elements for data storage. Utilizing hardware-based security features can establish a robust basis for ensuring the security of the entire system. = Laws and Governance = The legal and regulatory landscape surrounding consumer Virtual Reality (VR) and Augmented Reality (AR) technologies is constantly changing, mirroring the fast-paced advancements in these fields. There are no dedicated federal laws specifically for VR and AR. However, existing laws and regulations can be applied to address issues that may arise from the use of these technologies. These are some important areas of law and regulation that have an impact on consumer VR and AR: Sector-Specific Regulations. = Reference =
2,987
Ada Programming/Ada 2022. This is an overview of the major features that are available in Ada 2022, the most recent version of the Ada standard. Summary of what's new. New profile. Jorvik is a subset of the Ada tasking capabilities, similar to Ravenscar and which imposes fewer restrictions, removing the following ones compared to the Ravenscar profile:
94
Guitar/Campfire Diploma/ Navi Introduction.   Before we start • Chord Diagrams & Tablatures • Accessories • Storing
38
Guitar/Campfire Diploma/ Navi Lessons.   1) Forming the D chord • 4/4-beat • D-A 2) D-G • Major Cadence • Western Strumming • 3/4-beat 3) G-C-D • Fingering • Campfire Strumming 4) G-Em-C-D 5) Quick Chord Change 6) C-Am 7) Jumps Em-D / G-Am 8) Completion
125
Open Scholarship Press Curated Volumes. The Open Scholarship Press Curated Volumes feature four individual primers, book-length curated volumes of essential readings, following an analytical introduction, covering key areas of open social scholarship: Community, Connection, Policy and Training. To view any of the curated volumes, click the Wikibooks links below; the texts are also available on PubPub at the links below as well. Open social scholarship is the creation and dissemination of research and research technologies to a broad, interdisciplinary audience of specialists and non-specialists, in ways that are both accessible and significant to all groups (Implementing New Knowledge Environments Partnership, https://inke.ca/). "These curated volumes are accompanied by book-length annotated bibliographies in each of these areas as well, following an analytical overview. For these collections, please see the Open Scholarship Press Collections. For an overview of the OSP and related projects, please see the Open Scholarship Press." Alyssa Arbuckle (UVic), Caroline Winter (UVic), Jesse Kern (UBC), Vitor Yano (Concordia), Anna Honcharova (European Students' Forum), Alan Colín-Arce (U Autónoma del Estado de México), Graham Jensen (UVic), and Ray Siemens (UVic), with Jon Bath (U Saskatchewan), Jon Saklofske (Acadia U), and the INKE and ETCL Research Groups This curated volume showcases key reprinted interventions on the subject of community-based and community-engaged open scholarship. Over the past several decades, academic work has evolved alongside substantial and far-reaching changes in communication and collaboration. One example of this evolution is the rise of open, digital scholarship: a movement that prioritizes access to information, social knowledge creation, and cross-community engagement. Now, in the 2020s, academics and other knowledge workers can produce, publish, and share their research findings much more openly and more publicly than previously possible. Increased open access to research, community-university partnerships, and knowledge mobilization are all evidence of shifting attitudes and practices in academia. Openness is a mechanism through which to broaden scholarly work into activities that are much more community-based and community-engaged. Centring community-based and community-engaged open scholarship, while considering both efficacious and creative ways to find, share, and publicize academic research, is at the heart of open social scholarship. Such a vision for the transformative potential of scholarly communication speaks to an ardent desire to leave behind the metaphorical ivory tower and to instead refigure postsecondary institutions as verdant sites of collaborative, collective knowledge creation. Graham Jensen (UVic), Tyler Fontenot (Independent), Alan Colín-Arce (U Autónoma del Estado de México), Alyssa Arbuckle (UVic), Vitor Yano (Concordia), Anna Honcharova (European Students’ Forum), Caroline Winter (UVic), and Ray Siemens (UVic), with the INKE and ETCL Research Groups This curated volume includes reprinted critical interventions on the subject of digital knowledge commons or academic social networking sites and the forms of connection and open scholarship that they enable. The enormous growth of digital knowledge commons and academic social networking sites in the last fifteen years or so has enabled millions of researchers to connect and share their work with others online. But during this same period, the remarkable transformation of digital infrastructure has also raised many questions about the nature and trajectory of scholarly communication and practice. The history of the tension between participation and publication, like the history of the internet itself, can be understood partially in terms of a shift from open to closed and commercialized forms of knowledge exchange. Against the currents of commercialization and weaponization, many individuals and collectives are interested in exploring how platforms can support both participation and publication—all while also remaining open. As digital knowledge commons continue to proliferate, they will continue to transform scholarly participation and publication, inspiring and embodying novel forms of each. But the evolution of digital knowledge commons—and digital tools and technology more generally—must also be accompanied by continued critical consideration of what creating and maintaining these complex and diverse systems will involve, and mean, for future communities of researchers or creators and consumers of knowledge. This responsibility is and necessarily will be a shared one. Caroline Winter (UVic), Alyssa Arbuckle (UVic), Jesse Thomas Kern (UVic), Vitor Yano (Concordia), Anna Honcharova (European Students’ Forum), Tyler Fontenot (Independent), Graham Jensen (UVic), Alan Colin Arce (U Autónomo del Estado de México), and Ray Siemens (UVic), with Tanja Niemann (Érudit) and Lynne Siemens (UVic), and the INKE and ETCL Research Groups This curated volume provides a broad snapshot of the open scholarship policy landscape. Most are foundational policies and principles, but examples of theoretical overviews, research studies, and critical analysis are also included. The open scholarship landscape is complex and always changing, but tracing relevant policy developments helps to define its boundaries, highlight emerging pathways, and bring key features into focus. For instance, more and more national governments, funding organizations, and institutions are developing policies related to open access to research data and publications, which intersect and sometimes conflict in complicated ways. Other forms and types of policies that make up the wider research ecosystem also affect open scholarship policy, such as publishers’ policies about rights retention, international digital infrastructure standards, and institutions’ review, tenure, and promotion guidelines. Given the role policy plays in influencing how researchers work and whether and how they share that work, an understanding of the policy landscape—both its foundations and its emerging trends—is key to advancing open scholarship. The open scholarship policy landscape is now dotted with many institutional, national, and international open access (OA) policies, with more springing up every year. Implementing policy successfully can be challenging, especially when the context is complex and multifaceted. Randa El Khatib (UTSC), Alan Colín-Arce (U Autónoma del Estado de México), Vitor Yano (Concordia), Anna Honcharova (European Students’ Forum), and Ray Siemens (UVic), with the INKE and ETCL Research Groups This curated volume follows the transformation of digital pedagogy to embrace more open and collaborative practices. With online, digital environments occupying a more central place in higher education, pedagogy has been shifting as well to both take advantage of the unprecedented access to knowledge and prepare students to participate in the digital economy. This transformation is twofold: on the one hand, the world is shifting to more fully embrace open pedagogy that encompasses Open Educational Resources (OERs) such as Massive Open Online Courses (MOOCs), open textbooks, syllabi, classroom activities, and other practices and materials to lower barriers for accessing education. At the same time, there is a push in higher education to incorporate digital literacy training so that students are prepared to join the workforce and possess interoperable digital skills upon graduation. As the world more fully embraces digital environments, this collection is also concerned with the role of universities and training sites to prepare students and engaged publics to meet the needs of the digital world in their own research and work.
1,644
A Reference Guide to Cases in the Ukrainian Language/Locative case. The locative case is used to denote where something or someone is in Ukrainian.
33
Chess Opening Theory/1. d4/1...Nf6/2. Nc3/2...d5/3. Bh6. = 3. Bh6 - Egg Gambit = 3. Bh6, Sacrifices a bishop and shred&weaken the kingside.
70
Chess Opening Theory/1. e4/1...e5/2. Qh5/2...Nf6. Kiddie Countergambit. 2...Nf6. This move prevents Scholar's Mate by attacking the queen, forcing it to move away from the diagonal. While it sacrifices a pawn (White can take the e-pawn with 3. Qxe5+), it gives Black a lead in development. Though 2...Nc6 is considered more solid, this variation is still playable. Because White's bishop has not been moved yet, checkmate is not possible. Even if the queen moves to f3, there is no checkmate threat, as the knight is in the way. Also, unlike 2...g6??, the rook is not blundered, as the knight and g-pawn are in the way. The best continuation is /3. Qxe5/+ Be7.
213
OpenSSH/Cookbook/The Client Configuration File. SSH Client Configuration Files. Use of the client configuration file, ssh_config(5), is perhaps the most underrated and unrecognized feature, despite its great utility and flexibility. The configuration file can be used to create shortcuts for specific systems or scenarios by applying designated settings. The client, ssh(1), prioritizes settings applied at the command-line as run-time options. Then the settings from user's own configuration file, usually ~/.ssh/config, are applied. Then, finally, global client settings are applied, usually fron the system-wide configuration file, /etc/ssh/ssh_config, if it exits. So as mentioned in the chapter on Client Configuration Files, the prioritization is as follows: Even within the user's configuration file and the system's global configuration file, the first match is applied. Therefore specific configurations must always go towards the beginning of the file and more general settings towards the end. Basics of SSH Client Configuration. Each stanza in the configuration file begins with either a Host or Match directive. The directives within the stanza are then applied, if relevant. More on Match later. Below two hosts are each set up with their own shortcuts using a basic Host directive. The settings for the two hosts are followed by a two more general stanzas applicable to two whole domains. Lastly is a stanza with applying IdentitiesOnly to all outgoing connections. Host www HostName www.example.org User fred IdentityFile %d/.ssh/fred.www.key Host git HostName git.example.org User paz IdentityFile %d/.ssh/paz.git.key Host *.example.org ConnectTimeout 2 AddKeysToAgent yes Host *.example.com ConnectTimeout 5 Port 2022 Host * IdentitiesOnly yes The specific configurations are first and get more general until the end where IdentitiesOnly gets applied to all outgoing sessions. Hosts in the "example.org" domain use the default SSH port of 22, while that is overridden for those in the "example.com" domain which uses port 2022 instead. Keys are automatically added to the agent when used with the "example.org" domain but not with the "example.com" domain. The first host can be reached with codice_1 and the second host with codice_2. In general, it is a good idea to set IdentitiesOnly so that only the one designated key is tried when authenticating. Otherwise, the keys are tried in whatever order they might be found in the agent which can be unpredictable. The result without IdentitiesOnly can be that the connection gets blocked from having too many failed logins attempts before the right key even gets tried. Multiple Shortcuts. Each stanza can have multiple shortcuts. Host w www www.example.org HostName www.example.org User fred IdentityFile %d/.ssh/example.org-fred.ed25519 Above, the same host can be reached with codice_3, codice_1, or codice_5. Different Keys for Different Accounts on the Same Systems. Sometime it is necessary to access multiple accounts on the same remote system, each with a separate key. The Match block in ssh_config(5) can pair each account with its corresponding key. Match host www.example.org user git IdentityFile %d/.ssh/example.org-git.ed25519 Match host www.example.org user fred IdentityFile %d/.ssh/example.org-fred.ed25519 Match host www.example.org user backup IdentityFile %d/.ssh/example.org-backup.ed25519 Host www.example.org IdentitiesOnly yes AddKeysToAgent yes Above, different keys are applied to the same remote host depending on which of the three accounts is used. Automatically Fire Up Local VNC After Establishing A Tunnel. The LocalCommand directive can launch a local program upon successful authentication. If that is combined with other directives, there are a lot of possibilities. Here once a VNC tunnel gets established, the client is connected to it. Host make-tunnel tunnel Hostname 198.51.100.120 User tunneler IdentitiesOnly yes IdentityFile %d/.ssh/tunneler-vnc-tunnel LocalForward 5900 localhost:5900 ExitOnForwardFailure yes PermitLocalCommand yes LocalCommand remmina -c vnc://localhost:0 The LocalForward creates the tunnel, while the PermitLocalCommand and LocalCommand connects the client to the tunnel once the tunnel is complete. Should the tunnel fail, ExitOnForwareFailure ensures that the SSH session ends so that the failure can be properly investigated rather than the client connected to nothing. VNC Through A Jointly Accessible External Host - Approach One. Networking through one or more layers of NAT can be a problem That is especially the case as Carrier Grade NAT becomes more common in the legacy IPv4 networks provided by an increasing number of service providers. It is possible to connect two endpoints via a publicly accessible third machine on common ground. If there are three systems, A, B, and C, where A needs to connect to C, neither A nor C can connect directly to the other yet both can reach host B, then it is possible to make a tunnel via B if both A and C can reach it. Both A and C need to have working accounts on C, even if just for forwarding. Full shell access is not required. On host B, accounts are needed for C and A. On host C: Host hostc HostName server.example.com IdentityFile %d/.ssh/test-fw6b AddKeysToAgent yes RemoteForward 7900 localhost:5900 RemoteForward 7901 localhost:5901 Start the VNC server and then have the system establish an SSH connection to host B with codice_6. The configuration of host B really needs no modification, unless if the key for the tunnel should be locked down or other restrictions desired. On host A: Host tunnel LocalForward 5900 localhost:7900 LocalForward 5901 localhost:7901 PermitLocalCommand yes LocalCommand remmina -c vnc://localhost:0 ExitOnForwardFailure yes Start the SSH connection by entering codice_7 and Remmina will connect automatically to host C via the tunnel on Host C. System-wide Client Defaults. The system-wide client configuration file, /etc/ssh/sshd_config, is a convenient way to provide what are effectively new, local default settings. As mentioned many times, configuration options are applied with a first match priority therefore any system-wide, global options should be a general as possible. System-wide defaults shine when customizing the local environment, including LAN access be means such as Kerberos authentication or even Host-based Authentication, the latter is covered in its own chapter. Host 172.16.4.* HostKeyAlias a.pool.example.org ConnectTimeout 4 Host 172.16.5.* HostKeyAlias b.pool.example.org ConnectTimeout 2 Host 172.16.* HostbasedAuthentication yes Host * IdentitiesOnly yes The above allows host-based authentication for a specific subnet. It also sets IdentitiesOnly globally. Host *.pool.example.org VerifyHostKeyDNS no GSSAPIAuthentication yes GSSAPIKeyExchange yes GSSPITrustDNS yes GSSAPIRenewalForcesRekey yes GSSAPIDelegateCredentials yes The above sets system-wide options for all systems in the pool.example.org domain, such that Kerberos authentication is possible. The manual page for ssh_config(5) has a section on "tokens" which can be used in the stanzas in place of system information, such as the remote host name, the remote account name, or the local account name, to name just a few. These are useful when setting the system-wide client configuration file in /etc/ssh/ssh_config or /etc/ssh/ssh_config.d/* for all local accounts. Tokens. Some client configuration directives can make use of tokens to stand in for certain values, as determined at run time. LocalCommand accepts all tokens. Hostname accepts the tokens %% and %h. ProxyCommand and ProxyJump accept the tokens %%, %h, %n, %p, and %r. CertificateFile, ControlPath, IdentityAgent, IdentityFile, KnownHostsCommand, LocalForward, Match exec, RemoteCommand, RemoteForward, RevokedHostKeys, and UserKnownHostsFile accept the tokens %%, %C, %d, %h, %i, %j, %k, %L, %l, %n, %p, %r, and %u. KnownHostsCommand additionally accepts the tokens %%, %C, %d, %f, %H, %h, %I, %i, %j, %K, %k, %L, %l, %n, %p, %r, %t, and %u, The client tokens are described as follows, and are somewhat different from the tokens used in server configuration: As always, check ssh_config(5) on the systems in question to known what actually supported by the installed version of OpenSSH.
2,210
Chess Opening Theory/1. e4/1...c6/2. Bc4. Hillbilly Attack. 2.Bc4?! Black will almost certainly play /2...d5/. Since Black's d5 pawn is defended by both the c-pawn and the queen, White's bishop will be forced to move away, either on the following turn or after 3. exd5 cxd5.
97
Chess Opening Theory/1. e4/1...c6/2. Bc4/2...d5. Hillbilly Attack. 2...d5. White has two options: 3. exd5 cxd5 is the more common move in the Lichess database. However, after the pawn trade, White will be down a tempo and a center pawn with little to show for it. 4. Bb5+ can be blocked by the opposing bishop, and if White trades, Black is comfortable. 4. Bb3 keeps a bishop on the f7 diagonal, but does not challenge much. /3. Bb3/ gambits White's e4 pawn in order to gain a tricky, if somewhat dubious, attack. Note that after 3...dxe4 4. Qh5, Scholar's Mate is not threatened yet (after, say, 4...Nf6?! 5. Qxf7+, the king can move to d6), though the f7 pawn is still vulnerable. Any other move loses the bishop or makes the initial 2. Bc4 a waste of time.
262
EverQuest/Strategies/Root Rotting. Root Rotting is a technique used by classes who get the Root line of spells. Basically, you root the monster, rendering it immobile and then proceed to damage it via spells. This is most effective with damage over time spells (DoTs) rather than direct damage spells, as DD spells tend to break the root and the monster will come running to kill you. If that happens, you cast your root spell again and continue to do damage until the monster is dead. Handy spells to use in conjunction with root rotting are snare spells and slowing spells. Snares reduce the movement rate of the monster. These are helpful when the root breaks (which inevitably happens), as they slow the monster down so that you have a chance to either run away or recast your root spell. Slows are spells which increase the time in between swings that the monster takes at you ie. instead of being able to hit you once every 4 seconds (or quad you once every four seconds), he can only have a chance to hit you once every 6 seconds or 8 seconds, depending on the level of the monster and the slow. Once again, this gives you additional time to move out of the way, cast a spell or re-root the monster.
283
Chess Opening Theory/1. e4/1...c6/2. Bc4/2...d5/3. Bb3. Hillbilly Attack, Schaeffer Gambit. 3.Bb3. The only sensible continuation to the Hillbilly Attack, since after 3.exd5 cxd5, White ends up losing a tempo with no clear benefit. Here, White gambits the e-pawn, trying to get an attack. Black, following the ideas of the Caro-Kann, will usually take 3...dxe4, accepting the gambit. The most common continuation after 3...dxe4 is 4. Qh5. While this threatens Scholar's Mate if Black blunders with 4...e5?? or 4...Bd7??, there is no serious threat of checkmate at present (if, say, 4...Nf6?! 5. Qxf7+, the king can move to d6). Still, it would be wise for Black to protect the f7 pawn with 4...g6 or 4...e6. 4.Nc3, attacking the e4 pawn while keeping pressure on f7, is the next most common move.
282
Chess Opening Theory/1. e4/1...e5/2. Qh5/2...Nf6/3. Qxe5. Kiddie Countergambit. 3. Qxe5+. White captures the undefended e5 pawn and gives check. There are two ways for Black to respond: 3...Be7 or 3...Qe7?!. 3...Be7 is better, since after 4...Nc6, White will need to spend a tempo retreating the queen. 3...Qe7 allows a queen trade, meaning White no longer needs to spend the tempo retreating, thus giving back the advantage to White. After 3...Qe7 4. Qxe7 Bxe7, White is up a central pawn while Black is barely ahead in development.
182
Guitar/G Em C D. = Chord change G-Em-C-D = The Minor Parallel. The change between G major and E minor is particularly easy. By the way, memorize that E minor (written "Em" for short) is the minor parallel of G major. In many songs you don't necessarily have to change to the minor parallel, you can simply continue to play the major chord. However, the slightly softer sounding minor chord can also replace the major chord. Minor chords are often used to make certain bars sound a little softer. It is commonly said that a minor chord sounds sad. It is true that it is relatively easy to write sad-sounding songs with minor chords, but there are also sad-sounding songs that consist mainly of major chords. Here, in most of our song examples, the minor chord serves more to build momentum for the next major chord. This allows the song to be much more spirited. Later on in the folk diploma, you will get to know songs that are written entirely in a minor key. Remember, however, that Em is the minor parallel of G major. Chord change G - Em - G and Em - C - Em in the diagram. Even if the individual fingering changes are quite close together here, only practise the change between two chords at first. As soon as the upper half of the diagram works, you can practise the lower half. The arrows indicate two cycles, which are first practiced separately and then later one after the other. This position of the fingers appears very often with major chords (G C F D). This appears in Em and Am and A major. Chord change G-Em-C-D. Chord progression G-Em-C-D is a "16-45" in G major. To designate the chord steps in a key, simply count through the notes of the corresponding scale. No panic! You don't have to learn any notes here. You should only understand how the chord steps come about. This will give you at least a rough idea of what the terms are about if you come across them in a tutorial on the Internet. You will learn all the special features of scales and chord names at a later stage. <score sound="1"> \relative c { \clef "G_8" \key g \major \tempo 1 = 100 %%Tempo ausblenden \set Score.tempoHideNote = ##t g1 a b c d e fis g </score> In harmony theory, the pitches are usually given in Roman numerals. <score sound="1"> \relative c { \tempo 1 = 100 %%Tempo ausblenden \set Score.tempoHideNote = ##t \clef "G_8" \key g \major </score> You can assign a triad or a chord to each note and thus a chord step to each chord. <score sound="1"> \new ChordNames { \chordmode { g1 a:m b:m c d e:m fis:dim g' \new Staff \chordmode { \tempo 1 = 100 %%Tempo ausblenden \clef "G_8" \key g \major \set Score.tempoHideNote = ##t g,1 a,:m b,:m c, d, e,:m fis,:dim g, </score> The 1st degree is called the tonic (T), the 4th degree the subdominant (S) and the 5th degree the dominant (D). <score sound="1"> \new ChordNames { \chordmode { g1 a:m b:m c d e:m fis:dim g' \new Staff \chordmode { \tempo 1 = 100 %%Tempo ausblenden \set Score.tempoHideNote = ##t \clef "G_8" \key g \major g,1 a,:m b,:m c, d, e,:m fis,:dim g, </score> The 6th degree is called the tonic parallel (t), the 2nd degree the subdominant parallel (s) and the 3rd degree the dominant parallel (d). These triads from the theory of harmony represent all the possibilities of playing a chord on the guitar. In this way, one could play the degrees of the G major scale with simple chords. <score> \new ChordNames { \chordmode { g2 a:m b:m7 c d e:m fis:m7.5- g \new FretBoards { \override FretBoards.FretBoard.size = #'1.5 \override FretBoard.fret-diagram-details.finger-code = #'in-dot \override FretBoard.fret-diagram-details.dot-color = #'white \override FretBoard.fret-diagram-details.orientation = #'landscape < g,-3 b,-2 d g b g'-4 > % G < a, e-2 a-3 c'-1 e' > % Am < b,-1 d a-2 d'-4 > % Bm7 < c-3 e-2 g c'-2 e' > % C < d a-1 d'-3 fis'-2 > % D < e, b,-2 e-3 g b e'> % Em < fis,-2 e-3 a-4 c'-1 e'> % F#m7b5 < g,-3 b,-2 d g b fis'-1> % G7 </score> You don't need to be interested in the unknown chords at the moment. Sooner or later you will get to know them soon enough. Today we are only interested in the first, sixth, fourth and fifth chord steps in that exact order. or or shorter So today we have learned about the tonic parallel E minor (Em) of the G major scale. <score sound="1"> \new ChordNames { \chordmode { g,1 e,:m c, d, \new Staff \chordmode { \tempo 1 = 100 %%Tempo ausblenden \set Score.tempoHideNote = ##t \clef "G_8" \key g \major g,1 e,:m c, d, </score> The chord progression is also called "50s progression" or "ice cream changes". Presumably because young people in the 50s liked to meet in an ice cream bar with a jukebox. First practise the change G - Em - G. If this works smoothly, practise C - Em - C until this also works flawlessly. Then practise the complete chord progression G-Em-C-D. <br> <br> <br> <br> Again, it makes sense to think of the ring and middle fingers as the "center of gravity" of the chord. This way, the teacher has no problem displaying the chords without having to announce them (leaving more time for singing or other corrections). G is at the top, D is at the bottom, Em is at the top right (as seen from the player) and C is somewhere in the middle (as it sometimes makes sense for C to be displayed a little to the left or a little to the right of the middle; see D C G). The chord combination is a regular cycle that is very easy to memorize and therefore very easy to learn. Audio sample. <score sound="1" raw="1"> \version "2.20.0" \header { title="Campfire Stroke G - Em - C - D -" encoder="mjchael" myChords = \new ChordNames { \chordmode { g1 g e:m e:m c c d d Lager_G = { <g, b d>4 \downbow %1 <g b g'>8 \downbow %2 <g b g'>4 \upbow %+ <g b g'>8 \upbow %+ <g b g'>4 \downbow %4 Lager_Em = { <e, b e>4 \downbow %1 <g b e'>8 \downbow %2 <g b e'>4 \upbow %+ <g b e'>8 \upbow %+ <g b e'>4 \downbow %4 Lager_C = { <e, c e>4 \downbow <g c' e'>8 \downbow <g c' e'>4 \upbow <g c' e'>8 \upbow <g c' e'>4 \downbow Lager_D = { 4 \downbow 8 \downbow 4 \upbow 8 \upbow 4 \downbow myRhythm = { \repeat volta 4 { \Lager_G \Lager_G \Lager_Em \Lager_Em \break \Lager_C \Lager_C \Lager_D \Lager_D \mark "4x" \score { « %layout % Chords \myChords % Slash Notation \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm \score { « % midi \unfoldRepeats { \tempo 4 = 90 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" c4 b, a, \myRhythm <g, b, d g b g,>1 \downbow \paper { indent=0\mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> <score sound="1" raw="1"> \version "2.20.0" \header { title="Campfire Stroke G Em C D" encoder="mjchael" myChords = \new ChordNames { \chordmode { g1 e:m c d Lager_G = { <g, b d>4 \downbow %1 <g b g'>8 \downbow %2 <g b g'>4 \upbow %+ <g b g'>8 \upbow %+ <g b g'>4 \downbow %4 Lager_Em = { <e, b e>4 \downbow %1 <g b e'>8 \downbow %2 <g b e'>4 \upbow %+ <g b e'>8 \upbow %+ <g b e'>4 \downbow %4 Lager_C = { <e, c e>4 \downbow <g c' e'>8 \downbow <g c' e'>4 \upbow <g c' e'>8 \upbow <g c' e'>4 \downbow Lager_D = { 4 \downbow 8 \downbow 4 \upbow 8 \upbow 4 \downbow myRhythm = { \repeat volta 4 { \Lager_G \Lager_Em \Lager_C \Lager_D \mark "4x" \score { « %layout % Chords \myChords % Slash Notation \new Voice \with { \consists "Pitch_squash_engraver" \set Staff.midiInstrument = "acoustic guitar (nylon)" \improvisationOn \override NoteHead.X-offset = 0 \myRhythm \score { « % midi \unfoldRepeats { \tempo 4 = 90 \time 4/4 \key d \major \set Staff.midiInstrument = #"acoustic guitar (nylon)" c4 b, a, \myRhythm <g, b, d g b g,>1 \downbow \paper { indent=0\mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score> <hr>
3,275
Guitar/G Em C D/Song Examples. (4) G Em C D. At first, practice mainly songs with the chord combination G-Em-C-D. Especially prefer those where each chord is held for two bars. After a very short time, the change will become automatic and you can focus more on singing. The chord sequence G-Em-C-D makes the following lesson with the quick chord change easier. The other suggested songs will be for repetition later.
106
Quantum Graphs/Introduction. Studying operators of Schrödinger type on metric graphs is a growing subfield of mathematical physics which is motivated both by direct applications of the graph models to physical phenomena and by use of graphs as a simpler setting in which to study complex phenomena of quantum mechanics, such as Anderson localization, universality of spectral statistics, nodal statistics, scattering and resonances, to name but a few. The name "quantum graphs" is most likely a shortening of the title of the article "Quantum Chaos on Graphs" by Kottos and Smilansky \cite{KotSmi_prl97}. The model itself has been studied well before the name appeared, for example in \cite{Pau_jcp36,RueSch_jcp53,Rot_crasp83,Bel_laa85,Nic_incol85}. Several reviews and monographs cover various directions within the quantum graphs research \cite{GnuSmi_ap06,Post_book12,Mugnolo_book}. However, when starting a research project with students, both (post-) graduate and undergraduate, the author felt that a more elementary introduction would be helpful. The present manuscript grew out of the same preparatory lecture repeated, at different points of time, to several students. It is basically a collection of minimal examples of quantum graphs which already exhibit behavior typical to larger graphs. We supply the examples with pointers to the more general facts and theorems. Only in the last sections we explore a research topic (the nodal statistics on graphs) in some depth. For obvious reasons the pointers often lead to the monograph \cite{BerKuc_graphs}.
406
Quantum Graphs/Schrodinger equation on a metric graph. Schrödinger equation on a metric graph Consider a graph formula_1 , where formula_2 is the set of vertices and formula_3 is the set of edges. Each edge connects a pair of vertices; we allow more than one edge running between any two vertices. We also allow edges connecting vertices to themselves ("loops"). This freedom creates some notational difficulties, so we ask the reader to be flexible and forgiving. Each edge formula_4 is assigned a positive length formula_5 and is thus identified with an interval formula_6 (the direction is chosen arbitrarily and is irrelevant to the resulting theory). This makes formula_7 a "metric graph". Now a function on a graph is just a collection of functions defined on individual edges. The eigenvalue equation for the Schrödinger operator is formula_8 which is to be satisfied on every edge, in addition to the vertex matching conditions as follows formula_9 The continuity means that the values at the vertex agree among all functions living on the edges attached (or "incident") to the vertex. In the second condition (often called "current conservation condition"), the sum is over all edges attached to the vertex and the derivative are all taken in the same direction: from the vertex into the edge. A looping edge contributes two terms to the sum, one for each end of the edge. The function formula_10 is called the "electric potential" but we will set it identically to zero in all of the examples below. Vertex conditions \eqref{eq:cont}-\eqref{eq:current_cons} are called \emph{Neumann conditions}\footnote{Other names present in the literature are ``Kirchhoff", ``Neumann-Kirchhoff", ``standard", ``natural" etc.}; they can be generalized significantly, but before we give any more theory, let us consider some examples. Example: a trivial graph --- an interval. An interval formula_11 is the simplest example of a graph; it has two vertices (the endpoints of the interval) and one edge. The continuity condition is empty at every vertex since there is only one edge. The current conservation condition at the vertex formula_12 becomes formula_13 and at the vertex formula_14 becomes formula_15 The minus sign appeared because we agreed to direct the derivatives into the edge; of course it is redundant in this particular case. Let formula_16 and consider first the positive eigenvalues, formula_17. The eigenvalue equation becomes formula_18 where for convenience we substituted formula_19. This is a second order linear equation with constant coefficients which for formula_20 is readily solved by formula_21 Applying the first vertex condition formula_22 we get formula_23 and formula_24. The second vertex condition becomes formula_25 which imposes a condition on formula_26 but does nothing to determine formula_27 (naturally we are not interested in the trivial solution formula_28). We thus get the \emph{eigenvalues} formula_29, formula_30 with the corresponding eigenfunctions formula_31 defined up to an overall constant multiplier (as befits eigenvectors and eigenfunctions). There is one other eigenvalue in the spectrum that we missed: formula_32 with the eigenfunction formula_33. While this agrees with the above formulas with formula_34, the premise of equation (\ref{eq:f_solution}) is no longer correct when formula_32. Exercise 1. Solve the eigenvalue equation with formula_36 and show that the vertex conditions \eqref{eq:NC1} and \eqref{eq:NC2} are never satisfied simultaneously (ignore the trivial solution formula_37). Exercise 2. Integrate by parts the scalar product formula_38 to obtain an expression that is obviously non-negative, and thus show that it is not necessary to solve \eqref{eq:eig_eq_V0} to conclude that there are no negative eigenvalues. We did not try to look for complex eigenvalues. This is because the Schrödinger operator we defined is self-adjoint (see Thm 1.4.4 of \cite{BerKuc_graphs}) and therefore has real spectrum. The spectrum in the above example is discrete: all eigenvalues are isolated and of finite multiplicity. This is true for any graph which is compact (has finitely many edges, all of which have finite length), see Thm 3.1.1 of \cite{BerKuc_graphs}. The proof outlined in Exercise~\ref{hw:nonneg} works for general graphs with Neumann conditions at all vertices. The multiplicity of the eigenvalue 0 in the spectrum can be shown to equal the number of the connected components of the graph. Example: a trivializable graph with a vertex of degree two. Consider now a graph consisting of two consecutive intervals, formula_39 and formula_40. We do not really have to parametrize the edges starting from 0, so in this example we will employ the "natural parametrization". Denote the components of eigenfunction living on the two intervals by formula_41 and formula_42 correspondingly. Solving the equation on the first edge and enforcing the Neumann condition at formula_12 results in formula_44. The conditions at the point formula_45 are formula_46 Now, by uniqueness theorem for second order differential equations, the solution on the second edge is fully determined by its value at formula_45 and the value of its derivative. Thus the solution is still formula_48 and there is no change in the solution happening at formula_45. We could have considered the interval formula_50 without introducing the additional vertex at formula_45. This obviously generalizes to the following rule: having a Neumann vertex of degree 2 is equivalent to having an uninterrupted edge. This rule is useful, for example, for when one wants to program a looping edge but is troubled by the notational difficulties of loops or multiple edges. In this case a looping edge can be implemented as a triangle with two "dummy vertices of degree two". Example: star graph with Neumann endpoints. Consider now a first non-trivial example: a star graph with 3 edges meeting at a central vertex, see Fig.~\ref{fig:stargraph}. Parametrizing the edges from the endpoints towards the central vertex, we get formula_52 where in addition to the already familiar equations \eqref{eq:star_equation} and \eqref{eq:neumann_per} (in three copies), we have continuity condition at the central vertex in equation \eqref{eq:cont_central} and current conservation at the central vertex in equation \eqref{eq:cur_cons_central}. Note that in equation \eqref{eq:star_equation}, the eigenvalue formula_53 is the same on all three edges. Equations \eqref{eq:star_equation}-\eqref{eq:neumann_per} are solved by formula_54 for some constants formula_55, formula_56 and formula_57. Now the remaining two equations become, after a minor simplification, formula_58 Dividing equation \eqref{eq:cur_cons_central_sub} by \eqref{eq:cont_central_sub} cancels the unknown constants, resulting in formula_59 Squares of the roots formula_26 of this equation (which cannot be solved explicitly except when all formula_14s are equal) are the eigenvalues of the star graph. Exercise 3. We ignored the possibility that one or more of the cosines in equation \eqref{eq:cont_central_sub} are zero. Show that the is formula_62 Moreover, the order of the root formula_26 of \eqref{eq:3star_robust} is equal to the dimension of the corresponding eigenspace. For example, if formula_64, the left-hand side of \eqref{eq:3star_robust} vanishes at formula_65 to the second order. This corresponds to two linearly independent solutions, formula_66 There is actually a lot more that can be (and will be said) about this simple graph, but we first need to extend the set of possible vertex conditions that we consider.
1,966
Songbook/Spanish Lady. =Spanish Lady= The 4th verse of the original lyrics of this old folk song refers to historical places and figures who lived at the end of the 18th century and were part of the first revolutionary movement in Irish history. The Spanish Lady. <poem> As I came down through Dublin City at the hour of twelve at night Who should I see but a Spanish lady washing her feet by candle light First she washed them, then she dried them over a fire of amber coal In all my life I never did see a maid so sweet a-bout the sole As I came back through Dublin city at the hour of half past eight Who should I spy but the Spanish lady brushing her hair in broad daylight First she tossed it, then she brushed it on her lap was a silver comb In all my life I never did see a maid so fair since I did roam As I went back through Dublin city as the sun be-gan to set Who should I spy but the Spanish lady catching a moth in a golden net When she saw me then she fled me lifting her petticoat over her knee In all my life I never did see a maid so shy as theSpanish lady I’ve wandered north and I’ve wandered south through Stonybatter andPatrick’s Close Up and around the Glouster diamond and back by Napper Tandy’s house Old age has her hand laid on me, cold as a fire of ashy coals But in all my life I never did see a maid so sweet as the Spanish lady </poem> Since the places in the fourth verse are not so well known outside Ireland, and the text is not easy to interpret (does an old man remember a pretty Spanish woman, did he marry her, or have his once hot embers died out in the meantime?
417
Songbook/Whiskey in the Jar. =Whiskey In The Jar = "Whiskey in the Jar" is a famous, traditional Irish folk song that tells the story of a bush thief from the Cork or Kerry mountains who has been betrayed by his wife or lover. As with most Irish drinking songs, there is no uniform standard for the lyrics or melody. The best-known covers of this song are probably by the rock groups Thin Lizzy and Metallica. Whiskey In The Jar. AsI was going over thefar famed Kerry mountains Imet with captain Farrell and hismoney he wascounting. Ifirst produced my pistol, andthen produced my rapier. Said stand and deliver, for Iam a bolddeceiver, Icounted out his money, and itmade a pretty penny. Iput it in my pocket and Itook it home toJenny. Shesaid and she swore, that shenever would deceive me, but thedevil take the women, for theynever can beeasy Iwent into my chamber,all for to take a slumber, Idreamt of gold and jewels and forsure it was nowonder. ButJenny took my charges and shefilled them up with water, Thensent for captain Farrel to beready for theslaughter. It wasearly in the morning, asI rose up for travel, Theguards were all around me and like-wise captainFarrel. Ifirst produced my pistol, for shestole away my rapier, But Icouldn't shoot the water so aprisoner I wastaken. Ifanyone can aid me, it's mybrother in the army, IfI can find his station down inCork or in Kil--larney. Andif he'll come and save me, we'll goroving near Kilkenny, And Iswear he'll treat me better than medarling sportlingJenny Nowsome men take delight in thedrinking and the roving, Butothers take delight in thegambling and thesmoking. ButI take delight in thejuice of the barley, Andcourting pretty fair maids in themorning bright andearly </poem>
520
Chess Opening Theory/1. e4/1...e5/2. Nf3/2...Nc6/3. Bb5/3...a6/4. Ba4/4...Nf6/5. O-O/5...Bc5. Ruy López Opening: Morphy Defense, Neo-Arkhangelsk Variation:. Black develops his bishop before playing 5...b5 which prevents white from playing 6.Bb4 6...Bc5 7. a4 but allows 6.c3 6...b5 7.Bc2 or 6.Bxc6. White could also continue to play 6. d3 The Anderssen Variation.
165
Guitar/Quick Chord Change/Song Examples. (5) Quick Chord Change. Songs that have a chord progression other than G Em C D are only intended for repetition later. So don't practise them today in this lesson.
56
Songbook/I like the flowers. =I like the flowers= <score sound="1" raw="1"> \version "2.20.0" \header { title = "I Like The Flowers" composer = "trad." % arranger = "arr: ccbysa Mjchael" myChords = \chordmode { \set Staff.midiInstrument = #"acoustic guitar (nylon)" % Akkorde nur beim Wechsel Notieren \set chordChanges = ##t g,4 8 e,4:m e,8:m e,4:m | c,4 8 d,4 8 4 g,4 8 e,4:m e,8:m e,4:m | c,4 8 d,4 8 4 g,4 8 e,4:m e,8:m e,4:m | c,4 8 d,4 8 4 g,4 8 e,4:m e,8:m e,4:m | c,4 8 d,4 8 4 myMelody = \relative c" { \clef "treble" \time 4/4 \tempo 4 = 120 %Tempo ausblenden \set Score.tempoHideNote = ##t \key g\major \set Staff.midiInstrument = #"trombone" g4^"1. Stimme" g8 fis e4 e r8 a8 a g fis e d4 \break b'4^"2. Stimme" b8 a g4 g r8 c8 c b a b c4 \break d4^"3. Stimme" d8 c b a g4 c8 b a g fis4 r4 \break g8^"4. Stimme (Ostinato)" g g g e e e e a8 a a a d, d e fis \bar ":|." myLyrics = \lyricmode { I like the flow -- ers, I like the daf -- fo -- dils. I like the moun -- tains, I like the rol -- ling hills. I like the fire -- place, when the light is low. Dum, di da, di dum, di da, di dum, di da, di dum, di da, di. \score { % \new TabStaff { \myChords } % Test % unterdrückt im raw="1"-Modus das DinA4-Format. \paper { indent=0\mm % DinA4 0 210mm - 10mm Rand - 20mm Lochrand = 180mm line-width=180\mm oddFooterMarkup=##f oddHeaderMarkup=##f % bookTitleMarkup=##f scoreTitleMarkup=##f </score>
700
Songbook/La Bamba. =La Bamba= Weblinks. <hr>
24
Songbook/Guantanamera. =Guantanamera= Guantanamera. <poem> Guantanamera guajira guantana- mera guantana- mera guajira guantana- mera ... Yo soy un hombre sin- cero - De donde crece la palma - Yo soy un hombre sin- cero - De donde crece la palma - Y antes de morirme quiero - echar mis versos del al- ma ... Mi verso es de un verde claro - Y de un car- mín encen- dido Mi verso es de un verde claro - Y de un car- mín encen- dido Mi verso es un ciervo herido - Que busca en el monte am- paro - ... - Por los po- bres de la tierra - Quiero yo mi suerte echar - Con los po- bres de la tierra - Quiero yo mi suerte echar - El arro- yo de la cierra - Me com- place más que el mar - </poem>
307
Songbook/Kumbayah my Lord. = Kumbayah my Lord = Rhythm problems. The first chord change occurs in the middle of the bar without a chord change at the beginning of the bar. This is a particular difficulty for beginners. Normally you do not notate a chord again if there has been no change of fingering beforehand. It is also unusual for normal songbooks to indicate a quick chord change with brackets. You need some playing experience in order not to be surprised by such a quick chord change. So you need to remember everything you have learned about the quick chord change in order to play a chord for 1½ bars and then only change to the next chord in the second half of the bar. In the course of the individual verses, less and less help is given. With some playing experience, you will later be able to hear when a fingering change is necessary.
201