Skip to main content

Home/ Politically Minded/ Group items tagged Other languages

Rss Feed Group items tagged

Muslim Academy

Other Languages Muslims speak - 0 views

  •  
    There are number of languages in world. Different people speak different languages. As the Muslims also exist in near about every part of the world so Muslims also have languages other than Arabic. More than half the world's Muslims are non- Arabs. Most Muslims grow up speaking any number of languages other than Arabic. In Iran, most Muslims speak Persian; in Afghanistan, Pushtu, Dari (a dialect of Persian), or Uzbek; in Pakistan, perhaps Sindhi, Baluchi, or Punjabi; in India, Hindi, Kashmiri, or Urdu; in Bangladesh, Bengali. In Malaysia the person who professes to be Muslim, habitually speaks the Malay language, adheres to Malay customs and is domiciled in Malaysia. They use Malay language as native language. Bosnian Muslims living in Bosnia or also called Bosnikas, referred to Bosnian Muslim mostly speaks Greece, Germaniums languages as well as other native language. About 500,000 Muslims from Greece, predominantly of Turkish speaks Turkish languages.
Muslim Academy

Urdu Language - 0 views

  •  
    Urdu is not a basic language it is a derived language, actually it is the mixture of many other basic and derived languages like Arabic, Turkish, Persian and Hindi and even there are some words in Urdu which are borrowed from English. The term Urdu was derived from a Turkish word "Ordo", which means camp, army or group. The Urdu language was developed between the Muslim soldiers of the Mughals armies, these soldiers originally belonged to different civilizations and they were Turks, Arabs, Pathans, Persians, Rajputs, Jats, Afghans, Balochis and Punjabis. These soldiers lived together for many years of their lives to fight against their common enemy during which they used to interact with each other by communicating in their respective dialects, which gradually merged into each other and evolved into the present form of Urdu. It is due to this reason that Urdu was first known as "Lashkari Zaban" or the language of the army, which was later changed to "Urdu-e-Muallah" meaning the exalted army which was given by the great Shah Jahan, who was a Mughal Emperor. "Rekhta" meaning scattered was another name used for this language until the present name Urdu came into use.
thinkahol *

YouTube - ZEITGEIST: MOVING FORWARD | OFFICIAL RELEASE | 2011 - 0 views

  •  
    This is the Official Online (Youtube) Release of "Zeitgeist: Moving Forward" by Peter Joseph. [30 subtitles ADDED!] On Jan. 15th, 2011, "Zeitgeist: Moving Forward" was released theatrically to sold out crowds in 60 countries; 31 languages; 295 cities and 341 Venues. It has been noted as the largest non-profit independent film release in history. This is a non-commercial work and is available online for free viewing and no restrictions apply to uploading/download/posting/linking - as long as no money is exchanged. A Free DVD Torrent of the full 2 hr and 42 min film in 30 languages is also made available through the main website [below], with instructions on how one can download and burn the movie to DVD themselves. His other films are also freely available in this format.
thinkahol *

‪ZEITGEIST: MOVING FORWARD | OFFICIAL RELEASE | 2011‬‏ - YouTube - 0 views

  •  
    On Jan. 15th, 2011, "Zeitgeist: Moving Forward" was released theatrically to sold out crowds in 60 countries; 31 languages; 295 cities and 341 Venues. It has been noted as the largest non-profit independent film release in history. This is a non-commercial work and is available online for free viewing and no restrictions apply to uploading/download/posting/linking - as long as no money is exchanged. A Free DVD Torrent of the full 2 hr and 42 min film in 30 languages is also made available through the main website [below], with instructions on how one can download and burn the movie to DVD themselves. His other films are also freely available in this format.
Skeptical Debunker

New study shows sepsis and pneumonia caused by hospital-acquired infections kill 48,000... - 0 views

  • This is the largest nationally representative study to date of the toll taken by sepsis and pneumonia, two conditions often caused by deadly microbes, including the antibiotic-resistant bacteria MRSA. Such infections can lead to longer hospital stays, serious complications and even death. "In many cases, these conditions could have been avoided with better infection control in hospitals," said Ramanan Laxminarayan, Ph.D., principal investigator for Extending the Cure, a project examining antibiotic resistance based at the Washington, D.C. think-tank Resources for the Future. "Infections that are acquired during the course of a hospital stay cost the United States a staggering amount in terms of lives lost and health care costs," he said. "Hospitals and other health care providers must act now to protect patients from this growing menace." Laxminarayan and his colleagues analyzed 69 million discharge records from hospitals in 40 states and identified two conditions caused by health care-associated infections: sepsis, a potentially lethal systemic response to infection and pneumonia, an infection of the lungs and respiratory tract. The researchers looked at infections that developed after hospitalization. They zeroed in on infections that are often preventable, like a serious bloodstream infection that occurs because of a lapse in sterile technique during surgery, and discovered that the cost of such infections can be quite high: For example, people who developed sepsis after surgery stayed in the hospital 11 days longer and the infections cost an extra $33,000 to treat per person. Even worse, the team found that nearly 20 percent of people who developed sepsis after surgery died as a result of the infection. "That's the tragedy of such cases," said Anup Malani, a study co-author, investigator at Extending the Cure, and professor at the University of Chicago. "In some cases, relatively healthy people check into the hospital for routine surgery. They develop sepsis because of a lapse in infection control—and they can die." The team also looked at pneumonia, an infection that can set in if a disease-causing microbe gets into the lungs—in some cases when a dirty ventilator tube is used. They found that people who developed pneumonia after surgery, which is also thought to be preventable, stayed in the hospital an extra 14 days. Such cases cost an extra $46,000 per person to treat. In 11 percent of the cases, the patient died as a result of the pneumonia infection.
  •  
    Two common conditions caused by hospital-acquired infections (HAIs) killed 48,000 people and ramped up health care costs by $8.1 billion in 2006 alone, according to a study released today in the Archives of Internal Medicine.
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
Levy Rivers

Marcia G. Yerman: Race, Gender and the Media in the 2008 Elections - 0 views

  • Several themes coalesced over the two-day period. A prominent one was the oft repeated, "Did race trump gender?" Dr. Cynthia Neal-Spence, Associate Professor of Sociology at Spelman College, spoke about the dilemma of the black female. Asking, "Are we as a group more gender conscious or race conscious?" she then suggested "the media coverage had helped black women to choose sides." Despite Obama offering a post-racial approach, she sensed the same "tensions resurfacing that were in place during the suffragette movement." She also saw the media's analyzation as being "racialized."
  • Although feminine for Sarah Palin is an asset, "feminine" attributes in general are considered a negative. "The process of gender," as phrased by Vojdik, is a methodology employed by the Republicans where they "feminize" a male candidate -- to his detriment.
  • Frank Rudy Cooper, Associate Professor of Law at Suffolk University, spelled out that "Obama had to deal with the media representation of black masculinity." He posited that Obama had to be "a unisex president." Despite trying to run a "post-racial campaign, Obama had to be careful avoid "the angry black male" stereotype by not being too aggressive. Cooper explained that in pitting McCain against Obama, the masculine vs. feminine style is emphasized. Obama's empathetic style has been criticized, and as "feminization is a slur," he is forced into a precarious balancing act.
  • ...2 more annotations...
  • However, Vojdik said, "Those in the media insisted on gendering her candidacy, taking her from the public sphere to the private construction of her identity as a wife and a mother." This was often accomplished through the use of specific language. She gave as examples the terms, "shrill, emasculating, castrating," with oft used analogies of Hillary as "the hectoring mother," or "the wife as ball-buster." Hillary was not male, but she "had failed as a female." On the other hand, Vojdik saw Sarah Palin as seeking to be elected because she was a woman in the "good wife and mother" mode. Projecting herself as stereotypically feminine, albeit a "pit bull with lipstick," she "appeals to the 80's concept of the superwoman." "But," Vojdik asked, "where are the supports for ordinary women?"
  • That concept was illuminated by Anthony E. Varona, Associate Professor of Law at American University. He pointed out why the 2004 Karl Rove election strategy based on the "unease felt by religious and social conservatives" wasn't going to work in 2008. Plainly put, "Things have changed. New media and the blogosphere have made it impossible."
Levy Rivers

Writers praise Barack Obama's inaugural address - long on plot - stood on shoulders - 0 views

  • Long on plot (and it will thicken), it did what literature does best: the backward glance, the standing on shoulders, the salute to ancestors and other sources of wisdom.
  • He is our first (in the best sense of the word) aristocratic president," author and journalist Malcolm Gladwell told The Times. "Bush was a buddy. Clinton was the kindly uncle. Obama is a prince."
  • Some, like memoirist Patricia Hampl, praised Obama's plain speaking. "I was glad," she said, "that he denied himself rhetorical flourishes and gave a speech as refined and restrained in its power so that political language itself was restored to its greatest value -- saying what the speaker means."
Skeptical Debunker

NYT: Many polluters escape prosecution - The New York Times- msnbc.com - 0 views

  • Thousands of the nation’s largest water polluters are outside the Clean Water Act’s reach because the Supreme Court has left uncertain which waterways are protected by that law, according to interviews with regulators. As a result, some businesses are declaring that the law no longer applies to them. And pollution rates are rising. Companies that have spilled oil, carcinogens and dangerous bacteria into lakes, rivers and other waters are not being prosecuted, according to Environmental Protection Agency regulators working on those cases, who estimate that more than 1,500 major pollution investigations have been discontinued or shelved in the last four years. Story continues below ↓advertisement | your ad heredap('&PG=NBCMSN&AP=1089','300','250');The Clean Water Act was intended to end dangerous water pollution by regulating every major polluter. But today, regulators may be unable to prosecute as many as half of the nation’s largest known polluters because officials lack jurisdiction or because proving jurisdiction would be overwhelmingly difficult or time consuming, according to midlevel officials.
  •  
    The best "justice" money can buy via packing the Supreme Court with "conservatives" is bearing smelly, polluted fruit. Specifically, those "conservatives" are showing themselves to be "activist judges" in "watering down" conservation and public safety laws passed by Congress. Polluting "business" entities are apparently NOT to be considered to be within the oft-quoted and loved "conservative" limitation of the purview of the federal government to merely protect the populace from "enemies foreign and domestic". That this pollution kills and injures thousands (and poisons the environment for the countless of the "unborn") apparently doesn't matter (but if Al Qaeda was doing it, then complete suspension of all domestic rights would be justified to "fight" that!). Pictured: In 2007, a pipe maker was fined millions of dollars for dumping oil, lead and zinc into Avondale Creek in Alabama. A court ruled the waterway was exempt from the Clean Water Act. The firm eventually settled by agreeing to pay a smaller amount and submit to probation.
Levy Rivers

Op-Ed Columnist - The End of Philosophy - NYTimes.com - 0 views

  • Think through moral problems. Find a just principle. Apply it.
  • Today, many psychologists, cognitive scientists and even philosophers embrace a different view of morality. In this view, moral thinking is more like aesthetics. As we look around the world, we are constantly evaluating what we see. Seeing and evaluating are not two separate processes. They are linked and basically simultaneous.
  • Everything that we look at, we form an implicit preference. Some of those make it into our awareness; some of them remain at the level of our unconscious, but ... what our brain is for, what our brain has evolved for, is to find what is of value in our environment.”
  • ...3 more annotations...
  • Most of us make snap moral judgments about what feels fair or not, or what feels good or not. We start doing this when we are babies, before we have language. And even as adults, we often can’t explain to ourselves why something feels wrong.
  • We don’t just care about our individual rights, or even the rights of other individuals. We also care about loyalty, respect, traditions, religions. We are all the descendents of successful cooperators.
  • They link themselves together into communities and networks of mutual influence.
  •  
    As our brain sorts out of the thousands of bits of info it takes special note of those things your system of values and interest. We take note of those things that have been socially enriched objects and concepts
1 - 10 of 10
Showing 20 items per page